Many2One

FREEMIUM
By empirya
Updated a month ago
Data
-/10
Popularity Score
-
Latency
-
Success Rate

Many2One API Documentation

Search within a huge quantity of documents (news, blog posts, websites, rss feeds… downloaded from thousands of web sources) based on publishing date, keywords and other parameters

View API Details
POST/search
POST/search
Header Parameters
X-RapidAPI-HostSTRING
REQUIRED
X-RapidAPI-KeySTRING
REQUIRED
Required Parameters
dateStartSTRING
REQUIREDStart date for search; must be in ISO 8601 format. Values older than 90 days from current date are not allowed.
dateEndSTRING
REQUIREDEnd date for search; must be in ISO 8601 format. Time intervals greater than 10 days between dateEnd and dateStart are not allowed.
Optional Parameters
keywordsSTRING
OPTIONALKeywords to search for. Logical operators AND, OR and NOT are allowed and must be in uppecase. Double quotes are used to enclose exact phrases. Words that are too common, like "the", "if", "as" will be ignored and won't produce any results. This parameter can't be longer than 200 characters.
pageNUMBER
OPTIONALPage number to retrieve from the results (starting from 1). If omitted, the default value of 1 is used. You can get at most 100 results per page.
searchIdNUMBER
OPTIONALIdentifier for the current search. Since the archive you are querying is continuously updated, you can prevent such behaviour from disrupting your pagination by using searchId. When you make a new search, you will omit this parameter; the result returned by the API will contain a new searchId which you can use when requesting the following pages.
topNSourcesNUMBER
OPTIONALIf included, the results for the current call will return the top N sources (where N is equal to this parameter value) along with their document count for the whole search (not just the current page). You can't ask for more than 100 top sources. VERY IMPORTANT: including this parameter will make the single call count as 3 requests instead of just 1. The top sources are based on the whole result set, so you won't need to repeat this request for each page.
sourceNameSTRING
OPTIONALWith this parameter, you can request for results from a specific source. You can also use part of the name, for instance: "nyt" for "www.nytimes.com"
Code Snippet
Install SDK
{ "isError": false, "errorMessage": "", "data": { "numDoc": 183, "numDocWithRelated": 201, "qTime": 387, "currentPage": 2, "pageSize": 100, "docs": [ { "id": 186792166, "url": "http:\/\/www.ft.com\/cms\/s\/0\/9cc31076-e76e-11e4-8ebb-00144feab7de.html?ftcamp=published_links%2Frss%2Fcompanies%2Ffeed%2F%2Fproduct", "title": "Raytheon in $1.7bn cyber security deal", "content": "Acquisition by US defence contractor highlights push to tap into growing sector", "source": "www.ft.com\/home\/uk", "publishDate": "2015-04-20T18:32:53+02:00", "sourceType": "news", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186801723, "url": "http:\/\/rssfeeds.usatoday.com\/~\/89612662\/0\/usatoday-techtopstories~Raytheon-acquisition-shows-cybersecuritys-heat\/", "title": "\nAs this week\u2019s big RSA cybersecurity conference kicks off in San Francisco, companies are making announcements about moves in the increasingly crucial security arena.\nRaytheon Co. (RTN) announced Mon", "content": "\nAs this week\u2019s big RSA cybersecurity conference kicks off in San Francisco, companies are making announcements about moves in the increasingly crucial security arena.\nRaytheon Co. (RTN) announced Monday it has agreed to acquire Websense from private equity firm Vista Equity Partners for $1.9 billion. Raytheon will own 80% of the joint venture. Vista will keep a 20% stake.\nRaytheon will create a new company that combines Websense with Raytheon Cyber Products, a business unit of Raytheon\u2019s Intelligence, Information and Services segment.\nRaytheon is a defense contractor as well as manufacture of weapons and military and commercial electronics.\nVista purchased Websense in June 2013 for roughly $1 billion. That\u2019s a doubling of its value in just under two years.\nCybersecurity is hot, with major breaches affecting every segment of society and industry. Daniel Ives with FBR Capital Markets noted that the purchase and the price speaks to the massive demand and value for cyber security assets today.\nShares of Raytheon were up\u00a00.21% Monday to $107.50 a share.\n\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t", "source": "www.usatoday.com", "publishDate": "2015-04-20T17:51:05+02:00", "sourceType": "web", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186809913, "url": "http:\/\/www.cd-disk.com\/israels-check-point-software-steps-up-expansion-plans", "title": "\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\n\t\t\tBy Tova Cohen TEL AVIV (Reuters) \u2013 Network security provider Check Point Software Technologies plans to sharpen its focus on threat-prevention and mobile security, it said on Mo", "content": "\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\n\t\t\tBy Tova Cohen TEL AVIV (Reuters) \u2013 Network security provider Check Point Software Technologies plans to sharpen its focus on threat-prevention and mobile security, it said on Monday after posting better than expected first-quarter profit. Chief Executive Gil Shwed spoke of increased investment in new technologies and staff to cement the company\u2019s position of strength in a vibrant Israeli tech sector that accounts for about 12.5 percent of economic output and more than 50 percent of industrial exports. In February it bought cyber security start-up Hyperwise and this month acquired Lacoon Mobile Security to boost its offering for smartphones.\nView full post on Security News Headlines \u2013 Yahoo! News\n\t\t\t\t\t\t\n\t\t\t\n\t\t\t\t\t\t\n\t\t\t\n\t\t\t\tIsrael\u2019s Check Point Software steps up expansion plans was posted on April 20, 2015 at 3:34 pm in Computer Technology News and tagged as check, Expansion, Israel's, plans, Point, Software, steps.\n\t\t\t\tIt was last modified on April 20, 2015 at 3:34 pm. \n\t\t\t\tYou can follow any responses to this entry through the RSS 2.0 feed.\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\tYou can leave a response or trackback from your site.\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\tShare on Twitter, Facebook, Delicious, Digg, Reddit\n\t\t\t\n\t\t\t\n\t\t\n\t\t\t\n\n\t\t\n\t\t\n\t\n\n\t\t\n\n\t\t\t\t\n\t\n\t\n\n\t\t\n\n\n\t\t\t\t\t\t\t\t", "source": "www.cd-disk.com", "publishDate": "2015-04-20T17:34:49+02:00", "sourceType": "blog", "language": "en", "googleRank": 1, "relatedDocs": [ ] }, { "id": 186777504, "url": "http:\/\/feeds.reuters.com\/~r\/reuters\/technologyNews\/~3\/nlKQ_0lCl7c\/story01.htm", "title": "\n\n\nTEL AVIV (Reuters) - Network security provider Check Point Software Technologies (CHKP.O) plans to sharpen its focus on threat-prevention and mobile security, it said on Monday after posting better", "content": "\n\n\nTEL AVIV (Reuters) - Network security provider Check Point Software Technologies (CHKP.O) plans to sharpen its focus on threat-prevention and mobile security, it said on Monday after posting better than expected first-quarter profit.\nChief Executive Gil Shwed spoke of increased investment in new technologies and staff to cement the company's position of strength in a vibrant Israeli tech sector that accounts for about 12.5 percent of economic output and more than 50 percent of industrial exports.A leading player in the corporate fight against cyber crime and computer viruses, Check Point has acquired two Israeli companies since the start of 2014. In February it bought cyber security start-up Hyperwise and this month acquired Lacoon Mobile Security to boost its offering for smartphones. \"We increased our development, sales and marketing teams to capitalize on the expanding security market opportunity,\" Shwed said. \"We expect these investments to continue through the coming quarters.\"In the first quarter the company added 200-plus employees, more than in the whole of 2014, bringing its workforce to 3,500.\"We hope to grow at the same rate this quarter,\" Shwed told a news conference.The company earned 95 cents a share excluding one-off items in the first quarter, against 84 cents a year earlier. Revenue grew by 9 percent to $373 million.That compared with a forecast of 91 cents a share on revenue of $370 million, according to Thomson Reuters I\/B\/E\/S.\"It appears the company is hitting its stride as product innovation on the (software subscription) front coupled with a more acquisitive strategy are laying the groundwork for another strong year in 2015,\" said Daniel Ives, managing director at FBR Capital Markets.\"Cyber security tailwinds are massive and Check Point is at the right place at the right time.\"CEO Shwed forecast the company would earn 90-99 cents a share in the second quarter on revenue of between $380 million and $400 million. Analysts on average forecast adjusted earnings per share of 94 cents on revenue of $392.4 billion.At the end of March Check Point had cash of $3.7 billion and Shwed said it was interested in acquiring more technologies in threat prevention and mobile security.Check Point shares rose 5 percent to $85.84 in early Nasdaq trade and have gained 9 percent so far this year after a 22 percent rise in 2014.Shwed maintained his full-year adjusted profit forecast of $3.90 to $4.02 a share on revenue of $1.6 billion to $1.65 billion.(This version of the story adds the second-quarter outlook, CEO quotes and background) (Additional reporting by Steven Scheer; Editing by David Goodman)\n\n", "source": "www.reuters.com", "publishDate": "2015-04-20T16:46:28+02:00", "sourceType": "news", "language": "en", "googleRank": 8, "relatedDocs": [ { "id": 186737176, "url": "http:\/\/feeds.reuters.com\/~r\/reuters\/technologyNews\/~3\/nlKQ_0lCl7c\/story01.htm", "title": "\n\n\nTEL AVIV (Reuters) - Network security provider Check Point Software Technologies (CHKP.O) plans to sharpen its focus on threat-prevention and mobile security, it said on Monday after posting better", "content": "\n\n\nTEL AVIV (Reuters) - Network security provider Check Point Software Technologies (CHKP.O) plans to sharpen its focus on threat-prevention and mobile security, it said on Monday after posting better than expected quarterly profit on higher sales.\nThe Israel-based company earned 95 cents a share excluding one-off items in the first quarter, against 84 cents a year earlier. Revenue grew by 9 percent to $373 million.That compared with a forecast of 91 cents a share on revenue of $370 million, according to Thomson Reuters I\/B\/E\/S.\"It appears the company is hitting its stride as product innovation on the (software subscription) front coupled with a more acquisitive strategy are laying the groundwork for another strong year in 2015,\" said Daniel Ives, managing director at FBR Capital Markets.\"Cyber security tailwinds are massive and Check Point is at the right place at the right time.\"Check Point has acquired two Israeli companies since the start of the year. In February it bought cyber security start-up Hyperwise and this month it acquired Lacoon Mobile Security to help prevent cyber attacks on mobile phones. \"We increased our development, sales and marketing teams to capitalize on the expanding security market opportunity,\" Chief Executive Gil Shwed said. \"We expect these investments to continue through the coming quarters.\"Check Point's Nasdaq-listed shares have gained 4 percent so far this year after a 22 percent rise in 2014. (Reporting by Tova Cohen; Additional reporting by Steven Scheer; Editing by David Goodman)\n\n", "source": "www.reuters.com", "publishDate": "2015-04-20T13:01:14+02:00", "sourceType": "news", "language": "en", "googleRank": 8, "relatedDocs": [ ] } ] }, { "id": 186777293, "url": "http:\/\/feeds.reuters.com\/~r\/reuters\/companyNews\/~3\/yngbrFo4yWw\/story01.htm", "title": "\n\n\n* Q1 adjusted earnings up 13 pct on revenue up 9 pct\n* Sees Q2 EPS $0.90-$0.99 on revenue of $380-400 mln* Nasdaq-listed shares up 5 pct\n\n (Adds second-quarter outlook, CEO quotes, background)By To", "content": "\n\n\n* Q1 adjusted earnings up 13 pct on revenue up 9 pct\n* Sees Q2 EPS $0.90-$0.99 on revenue of $380-400 mln* Nasdaq-listed shares up 5 pct\n\n (Adds second-quarter outlook, CEO quotes, background)By Tova CohenTEL AVIV, April 20 (Reuters) - Network security provider\nCheck Point Software Technologies plans to sharpen its\nfocus on threat-prevention and mobile security, it said on\nMonday after posting better than expected first-quarter profit.Chief Executive Gil Shwed spoke of increased investment in\nnew technologies and staff to cement the company's position of\nstrength in a vibrant Israeli tech sector that accounts for\nabout 12.5 percent of economic output and more than 50 percent\nof industrial exports.A leading player in the corporate fight against cyber crime\nand computer viruses, Check Point has acquired two Israeli\ncompanies since the start of 2014. In February it bought cyber\nsecurity start-up Hyperwise and this month acquired Lacoon\nMobile Security to boost its offering for smartphones.\"We increased our development, sales and marketing teams to\ncapitalise on the expanding security market opportunity,\" Shwed\nsaid. \"We expect these investments to continue through the\ncoming quarters.\"In the first quarter the company added 200-plus employees,\nmore than in the whole of 2014, bringing its workforce to 3,500.\"We hope to grow at the same rate this quarter,\" Shwed told\na news conference.The company earned 95 cents a share excluding one-off items\nin the first quarter, against 84 cents a year earlier. Revenue\ngrew by 9 percent to $373 million.That compared with a forecast of 91 cents a share on revenue\nof $370 million, according to Thomson Reuters I\/B\/E\/S.\"It appears the company is hitting its stride as product\ninnovation on the (software subscription) front coupled with a\nmore acquisitive strategy are laying the groundwork for another\nstrong year in 2015,\" said Daniel Ives, managing director at FBR\nCapital Markets.\"Cyber security tailwinds are massive and Check Point is at\nthe right place at the right time.\"CEO Shwed forecast the company would earn 90-99 cents a\nshare in the second quarter on revenue of between $380 million\nand $400 million. Analysts on average forecast adjusted earnings\nper share of 94 cents on revenue of $392.4 billion.At the end of March Check Point had cash of $3.7 billion and\nShwed said it was interested in acquiring more technologies in\nthreat prevention and mobile security.Check Point shares rose 5 percent to $85.84 in early Nasdaq\ntrade and have gained 9 percent so far this year after a 22\npercent rise in 2014.Shwed maintained his full-year adjusted profit forecast of\n$3.90 to $4.02 a share on revenue of $1.6 billion to $1.65\nbillion.\n\n (Additional reporting by Steven Scheer; Editing by David\nGoodman)\n\n", "source": "www.reuters.com", "publishDate": "2015-04-20T16:45:03+02:00", "sourceType": "news", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186856334, "url": "http:\/\/www.BriefingWire.com\/pr\/manageengine-to-highlight-its-it-security-compliance-management-solutions-at-gisec-2015", "title": "Dubai, UAE \u2013 April 20, 2015: ManageEngine, the real-time IT management company, today announced its participation at Gulf Information Security Expo & Conference (GISEC 2015), the region\u2019s leading ", "content": "Dubai, UAE \u2013 April 20, 2015: ManageEngine, the real-time IT management company, today announced its participation at Gulf Information Security Expo & Conference (GISEC 2015), the region\u2019s leading cyber security exhibition to be held between April 26 and 28 at the Dubai World Trade and Convention Centre. The company will showcase its entire range of IT security and compliance management solutions, demonstrate its latest security products, and profile success stories that address today's security concerns as well as ongoing operational challenges.\u201cWith the growing number of sophisticated cyber attacks and threats, the global security landscape has been changing significantly over the last few years. IT security has become a top priority for CIOs and safeguarding the business from evolving, sophisticated security threats has become the need of the hour for them. The situation is no different in the Middle East, where organizations are looking for ways to bolster internal controls, identify and remediate vulnerabilities, control changes, continuously monitor activities, reduce risks and mitigate known and unknown threats,\u201d said Nirmal Kumar Manoharan, Regional Director (Sales-Middle East) at ManageEngine.\u201cGISEC, being the Middle East\u2019s only large-scale information security event that brings together industry, government and thought leaders, is a perfect platform for ManageEngine to reach out to the region\u2019s CIOs, address their IT security concerns and help them mitigate those risks as effectively as possible. Apart from showcasing our best-in-class IT security & compliance management solutions, our technical experts will also hold product demos and share global and regional success stories with customers,\u201d Mr. Manoharan added. At the region\u2019s information security exhibition, ManageEngine will showcase its best-in-class IT security product portfolio, which includes Password Manager Pro, Eventlog Analyzer, Firewall Analyzer, Network Configuration Manager, and Desktop Central. These solutions help organizations strengthen internal controls, combat security threats, and enhance operational efficiency. For more information on ManageEngine\u2019s IT security and compliance management solutions, visit http:\/\/www.manageengine.com\/it-compliance-suite.htmlManageEngine\u2019s security experts will be available at Booth No: SR-B30 to meet with customers and partners.", "source": "www.briefingwire.com", "publishDate": "2015-04-20T16:37:20+02:00", "sourceType": "blog", "language": "en", "googleRank": 4, "relatedDocs": [ ] }, { "id": 186763660, "url": "http:\/\/sentirate.com\/?p=41710", "title": " \n\t\t\tApr 1521 \n\t\t\t \n\t\t\t \n\t\t\t \n\t\t\t\tRSA Booth #4400 North Hall\u00a0\u2013\u00a0Two new industry surveys commissioned by Fortinet\u00ae (NASDAQ: FTNT), a global leader in high-performance cyber security", "content": " \n\t\t\tApr 1521 \n\t\t\t \n\t\t\t \n\t\t\t \n\t\t\t\tRSA Booth #4400 North Hall\u00a0\u2013\u00a0Two new industry surveys commissioned by Fortinet\u00ae (NASDAQ: FTNT), a global leader in high-performance cyber security solutions, reveal the majority of consumers across the U.S. (71 percent) are more nervous about their personal information being stolen through a data breach than they were just a year ago, and only 28 percent of IT security professionals are confident they have done enough to prevent a security incident. Despite this shift in consumer sentiment, the research revealed consumers are not taking necessary precautions to protect their personal information. When asked what measures they are implementing to better safeguard their information online, the majority (76 percent) of respondents said they had merely implemented stronger passwords \u2014 a step that is typically required when setting up an online account. A significant 20 percent said they aren\u2019t doing anything at all. It is no question the cyber threat environment remains dynamic and dangerous, and is gaining in severity. According to a recent report released by the Identity Theft Resource Center (ITRC), companies in the U.S. experienced a record-breaking 783 data breaches in 2014.\u00a0Already in 2015 this trend has continued with the Anthem Health security breach \u2014 the largest in history, affecting more than 80 million of its customers, as well as Sony, TV Monde and others.\u00a0Many of these attacks were initiated by sophisticated hackers looking for ways to circumvent perimeter defenses through compromised devices, while others originated from within the network through unsuspecting employees or partners who, without malicious intent, let cyber criminals in. \u201cThe amount of entry points cyber criminals can use to infiltrate corporate networks and steal precious information is growing rapidly, as the number of devices connected to the network increase,\u201d said Andrew Del Matto, chief financial officer at Fortinet. \u201cIf consumers aren\u2019t taking precautions to protect their devices and proprietary data in their personal lives, it is unlikely they are doing so at work, increasing the possibility of a breach. It is more critical now than ever before for businesses to help safeguard the consumer and customer data for which they are responsible. They must take a multi-layered approach to security to protect against both malicious and non-malicious threats, from both inside and outside of the network.\u201d Most Consumers Trust No One When It Comes to Protecting Personal InformationOn a scale of one-to-five with one being \u201ccompletely \u2026.. \nRead the full article: http:\/\/money.cnn.com\/news\/newsfeeds\/articles\/marketwire\/11G038880-001.htm (only 1\/3 of the full article is shown) \u00a0 \n \nPlease note: SentiRate is not responsible for the accuracy, legality, decency of material or copyright compliance of any Linked Site or services or information provided via any Linked Site. The information on this page was provided via Google News (http:\/\/news.google.com\/). \n\t\t\t\tTags: A Little Positive, brands, news, sentiment \n\t\t\t\t \n\t\t\t\t\t \n\t\t\t\t\t\tThis entry was posted \n\t\t\t\t\t\ton April 21, 2015 at 2:21 am. You can follow any responses to this entry through the RSS 2.0 feed. \n \n\t\t\t\t\t\t\t\t\t\t\t\t\tBoth comments and pings are currently closed. \n \n\t\t\t\t\t\t \n\t\t\t\t\t \n\t\t\t\t \n \n\t\t\tPosted in A Little Positive Brands by AutoPublish Comments Off \n\t\t\t \n\t\t \n \n\t \n \n\t\t\t \n\t\tComments are closed. \n\t \n \n \n\t \n\t\t\t", "source": "sentirate.com", "publishDate": "2015-04-20T16:21:34+02:00", "sourceType": "blog", "language": "en", "googleRank": 3, "relatedDocs": [ ] }, { "id": 186759769, "url": "http:\/\/www.tradearabia.com\/news\/IT_280201.html", "title": "\n Dr Nasser ... bridging the digital divide. \n Broadband focus for ITU regional forum\n AMMAN, 1 hours, 44 minutes\n ago\n \n \n\tThe International Telecommunication Un", "content": "\n Dr Nasser ... bridging the digital divide. \n Broadband focus for ITU regional forum\n AMMAN, 1 hours, 44 minutes\n ago\n \n \n\tThe International Telecommunication Union recently organised its Arab Regional Development Forum in Amman, Jordan which discussed the role of broadband in spurring sustainable development.\n\t\n\tOrganised by the ITU Arab Regional Office, the forum discussed the five Arab Regional Initiatives approved by the World Telecommunication Development Conference held in Dubai, UAE in April 2014.\n\t\n\tThe five Initiatives focus on the areas of broadband, cyber security, ICTs (Information and Communication Technologies) for the environment, smart learning, and ICTs for persons with disabilities.\n\t\n\tThe high-level Forum provided participants \u2013 comprised of ITU member states from the Arab region \u2013 with an opportunity to exchange experiences and best practices in the implementation of these initiatives. It also discussed the activities of the ITU-D Study Groups and of the ITU Centers of Excellence.\n\t\n\tIn his speech, Brahima Sanou, director, ITU Telecommunication Development Bureau said: \u201cThe Dubai Action Plan sets out a road map for ITU-D\u2019s work and a shared vision to make a tangible difference to people\u2019s lives. Regional Initiatives guide BDT, Member States and Sector Members in implementing specific projects that focus on the priority needs of each region. I call upon all our members and partners to join forces with BDT to implement the Regional Initiatives.\u201d\n\t\n\tDr Ibrahim Nasser Harb, chairman of Samena Council\u2019s Regulatory Working Group and chief legal and regulatory officer at Orange Jordan, said: \u201cIn providing an interactive framework for regional stakeholders to outline a set of shared goals and work collectively towards their achievement, the Arab Regional Development Forum serves as a catalyst for not only the development of the Middle East\u2019s telecommunications sector but in bridging the digital divide existing in our societies.\u201d\n\t\n\t\u201cBroadband communications have a key role to play in building a safer and more connected world, and interactive forums such as these help set forth credible implementation plans that can allow countries in the Arab world to more fully realize the potential of ICT as an enabler of socio-economic growth and stability,\u201d he added.\n\t\n\tITU\u2019s Regional Development Forums provide an opportunity for high-level dialogue between the Telecommunication Development Bureau (BDT) and decision-makers of ITU member states and sector members. They serve as a platform for assessing strategic orientations that may have an impact on BDT's regional work plan in between world telecommunication development conferences. \u2013 TradeArabia News Service\n \n \n \n\n\n ", "source": "www.tradearabia.com", "publishDate": "2015-04-20T16:06:38.951+02:00", "sourceType": "web", "language": "en", "googleRank": 6, "relatedDocs": [ ] }, { "id": 186757831, "url": "http:\/\/www.newstatesman.com\/page\/supplements", "title": "\n \n \n \nSpring investment special\nEconomic Outlook | Pensions | Property | Stocks | The Brexit \nDownload the PDF. \n \n \n \n \n \n \n \n \n \n &", "content": "\n \n \n \nSpring investment special\nEconomic Outlook | Pensions | Property | Stocks | The Brexit \nDownload the PDF. \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tNew season: What does Labour have planned for agriculture?\n\n\tWith Maria Eagle, Lord Rooker and Mark Spencer.\n\n\tSupported by Crop Protection Association. \n\n\tDownload the PDF. \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tEngineering Our Future\n\n\tThe skills gap that urgently needs to be addressed if the UK is to succeed on the world stage\n\n\tSupported by IET.\n\n\tDownload the PDF. \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tFixing the cost\n\n\tMaking the UK attractive to manufacturers\n\n\tIn partnership with Vauxhall and General Motors. \n\n\tDownload the PDF. \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tCyber Security in Britain: what challenges lie ahead?\n\n\tIn partnership with Avatu.\n\n\tDownload the PDF. \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tMalaria: the last mile\n\n\tCan we sustain the political will to eliminate malaria in south-east Asia and beyond?\n\n\tSupported by Malaria Consortium\n\n\tDownload the PDF.\n \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tWill Labour Party policy leave us hungry for more?\n\n\tSupported by Crop Protection Association.\n\n\tDownload the PDF. \n \n \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tPolitical studies guide 2015\n\n\tWith Hilary Benn, Jenny Jones and Katie Ghose\n\n\tSupported by The University of Buckingham. \n\n\tDownload the PDF.\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tHow do we achieve whole person care?\n\n\tWith Sir John Oldham and Liz Kendall.\n\n\tSponsored by AbbVie\n\n\tDownload the PDF. \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tEnabling Integrated Patient-Centred Care\n\n\tIn partnership with Merck Serono | Merck | Celesio\n\n\tDownload the PDF.\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tIs food security in danger unless we change our attitudes to technology and innovation?\n\n\tSupported by Crop Protection Association.\n\n\tDownload the PDF. \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tWork 3.0 \n\n\tFlexibility, agility and the demise of the 9-to-5.\n\n\tSupported by EE.\n\n\tDownload the PDF.\n \n \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tInvestment Special\n\n\tRisks and opportunities in a shifting economy.\n\n\tPensions | Peer-to-peer | Interest rates | Social investment\n\n\tDownload the PDF here.\n \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tIsrael and Palestine: Is the two state solution dead?\n\n\t\u2019The end of the two-state paradigm?\u2019\n\n\tA New Statesman round-table discussion in partnership with Medical Aid for Palestinians with Jack Straw, Richard Burden, Phillip Lee, Andrew Phillips, Tony Laurance and many others\u2019.\n\n\tDownload the PDF here. \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tInspire | Empower | Educate\n\n\tHow can young women become global leaders?\n\n\tIn association with Asian University for Women. \n\n\tDownload the PDF here. \n \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tCapacity and Connectivity\n\n\tThe role of transport within the future of the UK's growth and development.\n\n\tDownload the PDF here. \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tTaking action on poverty\n\n\tDoes civil society hold the answer?\n\n\tIn association with Webb Memorial Trust. \n\n\tDownload the PDF here. \n \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tHuman Resources\n\n\tSkill building - Emotional intelligence - Effective leadership - Employment law\n\n\tDownload the PDF here. \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tGoing Global\n\n\tCan we use higher education to develop knowledge, skills and power?\n\n\tIn association with the British Council \n\n\tDownload the PDF here.\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tKEEP OUT\n\n\tReality, regulation and response: a practical guide to information privacy\n\n\tIn association with EY. \n\n\tDownload the PDF here. \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\t\u00a0\n\n\tTomorrow's World\n\n\tWhat will your workplace look like in the future?\n\n\tSupported by Johnson Controls.\n\n\tDownload the PDF here.\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tGibraltar: Stepping Stone to Europe\u00a0 \n\n\tGibraltar is tiny. It is far from the UK, almost in Africa, but by dint of history \u2013 initially in the Treaty of Utrecht but through many subsequent agreements, reluctant or otherwise\u2013 it has been British for 300 years. Strategically important during the Second World War, it has now become economically very important to a lot of companies.\n\n\tIt has become an epicentre of the electronic gambling industry, with almost 30 companies licensed to operate there. It is home to a large number of financial services and shipping companies. This has undoubtedly been influenced by its low tax regime; but don\u2019t fall for the hype \u2013 it is a rigorously enforced regime, compliant with more European directives than many of its neighbours.\n\n\tIts location means it is a natural gateway both to Europe and to Africa. These may be among the factors apparently insulating it from the world\u2019s economic downturn, through which it continued to grow albeit at a slower rate than before. It\u2019s growing its software industry and angling its tourism to ensure longer visits from people at different times of the year. It\u2019s tiny allright \u2013 but its prospects have never been so.\n\n\tDownload the PDF here. \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tBring Your Own Device \n\n\tHow mobile technology is revolutionising the workplace.\n\n\tHow are you reading this web page? Chances are you will be accessing it online, via either a tablet or smartphone, some 128 million and 1.4 billion of which are currently in use worldwide, respectively - figures that are set to rise dramatically as we head into 2014.\n\n\tOur love of technology is not only changing the way we access information, it is also having an impact on our working lives. As this supplement, supported by Sony VAIO, shows, the increasing use of portable devices is enabling more mobile working practices.\n\n\t1 November 2013\n\n\tDownload the PDF here. \n \n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\t\u00a0\n\n\n\t\tTo borrow the words of David Willetts, writing overleaf, data centres are \u201cthe physical, tangible manifestation of the somewhat invisible and ethereal concept which is the internet.\u201d\u00a0\n\n\t\t\u00a0\n\n\t\tThe Universities and Science Minister goes on to argue that data centres are \u201cabsolutely fundamental\u201d to a successful information economy in the UK while acknowledging that government needs to better understand the sector as a whole.\u00a0\n\n\t\t\u00a0\n\n\t\tThis, the second New Statesman data centre supplement, is a contribution to filling the knowledge gap, throwing a spotlight on an industry that has been largerly in the shadows as far as policy makers are concerned.\u00a0\n\n\t\t\u00a0\n\n\t\tAcross the following pages we return to some of the themes introduced last month including the myths and reality of power usage (page 8), cost of ownership (page 17) and a looming skills gap (page 18). On page 22, serial investor Julie Meyer makes the case for the UK\u2008technology industry while a visit to rural Bavaria (page 14) reflects some global truths and challenges for providers. \u00a0\n\n\t\t\u00a0\n\n\t\t14 October 2013\n\n\n\tDownload the PDF here\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tE-gaming is an important industry in Gibraltar and not just because a lot of people enjoy it worldwide. As part of the wider economy it employs 2,000 people. From a total population of 30,000 this is significant.\n\n\n\t\tThose employees mostly live on the Rock and they in turn fuel the other parts of the economy. They buy and rent homes, they shop, they use transport.\u00a0\n\n\t\t\u00a0\n\n\t\tIt\u2019s not just the people either - e-gaming has started pulling through other industries in its wake. One thing utterly crucial in a regulated environment like gambling is a completely robust technical infrastructure. Gibtelecom has built a powerful communications network partly because the gaming industry has demanded it - and it\u2019s now solid enough for financial services to reside on it.\u00a0\n\n\t\t\u00a0\n\n\t\tE-gaming used to happen only on desktop computers. In recent years there has been a proliferation of smartphones and tablets, resulting in a fledgeling software design industry around the e-gaming partners on the rock. The industry is actually a powerful catalyst for a great deal else - \u00a0this supplement explores how it works.\n\n\n\t07 October 2013\n\n \n \n \n \n \n \n \n \n \n \n \n\n\t\t\n\n\t\t\u00a0\n\n\t\t\u201cMy principal argument is that after sixty years [of inaction] we really need to get on with something.\u201d So said Graham Brady MP during a New Statesman-hosted round table debate on aviation capacity earlier this summer. Sir Roy McNulty, chairman of Gatwick Airport (our partner in putting together this supplement) agreed, describing the need as \u201cstaringly obvious\u201d while Adam Marshall of the British Chambers of \u00a0Commerce talked of \u201cmassive constraint\u201d.\n\n\t\t\u00a0\n\n\t\tGovernment figures suggest 35 million passengers will be left grounded every year from 2050 if the status quo remains.\n\n\t\tSo far, so consensual. But while the prognosis is broadly, if not universally, agreed, the nature of the cure divides opinion. The discussion to date has been underwritten by a series of assumptions about the future shape of air travel. Here conventional wisdom is being traded as fact and conclusions are being drawn that urgently need revisiting.\u00a0\n\n\t\t\u00a0\n\n\t\tAs the title of this supplement \u2013 \u201cRethinking the debate on aviation capacity\u201d \u2013 suggests, these pages are an attempt to challenge some of those assumptions. It is aimed at the expert and non-expert reader alike.\u00a0\n\n\n\t16 September 2013\n\n \n \n \n \n \n \n \n \n \n \n \n\n\t\t\n\n\n\t\t\tThe relationship between the trade unions and the Labour party has dominated the headlines over recent months: the Falkirk selection row, the use of party funding as a means to buy influence... These issues are nothing new \u2013 as our history essay on page 10 shows, since the beginnings of the\n\n\t\t\trelationship in the 1900s it\u2019s been a rocky road with frequent tiffs and accusations of bribery, misogyny and excessive influence.\n\n\t\t\t\u00a0\n\n\t\t\tWhile Ed Miliband and Len McCluskey have been fighting it out on the front pages, behind the scenes much hard work has been taking place to represent members\u2019 interests \u2013 whether it\u2019s fighting to save jobs and wages, supporting food banks or campaigning against draconian welfare reforms and cuts to much needed public services.\n\n\t\t\t\u00a0\n\n\t\t\tHowever, little media attention has been afforded to this aspect of what unions do, thus hindering public understanding of what they achieve. Consequently the unions suffer from what could be described as an image problem. We look at what could be done to address this on page 16.\n\n\t\t\t\u00a0\n\n\t\t\tAnd of course, we have our guide: detailed listings of Britain\u2019s unions, international counterparts and other useful contacts.\n\n\n\t\t9 September 2013\n\n\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\t\u00a0\n\n\n\t\tWe live in a digital world. Eighty three per cent of the UK population is online and the demand for virtual services is growing at an ever-quickening pace. So when the question \u201cWhere is our data?\u201d was posed at a New Statesman-hosted round table earlier in the summer, there was both a simple answer to the question and some complexities to untangle.\n\n\t\t\u00a0\n\n\t\tThe simple answer is that most of our data is housed in data centres. To proponents, including former cabinet minister Steven Norris (see interview on page 28), data centres are the factories of the digital age. This supplement acts in part as a beginner\u2019s guide: the schematic overleaf, explains how they work while the jargon buster on page 30 provides some essential definitions.\n\n\t\t\u00a0\n\n\t\tThe complexity surrounds security, privacy, energy supply, power consumption and a looming skills shortage \u2013 and these themes are addressed across the following pages. Despite the centrality of data centres to much of the nation\u2019s cultural, social and economic activity, awareness remains limited. Government remains confused, says Norris. This supplement is a contribution to the demystification process.\n\n\n\t2 September 2013\n\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\t\tTurn to page 5 of this guide and you will see an image of the infamous Edvard Munch painting, The Scream, being auctioned at Sotheby\u2019s in May 2012. One of four versions of the painting created by Munch, it is the only one that is privately owned. It sold for more than \u00a380m. Art as an investment is becoming increasingly popular. As too are investments in antiques, race horses, venture capital funds, real estate, jewellery, forests and other such alternative asset classes.\n\n\t\t\u00a0\n\n\t\tThe increasing interest is, in the main, the result of economic uncertainty and investors\u2019 desire to look beyond traditional vehicles. It could also be said that there is a growing appreciation of the value \u2013 and satisfaction \u2013 of turning passions into profit.\n\n\t\t\u00a0\n\n\t\tAlternative investment strategies can be risky. They often involve putting faith into fledging companies, the need for a horse to cross a finish line first or being left at the mercy of the weather as those investing in vineyards are. However, they can also offer the opportunity to diversify, generate returns and invest in items of personal interest. What better than buying a painting to enjoy while also benefiting (one hopes) from the increasing value?\n\n\n\t5 August 2013\n\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\t\tAlthough the health needs of the UK have changed dramatically since the inception of the NHS, our health-care system remains largely unchanged. This leaves us with a National Health Service that is designed to meet the needs of a society that no longer exists. There is wide agreement that the NHS needs to prioritise preventative care to take the strain off front-line services.\n\n\t\t\u00a0\n\n\t\tIn the 20th century, before the NHS, many urban local councils started off as \u201clocal boards of health\u201d, then becoming district councils, and local authorities. At each stage of reorganisation these bodies lost a little bit more of their role in health until today the care they mostly deliver is adult social care and children's services; any other health care is delivered by other bodies.\n\n\t\t\u00a0\n\n\t\tThe Health and Social Care Act has placed a large emphasis on local government driving improvements in public health with a renewed focus on prevention. With responsibility for public health having being transferred from the NHS to local government on 1 April this year, we can expect our health landscape to change quite dramatically. Local government seems to be rising to the challenge and coming up with some innovative solutions but it is difficult to see the scale of its aspiration to drive change and deliver innovative health services.\n\n\t\t\u00a0\n\n\t\tLabour is proposing a single holistic system, integrating physical, mental and social care. To deliver this, local government would hold an integrated budget for most health and social care services \u2013 likely to amount to about \u00a389bn. But are local governments really capable of commissioning and delivering these ambitious plans?\n\n\n\t22 July 2013\n\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\t\tEncouraging more small and medium-sized businesses (SMEs) to export is a practical rather than an abstract challenge for this country. It is a necessary outcome if the UK is going to build a new economic settlement where old assumptions about Western dominance are challenged by the reality presented by emerging economic powers from China to Brazil, from India to West Africa.\n\t\t\u00a0\n\n\t\tToday there are 4.8m SMEs in the UK yet 80 per cent currently do not trade overseas. In some cases there are specific reasons why exporting fails to make sense but for most a series of inhibitors are preventing these firms from benefiting from the advantages of exporting they understand only too well.\n\t\t\u00a0\n\n\t\tThis New Statesman supplement, in association with Barclays, explores these issues. At its heart is a round table discussion featuring the Business Secretary Vince Cable and a supporting cast of journalists, business leaders, economists and entrepreneurs. Elsewhere one of Cable\u2019s predecessors\n\n\t\tMichael Heseltine, an entrepreneur in his own right, offers his own prescription for growth (page 10). Chuka Umunna, Labour\u2019s shadow business secretary, reports back from a recent trip to West Africa and implores the UK to unlock the potential of diaspora communities back here (page 14).\n\n\t\tThe British \u201cbrand\u201d is strong, he writes. Now is the time to put it to work\n\n\n\t24 June 2013\n\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tRemember that amazing sunset you watched when on holiday last summer? How about the pride you felt when witnessing your son or daughter perform a recital in front of an admiring crowd for the first time. And have you ever considered how difficult it would be to cook, to work, to function independently without your sight?\n\t\u00a0\n\n\tBeing able to see is something that is far too often taken for granted, despite it being vital to our wellbeing and ability to live a fulfilled and rewarding life.\n\t\u00a0\n\n\tIn this supplement, New Statesman explores both the need for measures to ensure our nation\u2019s eye health remains a priority and the impact of policies and support mechanisms currently in place. We do so in partnership with UK Vision Strategy, a programme of activity developed in response to the World Health Assembly VISION 2020 resolution and which aims to improve support and services for blind and partially sighted people.\n\n\t10 June 2013\n\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\t\u00a0\n\n\tLack of safe water and sanitation, limited medical supplies, uncertain access to facilities and services. These are just a few of the health and social care challenges that Palestinians living in the occupied territories face every day \u2013 challenges that threaten their lives, liberty and security.\n\n\t\u00a0\n\n\tTo explore ways in which this crisis can be addressed, the New Statesman, with the support of the charity Medical Aid for Palestinians, held a round-table discussion with leading commentators. The conversation was informed, considered and animated as our participants debated the critical questions facing Palestinians.\n\t\u00a0\n\n\tFor instance, what are the main obstacles to health and medical care in Palestine and how can these best be tackled? Until a solution to these difficulties can be found, how can Palestine meet its health and medical needs? What steps can be taken to help unify the health-care system in Gaza and the West Bank? What impact does aid dependency have on Palestine\u2019s ability to become a sustainable state? What role can the international\n\n\tcommunity play to ensure that the region becomes sustainable? What impact has the UN bid had in situ? Have the Israeli elections, which took place in January, affected the situation on the ground?\n\n\t\u00a0\n\n\tThere were no easy answers. With the Palestinian health and social care system unequivocally linked to the political situation, it was felt that long-lasting improvements could be made only if Israel and Palestine can resolve their conflict. Whether this presents itself as a one- or a two-state solution was the focus of much of our guests\u2019 discussion, as was the role of the various actors on the world stage.\n\n\t03 June 2013\n\n\tDownload the PDF here\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tWe\u2019ve all seen the headlines that portray those on benefit as scroungers; we\u2019ve most likely all heard ministers question the fairness for hardworking people having to foot the bill for the unemployed who \u201csleep off a life on benefit\u201d; and most of us will know someone who believes that poverty is the fault of the individual \u2013 or who will argue that poverty doesn\u2019t even exist in this country.\n\n\tHow accurate are such perceptions? Are the views presented based on fact, or is it the case that evidence and statistics have been misused, misrepresented and manipulated to create propaganda for a war on welfare? And what effect do these attitudes have on those who are living below the poverty line?\n\n\t\u00a0\n\n\tResearch has shown that myths and misunderstandings fuel stereotypes that negatively impact those living in poverty in the UK. This supplement, produced in partnership with the Webb Memorial Trust, aims to bust those myths \u2013 once and for all.\n\n\t25 March 2013\n\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tWe all know how frustrating it is when our email goes down, when we can\u2019t get a phone signal, when a website won\u2019t act in the way we want it to. But imagine how much worse it would be if those IT difficulties meant power outages, failures in the food supply chain, the cancellation of life-saving operations\u2026\n\n\n\n\t\t\tAs our writers highlight, modern life is dependent on highly complex infrastructures \u2013 infrastructures that can only function effectively thanks to that global network of interdependent IT systems and telecomms networks otherwise known as cyberspace.\n\n\t\t\t\u00a0\n\n\t\t\tAs our reliance on cyberspace has grown so too have the number of people wanting to exploit this dependency. Cyber crime is now considered one of the top four threats to national security; it costs our economy billions of pounds a year; and has a hugely damaging effect on consumer and business confidence.\n\n\t\t\t\u00a0\n\n\t\t\tThis is not something that can be tackled by individual organisations, nor by one country alone. This is a major challenge that requires cross-border collaboration between industry, governments and academia \u2013 a global partnership for a global challenge.\n\n\n\t\t25 February 2013\n\n\t\tDownload the PDF here\n\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tLike other developed countries, the UK is facing rising demand and costs in health services. More people live longer, but more people are living with long-term conditions that affect their health (estimates say more than 15 million). The government's Health and Social Care Bill requires the NHS to make efficiency savings of 4 per cent per year \u2013 the equivalent of \u00a320bn of savings by 2015.\n\n\t\u00a0\n\n\tWith such a significant reduction in NHS funding, how can we maintain the current level of services?\n\n\t\u00a0\n\n\tA report by Sir Derek Wanless indicates that the two key variables which could affect the levels of funding required are the extent to which the NHS is able to achieve greater levels of productivity, and how far the general public becomes engaged with its own health, contributing to preventing disease rather than just treating it. Participants at our round table event explored how the NHS can maintain the standards of care it aspires to, while\n\n\tresponding to the efficiency savings which have been imposed.\n\n\t14 January 2013\n\n\tDownload the PDF here\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tIt is two years since changes to university tuition fees prompted thousands of students to take to the streets in protest. While the noise has quietened down, the impact of the hike in fees is still being felt \u2013 not least in that it has contributed to the increasing politicisation of a generation of teenagers, according to the Political Studies Association (p10). It believes this is one of the influences driving year-on-year increases in the number\n\tof applications to study politics.\n\tBut as the other articles within this guide show, it is not simply interest in politics that is encouraging people to enrol on these courses. A degree in politics will stand graduates in good stead for rewarding and challenging careers in a variety of sectors and industries, not just within Westminster \u2013 as our contributors demonstrate (p4-9).\n\tFinally, for those readers who have been suitably inspired to apply to university, either after their A-levels or as a mature student, our listings guide will help individuals find the right course for them.\n\n\t17 December 2012\n\n\tDownload the PDF here\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tThe success or failure of vaccination programmes is about much more than simply science. Even when science can provide an effective vaccine with almost no side effects, to achieve \u201cherd\u201d or community immunity requires high vaccination rates. Only when enough people are vaccinated can we prevent a disease from taking hold in a community and provide immunity for those who are most vulnerable or who are not able to be vaccinated.\n\tThe UK is considered to be one of the leading countries in the world for vaccine policy and implementation and this supplement looks at the main issues that could risk destabilising the progress and development. On page 4, Shazia Sheikh looks at the varying success rates for the different approaches around Europe to meningitis C immunisation and identifies what the UK is doing right. On page 6, our round table participants consider the challenges ahead, in the context of the Health and Social Care Act; looking at issues around education and the way information is given to the public, and the perception of vaccine side effects, which is borne out of peoples\u2019 trust and confidence in healthcare professionals. The discussion also\n\tlooks at the importance of partnerships between biotechnology companies, academia, pharmaceutical companies, governments and charities to stay ahead of the curve in vaccine policy.\n\tOn page 12, Liam Donaldson looks at the role of the UK in global public health. Child health specialists Dr David Elliman and Dr Helen Bedford look at public confidence in vaccines on page 13. Finally, on page 14, Linda Glennie warns us not to become too complacent or take the success achieved by\n\tvaccines for granted.\n\n\t10 December 2012\n\n\tDownload the PDF here\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tStarting and growing a business can be fraught with difficulties, not least when trying to generate the funds needed to keep it afloat. Equally challenging, for policymakers and financial institutions at least, is how to develop the policies, products and services that will support the UK\u2019s entrepreneurs.\n\n\tFor some, the answer lies in equity finance. However, the combination of high levels of risk, information irregularities, steep due diligence and high compliance costs can make it difficult for smaller companies to access this type of funding. Others believe innovative funding mechanisms, such as peer-to-peer finance and crowd-funding, hold thekey. Relatively new to the market, these rely on the generosity of individuals or the collective cooperation of a group of people to get a project or company off the ground. Meanwhile, venture capital, angel investors and supply chain finance also have their own individual roles to play.\n\tTo assess how to address the challenge of access to finance, New Statesman, in partnership with ACCA, hosted a series of party conference fringe events. However, as the discussions were to illustrate, there is no one-size-fits-all solution.\n\n\t3 December 2012\n\n\tDownload the PDF here\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tJohn Maynard Keynes once said that the importance of money flows from it being a link between the present and the future. Nowhere is this observation more relevant than when thinking about pensions. And yet, despite the need to plan for their future financial security and wellbeing, British people are woefully unprepared. Gone are the days where saving is the norm. Today, around 11 million people are failing to save enough to achieve a pension income they are likely to want or expect in retirement.\n\n\tIn part, this shift in attitude has been the result of low unemployment, falling interest rates and the influx of cheap credit in the 1990s. But other\n\tfactors are also at play: higher education fees, a chaotic jobs market and the rising cost of housing have influenced perceptions of the affordability\n\tof saving, while the economic crisis, mis-selling of products and fixing of interest rates have impacted upon trust and confidence in private finance\n\tproducts.\n\n\tTo assess how to address the pensions challenge, New Statesman, in partnership with Aviva, hosted a series of party conference fringe events.\n\tHowever, as the panellists were to discover, there was no easy answer.\n\n\t26 November 2012\n\n\tDownload the PDF here\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tThe coalition government is committed to investing a significant amount of money in green technologies and jobs between now and 2015. However, it is important to realise that this alone cannot transform Britain into a low-carbon economy. Given that 95 per cent of companies in the UK are small enterprises, it is imperative to engage these organisations in the emerging green economy and foster entrepreneurialism. .\n\n\tTo address this issue, the New Statesman, in partnership with Shell and Demos, held a series of fringe events at the recent party conferences. The discussion, the highlights of which have been written up for the benefit of readers within these pages, focused on what the government can do to help and encourage small and medium-sized green enterprises and the extent to which big businesses have a responsibility to nurture them. There was agreement between many of our panellists that appropriate funding is key to success. Without it, there will be little chance for UK businesses to fine-tune their ideas or take an international leadership role.\n\n\tThis is an issue not only for the banks, which have proved risk averse when it comes to lending to green businesses, but also for government. The Green Investment Bank, for example, is a good idea in principle but fails to address the funding needs of the small businesses that will shape our future.\n\n\t07 November 2011\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tThe near collapse of the euro, massive public spending cuts, protests, strikes, the scandals involving the media. Studying politics now is probably more exciting than ever.\n\n\tAs the world changes at rapid pace, people need to be able to understand and analyse developments. Which politicians and policies have the most impact on our lives? What are the strengths and limitations of democracy? How are rules and regulations determined? Whether readers want a policy role within the civil service, to campaign for change through a position at an NGO or have aspirations to be prime minister, a political studies course can set them on the right path.\n\n\tThis guide aims to point students in the right direction. It starts by setting the scene in British politics today, followed by insights into the way the system works and what a career in politics might entail. Finally, we offer a comprehensive listings guide to help prospective students find the right course for them.\n\n\t21 November 2011\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tAfter much delay and anticipation, the government\u2019s Open Public Services white paper, published in July 2011, sets out how it intends to improve and modernise our public services. By \u201cputting choice and control in the hands of individuals and neighbourhoods\u201d, it believes it can make public services more responsive to people\u2019s needs. It is applying five key principles: increased choice; decentralising power to the \u201clowest appropriate level\u201d; diversity \u2013 public services should be open to a range of providers; fair access to services; accountability \u2013 our public services should be accountable to service users and taxpayers. .\n\n\tIt all sounds like something we might be able to sign up to. However, choice requires that people are informed in a way that they understand and can use to bring about positive benefits for themselves. Choice needs to be genuine rather than simply a variety of providers offering the same services. And if we are having diversity, will all choices be available to all people in all areas? Will people be able to buy in services from their neighbouring local authority if what they want isn\u2019t offered in their area?\n\n\tCharities will be given more opportunities to bid for government money. Trustees and charity managers will have to make some careful decisions. However, are charities ready to deliver the types of public services that government wants and the public needs? While many are already having success, others will not have the skills, experience or capital to do the job at the scale that is being asked of them.\n\n\t09 January 2012\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tModern society is facing a dilemma. Demand for energy is increasing but traditional generation resources are diminishing. A rising number of homes and businesses are producing their own solar and wind power, while decentralised energy storage technologies need to be integrated. And on top of all of this, greenhouse gas emissions need to be dramatically reduced over the next few decades.\n\n\tHow to address these challenges is something many energy, IT and government experts have been investing considerable time and, yes, energy in, and some of the new technologies and business models that are emerging as a result are discussed within these pages.\n\n\tHowever, a successful transformation of our energy sector is dependent on all parties working together: the private sector, government and significantly the public. It is the responsibility of us all to ensure a more sustainable future for people and planet.\n\n\t05 December 2011\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tThe Health and Social Care Bill 2011 will bring on something of a revolution in the NHS \u2013 the biggest change since it was established in 1948 \u2013 and these developments will all take place in a landscape of enormous financial challenge. The NHS needs to deliver unprecedented productivity gains over the next few years. Many of the changes, such as enhancing the role of local authorities in the health system, giving health-care providers greater autonomy, and radically reforming commissioning to further involve GPs, have the potential to improve care for patients and to enhance the performance of the NHS. .\n\n\tHowever, the Bill will also introduce a step change in implementing market-based principles in the health system, with the aim of improving diversity of supply, promoting competition, and increasing choice for patients. While the NHS needs to change, if the scale of change is too big, and the speed too fast, its performance during the transition could be affected unfavourably, disadvantaging patients instead of improving their care and their life chances.\n\n\tContributors to this supplement consider how increasing competition in the NHS will affect us. We look at the relationship between citizens and the state and whether the original NHS values can be refounded within this new, broader agenda. How much choice will we actially have and how much influence over our health care? What if, collectively, we make poor choices? Services that are competing against each other will also be required to work together and integrate. How will that work and who will advise us and regulate all of this?\n\n\t12 December 2011\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tAs the world heats up and the effects of climate change become increasingly clear, governments have been given little choice but to introduce policies to reduce carbon emissions. The clean energy sector is to play a key role in this, and as such there has been an increased interest in the companies and technologies that support this industry.\n\n\tProviding access to clean energy also stimulates economic development in less developed nations, offering those who choose to invest in this area with the potential to achieve more than just financial returns. Yet despite this enthusiasm, clean energy funds have not always performed well. Shaken by fluctuations in the stock market, impacted upon by developments in China and the natural gas industry, and affected by changes in government policy and regulation \u2013 sometimes investors may wonder if just the slightest knock will send this sector tumbling.\n\n\tDoes this mean things can only get better? This financial guide does not pretend to have all the answers. It simply aims to make some sense of clean energy investments for the benefit of our readers. As without a crystal ball, investors are, as always, at the mercy of the markets.\n\n\t31 October 2011\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tAs union members gather in central London for the 143rd annual Trades Union Congress on 12-14 September, there is much talk of strikes and resistance. The threat of industrial action remains the single biggest obstacle to the coalition\u2019s cuts. Despite a steep decline in membership over the past 30 years, unions continue to enjoy unrivalled legitimacy.\n\n\tIn the following pages, we examine whether the trade unions are up to the challenge of taking on the government, and hear from the general-secretaries of seven of the biggest unions.\n\n\tCan the leaders of Britain\u2019s 7m-strong union movement build a grass-roots coalition, a broad church, that reaches out beyond trade union and Labour Party members to charities, community groups and public-service users? If so, the coalition may be forced to execute the biggest U-turn of them all.\n\n\t12 September 2011\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tThe Education Bill currently making its way through parliament promises to create a system that delivers consistently better standards for all children, with a focus on accountability, discipline and the removal of bureaucracy. School inspectors will be instructed to concentrate on four areas: achievement, teaching, leadership and management, and behaviour and safety. In addition, the Secretary of State will be given powers to intervene in schools that are failing while \u201cliberating\u201d outstanding schools and colleges from routine inspection.\n\n\tNotwithstanding the merit or otherwise of the changes the legislation will bring, the implications for head teachers expected to implement it are significant. In such a complex and demanding world, it is not easy to make the best choices.\n\n\tAmong the questions raised are: at what level should education standards be set? What is the best way to reach them? What are the benefits and challenges of collaboration with other schools? What impact will the growing number of academies have on the state system, particularly in a world of increased parental choice? The NS and the National Association of Head Teachers brought together a panel of experts to provide some of the answers.\n\n\t05 September 2011\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tFinancial markets are full of fear and fluctuation at the moment. They have been shaken by successive events such as the Greek debt crisis, the US rating downgrade, civil unrest and uncertainty across North Africa and the Middle East, and escalating commodity prices.\n\n\tAll of these derive from beyond our shores and yet private investors in the UK have to decide how to protect their interests against this background. The challenge they face is to preserve their wealth while avoiding its erosion through adverse market movements, inflation, taxation and costs levied by financial services providers.\n\n\tIt is not easy to make the best choices on where to invest, yet to do nothing is to allow inflation to take its toll. This investment strategy supplement aims to offer readers ideas and principles that they can use to guide their thinking. There is no silver bullet, no one-shot solution that will overcome the forces at play. But at least some of the risks can be contained. And choices made now, while markets are in turmoil, may prove fruitful later when they are more stable.\n\n\t22 August 2011\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tThe 2050 goal of reducing the UK\u2019s carbon emissions by 80 per cent compared with 1990 levels is a high priority for the country. While some of us say we agree with these climate change goals, in reality, our behaviour is not compatible with them. For various reasons, we are resistant to nuclear power, to wind farms in our backyards, and to lifestyle changes.\n\n\tHowever, if we don\u2019t want to see our bills go up, the planet sustain further damage or energy supplies grow insecure, somehow we have to change. Current coalition policy is to let the market decide which pathway provides the best way forwards. But is it really the job of the market to keep the lights on in Britain? What would happen if it chose to sacrifice secure electricity supplies for lower costs? Government does not seem quite sure whether electricity is a commodity or a social service.\n\n\tThe market is in a state of flux; the way that it is financed needs to change. What if the result of this is that targets are not met and we end up with an inadvertent result? Will government hold its nerve or will it step in?\/p>\n\n\t04 July 2011\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tThe energy sector marketplace is an erratic and brutal one. Future energy prices are highly unpredictable, commodity shortages are likely, and no single technology can deliver all of our energy requirements. Our security, what we can afford and our commitment to reducing carbon emissions and tackling climate change require that we have a diverse mix of energy types. This means that those working in the energy marketplace have to make assumptions about future trends and outcomes.\n\n\tSome types of energy are perceived as \u201cgood\u201d (usually renewable energy, such as wind power, hydropower and solar power) and others as \u201cbad\u201d (usually coal, gas and nuclear energy). While there is no other option but to invest in renewable energy (and the sector is expanding), traditional sources of energy cannot be ignored.\n\n\tThe cost of fossil fuels is still comparatively low and the time when low-carbon options will reach parity is some way off. The question no one can answer is how can we offer the best option for the UK at the lowest price to the taxpayer, especially in such difficult economic times?\/p>\n\n\t07 March 2011\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tIt would be a shame to lose sight of what makes Britain\u2019s social life so open, creative and appealing. These days there is so much emphasis on the way that digital technologies have entered our lives it is easy to imagine people no longer interact in \u201creal life\u201d. But the fact is that we have a rich tradition of socialising which has long been the cradle of our music, our art, and our communities.\n\n\tSometimes we\u2019re in danger of focusing too much on the negative. And certainly there are negatives to worry about. Which is why it is so vital that regulators and politicians find a way to conserve our precious social heritage while keeping people safe and healthy. The UK\u2019s music industry has led the world for decades now, but without small venues in which newborn talent can begin to flourish, it may falter.\n\n\tOur society, with its mix of modernity and tradition, as well as its easy diversity, is much admired the world over; we need to better understand and treasure what makes it so rich, before it disappears altogether.\/p>\n\n\t21 February 2011\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tVaccination and immunisation programmes over the past 60 years have transformed public health \u2013 and not just in the developed world. Modern, advanced research and increased understanding of the sub-cellular processes means that we are already able to foresee a wave of new vaccines that will help prevent complex diseases such as cancers as well as communicable infections.\n\n\tHowever, with any health care issue, priorities, ethics and risks come to the fore. As science takes immunisation to a new level, will public caution and Treasury concerns combine to push new these developments aside?\n\n\tThis supplement aims to explore how immunisation fits with the priorities and architecture of the new NHS under the coalition government and how national public health issues, such as vaccination, will sit within an agenda that is based on choice and local devolution. Both challenges and the opportunities face health care professionals and those concerned about the future of public health and the role that vaccines could have in combating the perils of modern life.\n\n\t24 January 2011\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tAfter much delay and anticipation, the government\u2019s Open Public Services white paper, published in July 2011, sets out how it intends to improve and modernise our public services. By \u201cputting choice and control in the hands of individuals and neighbourhoods\u201d, it believes it can make public services more responsive to people\u2019s needs. It is applying five key principles: increased choice; decentralising power to the \u201clowest appropriate level\u201d; diversity \u2013 public services should be open to a range of providers; fair access to services; accountability \u2013 our public services should be accountable to service users and taxpayers. .\n\n\tIt all sounds like something we might be able to sign up to. However, choice requires that people are informed in a way that they understand and can use to bring about positive benefits for themselves. Choice needs to be genuine rather than simply a variety of providers offering the same services. And if we are having diversity, will all choices be available to all people in all areas? Will people be able to buy in services from their neighbouring local authority if what they want isn\u2019t offered in their area?\n\n\tCharities will be given more opportunities to bid for government money. Trustees and charity managers will have to make some careful decisions. However, are charities ready to deliver the types of public services that government wants and the public needs? While many are already having success, others will not have the skills, experience or capital to do the job at the scale that is being asked of them.\n\n\t09 January 2012\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tThe UK pharmaceutical industry is a major part of the life sciences sector. It employs over 72,000 people, invests considerably in research and development, and contributes \u00a37bn a year to the economy. It also has access to a strong academic base that offers extensive expertise in translational medicine and database studies, while the NHS offers data and research opportunities unmatched anywhere else in the world thanks to its national database of patient records.\n\n\tWith so many benefits and opportunities, it would appear that little can hinder the UK\u2019s position as a world leader in this field. However, globally the life sciences industry is changing. The financial crisis has hindered funding opportunities \u2013 just as it has in other sectors, and investments and workforces are being consolidated. At the same time, the market place is becoming increasingly competitive.\n\n\tWhat impact is this likely to have on the UK pharmaceutical and life sciences sectors? What is needed to ensure a position of leadership and that they remain attractive to investors, companies and academia? To address all these questions and more, New Statesman, in partnership with Pfizer, has brought some of the leading voices together.\n\n\t16 January 2012\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tThe government attempts to prevent anti-competitive practices \u2013 operations that are against the public interest. Competition policy is one of the pillars of the internal market and competition law and regulation should protect competition by controlling the operation of firms that may have monopoly power in their own industry, as this may lead to consumers being exploited. Markets work best when there is a healthy rivalry between companies and they compete to serve active and informed customers who want and are able to reward good performers and withhold reward from those who don\u2019t measure up. .\n\n\tLaw should make monopoly and oligopoly impossible, and should encourage new market entry, wider choice, lower prices and higher quality. Regulation is designed to deal with the problem of market failure \u2013 where markets fail to reach an optimal allocation of resources. However, as Phillip Blond points out, many interventions by regulators have had perverse consequences, including market concentration, with a shrinking number of competitors, further increasing the possibility of a monopolist or semi-monopolist control of the market. This means that the market becomes further and further removed from free and genuine competition.\n\n\tHow can we create the competition policy and regulation \u2013 with a proper accountability structure \u2013 that the UK needs for growth, innovation and the widening of ownership and prosperity? With UK communications regulation under the spotlight in 2012, there is a chance to review the entire media regulation framework.\n\n\t30 January 2012\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tOn the one hand, union leaders have not got an easy life at present. Laws aimed at making it more difficult for workers to strike, draconian austerity measures and stagnant membership levels all have the potential to knock the confidence of the movement, its leaders and their members.\n\tOn the other, it is these very difficulties that provide the trade unions with the chance to prove their mettle \u2013 as John Hannett, general secretary of USDAW points out in our Q&A on p13: \u201cPeople need a trade union now more than ever\u201d.\n\tWhat the future holds for the organised labour force is the focus of this year\u2019s guide. Within it we explore the challenges and opportunities facing trade unions, the role they have to play in rebuilding the economy and the lessons that can be learned from some seemingly unlikely places.\n\n\t10 September 2012\n\n\tDownload the PDF here\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tFor more than a century, politicians have grappled with the issue of House of Lords reform. Last month, a bill was presented to parliament that aims to resolve the issue once and for all.\n\n\tAt its heart is the requirement that 80 per cent of House of Lords members are to be elected by the British public for a non-renewable 15-year term. Gone will be the life peers, and in their place a system that enables members to resign, to be expelled and to be suspended. No longer will members be able to claim \u00a3300 a day simply for turning up; instead pay will be related to their level of input into parliamentary business.\n\n\tOpponents to the bill claim there is no public appetite for it; that it is a waste of parliamentary time; that an elected Lords would challenge the authority of the House of Commons. Yet these voices have failed to acknowledge one crucial factor \u2013 that an unelected second chamber has no place in a country that prides itself on its democratic principles.\n\n\t16 July 2012\n\n\tDownload the PDF here\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\tPlans to \u201crestore rigour in the key primary subjects\u201d were set out by Education Secretary Michael Gove recently in his new draft overhaul of the Primary National Curriculum.\n\n\tThe plans propose a back-to-basics curriculum, focusing on times-tables, spelling and grammar. Pupils will be expected to have learned their times-tables up to 12 by the age of nine, to multiply and divide fractions by the age of 11 and to start learning and reciting poetry from five years old. The coalition Government has made much of giving schools more autonomy in how and what they teach. Some have welcomed the renewed focus on the traditional \u201cthree Rs\u201d as good preparation for secondary school. However, some union leaders fear that this heavily prescribed curriculum will leave little room for teachers to adapt learning to their individual pupils\u2019 needs and to make lessons exciting for them.\n\n\tThis supplement looks at how far a very traditional approach can be reconciled with what we now know about the benefits of a creative education, which promotes the ability to question, make connections, innovate, problem-solve, communicate, collaborate and to reflect critically. Can we have both rigour and creativity? Can we avoid throwing the baby out with the bathwater?.\n\n\t2 July 2012\n\n\tDownload the PDF here\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tThe world has a serious problem on its hands \u2013 that of how to feed its rapidly growing population. As Save the Children point out in the article on page 15, there are plenty of children who are already suffering as a result of a lack of access to nutritional food stuffs.\n\n\tWhat is the solution? In this New Statesman supplement, supported by the Crop Protection Association, we explore the contribution science and engineering have made to food production and security, and the opportunities they present for the future.\n\n\tWe also discuss some of the policy changes that are needed to ensure no one goes hungry.\n\n\t18 June 2012\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tGiven that gambling is one of the earliest forms of entertainment in human history, it is safe to assume it is here to stay. Its roots can be traced to religious rituals in primitive pre-historic societies. From these rituals, gambling grew into a separate activity used to make decisions about who would get a bigger piece of prey or a woman. Eventually pure gambling for material gain evolved.\n\n\tThe Victorians found gambling deeply immoral and irreligious. In 1906 the Street Betting Act was passed,making street betting illegal. The only legal betting was that done at the race track. This suddenly put legal gambling as a leisure pursuit out of reach for a generation of working men who had neither the time nor the money to attend the races.\n\n\tAs the 20th century progressed, the government moulded legislation to limit and control gambling opportunitieswhile drawing revenue from them. Todaygambling is global, yet the tension between regulators and the owners of gambling businesses still exists. With jobs and businesses at stake, now more than ever before the industry is fighting for what it regards as a fair deal from government\n\n\t25 April 2012\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tDoctors have always tried to make as accurate a diagnosis as possible for every patient, taking into account their family history, their age and so on. In the past, when prescribing a drug or treatment, they have also taken into account any other illnesses the patient might have, and any likely side effects.\n\n\tBut, recently, this \u201cpersonalisation\u201d of medicine has changed gear. Advances in technology now mean that doctors are increasingly able to make a more complex and deeper diagnosis and prescribe different drugs, because they can get detailed information about each patient\u2019s individual genetic make up. They also have a better understanding of molecular factors of diseases.\n\n\tThe old ways of working need to change if we are to be able to share the benefits of these advances equally. New drugs are being carefully regulated but what about new methods of diagnosis? Should our existing drugs and diagnostics not be subjected to the same new rigour? These are just some of the questions that are considered by experts in the field who share their experiences in this supplement.\n\n\t26 March 2012\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tBack in the day, saving used to be common place with much of the population keeping behind a proportion of their wages for a rainy day. That was until the mid 1990s when a combination of low unemployment, falling interest rates and markets awash with credit provided more of an incentive to borrow than save. Building a nest egg, whether to pay for a deposit on a house or to see you through your retirement, suddenly wasn\u2019t as popular. .\n\n\tToday\u2019s government is keen to reverse that trend \u2013which is perhaps not surprising given we\u2019re a nation saddled with debt and a massive pension problem. It is keen to turn us back into a population of savers, for whom setting income aside is second nature.\n\n\tOne financial product that could help set us on our way is the Individual Savings Account \u2013 or ISA as they are more commonly known. Tax-efficient and with a range of options available to meet a variety of needs, ISAs have potential both as a temporary and long-term savings vehicle. But they also have their short comings. To help shed a little light on the issue, New Statesman, in partnership with Governor, have produced this handy guide.\n\n\t19 March 2012\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n\t\n\n\n\tIs the government committed to tackling poverty in the UK? It\u2019s an issue that has been the subject of much debate, with tough economic conditions, high unemployment and changes to the welfare state leaving many commentators fearing the worst for the poorer members of our society. .\n\n\tBut as this supplement highlights, the question should not be whether the government should tackle poverty, but how. Supported by the Webb Memorial Trust, New Statesman explores what has changed since 1909 when Beatrice and Sidney Webb conducted their seminal research into the causes of poverty and what, if anything, can we learn from the past? What role can the labour market play? And why are those most affected by poverty \u2013 children and young people \u2013 excluded from the debate?\n\n\t27 February 2012\n\n\t\u00a0\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n", "source": "www.newstatesman.com", "publishDate": "2015-04-20T16:00:03.455+02:00", "sourceType": "web", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186757750, "url": "http:\/\/www.noodls.com\/noodls.asp", "title": "\n\nBrown University\nStudents win Beinecke, Goldwater, and Udall scholarships\n-1m\n\n\nNational Assembly of the Republic of Armenia\nGalust Sahakyan Takes Part in the Opening of the Monument Dedicated to th", "content": "\n\nBrown University\nStudents win Beinecke, Goldwater, and Udall scholarships\n-1m\n\n\nNational Assembly of the Republic of Armenia\nGalust Sahakyan Takes Part in the Opening of the Monument Dedicated to the Armenian Genocide Centennial\n-1m\n\n\nUnion syndicale Solidaires\nRassemblement pour l'accueil des r\u00e9fugi\u00e9-es et des migrant-es, contre l'indiff\u00e9rence meurtri\u00e8re\n-1m\n\n\nRochdale AFC Ltd.\nGoldbond Results Week...\n-1m\n\n\nMinistry of Foreign Affairs of the Republic of Latvia\nEdgars Rinkevics: Georgia\u2019s progress should receive appropriate consideration at the Riga Summit\n-1m\n\n\nColombia National Army\nCOMUNICADO DE PRENSA\n-1m\n\n\nAston Villa plc\nVilla 2-1 Liverpool: Delph on cloud nine after semi-final win\n-1m\n\n\nBundesliga - DFL Deutsche Fu\u00dfball Liga GmbH\nJetzt richetet Werder den Blick auf die Europa League\n-1m\n\n\nMinistry of Agriculture and Rural Development of Romania\nCOMUNICAT DE PRESA\n-1m\n\n\nACU - Auto-Cycle Union\nCARLESS DOMINATES ROUND 2 TO LEAD PRO CHAMPIONSHIP\n-1m\n\n\nSJR in Scandinavia AB\nRedovisningsansvarig till ett teknikkonsultf\u00f6retag\n-1m\n\n\nKBM Banka AD Kragujevac\nOdr\u017eana XIII vanredna sednica Skup\u0161tine KBM banke\n-1m\n\n\nCPSA - Clay Pigeon Shooting Association\nESP Reg at E J Churchill's on 26th April \u2013 20th April, 2015\n-1m\n\n\nComune di Montauro\nItalicum:M5S,pronti lasciare Commissione\n-2m\n\n\nComune di Montauro\nCuba: municipali, anche Fidel ha votato\n-2m\n\n\nAzienda USL 2 Lucca\nNumero dedicato per le informazioni sulla meningite\n-2m\n\n\nExeter City AFC Ltd.\nGrecians hand over cheque to CLIC Sargent\n-2m\n\n\nFIV - Federazione Italiana Vela\nA Varazze condizioni ottimali chiudono la II Tappa del Trofeo Optimist Italia Kinder+Sport\n-2m\n\n\nBradford City FC Ltd.\nPARKINSON LOOKING FOR SAME AGAIN\n-2m\n\n\nFC Schalke 04 e.V.\nS04 erh\u00e4lt Lizenz ohne Auflagen und Bedingungen\n-2m\n\n\nMinistry of Personnel, Public Grievances and Pensions of the Republic of India\nCSS Officers demand parity with IAS and other services\n-2m\n\n\nPennsylvania Turnpike Commission\nDaytime Express E-ZPass Lane Closure Scheduled for April 21 at Gateway Toll Plaza\n-2m\n\n\nArma dei Carabinieri\nAnzio (RM) - Spara al presunto rivale in amore: arrestato un 27enne\n-2m\n\n\nConfesercenti - Confederazione italiana esercenti attivit\u00e0 commerciali turistiche e dei servizi\nUe: ok al tetto per i costi delle carte di credito\n-2m\n\n\nConfesercenti - Confederazione italiana esercenti attivit\u00e0 commerciali turistiche e dei servizi\nInps, Boeri: \u201cProposta per reddito minimo over 55\u201d\n-2m\n\n\nJoseph B. Scarnati III\nScarnati Announces Short Period to Submit New State Economic Development Grant Business Plans\n-2m\n\n\nZavarovalnica Triglav dd\nVarno v \u0161esto sezono akcije Ocistimo na\u0161e gore\n-2m\n\n\nThe Office of the Governor of the State of Florida\nAdministrative Schedule for April 20, 2015\n-2m\n\n\nINAF - Istituto Nazionale di Astrofisica\nMeno luci e pi\u00f9 consapevolezza per l\u2019IYL 2015\n-2m\n\n\nINAF - Istituto Nazionale di Astrofisica\nCerere, macchie bianche di nuovo in vista\n-2m\n\n\nFPS Employment, Labour and Social Dialogue of the Kingdom of Belgium\n20-04-2015 - Tentoonstelling van tekeningen van Pascal Dubar in de FOD Werkgelegenheid\n-2m\n\n\nCity of Prague\nInformacne - vzdel\u00e1vac\u00ed akce Hl. m. Prahy pro verejnost v r\u00e1mci oslav Dne Zeme 2015\n-3m\n\n\nCity of Prague\nProhl\u00e1\u0161en\u00ed n\u00e1mestka Mateje Stropnick\u00e9ho k z\u00e1boru n\u00e1plavky na Ra\u0161\u00ednove n\u00e1bre\u017e\u00ed kvuli akci Lode na vode\n-3m\n\n\nGroupe Quadran SAS\nMPEI et QUADRAN s'associent pour construire et exploiter une centrale photovolta\u00efque au sol sur la commune de Boussens\n-3m\n\n\nStadt Aachen\nSprechstunde von Bezirksb\u00fcrgermeisterin Marianne Conradt\n-3m\n\n\nStadt Aachen\nEuropa von unten - Wie jung ist Europa?\n-3m\n\n\nSFZ - Slovak Football Association\nV\u00fdsledky najvy\u0161\u0161\u00edch s\u00fata\u017e\u00ed \u017eien za t\u00fd\u017eden 13.4-19.4.2015\n-3m\n\n\nEurope \u00c9cologie - Les Verts\nNouveaux naufrages meurtriers en M\u00e9diterran\u00e9e : l\u2019inaction est un crime contre notre humanit\u00e9\n-3m\n\n\nEXOR S.p.A.\nPubblicazione Relazione Finanziaria Annuale al 31 Dicembre 2014 20 aprile 2015\n-3m\n\n\nEXOR S.p.A.\n2014 Annual Report Filed April 20, 2015\n-3m\n\n\nS\u00e9curinfor SA\nSECURINFOR recrute au job meeting du Parc Icade \u00e0 Rungis le 23 avril prochain !\n-3m\n\n\nEcclesiastical Insurance Office plc\nEcclesiastical extends Property Investors and Heritage Residential trading to regional offices\n-4m\n\n\nRite Aid Corporation\nSteve Rempel Named Rite Aid Senior Vice President and Chief Information Officer\n-4m\n\n\nThomas Cook AG\nFernreise-Schn\u00e4ppchen zum Vorbr\u00e4unen f\u00fcr den Baggersee\n-4m\n\n\ncompTIA - Computing Technology Industry Association\nCyber Security Industry Leaders Collaborate to Bring Cyber Security into America\u2019s Classrooms\n-4m\n\n\nOffice of the President of the Republic of Slovenia\nPredsednik republike podelil nagrado in priznanja za izjemne dose\u017eke Republike Slovenije na podrocju prostovoljstva\n-4m\n\n\nOffice of the President of the Republic of Slovenia\nPredsednik republike Borut Pahor z dijaki proti nasilju\n-4m\n\n\nMakedonski Telekom AD\nMbledhje t\u00eb jasht\u00ebzakonshme t\u00eb K\u00ebshillave t\u00eb drejtor\u00ebve t\u00eb Makedonski Telekom SHA \u2013 Shkup dhe t\u00eb T- Mobile Maqedoni\n-4m\n\n\nThe E.W. Scripps Company\nScripps Washington Bureau Wins Peabody Award for Military Sex Offender Series\n-4m\n\n\nMinistry of Agriculture and the Environment of the Republic of Slovenia\nSvet EU o pomenu gozdov, obveznega oznacevanja dr\u017eave izvora ali kraja porekla na \u017eivilih in bli\u017eajoci razstavi EXPO 2015\n-4m\n\n\n", "source": "www.noodls.com", "publishDate": "2015-04-20T15:59:55.681+02:00", "sourceType": "web", "language": "en", "googleRank": 5, "relatedDocs": [ ] }, { "id": 186756330, "url": "http:\/\/au.finance.yahoo.com\/news\/early-movers-ms-hal-sti-114646832.html", "title": "Check out which companies are making headlines before the bell: Morgan Stanley (NYSE: MS)-The firm earned an adjusted 85 cents per share, beating estimates of 78 cents, with revenue also above fo", "content": "Check out which companies are making headlines before the bell: Morgan Stanley (NYSE: MS)-The firm earned an adjusted 85 cents per share, beating estimates of 78 cents, with revenue also above forecasts. Morgan Stanley's results were helped in part by better-than-expected performance in investment management and fixed income. Hasbro (NASDAQ: HAS)-Hasbro reported quarterly profit of 21 cents per share, swamping estimates of 8 cents, with revenue also beating forecasts by a wide margin despite the negative impact of the strong dollar. Hasbro saw particularly strong performance in its Transformers and pre-school units. Halliburton (NYSE: HAL)-The oilfield services company beat estimates by 12 cents with adjusted quarterly profit of 49 cents per share, with revenue scoring a slight beat as well. But Halliburton does say it expects the oil sector to remain \"challenged.\" SunTrust (NYSE: STI)-The bank earned 78 cents per share for its latest quarter, 6 cents above estimates, with revenue essentially in line. SunTrust was helped by lower expenses, and growth in noninterest income. Nokia (Helsinki Stock Exchange: NOK-FI)-Nokia is planning to return to the consumer mobile handset market, according to Re\/code. Raytheon (NYSE: RTN)-The defense contractor announced a deal to buy control of cyber security firm Websense from private equity firm Vista Equity Partners for nearly $1.6 billion. Callaway Golf (NYSE: ELY)-Jefferies began coverage on the golf club maker with a \"buy\" rating, saying market dynamics are likely to give Callaway a \"powerful and sustainable\" comeback. Symantec (NASDAQ: SYMC)-Jefferies upgraded the cyber security software maker's stock to \"hold\" from \"underperform,\" following the company's Financial Analyst Day event. It cited a lack of negative catalysts, and potential benefit in a variety of breakup scenarios. Splunk (NASDAQ: SPLK)-Citi began coverage of the cyber security firm's stock with a rating of \"buy\/high risk.\" Citi said Splunk may benefit from a rapidly expanding market, but pointed out that the stock has been volatile as Splunk changed its pricing structure multiple times. Michael Kors (NYSE: KORS)-Mizuho downgraded the luxury goods maker to \"neutral\" from \"buy,\" following the results of a proprietary survey that the firm said does not necessarily bode well for future sales. Comcast (NASDAQ: CMCSA), Time Warner Cable (NYSE: TWC)-Sources tell CNBC that the two companies will meet with Justice Department officials this week to negotiate possible concessions to get their planned merger deal approved. Procter & Gamble (NYSE: PG)-The multinational consumer goods company increased its dividend by 3 percent to just over 66 cents per share, payable to shareholders of record as of the close of business on April 27. Costco (NASDAQ: COST)-The wholesale retailer increased its quarterly dividend to 40 cents per share from 35\u00bd cents, and also announced a new stock repurchase program of up to $4 billion. The new program replaces an existing $4 billion authorization which still has about $2.5 billion unused. Prologis (NYSE: PLD)-The owner of warehouses and retail distribution centers will buy the real estate assets of KTR Capital Partners for $5.9 billion. Sony (Tokyo Stock Exchange: 6758.T-JP)-The company introduced its new Xperia mobile phone, even as Sony mulls an exit from its mobile handset business. Patterson Cos. (NASDAQ: PDCO)-Patterson is seeking a sale of its rehabilitation supply business for up to $600 million, according to Reuters. Questions? Comments? Email us at [email protected] From CNBC \n", "source": "au.finance.yahoo.com", "publishDate": "2015-04-20T15:56:24.223+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186755351, "url": "http:\/\/www.itnews.com.au\/News\/402906,australias-infosec-industry-wants-mandatory-baseline-security-controls.aspx", "title": " \n \n \n \n \n \n \n \n Fines and penalties for non-compliance. \n ", "content": " \n \n \n \n \n \n \n \n Fines and penalties for non-compliance. \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \nAustralia\u2019s information security industry wants to see the Government introduce a mandatory baseline for basic IT security and associated penalties for non-compliance as part of the country\u2019s revised national cyber security strategy.\nInfosec industry representative body AISA recently followed the Communications Alliance [pdf] to release the second public submission [pdf] to the Government\u2019s review of the ageing national cyber security strategy.\nAISA said the setting of a mandatory security baseline and support for small-to-medium enterprise in implementing basic security were two of the most important missing pieces of cyber security in Australia.\nIt said its 3000 members named poor information sharing, lack of investment in security and failure at the executive level to appreciate security risks as the top challenges for Australian organisations in information security.\nAISA members listed a need for greater understanding at board level of cybersecurity risks \u201ccoupled with some sort of regulatory push by way of a mandated security baseline or greater penalties for data security failures to encourage the adoption of improved security controls\".\n\u201cThere is also wide support for increased enforcement and penalties for non-compliance with agreed baselines where private information is concerned or where such enforcement would be regarded as for the public good,\u201d AISA wrote in its submission.\n\u201cAISA members support government funding of some sort [of] verification or low-level audit activity for essential systems or for service providers hosting personal information and in other cases where assurance is required.\u201d\nTaking on a bigger role\nAISA also put forward its argument for having a bigger role in the development of infosec skills in the country.\nThe organisation proposed to develop a professional certification program similar in nature to that run by the UK Institute of Information Security Professionals (IISP), tailored to Australia.\nThe program would recognise existing certifications - such as CISSP, GIAC, and IRAP - but would be specific to the Australian environment and its skills requirements, AISA said.\n\u201cThe program will include skills confirmation and continuing professional development requirements, which will be managed by AISA,\u201d the organisation wrote.\n\u201cTo support this scheme, AISA proposes to provide ongoing education and professional development opportunities to its members in cooperation with organisations such as AusCERT.\n\"AISA will also engage with both the public and private sectors to encourage and explain the long term benefits of supporting this program.\u201d\nSecurity skills shortage\nAISA echoed concerns raised by the Comms Alliance around a skills gap in the local infosec industry and the increasing amount of skilled infosec specialists leaving Australia.\nThe Comms Alliance highlighted a lack of skills in areas including forensics, pen testing, incident management and risk assessment, and urged the Government to include a targeted program to retain and develop such expertise within its revised cyber security strategy.\nAISA similarly listed pen testing, forensics, security architects and application security testers among the skills currently in short supply across Australia.\nIt said this shortage could be addressed by reviewing tertiary education and vocational training offerings as well as sponsoring employment of graduates leaving university with such skills.\nGreater investment in research and development of products and services in Australia - rather than relying on overseas companies - would encourage the retention and growth of in-demand skills locally.\n\u201cProfessional networks are imperative. The industry, and our adversaries, all move too fast for us to try to capture all approaches to each risk and\/or threat in a core body of knowledge which is formally taught in detail over a set period of time,\u201d AISA wrote.\n\u201cUltimately, what will be most important is a strong grounding in a particular discipline (e.g. like computer science, or engineering), training in high level frameworks and principles, communications skills, and an individual\u2019s professional network.\u201d\nThe Department of Prime Minister and Cabinet - the agency leading the review - said it had so far consulted with over 140 organisations globally. It expects to complete and release the revised review midway through this year.\n\u00a0Copyright \u00a9 iTnews.com.au . All rights reserved. \n \n \n \n \n \n \n \n \n \n \n \n \n ", "source": "www.itnews.com.au", "publishDate": "2015-04-20T15:54:08.892+02:00", "sourceType": "web", "language": "en", "googleRank": 6, "relatedDocs": [ ] }, { "id": 186755344, "url": "http:\/\/www.chinadaily.com.cn\/world\/2015-04\/20\/content_20486147.htm", "title": "BEIJING - China on Monday expressed \"serious concerns\" about a report that New Zealand and United States spy agencies planned to hack into a data link between the Chinese Consulate and its visa office", "content": "BEIJING - China on Monday expressed \"serious concerns\" about a report that New Zealand and United States spy agencies planned to hack into a data link between the Chinese Consulate and its visa office in Auckland.\n\nAt a daily news briefing, Chinese Foreign Ministry spokesperson Hong Lei urged relevant countries to immediately stop harming China's interests online.\n\nThe plan was revealed in documents from US National Security Agency (NSA) whistleblower Edward Snowden and reported on by \"Herald on Sunday,\" a New Zealand newspaper.\n\nAccording to the report, the plan by New Zealand's Government Communications Security Bureau (GCSB) and the NSA appeared to be aimed at tapping data flowing between the Chinese Consulate and its visa office in Auckland.\n\nThe Chinese Embassy in New Zealand issued a statement on Sunday, saying that China is concerned about the report and attaches great importance to cyber security. \n", "source": "www.chinadaily.com.cn", "publishDate": "2015-04-20T15:54:07.980+02:00", "sourceType": "web", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186754588, "url": "http:\/\/www.fromthetrenchesworldreport.com\/us-computer-expert-grounded-after-playful-plane-security-tweets\/130014", "title": " \n RT\nWhen a computer security expert from Denver tweeted some amusing remarks about hacking the onboard systems of his United Airlines flight, he di", "content": " \n RT\nWhen a computer security expert from Denver tweeted some amusing remarks about hacking the onboard systems of his United Airlines flight, he didn\u2019t know FBI agents would be waiting at his destination. Later, he was refused boarding to another flight.\nWatch out what you tweet \u2013 or face the consequences! Chris Roberts, of One World Labs in Denver, has learnt that sharing knowledge in Twitter about how transport security systems operate is a bad idea. \u00a0\nOn Wednesday, when Roberts flew from Denver to Syracuse, N.Y., after boarding, he posted a tweet about what he would do if he managed to hack the aircraft\u2019s computers.\nFind myself on a 737\/800, lets see Box-IFE-ICE-SATCOM, ? Shall we start playing with EICAS messages? \"PASS OXYGEN ON\" Anyone ? \n\u2014 Chris Roberts (@Sidragon1) April 15, 2015\n\nEICAS stands for \u201cengine-indicating and crew-alerting system\u201d, so Roberts actually pondered playing with the aircraft\u2019s onboard communication system.\nIt was enough to get him acquainted with FBI agents, who were waiting for him in Syracuse. They questioned him for four hours.\nRoberts was released after interrogation, but practically all his personal electronic equipment, including a MacBook Pro, an iPad, several hard drives and USB memory sticks, were confiscated. Roberts proved this by posting an FBI \u201creceipt for Property Received.\u201d The only electronic item Roberts was allowed to keep was his iPhone, Forbes.com reported.\nA member of the security research community himself, Roberts expressed surprise with the pace of developments, though he should have known better that everything posted online is constantly monitored by numerous US security agencies.\nLesson from this evening, don't mention planes\u2026.the Feds ARE listening, nice crew in Syracuse, left there naked of electronics\n\u2014 Chris Roberts (@Sidragon1) April 16, 2015\n\nAfter returning to Denver for a couple of days, Roberts headed for San Francisco on Saturday to take part in the RSA Conference 2015 cyber security summit.\nIn the airport, reportedly already after passing the gate, he was told by United Airlines staff he wouldn\u2019t be allowed on board.\nSince Roberts had made public statements about airfare equipment and aircraft systems manipulation,\u201cThat\u2019s something we just can\u2019t have,\u201d said United Airlines spokesman Rahsaan Johnson, explaining this is not only a \u201cviolation of United\u2019s policies\u201d but \u201cit\u2019s not something we want our inflight crews and customers to deal with,\u201d Johnson said.\n\nScreenshot from twitter.com\/Sidragon1\n\nJohnson also said Roberts was notified about the company\u2019s decision not to provide him with their service several hours before the incident.\n\u201cWe reached out to him several hours before departure and had a conversation with him,\u201d Johnson said.\nBut Mr Roberts nevertheless opted to take a chance and attempted to fly.\n\u201cRoberts was told to expect a letter explaining the reasons for not being allowed to travel on United,\u201dRoberts\u2019 lawyers, from the Electronic Frontier Foundation (EFF) cyber rights group in San Francisco, said on Saturday.\nChris Roberts, who among other things researches vulnerabilities of transportation systems, managed to get to San Francisco the same day using another airline\u2019s flight.\nSpecial speaker, Chris Roberts of @OneWorldLabs presenting at our @iSecure_LLC Cyber Security Summit today! #InfoSec pic.twitter.com\/73Wb11hfJG\n\u2014 Donna Anna Smith (@DonnaAnnaSmith) April 16, 2015\n\nUnited\u2019s refusal to allow Roberts aboard its flight \u201cis both disappointing and confusing. As a member of the security research community, his job is to identify vulnerabilities in networks so they can be fixed,\u201d EFF\u2019s Andrew Crocker commented on the Electronic Frontier Foundation\u2019s website on Saturday.\nhttp:\/\/rt.com\/usa\/251101-computer-expert-banned-tweets\/\n \n \n \n ", "source": "fromthetrenchesworldreport.com", "publishDate": "2015-04-20T15:13:22+02:00", "sourceType": "blog", "language": "en", "googleRank": 4, "relatedDocs": [ ] }, { "id": 186815201, "url": "http:\/\/www.deccanherald.com\/content\/472804\/ust-global-targets-3-bn.html", "title": "UST Global targets $3 bn topline in 2 yrs", "content": "UST Global, the Aliso Viejo, California-based $1.1-billion information technology (IT) services company, is targeting to hire 30,000 people in the next three years to take its headcount up from the current 15,000, its CEO Sajan Pillai said. Ten thousand of these hires would be from Israel in the cyber security domain, for which it would be tapping the Israeli government, Pillai said. Another 10,000 hires are going to be in Mexico, and the last 10,000 would be made from among the ranks of India's differently abled, he said.UST Global, which is targeting a topline of $3 billion in the next two years, claims to be the fastest organically growing company in Indian IT. Pillai said a new campus with a built-up area of three million square feet is coming up in Thiruvananthapuram at a cost of $200 million. Apart from Thiruvananthapuram, the company is present in six Indian cities, he said.Pillai said the company's early bets on retail and healthcare has paid off with most of the growth in IT in the past three years coming from these verticals. In his view, this will remain so for the next five to ten years. Pillai said the company has identified that the six basic services of design, cyber security (in partnership with Israeli spy agency Mossad), analytics, cloud, mobility, and social are going to decide the intersection of technology and business, and would be focusing on them.UST Global Chief Administrative Officer Alexander Varghese announced the signing of a seven-year, $38-million engagement with the Madhya Pradesh government on digitisation and automation of urban local bodies. The programme, which is an end-to-end eGovernance engagement, will touch 377 local bodies, he said.Pillai further said the company has launched a venture capital (VC) fund based in Bengaluru, for which the initial investments will be the tune of $20 million. He said the VC fund will tap into the learnings from the company's similar initiatives in Palo Alto and Israel. Among the interesting work done by the company, it is rolling out a software product to apply analytics to cricket, for which the tie-up with Chennai Super Kings &mdash; with UST Global as the principal sponsor &mdash; will come in handy, he said. It's also building a commerce engine for a leading telecom company which will allow one to have the exact same branding imprint in all the nine major social media.", "source": "www.deccanherald.com", "publishDate": "2015-04-20T15:07:46+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186770749, "url": "http:\/\/feeds.businesswire.com\/click.phdo?i=ad7e8968f93c66ec77ebed521ddf1236", "title": "\n\t\t\t\tBURLINGTON, Vt.--(BUSINESS WIRE)--Champlain College today announced that it has formed an alliance with \n the U.S. Office of Personnel Management (OPM) to bring its online \n programs to", "content": "\n\t\t\t\tBURLINGTON, Vt.--(BUSINESS WIRE)--Champlain College today announced that it has formed an alliance with \n the U.S. Office of Personnel Management (OPM) to bring its online \n programs to the Federal government\u2019s more than two million employees. \n Through truED\u00ae, Federal employees, their spouses and legal adult \n dependents will pay up to 70 percent less than standard tuition rates \n for the College\u2019s online programs and can make monthly tuition payments \n under Champlain College\u2019s unique payment model.\n \n\n\n \n Under the alliance, Federal employees and their families worldwide will \n be able to affordably pursue more than 60 certificate, bachelor\u2019s and \n master\u2019s degree programs in high-growth, in-demand and mission-critical \n fields. This is Champlain College\u2019s 57th truED alliance in \n both public and private sectors. Organizations including Cisco, Seventh \n Generation, and AT&T already look to Champlain College to provide \n employees with career-relevant educational programming.\n \n \n \u201cChamplain College takes a distinct approach to adult online education, \n forming alliances with enterprises to break down the wall between \n academia and industry, and providing students with critical knowledge \n and skills that are directly transferable from the classroom to the \n office,\u201d said Jayson Boyers, vice president of Champlain College and \n managing director of the Division of Continuing and Professional \n Studies. \u201cWe are honored to have the opportunity to align ourselves with \n the nation\u2019s largest employer and provide the hard-working men and women \n of the Federal workforce and their families with accessible, affordable \n and relevant learning opportunities,\u201d he added.\n \n \n Champlain College\u2019s truED provides OPM with a nationally recognized, \n sought-after adult online learning partner to meet the continuing \n education needs facing Federal Government. Champlain College offers the \n Federal workforce distinct educational benefits, including:\n \n \n \n Online certificate and degree offerings that support the \n mission-critical skills and knowledge needs, including high-demand \n fields like cyber security, digital forensics, healthcare \n administration and human resource management\n \n \n More than 20 years of online education experience and a deep \n understanding of adult learners\u2019 requirements and goals\n \n \n A longstanding reputation as a nationally ranked education provider by US \n News & World Report and The Princeton Review, as well \n as regional accreditation ensuring that standards of academic quality \n are met\n \n \n Designation as a National Center of Academic Excellence in Information \n Assurance Education by the National Security Agency and the Department \n of Homeland Security, as a National Center of Digital Forensics \n Academic Excellence by the United States Air Force and recognition by SC \n Magazine in 2013 for having the Best Cyber Security Higher \n Education Program in the United States\n \n \n Seven-week semesters that allow Federal employees and their families \n to obtain a high-quality online certificate or degree as quickly as \n possible at up to 70 percent less than standard tuition, leaving \n students with little to no debt\n \n \n \n \u201cIn order for the Federal Government to effectively serve the American \n people, it is essential that we are able to recruit and retain our \n nation\u2019s top talent,\u201d said OPM Director Katherine Archuleta. \u201cThrough \n our alliance with Champlain College, OPM can ensure that millions of \n dedicated Federal employees worldwide can access high-quality \n educational opportunities that will both advance their careers and \n contribute to the success of current and future agency missions,\u201d she \n added.\n \n \n Federal employees can immediately begin submitting their applications \n for the summer term, which begins on July 6, 2015, and has the admission \n deadline of June 5, 2015. To learn more, visit http:\/\/www.champlain.edu\/truEDFed. \n The first live webinars for Federal employees interested in learning \n more about truED and Champlain College will take place April 21, 2015 at \n 10:00 a.m. EDT and Thursday, April 23, 2015 at 2:00 p.m. EDT. Federal \n employees can register for the webinars at http:\/\/www.champlain.edu\/truedfed\/admission\/webinars.\n \n \n Jayson Boyers, vice president of Champlain College and managing director \n of the Division of Continuing and Professional Studies is available for \n interviews. Please contact Peter Kane, [email protected] \n or 703-584-5641 for more information.\n \n \n Credentialed press interested in learning about the alliance are invited \n to join a teleconference on April 20, at 1:30 pm ET featuring Dr. Sydney \n Smith-Heimbrock, deputy associate director, Employee Services, Strategic \n Workforce Planning and chief learning officer at OPM, and Jayson Boyers, \n vice president of Champlain College and managing director of the \n Division of Continuing and Professional Studies. Interested press are \n asked to RSVP to Peter Kane, account director at Sage Communications at \n either [email protected] or \n 703-584-5641.\n \n \n About Champlain College: Founded \n in 1878, Champlain College is a private, non-profit, regionally \n accredited institution that has stayed true to its mission of delivering \n a highly relevant, professionally-focused education. Champlain has long \n been recognized for its innovative approach to education, both on-campus \n and online, in areas such as business, cyber security, digital \n forensics, healthcare, information technology, and more. Champlain \n College serves more than 1,000 online undergraduate and master\u2019s degree \n students and 2,000 students on its Burlington, Vt., campus. Champlain \n was ranked in the top 15 percent of all U.S. colleges by the Princeton \n Review, and a Top Regional College of the North by U.S. News & \n World Report. In 2013, Champlain was named the Best Cyber Security \n Higher Education Program in the United States by SC Magazine. For \n more information about Champlain College, visit http:\/\/www.champlain.edu\/online.\n \n \n About truED\u00ae: truED is \n developed and supported as part of Champlain College\u2019s Online Continuing \n Professional Studies Division. Through alliances with leading \n organizations in government and industry and the affordable truED \n subscription model, Champlain College delivers an accessible, and \n relevant online higher education experience to help employees gain the \n skills and knowledge they need to enhance their careers and achieve \n their organization\u2019s business objectives. Champlain\u2019s certificate and \n degree programs not only provide discipline-specific knowledge, but also \n the critical thinking, problem solving and communication skills \n essential for the modern workforce. For more information about truED, \n visit http:\/\/www.champlain.edu\/truEd.\n \n \n About the U.S. Office of Personnel Management \n (OPM): OPM\u2019s mission is to Recruit, Retain and Honor a \n World-Class Workforce to Serve the American People. OPM supports U.S. \n agencies with personnel services and policy leadership including \n staffing tools, guidance on labor-management relations and programs to \n improve workforce performance.\n \n \n \n\t\t\t\t\n\t\t\t\n\t\t\t", "source": "businesswire.com", "publishDate": "2015-04-20T15:01:00+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186770766, "url": "http:\/\/feeds.businesswire.com\/click.phdo?i=ba10f710109248cba7db190dd78aba00", "title": "\n\t\t\t\tMOUNTAIN VIEW, Calif.--(BUSINESS WIRE)--SentinelOne, the company that\u2019s redefining endpoint security, today \n announced that it has received the Editor\u2019s Choice Award for Best \n Endpoin", "content": "\n\t\t\t\tMOUNTAIN VIEW, Calif.--(BUSINESS WIRE)--SentinelOne, the company that\u2019s redefining endpoint security, today \n announced that it has received the Editor\u2019s Choice Award for Best \n Endpoint Security Solution from Cyber Defense Magazine, the industry's \n leading electronic information security magazine and media partner of \n the RSA\u00ae USA Conference 2015.\n \n\n\n \n SentinelOne will be profiled in the complimentary print issue of Cyber \n Defense Magazine, which will be distributed at the RSA conference and \n include an article by SentinelOne CEO Tomer Weingarten on \u201cWhy the \n Endpoint is the New Perimeter\u201d.\n \n \n At the conference, SentinelOne is competing in the Innovation Sandbox \n Contest for a chance to be named \u201cMost Innovative Company\u201d. SentinelOne \n is demonstrating the SentinelOne EDR in booth #1821 in the South Expo \n Hall \u2013 and is hosting a \u201cBring Your Own Malware\u201d contest where hackers, \n pen testers, White Hats and Black Hats can run their best malware, APT \n or exploit against SentinelOne EDR to try to evade detection and be \n eligible for a $1,000 grand prize.\n \n \n CLICK TO TWEET: [email protected] wins \n Editor\u2019s Choice Award best #EndpointSecurity Solution @cyberdefensemag \n #RSAC http:\/\/bit.ly\/1Q89EuA\n \n \n \u201cSentinelOne is honored to be recognized with the Editor\u2019s Choice Award \n in Endpoint Security by Cyber Defense Magazine,\u201d said Tomer Weingarten, \n CEO of SentinelOne. \u201cOur ability to detect and block targeted attacks, \n APT's and zero-day threats that evade traditional endpoint security \n products is a market disrupting innovation.\u201d\n \n \n SentinelOne has developed a new approach to endpoint protection that \n outperforms the current layered security measures which rely on static \n anti-virus signatures, white listing and easily detected sandbox systems \n to combat threats. SentinelOne EDR dynamically monitors endpoint \n processes to detect, predict, block and remove both known attacks and \n zero-day, advanced malware in real time. The technology unifies endpoint \n protection across Windows, Mac, Android, and soon Linux, smartphones, \n tablets, laptops, desktops, virtual desktop infrastructure (VDI), \n servers (physical and virtual), embedded systems (e.g., PoS), and \n critical infrastructure (e.g., SCADA).\n \n \n SentinelOne EDR\u2019s core technology is based on a unique execution \n inspection engine that analyzes application processes in real time, \n combining attack pattern and malware technique modeling with automated \n crowd-sourced security intelligence aggregation and sharing. SentinelOne \n automatically stops and removes malware, reduces dwell times, minimizes \n damages, and eliminates incident response remediation.\n \n \n About Cyber Defense Magazine\n \n \n Cyber Defense Magazine is the premier source of IT Security information. \n We are managed and published by and for ethical, honest, passionate \n information security professionals. Our mission is to share cutting edge \n knowledge, real world stories and awards on the best ideas, products and \n services in the information technology industry. We deliver electronic \n magazines every month online for free and limited print editions \n exclusively for the RSA Conferences and our paid subscribers. Learn more \n about us at http:\/\/www.cyberdefensemagazine.com.\n \n \n About SentinelOne\n \n \n SentinelOne is reinventing endpoint security to protect organizations \n against advanced threats and nation state malware. The company uses \n execution inspection to detect and protect all devices against targeted, \n zero day threats in real time. SentinelOne was formed by an elite team \n of cyber security and defense experts from Intel, Symantec, McAfee, \n Checkpoint, IBM and the Israel Defense Forces. The company\u2019s investors \n include Accel Partners, Data Collective, Granite Hill Capital Partners, \n Tiger Global Management and The Westly Group. To learn more visit \n sentinelone.com or follow us at @SentinelSec\n \n \n \n\t\t\t\t\n\t\t\t\n\t\t\t", "source": "businesswire.com", "publishDate": "2015-04-20T15:01:00+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186759795, "url": "http:\/\/www.military-technologies.net\/2015\/04\/20\/imperva-honored-as-winner-in-the-third-annual-2015-cyber-defense-magazine-awards-in-two-categories\/", "title": "\n\t\t\tREDWOOD SHORES, Calif., April 20, 2015 (MILITARY-TECHNOLOGIES.NET) -- Imperva, Inc. (NYSE:IMPV), committed to protecting business-critical data and applications in the cloud and on-premises, annou", "content": "\n\t\t\tREDWOOD SHORES, Calif., April 20, 2015 (MILITARY-TECHNOLOGIES.NET) -- Imperva, Inc. (NYSE:IMPV), committed to protecting business-critical data and applications in the cloud and on-premises, announced today that Cyber Defense Magazine, the industry's leading electronic information security magazine and media partner of the RSA\u00ae Conference 2015, has named Imperva Skyfence Cloud Gateway winner of the Most Innovative Cloud Security Solution for 2015 and Imperva SecureSphere winner of the Most Innovative Data Center Security Solution for 2015.After many months of review and judged by leading independent information security experts, Cyber Defense Magazine is pleased to have selected Imperva as a winner for their Skyfence and SecureSphere solutions.\"We're thrilled to recognize next-generation innovation in the information security marketplace and that's why Imperva has earned these awards from Cyber Defense Magazine. Some of the best INFOSEC defenses come from these kinds of forward thinking players who think outside of the box,\" said Pierluigi Paganini, Editor-in-Chief, Cyber Defense Magazine.Skyfence Cloud Gateway is a cloud access security broker that enables visibility and control over sanctioned and unsanctioned cloud apps to enable their safe and productive use. With Skyfence, organizations can discover SaaS applications, assess related risks, and enforce controls to protect against account-centric threats, meet compliance requirements, and protect data in the cloud.SecureSphere is a comprehensive, integrated security platform that includes Web, Database and File Security. It scales to meet the cyber security demands of even the largest organizations and is backed by the Imperva Application Defense Center, a world-class security research organization that maintains the product's cutting-edge protection against evolving threats.\"CDM's recognition of Skyfence further validates the value of the Skyfence acquisition a little over a year ago, as we help our customers secure data and applications anywhere,\" said Mark Kraynak, Chief Product Officer at Imperva. \"This industry honor is a great endorsement to the fact that Skyfence and SecureSphere are ahead of the curve when it comes to the best-of-the-best products that can provide superior security in the cloud and in the data center.\"About Cyber Defense MagazineCyber Defense Magazine is the premier source of IT Security information. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting edge knowledge, real world stories and awards on the best ideas, products and services in the information technology industry. We deliver electronic magazines every month online for free and limited print editions exclusively for the RSA Conferences and our paid subscribers. Learn more about us at http:\/\/www.cyberdefensemagazine.com.About ImpervaImperva\u00ae (NYSE:IMPV), is a leading provider of cyber security solutions that protect business-critical data and applications. The company's SecureSphere, Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives - in the cloud and on-premises - and comply with regulations. The Imperva Application Defense Center, a research team comprised of some of the world's leading experts in data and application security, continually enhances Imperva products with up-to-the-minute threat intelligence, and publishes reports that provide insight and guidance on the latest threats and how to mitigate them. Imperva is headquartered in Redwood Shores, California. Learn more: www.imperva.com, our blog, on Twitter.\u00a9 2015 Imperva, Inc. All rights reserved. Imperva, the Imperva logo, SecureSphere, Incapsula and Skyfence are trademarks of Imperva, Inc. and its subsidiaries.For Imperva:\nCourtney Ostermann, Senior Director of Corporate Marketing\nTel: 1-650-888-9149\nFor Cyber Defense Magazine:\nJessica Quinn, Director of Marketing & Public Relations\nTel: 1-800-518-5248 x2002\nSource: Globenewswire Public\nImperva Honored as Winner in the Third Annual 2015 Cyber Defense Magazine Awards in Two Categories\n\t\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\n", "source": "www.military-technologies.net", "publishDate": "2015-04-20T15:00:00+02:00", "sourceType": "blog", "language": "en", "googleRank": 2, "relatedDocs": [ ] }, { "id": 186767028, "url": "http:\/\/www.cd-disk.com\/raytheon-to-buy-cybersecurity-firm-websense-in-1-9-billion-deal", "title": "\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\n\t\t\t(Reuters) \u2013 U.S. arms maker Raytheon Co said it would buy cybersecurity provider Websense Inc from private equity firm Vista Equity Partners LLC for $1.9 billion, including debt", "content": "\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\n\t\t\t(Reuters) \u2013 U.S. arms maker Raytheon Co said it would buy cybersecurity provider Websense Inc from private equity firm Vista Equity Partners LLC for $1.9 billion, including debt. Raytheon said it would combine its cybersecurity unit, valued at $400 million, with Websense. Vista Equity will then invest about $335 million for a 19.7 percent equity stake in the new company, Raytheon said on Monday. \"This deal speaks to the growing importance of cyber security to protect enterprises, as well as government assets, from malicious activity and state attacks,\" FBR Capital Markets analyst Daniel Ives wrote in a note.\n\nView full post on Internet News Headlines \u2013 Yahoo! News\n\t\t\t\t\t\t\n\t\t\t\n\t\t\t\t\t\t\n\t\t\t\n\t\t\t\tRaytheon to buy cybersecurity firm Websense in $1.9 billion deal was posted on April 20, 2015 at 12:53 pm in IT News and tagged as $1.9, billion, cybersecurity, deal, firm, Raytheon, Websense.\n\t\t\t\tIt was last modified on April 20, 2015 at 12:53 pm. \n\t\t\t\tYou can follow any responses to this entry through the RSS 2.0 feed.\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\tYou can leave a response or trackback from your site.\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\tShare on Twitter, Facebook, Delicious, Digg, Reddit\n\t\t\t\n\t\t\t\n\t\t\n\t\t\t\n\n\t\t\n\t\t\n\t\n\n\t\t\n\n\t\t\t\t\n\t\n\t\n\n\t\t\n\n\n\t\t\t\t\t\t\t\t", "source": "www.cd-disk.com", "publishDate": "2015-04-20T14:53:39+02:00", "sourceType": "blog", "language": "en", "googleRank": 1, "relatedDocs": [ ] }, { "id": 186761151, "url": "http:\/\/economictimes.indiatimes.com\/news\/international\/business\/raytheon-to-buy-cybersecurity-firm-websense-in-1-9-billion-deal\/articleshow\/46988887.cms", "title": " US arms maker Raytheon Co said it would buy cybersecurity provider Websense Inc from private equity firm Vista Equity Partners LLC for $1.9 billion, including debt. Raytheon said it would combi", "content": " US arms maker Raytheon Co said it would buy cybersecurity provider Websense Inc from private equity firm Vista Equity Partners LLC for $1.9 billion, including debt. Raytheon said it would combine its cybersecurity unit, valued at $400 million, with Websense. Vista Equity will then invest about $335 million for a 19.7 percent equity stake in the new company, Raytheon said on Monday. \"This deal speaks to the growing importance of cyber security to protect enterprises, as well as government assets, from malicious activity and state attacks,\" FBR Capital Markets analyst Daniel Ives wrote in a note. Demand for cybersecurity technology has increased after a spate of high-profile breaches at companies such as Sony Corp and Target Corp. Austin, Texas-based Websense helps to protect companies from such attacks and data theft. More than 11,000 enterprises rely on its TRITON security offerings, according to its website. Vista took Websense private two years ago for $990 million. The new company, which will be headed by Websense CEO John McCormack, will be a separately reported business unit, Raytheon said. A board of directors will be formed for the new company and will include representatives of both Raytheon and Vista Equity Partners, the company said. RBC Capital Markets LLC was the lead financial adviser to Raytheon. Morgan Lewis & Bockius LLP, Steptoe & Johnson LLP and Wilson Sonsini Goodrich & Rosati were its legal advisers. Citi was the financial adviser to Websense, while Kirkland & Ellis LLP its legal adviser. ", "source": "www.economictimes.com", "publishDate": "2015-04-20T14:47:42+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186767509, "url": "http:\/\/www.business-standard.com\/article\/markets\/new-year-resolution-sebi-plans-focus-on-disclosure-regime-115042000759_1.html", "title": " \n \n \n \nCompanies are required to inform shareholders of their annual general meetings 21 days before the event. \n \nBut shareholders who watch the exchang", "content": " \n \n \n \nCompanies are required to inform shareholders of their annual general meetings 21 days before the event. \n \nBut shareholders who watch the exchange website for this information may not always get this three weeks notice, according to Shriram Subramanian, managing director of InGovern Research Services. \n \nWhile some companies make an exchange disclosure, others don't. \n \n\tThis problem related to non-uniform disclosure standards by companies on issues such as the important dates (as above); as well as material developments such as getting large orders or trading in securities by insiders is likely to be addressed with finality by the regulator. \n \n\tThis year, the Securities and Exchange Board of India is planning to revamp its disclosure requirements to apply a uniform standard to all companies, reduce the number of times certain disclosures are made as well as introduce systems for 'automatically gathering and integrating' information from companies. \n\t \n\tIn fact, disclosures form one of the key areas of focus for the regulator, with a revamped regime likely to be introduced in the current financial year, according to Sebi's last board meeting minutes. \n \n\t\"The focus during the year 2015-16 will be on implementation of corporate governance standards by listed entities and system based disclosures,\" it said. \n \n\t\"What is material information is liberally interpreted. Some companies will disclose a $10 million deal (or) if they are raising debt others don't,\" said Shriram Subramanian. \n \n\t\"We talk to companies and there is a great deal of ambiguity. There needs to be a better understanding of what is expected. (If there is an) M&A (transaction) when do you disclose it? It is an area where companies would like some clarity,\" said Amit Tandon, the founder and managing director of proxy advisory firm Institutional Investor Advisory Services India Limited (IiAS). \n \n\tGreater use of technology is expected to be used for the same. \n \n\t\"To make use of technology, the concept of system driven disclosures seeks to disclose the changes in shareholding in a listed company by automatically gathering and integrating information from available sources in a timely and accurate manner,\" said Sebi's board meeting minutes. \n \n\tSebi noted that different regulations sometimes require the disclosure of the same information multiple times. This can be integrated such that this need only be done once. Also, this would help real-time monitoring of compliance as well as reduce the compliance burden. \n \n\tThe regulator is also working on revising the disclosure requirements for companies who are coming to raise money from the public for the first time. \n \n\tOther areas of focus mentioned for the year include the introduction of e-IPOs, cyber security and a better environment for capital-raising by Indian start-ups. \n \n ", "source": "business-standard.com", "publishDate": "2015-04-20T14:38:00+02:00", "sourceType": "blog", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186759923, "url": "http:\/\/www.military-technologies.net\/2015\/04\/20\/nxp-wins-gallup-great-workplace-award\/", "title": "\n\t\t\t\t\n\t\t\t\t\n\t\t\n\t\t\tEINDHOVEN, Netherlands, April 20, 2015 (MILITARY-TECHNOLOGIES.NET) -- NXP Semiconductors (Nasdaq:NXPI) today announced it recently received the coveted 'Great Workplace Award' from gl", "content": "\n\t\t\t\t\n\t\t\t\t\n\t\t\n\t\t\tEINDHOVEN, Netherlands, April 20, 2015 (MILITARY-TECHNOLOGIES.NET) -- NXP Semiconductors (Nasdaq:NXPI) today announced it recently received the coveted 'Great Workplace Award' from global analytics leader, Gallup. The Award is presented to companies that show a commitment to employees and have successfully built a culture where employees feel recognized and valued. NXP measures engagement annually through a scientifically validated Employee Engagement survey. Active engagement of NXP employees is a core management focus at all levels of the organization, acting as a quantitative measurement of our people engagement.\"Our people are the source of our greatest competitive advantage. This is reflected in the business results that we are achieving and the recognition we have received from Gallup for our organizational excellence,\" said Rick Clemmer, NXP president and chief executive officer. \"We would like to extend our congratulations and thanks to everyone who helped make this award possible as we continue on our journey to be the leading semiconductor company as reflected by our people, our customers, and our shareholders.\"Gallup's Managing Consultant Pa Sinyan said: \"Over the past five years, NXP has tirelessly worked on improving its culture to a level where it has now arrived in the upper echelons of engagement. The world's top-performing companies help lead the global economy by engaging their workforces. These companies understand that employee engagement is a force that drives real business outcomes. The Gallup Great Workplace Award was created to recognize organizations worldwide for their extraordinary ability to create an engaged workplace across teams, departments and locations.\"About NXP SemiconductorsNXP Semiconductors N.V. (Nasdaq:NXPI) creates solutions that enable secure connections for a smarter world. Building on its expertise in high-performance mixed signal electronics, NXP is driving innovation in the areas of connected cars, cyber security, portables & wearables, and the Internet of Things. NXP has operations in more than 25 countries, and posted revenue of $5.65 billion in 2014. Find out more at www.nxp.com.Europe:\nMartijn van der Linden\n+31 6 10914896\nGreater China \/ Asia:\nEsther Chang\n+886 2 8170 9990\nAmericas:\nHillary Cain\n+1 408 518 5227\nSource: Globenewswire Public\nNXP Wins Gallup 'Great Workplace' Award\n\t\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\n\n\n\t\t\n\t\t\n\n\t\t\n\t\t\n\t\t", "source": "www.military-technologies.net", "publishDate": "2015-04-20T14:00:00+02:00", "sourceType": "blog", "language": "en", "googleRank": 2, "relatedDocs": [ ] }, { "id": 186771250, "url": "http:\/\/feeds.businesswire.com\/click.phdo?i=af6949b4652dcc28b134619831283dea", "title": "\n\t\t\t\tSAN FRANCISCO--(BUSINESS WIRE)--Ntrepid\u00ae Corporation, a provider of cutting-edge cyber \n security solutions, announces the upcoming release of Passages, the only \n secure virtual browse", "content": "\n\t\t\t\tSAN FRANCISCO--(BUSINESS WIRE)--Ntrepid\u00ae Corporation, a provider of cutting-edge cyber \n security solutions, announces the upcoming release of Passages, the only \n secure virtual browser that safeguards businesses against both targeted \n and pivot attacks \u2013 threats that have been unaddressed by conventional \n security solutions in the marketplace thus far.\n \n\n\n \n \u201cDuring the last 18 months, we have seen an unprecedented number of web \n security breaches and a rapid rise in the use of targeting and other \n sophisticated Advanced Persistent Threat techniques,\u201d said Lance \n Cottrell, chief scientist at Ntrepid. \u201cWe believe that the traditional \n approaches to web security just don\u2019t work anymore. Passages represents \n a fundamentally new approach to protecting against a range of web-based \n attacks, enabling businesses to safely and confidently forge ahead in \n today\u2019s global, web-based world. Ntrepid is proud to be leading the \n charge.\u201d\n \n \n Passages \n begins each browsing session in a clean state by isolating the browser \n in a virtual machine and cutting off all access to local files. This \n design prevents all unwanted communication between the local machine and \n the virtual environment. A virtual private network then segregates all \n network traffic from the browser protecting the enterprise\u2019s identity, \n avoiding targeting and mitigating against pivot attacks. This also \n prevents an attacker from moving away from the browser to the local \n machine and ultimately other devices on the local network.\n \n \n Passages\u2019 Safehold prevents all drive-by downloads and other malware \n from reaching the user\u2019s computer during a browsing session by \n restricting all downloads to a secure cloud server, where they are \n scanned and determined malware-free before permission is granted to \n transfer to the desktop. Finally, Insight for Passages provides \n enterprise-level provisioning, monitoring and management of the \n application.\n \n \n Passages Availability\n \n \n Ntrepid is offering trials of Passages, and interested parties can sign \n up at the company\u2019s RSA Conference Booth #S727 or online at http:\/\/www.ntrepidcorp.com\/passages\/.\n \n \n RSA Conference: \u201cWebsite Counterintelligence \u2013 Leveraging Web Logs to \n Gather Intelligence\u201d\n \n \n The Passages team will provide hands-on demos at RSA \n Conference in Booth #S727. Experts will be available to discuss how \n businesses can safely and confidently forge ahead in an increasingly \n web-based global economy.\n \n \n Rounding out Ntrepid\u2019s participation in RSA, as well as the launch of \n Passages, Cottrell, will conduct conference session MASH-F02, \n \u201cWebsite Counterintelligence \u2013 Leveraging Web Logs to Gather \n Intelligence.\u201d\n \n \n Cottrell will show how web logs can be used to identify competitors who \n visit their business\u2019s website, how to track their activity and analyze \n behavior to discover research activities, new product development \n efforts and potential investors. Session attendees will also learn how \n to develop a successful website counterintelligence strategy, the value \n of web logs, and how to leverage them to guard your organization against \n undesired visitors. The session will be held Friday, April 24, 10:10 AM \n \u2013 11:00 AM, West \u2013 Room 2002. More information is available at https:\/\/www.rsaconference.com\/events\/us15\/agenda\/sessions\/1550\/website-counterintelligence-leveraging-web-logs-to.\n \n \n About Ntrepid\n \n \n Ntrepid\u2019s patented technology, leveraging a 15-year history of \n protecting the national security community from the world\u2019s most \n sophisticated opponents, protects tens of thousand of users in some of \n the world\u2019s most demanding security environments, with clients including \n the Department of Defense, Department of Homeland Security, Department \n of Treasury, Department of Justice, Department of Health and Human \n Services, and the Department of State. From corporate identity \n management to secure browsing, Ntrepid products empower enterprise \n online research and data collection, eliminating threats to an online \n workforce. More information can be found at http:\/\/www.NtrepidCorp.com.\n \n \n \n\t\t\t\t\n\t\t\t\n\t\t\t", "source": "businesswire.com", "publishDate": "2015-04-20T14:00:00+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186771164, "url": "http:\/\/feeds.businesswire.com\/click.phdo?i=cc908871052c2f09ceb0877d61f16449", "title": "\n\t\t\t\tOVERLAND PARK, Kan.--(BUSINESS WIRE)--With Fortune 100 companies from Home Depot to JPMorgan making weekly \n headlines for security breaches, it\u2019s clear that today\u2019s information \n secur", "content": "\n\t\t\t\tOVERLAND PARK, Kan.--(BUSINESS WIRE)--With Fortune 100 companies from Home Depot to JPMorgan making weekly \n headlines for security breaches, it\u2019s clear that today\u2019s information \n security measures are failing. To help corporations navigate the \n shifting cyber security terrain, Jason Straight, Senior Vice President \n and Chief Privacy Officer at UnitedLex, will speak at two upcoming \n industry events about managing cyber security risks effectively and \n cost-efficiently.\n \n \n At the RSA Conference in San Francisco, April 21-24, Straight will be \n presenting a lighthearted look at a serious problem: managing the level \n of risk at the \u201chuman layer.\u201d\n \n \n \n A Comedy of Errors: Assessing and Managing the Human Element of \n Cyber Risk, Tuesday, April 21 from 4:40 p.m. \u2013 5:30 p.m. PST at \n the Moscone Center, Room 2008. Straight will discuss practices and \n policies that provide the most protection from third-party threats, \n including employees, third-party vendors, and the mobile workforce.\n \n \n \n At Interop in Las Vegas, April 29-30, Straight will be participating in \n a variety of panels, debates, and talks:\n \n \n \n The Dark Reading Cyber Security Crash Course, Wednesday, April \n 29 from 10:30 a.m. \u2013 6:00 p.m. PST. Straight will join the Dark \n Reading team and a group of top cyber security experts to offer a \n crash course in what you need to know about data security and the \n dangers faced by your organization.\n \n \n Insider Threats and Preventing Data Leaks, Wednesday, April 29 \n from 1:45 p.m. \u2013 2:15 p.m. PST. Straight will provide practical \n guidance on how to transform potential liability into a key asset of \n an information security program. He will discuss recent statistics \n that emphasize the role of insiders in creating cyber security risk.\n \n \n Debate: Where are the Weakest Links in Cyber Security?, \n Thursday, April 30 from 2:15 p.m. \u2013 3:00 p.m. PST at the Mandalay Bay \n Convention Center, Lagoon B. In this debate, Straight will join a \n panel of security experts moderated by Tim Wilson, Editor in Chief of \n Dark Reading, to discuss the most troublesome vulnerabilities among \n enterprise defenses\u2014insider threats, end-users, applications, and \n other threats.\n \n \n Understanding the Full Legal & Business Liabilities of Cyber \n Breaches, Thursday, April 30 from 3:15 p.m. \u2013 4:00 p.m. PST at the \n Mandalay Bay Convention Center, Breakers F. In this session presented \n by Straight, attendees will learn about the business and legal fallout \n from cyber security breaches.\n \n \n \n About Jason Straight\n \n \n Jason Straight has more than a decade of experience in managing \n information security risks, data breach incidents, data privacy \n obligations and complex electronic discovery challenges. Straight is a \n Certified Information Privacy Professional (CIPP) and a recognized \n domain expert. He is an author and frequent speaker on topics relating \n to data privacy, cyber security, data breach response and computer \n forensics. Prior to joining UnitedLex, he led the cyber security \n consulting practice of a leading global investigations and cyber \n security company. He began his career as an attorney at Fried, Frank, \n Harris, Shriver & Jacobsen.\n \n \n About UnitedLex\n \n \n UnitedLex (www.unitedlex.com) \n is a global provider of technology-powered legal, security and business \n services that deliver industry-leading legal and cyber risk strategies \n and solutions. UnitedLex was founded in 2006 with a singular mission to \n improve the performance of leading corporations, law firms and academic \n institutions. Since then, UnitedLex's more than 1,800 attorneys, \n engineers and consultants have provided unparalleled solutions resulting \n in risk mitigation, efficiency improvements and cost optimization for \n its clients around across the globe. With more than $250 million in \n assets and committed capital, UnitedLex deploys the right blend of \n service and technology to support the world's leading corporations and \n law firms.\n \n\t\t\t\t\n\t\t\t\n\t\t\t", "source": "businesswire.com", "publishDate": "2015-04-20T14:00:00+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186758250, "url": "http:\/\/feeds.reuters.com\/~r\/reuters\/INtechnologyNews\/~3\/qnIcNwN8cYk\/websense-m-a-raytheon-idINKBN0NB17C20150420", "title": "\n\n\nREUTERS - U.S. arms maker Raytheon Co said it would buy cybersecurity provider Websense Inc from private equity firm Vista Equity Partners LLC for $1.9 billion, including debt.\nRaytheon said it wou", "content": "\n\n\nREUTERS - U.S. arms maker Raytheon Co said it would buy cybersecurity provider Websense Inc from private equity firm Vista Equity Partners LLC for $1.9 billion, including debt.\nRaytheon said it would combine its cybersecurity unit, valued at $400 million, with Websense. Vista Equity will then invest about $335 million for a 19.7 percent equity stake in the new company, Raytheon said on Monday.\"This deal speaks to the growing importance of cyber security to protect enterprises, as well as government assets, from malicious activity and state attacks,\" FBR Capital Markets analyst Daniel Ives wrote in a note.Demand for cybersecurity technology has increased after a spate of high-profile breaches at companies such as Sony Corp and Target Corp.Austin, Texas-based Websense helps to protect companies from such attacks and data theft. More than 11,000 enterprises rely on its TRITON security offerings, according to its website. Vista took Websense private two years ago for $990 million.The new company, which will be headed by Websense CEO John McCormack, will be a separately reported business unit, Raytheon said.A board of directors will be formed for the new company and will include representatives of both Raytheon and Vista Equity Partners, the company said.RBC Capital Markets LLC was the lead financial adviser to Raytheon. Morgan Lewis & Bockius LLP, Steptoe & Johnson LLP and Wilson Sonsini Goodrich & Rosati were its legal advisers.Citi was the financial adviser to Websense, while Kirkland & Ellis LLP its legal adviser. (Reporting by Sagarika Jaisinghani and Devika Krishna Kumar in Bengaluru; Editing by Sriraj Kalluvila)\n\n", "source": "in.reuters.com", "publishDate": "2015-04-20T13:58:23+02:00", "sourceType": "web", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186750673, "url": "http:\/\/rss.nytimes.com\/c\/34625\/f\/640316\/s\/458e76bf\/sc\/24\/l\/0L0Snytimes0N0Creuters0C20A150C0A40C20A0Cbusiness0C20Areuters0Ewebsense0Em0Ea0Eraytheon0Bhtml0Dpartner0Frss0Gemc0Frss\/story01.htm", "title": "\n\n \n \n \n\n \n \n\n \n (Reuters) - U.S. arms maker Raytheon Co said it would buy cybersecurity provider Websense Inc from private equity firm Vista E", "content": "\n\n \n \n \n\n \n \n\n \n (Reuters) - U.S. arms maker Raytheon Co said it would buy cybersecurity provider Websense Inc from private equity firm Vista Equity Partners LLC for $1.9 billion, including debt.Raytheon said it would combine its cybersecurity unit, valued at $400 million, with Websense. Vista Equity will then invest about $335 million for a 19.7 percent equity stake in the new company, Raytheon said on Monday.\"This deal speaks to the growing importance of cyber security to protect enterprises, as well as government assets, from malicious activity and state attacks,\" FBR Capital Markets analyst Daniel Ives wrote in a note.Demand for cybersecurity technology has increased after a spate of high-profile breaches at companies such as Sony Corp and Target Corp.Austin, Texas-based Websense helps to protect companies from such attacks and data theft. More than 11,000 enterprises rely on its TRITON security offerings, according to its website. Vista took Websense private two years ago for $990 million.The new company, which will be headed by Websense CEO John McCormack, will be a separately reported business unit, Raytheon said.A board of directors will be formed for the new company and will include representatives of both Raytheon and Vista Equity Partners, the company said.RBC Capital Markets LLC was the lead financial adviser to Raytheon. Morgan Lewis & Bockius LLP, Steptoe & Johnson LLP and Wilson Sonsini Goodrich & Rosati were its legal advisers.Citi was the financial adviser to Websense, while Kirkland & Ellis LLP its legal adviser.(Reporting by Sagarika Jaisinghani and Devika Krishna Kumar in Bengaluru; Editing by Sriraj Kalluvila)\n \n \n \n \n \n", "source": "www.nytimes.com", "publishDate": "2015-04-20T13:47:18+02:00", "sourceType": "news", "language": "en", "googleRank": 9, "relatedDocs": [ ] }, { "id": 186750240, "url": "http:\/\/feeds.reuters.com\/~r\/reuters\/technologyNews\/~3\/PDLi4m8gq2k\/story01.htm", "title": "\n\n\n(Reuters) - U.S. arms maker Raytheon Co (RTN.N) said it would buy cybersecurity provider Websense Inc from private equity firm Vista Equity Partners LLC for $1.9 billion, including debt.\nRaytheon s", "content": "\n\n\n(Reuters) - U.S. arms maker Raytheon Co (RTN.N) said it would buy cybersecurity provider Websense Inc from private equity firm Vista Equity Partners LLC for $1.9 billion, including debt.\nRaytheon said it would combine its cybersecurity unit, valued at $400 million, with Websense. Vista Equity will then invest about $335 million for a 19.7 percent equity stake in the new company, Raytheon said on Monday.\"This deal speaks to the growing importance of cyber security to protect enterprises, as well as government assets, from malicious activity and state attacks,\" FBR Capital Markets analyst Daniel Ives wrote in a note.Demand for cybersecurity technology has increased after a spate of high-profile breaches at companies such as Sony Corp (6758.T) and Target Corp (TGT.N).Austin, Texas-based Websense helps to protect companies from such attacks and data theft. More than 11,000 enterprises rely on its TRITON security offerings, according to its website. Vista took Websense private two years ago for $990 million.The new company, which will be headed by Websense CEO John McCormack, will be a separately reported business unit, Raytheon said.A board of directors will be formed for the new company and will include representatives of both Raytheon and Vista Equity Partners, the company said.RBC Capital Markets LLC was the lead financial adviser to Raytheon. Morgan Lewis & Bockius LLP, Steptoe & Johnson LLP and Wilson Sonsini Goodrich & Rosati were its legal advisers.Citi was the financial adviser to Websense, while Kirkland & Ellis LLP its legal adviser. (Reporting by Sagarika Jaisinghani and Devika Krishna Kumar in Bengaluru; Editing by Sriraj Kalluvila)\n\n", "source": "www.reuters.com", "publishDate": "2015-04-20T13:45:12+02:00", "sourceType": "news", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186750218, "url": "http:\/\/feeds.reuters.com\/~r\/reuters\/companyNews\/~3\/2KlVkrRQC_w\/story01.htm", "title": "\n\n\n(Adds analyst comment, details)\nApril 20 (Reuters) - U.S. arms maker Raytheon Co \nsaid it would buy cybersecurity provider Websense Inc from\nprivate equity firm Vista Equity Partners LLC for $1.9 b", "content": "\n\n\n(Adds analyst comment, details)\nApril 20 (Reuters) - U.S. arms maker Raytheon Co \nsaid it would buy cybersecurity provider Websense Inc from\nprivate equity firm Vista Equity Partners LLC for $1.9 billion,\nincluding debt.Raytheon said it would combine its cybersecurity unit,\nvalued at $400 million, with Websense. Vista Equity will then\ninvest about $335 million for a 19.7 percent equity stake in the\nnew company, Raytheon said on Monday.\"This deal speaks to the growing importance of cyber\nsecurity to protect enterprises, as well as government assets,\nfrom malicious activity and state attacks,\" FBR Capital Markets\nanalyst Daniel Ives wrote in a note.Demand for cybersecurity technology has increased after a\nspate of high-profile breaches at companies such as Sony Corp\n and Target Corp.Austin, Texas-based Websense helps to protect companies from\nsuch attacks and data theft. More than 11,000 enterprises rely\non its TRITON security offerings, according to its website.\nVista took Websense private two years ago for $990 million.The new company, which will be headed by Websense CEO John\nMcCormack, will be a separately reported business unit, Raytheon\nsaid.A board of directors will be formed for the new company and\nwill include representatives of both Raytheon and Vista Equity\nPartners, the company said.RBC Capital Markets LLC was the lead financial adviser to\nRaytheon. Morgan Lewis & Bockius LLP, Steptoe & Johnson LLP and\nWilson Sonsini Goodrich & Rosati were its legal advisers.Citi was the financial adviser to Websense, while Kirkland &\nEllis LLP its legal adviser.\n\n (Reporting by Sagarika Jaisinghani and Devika Krishna Kumar in\nBengaluru; Editing by Sriraj Kalluvila)\n\n", "source": "www.reuters.com", "publishDate": "2015-04-20T13:44:28+02:00", "sourceType": "news", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186757631, "url": "http:\/\/feedproxy.google.com\/~r\/Jbk-current-events\/~3\/ScI3WnCTju4\/fbis-cyber-task-force-makes-arrest-in.html", "title": "\n\nOn April 8, 2015, members of the Jackson FBI\u2019s Cyber Task Force arrested Thomas A. Wotring, age 28, without incident, at a business on Martin Bluff Road in Gautier, Mississippi, with assistance prov", "content": "\n\nOn April 8, 2015, members of the Jackson FBI\u2019s Cyber Task Force arrested Thomas A. Wotring, age 28, without incident, at a business on Martin Bluff Road in Gautier, Mississippi, with assistance provided by the Gautier Police Department. The arrest was made pursuant to an indictment and arrest warrant issued by a grand jury in the U.S. District Court for the Southern District of Mississippi.\n\nAccording to the indictment, Wotring accessed a protected computer on or about July 11, 2012, without authorization, and thereby obtained information for purposes of commercial advantage and private financial gain, in violation of Title 18, U.S. Code, Section 1030(a)(2) and (c)(2)(B).\n\nDonald Alway, Special Agent in Charge of the FBI in Mississippi, said, \u201cThe FBI\u2019s Cyber Task Force program enhances collaboration and integrates operations among the partner agencies against cyber terrorists, who aim to exploit vulnerabilities in critical infrastructure control systems, and against financially motivated criminals, who steal money, identities, and intellectual trade secrets. By joining together, these federal, state, and local agencies serve as an effective deterrent to cyber criminals.\u201d\n\nWotring made an initial appearance before United States Magistrate Judge Robert H. Walker on April 9, 2015. He was released on a $25,000 bond, pending trial of this matter, which is scheduled for May 11, 2015 in Gulfport, Mississippi.\n\nThe Jackson FBI Cyber Task Force is made up of FBI special agents and task force officers from the Mississippi Office of Attorney General, the Mississippi Office of Homeland Security, and the Madison Police Department. There are Cyber Task Forces (CTFs) in all of the FBI\u2019s 56 field offices that focus exclusively on cyber security threats. Within each field office territory, the CTF synchronizes domestic cyber threat investigations in the local community through information sharing, incident response, and joint enforcement and intelligence actions. To its partner agencies, the Cyber Task Force Program provides real-time, classified reporting, training opportunities, and access to a broad scope of resources, including vehicles, communication tools, and computer equipment.\n\nThe public is reminded that, as in any criminal case, a person is presumed innocent until and unless proven guilty. The charges filed merely contain allegations of criminal conduct.\n\n", "source": "jbk-current-events.blogspot.com", "publishDate": "2015-04-20T13:40:00+02:00", "sourceType": "blog", "language": "en", "googleRank": 0, "relatedDocs": [ ] }, { "id": 186768653, "url": "http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2015\/04\/20\/anonymous_operation_cispa_cisa_us\/", "title": "\n \n Activist and hacktivist collective Anonymous has launched an online awareness-raising operation opposing pending controversial US information-sharing bills.\n ", "content": "\n \n Activist and hacktivist collective Anonymous has launched an online awareness-raising operation opposing pending controversial US information-sharing bills.\n Critics from across the political spectrum, including libertarian-minded technologist Robert Graham, argue that the Cybersecurity Information Sharing Act sacrifices privacy without improving security.\n \n \n Anonymous goes further still in arguing that the measures threaten Fourth Amendment protections against unwarranted searches and seizures, hence their decision to launch #OperationCISPA.\n This CISA bill is an alternative of the CISPA [Cyber Intelligence Sharing and Protection Act] that failed to be passed in 2013.\n \"The CISA and CISPA bills directly attack the Fourth Amendment by letting the NSA monitor your private information without a warrant,\" a member of the group told El Reg.\n \"This is a direct impact to our security and assault on our privacy. Our objective is to stop the CISA Bill, and all other future cyber security bills, that aim to diminish our rights on the internet.\"\n \n #OperationCISPA- Anonymous Targets CISA Bill\n\n Anonymous's action plan against the CISA involves a petition, attempts to build public awareness, and other elements of what looks like a conventional political campaign.\n The bill would allow for organisations within the US government and corporate worlds to share data on attacks. Its supporters argue that better information sharing will help defenders prevent against hack attacks that other bodies may have already seen or know about.\n Opponents argue that applying Big Data techniques to threat information has been tried in the private sector and doesn't offer the hoped-for benefits of preventing attacks. \u00ae\n \n \n\n\n ", "source": "www.theregister.co.uk", "publishDate": "2015-04-20T13:03:11+02:00", "sourceType": "webzine", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186737340, "url": "http:\/\/feeds.reuters.com\/~r\/reuters\/companyNews\/~3\/yngbrFo4yWw\/story01.htm", "title": "\n\n\n* Q1 EPS ex-items $0.95 vs $0.91 forecast\n* Q1 revenue up 9 pct to $373 mln\n\n (Adds detail, analyst)TEL AVIV, April 20 (Reuters) - Network security provider\nCheck Point Software Technologies plans ", "content": "\n\n\n* Q1 EPS ex-items $0.95 vs $0.91 forecast\n* Q1 revenue up 9 pct to $373 mln\n\n (Adds detail, analyst)TEL AVIV, April 20 (Reuters) - Network security provider\nCheck Point Software Technologies plans to sharpen its\nfocus on threat-prevention and mobile security, it said on\nMonday after posting better than expected quarterly profit on\nhigher sales.The Israel-based company earned 95 cents a share excluding\none-off items in the first quarter, against 84 cents a year\nearlier. Revenue grew by 9 percent to $373 million.That compared with a forecast of 91 cents a share on revenue\nof $370 million, according to Thomson Reuters I\/B\/E\/S.\"It appears the company is hitting its stride as product\ninnovation on the (software subscription) front coupled with a\nmore acquisitive strategy are laying the groundwork for another\nstrong year in 2015,\" said Daniel Ives, managing director at FBR\nCapital Markets.\"Cyber security tailwinds are massive and Check Point is at\nthe right place at the right time.\"Check Point has acquired two Israeli companies since the\nstart of the year. In February it bought cyber security start-up\nHyperwise and this month it acquired Lacoon Mobile Security to\nhelp prevent cyber attacks on mobile phones.\"We increased our development, sales and marketing teams to\ncapitalise on the expanding security market opportunity,\" Chief\nExecutive Gil Shwed said. \"We expect these investments to\ncontinue through the coming quarters.\"Check Point's Nasdaq-listed shares have gained 4 percent so\nfar this year after a 22 percent rise in 2014.\n\n (Reporting by Tova Cohen; Additional reporting by Steven\nScheer; Editing by David Goodman)\n\n", "source": "www.reuters.com", "publishDate": "2015-04-20T12:58:26+02:00", "sourceType": "news", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186759989, "url": "http:\/\/fortune.com\/2015\/04\/20\/ceo-daily-monday-april-20th\/", "title": "\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tCEO Daily: Monday, April\u00a020th\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t6:12 AM EDT\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tE-mail\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n", "content": "\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tCEO Daily: Monday, April\u00a020th\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t6:12 AM EDT\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tE-mail\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tTweet\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tFacebook\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tGoogle Plus\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tLinkedin\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tShare icons\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tMoore\u2019s Law, which celebrated its 50th birthday on Sunday, may be nearing an end. Supratik Guha, the director of physical sciences at IBM, writes on Fortune that the miniaturization of computing power is about to hit physical limits. But no matter, he says. A new generation of computers with more human-like cognitive capabilities \u2013 able to recognize patterns from massive amounts of data, and make inferences and qualitative decisions \u2013 will drive the next big leap forward.\nMurphy\u2019s law, meanwhile, still reigns when it comes to cyber security. Today\u2019s news has Raytheon spending $1.7 billion to acquire computer security firm Websense. Today also marks the beginning of the world\u2019s largest gathering of cyber security experts \u2013 the RSA conference in San Francisco. Our appropriately named correspondent, Robert Hackett, reports on the event, and tells us total information-security spending is likely to reach $76.9 billion in 2015.\nOther important stories of the day below.\n\n \t\t\n \t\t\n\t\t \t\t\n\t\t \n\t\t Alan Murray\n\t\t \n \t\t\n \t\t\n\t\t \n\t\t \n\t\t \n\t\t @alansmurray\n\t\t \n \t\t\n \t\t\n\t\t \n\t\t \n\t\t \n\t\t [email protected]\n\t\t \n \t\t\n\t\t \n\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t", "source": "management.fortune.cnn.com", "publishDate": "2015-04-20T12:47:12+02:00", "sourceType": "blog", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186760135, "url": "http:\/\/rss.cnn.com\/~r\/fortunefinance\/~3\/Zd43qKSW37M\/", "title": "\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tCEO Daily: Monday, April\u00a020th\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t6:12 AM EDT\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tE-mail\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n", "content": "\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tCEO Daily: Monday, April\u00a020th\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\t6:12 AM EDT\n\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tE-mail\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tTweet\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tFacebook\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tGoogle Plus\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\tLinkedin\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tShare icons\t\t\t\t\t\t\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tMoore\u2019s Law, which celebrated its 50th birthday on Sunday, may be nearing an end. Supratik Guha, the director of physical sciences at IBM, writes on Fortune that the miniaturization of computing power is about to hit physical limits. But no matter, he says. A new generation of computers with more human-like cognitive capabilities \u2013 able to recognize patterns from massive amounts of data, and make inferences and qualitative decisions \u2013 will drive the next big leap forward.\nMurphy\u2019s law, meanwhile, still reigns when it comes to cyber security. Today\u2019s news has Raytheon spending $1.7 billion to acquire computer security firm Websense. Today also marks the beginning of the world\u2019s largest gathering of cyber security experts \u2013 the RSA conference in San Francisco. Our appropriately named correspondent, Robert Hackett, reports on the event, and tells us total information-security spending is likely to reach $76.9 billion in 2015.\nOther important stories of the day below.\n\n \t\t\n \t\t\n\t\t \t\t\n\t\t \n\t\t Alan Murray\n\t\t \n \t\t\n \t\t\n\t\t \n\t\t \n\t\t \n\t\t @alansmurray\n\t\t \n \t\t\n \t\t\n\t\t \n\t\t \n\t\t \n\t\t [email protected]\n\t\t \n \t\t\n\t\t \n\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t\n\t\t\t\t\t\t", "source": "finance.fortune.cnn.com", "publishDate": "2015-04-20T12:47:12+02:00", "sourceType": "blog", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186729483, "url": "http:\/\/www.virtualizationconference.com\/node\/3326741", "title": "\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n \n \nFrom the Wires\nIxia Hosts Cyber Security Resilience Panel Session and Offers In-Booth and Partner Booth Demos at RSA Conference\n\n\nApr. 20, 2015 06:06 AM\n\n\n\n\n\n \n\n\n\n ", "content": "\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n \n \nFrom the Wires\nIxia Hosts Cyber Security Resilience Panel Session and Offers In-Booth and Partner Booth Demos at RSA Conference\n\n\nApr. 20, 2015 06:06 AM\n\n\n\n\n\n \n\n\n\n Ixia\u00a0(NASDAQ: XXIA):\n \n What:Ixia will host an interactive panel discussion \u2013 \n Tuesday, April 21 at 4:40 p.m. North Room 132 \u2013 to examine real-world \n cyber security exercises and the role they play in preparing enterprises \n to defend critical infrastructure. Panelists include Philip Susmann, \n Norwich University; LTC Henry Capello, SDMI; Randolph M. Siegel, Boeing; \n and Bob DuCharme, Ixia. The panel will be moderated by Fred Kost, Ixia\u2019s \n VP of Security Solutions. Attendees can immediately put into action what \n they have learned with Ixia\u2019s internet-scale cyber range.\n \n Ixia\u2019s experiential booth - North Expo N#3535 - allows attendees to \n immerse and interact with product demos, including the ControlTower\u2122 \n solution with OpenFlow HP integration, which is a highly flexible \n network visibility solution that helps ensure security and performance \n in enterprise networks.\n \n Ixia will also demo the PerfectStorm\u00ae 100GbE solution, the \n industry\u2019s first native 100 GbE interface application and security \n platform and BreakingPoint\u00ae Virtual Edition, a virtual \n deployment option for an industry leading security test solution. \n Additionally, Ixia will be featured in \u201coff-booth\u201d demos with A10, Dell, \n Fortinet, Juniper and Solarflare--where conference guests can get a \n 360-degree view of Ixia\u2019s end-to-end solution. Ixia is also hosting a \n series theater sessions to offer attendees critical information on \n securing and optimizing their networks.\n \n Why:The tremendous growth of online applications, \n virtualization, the need for rapid service deployment and the emergence \n of the Internet of Things (IoT) are driving demand for huge increases in \n data center performance. Greater application complexity, reach, and \n sophistication, as well as increasingly complex security threats, are \n forcing enterprises to face new challenges. Companies must meet \n application performance demands while providing security resilience and \n still maintain an eye on the bottom line. Ixia offers a unique \n end-to-end solution that helps enterprises validate, optimize and secure \n their networks.\n \n\n\n\n\n When:Monday, April 20 \u2013 Friday, April 24\n \n Where:Moscone Center, 747 Howard Street, San Francisco, CA \n 94103North Expo N#3535\n \n Media Contact:Andrea Zack, PR Manager, Ixia [email protected] \n or 512-600-7140\n \n About IxiaIxia\u00a0(NASDAQ: XXIA) provides application \n performance and security resilience solutions to validate, secure, and \n optimize businesses\u2019 physical and\u00a0virtual\u00a0networks. Enterprises, service \n providers, network equipment manufacturers, and governments worldwide \n rely on Ixia\u2019s solutions to deploy new technologies and\u00a0achieve \n efficient, secure, ongoing operation of their networks.\u00a0Ixia's powerful \n and versatile solutions,\u00a0expert\u00a0global support, and\u00a0professional \n services equip organizations to exceed customer expectations and achieve \n better business outcomes.\u00a0Learn more at\u00a0www.ixiacom.com.\n \n Ixia, the Ixia logo, ControlTower, PerfectStorm, and BreakingPoint are \n the trademarks or registered trademarks of Ixia. Other trademarks used \n herein are the property of their respective owners.\n \nPublished Apr. 20, 2015 \n \nCopyright \u00a9 2015 SYS-CON Media, Inc. \u2014 All Rights Reserved. \nSyndicated stories and blog feeds, all rights reserved by the author. \n\n\n\nAbout Business WireCopyright \u00a9 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.\n\n\n \n \n \n \n \nUntitled Document \n \n \n \n \n \n \n \n \nVirtualization Expo Looms Large on SYS-CON.TV \n \n \n \n \n \n\t\t \n\t\t\t \n\t\t\t \n\t\t\t \n\t\t\t \n \n \n \n Cloud Expo 2010 East Opening Keynote by Oracle \nView this Keynote, recorded live at the Jacob Javits Center, featuring Richard Sarwal, CSVP of Development and Hasan Rizvi, Senior Vice President of Oracle Fusion Middleware Products. \n \n \n \n \n \n\t\t \n \n \n \n The Science of Doing Business in the Clouds \n During this Cloud Expo Day Two Keynote, Tony Bishop will describe Adaptivity\u2019s systematic and prescriptive approach that combines Fit-for-Purpose infrastructure technologies and management capabilities in order to create the optimal economics, environment and autonomics needed for the business to leverage cloud services. \n \n \n \n \n\t\t \n \n \n \n \n \n Pete Malcolm, CEO of Abiquo Live From New York City \n \n Join Pete Malcolm, CEO Abiquo, for this vendor-neutral keynote, where you will learn about the next chapter in the Virtualization story. What it is, what it means, why open standards are key, and most importantly, how it will revolutionize the way your organization manages IT. \n \n \n \n \n \n \n \n \n \n \n The Time is Right for Enterprise Cloud Computing \n During his keynote, Rich Marcello, Senior Vice President of Unisys, will discuss the latest technologies and approaches that help knock down these barriers, creating the opportunity for attendees to now consider cloud managed services as part of their data center journey to secure \"IT as a Service\". \n \n \n \n \n \n \n \n \n Accelerating Innovation with Cloud Computing \n Join Shelton Shugar, Senior Vice President of Cloud Computing at Yahoo! for a keynote elaborating on how Yahoo! and consumers benefit from Yahoo! Cloud Services and will describe Yahoo! Cloud Services and technologies. \n \n \n \t\t \n \n \n \n \n \n \n\nVirtualization Articles & Feature StoriesBy Elizabeth WhiteSYS-CON Events announced today that Alert Logic, the leading provider of Security-as-a-Service solutions for the cloud, has been named \u201cBronze Sponsor\u201d of SYS-CON's 16th International Cloud Expo\u00ae and DevOps Summit 2015 New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY, and the 17th International Cloud Expo\u00ae and DevOps Summit 2015 Silicon Valley, which will take place November 3\u20135, 2015, at the Santa Clara Convention Center in Santa Clara, CA.Apr. 20, 2015 05:45 AM EDTBy Liz McMillanSYS-CON Events announced today that Soha will exhibit at SYS-CON's DevOps Summit New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. \nSoha delivers enterprise-grade application security, on any device, as agile as the cloud. This turnkey, cloud-based service enables customers to solve secure application access and delivery challenges that traditional or virtualized network solutions cannot solve because they are too expensive, inflexible and operational...Apr. 20, 2015 05:45 AM EDTBy Carmen GonzalezSYS-CON Events announced today that Plutora, Inc., the leading global provider of enterprise release management and test environment management SaaS solutions, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. \nHeadquartered in Mountain View, California, Plutora provides enterprise release management and test environment SaaS solutions to clients in North America, Europe and Asia Pacific. Leading companies ...Apr. 20, 2015 05:30 AM EDTLatest Virtualization Conference NewsBy Bill RothVMware announced the release of the latest generation of its flagship product, VMware vSphere 5.5. Enhancements include support for larger storage systems, support for management and deployment of big data environments, and support for Flash Memory performance improvements. VMware vSphere 5.5 also expanded its support by allowing configurations with two times the previous physical CPU, memory and NUMA node limits.Aug. 27, 2013 06:00 AM EDTBy Maureen O'GaraAfter joining with Southeastern Asset Management in signing an open letter to Dell\u2019s special board committee \u2013 which is wrestling with Michael Dell\u2019s offer to pay $13.75 a share, 10 cents more a share, to change how the stockholders vote on his leverage buy-out offer is counted \u2013 telling the special committee he expected them to tell Michael Dell \u201cno\u201d \u2013 activist investor Carl Icahn wrote another open letter to Dell shareholders characterizing Michael Dell as a \u201cwhining\u201d \u201csore loser\u201d and major co...Jul. 30, 2013 08:30 AM EDTBy Maureen O'GaraDell CEO Michael Dell told the Wall Street Journal in an e-mail exchange over the weekend that he intends to stay with the company if his multibillion-dollar offer to buy the joint and take it private isn\u2019t approved by the stockholders. \n \n \n \nHe also said that he won\u2019t support Carl Icahn\u2019s notion of a leverage recapitalization or Icahn\u2019s schemes to put the company deeper in debt or sell off some its assets to pay shareholders an ostensibly higher price. \n \n \n \nMichael reiterated that the spec...Jul. 29, 2013 08:00 AM EDTBest Recent Articles on Cloud Computing & Big Data Topics By Esmeralda SwartzAs we enter a new year, it is time to look back over the past year and resolve to improve upon it. In 2014, we will see more service providers resolve to add more personalization in enterprise technology. Below are seven predictions about what will drive this trend toward personalization.Reads: 7,385By Andi MannIT organizations face a growing demand for faster innovation and new applications to support emerging opportunities in social, mobile, growth markets, Big Data analytics, mergers and acquisitions, strategic partnerships, and more. This is great news because it shows that IT continues to be a key stakeholder in delivering business service innovation. However, it also means that IT must deliver new innovation despite flat budgets, while maintaining existing services that grow more complex every day. Reads: 11,739By Elizabeth WhiteCloud computing is transforming the way businesses think about and leverage technology. As a result, the general understanding of cloud computing has come a long way in a short time. However, there are still many misconceptions about what cloud computing is and what it can do for businesses that adopt this game-changing computing model. In this exclusive Q&A with Cloud Expo Conference Chair Jeremy Geelan, Rex Wang, Vice President of Product Marketing at Oracle, discusses and dispels some of the common myths about cloud computing that still exist today. \nReads: 15,749By Elizabeth WhiteDespite the economy, cloud computing is doing well. Gartner estimates the cloud market will double by 2016 to $206 billion. The time for dabbling in the cloud is over! \n \nThe 14th International Cloud Expo, co-located with 5th International Big Data Expo and 3rd International SDN Expo, to be held June 10-12, 2014, at the Javits Center in New York City, N.Y. announces that its Call for Papers is now open. Topics include all aspects of providing or using massively scalable IT-related capabilities as a service using Internet technologies (see suggested topics below). \n \nCloud computing helps IT cut infrastructure costs while adding new features and services to grow core businesses. Clouds can help grow margins as costs are cut back but service offerings are expanded. \n \nHelp plant your flag in the fast-expanding business opportunity that is The Cloud, Big Data and Software-Defined Networking: submit your speaking proposal today!Reads: 9,118By Jim KaskadeWhat do you get when you combine Big Data technologies\u2026.like Pig and Hive? A flying pig? \nNo, you get a \u201cLogical Data Warehouse.\u201d \nIn 2012, Infochimps (now CSC) leveraged its early use of stream processing, NoSQLs, and Hadoop to create a design pattern which combined real-time, ad-hoc, and batch analytics. This concept of combining the best-in-breed Big Data technologies will continue to advance across the industry until the entire legacy (and proprietary) data infrastructure stack will be replaced with a new (and open) one.Reads: 19,397By Gene Dragotta and Sachin AgarwalWhile unprecedented technological advances have been made in healthcare in areas such as genomics, digital imaging and Health Information Systems, access to this information has been not been easy for both the healthcare provider and the patient themselves. Regulatory compliance and controls, information lock-in in proprietary Electronic Health Record systems and security concerns have made it difficult to share data across health care providers.Reads: 12,677By Liz McMillanCloud Expo, Inc. has announced today that Vanessa Alvarez has been named conference chair of Cloud Expo\u00ae 2014. \n \n14th International Cloud Expo will take place on June 10-12, 2014, at the Javits Center in New York City, New York, and 15th International Cloud Expo\u00ae will take place on November 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.By Elizabeth White12th International Cloud Expo, held on June 10\u201313, 2013 at the Javits Center in New York City, featured four content-packed days with a rich array of sessions about the business and technical value of cloud computing led by exceptional speakers from every sector of the cloud computing ecosystem. \nThe Cloud Expo series is the fastest-growing Enterprise IT event in the past 10 years, devoted to every aspect of delivering massively scalable enterprise IT as a service.Reads: 11,668By Liz McMillanUlitzer.com announced \"the World's 30 most influential Cloud bloggers,\" who collectively generated more than 24 million Ulitzer page views. Ulitzer's annual \"most influential Cloud bloggers\" list was announced at Cloud Expo, which drew more delegates than all other Cloud-related events put together worldwide. \"The world's 50 most influential Cloud bloggers 2010\" list will be announced at the Cloud Expo 2010 East, which will take place April 19-21, 2010, at the Jacob Javitz Convention Center, in New York City, with more than 5,000 expected to attend.Reads: 14,444By Howard BrownIt's a simple fact that the better sales reps understand their prospects' intentions, preferences and pain points during calls, the more business they'll close. Each day, as your prospects interact with websites and social media platforms, their behavioral data profile is expanding. It's now possible to gain unprecedented insight into prospects' content preferences, product needs and budget. We hear a lot about how valuable Big Data is to sales and marketing teams. But data itself is only valuable when it's part of a bigger story, made visible in the right context.Reads: 6,899By Elizabeth WhiteCloud Expo, Inc. has announced today that Larry Carvalho has been named Tech Chair of Cloud Expo\u00ae 2014. \n \n14th International Cloud Expo will take place on June 10-12, 2014, at the Javits Center in New York City, New York, and 15th International Cloud Expo\u00ae will take place on November 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.Reads: 14,275By Sal ViscaEveryone talks about a cloud-first or mobile-first strategy. It's the trend du jour, and for good reason as these innovative technologies have revolutionized an industry and made savvy companies a lot of money. But consider for a minute what's emerging with the Age of Context and the Internet of Things. Devices, interfaces, everyday objects are becoming endowed with computing smarts. This is creating an unprecedented focus on the Application Programming Interface (API) as developers seek to connect these devices and interfaces to create new supporting services and hybrids. I call this trend the move toward an API-first business model and strategy.Reads: 6,659By Karl Van den BerghWe live in a world that requires us to compete on our differential use of time and information, yet only a fraction of information workers today have access to the analytical capabilities they need to make better decisions. Now, with the advent of a new generation of embedded business intelligence (BI) platforms, cloud developers are disrupting the world of analytics. They are using these new BI platforms to inject more intelligence into the applications business people use every day. As a result, data-driven decision-making is finally on track to become the rule, not the exception.Reads: 5,468 \n \n \n \n \nUntitled Document \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n Save $500 \n on your \u201cGold Pass\u201d Registration! Call 201.802.3020 or click here to Register Early Bird Expires January 2nd. \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n Sponsorship Opportunities \n \n \n \n \n \n \n \n \n Please Call \n 201.802.3021 \n events (at) sys-con.com \n \n \n \n \n \n \n SYS-CON's Virtualization Expo, held each year in California, New York, Prague and Tokyo, is the world\u2019s leading Cloud event in its 4th year, larger than all other Virtualization events put together. For sponsorship, exhibit opportunites and show prospectus, please contact Carmen Gonzalez. \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n Senior Technologists including CIOs, CTOs, VPs of technology, IT directors and managers, network and storage managers, network engineers, enterprise architects, communications and networking specialists, directors of infrastructure Business Executives including CEOs, CMOs, CIOs, presidents, VPs, directors, business development; product and purchasing managers. \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n Download Virtualization Journal & Show Guide \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n The World's 30 Most Influential Virtualization Bloggers \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\nVirtualization Blogs LiveBy Elizabeth WhiteFred Duball is the Data Center Practice Principal, Workload and Cloud Solutions at HP Enterprise Services, U.S. Public Sector. Previously he served as the Executive Director and Deputy CIO for the Commonwealth of Virginia. \nSecuritySolutionsWatch.com: Thank you for joining us again today, Fred. Before discussing HP Data Center Services in greater detail, please tell us about your background. \nFred Duball: I am the practice principal for data center solutions in the U.S. Public Sector Workload and Cloud Solutions Practice, where I have strategic focus on IT transformation trends and provide ove...Apr. 19, 2015 03:45 PM EDTBy Robin KentThe need to be connected to the \u2018smarter world\u2019 is ever increasing with the rise in the number of mobile devices. LTE is now a global reality for millions of subscribers and the age of the Internet of Things (IoT) is well and truly upon us. While this opens up a variety of opportunities for network operators, it also comes with a warning. With the vast increase in the number of connected devices, effective policy and traffic management capabilities have become key demands for carriers and, as such, network intelligence is more important than ever.Apr. 19, 2015 12:00 PM EDTBy Dana GardnerAriba today announced innovations to its cloud-based applications and global business network designed to deliver a personal, contextual and increasingly mobile-first user experience for business applications consumers. \nAmong the announcements are a newly designed user interface (UI) and a mobile app based on the SAP Fiori approach, both due to be available this summer, for Ariba's core procurement, spend management, and other line of business apps. Ariba, an SAP company, made the announcements here at the Ariba LIVE conference in Las Vegas. \n\"This gives us a cleaner approach, more tiles, and...Apr. 19, 2015 07:00 AM EDTBy Jason BloombergEven though it\u2019s now Microservices Journal, long-time fans of SOA World Magazine can take comfort in the fact that the URL \u2013 soa.sys-con.com \u2013 remains unchanged. And that\u2019s no mistake, as microservices are really nothing more than a new and improved take on the Service-Oriented Architecture (SOA) best practices we struggled to hammer out over the last decade. Skeptics, however, might say that this change is nothing more than an exercise in buzzword-hopping. SOA is pass\u00e9, and now that people are talking about microservices instead, let\u2019s switch out the terminology.Apr. 16, 2015 12:30 PM EDT\n \n \n \nUntitled Document \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n Virtualization Expo 2010 Allstar Conference Faculty \n \n \n \n \n \n \n \n \n \n\t\t \n\t\t SARWAL \n Oracle \n \n\t\t \n\t\t COFFEE \n Salesforce \n \n\t\t \n\t\t KHAN \n\t\t Sybase \n \n\t\t \n\t\t BISHOP \n Adaptivity \n \n \n \n\t \n\t MALCOLM \n Abiquo \n \n\t\t \n\t\t KHALIDI \n Microsoft \n \n\t\t \n\t\t RILEY \n AWS \n \n\t\t \n\t\t AZUA \n IBM \n \n \n \n\t\t \n\t\t BARRETO \n Intel \n \n\t\t \n\t\t CHAKRAVARTY \n Novell \n \n\t\t \n\t\t CRANDELL \n RightScale \n \n\t\t \n\t\t GAUVIN \n\t\t Virtual Ark \n \n \n \n\t \n\t GROSS \n Unisys \n \n\t\t \n\t\t SCHALK \n\t\t Google \n \n\t\t \n\t\t YEN \n\t\t Juniper Networks \n \n\t\t \n WILLOUGHBY \n Compuware \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n\n", "source": "www.virtualizationconference.com\/node\/1668348", "publishDate": "2015-04-20T12:06:02+02:00", "sourceType": "blog", "language": "en", "googleRank": null, "relatedDocs": [ ] }, { "id": 186719615, "url": "http:\/\/www.china.org.cn\/world\/2015-04\/20\/content_35370406.htm", "title": " New Zealand Prime Minister John Key on Monday said his country had a very open relationship with China and he would welcome any discussion about the reported spying on Chinese consulate in Auckland w", "content": " New Zealand Prime Minister John Key on Monday said his country had a very open relationship with China and he would welcome any discussion about the reported spying on Chinese consulate in Auckland with Chinese officials.\nAsked if plans were underway to spy on Chinese communication, Key said in a television interview on 3News that \"I'm not going to go into those details.\"\nAsked if he could say that New Zealand was not spying on the Chinese, he replied, \"Well, I'm not going to talk about any foreign intelligence that we gather about any country or any particular reason.\"\nThe Herald newspaper reported on Sunday that New Zealand and United States spy agencies planned to hack into a data link between Chinese government buildings in Auckland, citing a document it said released by U.S. National Security Agency (NSA) whistleblower Edward Snowden.\nThe Chinese embassy in New Zealand issued a statement Sunday, saying China was concerned about the report and attached great importance to the cyber security issue.\n\"We will firmly safeguard our security interests and continue to guarantee our cyber and information security with concrete measures,\" said the statement. \n\n\n", "source": "www.china.org.cn", "publishDate": "2015-04-20T12:03:34.019+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186729500, "url": "http:\/\/www.virtualizationconference.com\/node\/3326734", "title": "\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n \n \nFrom the Wires\nNeustar DDoS Attack Study Shows North American Companies Better Equipped for Cyber Security Issues\n\n\nApr. 20, 2015 06:01 AM\n\n\n\n\n\n \n\n\n\n Neustar, \n ", "content": "\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n \n \nFrom the Wires\nNeustar DDoS Attack Study Shows North American Companies Better Equipped for Cyber Security Issues\n\n\nApr. 20, 2015 06:01 AM\n\n\n\n\n\n \n\n\n\n Neustar, \n Inc. (NYSE:NSR), \n a trusted, neutral provider of real-time information services and \n analytics, today announced findings from its 2015 \n North America Denial of Service (DDoS) Attacks & Impact Report. \n The findings highlight an increase in the number and size of DDoS \n attacks, their costly and devastating effects on brand perception, and a \n heightened state of preparedness for North American businesses.\n \n Key survey findings:\n \n \n 91 percent say DDoS attacks are a bigger or same threat as last year\n \n \n 85 percent of companies are attacked multiple times\n \n \n 32 percent of companies would lose more than $100k in revenue per hour \n of attack\n \n \n 26 percent report DDoS attacks adversely affect customer trust and \n brand reputation\n \n \n 31 percent say their longest attacks last more than one day\n \n \n \u201cWith 51 percent of companies investing more of their annual budget to \n prevent DDoS attacks, this study proves that DDoS has transcended to an \n institutional threat that is very real and recognized by all members of \n the C-suite,\u201d said Margee Abrams, CISSP, director of security services \n at Neustar. \u201cA website attack that was once considered to be an IT \n problem now reverberates and can cause significant brand damage that \n affects all organizational employees and its customers.\u201d\n \n As a response to the pervasive DDoS attacks, companies have increased \n their adoption of Hybrid protection by 55 percent from last year.\n \n Hybrid, a highly recommended approach that allows companies to mitigate \n DDoS attacks by combining on-site hardware and cloud-based solutions, is \n also the defense of choice by 94 percent of companies who would lose \n more than $100k per hour during peak business times.\n \n\n\n\n\n \u201cThe increased hybrid adoption reflects the growing need for companies \n to have immediate, on premise DDoS defense capabilities, in addition to \n surge defense capabilities in response to larger attacks,\u201d said Abrams. \n \u201cCompanies continue to rely on layered traditional perimeter defenses \n including firewalls, routers and switches as well as DDoS mitigation \n services. But when revenues and brand reputation are at risk, deploying \n a hybrid solution offers the best of both worlds: immediate on premise \n protection with the capacity that only cloud providers can offer.\u201d she \n added.\n \n To conduct the study, Neustar surveyed 510 companies across a diverse \n range of industries including financial services, technology, retail, \n government & public sector, health care, energy & utility, \n telecommunications, e-commerce, Internet services and media.\n \n Joe Loveless, security solutions expert at Neustar, will present the \n report findings today at the 2015 West Coast Information Security and \n Broader Technology Growth Conference in San Francisco. Neustar will also \n have representatives available to discuss the results at the RSA \n Conference, held April 21-24, also in San Francisco. To learn more, RSA \n visitors are encouraged to visit the Neustar booth at number 2520.\n \n About Neustar, Inc.\n \n Neustar, Inc. (NYSE:NSR) \n is the first real-time provider of cloud-based information services and \n data analytics, enabling marketing and IT security professionals to \n promote and protect their businesses. With a commitment to privacy and \n neutrality, Neustar operates complex data registries and uses its \n expertise to deliver actionable, data-driven insights that help clients \n make high-value business decisions in real time, one customer \n interaction at a time. More information is available at www.neustar.biz.\n Photos\/Multimedia Gallery Available: http:\/\/www.businesswire.com\/multimedia\/home\/20150420005307\/en\/\nPublished Apr. 20, 2015 \n \nCopyright \u00a9 2015 SYS-CON Media, Inc. \u2014 All Rights Reserved. \nSyndicated stories and blog feeds, all rights reserved by the author. \n\n\n\nAbout Business WireCopyright \u00a9 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.\n\n\n \n \n \n \n \nUntitled Document \n \n \n \n \n \n \n \n \nVirtualization Expo Looms Large on SYS-CON.TV \n \n \n \n \n \n\t\t \n\t\t\t \n\t\t\t \n\t\t\t \n\t\t\t \n \n \n \n Cloud Expo 2010 East Opening Keynote by Oracle \nView this Keynote, recorded live at the Jacob Javits Center, featuring Richard Sarwal, CSVP of Development and Hasan Rizvi, Senior Vice President of Oracle Fusion Middleware Products. \n \n \n \n \n \n\t\t \n \n \n \n The Science of Doing Business in the Clouds \n During this Cloud Expo Day Two Keynote, Tony Bishop will describe Adaptivity\u2019s systematic and prescriptive approach that combines Fit-for-Purpose infrastructure technologies and management capabilities in order to create the optimal economics, environment and autonomics needed for the business to leverage cloud services. \n \n \n \n \n\t\t \n \n \n \n \n \n Pete Malcolm, CEO of Abiquo Live From New York City \n \n Join Pete Malcolm, CEO Abiquo, for this vendor-neutral keynote, where you will learn about the next chapter in the Virtualization story. What it is, what it means, why open standards are key, and most importantly, how it will revolutionize the way your organization manages IT. \n \n \n \n \n \n \n \n \n \n \n The Time is Right for Enterprise Cloud Computing \n During his keynote, Rich Marcello, Senior Vice President of Unisys, will discuss the latest technologies and approaches that help knock down these barriers, creating the opportunity for attendees to now consider cloud managed services as part of their data center journey to secure \"IT as a Service\". \n \n \n \n \n \n \n \n \n Accelerating Innovation with Cloud Computing \n Join Shelton Shugar, Senior Vice President of Cloud Computing at Yahoo! for a keynote elaborating on how Yahoo! and consumers benefit from Yahoo! Cloud Services and will describe Yahoo! Cloud Services and technologies. \n \n \n \t\t \n \n \n \n \n \n \n\nVirtualization Articles & Feature StoriesBy Elizabeth WhiteSYS-CON Events announced today that Alert Logic, the leading provider of Security-as-a-Service solutions for the cloud, has been named \u201cBronze Sponsor\u201d of SYS-CON's 16th International Cloud Expo\u00ae and DevOps Summit 2015 New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY, and the 17th International Cloud Expo\u00ae and DevOps Summit 2015 Silicon Valley, which will take place November 3\u20135, 2015, at the Santa Clara Convention Center in Santa Clara, CA.Apr. 20, 2015 05:45 AM EDTBy Liz McMillanSYS-CON Events announced today that Soha will exhibit at SYS-CON's DevOps Summit New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. \nSoha delivers enterprise-grade application security, on any device, as agile as the cloud. This turnkey, cloud-based service enables customers to solve secure application access and delivery challenges that traditional or virtualized network solutions cannot solve because they are too expensive, inflexible and operational...Apr. 20, 2015 05:45 AM EDTBy Carmen GonzalezSYS-CON Events announced today that Plutora, Inc., the leading global provider of enterprise release management and test environment management SaaS solutions, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. \nHeadquartered in Mountain View, California, Plutora provides enterprise release management and test environment SaaS solutions to clients in North America, Europe and Asia Pacific. Leading companies ...Apr. 20, 2015 05:30 AM EDTLatest Virtualization Conference NewsBy Bill RothVMware announced the release of the latest generation of its flagship product, VMware vSphere 5.5. Enhancements include support for larger storage systems, support for management and deployment of big data environments, and support for Flash Memory performance improvements. VMware vSphere 5.5 also expanded its support by allowing configurations with two times the previous physical CPU, memory and NUMA node limits.Aug. 27, 2013 06:00 AM EDTBy Maureen O'GaraAfter joining with Southeastern Asset Management in signing an open letter to Dell\u2019s special board committee \u2013 which is wrestling with Michael Dell\u2019s offer to pay $13.75 a share, 10 cents more a share, to change how the stockholders vote on his leverage buy-out offer is counted \u2013 telling the special committee he expected them to tell Michael Dell \u201cno\u201d \u2013 activist investor Carl Icahn wrote another open letter to Dell shareholders characterizing Michael Dell as a \u201cwhining\u201d \u201csore loser\u201d and major co...Jul. 30, 2013 08:30 AM EDTBy Maureen O'GaraDell CEO Michael Dell told the Wall Street Journal in an e-mail exchange over the weekend that he intends to stay with the company if his multibillion-dollar offer to buy the joint and take it private isn\u2019t approved by the stockholders. \n \n \n \nHe also said that he won\u2019t support Carl Icahn\u2019s notion of a leverage recapitalization or Icahn\u2019s schemes to put the company deeper in debt or sell off some its assets to pay shareholders an ostensibly higher price. \n \n \n \nMichael reiterated that the spec...Jul. 29, 2013 08:00 AM EDTBest Recent Articles on Cloud Computing & Big Data Topics By Esmeralda SwartzAs we enter a new year, it is time to look back over the past year and resolve to improve upon it. In 2014, we will see more service providers resolve to add more personalization in enterprise technology. Below are seven predictions about what will drive this trend toward personalization.Reads: 7,385By Andi MannIT organizations face a growing demand for faster innovation and new applications to support emerging opportunities in social, mobile, growth markets, Big Data analytics, mergers and acquisitions, strategic partnerships, and more. This is great news because it shows that IT continues to be a key stakeholder in delivering business service innovation. However, it also means that IT must deliver new innovation despite flat budgets, while maintaining existing services that grow more complex every day. Reads: 11,739By Elizabeth WhiteCloud computing is transforming the way businesses think about and leverage technology. As a result, the general understanding of cloud computing has come a long way in a short time. However, there are still many misconceptions about what cloud computing is and what it can do for businesses that adopt this game-changing computing model. In this exclusive Q&A with Cloud Expo Conference Chair Jeremy Geelan, Rex Wang, Vice President of Product Marketing at Oracle, discusses and dispels some of the common myths about cloud computing that still exist today. \nReads: 15,749By Elizabeth WhiteDespite the economy, cloud computing is doing well. Gartner estimates the cloud market will double by 2016 to $206 billion. The time for dabbling in the cloud is over! \n \nThe 14th International Cloud Expo, co-located with 5th International Big Data Expo and 3rd International SDN Expo, to be held June 10-12, 2014, at the Javits Center in New York City, N.Y. announces that its Call for Papers is now open. Topics include all aspects of providing or using massively scalable IT-related capabilities as a service using Internet technologies (see suggested topics below). \n \nCloud computing helps IT cut infrastructure costs while adding new features and services to grow core businesses. Clouds can help grow margins as costs are cut back but service offerings are expanded. \n \nHelp plant your flag in the fast-expanding business opportunity that is The Cloud, Big Data and Software-Defined Networking: submit your speaking proposal today!Reads: 9,118By Jim KaskadeWhat do you get when you combine Big Data technologies\u2026.like Pig and Hive? A flying pig? \nNo, you get a \u201cLogical Data Warehouse.\u201d \nIn 2012, Infochimps (now CSC) leveraged its early use of stream processing, NoSQLs, and Hadoop to create a design pattern which combined real-time, ad-hoc, and batch analytics. This concept of combining the best-in-breed Big Data technologies will continue to advance across the industry until the entire legacy (and proprietary) data infrastructure stack will be replaced with a new (and open) one.Reads: 19,397By Gene Dragotta and Sachin AgarwalWhile unprecedented technological advances have been made in healthcare in areas such as genomics, digital imaging and Health Information Systems, access to this information has been not been easy for both the healthcare provider and the patient themselves. Regulatory compliance and controls, information lock-in in proprietary Electronic Health Record systems and security concerns have made it difficult to share data across health care providers.Reads: 12,677By Liz McMillanCloud Expo, Inc. has announced today that Vanessa Alvarez has been named conference chair of Cloud Expo\u00ae 2014. \n \n14th International Cloud Expo will take place on June 10-12, 2014, at the Javits Center in New York City, New York, and 15th International Cloud Expo\u00ae will take place on November 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.By Elizabeth White12th International Cloud Expo, held on June 10\u201313, 2013 at the Javits Center in New York City, featured four content-packed days with a rich array of sessions about the business and technical value of cloud computing led by exceptional speakers from every sector of the cloud computing ecosystem. \nThe Cloud Expo series is the fastest-growing Enterprise IT event in the past 10 years, devoted to every aspect of delivering massively scalable enterprise IT as a service.Reads: 11,668By Liz McMillanUlitzer.com announced \"the World's 30 most influential Cloud bloggers,\" who collectively generated more than 24 million Ulitzer page views. Ulitzer's annual \"most influential Cloud bloggers\" list was announced at Cloud Expo, which drew more delegates than all other Cloud-related events put together worldwide. \"The world's 50 most influential Cloud bloggers 2010\" list will be announced at the Cloud Expo 2010 East, which will take place April 19-21, 2010, at the Jacob Javitz Convention Center, in New York City, with more than 5,000 expected to attend.Reads: 14,444By Howard BrownIt's a simple fact that the better sales reps understand their prospects' intentions, preferences and pain points during calls, the more business they'll close. Each day, as your prospects interact with websites and social media platforms, their behavioral data profile is expanding. It's now possible to gain unprecedented insight into prospects' content preferences, product needs and budget. We hear a lot about how valuable Big Data is to sales and marketing teams. But data itself is only valuable when it's part of a bigger story, made visible in the right context.Reads: 6,899By Elizabeth WhiteCloud Expo, Inc. has announced today that Larry Carvalho has been named Tech Chair of Cloud Expo\u00ae 2014. \n \n14th International Cloud Expo will take place on June 10-12, 2014, at the Javits Center in New York City, New York, and 15th International Cloud Expo\u00ae will take place on November 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.Reads: 14,275By Sal ViscaEveryone talks about a cloud-first or mobile-first strategy. It's the trend du jour, and for good reason as these innovative technologies have revolutionized an industry and made savvy companies a lot of money. But consider for a minute what's emerging with the Age of Context and the Internet of Things. Devices, interfaces, everyday objects are becoming endowed with computing smarts. This is creating an unprecedented focus on the Application Programming Interface (API) as developers seek to connect these devices and interfaces to create new supporting services and hybrids. I call this trend the move toward an API-first business model and strategy.Reads: 6,659By Karl Van den BerghWe live in a world that requires us to compete on our differential use of time and information, yet only a fraction of information workers today have access to the analytical capabilities they need to make better decisions. Now, with the advent of a new generation of embedded business intelligence (BI) platforms, cloud developers are disrupting the world of analytics. They are using these new BI platforms to inject more intelligence into the applications business people use every day. As a result, data-driven decision-making is finally on track to become the rule, not the exception.Reads: 5,468 \n \n \n \n \nUntitled Document \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n Save $500 \n on your \u201cGold Pass\u201d Registration! Call 201.802.3020 or click here to Register Early Bird Expires January 2nd. \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n Sponsorship Opportunities \n \n \n \n \n \n \n \n \n Please Call \n 201.802.3021 \n events (at) sys-con.com \n \n \n \n \n \n \n SYS-CON's Virtualization Expo, held each year in California, New York, Prague and Tokyo, is the world\u2019s leading Cloud event in its 4th year, larger than all other Virtualization events put together. For sponsorship, exhibit opportunites and show prospectus, please contact Carmen Gonzalez. \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n Senior Technologists including CIOs, CTOs, VPs of technology, IT directors and managers, network and storage managers, network engineers, enterprise architects, communications and networking specialists, directors of infrastructure Business Executives including CEOs, CMOs, CIOs, presidents, VPs, directors, business development; product and purchasing managers. \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n Download Virtualization Journal & Show Guide \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n The World's 30 Most Influential Virtualization Bloggers \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\nVirtualization Blogs LiveBy Elizabeth WhiteFred Duball is the Data Center Practice Principal, Workload and Cloud Solutions at HP Enterprise Services, U.S. Public Sector. Previously he served as the Executive Director and Deputy CIO for the Commonwealth of Virginia. \nSecuritySolutionsWatch.com: Thank you for joining us again today, Fred. Before discussing HP Data Center Services in greater detail, please tell us about your background. \nFred Duball: I am the practice principal for data center solutions in the U.S. Public Sector Workload and Cloud Solutions Practice, where I have strategic focus on IT transformation trends and provide ove...Apr. 19, 2015 03:45 PM EDTBy Robin KentThe need to be connected to the \u2018smarter world\u2019 is ever increasing with the rise in the number of mobile devices. LTE is now a global reality for millions of subscribers and the age of the Internet of Things (IoT) is well and truly upon us. While this opens up a variety of opportunities for network operators, it also comes with a warning. With the vast increase in the number of connected devices, effective policy and traffic management capabilities have become key demands for carriers and, as such, network intelligence is more important than ever.Apr. 19, 2015 12:00 PM EDTBy Dana GardnerAriba today announced innovations to its cloud-based applications and global business network designed to deliver a personal, contextual and increasingly mobile-first user experience for business applications consumers. \nAmong the announcements are a newly designed user interface (UI) and a mobile app based on the SAP Fiori approach, both due to be available this summer, for Ariba's core procurement, spend management, and other line of business apps. Ariba, an SAP company, made the announcements here at the Ariba LIVE conference in Las Vegas. \n\"This gives us a cleaner approach, more tiles, and...Apr. 19, 2015 07:00 AM EDTBy Jason BloombergEven though it\u2019s now Microservices Journal, long-time fans of SOA World Magazine can take comfort in the fact that the URL \u2013 soa.sys-con.com \u2013 remains unchanged. And that\u2019s no mistake, as microservices are really nothing more than a new and improved take on the Service-Oriented Architecture (SOA) best practices we struggled to hammer out over the last decade. Skeptics, however, might say that this change is nothing more than an exercise in buzzword-hopping. SOA is pass\u00e9, and now that people are talking about microservices instead, let\u2019s switch out the terminology.Apr. 16, 2015 12:30 PM EDT\n \n \n \nUntitled Document \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n Virtualization Expo 2010 Allstar Conference Faculty \n \n \n \n \n \n \n \n \n \n\t\t \n\t\t SARWAL \n Oracle \n \n\t\t \n\t\t COFFEE \n Salesforce \n \n\t\t \n\t\t KHAN \n\t\t Sybase \n \n\t\t \n\t\t BISHOP \n Adaptivity \n \n \n \n\t \n\t MALCOLM \n Abiquo \n \n\t\t \n\t\t KHALIDI \n Microsoft \n \n\t\t \n\t\t RILEY \n AWS \n \n\t\t \n\t\t AZUA \n IBM \n \n \n \n\t\t \n\t\t BARRETO \n Intel \n \n\t\t \n\t\t CHAKRAVARTY \n Novell \n \n\t\t \n\t\t CRANDELL \n RightScale \n \n\t\t \n\t\t GAUVIN \n\t\t Virtual Ark \n \n \n \n\t \n\t GROSS \n Unisys \n \n\t\t \n\t\t SCHALK \n\t\t Google \n \n\t\t \n\t\t YEN \n\t\t Juniper Networks \n \n\t\t \n WILLOUGHBY \n Compuware \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n\n", "source": "www.virtualizationconference.com\/node\/1668348", "publishDate": "2015-04-20T12:01:33+02:00", "sourceType": "blog", "language": "en", "googleRank": null, "relatedDocs": [ ] }, { "id": 186732016, "url": "http:\/\/www.eturbonews.com\/57863\/united-airlines-watch-out-what-you-tweet-or-face-consequences", "title": "\n Sharing knowledge in Twitter about how transport security systems operate is a bad idea.\nChris Roberts, of One World Labs in Denver, has learnt that.\nWhen a computer security expert from Denver twe", "content": "\n Sharing knowledge in Twitter about how transport security systems operate is a bad idea.\nChris Roberts, of One World Labs in Denver, has learnt that.\nWhen a computer security expert from Denver tweeted some amusing remarks about hacking the onboard systems of his United Airlines flight, he didn\u2019t know FBI agents would be waiting at his destination. Later, he was refused boarding to another flight.\nOn Wednesday, when Roberts flew from Denver to Syracuse, N.Y., after boarding, he posted a tweet about what he would do if he managed to hack the aircraft\u2019s computers.\nEICAS stands for \u201cengine-indicating and crew-alerting system\u201d, so Roberts actually pondered playing with the aircraft's onboard communication system.\nIt was enough to get him acquainted with FBI agents, who were waiting for him in Syracuse. They questioned him for four hours.\nRoberts was released after interrogation, but practically all his personal electronic equipment, including a MacBook Pro, an iPad, several hard drives and USB memory sticks, were confiscated. Roberts proved this by posting an FBI \u201creceipt for Property Received.\u201d The only electronic item Roberts was allowed to keep was his iPhone, Forbes.com reported.\nA member of the security research community himself, Roberts expressed surprise with the pace of developments, though he should have known better that everything posted online is constantly monitored by numerous US security agencies.\nAfter returning to Denver for a couple of days, Roberts headed for San Francisco on Saturday to take part in the RSA Conference 2015 cyber security summit.\nIn the airport, reportedly already after passing the gate, he was told by United Airlines staff he wouldn\u2019t be allowed on board.\nSince Roberts had made public statements about airfare equipment and aircraft systems manipulation, \"That's something we just can't have,\" said United Airlines spokesman Rahsaan Johnson, explaining this is not only a \"violation of United's policies\" but \"it's not something we want our inflight crews and customers to deal with,\" Johnson said.\nWatch out what you tweet \u2013 or face the consequences!\n \n", "source": "www.eturbonews.com", "publishDate": "2015-04-20T11:41:39+02:00", "sourceType": "blog", "language": "en", "googleRank": 6, "relatedDocs": [ ] }, { "id": 186722227, "url": "http:\/\/www.military-technologies.net\/2015\/04\/20\/radware-introduces-industrys-first-hybrid-cloud-based-waf-service\/", "title": "\n\t\t\tMAHWAH, N.J., April 20, 2015 (GLOBE NEWSWIRE) -- Radware\u00ae (Nasdaq:RDWR), a leading provider of cyber security and application delivery solutions ensuring optimal service level for applications in ", "content": "\n\t\t\tMAHWAH, N.J., April 20, 2015 (GLOBE NEWSWIRE) -- Radware\u00ae (Nasdaq:RDWR), a leading provider of cyber security and application delivery solutions ensuring optimal service level for applications in virtual, cloud and software defined data centers, today released a new and fully-managed, cloud-based Web Application Firewall (WAF) service that provides unmatched protection from web-based cyber-attacks.Cyber-attacks remain a persistent threat and have become sophisticated in size and scope. Denial of Service (DoS), SQL injections and cross-site scripting are the most common web attack vectors, increasing in popularity. As migration to the cloud continues and expands, companies today are facing a more distributed network infrastructure. This transition of web based applications to the cloud have rendered on-premise mitigation tools ineffective against web attacks and require organizations to protect their applications both on-premise and in-the-cloud.Radware's new Hybrid Cloud WAF Service is an industry first that provides a fully managed enterprise grade WAF that protects both on-premise and cloud-based applications, using a single technology solution. Unlike existing WAF solutions that integrate dual technologies which results in a gap between protection coverage and quality, Radware's single technology approach makes migrating applications to the cloud safer and secure.\"It's not uncommon for enterprises to distribute their applications both on-premise and in-the-cloud. In addition, we see enterprises employ multiple cloud vendors to host various aspects of their infrastructure. However, having a disparate network infrastructure adds a level of complexity when trying to protect your web applications,\" says Carl Herberger, vice president of security solutions for Radware. \"We have taken actionable steps to provide enterprise with a unified hybrid solution against web-based attacks regardless if protection is needed on-premise or in the cloud and provide better security when moving applications to the cloud as well as ease of security policy orchestration and automation.\"In addition to protection from various web attacks, Radware's Hybrid Cloud WAF can also defend and mitigate a wide range of DDoS attacks through its always-on DDoS attack protection, and provide comprehensive detection and mitigation of attacks with minimal false positives and no impact on legitimate traffic.\"When there is no technical integration between on-premise and cloud WAF technologies, organizations are faced with poor quality of detection resulting in poor mitigation options,\" says Jon Oltsik, senior principal analyst, Enterprise Strategy Group. \"Radware's Hybrid Cloud WAF Service can help bridge this gap by integrating its on-premise devices and WAF technologies with cloud-based coverage to deliver a comprehensive detection and mitigation solution.\"The Hybrid Cloud WAF Service also provides full coverage from all of OWASP's Top 10 security risks and is backed by Radware's Emergency Response Team \u2013 a dedicated group of security experts that can actively monitor and mitigate attacks in real time.For additional information on Radware's Hybrid Cloud WAF service, please visit http:\/\/www.radware.com\/hybridcloudwaf or visit Radware at booth S2021 during this year's RSA Conference in San Francisco, CA.About RadwareRadware (Nasdaq:RDWR), is a global leader of application delivery and application security solutions for virtual, cloud and software defined data centers. Its award-winning solutions portfolio delivers service level assurance for business-critical applications, while maximizing IT efficiency. Radware's solutions empower more than 10,000 enterprise and carrier customers worldwide to adapt to market challenges quickly, maintain business continuity and achieve maximum productivity while keeping costs down. For more information, please visit www.radware.comRadware encourages you to join our community and follow us on: Facebook, Google+, LinkedIn, Radware Blog, SlideShare, Twitter, YouTube, Radware Connect app for iPhone\u00ae and our security center DDoSWarriors.com that provides a comprehensive analysis on DDoS attack tools, trends and threats.\u00a92015 Radware, Ltd. All rights reserved. Radware and all other Radware product and service names are registered trademarks or trademarks of Radware in the U.S. and other countries. All other trademarks and names are property of their respective owners.Safe Harbor StatementThis press release may contain statements concerning Radware's future prospects that are \"forward-looking statements\" under the Private Securities Litigation Reform Act of 1995. Statements preceded by, followed by, or that otherwise include the words \"believes\", \"expects\", \"anticipates\", \"intends\", \"estimates\", \"plans\", and similar expressions or future or conditional verbs such as \"will\", \"should\", \"would\", \"may\" and \"could\" are generally forward-looking in nature and not historical facts. Because such statements deal with future events, they are subject to various risks and uncertainties and actual results, expressed or implied by such forward-looking statements, could differ materially from Radware's current forecasts and estimates. Factors that could cause or contribute to such differences include, but are not limited to: the impact of global economic conditions and volatility of the market for our products; changes in the competitive landscape; inability to realize our investment objectives; timely availability and customer acceptance of this new product and of our existing products; risks and uncertainties relating to acquisitions; the impact of economic and political uncertainties and weaknesses in various regions of the world, including the commencement or escalation of hostilities or acts of terrorism; Competition in the market for Application Delivery and Network Security solutions and our industry in general is intense; and other factors and risks on which we may have little or no control. This list is intended to identify only certain of the principal factors that could cause actual results to differ. For a more detailed description of the risks and uncertainties affecting Radware, reference is made to Radware's Annual Report on Form 20-F which is on file with the Securities and Exchange Commission (SEC) and the other risk factors discussed from time to time by Radware in reports filed with, or furnished to, the SEC. Forward-looking statements speak only as of the date on which they are made and, except as required by applicable law, Radware undertakes no commitment to revise or update any forward-looking statement in order to reflect events or circumstances after the date any such statement is made. Radware's public filings are available from the SEC's website at www.sec.gov or may be obtained on Radware's website at www.radware.com.Corporate Media Relations:\nBrian T. Gallagher\n(201) 785-3206 (office)\n(201) 574-3840 (cell)\nSource: Globenewswire Public\nRadware Introduces Industry's First Hybrid Cloud Based WAF Service\n\t\t\t\n\t\t\n\t\t\n\t\t\n\t\t\n\n", "source": "www.military-technologies.net", "publishDate": "2015-04-20T11:30:00+02:00", "sourceType": "blog", "language": "en", "googleRank": 2, "relatedDocs": [ ] }, { "id": 186714016, "url": "http:\/\/rt.com\/usa\/251101-computer-expert-banned-tweets\/?utm_source=rss&utm_medium=rss&utm_campaign=RSS", "title": "\n US computer expert \u00e2\u0080\u0098grounded\u00e2\u0080\u0099 after playful plane security tweets\n\n \n \n\t\t\t\t\t\t\n \n Published time", "content": "\n US computer expert \u00e2\u0080\u0098grounded\u00e2\u0080\u0099 after playful plane security tweets\n\n \n \n\t\t\t\t\t\t\n \n Published time: April 20, 2015 09:17 \n \n\t\t\t\t\t\t\n \n \n \n \n \n \n \n \n Reuters\/Adnan Abidi\n \n\n \n \n \n \n \n When a computer security expert from Denver tweeted some amusing remarks about hacking the onboard systems of his United Airlines flight, he didn\u00e2\u0080\u0099t know FBI agents would be waiting at his destination. Later, he was refused boarding to another flight.\n \n\n Watch out what you tweet \u00e2\u0080\u0093 or face the consequences! Chris\n Roberts, of One World Labs in Denver, has learnt that sharing\n knowledge in Twitter about how transport security systems operate\n is a bad idea.\n\n On Wednesday, when Roberts flew from Denver to Syracuse, N.Y.,\n after boarding, he posted a tweet about what he would do if he\n managed to hack the aircraft\u00e2\u0080\u0099s computers.\n\n \n Find myself on a 737\/800, lets see Box-IFE-ICE-SATCOM, ? Shall\n we start playing with EICAS messages? \"PASS OXYGEN ON\" Anyone ?\n :)\n \n \n \u00e2\u0080\u0094 Chris Roberts (@Sidragon1) April\n 15, 2015\n \n\n EICAS stands for \u00e2\u0080\u009cengine-indicating and crew-alerting system\u00e2\u0080\u009d, so\n Roberts actually pondered playing with the aircraft's onboard\n communication system.\n\n It was enough to get him acquainted with FBI agents, who were\n waiting for him in Syracuse. They questioned him for four hours.\n\n Roberts was released after interrogation, but practically all his\n personal electronic equipment, including a MacBook Pro, an iPad,\n several hard drives and USB memory sticks, were confiscated.\n Roberts proved this by posting an FBI \u00e2\u0080\u009creceipt for Property\n Received.\u00e2\u0080\u009d The only electronic item Roberts was allowed to\n keep was his iPhone, Forbes.com reported.\n\n A member of the security research community himself, Roberts\n expressed surprise with the pace of developments, though he\n should have known better that everything posted online is\n constantly monitored by numerous US security agencies.\n\n \n Lesson from this evening, don't mention planes....the Feds ARE\n listening, nice crew in Syracuse, left there naked of\n electronics\n \n \n \u00e2\u0080\u0094 Chris Roberts (@Sidragon1) April\n 16, 2015\n \n\n \n After returning to Denver for a couple of days, Roberts headed\n for San Francisco on Saturday to take part in the RSA Conference\n 2015 cyber security summit.\n\n In the airport, reportedly already after passing the gate, he was\n told by United Airlines staff he wouldn\u00e2\u0080\u0099t be allowed on board.\n\n Since Roberts had made public statements about airfare equipment\n and aircraft systems manipulation, \"That's something we just\n can't have,\" said United Airlines spokesman Rahsaan Johnson,\n explaining this is not only a \"violation of United's\n policies\" but \"it's not something we want our inflight\n crews and customers to deal with,\" Johnson said.\n\n \n Johnson also said Roberts was notified about the company\u00e2\u0080\u0099s\n decision not to provide him with their service several hours\n before the incident.\n\n \u00e2\u0080\u009cWe reached out to him several hours before departure and had\n a conversation with him,\u00e2\u0080\u009d Johnson said.\n\n But Mr Roberts nevertheless opted to take a chance and attempted\n to fly.\n\n \u00e2\u0080\u009cRoberts was told to expect a letter explaining the reasons\n for not being allowed to travel on United,\" Roberts\u00e2\u0080\u0099\n lawyers, from the Electronic Frontier Foundation (EFF) cyber\n rights group in San Francisco, said on Saturday.\n\n Chris Roberts, who among other things researches vulnerabilities\n of transportation systems, managed to get to San Francisco the\n same day using another airline\u00e2\u0080\u0099s flight.\n\n \n Special speaker, Chris Roberts of @OneWorldLabs presenting\n at our @iSecure_LLC Cyber\n Security Summit today! #InfoSecpic.twitter.com\/73Wb11hfJG\n \n \n \u00e2\u0080\u0094 Donna Anna Smith (@DonnaAnnaSmith) April\n 16, 2015\n \n\n United's refusal to allow Roberts aboard its flight \"is both\n disappointing and confusing. As a member of the security research\n community, his job is to identify vulnerabilities in networks so\n they can be fixed,\" EFF's Andrew Crocker commented on the\n Electronic Frontier Foundation's website on Saturday.\n\n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n\n\n\n\n\n \n \n ", "source": "www.russiatoday.com", "publishDate": "2015-04-20T11:17:16+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186711440, "url": "http:\/\/feeds.reuters.com\/~r\/reuters\/companyNews\/~3\/UPNZsxh2hlY\/story01.htm", "title": "\n\n\nTEL AVIV, April 20 (Reuters) - Network security provider\nCheck Point Software Technologies reported quarterly\nprofit that topped expectations on higher sales and said it\nwould accelerate its focus ", "content": "\n\n\nTEL AVIV, April 20 (Reuters) - Network security provider\nCheck Point Software Technologies reported quarterly\nprofit that topped expectations on higher sales and said it\nwould accelerate its focus on threat prevention and mobility.\nCheck Point earned 95 cents a share excluding one-time items\nin the first quarter, up from 84 cents a year earlier. Revenue\ngrew 9 percent to $373 million, the Israel-based company said\non Monday.Check Point was forecast to have earned 91 cents a share on\nrevenue of $370 million, according to Thomson Reuters I\/B\/E\/S.Check Point has acquired two Israeli companies since the\nstart of the year. In February it bought cyber security start-up\nHyperwise and earlier this month it said it was buying Lacoon\nMobile Security to help prevent cyber attacks on mobile phones.\"We increased our development, sales and marketing teams to\ncapitalise on the expanding security market opportunity. We\nexpect these investments to continue through the coming\nquarters,\" Chief Executive Officer Gil Shwed said. \n\n (Reporting by Tova Cohen; Editing by Steven Scheer)\n\n", "source": "www.reuters.com", "publishDate": "2015-04-20T11:15:29+02:00", "sourceType": "news", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186732362, "url": "http:\/\/feeds.businesswire.com\/click.phdo?i=77c6f9b60e1fd6e27c68c497e1094b64", "title": "\n\t\t\t\tMCLEAN, Va.--(BUSINESS WIRE)--If the past 12 months saw a dramatic increase in data breach activity, \n then the year ahead promises to bring an entirely new set of concerns \u2013 \n and a sh", "content": "\n\t\t\t\tMCLEAN, Va.--(BUSINESS WIRE)--If the past 12 months saw a dramatic increase in data breach activity, \n then the year ahead promises to bring an entirely new set of concerns \u2013 \n and a shift in how companies are responding to the cyber threat. \n Increasingly, companies are exploring a more \u201cactive defense\u201d approach \n to cyber security, while preparing for an entirely new set of threats to \n medical data, connected vehicles, mobile payments, and Internet \n of Things as well as emerging technologies like \u201cwearables.\u201d \n Traditional incident response \u2013 the rapid deployment of a team to \n remediate breaches to a network, identify additional threats and restore \n functionality \u2013 is necessary, but no longer sufficient. The \n connectedness of our cyber network demands intelligence-driven tools and \n processes that equip leaders with an anticipatory edge. Those are among \n the trends identified by Booz \n Allen Hamilton (NYSE:BAH) as the company offers lessons in incident \n response and examines trends that will shape how organizations prepare \n for and respond to cyber attacks.\n \n\n\n \n \u201cWhen it comes to data security, the fundamentals have changed,\u201d said Bill \n Stewart, executive vice president at Booz Allen and leader of the \n firm\u2019s commercial cyber business. \u201cNews of a large-scale data breach is \n nearly an everyday occurrence, while the scope and long-term damage \n associated with cyber incidents are escalating.\u201d U.S. data breaches hit \n a record high of 783 in 2014 according to the Identity Theft Resource \n Center, a 27.5 percent year-over-year increase.\n \n \n As data security becomes a top priority for organizations of all sizes, \n Booz Allen\u2019s team of cyber experts sifted through the noise to determine \n what trends might shape the next 12 months. \u201cThe companies we speak with \n are tired of chasing the problem: they want to do better than fight the \n next battle with the last war\u2019s plan,\u201d said Bill Stewart. \u201cLooking \n ahead, we see both new, daunting risks and a shift in how companies \n tackle the cyber security challenge.\u201d\n \n \n \n \n \u00a0\n \n \n \u00a0\n \n \n \n Emerging Trends: Big Changes in Cyber Risk, Detection, Improved \n Incident Response\n \n \n \n \n \n \n \n \n \n \u00a0\n \n \n \n \n \n \n \n \n \n 1.\n \n \n \n \u00a0\n \n \n \n Internet of things expands cyber \u201cattack surface\u201d \u2013 For \n enterprise IT managers, cyber threats have existed in largely two \n dimensions \u2013 behind the firewall and beyond. But with the \n \u201cInternet of Things,\u201d cyber risk now stretches across a third \n dimension. Employees may come to work with a compromised wearable \n device, or pull their hacked connected vehicle into the company \n parking lot. This creates a new type of cyber risk for \n organizations \u2013 with significantly increased complexity and \n exposure. As the Internet of Things increases the cyber \u201cattack \n surface,\u201d companies must broaden defenses to include the plethora \n of embedded devices that now make up their ecosystem.\n \n \n \n \n \n \n \n \n \n \u00a0\n \n \n \n \n \n \n \n \n \n 2.\n \n \n \n \n \n \n \u201cProactive defense\u201d becomes best practice \u2013 Recent \n corporate victims of cyber attacks have one thing in common: they \n all thought they were prepared. Tired of being a step behind, \n companies will gravitate to a more active, anticipatory approach \n to preparedness and defense, one that looks over the horizon at \n emerging criminal patterns and active threat actors. We will see \n more organizations take an \u201cintel to operations\u201d model that \n enables companies to use real-time intelligence and threat \n assessment data to shape decision making, fine tune defenses and \n pre-empt emerging threats. \u201cIt\u2019s a shift similar to what took \n place in natural disaster response, where use of predictive \n weather data enables communities to take preventive measures \n before the storm hits,\u201d added Stewart.\n \n \n \n \n \n \n \n \n \n \u00a0\n \n \n \n \n \n \n \n \n \n 3.\n \n \n \n \n \n \n \u201cIncident response\u201d hype meets reality \u2013 The cyber market \n is crowded with companies that market an \u201cincident response\u201d \n capability in the event of a data breach. Yet is there enough \n experienced cyber talent to staff up all of these companies? Do \n these offerings include the right balance of multidisciplinary \n expertise necessary to be successful (e.g., Crisis Communications, \n Legal, Policy, Business and Technical)? Expect CISOs and other \n corporate leaders to take a more discerning look at the latest \n incident response offers; the people behind them, and their \n step-by-step methodology. Their goal should be to position their \n firms to successfully navigate an incident and prevent negative \n repercussions.\n \n \n \n \n \n \n \n \n \n \u00a0\n \n \n \n \n \n \n \n \n \n 4.\n \n \n \n \n \n \n Preparedness moves beyond dollars, compliance \u2013 Companies \n are devoting significant resources to building up their cyber \n defenses \u2013 and often quantifying those steps in dollars spent and \n compliance achieved. Yet as data breaches multiply and their reach \n broadens, scrutiny of preparedness will shift away from the \u201chow much\u201d \n to the \u201chow\u201d and \u201cwho.\u201d How many people are engaged? What are \n their backgrounds? What software tools are being used? Cyber \n security will continue to evolve from a compliance issue to a \n strategic, business-critical priority. This will trigger a greater \n interest in \u201cwhat\u2019s under the hood.\u201d\n \n \n \n \n \n \n \n \n \n \u00a0\n \n \n \n \n \n \n \n \n \n 5.\n \n \n \n \n \n \n Embedded Security is now an undeniable requirement \u2013 It is \n a new necessity that presents a competitive opportunity. As \n Internet connectivity touches everything from light bulbs to \n vehicles and electric turbines, cyber security and risk management \n increasingly must be accounted for when designing and producing \n products. And with end users increasingly concerned about privacy \n and data security, strong embedded security becomes a market \n enabler, differentiating a company and its products in a \n competitive market.\n \n \n \n \n \n \n \n \n \n \u00a0\n \n \n \n \n \n \n \n \n \n 6.\n \n \n \n \n \n \n The c-suite rethinks cyber response \u2013 To date, the CIO or \n CISO has taken the reigns (and, too often, the blame) when a cyber \n crisis hits. Yet as companies understand the inevitable business \n impact of a cyber event there is movement to a new model. For \n example: adding a \n business leader within the c-suite with the explicit role of \n driving data breach response activities across all facets of the \n organization. A move a way from the current approach of assigning \n this job to a technology executive. Fueling interest in a \n different approach: workforce changes, new, emerging threats, and \n constantly evolving \u201cbest practice\u201d response tactics.\n \n \n \n \n \n \n \n \n \n \n \n \n \n \u00a0\n \n \n \n \n \u201cWe are entering an entirely new phase in the fight against cyber \n threats,\u201d said Christopher \n Ling, executive vice president and leader of Booz Allen\u2019s \n cybersecurity business. With every widely reported breach, cyber \n security is moving from the \u2018to do\u2019 list to a CEO and Board level \n priority. We expect to see a fundamental shift in how companies prepare, \n which will only grow more urgent as new threats emerge.\u201d\n \n \n At the 2015 RSA Conference, senior leaders from Booz Allen will discuss \n the growing cyber security challenges facing organizations and new \n solutions that will shape best practice preparedness and response in the \n months ahead. For the complete line-up of the firm\u2019s participation in \n RSA 2015, visit: http:\/\/www.boozallen.com\/lp\/rsa-usa-2015 \n and follow us on Twitter (@BoozAllen) and #RSAC.\n \n \n ABOUT BOOZ ALLEN HAMILTON\n \n \n Booz Allen Hamilton is a leading provider of management consulting, \n technology, and engineering services to the US government in defense, \n intelligence, and civil markets, and to major corporations and \n not-for-profit organizations. Booz Allen is headquartered in McLean, \n Virginia, employs more than 22,000 people, and had revenue of $5.48 \n billion for the 12 months ended March 31, 2014. In 2014, Booz Allen \n celebrated its 100th anniversary year. To learn more, visit www.boozallen.com. \n (NYSE:BAH).\n \n \n BAHPR-CO\n \n \n \n\t\t\t\t\n\t\t\t\n\t\t\t", "source": "businesswire.com", "publishDate": "2015-04-20T11:00:00+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186732380, "url": "http:\/\/feeds.businesswire.com\/click.phdo?i=381b08bda3fe971f13b0d0ccccb1680a", "title": "\n\t\t\t\tBERLIN--(BUSINESS WIRE)--KikuSema GmbH (www.scrambledsecrets.com, \n www.fabularosa.com, \n www.kikusema.com) \n welcomes the paradigm shift towards \"friendly front doors with multipl", "content": "\n\t\t\t\tBERLIN--(BUSINESS WIRE)--KikuSema GmbH (www.scrambledsecrets.com, \n www.fabularosa.com, \n www.kikusema.com) \n welcomes the paradigm shift towards \"friendly front doors with multiple \n big locks\" instead of backdoors. Furthermore KikuSema GmbH announces \n having a working solution for realizing the Split-Key Approach in its \n portfolio.\n \n\n\n \n NSA-Director Michael Rogers has recently claimed the Split-Key-Approach \n in his speech at Princeton University. The launching of this initiative \n by that person and his country is a forward-locking message.\n \n \n For five years KikuSema GmbH has dealt with the subjects:\n \n \n \n Collaborate SecurityMixture of trust, control and functioning \n when interests coincide\n \n \n Multi-Instance-Authentication vs. Multi-factor-Authentication\n \n \n Overcoming of the limitation caused by Keyhole-Security\n \n \n Claim your Own Privacy (CYOP) guaranteed by the government\n \n \n Absolute part: The impact of the intellectual power of human beings\n \n \n \n The influence of KikuSema GmbH on institutions or people is much smaller \n than that of Admiral Roger's Agency. Consequently, it was our strategy \n to demonstrate our ideas in real apps and protocols in order to show \n that these ideas work really well.\n \n \n Recently we've taken the steps:\n \n \n \n Submission for Innovation Sandbox at RSA Conference 2015 in San \n Francisco\n \n \n Presentation and live demo of Scrambled Secrets in December 2014 at \n PASSWORDS 2014 Conference in Trondheim\n \n \n E-Mail to the White House on the occasion of Summit on Cyber Security \n and Consumer Protection\n \n \n \n In decades there will be a crisis in Information and Communication \n Technology comparable to the banking crisis. The impact will not remain \n virtual. An expected loss of confidence in the Internet, apps and \n enterprises will be generate huge and real economic deficits. The \n diversification into many small \"islands of trust and collaborate \n security\" could tone down this crisis.\n \n \n The core product of KikuSema GmbH is the authentication app FabulaRosa \n augmented by Five New Protocols. The fifth is named \"Scrambled Secrets\". \n An essential property of Scrambled Secrets is to create one or more keys \n using an innovative graphical interface and the extremely good \n memorability.\n \n \n \"A new kind of security a so called Multi-Instance-Mode is necessary\" \n said Ulf Ziske, founder and developer of KikuSema GmbH and highlights: \n \"We have to step into a world of diversity and Collaborative Security.\"\n \n \n For more detailed facts please follow the links:\n \n \n www.youtube.com\/watch?v=_otwSWEUw7w\n \n \n www.goldenbridgeawards.com\/people\/Ulf-Ziske.html#.VSuxHfmsV8G\n \n \n http:\/\/video.adm.ntnu.no\/pres\/549404989d112\n \n \n Awards:\n \n \n \n 2014 San Francisco \u2013 Gold Winner in Golden Bridge Awards for Mobile \n Security Solution\n \n \n 2013 San Francisco \u2013 Gold Winner for \u201cTomorrow\u2019s Technology Today\u201d in \n Info Security's Global Excellence Awards\n \n \n 2013 London \u2013 Nominated as TOP-5-Finalists for Global Security \n Challenge\n \n \n 2012 Washington D.C. - Winner of the Best Privileged Access Management \n Solution in GSN's Homeland Security Awards\n \n \n 2011 Tel Aviv - Nominated as the TOP-10-European-Finalists for Global \n Security Challenge\n \n \n 2010 San Francisco \u2013 Nominated for Innovation Sandbox at RSAC: \n Graphical Password and Protocols\n \n \n\t\t\t\t\n\t\t\t\n\t\t\t", "source": "businesswire.com", "publishDate": "2015-04-20T10:38:00+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186716579, "url": "http:\/\/www.wcyb.com\/news\/politics\/fbi-agent-testifies-in-broadwell-case\/32456702", "title": "\n \n (CNN) - \n The FBI special agent who brought the David Petraeus-Paula Broadwell cyberstalking case to the attention of law enforcement recently test", "content": "\n \n (CNN) - \n The FBI special agent who brought the David Petraeus-Paula Broadwell cyberstalking case to the attention of law enforcement recently testified that the FBI handled the case under political pressure because of the 2012 presidential election, \"marginalizing\" and making crude insinuations about the victim in the case, Jill Kelley, whom they cast as \"some femme fatale.\"\n \n \n In the redacted March 20 deposition, obtained from a source by CNN, Special Agent Frederick W. Humphries II claimed under oath that he \"was told by supervisors that\" the 2012 presidential election \"would explain the potential reason why there was so much interference\" in the case \"from headquarters, that nobody wanted this case during an election cycle.\"The deposition is part of the lawsuit brought by Dr. Scott and Jill Kelley against government agencies, departments and major figures in the Obama administration for allegedly defaming their character in the Petraeus-Broadwell sex scandal. The affair between Petraeus and Broadwell, his biographer-turned lover, brought a disgraced end to the decorated general's career.Though the Kelleys were the victims of the original cyberstalking case, as the Petraeus scandal exploded in the public, many in the media painted Jill Kelley in a particularly unflattering light.Petraeus pleaded guilty last month to one federal charge of removing and retaining classified information, having improperly shared his black books with Broadwell and lied about it to the FBI. He is scheduled to be sentenced on Thursday. All charges against Broadwell were dropped in December 2012.Humphries testified he believed Kelley's name had been leaked by someone at FBI headquarters \"and it seemed to be a purposeful attempt to discredit both Mrs. Kelley and myself.\"Humphries said in his deposition he was confused by FBI's leaders' focus on Jill Kelley instead of Broadwell, whom they identified as the cyberstalker as early as June 2012. He testified her actions compromised security of high-level military intelligence personnel and information, but for some reason higher-ups in the FBI kept interfering in what seemed to him to be a fairly straightforward case. In one incident, FBI agents were called back from the airport as they were about to fly to North Carolina to interview Broadwell.All the while, the FBI kept shifting focus on the victims in the case, Humphries testified, or more specifically on Jill Kelley. He wondered if this warped view of the case was rooted in \"ineptness, incompetence or was politically motivated,\" he testified.Law enforcement officials told CNN what Humphries and others regarded as interference from headquarters could also be seen as efforts to ensure the FBI did everything by the book in a highly sensitive case. (They got court-approved warrants for things normally the FBI can administratively subpoena). Some at the FBI thought Humphries did things to keep inserting himself into the case even after he was told to recuse himself given that he had a friendly relationship with Kelley. Those efforts allegedly include attempts at communication that Humphries is said to have had during the course of the investigations with then-House Majority Leader Eric Cantor, R-Virginia.He testified that he and his wife and children are friends with the Kelleys and their children through their outreach to the military and law enforcement communities in Tampa, and did not understand his bosses' insinuations or harsh judgments.A request for comment made by CNN to a representative of Paula Broadwell was not met by press time.Alan Raul, an attorney for the Kelleys, also declined comment to CNN on Sunday, as did Petraeus attorney Robert Barnett. A spokesman for the Justice Department did not return a call from CNN on Sunday; a spokesman for the FBI did not offer any comment. The administration has refrained from commenting on the case in the past given the current litigation.FBI blaming the victims?The story began in May 2012, when four-star Gen. John Allen began receiving emails from \"[email protected],\" which \"disparaged\" Kelley and referenced an upcoming private dinner the Kelleys were hosting with \"several senior foreign intelligence, defense and diplomatic officials,\" according to the lawsuit. The email troubled Allen given the potential security concern and \"frightened the Kelleys, as it indicated that Mrs. Kelley was being followed or stalked, and raised serious concerns about her own safety and well being, particularly given the number of terrorist risks faced by CENTCOM leaders.\"Broadwell later admitted to having sent that email as well as another from \"Tampa Angel\" to Dr. Scott Kelley, also disparaging his wife, promising \"embarrassment for all, including spouses, such as info in national headlines.\"Jill Kelley reached out to Humphries, an FBI Agent whom she and her husband knew socially. \"She explained that Gen. Allen had received an odd email,\" Humphries testified, noting that \"whoever sent these emails is either in close physical proximity or has penetrated the cyber security of these folks to include the director of the Central Intelligence Agency, Director Petraeus, and I was worried and concerned for his safety, the safety of the generals.\"Humphries thought the emails \"ominous\" and contacted Special Agent Adam Malone of the Tampa Cyber Squad. \"We had already reached the threshold on the cyber or physical security of senior government leadership and possible their email,\" he said.By the third week of June, the FBI had identified Broadwell as the cyberstalker, Humphries said, relating how he saw FBI videotape of \"a BMW pulling up to a Starbucks in North Carolina and shortly thereafter the alleged subject of the case enters and logs on, and some of the emails were being sent, so they had a firm idea of who it was.\"\n\n ", "source": "www.wcyb.com", "publishDate": "2015-04-20T10:01:11+02:00", "sourceType": "web", "language": "en", "googleRank": 5, "relatedDocs": [ ] }, { "id": 186700771, "url": "http:\/\/www.msn.com\/en-ph\/news\/world\/new-zealand-pm-happy-to-talk-to-china-about-spy-claims\/ar-AAbl0x3?srcref=rss", "title": "\n New Zealand Prime Minister John Key on Monday invited Chinese officials to quiz him about reports that Wellington worked with US intelligence on a plan to hack Chinese diplomatic communications.\n \n\n", "content": "\n New Zealand Prime Minister John Key on Monday invited Chinese officials to quiz him about reports that Wellington worked with US intelligence on a plan to hack Chinese diplomatic communications.\n \n\n \n \n \n \n \n\n\n\n\n\n \u00a9 AFP\/File\n New Zealand's Prime Minister John Key, pictured during a press conference in Wellington, on November 20, 2014\n\n\nBeijing has reportedly expressed concern at the claims, which are based on documents from US whistleblower Edward Snowden obtained by Auckland's Herald on Sunday newspaper.The newspaper reported that New Zealand intelligence and the US National Security Agency collaborated on a plan to hack a data link between China's consulate in Auckland and a nearby visa office run by the Chinese.It said it was unclear whether the hack went ahead because Snowden fled the NSA in May 2013, before it had come to fruition.State news agency Xinhua said the Chinese embassy in Wellington issued a statement saying it was concerned about the report and attached great importance to cyber security.\"We will firmly safeguard our security interests and continue to guarantee our cyber and information security with concrete measures,\" it said.\"At present, cyber space is riddled with chaos and uncertainty. China proposes to settle disputes through dialogue and formulate codes to regulate cyber space behaviours that are acceptable to all sides.\"Key refused to comment on the report, saying only that the documents it was based upon had been stolen.\"I'm not going to talk about any foreign intelligence that we gather from any country or any particular reason, all I can tell you is that we gather information when it's in the best interests of New Zealand,\" he told TV3. He refused to speculate on whether the issue could damage relations with China, New Zealand\u2019s largest trading partner.\"You're asking a hypothetical question and I'm not going to do that because I can't give you an answer, I don't know,\" he said.\"What I can tell you is we've got an immensely strong relationship with China, it's very open and we talk to them about all sorts of things,\"If they want to raise any issue with us they're welcome to, but I'd be surprised if they do.\"New Zealand is part of the \"Five Eyes\" intelligence network which also includes the United States, Britain, Australia and Canada.Snowden documents released last month alleged Wellington was conducting mass surveillance on its South Pacific neighbours and passing the information onto its Five Eyes partners.\n\n ", "source": "news.ph.msn.com", "publishDate": "2015-04-20T09:01:44.254+02:00", "sourceType": "web", "language": "en", "googleRank": 4, "relatedDocs": [ ] }, { "id": 186700372, "url": "http:\/\/gulftoday.ae\/portal\/577520ed-9384-41ee-89e2-b268e32cbdb3.aspx", "title": " \n \n \n WELLINGTON: New Zealand Prime Minister John Key on Monday invited Chinese officials to quiz him about", "content": " \n \n \n WELLINGTON: New Zealand Prime Minister John Key on Monday invited Chinese officials to quiz him about reports that Wellington worked with US intelligence on a plan to hack Chinese diplomatic communications.Beijing has reportedly expressed concern at the claims, which are based on documents from US whistleblower Edward Snowden obtained by Auckland\u2019s Herald on Sunday newspaper.The newspaper reported that New Zealand intelligence and the US National Security Agency collaborated on a plan to hack a data link between China\u2019s consulate in Auckland and a nearby visa office run by the Chinese.It said it was unclear whether the hack went ahead because Snowden fled the NSA in May 2013, before it had come to fruition.State news agency Xinhua said the Chinese embassy in Wellington issued a statement saying it was concerned about the report and attached great importance to cyber security.\u201cWe will firmly safeguard our security interests and continue to guarantee our cyber and information security with concrete measures,\u201d it said.\u201cAt present, cyber space is riddled with chaos and uncertainty. China proposes to settle disputes through dialogue and formulate codes to regulate cyber space behaviours that are acceptable to all sides.\u201d Key refused to comment on the report, saying only that the documents it was based upon had been stolen.\u201cI\u2019m not going to talk about any foreign intelligence that we gather from any country or any particular reason, all I can tell you is that we gather information when it\u2019s in the best interests of New Zealand,\u201d he told TV3. He refused to speculate on whether the issue could damage relations with China, New Zealand\u2019s largest trading partner.\u201cYou\u2019re asking a hypothetical question and I\u2019m not going to do that because I can\u2019t give you an answer, I don\u2019t know,\u201d he said.\u201cWhat I can tell you is we\u2019ve got an immensely strong relationship with China, it\u2019s very open and we talk to them about all sorts of things, \u201cIf they want to raise any issue with us they\u2019re welcome to, but I\u2019d be surprised if they do.\u201d New Zealand is part of the \u201cFive Eyes\u201d intelligence network which also includes the United States, Britain, Australia and Canada.Snowden documents released last month alleged Wellington was conducting mass surveillance on its South Pacific neighbours and passing the information onto its Five Eyes partners.Agence France-Presse \n \n \n ", "source": "gulftoday.ae", "publishDate": "2015-04-20T08:59:46.858+02:00", "sourceType": "blog", "language": "en", "googleRank": 6, "relatedDocs": [ ] }, { "id": 186696048, "url": "http:\/\/www.thenewage.co.za\/Detail.aspx?news_id=156905&cat_id=1020", "title": "New Zealand Prime Minister John Key. Picture: Getty Images \n New Zealand Prime Minister John Key on Monday invited Chinese officials to quiz him about reports that Wellingto", "content": "New Zealand Prime Minister John Key. Picture: Getty Images \n New Zealand Prime Minister John Key on Monday invited Chinese officials to quiz him about reports that Wellington worked with US intelligence on a plan to hack Chinese diplomatic communications. \n\u00a0 \nBeijing has reportedly expressed concern at the claims, which are based on documents from US whistleblower Edward Snowden obtained by Auckland's Herald on Sunday newspaper. \n\u00a0 \nThe newspaper reported that New Zealand intelligence and the US National Security Agency collaborated on a plan to hack a data link between China's consulate in Auckland and a nearby visa office run by the Chinese. \n\u00a0 \nIt said it was unclear whether the hack went ahead because Snowden fled the NSA in May 2013, before it had come to fruition. \n\u00a0 \nState news agency Xinhua said the Chinese embassy in Wellington issued a statement saying it was concerned about the report and attached great importance to cyber security. \n\u00a0 \n\"We will firmly safeguard our security interests and continue to guarantee our cyber and information security with concrete measures,\" it said. \n\u00a0 \n\"At present, cyber space is riddled with chaos and uncertainty. China proposes to settle disputes through dialogue and formulate codes to regulate cyber space behaviours that are acceptable to all sides.\" \n\u00a0 \nKey refused to comment on the report, saying only that the documents it was based upon had been stolen. \n\u00a0 \n\"I'm not going to talk about any foreign intelligence that we gather from any country or any particular reason, all I can tell you is that we gather information when it's in the best interests of New Zealand,\" he told TV3.\u00a0 \n\u00a0 \nHe refused to speculate on whether the issue could damage relations with China, New Zealand\u2019s largest trading partner. \n\u00a0 \n\"You're asking a hypothetical question and I'm not going to do that because I can't give you an answer, I don't know,\" he said. \n\u00a0 \n\"What I can tell you is we've got an immensely strong relationship with China, it's very open and we talk to them about all sorts of things, \n\u00a0 \n\"If they want to raise any issue with us they're welcome to, but I'd be surprised if they do.\" \n\u00a0 \nNew Zealand is part of the \"Five Eyes\" intelligence network which also includes the United States, Britain, Australia and Canada. \n\u00a0 \nSnowden documents released last month alleged Wellington was conducting mass surveillance on its South Pacific neighbours and passing the information onto its Five Eyes partners. \n\u00a0 \n-AFP \n\u00a0 \n ", "source": "www.thenewage.co.za", "publishDate": "2015-04-20T08:25:03.138+02:00", "sourceType": "web", "language": "en", "googleRank": 5, "relatedDocs": [ ] }, { "id": 186692349, "url": "http:\/\/en.wikipedia.org\/w\/index.php?title=Patient_Protection_and_Affordable_Care_Act&diff=657287757&oldid=657231840", "title": "\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t \n\t\t\t\t\u00a0\n\t\t\t\t\n Line 47:\n Line 47:\n\n\n \u00a0\n On June 28, 2012, the [[Supreme Court of the United States|United States Supreme Court]] upheld the constitutionality of the AC", "content": "\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t \n\t\t\t\t\u00a0\n\t\t\t\t\n Line 47:\n Line 47:\n\n\n \u00a0\n On June 28, 2012, the [[Supreme Court of the United States|United States Supreme Court]] upheld the constitutionality of the ACA's individual mandate as an exercise of Congress's taxing power<ref>{{cite news|title=Supreme Court Upholds PPACA|author=ABA Health eSource|url=http:\/\/www.americanbar.org\/newsletter\/publications\/aba_health_esource_home\/aba_health_law_esource_0712_howell.html|date=July 12, 2012|accessdate=November 20, 2013}}<\/ref> in the case ''[[National Federation of Independent Business v. Sebelius]]''. However, the Court held that states cannot be forced to participate in the ACA's [[Patient Protection and Affordable Care Act#State rejections of Medicaid expansion|Medicaid expansion]] under penalty of losing their current Medicaid funding.<ref>Pg 55\u201358, slip opinion, ''National Federation of Independent Business v. Sebelius'', U.S. Supreme Court (June 28, 2012)<\/ref><ref>{{cite news|title=Supreme Court Supports Obamacare, Bolsters Obama|first=Paul M.|last=Barrett|url=http:\/\/www.businessweek.com\/articles\/2012-06-28\/supreme-court-supports-obamacare-and-bolsters-obama|newspaper=BloombergBusinessweek|date=June 28, 2012|accessdate=June 30, 2012}}<\/ref><ref>{{cite news|title=Obamacare upheld by the U.S. Supreme Court|author=National Post Wire Services|url=http:\/\/news.nationalpost.com\/2012\/06\/28\/obamacare-upheld-by-the-u-s-supreme-court|newspaper=National Post|date=June 28, 2012|accessdate=June 30, 2012}}<\/ref> Since the ruling, the law and its implementation have continued to face challenges in [[United States Congress|Congress]] and [[United States federal courts|federal courts]], and from some [[State governments of the United States|state governments]], [[Conservatism in the United States|conservative]] advocacy groups, labor unions, and small business organizations.\n \u00a0\n On June 28, 2012, the [[Supreme Court of the United States|United States Supreme Court]] upheld the constitutionality of the ACA's individual mandate as an exercise of Congress's taxing power<ref>{{cite news|title=Supreme Court Upholds PPACA|author=ABA Health eSource|url=http:\/\/www.americanbar.org\/newsletter\/publications\/aba_health_esource_home\/aba_health_law_esource_0712_howell.html|date=July 12, 2012|accessdate=November 20, 2013}}<\/ref> in the case ''[[National Federation of Independent Business v. Sebelius]]''. However, the Court held that states cannot be forced to participate in the ACA's [[Patient Protection and Affordable Care Act#State rejections of Medicaid expansion|Medicaid expansion]] under penalty of losing their current Medicaid funding.<ref>Pg 55\u201358, slip opinion, ''National Federation of Independent Business v. Sebelius'', U.S. Supreme Court (June 28, 2012)<\/ref><ref>{{cite news|title=Supreme Court Supports Obamacare, Bolsters Obama|first=Paul M.|last=Barrett|url=http:\/\/www.businessweek.com\/articles\/2012-06-28\/supreme-court-supports-obamacare-and-bolsters-obama|newspaper=BloombergBusinessweek|date=June 28, 2012|accessdate=June 30, 2012}}<\/ref><ref>{{cite news|title=Obamacare upheld by the U.S. Supreme Court|author=National Post Wire Services|url=http:\/\/news.nationalpost.com\/2012\/06\/28\/obamacare-upheld-by-the-u-s-supreme-court|newspaper=National Post|date=June 28, 2012|accessdate=June 30, 2012}}<\/ref> Since the ruling, the law and its implementation have continued to face challenges in [[United States Congress|Congress]] and [[United States federal courts|federal courts]], and from some [[State governments of the United States|state governments]], [[Conservatism in the United States|conservative]] advocacy groups, labor unions, and small business organizations.\n\n\n \u00a0\n \n \u00a0\n \n\n\n \u2212\n As of mid-2015, an additional 11 million Americans gained health insurance coverage under the ACA, and the percentage of uninsured Americans dropped from 18% in 2013 to 11.9%.<ref name=\"Gallup\">{{cite journal | journal=Gallup Polling | title=In U.S., Uninsured Rate Dips to 11.9% in First Quarter | author=Jenna Levy | 182348\/uninsured-rate-dips-first-quarter.aspx | url = http:\/\/www.gallup.com\/poll\/182348\/uninsured-rate-dips-first-quarter.aspx | pmid=041815}}<\/ref><ref>http:\/\/www.huffingtonpost.com\/2015\/03\/24\/obamacare-uninsured-americans_n_6929310.html<\/ref>\n +\n As of mid-2015, an additional 11 million Americans gained health insurance coverage under the ACA, and the percentage of uninsured Americans dropped from 18% in 2013 to 11.9%.<ref name=\"Gallup\">{{cite journal | journal=Gallup Polling | title=In U.S., Uninsured Rate Dips to 11.9% in First Quarter | author=Jenna Levy | url = http:\/\/www.gallup.com\/poll\/182348\/uninsured-rate-dips-first-quarter.aspx | pmid=041815}}<\/ref><ref>http:\/\/www.huffingtonpost.com\/2015\/03\/24\/obamacare-uninsured-americans_n_6929310.html<\/ref>\n\n\n \u00a0\n \n \u00a0\n \n\n\n \u00a0\n __TOC__\n \u00a0\n __TOC__\n\n\n\n\n\t\tLatest revision as of 05:56, 20 April 2015\n\nPatient Protection and\nAffordable Care Act\n\n\n\n\nLong title\nAn act entitled The Patient Protection and Affordable Care Act\n\n\nAcronyms (colloquial)\nPPACA, ACA\n\n\nNicknames\nAffordable Care Act, Health Insurance Reform, Healthcare Reform, Obamacare\n\n\nEnacted\u00a0by\nthe 111th United States Congress\n\n\nEffective\nMarch 23, 2010\nMost major provisions phased in by January 2014; remaining provisions phased in by 2020\n\n\nCitations\n\n\nPublic Law\n111\u2013148\n\n\nStatutes at Large\n124\u00a0Stat.\u00a0119 through 124\u00a0Stat.\u00a01025 (906 pages)\n\n\nLegislative history\n\n\n\n\n\nIntroduced in the House as the \"Service Members Home Ownership Tax Act of 2009\" (H.R. 3590) by Charles Rangel (D\u2013NY) on September 17, 2009\nCommittee consideration by Ways and Means\nPassed the House on October 8, 2009\u00a0(416\u20130)\nPassed the Senate as the \"Patient Protection and Affordable Care Act\" on December 24, 2009\u00a0(60\u201339) with amendment\nHouse agreed to Senate amendment on March 21, 2010\u00a0(219\u2013212)\nSigned into law by President Barack Obama on March 23, 2010\n\n\n\n\n\nMajor amendments\n\n\nHealth Care and Education Reconciliation Act of 2010\nComprehensive 1099 Taxpayer Protection and Repayment of Exchange Subsidy Overpayments Act of 2011\n\n\nUnited States Supreme Court cases\n\n\nNational Federation of Independent Business v. Sebelius\nBurwell v. Hobby Lobby\nKing v. Burwell\n\n\nThe Patient Protection and Affordable Care Act (PPACA), commonly called the Affordable Care Act (ACA) or \"ObamaCare\", is a United States federal statute signed into law by President Barack Obama on March 23, 2010. Together with the Health Care and Education Reconciliation Act amendment, it represents the most significant regulatory overhaul of the U.S. healthcare system since the passage of Medicare and Medicaid in 1965.\nThe ACA was enacted to increase the quality and affordability of health insurance, lower the uninsured rate by expanding public and private insurance coverage, and reduce the costs of healthcare for individuals and the government. It introduced mechanisms like mandates, subsidies, and insurance exchanges.[1][2] The law requires insurance companies to cover all applicants within new minimum standards and offer the same rates regardless of pre-existing conditions or sex.[3] Additional reforms were increased competition, regulation, and incentives to streamline the delivery of healthcare. In 2011 the Congressional Budget Office projected that the ACA would lower both future deficits[4] and Medicare spending.[5]\nOn June 28, 2012, the United States Supreme Court upheld the constitutionality of the ACA's individual mandate as an exercise of Congress's taxing power[6] in the case National Federation of Independent Business v. Sebelius. However, the Court held that states cannot be forced to participate in the ACA's Medicaid expansion under penalty of losing their current Medicaid funding.[7][8][9] Since the ruling, the law and its implementation have continued to face challenges in Congress and federal courts, and from some state governments, conservative advocacy groups, labor unions, and small business organizations.\nAs of mid-2015, an additional 11 million Americans gained health insurance coverage under the ACA, and the percentage of uninsured Americans dropped from 18% in 2013 to 11.9%.[10][11]\n\n\n\nOverview of provisions\n\n\n\n\n\nThe President and White House Staff react to the House of Representatives passing the bill on March 21, 2010.\n\n\nThe Affordable Care Act (ACA)[12][13] or Obamacare,[14] includes numerous provisions that took effect between 2010 and 2020. Policies issued before 2010 are exempted by a grandfather clause from many of the changes to insurance standards, but they were affected by other provisions.[15][16] Significant reforms, most of which took effect on January 1, 2014, include:\n\nGuaranteed issue prohibits insurers from denying coverage to individuals due to pre-existing conditions, and a partial community rating requires insurers to offer the same premium price to all applicants of the same age and geographical location without regard to gender or most pre-existing conditions (excluding tobacco use).[17][18][19]\nMinimum standards for health insurance policies are established.[20][21][22][23][24]\nAn individual mandate[25][26] requires all individuals not covered by an employer sponsored health plan, Medicaid, Medicare or other public insurance programs (such as Tricare) to secure an approved private-insurance policy or pay a penalty, unless the applicable individual has a financial hardship or is a member of a recognized religious sect exempted by the Internal Revenue Service.[27] The law includes subsidies to help people with low incomes comply with the mandate.[28]\nHealth insurance exchanges operate as a new avenue by which individuals and small businesses in every state can compare policies and buy insurance (with a government subsidy if eligible).[29] In the first year of operation, open enrollment on the exchanges ran from October 1, 2013 to March 31, 2014. The original purchase deadline date to be covered for January 1, 2014 was December 15, 2013, but the deadline was pushed back, first to December 23, 2013 and later to December 24, 2013.[30][31][32][33] For plans starting in 2015, the proposed enrollment period is November 15, 2014 \u2013 February 15, 2015.[34]\nLow-income individuals and families whose incomes are between 100% and 400% of the federal poverty level will receive federal subsidies on a sliding scale if they purchase insurance via an exchange.[35] Those from 133% to 150% of the poverty level will be subsidized such that their premium costs will be 3% to 4% of income.[36] In 2013, the subsidy would apply for incomes up to $45,960 for an individual or $94,200 for a family of four; consumers can choose to receive their tax credits in advance, and the exchange will send the money directly to the insurer every month.[37] Small businesses will be eligible for subsidies.[38]\nMedicaid eligibility expanded to include individuals and families with incomes up to 133% of the federal poverty level, including adults without disabilities and without dependent children.[39] The law also provides for a 5% \"income disregard\", making the effective income eligibility limit for Medicaid 138% of the poverty level.[40] Furthermore, the State Children's Health Insurance Program (CHIP) enrollment process is simplified.[39] However, in National Federation of Independent Business v. Sebelius, the Supreme Court ruled that states may opt out of the Medicaid expansion, and several have done so.\nReforms to the Medicare payment system are meant to promote greater efficiency in the healthcare delivery system by restructuring Medicare reimbursements from fee-for-service to bundled payments.[41][42] Under the new payment system, a single payment is paid to a hospital and a physician group for a defined episode of care (such as a hip replacement) rather than individual payments to individual service providers. In addition, the Medicare Part D coverage gap (commonly called the \"donut hole\") will shrink incrementally, closing completely by January 1, 2020.[43]\nBusinesses which employ 50 or more people but do not offer health insurance to their full-time employees will pay a tax penalty if the government has subsidized a full-time employee's healthcare through tax deductions or other means. This is commonly known as the employer mandate.[44][45] In July 2013, the Internal Revenue Service delayed enforcement of this provision for one year.[46]\n\nLegislative history\nBackground\n\nThe Patient Protection and Affordable Care Act consists of a combination of measures to control healthcare costs, and an expansion of coverage through public and private insurance: broader Medicaid eligibility and Medicare coverage, and subsidized, regulated private insurance. An individual mandate coupled with subsidies for private insurance as a means for universal healthcare was considered the best way to win the support of the Senate because it had been included in prior bipartisan reform proposals. The concept goes back to at least 1989, when the conservative Heritage Foundation proposed an individual mandate as an alternative to single-payer health care.[47] It was championed for a time by conservative economists and Republican senators as a market-based approach to healthcare reform on the basis of individual responsibility and avoidance of free rider problems. Specifically, because the 1986 Emergency Medical Treatment and Active Labor Act (EMTALA) requires any hospital participating in Medicare (which nearly all do) to provide emergency care to anyone who needs it, the government often indirectly bore the cost of those without the ability to pay.[48][49][50]\nWhen President Bill Clinton proposed a healthcare reform bill in 1993 that included a mandate for employers to provide health insurance to all employees through a regulated marketplace of health maintenance organizations, Republican Senators proposed an alternative that would have required individuals, but not employers, to buy insurance.[49] Ultimately the Clinton plan failed amid an unprecedented barrage of negative advertising funded by politically conservative groups and the health insurance industry and due to concerns that it was overly complex.[51] After failing to obtain a comprehensive reform of the healthcare system, Clinton negotiated a compromise with the 105th Congress to instead enact the State Children's Health Insurance Program (SCHIP) in 1997.[52]\n\n\n\n\n\nThe 1993 Republican alternative, introduced by Senator John Chafee as the Health Equity and Access Reform Today Act, contained a \"universal coverage\" requirement with a penalty for noncompliance\u2014an individual mandate\u2014as well as subsidies to be used in state-based 'purchasing groups'.[53] Advocates for the 1993 bill included prominent Republicans who today oppose a mandate, such as Senators Orrin Hatch, Chuck Grassley, Bob Bennett, and Kit Bond.[54][55] Of the 43 Republicans Senators from 1993, 20 supported the HEART Act.[47][56] Another Republican proposal, introduced in 1994 by Senator Don Nickles (R-OK), the Consumer Choice Health Security Act, contained an individual mandate with a penalty provision;[57] however, Nickles subsequently removed the mandate from the bill, stating he had decided \"that government should not compel people to buy health insurance\".[58] At the time of these proposals, Republicans did not raise constitutional issues with the mandate; Mark Pauly, who helped develop a proposal that included an individual mandate for George H.W. Bush, remarked, \"I don\u2019t remember that being raised at all. The way it was viewed by the Congressional Budget Office in 1994 was, effectively, as a tax.\"[47]\n\n\n\n\nMitt Romney's Massachusetts went from 90% of its residents insured to 98%, the highest rate in the nation.[59]\n\n\nIn 2006, an insurance expansion bill was enacted at the state level in Massachusetts. The bill contained both an individual health insurance mandate and an insurance exchange. Republican Governor Mitt Romney vetoed the mandate, but after Democrats overrode his veto, he signed it into law.[60] Romney's implementation of the 'Health Connector' exchange and individual mandate in Massachusetts was at first lauded by Republicans. During Romney's 2008 presidential campaign, Senator Jim DeMint praised Romney's ability to \"take some good conservative ideas, like private health insurance, and apply them to the need to have everyone insured.\" Romney said of the individual mandate: \"I'm proud of what we've done. If Massachusetts succeeds in implementing it, then that will be the model for the nation.\"[61]\nIn 2007, a year after the Massachusetts reform, Republican Senator Bob Bennett and Democratic Senator Ron Wyden introduced the Healthy Americans Act, which also featured an individual mandate and state-based regulated insurance markets called \"State Health Help Agencies\".[50][61] The bill initially attracted bipartisan support but died in committee. Many of the sponsors and co-sponsors remained in Congress during the 2008 healthcare debate.[62]\nBy 2008 many Democrats were considering using this approach as the basis for healthcare reform. Experts have said that the legislation that eventually emerged from Congress in 2009 and 2010 bears many similarities to the 2007 bill[53] and that it was deliberately patterned after Romney's state healthcare plan.[63] Jonathan Gruber, a professor of economics at MIT and an architect of Massachusetts' health care reform who advised the Clinton and Obama presidential campaigns on healthcare issues, served as a technical consultant to the Obama administration, and helped draft the ACA.[64]\nHealthcare debate, 2008\u201310\n\nHealthcare reform was a major topic of discussion during the 2008 Democratic presidential primaries. As the race narrowed, attention focused on the plans presented by the two leading candidates, Hillary Clinton and the eventual nominee, Barack Obama. Each candidate proposed a plan to cover the approximately 45\u00a0million Americans estimated to not have health insurance at some point each year. Clinton's plan would have required all Americans to obtain coverage (in effect, an individual mandate), while Obama's provided a subsidy but rejected the use of an individual mandate.[65][66] During the general election, Obama said that fixing healthcare would be one of his top four priorities if he won the presidency.[67]\n\n\n\n\n\nAfter his inauguration, Obama announced to a joint session of Congress in February 2009 his intent to work with Congress to construct a plan for healthcare reform.[68][69] By July, a series of bills were approved by committees within the House of Representatives.[70] On the Senate side, from June to September, the Senate Finance Committee held a series of 31 meetings to develop a healthcare reform bill. This group \u2014 in particular, Democrats Max Baucus, Jeff Bingaman, and Kent Conrad, and Republicans Mike Enzi, Chuck Grassley, and Olympia Snowe \u2014 met for more than 60 hours, and the principles that they discussed, in conjunction with the other committees, became the foundation of the Senate's healthcare reform bill.[71][72][73]\nWith universal healthcare as one of the stated goals of the Obama administration, congressional Democrats and health policy experts like Jonathan Gruber and David Cutler argued that guaranteed issue would require both community rating and an individual mandate to ensure that adverse selection and\/or \"free riding\" would not result in an insurance \"death spiral\";[74] they convinced Obama that this was necessary, and persuaded him to accept congressional proposals that included a mandate.[75] This approach was taken because the president and congressional leaders had concluded that more progressive plans, such as the (single-payer) Medicare for All act, could not obtain filibuster-proof support in the Senate. By deliberately drawing on bipartisan ideas \u2014 the same basic outline was supported by former Senate majority leaders Howard Baker, Bob Dole, Tom Daschle and George J. Mitchell\u2014the bill's drafters hoped to increase the chances of garnering the necessary votes for passage.[76][77]\nHowever, following the adoption of an individual mandate as a central component of the proposed reforms by Democrats, Republicans began to oppose the mandate and threatened to filibuster any bills that contained it.[47] Senate minority leader Mitch McConnell, who led the Republican congressional strategy in responding to the bill, calculated that Republicans should not support the bill, and worked to keep party discipline and prevent defections:[78]\n\nIt was absolutely critical that everybody be together because if the proponents of the bill were able to say it was bipartisan, it tended to convey to the public that this is O.K., they must have figured it out.[79]\n\nRepublican Senators, including those who had supported previous bills with a similar mandate, began to describe the mandate as \"unconstitutional.\" Journalist Ezra Klein wrote in The New Yorker that \"the end result was ... a policy that once enjoyed broad support within the Republican Party suddenly faced unified opposition.\"[50] Reporter Michael Cooper of The New York Times wrote that: \"It can be difficult to remember now, given the ferocity with which many Republicans assail it as an attack on freedom, but the provision in President Obama's healthcare law requiring all Americans to buy health insurance has its roots in conservative thinking.\"[49][56]\n\n\n\n\n\nThe reform negotiations also attracted a great deal of attention from lobbyists,[80] including deals between certain lobby groups and the advocates of the law to win the support of groups which had opposed past reforms, as in 1993.[81][82] The Sunlight Foundation documented many of the reported ties between \"the healthcare lobbyist complex\" and politicians in both major parties.[83]\nDuring the August 2009 summer congressional recess, many members went back to their districts and entertained town hall meetings to solicit public opinion on the proposals. Over the recess, the Tea Party movement organized protests and many conservative groups and individuals targeted congressional town hall meetings to voice their opposition to the proposed reform bills.[69] There were also many threats made against members of Congress over the course of the Congressional debate.[84][85]\nTo maintain the progress of the legislative process, when Congress returned from recess, in September 2009 President Obama delivered a speech to a joint session of Congress supporting the ongoing Congressional negotiations, to re-emphasize his commitment to reform and again outline his proposals.[86] He acknowledged the polarization of the debate, and quoted a letter from the late Senator Edward \"Ted\" Kennedy urging on reform: \"what we face is above all a moral issue; that at stake are not just the details of policy, but fundamental principles of social justice and the character of our country.\"[87] On November 7, the House of Representatives passed the Affordable Health Care for America Act on a 220\u2013215 vote and forwarded it to the Senate for passage.[69]\nSenate\n\n\n\n\n\nThe Senate began work on its own proposals while the House was still working on the Affordable Health Care for America Act. Instead, the Senate took up H.R. 3590, a bill regarding housing tax breaks for service members.[88] As the United States Constitution requires all revenue-related bills to originate in the House,[89] the Senate took up this bill since it was first passed by the House as a revenue-related modification to the Internal Revenue Code. The bill was then used as the Senate's vehicle for their healthcare reform proposal, completely revising the content of the bill.[90] The bill as amended would ultimately incorporate elements of proposals that were reported favorably by the Senate Health and Finance committees. With the Republican minority in the Senate vowing to filibuster any bill they did not support, requiring a cloture vote to end debate, 60 votes would be necessary to get passage in the Senate.[91] At the start of the 111th Congress, Democrats had only 58 votes; the Senate seat in Minnesota ultimately won by Al Franken was still undergoing a recount, and Arlen Specter was still a Republican.\nTo reach 60 votes, negotiations were undertaken to satisfy the demands of moderate Democrats, and to try to bring several Republican senators aboard; particular attention was given to Bob Bennett, Mike Enzi, Chuck Grassley, and Olympia Snowe. Negotiations continued even after July 7 \u2014 when Franken was sworn into office, and by which time Specter had switched parties \u2014 due to disagreements over the substance of the bill, which was still being drafted in committee, and because moderate Democrats hoped to win bipartisan support. Then, on August 25, before the bill could come up for a vote, Ted Kennedy\u2014a longtime healthcare reform advocate\u2014died, depriving Democrats of their 60th vote. Before Kennedy's seat was filled, attention was drawn to Snowe because of her vote in favor of the draft bill in the Finance Committee on October 15, but she explicitly stated that this did not mean she would support the final bill.[74] Paul Kirk was appointed as Senator Kennedy's temporary replacement on September 24.\nAfter the Finance Committee vote, negotiations turned to the demands of moderate Democrats, whose votes would be necessary to break the anticipated Republican filibuster. Majority leader Harry Reid focused on satisfying the Democratic caucus's centrist members until the holdouts came down to Joe Lieberman of Connecticut, an independent who caucused with Democrats, and Ben Nelson, a conservative Democrat, representing Nebraska. Lieberman, despite intense negotiations with Reid in search of a compromise, refused to support a public option, agreeing to vote for the bill only if the provision were not included,[74][92] although it had majority support in Congress. His demand was met.[93] There was debate among the bill's supporters over the importance of the public option,[94] although the vast majority of supporters concluded it was a minor part of the reform overall,[92] and Congressional Democrats' fight for it won various concessions, including conditional waivers allowing states to set up state-based public options such as Vermont's Green Mountain Care.[93][95]\n\n\n\n\nSenate vote by state.\n\u00a0\u00a0Democratic yes (58)\n\u00a0\u00a0Independent yes (2)\n\u00a0\u00a0Republican no (39)\n\u00a0\u00a0Republican not voting (1)\n\n\n\nWith every other Democrat now in favor and every Republican now opposed, the White House and Reid moved on to addressing Nelson's concerns in order to win filibuster-proof support for the bill;[96] they had by this point concluded \"it was a waste of time dealing with [Snowe]\"[97] because, after her vote for the draft bill in the Finance Committee, she had come under intense pressure from the Republican Senate leadership.[98] After a final 13-hour negotiation, Nelson's support for the bill was won with two concessions: a compromise on abortion, modifying the language of the bill \"to give states the right to prohibit coverage of abortion within their own insurance exchanges\", which would require consumers to pay for the procedure out of pocket if the state so decided; and an amendment to offer a higher rate of Medicaid reimbursement for Nebraska.[69][99] The latter half of the compromise was derisively called the \"Cornhusker Kickback\"[100] and was repealed in the subsequent reconciliation amendment bill.\nOn December 23, the Senate voted 60\u201339 to end debate on the bill: a cloture vote to end the filibuster. The bill then passed, also 60\u201339, on December 24, 2009, with all Democrats and two independents voting for it, and all Republicans against (except Jim Bunning, who did not vote).[101] The bill was endorsed by the AMA and AARP.[102]\nSeveral weeks later, on January 19, 2010, Massachusetts Republican Scott Brown was elected to the Senate in a special election to replace the late Ted Kennedy, having campaigned on giving the Republican minority the 41st vote needed to sustain Republican filibusters.[69][103][104] The special election had become significant to the reform debate because of its effects on the legislative process. The first was psychological: the symbolic importance of losing Kennedy's traditionally Democratic Massachusetts seat made many Congressional Democrats concerned about the political cost of passing a bill.[105][106] The second effect was more practical: the loss of the Democratic supermajority complicated reform proponents' legislative strategy.[106]\nHouse\n\n\n\n\nHouse vote by congressional district.\n\u00a0\u00a0Democratic yea (219)\n\u00a0\u00a0Democratic nay (34)\n\u00a0\u00a0Republican nay (178)\n\u00a0\u00a0No representative seated (4)\n\n\n\n\n\n\n\nPresident Obama signing the Patient Protection and Affordable Care Act on March 23, 2010.\n\n\nBrown's election meant Democrats could no longer break a filibuster in the Senate. In response, White House Chief of Staff Rahm Emanuel argued that Democrats should scale back to a less ambitious bill; House Speaker Nancy Pelosi pushed back, dismissing Emanuel's scaled-down approach as \"Kiddie Care.\"[107][108] Obama also remained insistent on comprehensive reform, and the news that Anthem Blue Cross in California intended to raise premium rates for its patients by as much as 39% gave him a new line of argument to reassure nervous Democrats after Scott Brown's win.[107][108] On February 22, President Obama laid out a \"Senate-leaning\" proposal to consolidate the bills.[109] He held a meeting with both parties' leaders on February 25. With Democrats having lost a filibuster-proof supermajority in the Senate but having already passed the Senate bill with 60 votes on December 24, comprehensive reform proponents' most workable option was for the House to abandon its bill, the Affordable Health Care for America Act, and pass the Senate's bill, the Patient Protection and Affordable Care Act, instead.\nVarious health policy experts encouraged the House to pass the Senate version,[110] but House Democrats were not happy with it and had expected to be able to negotiate changes in a House-Senate conference before passing a final bill.[106] With that option off the table, since any bill that emerged from conference that differed from the Senate bill would have to be passed in the Senate despite another Republican filibuster, most House Democrats agreed to pass the Senate bill on condition that it be amended by a subsequent bill.[106] They drafted the Health Care and Education Reconciliation Act, which could be passed by the reconciliation process.[107][111][112]\nUnlike rules under regular order, as per the Congressional Budget Act of 1974, reconciliation cannot be subject to a filibuster. But reconciliation is limited to budget changes, which is why the procedure was not used to pass the ACA in the first place; the bill had inherently non-budgetary regulations.[113][114] Still, although the already passed Senate bill could not have been passed by reconciliation, most of House Democrats' demands were budgetary: \"these changes\u2014higher subsidy levels, different kinds of taxes to pay for them, nixing the Nebraska Medicaid deal\u2014mainly involve taxes and spending. In other words, they're exactly the kinds of policies that are well-suited for reconciliation.\"[111]\nThe remaining obstacle was a pivotal group of pro-life Democrats led by Bart Stupak who were initially reluctant to support the bill. The group found the possibility of federal funding for abortion significant enough to warrant opposition. The Senate bill had not included language that satisfied their abortion concerns, but they could not include additional such language in the reconciliation bill as it would be non-budgetary and thus outside the process's domain. Instead, Obama issued Executive Order 13535, reaffirming the principles in the Hyde Amendment.[115] This won the support of Stupak and members of his group and assured the bill's passage.[112][116] The House passed the Senate bill with a 219\u2013212 vote on March 21, 2010, with 34 Democrats and all 178 Republicans voting against it.[117] The next day, Republicans introduced legislation to repeal the bill.[118] Obama signed the ACA into law on March 23, 2010.[119] The amendment bill, The Health Care and Education Reconciliation Act, was also passed by the House on March 21; the Senate passed it by reconciliation on March 25, and Obama signed it on March 30.\nImpact\nPublic policy\nThe Affordable Care Act represents the most significant regulatory overhaul of the U.S. healthcare system since the passage of Medicare and Medicaid in 1965.[120] The New York Times summarized the overall impact of the Affordable Care Act on a variety of dimensions during October 2014. The number of uninsured persons has been reduced significantly. About 7.3 million people remain enrolled in private coverage through the online marketplaces; 85% of those qualified for federal subsidies to help pay premiums. For those who qualified for subsidies through the federal exchange, the subsidies lowered the cost by 76% on average. Middle-income persons who don't qualify for subsidies are more likely to have challenges with premium costs. It is too early to tell whether the Act has affected health outcomes. While healthcare costs have grown slower in recent years, the effect of ACA on this trend is unclear. The healthcare industry has generally been helped by the law, due to the additional customers the law created for it.[121]\nChange in number of uninsured\n\nThe ACA has two primary mechanisms for increasing insurance coverage: expanding Medicaid eligibility to include individuals within 138% of the federal poverty level,[40] and creating state-based insurance exchanges where individuals and small business can buy health insurance plans\u2014those individuals with incomes between 100% and 400% of the federal poverty level will be eligible for subsidies to do so.[29][35] The Congressional Budget Office (CBO) originally estimated that the legislation will reduce the number of uninsured residents by 32\u00a0million, leaving 23\u00a0million uninsured residents in 2019 after the bill's provisions have all taken effect.[122][123][124] With the elderly covered by Medicare, the CBO estimate projected that the law would raise the proportion of insured non-elderly citizens from 83% to 94%.[122] A July 2012 CBO estimate raised the expected number of uninsured by 3 million, reflecting the successful legal challenge to the ACA's expansion of Medicaid.[125][126]\nAmong the people who will remain uninsured:\n\nACA drafters believed that increasing insurance coverage would not only improve quality of life but also help reduce medical bankruptcies (currently the leading cause of bankruptcy in America[129]) and job lock.[130] In addition, many believed that expanding coverage would help ensure that the cost controls successfully function; healthcare providers could more easily adapt to payment system reforms that incentivize value over quantity if their costs were partially offset\u2014for example, hospitals having to do less charity care or insurers having larger and more stable risk pools to distribute costs over.[131]\nDue to the new regulations of guaranteed issue, and allowing children to be included on their parents' plans until age 26, several insurance companies announced that they would stop issuing new child-only policies.[132][133][134] However, because children would now be covered by their parents' plans, the Census Bureau found that the number of uninsured 19- to 25-year-olds had declined by 1.6% or 393,000 people by 2011.[135] Starting January 1, 2014, state health insurance exchanges will be required to offer a child-only coverage option, and Medicaid eligibility will be made available to 16 million individuals with incomes below 133% of the federal poverty level.[136]\nUnder the law, those workers whose employers offer \"affordable coverage\" will not be eligible for subsidies in the exchanges. To be eligible, per the law's definition, the cost of employer-based health insurance must exceed 9.5% of the worker\u2019s household income. In January 2013 the Internal Revenue Service ruled that only the cost of covering the individual employee would be considered in determining whether the cost of coverage exceeded 9.5% of income. However, the cost of a family plan is often higher, but the ruling means that those higher costs will not be considered even if the extra premiums push the cost of coverage above the 9.5% income threshold. The New York Times said this could leave 2\u20134 million Americans unable to afford family coverage under their employers\u2019 plans and ineligible for subsidies to buy coverage elsewhere.[137][138]\nMultiple 2014 studies and surveys indicated that the number of uninsured had fallen due to expanded Medicaid eligibility and health insurance exchanges established due to PPACA. These changes took effect January 1, 2014. The Commonwealth Fund reported in July 2014 that an additional 9.5 million people aged 19\u201364 had obtained health insurance, roughly 5% of the working-aged population.[139] Gallup reported in July 2014 that the uninsured rate among adults 18 and over fell from 18.0% in Q3 2013 to 13.4% by Q2 2014.[140] The Rand Corporation reported that by March 2014: \"Enrollment in employer-sponsored insurance plans increased by 8.2 million and Medicaid enrollment increased by 5.9 million, although some individuals did lose coverage during this period. The authors also found that 3.9 million people are now covered through the state and federal marketplaces \u2014 the so called insurance exchanges \u2014 and less than 1 million people who previously had individual-market insurance became uninsured during the period in question. While the survey cannot tell if this latter group lost their insurance due to cancellation or because they simply felt the cost was too high, the overall number is very small, representing less than 1 percent of people between the ages of 18 and 64.\"[141] Thereafter, data from August 2014 showed that 7.3 million people had enrolled through the marketplace and paid their premiums.[142]\nInsurance exchanges and the individual mandate\n\n\nThe Act establishes state-based health insurance exchanges. The exchanges are regulated, online marketplaces, administered by either federal or state government, where individuals and small business can purchase private insurance plans starting October 1, 2013, with coverage beginning January 1, 2014.[29][143][144] Individuals with incomes between 100% and 400% of the federal poverty level who purchase insurance plans via an exchange will be eligible to receive federal subsidies to help pay premium costs.[28][35]\nThe exchanges will take the form of websites where the private plans allowed on sale within them will be regulated and comparable: Consumers will be able to visit these websites or ring a call center, compare the plans on offer, fill out a form to the government that will be used to determine their eligibility for subsidies, and then purchase the insurance of their choice from the options available during limited open enrollment periods.[145] The first open enrollment period will last from October 1, 2013 to March 31, 2014, after which time uninsured individuals generally may not purchase insurance through an exchange until the following open enrollment period. In subsequent years, the open enrollment period will start on October 15 and end on December 7.[146][147] Despite some controversy, Members of Congress and their staff will participate in this system: they are required to obtain health insurance through the exchanges or plans otherwise approved by the bill (such as Medicare) instead of the Federal Employees Health Benefits Program that they currently use.[148]\nThe insurance exchanges are a method designed to create a market for private insurance in a way that addresses market failures, such as the high number of uninsured, medical bankruptcies, coverage limits, unaffordability, and inflation[149] through regulation:[150][92] Only approved plans that meet certain standards will be allowed to be sold on the exchanges, and insurers will be prohibited from denying insurance to consumers on the basis of pre-existing conditions.[17][18] Several methods will be employed to make these plans affordable: Subsidies will be provided to those eligible.[35][38] Regulations intended to reduce prices through competition will make plans and prices more transparent and price comparisons more accessible for consumers with online information;[151][152][153] and federally approved, multi-state plans will be phased-into state exchanges[154] to help guarantee enough options.[155] And price regulations will be implemented, including a minimum medical loss ratio,[156] and partial community rating that prevents price discrimination from pricing individuals out of the market through unaffordable plans or premium increases on the insured[144][157]\u2014namely poor and sick individuals who are more expensive to cover for insurers motivated either by profit maximization and\/or the economics of insurance; specifically, the risk of an insurance pool not providing enough net-premiums to offset net-pay-outs.[158]\nThese regulations are enabled to function due to the individual mandate[25] \u2014 the requirement to buy insurance or pay a penalty\u2014and the limits on open enrollment,[147][159] without which healthy people might put-off insuring themselves until they got sick. In such a situation, insurers would have to raise their premiums to afford the remaining (relatively sicker and thus more expensive) population,[25][160][161] which could create a vicious cycle in which more and more people drop their coverage \u2013 a result known as an insurance death spiral.[162] Alternatively, the process could settle at a stable equilibrium relying on relatively high premiums for the insured and less coverage (and thus more illness and medical bankruptcy) for the uninsured.[157][160][163] The absence of the Mandate would have likely caused the exchanges as a whole to malfunction, and ultimately perform similarly to the current private insurance market, according to its supporters,[164][165] based on studies by the CBO, Jonathan Gruber, and Rand Health have concluded.[166][167][168] Conversely, the inclusion of the mandate increases the size and diversity of the insured population, broadening the risk pool to spread the cost of insurance in a sustainable manner.[169] Policy experience in New Jersey on the one hand and Massachusetts on the other offers evidence of such divergent outcomes.[157][167][170] In September 2012, the Congressional Budget Office estimated that nearly six million will pay the penalty in 2016.[171][172]\n\n\n\n\nHealth insurance exchanges by state.[173]\n\u00a0\u00a0Creating state-operated exchanges\n\u00a0\u00a0Establishing state-federal partnership exchanges\n\u00a0\u00a0Defaulting to federal exchange\n\n\n\nUnder the law, setting up an exchange gives a state partial discretion on standards and prices of insurance, aside from those specifics set-out in the ACA.[174][175] For example, those administering the exchange will be able to determine which plans are sold on or excluded from the exchanges, and adjust (through limits on and negotiations with private insurers) the prices on offer. They will also be able to impose higher or state-specific coverage requirements\u2014including whether plans offered in the state are prohibited from covering abortion (making the procedure an out-of-pocket expense) or mandated to cover abortions that a physician determines is medically necessary; in either case, federal subsidies are prohibited from being used to fund the procedure.[176][177] If a state does not set up an exchange itself, they lose that discretion, and the responsibility to set up exchanges for such states defaults to the federal government, whereby the Department of Health and Human Services assumes the authority and legal obligation to operate all functions in these federally facilitated exchanges.[174] As of May 2013, 23 states and the District of Columbia plan to operate state-based exchanges themselves, seven of which will do so in partnership with the federal government\u2014an arrangement where they retain discretionary management but the federal government executes various functions. The remaining 27 states default to federally facilitated exchanges.[173]\nThe law is also designed to be flexible by allowing states, from 2017 onwards, to apply for a \"waiver for state innovation\" from the federal government that allows them to experiment with their own state-based system, on condition that it meets certain criteria.[178] To obtain a waiver, a state must pass legislation setting up an alternative health system that provides insurance at least as comprehensive and as affordable as that the ACA would, covers at least as many residents, and does not increase the federal deficit.[179] Provided a state meets these conditions, receiving a waiver can exempt states from some of the central requirements of the ACA, including the individual mandate, the provision of an insurance exchange, and the employer mandate.[180] The state would also receive compensation equal to the aggregate amount of any federal subsidies and tax credits for which its residents and employers would have been eligible under the ACA plan, if they cannot be paid out due to the structure of the state plan.[178]\nIn May 2011, Vermont, a state in which Republicans are but a small minority, had enacted Green Mountain Care, a state-based single-payer system for which they intended to pursue a waiver to implement.[181][182][183] In December 2014, Vermont decided not to pursue the single-payer system.[184]\nImplementation\nMain article: HealthCare.gov\n\n\n\n\n\nEarly implementation efforts for the healthcare exchanges, especially the exchanges operated by the federal government, have received nearly universally negative reactions in the media and from politicians.[185][186][187] HealthCare.gov, the website that allows people to apply for insurance through the exchanges operated by the federal government, crashed on opening and suffered from a rash of problems throughout the first month.[188] Many users have also found the available plans to be unattractive.[189][190][191][192] Ongoing problems with the website have prompted the development of HealthSherpa, an independently produced alternative to HealthCare.gov, that contains consumer information.[193][194]\nVarious committees in both chambers of Congress have conducted hearings where cyber security concerns related to HealthCare.gov have been discussed. Experts disagree over the extent HealthCare.gov is vulnerable to cyber attacks.[195][196][197][198]\nAs of March 2013, \"radio ads providing information on the Affordable Care Act\" have been broadcast in Ojibwe, Yupik, Inupiat, Lakota and Navajo, according to Indian Country Today Media Network.[199]\nThe House Energy and Commerce Committee reported on April 30, 2014, that 67% of individuals and families who had selected a health plan in the Federally Facilitated Marketplace had paid their first month\u2019s premium; and that 25% of paid enrollees are ages 18 to 34.[200] On the same day, Committee ranking member Henry A. Waxman issued a statement saying the reporting was \"... inaccurate, irresponsible, and out-of-date\" accompanied by a memorandum detailing the basis behind his statement.[201] A week later, representatives for top health insurance companies told members of Congress that more than 80 percent of people who've signed up under the new health care law have gone on to pay their premiums.[202]\nOn July 30, 2014, the Government Accountability Office released a non-partisan study that concluded the administration did not provide \"effective planning or oversight practices\" in developing the HealthCare.gov website.[203]\nChange in insurance standards\nThe ACA includes regulations that set standards for insurance,[20] some specified in the law, others subsequently established by the Secretary of Health and Human Services. Among these new standards are a ban on the ability to drop policyholders if they become sick,[204] a ban on price discrimination on the basis of pre-existing conditions or sex through a partial community rating,[205] and allowing children and dependents to remain on their parents' insurance plan until their 26th birthday.[206][207]\nUnder the law's authorization, Secretary of Health Kathleen Sebelius issued a set of defined \"essential health benefits\"[21] that all new insurance plans have to include. Insurers are prohibited from imposing annual or lifetime coverage caps on these essential benefits.[204][208] These cover: \"ambulatory patient services; emergency services; hospitalization; maternity and newborn care; mental health and substance use disorder services, including behavioral health treatment; prescription drugs; rehabilitative and habilitative services and devices; laboratory services; preventive and wellness services and chronic disease management; and pediatric services, including oral and vision care.\"[209][210] In determining what would qualify as an essential benefit, the law requires that the scope of standard benefits should equal that of a \"typical employer plan.\"[209] States have some discretion in determining what should be considered the benchmark plan within the requirements of the law, and may include services beyond those set out by the Secretary.[211]\nAmong the essential health benefits, preventive care, childhood immunizations and adult vaccinations, and medical screenings are covered by an insurance plan's premiums, and cannot be subject to any co-payments, co-insurance, or deductibles.[212][213] Specific examples of such services covered include: mammograms and colonoscopies, wellness visits, gestational diabetes screening, HPV testing, STI counseling, HIV screening and counseling, FDA-approved contraceptive methods, breastfeeding support and supplies, and domestic violence screening and counseling.[214]\n In addition, the law established four tiers of coverage: bronze, silver, gold, and platinum. All categories offer the same set of essential health benefits. What the categories specify is the division of premiums and out-of-pocket costs: bronze plans will have the lowest monthly premiums and highest out-of-pocket costs, and vice versa for platinum plans.[209][215] The percentages of health care costs that plans are expected to cover through premiums (as opposed to out-of-pocket costs) are, on average: 60% (bronze), 70% (silver), 80% (gold), and 90% (platinum).[216]\nInsurers are also required to implement an appeals process for coverage determination and claims on all new plans.[204] They are also required to spend at least 80\u201385% of premium dollars on health costs and claims instead of administrative costs and profits; rebates must be issued to policyholders if this is violated.[217][218]\nCoverage for contraceptives\n\nOne provision in the law mandates that health insurance cover \"additional preventive care and screenings\" for women, as specified in regulations to be issued by the Health Resources and Services Administration (HRSA).[219] The HRSA guidelines, issued August 1, 2011, included in this mandate \"[a]ll Food and Drug Administration approved contraceptive methods, sterilization procedures, and patient education and counseling for all women with reproductive capacity\".[220] This mandate applies to all employers and educational institutions except for religious organizations.[221][222] These regulations were included on the recommendations of the Institute of Medicine, which concluded that access to contraception is medically necessary \"to ensure women's health and well-being.\"[223][224]\nThe initial regulations proved controversial among certain religious groups, most notably evangelicals and Lutherans, and especially the Roman Catholic hierarchy, whose hospitals, charities and educational institutions of higher learning, as well as other enterprises, oppose contraception on doctrinal grounds.[225] To accommodate those concerns while still guaranteeing access to contraception, the regulations were adjusted to \"allow religious organizations to opt out of the requirement to include birth control coverage in their employee insurance plans. In those instances, the insurers themselves will offer contraception coverage to enrollees directly, at no additional cost.\"[226]\nThe contraception rule has also been challenged by corporations as a burden against their religious expression. The first challenge to reach the Supreme Court was Burwell v. Hobby Lobby.[227] The Court ruled that closely held corporations, such as Hobby Lobby, would be exempt from the contraception rule under the Religious Freedom Restoration Act, which applies to regulations that govern the activities of closely held for-profit corporations.[228] In a follow up case to Burwell v. Hobby Lobby the U.S. Supreme Court issued an injunction pending appeal under which an evangelical college in Illinois and other religiously affiliated nonprofit groups will not have to fill out a form offered to religious nonprofits that would effectively transfer the cost of its employees\u2019 contraceptives to insurers. Wheaton College argued that filling out the form would \u201ctrigger\u201d emergency contraceptive coverage and is therefore still against the institution\u2019s religious beliefs.[229][230][231][232][233][234]\nEffects on insurance premiums\nSeveral studies on insurance premiums expect that with the subsidies offered under the ACA, more people will pay less (than they did prior to the reforms) than those who will pay more, and that those premiums will be more stable (even in changing health circumstances) and transparent, due to the regulations on insurance.[235][236][237] The Kaiser Family Foundation has calculated that about half the people who currently buy insurance on their own today will be eligible for subsidies. Among those receiving subsidies (which excludes those with incomes above four times the poverty line \u2014 about $46,000 for individuals or $94,000 for a family of four), the subsidies are projected to be worth an average of $5,548 per household, which would effectively discount the projected price of insurance by two-thirds, on average.[238] For individuals, NPR and the Kaiser Family Foundation collaborated to produce a quick online calculator for people to estimate their premiums and subsidy amount, based on where they live, income, and family size.[237]\nFor the effect on health insurance premiums, the CBO forecast that by 2016 the individual market would comprise 17% of the market, and that premiums per person would increase by 10% to 13% but that over half of these individuals would receive subsidies that would decrease the premium paid to \"well below\" premiums charged under current law.[239][240] It also forecast that for the small group market, 13% of the market, premiums would be impacted 1% to \u22123%, and \u22128% to \u221211% for those receiving subsidies; for the large group market comprising 70% of the market, premiums would be impacted 0% to \u22123%, with those under high premium plans subject to excise taxes being charged \u22129% to \u221212% less. Factors taken into account by this analysis included: increased benefits particularly for the individual market, more healthy policyholders due to the mandate, administrative efficiencies related to the health exchanges, and high-premium insurance plans reducing some benefits in response to the tax.[240] As of September 2013, the final projections of the average monthly premium scheduled to be offered in the exchanges came in below CBO expectations, reducing expected costs not only for consumers but also for the government by reducing the overall cost of the subsidies.[241][242][243][244]\nLarry Levitt, a health policy analyst from the Kaiser Family Foundation, noted that the individual market compromises a relatively small share of those under 65, and said, in contrast, \"I don't think anyone expects significant [cost] increases in the employer market,\" where the majority of Americans get their health insurance. Secretary of Health and Human Services Kathleen Sebelius also indicated that some cost increase in the individual market was expected because the standard of insurance allowed in the insurance exchanges would be higher quality than that generally available currently (and thus more expensive), and that the government subsidies provided to make insurance affordable are intended to more than offset this effect.[245]\nIn June 2013, a study by the Kaiser Family Foundation focused on actual experience under the Act as it affected individual market consumers (those buying insurance on their own). The study found that the Medical Loss Ratio provision of the Act had saved this group of consumers $1.2 billion in 2011 and $2.1 billion in 2012, reducing their 2012 costs by 7.5%.[156] The bulk of the savings were in reduced premiums for individual insurance, but some came from premium rebates paid to consumers by insurance companies that had failed to meet the requirements of the Act. The Associated Press reported that, as a result of ACA's provisions closing the Medicare Part D coverage gap (between the \"initial coverage limit\" and the \"catastrophic coverage threshold\" in the prescription drug program), individuals formerly falling in this \"donut hole\" would save about 40 percent.[246] Almost all [clarification needed] of the savings came reportedly because, with regard to brand-name drugs, ACA secured a discount from pharmaceutical companies.[246] The change benefited more than two million people, most of them in the middle class.[246]\nHealthcare cost inflation\n\n\n\n\nU.S. healthcare cost inflation from 2000 to 2011.\n\n\n\n\n\n\nU.S. healthcare costs as a percentage of GDP from 2000 to 2011.\n\n\nIn a May 2010 presentation on \"Health Costs and the Federal Budget\", the CBO stated that \"Rising health costs will put tremendous pressure on the federal budget during the next few decades and beyond. In CBO's judgment, the health legislation enacted earlier this year does not substantially diminish that pressure.\"[247]\nThe CBO further observed that \"Putting the federal budget on a sustainable path would almost certainly require a significant reduction in the growth of federal health spending relative to current law (including this year's health legislation).\"[247] and concluded,\n\n... there is considerable agreement that a substantial share of current spending on health care contributes little if anything to people's health, and providers and health analysts are making significant efforts to make the health system more efficient... [though] it is not clear what specific policies the federal government can adopt to generate fundamental changes in the health system; that is, it is not clear what specific policies would translate the potential for significant cost savings into reality.[247]\n\nJonathan Cohn, a health policy analyst, commented:\n\nCBO doesn't produce estimates of how reform will affect overall health care spending \u2014 that is, the amount of money our society, as a whole, will devote to health care. But the official actuary for Medicare does. The actuary determined that ... the long-term trend is towards less spending: Inflation after ten years would be lower than it is now. And it's the long-term trend that matters most ... [The Affordable Care Act] will reduce the cost of care\u2014not by a lot and not by as much as possible in theory, but as much as is possible in this political universe.[131][248]\n\nHe and fellow The New Republic editor Noam Scheiber claimed the CBO did not include in its estimate various cost-saving provisions intended to reduce health inflation,[249] also positing that the CBO has a history of consistently underestimating the impact of health legislation.[250]\nJonathan Gruber, a consultant who helped develop both the Massachusetts healthcare reform under Mitt Romney and the ACA,[64] has acknowledged that the ACA is not guaranteed to significantly \"bend the curve\" of rising healthcare costs:[251]\n\nThe real question is how far the ACA will go in slowing cost growth. Here, there is great uncertainty\u2014mostly because there is such uncertainty in general about how to control cost growth in health care. There is no shortage of good ideas for ways of doing so ... There is, however, a shortage of evidence regarding which approaches will actually work\u2014and therefore no consensus on which path is best to follow. In the face of such uncertainty, the ACA pursued the path of considering a range of different approaches to controlling health care costs ... Whether these policies by themselves can fully solve the long run health care cost problem in the United States is doubtful. They may, however, provide a first step towards controlling costs\u2014and understanding what does and does not work to do so more broadly.[252]\n\nThe law created the Center for Medicare and Medicaid Innovation and requires numerous pilot programs and demonstrations that may affect healthcare costs.[253] These cost reductions were not factored into CBO cost estimates.[254]\nThe Business Roundtable, an association of CEOs, commissioned a report from the consulting company Hewitt Associates which found that the legislation \"could potentially reduce that trend line by more than $3,000 per employee, to $25,435,\" with respect to insurance premiums. It also stated that the legislation \"could potentially reduce the rate of future health care cost increases by 15% to 20% when fully phased in by 2019.\" The group cautioned that all of this would be dependent upon the success of the cost-saving government pilot programs which must then be wholly copied in the private market.[255]\nThe Centers for Medicare and Medicaid Services reported in 2013 that, while costs per capita continue to rise, the rate of increase in annual healthcare costs has fallen since 2002. Per capita cost increases have averaged 5.4% annually since 2000. Costs relative to GDP, which had been rising, have stagnated since 2009.[256] Several studies have attempted to explain the reduction in the rate of annual increase. Reasons include, among others:\n\nHigher unemployment due to the 2008-2010 recession, which has limited the ability of consumers to purchase healthcare;\nOut-of-pocket payments, and deductibles, which constitute the amount an individual pays for their health costs before insurance begins to cover claims, have risen. These rising costs generally cause less consumption of healthcare services.[257] The proportion of workers with employer-sponsored health insurance requiring a deductible climbed to about three-quarters in 2012 from about half in 2006.[258][259]\nStructural changes[258] in the healthcare system made by the ACA that aim to shift the healthcare system from paying-for-quantity to paying-for-quality. Examples include incentives to reduce hospital infections and to use electronic medical records, accountable care organizations, and bundled payments to coordinate care and prioritize quality over quantity.[260] Some of these changes have occurred due to healthcare providers acting in anticipation of future implementation of reforms.[260][261]\n\nUncertainty exists about the extent to which each factor is responsible for the recent reduction in health inflation, and about the durability of the overall trend, including the accompanying reduction in long-term deficit projections due to reduced healthcare costs. However, several studies found that the temporary effects of the recession cannot account for the entirety of the slowdown and that structural changes likely share at least partial credit.[258][261][262][263]\nOne study estimated that the changes to the health system are responsible for about a quarter of the recent reduction in inflation.[264] Paul Krawzak posits that even if cost controls succeed in reducing the amount spent on healthcare, such efforts on their own may be insufficient to outweigh the long-term burden placed by demographic changes, particularly the growth of the population on Medicare.[265]\nFederal deficit\nCBO estimates of revenue and impact on deficit\n\n\n\n\n\nCBO: Deficit reduction under the ACA; the \"bump\" is from the coverage expansion starting 2014[266]\n\n\nThe 2011 comprehensive CBO estimate projected a net deficit reduction of more than $200 billion during the 2012\u20132021 period:[267][268] it calculated the law would result in $604 billion in total outlays offset by $813 billion in total receipts, resulting in a $210 billion net reduction in the deficit.[267] The CBO separately noted that while most of the spending provisions do not begin until 2014,[269][270] revenue will still exceed spending in those subsequent years.[271] The CBO averred that the bill would \"substantially reduce the growth of Medicare's payment rates for most services; impose an excise tax on insurance plans with relatively high premiums; and make various other changes to the federal tax code, Medicare, Medicaid, and other programs\"[239]\u2014ultimately extending the solvency of the Medicare trust fund by 8 years.[272]\nHowever, this estimate was made prior to the Supreme Court's ruling that enabled states to opt out of the Medicaid expansion, thereby forgoing the federal funding. The CBO and JCT subsequently updated the budget projection, estimating the impact of the ruling would reduce the cost estimate of the insurance coverage provisions by $84 billion.[124][273][274]\nMajor sources of deficit reduction include:[212] higher Medicare taxes on the wealthy; new annual fees on health insurance providers; similar fees on the healthcare industry such as manufacturers and importers of brand-name pharmaceutical drugs and certain medical devices; limits on tax deductions of medical expenses and flexible spending accounts; a new 40% excise tax on \"Cadillac\" insurance policies - plans with annual insurance premiums in excess of $10,200 for an individual or $27,500 for a family; revenue from mandate penalty payments; a 10% federal sales tax on indoor tanning services; and spending offsets such as a reduction in Medicare reimbursements to insurers and drug companies for private Medicare Advantage policies that the Government Accountability Office and Medicare Payment Advisory Commission found to be overpaid (relative to government Medicare);[275][276] and reductions in Medicare reimbursements to hospitals that do not meet standards of efficiency and care.[275]\nAlthough the CBO generally does not provide cost estimates beyond the 10-year budget projection period because of the degree of uncertainty involved in the projection, it decided to do so in this case at the request of lawmakers, and estimated a second decade deficit reduction of $1.2\u00a0trillion.[239][277] CBO predicted deficit reduction around a broad range of one-half percent of GDP over the 2020s while cautioning that \"a wide range of changes could occur\".[278]\nA commonly heard complaint regarding the CBO cost estimates is that CBO was required to exclude from its initial estimates the effects of likely \"doc fix\" legislation that would increase Medicare payments by more than $200\u00a0billion from 2010 to 2019.[279][280][281] However, the \"doc fix\" is a separate issue that would have existed whether or not the ACA became law - omitting its cost from the ACA is no different from omitting the cost of the Bush tax cuts.[282][283][284]\nOpinions on CBO projections\nThere was mixed opinion about the CBO estimates. Uwe Reinhardt, a health economist at Princeton, wrote that \"The rigid, artificial rules under which the Congressional Budget Office must score proposed legislation unfortunately cannot produce the best unbiased forecasts of the likely fiscal impact of any legislation\", but went on to say \"But even if the budget office errs significantly in its conclusion that the bill would actually help reduce the future federal deficit, I doubt that the financing of this bill will be anywhere near as fiscally irresponsible as was the financing of the Medicare Modernization Act of 2003.\"[285] Douglas Holtz-Eakin, CBO director during the George W. Bush administration, who later served as the chief economic policy adviser to U.S. Senator John McCain's 2008 presidential campaign, alleged that the bill would increase the deficit by $562\u00a0billion because, he argued, it front-loaded revenue and back-loaded benefits.[286]\nThe New Republic editors Noam Scheiber and Jonathan Cohn, countered critical assessments of the law's deficit impact, arguing that it is as likely, if not more so, for predictions to have underestimated deficit reduction than to have overestimated it. They noted that it is easier, for example, to account for the cost of definite levels of subsidies to specified numbers of people than account for savings from preventive healthcare, and that the CBO has a track record of consistently overestimating the costs of, and underestimating the savings of health legislation;[249][250] \"innovations in the delivery of medical care, like greater use of electronic medical records[287] and financial incentives for more coordination of care among doctors, would produce substantial savings while also slowing the relentless climb of medical expenses... But the CBO would not consider such savings in its calculations, because the innovations hadn't really been tried on such large scale or in concert with one another\u2014and that meant there wasn't much hard data to prove the savings would materialize.\"[249]\nDavid Walker, former U.S. Comptroller General now working for The Peter G. Peterson Foundation, has stated that the CBO estimates are not likely to be accurate, because they are based on the assumption that Congress is going to do everything they say they're going to do.[288] The Center on Budget and Policy Priorities objected: in its analysis, Congress has a good record of implementing Medicare savings. According to their study, Congress followed through on the implementation of the vast majority of provisions enacted in the past 20\u00a0years to produce Medicare savings.[289][290]\nEmployer mandate and part-time working hours\n\nNot to be confused with the individual mandate[291][292]\n\n\nThe employer mandate is a penalty that will be incurred by employers with more than 50 employees that do not offer health insurance to their full-time workers.[293] This provision was included as a disincentive for employers considering dropping their current insurance plans once the insurance exchanges began operating as an alternative source of insurance.[294] Proponents of the reform law wanted to address the parts of the healthcare system they believed to not be working well, while causing minimal disruption to those happy with the coverage they have.[295][294] Lawmakers recognized that approximately 80% of Americans already have insurance, of whom 54% (44% of the total population) are covered directly or indirectly through an employer, and 29% (23% of the total population) are covered by the government\u2014mainly though Medicare and Medicaid.[296][297] While 73% of the total population reported themselves satisfied with their insurance situation, significant minorities, even among those that reported favorably, had medically-related financial troubles and\/or dissatisfaction with aspects of their insurance coverage, especially among the poor and sick.[295] The intent of the employer mandate (along with a grandfather clause in the ACA) is to help ensure that existing employer-sponsored insurance plans that people like will stay in place.[294]\nAs no company with fewer than 50 full-time employees will face this penalty, many[who?] are concerned that the employer mandate creates a perverse incentive for business to employ people part-time instead of full-time.[298][299] This hypothetical phenomenon has sometimes been referred to by commentators on both sides of the political spectrum as \"The Obamacare Effect.\"[300][301][302]\nDespite concerns over a massive spike in part-time workers driven by cost-cutting efforts on the part of large employers, the number of part-time jobs in the United States had, in fact, declined by 230,000, while the number of full-time jobs has increased by 2 million during the period leading up to the start-date of Obamacare as of early 2014.[302][303] Where full-time jobs have turned into part-time jobs seems to be in the public-sector, as an effort to reduce state and federal deficits, rather than as an effort to maintain or increase corporate profits in the private sectors (the original fear of individuals who coined the term 'Obamacare Effect').[302][304]\nSeveral businesses and the State of Virginia have clarified the contracts of their part-time employees by adding a 29-hour-a-week cap,[305][unreliable source?][306][unreliable source?] to reflect the 30-hour threshold for full-time hours, as defined by the law.[293] Some labor market experts claim such shifts are not clearly attributable to the implementation of the ACA: pre-existing, long-term trends in working hours,[307] and the effects of the Great Recession correlate with part-time working hour patterns.[308][309] The impact of this provision on employers' decision-making is partially offset by other factors: offering healthcare helps attract and retain employees, while increasing productivity and reducing absenteeism; and to trade a smaller full-time workforce for a larger part-time work force carries costs of training and administration for a business.[299][307][310] The amount of employers with over 50 employees is relatively [clarification needed] small,[299] and more than 90% of these already offer insurance,[311] so changes in employer plans from this provision are expected to be small.[298] Workers who do not receive insurance from an employer plan would be able to purchase insurance on the exchanges.[312]\nRegardless of the rationale for maintaining existing insurance arrangements for those happy with them, most policy analysts (on both the right and left) are critical of the employer mandate provision on the policy merits.[298][311] They argue that the perverse incentives regarding part-time hours, even if they do not change many existing insurance plans, are real and harmful;[313][314] that the raised marginal cost of the 50th worker for businesses could limit companies\u2019 growth;[315] that the costs of reporting and administration\u2014the paperwork for businesses and the state enforcement\u2014are not worth the trade-off of incentivizing the maintenance of current employer plans;[313][314] and note that the employer mandate, unlike the individual mandate, is a non-essential part of the law.[316][292] Some analysts have suggested that an alternate 'pay or play' version of the employer mandate would partially avoid these problems, by instead taxing business that do not offer insurance by a percentage of their payroll rather than using the 50-employee and 30-hour cut-offs.[298][313][314] Furthermore, many healthcare policy analysts think it would be better to transition away from the employer-based system to systems (whether state- or market-based) where insurance is more portable and stable, and hence think that it is a bad idea to even try to maintain existing employer insurance systems.[317] The effects of the provision have also generated vocal opposition from business interests and some unions not granted exemptions.[314][318]\nOn July 2, 2013, the Obama Administration announced on the Treasury Department's Proposed Regulations REG-138006-12[319] would delay the implementation of the employer mandate for one year, until 2015.[311][320]\nA 2013\/4 survey by the National Association for Business Economics found that about 75 percent of those surveyed said the ACA hasn\u2019t influenced their planning or expectations for 2014, and 85 percent said the law wouldn\u2019t prompt a change in their hiring practices. Some 21 percent of 64 businesses surveyed said that the act would have a harmful effect and 5 percent said it would be beneficial.[321]\nOn 10 February 2014, the Treasury Department issued Treasury Decision 9655, which are final regulation, that it would delay the employer mandate until 2015.[319] The Treasury Decision 9655 modifies Proposed Regulations REG-138006-12.[319]\nChanges in existing individual insurance plans\nAt various times during and after the debate surrounding the ACA, Obama stated that \"if you like your health care plan, you'll be able to keep your health care plan\".[322][323] However, the law grandfathers only those insurance plans that were in effect before the law was enacted and have not been significantly changed since then.[323] Plans that do not satisfy these criteria must be cancelled if they do not comply with the law's new requirements for insurance standards. Furthermore, the law does not prohibit insurers from cancelling older plans for other reasons, such as a determination that a plan is too expensive to maintain. For these reasons, in fall 2013 millions of Americans with individual policies received notices that their insurance plans were being terminated,[324] and several million more are in danger of seeing their current plans cancelled.[325][326][327]\nOn November 7, 2013, President Obama stated: \"I am sorry that [people losing their plans] are finding themselves in this situation based on assurances they got from me\", and he promised to work to help the affected Americans.[328] Various acts have been introduced in Congress to allow people to keep their existing individual insurance plans.[329] President Obama's previous unambiguous assurance that consumers' could keep their own plans has become a focal point for critics of the ACA[330][331] and a political liability for the law's proponents.[332][333] Whether or not President Obama knew that his statements were incorrect at the time he made them has also become the focus of discussion.[323][334][335]\nClawback controversy\nThe asset-recovery provision of Medicaid, nicknamed the \"clawback\" provision, was enacted in 1993 by Congress in response to rising Medicaid administrative costs. States were compelled to try to recover costs from the estates of the deceased who used the program for long-term care, either via liens placed on an individual's home or claims on their assets. There was also an option for states to recover other routine medical care expenses. The expansion of Medicaid under the Affordable Care Act made more residents eligible for Medicaid. The state and federal government as of February 2014 have not clarified clawback guidelines, triggering complaints from consumers and advocacy groups from the uncertainty.[336]\nHospitals\nFrom the start of 2010 to November 2014, 43 hospital in rural areas closed, according to the North Carolina Rural Health Research Program. Critics of the Affordable Care Act have stated that the new law has caused these hospitals to close. Many of these rural hospitals were built using funds from the 1946 Hill\u2013Burton Act, to increase access to medical care in rural areas. Some of these hospitals have re-opened as other forms of medical facilities, but only a small number of those re-opened facilities operate emergency rooms or urgent care centers.[337]\nPublic opinion\nPublic opinion polls indicate that the United States public generally supports healthcare reform, but the public's views became increasingly negative in reaction to specific plans discussed during the legislative debate over 2009 and 2010. Polling statistics for the general population show a general negative opinion of the law in the first years; with those in favor at approximately 40% and those against at 51%, as of October 2013.[338][339] About 29% of whites approve of the law, compared with 61% of Hispanics and 91% of African Americans, according a Pew Research Center and USA Today survey conducted on 4\u20138 September 2013.[340] USA Today found opinions were strongly divided by age of the person at the law's inception, with a solid majority of seniors opposing the bill and a solid majority of those younger than forty years old in favor.[341]\nSpecific elements are very popular across the political spectrum, with the notable exception of the mandate to purchase insurance. FiveThirtyEight, describing public opinion of the law, said, \"while surveys have consistently found that a plurality of Americans have an overall negative view of the Affordable Care Act, they have just as consistently shown that large majorities of Americans favor individual elements of the law.\"[342][343] For example, a Reuters-Ipsos poll during June 2012 indicated that 44% of Americans supported the law, with 56% against. By party affiliation, 75% of Democrats, 27% of Independents, and 14% of Republicans favored the law overall. Individual provisions of the law received varying levels of support: 82% favored banning insurance companies from denying coverage to people with pre-existing conditions, 61% favored allowing children to stay on their parents' insurance until age 26, 72% supported requiring companies with more than 50 employees to provide insurance for their employees, and 39% supported the individual mandate to own insurance or pay a penalty. By party affiliation, 19% of Republicans, 27% of Independents, and 59% of Democrats favored the mandate.[344] Other polls showed additional provisions receiving majority support include the creation of insurance exchanges, pooling small businesses and the uninsured with other consumers so that more people can take advantage of large group pricing benefits, and providing subsidies to individuals and families to make health insurance more affordable.[345][346] Other specific ideas that were not enacted but which showed majority support included importing prescription drugs from Canada (with its lower, government-controlled prices),[347] limiting malpractice awards, reducing the age to qualify for Medicare, and the Public health insurance option.[348]\nPollsters probed the reasons for opposition.[349] In a CNN poll, 62% of respondents said they thought the ACA would \"increase the amount of money they personally spend on health care\", 56% said the bill \"gives the government too much involvement in health care\", and 19% said they thought they and their families would be better off with the legislation.[350] Other polls found that people were concerned that the law would cost more than projected, and would not do enough to control the cost of health care affecting their families.[351]\nHowever, part of the opposition to the law is because some Americans believe the reform did not go far enough: A Reuters-Ipsos poll indicated that, for those opposed to the bill, 71% of Republican opponents reject it overall while 29% believed it did not go far enough; independent opponents were divided 67% to 33%; and among the relatively much smaller group of Democratic opponents, 49% reject it overall, and 51% wanted the measure to go further.[344]\nAs of 2011 many Democrats believed that the ACA would grow more popular over time, like Medicare did after its implementation,[352] as the benefits of the law take effect and close the information gap about the contents of the bill.[342][343][353]\nIn June 2013, a majority of the public (52\u201334%) indicated a desire for \"Congress to implement or tinker with the law rather than repeal it\".[354] Following the Supreme Court upholding the constitutionality of the individual mandate in National Federation of Independent Business v. Sebelius, a poll released in July 2012 showed that \"most Americans (56%) want to see critics of President Obama's health care law drop efforts to block it and move on to other national issues.\"[355] The RAND Health Reform Opinion Study for May 1, 2014, showed that 48.9% of respondents had an unfavorable view of the ACA vs. 38.3% who had a favorable view (of more than 5,500 individuals).[356]\nPolling averages from RealClearPolitics showed public approval of the ACA as 52.1% against and 38.6% for (poll averages from February 27 to March 25, 2014).[338]\nAn Associated Press-GfK poll released March 28, 2014 showed that 26% of Americans support the ACA.[357]\nA Wall Street Journal\/NBC poll released April 30, 2014, indicated that 8% of respondents say that the Affordable Care Act \"is working well the way it is.\"[358]\nPolitical\nTerm \"Obamacare\"\nThe term \"Obamacare\" was originally coined by opponents of the Affordable Care Act as a pejorative term for the law. The term was first put in print in March 2007 when healthcare lobbyist Jeanne Schulte Scott penned it in a health industry journal, writing \"We will soon see a 'Giuliani-care' and 'Obama-care' to go along with 'McCain-care', 'Edwards-care', and a totally revamped and remodeled 'Hillary-care' from the 1990s\".[14][359] According to research by Elspeth Reeve at The Atlantic magazine, the expression Obamacare first was used in early 2007, generally by writers describing the candidate's proposal for expanding coverage for the uninsured.[360] The word was first uttered in a political campaign by Mitt Romney in May 2007 in Des Moines, Iowa. Romney said, \"In my state, I worked on healthcare for some time. We had half a million people without insurance, and I said, 'How can we get those people insured without raising taxes and without having government take over healthcare?' And let me tell you, if we don't do it, the Democrats will. If the Democrats do it, it will be socialized medicine; it'll be government-managed care. It'll be what's known as Hillarycare or Barack Obamacare, or whatever you want to call it.\"[14]\nBy mid-2012, Obamacare had become the most common colloquial term used to refer to the law by both supporters and opponents. In contrast, the use of \"Patient Protection and Affordable Care Act\" or \"Affordable Care Act\" became limited to more formal and official use.[360] Use of the term in a positive sense was suggested by Democrat John Conyers.[361] President Obama endorsed the nickname, saying, \"I have no problem with people saying Obama cares. I do care.\"[362] Because of the number of \"Obamacare\" search engine queries, the Department of Health and Human Services purchased Google advertisements, triggered by the term, to direct people to the official HHS site.[363] In March 2012, the Obama reelection campaign embraced the term \"Obamacare\", urging Obama's supporters to post Twitter messages that begin, \"I like #Obamacare because...\".[364] After its debut as a phrase on Capitol Hill, according to an analysis by the Sunlight Foundation, from July 2009 to June 2012 the term \"Obamacare\" was used nearly 3,000 times in congressional speeches.[14]\nIn October 2013 the Associated Press and NPR began cutting back on use of the term.[365] Stuart Seidel, NPR's managing editor, said that the term \"seems to be straddling somewhere between being a politically-charged term and an accepted part of the vernacular\".[366]\nCommon misconceptions\n\"Death panels\"\nMain article: Death panel\nOn August 7, 2009, Sarah Palin claimed the proposed legislation would create \"death panels\" that would decide if sick and elderly Americans were \"worthy\" of medical care.[367] The allegation was named PolitiFact's \"Lie of the Year\",[367][368] one of FactCheck's \"whoppers\",[369][370] and the most outrageous term by the American Dialect Society.[371] The AARP described such rumors as \"rife with gross\u2014and even cruel\u2014distortions.\"[372] In 2010, the Pew Research Center reported that 85% of Americans were familiar with the claim, and 30% believed it was true, with three contemporaneous polls finding similar results.[373] A poll in August 2012 found that 39% of Americans still believed the \"death panels\" claim.[374]\nThe \"death panel\" misconception distorts separate issues initially related to two proposed provisions found in the early drafts of the ACA. One was a claim that under the law, seniors can be denied care due to their age[375] and the other that the government will advise them to end their own lives instead of receiving due care[376] \u2014 the former eventually morphing into alluding to the Independent Payment Advisory Board (IPAB), which was established with the passage of the ACA, instead.[376] The IPAB has the authority to determine then recommend additional cost-saving changes to the Medicare program by facilitating the adoption of additional cost-effective treatments and similar cost-recovering measures when the statutory levels set for the administration of the Medicare program are exceeded within any given 3-year cycle scheduled. In fact, the Board is prohibited from recommending changes that would reduce payments to certain providers before 2020, and is also prohibited from recommending changes in premiums, benefits, eligibility and taxes, or other changes that would result in rationing.[377][378]\nThe other related issue concerns advance-care planning consultation: a section of the House reform proposal would have reimbursed physicians for providing voluntary consultations of Medicare recipients on end-of-life health planning (which is also covered by many private plans), enabling patients to specify, on request, the kind of care they wish to receive in their old age.[379] As described by the site Snopes.com, \"This provision would allow patients to prepare for the day when they might be seriously ill and unable to make medical decisions for themselves by engaging in consultations with doctors to discuss the full range of end-of-life care options available to them, and to have the cost of such consultations covered by Medicare ... [including] directives to accept or refuse extreme life-saving measures, selection of hospice care programs, appointment of relatives\" to act on the patient's behalf, etc.[372] The provision was not included in the final draft of the 2009 bill that was enacted into law.[380]\nExemptions for Congressmen\nA separate common misconception about the ACA is that members of Congress are exempt from the Act's reforms. In fact, the ACA requires members of Congress and their staffs to obtain health insurance either through an exchange or some other program approved by the law (such as Medicare), instead of using the insurance offered to federal employees (the Federal Employees Health Benefits Program). The federal government will continue to maintain its contributions to the new health insurance plans of federal employees.[148][381][382][383][384]\nBenefits for illegal immigrants\nAnother common misconception is that the ACA provides benefits to illegal immigrants.[385] In fact, the ACA explicitly denies insurance subsidies to \"unauthorized (illegal) aliens\".[122][127][386]\nOpposition and resistance\nEfforts to oppose and repeal the legislation have drawn support from prominent conservative advocacy groups,[387][388] Congressional and many state Republicans, certain small business organizations, and the Tea Party movement.[389] These groups believe the law will lead to disruption of existing health plans, increased costs from new insurance standards, and that it will increase the deficit.[390] Some are also against the idea of universal healthcare, viewing insurance as similar to other commodities to which people are not entitled.[391][392]\nAs of 2013[update] unions that have expressed concerns about the negative impact the ACA will have on their members' health care benefits, included the AFL-CIO,[393] which called the ACA \"highly disruptive\" to union health care plans and said it would drive up costs of union-sponsored plans; and International Brotherhood of Teamsters, United Food and Commercial Workers International Union, and UNITE-HERE, leaders of which sent a letter to Harry Reid (D-NV) and Nancy Pelosi (D-CA) stating that \"the ACA will shatter not only our hard-earned health benefits, but destroy the foundation of the 40 hour work week that is the backbone of the American middle class.\"[394] In January 2014, Terry O\u2019Sullivan, president of the Laborers\u2019 International Union of North America (LIUNA) and D. Taylor, president of Unite Here sent a letter to Harry Reid (D-NV) and Nancy Pelosi (D-CA) stating that, \"The ACA, as implemented, undermines fair marketplace competition in the health care industry.\"[395]\nLegal challenges\n\nOpponents of the Patient Protection and Affordable Care Act turned to the federal courts to challenge the constitutionality of the legislation.[396][397] In National Federation of Independent Business v. Sebelius, decided on June 28, 2012, the Supreme Court ruled on a 5\u20134 vote that the individual mandate is constitutional under Congress's taxation powers, although the law could not have been upheld under Congress's regulatory power under the Commerce Clause. The Court also determined that states could not be forced to participate in the Medicaid expansion, effectively allowing states to opt out of this provision. As written, the ACA withheld all Medicaid funding from states declining to participate in the expansion. The Supreme Court ruled that this withdrawal of funding was unconstitutionally coercive and that individual states had the right to opt out of the Medicaid expansion without losing preexisting Medicaid funding from the federal government. All provisions of ACA will continue in effect or will take effect as scheduled subject to the states' determination on Medicaid expansion.[398]\nIn March 2012 the Roman Catholic Church, while supportive of the ACA's objectives, has voiced concern through the United States Conference of Catholic Bishops that aspects of the mandate covering artificial contraception and sterilization and HHS's narrow definition of a religious organization were violations of the First Amendment right to free exercise of religion and conscience. Numerous lawsuits are pending addressing these concerns.[399][400]\nState rejections of Medicaid expansion\n\n\n\n\nMedicaid expansion by state.[401]\n\u00a0\u00a0Expanding Medicaid\n\u00a0\u00a0Considering Medicaid expansion\n\u00a0\u00a0Not expanding Medicaid\n\n\n\nFollowing the Supreme Court ruling in NFIB v. Sebelius, several states with legislatures or governorships controlled by Republicans opted to reject the expanded Medicaid coverage provided for by the Act. Over half of the national uninsured population lives in those states.[402] As of September 2014[update], with the addition of Pennsylvania, 27 states and the District of Columbia have adopted the Medicaid expansion; a few states have remained undecided.[401][403][404] States that declined to expand Medicaid before 2014 may still choose to opt in at any time.[405]\nThe drafters of the ACA had intended for Medicaid to cover individuals and families with incomes up to 133% (138% under effective definitions of income[40]) of the federal poverty level by expanding Medicaid eligibility and simplifying the CHIP enrollment process. Low-income individuals and families above 100% and up to 400% of the federal poverty level were to receive federal subsidies[35] on a sliding scale if they choose to purchase insurance via an exchange. For example, individuals with incomes between 133% and 150% of the poverty level would be subsidized such that their premium cost would be 3% to 4% of their income.[36] The Supreme Court ruling created the potential for a coverage gap. States that chose to reject the Medicaid expansion could maintain the pre-existing Medicaid eligibility thresholds they have set, which in many states are significantly below 133% of the poverty line for most individuals.[406] Furthermore, many states do not make Medicaid available to childless adults at any income level.[407] Because subsidies on insurance plans purchased through exchanges are not available to those below the poverty line, this created a coverage gap in those states between the state Medicaid threshold and the subsidy eligibility threshold.[408][409] For example, in Kansas, where only those able-bodied adults with children and with an income below 32% of the poverty line are eligible for Medicaid, those with incomes from 32% to 100% of the poverty level ($6,250 to $19,530 for a family of three) would be ineligible for both Medicaid and federal subsidies to buy insurance. If they have no children, able-bodied adults are not eligible for Medicaid in Kansas.[402] Studies of the impact of state decisions to reject the Medicaid expansion, as of July 2013, calculate that up to 6.4 million Americans could fall into this coverage gap.[410]\nFor states that do expand Medicaid, the federal government pays for 100% of the expansion through 2016, and the subsidy tapers to 90% by 2020.[405] Several opposing states argue that their 10% responsibility of funding the expansion will be too much for their states' budgets.[405][411] Studies suggest that rejecting the expansion will cost states more than expanding Medicaid due to increased spending on uncompensated emergency care that otherwise would have been partially paid for by Medicaid coverage.[412]\nNon-cooperation\nOfficials in Texas, Florida, Alabama, Wyoming, Arizona, Oklahoma and Missouri have decided to oppose those elements of the ACA over which they have discretion.[413][414] For example, Missouri declined to expand Medicaid or establish a health insurance marketplace but is also engaged in an active program of non-cooperation, having enacted a statute forbidding any state or local official to render any aid not specifically required by federal law to the functioning of the Affordable Care Act.[415] Other Republican politicians have tried to discourage efforts to advertise the benefits of the law, and some conservative political groups have launched ad campaigns to discourage enrollment.[416][417]\nRepeal efforts\nThe ACA has been the subject of unsuccessful repeal efforts by Republicans in the 111th, 112th, and 113th Congresses: U.S. House Reps Steve King (R-IA) and Michele Bachmann (R-MN) introduced bills in the House to repeal the ACA the day after it was signed, as did Senator Jim DeMint (R-SC) in the U.S. Senate.[418] In 2011, after Republicans gained control of the House of Representatives, one of the first votes held was on a bill entitled \"Repealing the Job-Killing Health Care Law Act\" (H.R. 2), which the House passed on a 245\u2013189 vote.[419] All Republicans and 3 Democrats voted for repeal.[420] House Democrats proposed an amendment that repeal not take effect until a majority of the Senators and Representatives had opted out of the Federal Employees Health Benefits Program; Republicans voted down the measure.[421] In the Senate, the bill was offered as an amendment to an unrelated bill but was voted down.[422] President Obama had stated that he would have vetoed the bill even if it had passed both chambers of Congress.[423]\nFollowing the 2012 Supreme Court ruling upholding the ACA as constitutional, Republicans held another vote to repeal the law on July 11;[424] the House of Representatives voted with all 244 Republicans and 5 Democrats in favor of repeal, which marked the 33rd, partial or whole, repeal attempt.[425][426] With President Obama's reelection and the Democrats expanding their majority in the Senate following the 2012 elections, many Republicans conceded that repeal almost certainly will not occur.[427] On February 3, 2015 the House of Representatives added its 67th repeal vote to the record with 239 to 186 and nine members abstaining, moving the action to the Senate, where Republican Senator Ted Cruz, (R-Texas), introduced legislation for full repeal with vote on 9-2-2015.[428]\n2013 federal government shutdown\nStrong partisan disagreement in Congress has prevented adjustments to the Act's provisions.[429] However, at least one change, a proposed repeal of a tax on medical devices, has received bipartisan support.[430] Some Congressional Republicans argue against improvements to the law on the grounds they would weaken the arguments for repeal.[291][314]\nRepublicans attempted to defund its implementation,[414][431] and in October 2013, House Republicans, supported by Senators Rand Paul, Ted Cruz, Mike Lee, and Marco Rubio, refused to fund the federal government unless accompanied with a delay in implementation of the ACA, after the President unilaterally pushed back the employer mandate by one year, which critics claim he had no legal right to do. The Republican-held House of Representatives passed three versions of a bill funding all elements of the government while submitting various versions which would repeal or delay the ACA, with the last version delaying enforcement of the \u201cindividual mandate\u201d. These bills were unable to muster enough votes in the Democrat-held Senate, with Democratic leadership stating the Senate would only pass a \"clean\" funding bill without any restrictions on the ACA. After Congress failed to pass a continuing funding resolution by midnight on October 1, a government shutdown ensued.[432][433][434] Conservative groups such as Heritage Action provided lobbying support for the linkage between the ACA and the government shutdown.[435][436][437] Senate Republicans threatened to block appointments to relevant agencies, such as the Independent Payment Advisory Board[438] and Centers for Medicare and Medicaid Services.[439][440]\nEconomic consequences\nUntil passage of the ACA, the majority of US citizens had a company sponsored insurance plan, and the U.S. was the only rich nation where this was the case. Companies began offering insurance policies during World War II to attract talent from the reduced supply of workers, a practice later cemented by tax policies that encouraged untaxed benefits (such as health care) rather than taxable ones such as cash. Offering insurance in lieu of cash compensation made corporations responsible for their employee's health. Rising insurance costs coupled with rising salaries squeezed both benefits and salaries until aging workers found their salaries stagnating and their benefits cut.[441]\nAs of 2014 large company policies were still the norm, since tax laws until 2018 make benefits cheaper than cash, but many employees have been losing their \"paternalistic\" corporate policies and must find their own insurance. With the insurance system introduced under the ACA, employers who stopped their company sponsored insurance plan eliminated one of their largest compensation benefits, and shifted more costs on to employees. These include insurance premiums rising to 28% in 2013, compared with 26% in 2003, according to the Kaiser Family Foundation, and more workers paying deductibles of $1,000 reaching 38% in 2013, more than twice what it was in 2008. According to one study, as of 2014, only 25% of firms saw themselves offering any insurance in 10 years.[441]\nTo avoid the ACA requirements[442] for firms over 50 people, smaller firms have been reducing their workforces to part-time workers, usually one hour below the federal requirement for full-time work.[citation needed] This will improve hiring and salary while simultaneously improve the efficiency of healthcare policies and worker mobility.[citation needed]\nThe House Republican leadership put forth the argument in favor of repeal that \"this is a job-killing law, period.\"[443] They contended that the ACA would lead to a loss of 650,000 jobs, attributing the figure to a report by the Congressional Budget Office.[443] However, FactCheck noted that the 650,000 figure was not included in the CBO report referred to, saying that the Republican statement \"badly misrepresents what the Congressional Budget Office has said about the law. In fact, CBO is among those saying the effect [on employment] 'will probably be small.'\"[443] PolitiFact rated the Republican statement as false.[444]\nJonathan Cohn, citing the projections of the CBO, summarized that the primary employment effect of the ACA is to alleviate job lock: \"People who are only working because they desperately need employer-sponsored health insurance will no longer do so.\"[445] He concluded that the \"reform's only significant employment impact was a reduction in the labor force, primarily because people holding onto jobs just to keep insurance could finally retire\" because they have health insurance outside of their jobs.[446]\nImpact of repeal on federal budget projections\nIn May 2011, the nonpartisan Congressional Budget Office (CBO) analyzed proposals to repeal the law. Mirroring its analysis of the law itself, the CBO estimated that repealing the entire law (both its taxing and spending provisions) would increase the net 2011\u20132021 federal deficit by $210 billion.[447][448] Revised CBO accounting, following the July 11, 2012, House repeal vote (H.R. 6079), and taking into account the impact of Supreme Court ruling, was consistent with its previous estimate: that repeal would cause a net increase in federal budget deficits of $109 billion over the 2013\u20132022 period.[449]\nSee also\n\n\nReferences\n\n\n^ Pear, Robert (July 7, 2012). \"Health Law Critics Prepare to Battle Over Insurance Exchange Subsidies\". New York Times. Retrieved July 7, 2012.\u00a0\n^ Krugman, Paul (January 31, 2010). \"Krugman calls Senate health care bill similar to law in Massachusetts\". PolitiFact.com. Tampa Bay Times. Retrieved August 29, 2012.\u00a0\n^ \"ObamaCare Survives the Supreme Court: 5 Takeaways\". The Week. June 28, 2012. Retrieved June 30, 2012.\u00a0\n^ Elmendorf, Douglas W. (March 30, 2011). \"CBO's Analysis of the Major Health Care Legislation Enacted in March 2010\" (PDF). Congressional Budget Office. Retrieved July 15, 2012.\u00a0\n^ Elmendorf, Douglas W. (June 21, 2011). \"CBO's 2011 Long-Term Budget Outlook\" (PDF). Congressional Budget Office. p.\u00a044. Through those changes and numerous others, the 2010 legislation significantly decreased Medicare outlays relative to what they would have been under prior law.\u00a0\n^ ABA Health eSource (July 12, 2012). \"Supreme Court Upholds PPACA\". Retrieved November 20, 2013.\u00a0\n^ Pg 55\u201358, slip opinion, National Federation of Independent Business v. Sebelius, U.S. Supreme Court (June 28, 2012)\n^ Barrett, Paul M. (June 28, 2012). \"Supreme Court Supports Obamacare, Bolsters Obama\". BloombergBusinessweek. Retrieved June 30, 2012.\u00a0\n^ National Post Wire Services (June 28, 2012). \"Obamacare upheld by the U.S. Supreme Court\". National Post. Retrieved June 30, 2012.\u00a0\n^ Jenna Levy. \"In U.S., Uninsured Rate Dips to 11.9% in First Quarter\". Gallup Polling. PMID\u00a0041815.\u00a0\n^ http:\/\/www.huffingtonpost.com\/2015\/03\/24\/obamacare-uninsured-americans_n_6929310.html\n^ Pub.L. 111\u2013148, 124\u00a0Stat.\u00a0119\n^ \"Public Law 111\u2013148\". 111th United States Congress. Washington, D.C.: United States Government Printing Office. March 23, 2010. Retrieved 2013-12-22.\u00a0\n^ a b c d Wallace, Gregory (June 25, 2012). \"'Obamacare': The word that defined the health care debate\". CNN. Retrieved September 4, 2012.\u00a0\n^ \"What if I have a grandfathered health insurance plan?\". HealthCare.gov.\u00a0\n^ Fernandez, Bernadette (April 27, 2010). \"Grandfathered Health Plans Under the Patient Protection and Affordable Care Act (PPACA)\" (PDF). Congressional Research Service.\u00a0\n^ a b U.S. Department of Health and Human Services (June 28, 2010). \"Patient Protection and Affordable Care Act; Requirements for Group Health Plans and Health Insurance Issuers Under the Patient Protection and Affordable Care Act Relating to Preexisting Condition Exclusions, Lifetime and Annual Limits, Rescissions, and Patient Protections; Final Rule and Proposed Rule\". Federal Register 75 (123): 37187\u201337241. Retrieved July 26, 2010.\u00a0\n^ a b Pool, Gentrie (October 7, 2010). \"After PPACA: The Future of the Health Insurance Underwriter\". Asjonline.com. Retrieved April 9, 2012.\u00a0\n^ \"Selected Patient Protection and Affordable Care Act (PPACA) implementation dates of interest to RNs as caregivers, RNs as patients, and RNs as employees\" (PDF). Nursingworld.org. Retrieved April 9, 2012.\u00a0\n^ a b Cohn, Jonathan (June 12, 2013). \"You Call This Insurance?\". The New Republic.\u00a0\n^ a b \"Essential Health Benefits \u2013 Glossary\". HealthCare.gov. September 23, 2010. Retrieved January 9, 2012.\u00a0\n^ \"HHS and states move to establish Affordable Insurance Exchanges, give Americans the same insurance choices as members of Congress\" (Press release). Hhs.gov. July 11, 2011. Retrieved April 9, 2012.\u00a0\n^ \"Patient Protection and Affordable Care Act of 2009: Health Insurance Exchanges\" (PDF). National Association of Insurance Commissioners. April 20, 2010. Retrieved April 9, 2012.\u00a0\n^ \"The Patients' Bill of Rights: Ending annual and lifetime limits\" (PDF) (Press release). FamiliesUSA. September 23, 2010. Retrieved April 9, 2012.\u00a0\n^ a b c \"Minimum Coverage Provision (\"individual mandate\")\". American Public Health Association (APHA).\u00a0\n^ \"Perkins Accounting Firm Newsroom Bulletin Health Insurance Legislation Mandates\" (Press release). Perkinsaccounting.com. April 9, 2012. Archived from the original on September 9, 2012. Retrieved March 4, 2013.\u00a0\n^ Galewitz, Phil (March 26, 2010). \"Consumers Guide To Health Reform\". Kaiser Health News.\u00a0\n^ a b Luhby, Tami (April 23, 2013). \"Millions eligible for Obamacare subsidies, but most don't know it\". CNNMoney. Retrieved June 22, 2013.\u00a0\n^ a b c \"Welcome to the Marketplace\". HealthCare.Gov, managed by the Centers for Medicare and Medicaid Services.\u00a0\n\"What is the Health Insurance Marketplace?\". HealthCare.Gov, managed by the Centers for Medicare and Medicaid Services.\u00a0\n^ CNN (April 23, 2013). \"Millions eligible for Obamacare subsidies, but most don't know it\".\u00a0\n^ \"Establishing Health Insurance Exchanges: An Overview of State Efforts\" (PDF).\u00a0\n^ \"Health Insurance Marketplace Opens, Offers Millions of Americans Quality, Affordable Health Care Coverage\" (Press release). CMS.gov. October 1, 2013. Retrieved October 4, 2013.\u00a0\n^ Morgan, David; Begley, Sharon (September 30, 2013). \"Obamacare push accelerates as government shutdown nears\". Reuters. Retrieved October 1, 2013. Sebelius said on Monday that \"the key date really is the 15th of December,\" the deadline for buying coverage that starts on January 1.\u00a0\n^ \"Glossary: Open Enrollment Period\". HealthCare.gov. Retrieved October 4, 2013.\u00a0\n^ a b c d e \"Explaining Health Care Reform: Questions About Health Insurance Subsidies\". Kaiser Family Foundation. July 1, 2012. Retrieved July 1, 2012.\u00a0\n^ a b Grier, Peter (March 20, 2010). \"Health care reform bill 101: Who gets subsidized insurance?\". The Christian Science Monitor. Retrieved January 9, 2012.\u00a0\n^ Andrews, Michelle (August 27, 2013). \"Health Insurance Exchanges Prompt Consumers' Questions\". NPR.\u00a0\n^ a b \"Small Business Health Care Tax Credit for Small Employers\". Internal Revenue Service. December 13, 2011. Retrieved January 9, 2012.\u00a0\n^ a b \"Where are States Today? Medicaid and CHIP Eligibility Levels for Children and Non-Disabled Adults\". Kaiser Family Foundation. March 28, 2013.\u00a0\n^ a b c \"Medicaid Expansion\". American Public Health Association (APHA). Is Medicaid eligibility expanding to 133 or 138 percent FPL, and what is MAGI?. Retrieved July 24, 2013.\u00a0\n^ \"Access\". Medscape. Retrieved January 9, 2012.\u00a0\n^ \"Key Healthcare Reform Initiatives: Medicare Bundled Payment Pilots\". Huron Consulting Group. November 19, 2010. Retrieved January 9, 2012.\u00a0\n^ \"More savings in the drug coverage gap coming through 2020\". Medicare.gov. Centers for Medicare & Medicaid Services. Retrieved September 27, 2013.\u00a0\n^ \"Explaining Health Care Reform: What is Employer \"Pay-or-Play\" Requirement?\". Kaiser Family Foundation. May 1, 2009. Retrieved January 9, 2012.\u00a0\n^ McNamara, Kristen (March 25, 2010). \"What Health Overhaul Means for Small Businesses\". The Wall Street Journal.\u00a0\n^ Dorning, Mike; Wayne, Alex (July 3, 2013). \"Health-Law Employer Mandate Delayed by U.S. Until 2015\". Bloomberg. Retrieved November 19, 2013.\u00a0\n^ a b c d Roy, Avik (February 7, 2012). \"The Tortuous History of Conservatives and the Individual Mandate\". Forbes Magazine.\u00a0\n^ Cohn, Jonathan (April 9, 2010). \"Common Sense\". The New Republic.\u00a0\n^ a b c Cooper, Michael (February 14, 2012). \"Conservatives Sowed Idea of Health Care Mandate, Only to Spurn It Later\". New York Times. Retrieved July 2, 2012.\u00a0\n^ a b c Klein, Ezra (June 25, 2012). \"Unpopular Mandate\". The New Yorker. Retrieved June 19, 2012.\u00a0\n^ Cohn, Bob; Clift, Eleanor (September 18, 1994). \"The Lost Chance\". Newsweek. Retrieved July 2, 2012.\u00a0\n^ Fouhy, Beth (October 5, 2007). \"Hillary Claims Credit for Child Program\". Associated Press for NewsMax. Archived from the original on January 23, 2008.\u00a0\n^ a b \"Chart: Comparing Health Reform Bills: Democrats and Republicans 2009, Republicans 1993\". Kaiserhealthnews.org. February 23, 2010. Retrieved July 29, 2012.\u00a0\n\"Summary Of A 1993 Republican Health Reform Plan\". Kaiserhealthnews.org. February 23, 2010. Retrieved July 29, 2012.\u00a0\n^ \"In 1993, Republicans Proposed A Mandate First\". NPR. March 31, 2012.\u00a0\n^ \"History of the Individual Health Insurance Mandate, 1989-2010 Republican Origins of Democratic Health Care Provision\". ProCon.org. February 9, 2012.\u00a0\n^ a b \"Facebook post says Republicans embraced individual mandate in 1993\". PolitiFact. April 19, 2012.\u00a0\n^ \"AG Suthers couldn't be more wrong in his decision to file lawsuit\". Coloradostatesman.com. Retrieved July 29, 2012.\u00a0\n^ \"G.O.P. and Health Mandate\". The New York Times. February 26, 2012.\u00a0\n^ \"Romneycare\u2019s 98% Success Rate Defies Gripes on Obama Law\". Bloomberg. March 26, 2012.\u00a0\n^ Ball, Molly (May 31, 2012). \"Was Mitt Romney a Good Governor?\". The Atlantic. Retrieved October 28, 2013.\u00a0\n^ a b Lizza, Ryan (June 6, 2011). \"Romney's dilemma\". The New Yorker. Retrieved June 19, 2012.\u00a0\n^ \"Bill Summary & Status - S.334\". Library of Congress THOMAS. Retrieved September 24, 2013.\u00a0\n^ Kuttner, Robert (June 28, 2011). \"RomneyCare vs. ObamaCare\". The Boston Globe. Retrieved September 23, 2013.\u00a0\n^ a b \"Jonathan Gruber (economist)\". MIT Department of Economics. Retrieved September 2, 2013.\u00a0\n\"Jonathan Gruber: short biography\". MIT Department of Economics. Retrieved September 2, 2013.\u00a0\n^ Cline, Andrew. \"How Obama Broke His Promise on Individual Mandates\". The Atlantic. Retrieved September 26, 2013.\u00a0\n^ \"CNN Democratic presidential debate\". CNN. January 21, 2008. Retrieved September 26, 2013.\u00a0\n^ \"The First Presidential Debate\". The New York Times. September 26, 2008.\u00a0\n^ \"Remarks of President Barack Obama \u2013 Address to Joint Session of Congress\". The White House. February 24, 2009. Retrieved March 24, 2010.\u00a0\n^ a b c d e \"Timeline: Milestones in Obama's quest for healthcare reform\". Reuters. March 22, 2010. Retrieved March 22, 2010.\u00a0\n^ Kruger, Mike (October 29, 2009). \"Affordable Health Care for America Act\". United States House Committee on Education and Labor. Archived from the original on January 6, 2010. Retrieved March 24, 2010.\u00a0\n^ \"Health Care Reform from Conception to Final Passage\". Retrieved November 23, 2010.\u00a0\n^ \"Senate Finance Committee Hearings for the 111th Congress recorded by C-SPAN\". C-SPAN.\u00a0\n^ \"Senate Finance Committee hearings for 111th Congress\". Finance.Senate.Gov. Retrieved April 1, 2012.\u00a0\n^ a b c Cohn, Jonathan (May 21, 2010). \"How They Did It\". The New Republic.\u00a0\n^ Cohn, Jonathan (October 13, 2009). \"The Top Ten Things Worth Fighting For\". The New Republic.\u00a0\n^ Cohn, Jonathan (September 4, 2009). \"Party Is Such Sweet Sorrow\". The New Republic.\u00a0\n^ Chait, Jonathan (April 22, 2010). \"Obama's Moderate Health Care Plan\". The New Republic.\u00a0\nChait, Jonathan (December 19, 2009). \"The Republican Health Care Blunder\". The New Republic.\u00a0\n^ Chait, Jonathan (December 19, 2009). \"The Republican Health Care Blunder\". The New Republic.\u00a0\n^ Hulse, Carl; Nagourney, Adam (March 16, 2010). \"Senate G.O.P. Leader Finds Weapon in Unity\". The New York Times.\u00a0\n^ Eaton, Joe; Pell, M. B.; Mehta, Aaron (March 26, 2010). \"Lobbying Giants Cash In On Health Overhaul\". NPR. Retrieved April 9, 2012.\u00a0\n^ Cohn, Jonathan (August 25, 2009). \"Drug Deal\". The New Republic.\u00a0\n^ Grim, Ryan (August 13, 2009). \"Internal Memo Confirms Big Giveaways In White House Deal With Big Pharma\". Huffington Post.\u00a0\n^ \"Visualizing The Health Care Lobbyist Complex\". Sunlight Foundation. July 22, 2009. Retrieved April 1, 2012.\u00a0\n^ Horwitz, Sari; Pershing, Ben (April 9, 2010). \"Anger over health-care reform spurs rise in threats against Congress members\". The Washington Post. Retrieved April 9, 2010.\u00a0\n^ Kellman, Laurie; Abrams, Jim (March 26, 2010). \"Threats against lawmakers spread after health vote\". Associated Press.\u00a0\n^ \"Remarks by the President to a Joint Session of Congress on Health Care\". The White House. September 10, 2009. Retrieved March 24, 2010.\u00a0\n^ Kennedy, Edward M. (May 12, 2009). \"Text of letter to the President from Senator Edward M. Kennedy\". White House Press Secretary. Archived from the original on September 10, 2009. Retrieved September 10, 2009.\u00a0\n^ Maze, Rick (October 8, 2009). \"House OKs tax breaks for military homeowners\". Air Force Times. Retrieved March 24, 2010.\u00a0\n^ U.S. Const. art. I, \u00a7 7, cl. 1.\n^ S.Amdt. 2786\n^ Cohn, Jonathan (September 7, 2009). \"Why Reform Survived August\". The New Republic.\u00a0\n^ a b c Hacker, Jacob S. (December 20, 2009). \"Why I Still Believe in This Bill\". The New Republic.\u00a0\n^ a b Cohn, Jonathan (March 12, 2010). \"The Public Option, Still Dead\". The New Republic.\u00a0\n^ Angell, Marcia (November 9, 2009). \"Is the House Healthcare Bill Better Than Nothing?\". The Huffington Post. Retrieved January 12, 2012.\u00a0\n^ Cohn, Jonathan (December 15, 2009). \"What Public Option Supporters Won\". The New Republic.\u00a0\n^ Cohn, Jonathan (December 17, 2009). \"Ben Nelson, Still a Big Problem (Updated)\". The New Republic.\u00a0\n^ Raju, Manu (January 20, 2010). \"Olympia Snowe puzzled by Harry Reid comments\". Politico.\u00a0\n^ Chait, Jonathan (December 19, 2009). \"The Republican Health Care Blunder\". The New Republic.\u00a0\nChait, Jonathan (January 19, 2010). \"Revisiting Snowe's Lay Down\". The New Republic.\u00a0\nChait, Jonathan (March 16, 2010). \"(Non)sense of Snowe\". The New Republic.\u00a0\n^ Cohn, Jonathan (December 19, 2009). \"BREAKING: Nelson Says Yes; That Makes 60\". The New Republic.\u00a0\n^ \"'Cornhusker' Out, More Deals In: Health Care Bill Gives Special Treatment\". Fox News. March 19, 2010. Retrieved April 26, 2010.\u00a0\n^ \"Roll Call vote No. 396 \u2013 On Passage of the Bill (H.R. 3590 as Amended)\". U.S. Senate. Retrieved January 9, 2012.\u00a0\n^ \"AARP, AMA Announce Support For Health Care Bill: Largest Doctors And Retiree Groups Backing Legislation\". The Huffington Post, March 19, 2010.\n^ Applewhite, J. Scott. \"Senator-elect Scott Brown welcomed as Republican hero after upset victory in Massachusetts\". McClatchy-Tribune News Service. Associated Press. Retrieved April 19, 2012.\u00a0\n^ \"Public Statements \u2013 Project Vote Smart\" (Press release). Votesmart.org. January 13, 2010. Retrieved April 9, 2012.\u00a0\n^ Silver, Nate (January 21, 2010). \"Will the Base Abandon Hope?\". FiveThirtyEight.\u00a0\n^ a b c d Cohn, Jonathan (January 17, 2010). \"How to Pass the Bill--Whatever Happens Tuesday\". The New Republic.\u00a0\n^ a b c Stolberg, Sheryl; Zeleny, Jeff; Hulse, Carl (March 20, 2010). \"Health Vote Caps a Journey Back From the Brink\". The New York Times. Retrieved March 23, 2010.\u00a0\n^ a b Brown, Carrie; Thrush, Glenn (March 20, 2010). \"Pelosi steeled W.H. for health push\". Politico. Retrieved March 23, 2010.\u00a0\n^ \"White House Unveils Revamped Reform Plan, GOP And Industry React\". Kaiserhealthnews.org. February 22, 2010. Retrieved June 29, 2012.\u00a0\n^ Pollack, Harold. \"47 (Now 51) Health Policy Experts (Including Me) Say 'Sign the Senate bill.'\". The New Republic. Retrieved January 12, 2012.\u00a0\n^ a b Chait, Jonathan (February 20, 2010). \"A Brief Reconciliation Primer\". The New Republic.\u00a0\n^ a b Silver, Nate (December 26, 2009). \"For Pelosi, Many Paths to 218\". FiveThirtyEight.\u00a0\n^ Silver, Nate (January 21, 2010). \"1. Reconciliation! 2.\u00a0??? 3. Profit!\". FiveThirtyEight.\u00a0\n^ Cohn, Jonathan (September 21, 2009). \"Reconciliation: Why Most Dems Don't Want to Go There\". The New Republic.\u00a0\n^ Executive Order 13535 of March 24, 2010 \u2014 Ensuring Enforcement and Implementation of Abortion Restrictions in the Patient Protection and Affordable Care Act, Vol. 75, No. 59 75 FR 15599, March 29, 2010.\n^ Chait, Jonathan (March 21, 2010). \"Stupak Makes A Deal, Reform To Pass\". The New Republic.\u00a0\n^ \"Roll Call vote No. 165: On Motion to Concur in Senate Amendments (Patient Protection and Affordable Care Act)\". Office of the Clerk: House of Representatives. March 21, 2010. Retrieved April 9, 2012.\u00a0\n^ Aro, Margaret; Mooney, Mark (March 22, 2010). \"Pelosi Defends Health Care Fight Tactics\". ABC News. Retrieved March 23, 2010.\u00a0\n^ Stolberg, Sheryl; Pear, Robert (March 23, 2010). \"Obama Signs Health Care Overhaul Bill, With a Flourish\". The New York Times. Retrieved March 24, 2010.\u00a0\n^ Vicini, James; Stempel, Jonathan (June 28, 2012). \"US top court upholds healthcare law in Obama triumph\". Reuters.\u00a0\n^ \"Is the Affordable Care Act Helping or Hurting?\". The New York Times. October 27, 2014. Retrieved October 27, 2014.\u00a0\n^ a b c d \"Cost Estimate for Pending Health Care Legislation\" (PDF). Congressional Budget Office. March 20, 2010. Retrieved March 28, 2010.\u00a0\n^ \"Updated Estimates for the Insurance Coverage Provisions of the Affordable Care Act\". Congressional Budget Office. March 13, 2012. Retrieved April 6, 2012.\u00a0\n^ a b Pecquet, Julian (March 13, 2012). \"CBO: Obama's health law to cost less, cover fewer people than first thought\". The Hill. Retrieved June 29, 2012.\u00a0\n^ \"Estimates for the Insurance Coverage Provisions of the Affordable Care Act Updated for the Recent Supreme Court Decision\". CBO. July 24, 2012. Retrieved February 23, 2012.\u00a0\n^ a b Fox, Emily Jane (July 24, 2012). \"6 million will lose out on Medicaid expansion\". CNNMoney (CNN). Retrieved July 25, 2012.\u00a0\n^ a b Chaikind, Hinda; Copeland, Curtis W.; Redhead, C. Stephen; Staman, Jennifer (March 2, 2011). \"PPACA: A Brief Overview of the Law, Implementation, and Legal Challenges\" (PDF). Congressional Research Service. R41664. Retrieved 2013-12-22.\u00a0\n^ a b c Trumbull, Mark (March 23, 2010). \"Obama signs health care bill: Who won't be covered?\". The Christian Science Monitor. Retrieved March 24, 2010.\u00a0\n^ \"Medical Debt Huge Bankruptcy Culprit - Study: It's Behind Six-In-Ten Personal Filings\". CBS. June 5, 2009. Retrieved June 22, 2009.\u00a0\n^ Cohn, Jonathan (January 19, 2011). \"Why Today's Vote Matters\". The New Republic.\u00a0\nCohn, Jonathan (June 13, 2012). \"Obamacare, Good for the Economy\". The New Republic.\u00a0\nCohn, Jonathan (February 11, 2011). \"Sorry, The CBO Did Not Say Health Reform Kills 800,000 Jobs\". The New Republic.\u00a0\n^ a b Cohn, Jonathan (March 7, 2010). \"What, You Have a Better Idea for Cost Control?\". The New Republic.\u00a0\n^ \"Insurers to Bail on Child-Only Policies as Health Care Law Looms\". CBS News. September 22, 2010.\u00a0\n^ Helfand, Duke (September 21, 2010). \"Big health insurers to stop selling new child-only policies\". Los Angeles Times.\u00a0\n^ \"Report: Access to Child-Only Health Plans Declines Under New Health Care Law\" (Press release). U.S. Senate Committee on Health, Education, Labor, and Pensions. August 2, 2011.\u00a0\n^ DeNavas-Walt, Carmen et al. (September 8, 2011). \"Income, Poverty, and Health Insurance Coverage in the United States: 2010\" (PDF). U.S. Census Bureau. pp.\u00a026\u201327. Retrieved October 15, 2011.\u00a0 CS1 maint: Explicit use of et al. (link)\n^ \"Public- and Private-Sector Initiatives Are Reducing Health Disparities Among Children: A Conversation With Kathryn Santoro, MA, Director of Policy and Development for the National Institute for Health Care Management Foundation\". Agency for Healthcare Research and Quality. 2013-04-24. Retrieved 2013-09-26.\u00a0\n^ \"A Cruel Blow to American Families\". The New York Times. February 2, 2013.\u00a0\n^ Cohn, Jonathan (February 5, 2013). \"Not-So-Universal Health Care\". The New Republic.\u00a0\n^ \"Commonwealth Fund-New Survey-July 10, 2014\". Commonwealthfund.org. Retrieved 2014-07-29.\u00a0\n^ \"In U.S., Uninsured Rate Sinks to 13.4% in Second Quarter-July 10, 2014\". Gallup.com. Retrieved 2014-07-29.\u00a0\n^ \"Rand Corporation-Changes in Health Insurance Enrollment Since 2013-2014\". Rand.org. Retrieved 2014-07-29.\u00a0\n^ Young, Jeffrey (September 14, 2014). \"Almost All Obamacare Enrollees Are Paying For Coverage\". Huffington Post. Retrieved 2014-09-23.\u00a0\n^ \"Insurance Exchanges\". American Public Health Association (APHA).\u00a0\n^ a b Cohn, Jonathan (April 29, 2013). \"Obamacare Sticker Shock: Not Very Shocking\". The New Republic.\u00a0\n^ Cohn, Jonathan (April 30, 2013). \"Obamacare's New Paperwork Is Simpler than Private Insurers'\". The New Republic.\u00a0\nCohn, Jonathan (April 29, 2013). \"Why Obamacare Is Not a 'Train Wreck' (Again)\". The New Republic.\u00a0\n^ Young, Jeffery (September 25, 2013). \"Obamacare Benefits Enrollment Will Start Slowly, White House Predicts\". The Huffington Post. Retrieved October 2, 2013.\u00a0\n^ a b Cohn, Jonathan (August 5, 2013). \"Burn Your Obamacare Card, Burn Yourself\". The New Republic.\u00a0\n^ a b Public Law 111 \u2013 148, section 1312: \"... the only health plans that the Federal Government may make available to Members of Congress and congressional staff with respect to their service as a Member of Congress or congressional staff shall be health plans that are (I) created under this Act (or an amendment made by this Act); or (II) offered through an Exchange established under this Act (or an amendment made by this Act).\"\n^ \"ACA Basics and Background\". American Public Health Association (APHA). 3. Why do we need the ACA?. Retrieved July 25, 2013.\u00a0\n^ Cohn, Jonathan (January 18, 2011). \"More Government in Health Care? Yes. You Got a Problem With That?\". The New Republic.\u00a0\nCohn, Jonathan (April 15, 2011). \"When Republicans Oppose Competition\". The New Republic.\u00a0\n^ \"Summary of Benefits and Coverage\". HealthCare.Gov, managed by the Centers for Medicare and Medicaid Services.\u00a0\n^ Kliff, Sarah (May 30, 2013). \"Are Obamacare's Exchanges Competitive? Here's What The Experts Say\". The Washington Post.\u00a0\n^ Cohn, Jonathan (May 31, 2013). \"Another Obamacare Train Wreck Not Happening\". The New Republic.\u00a0\n^ Trish Riley; Jane Hyatt Thorpe. \"Multi-State Plans Under the Affordable Care Act\" (PDF). George Washington University Medical Center, Department of Health Policy.\u00a0\n^ Abelson, Reed (June 16, 2013). \"Choice of Health Plans to Vary Sharply From State to State\". New York Times.\u00a0\n^ a b Cox, Cynthia; Claxton, Gary; Levitt, Larry (June 6, 2013). \"Beyond Rebates: How Much Are Consumers Saving from the ACA's Medical Loss Ratio Provision?\". Kaiser Family Foundation. Retrieved June 9, 2013.\u00a0\n^ a b c Cohn, Jonathan (March 21, 2012). \"Reform With No Mandate? Ask New Jersey About That\". The New Republic.\u00a0\n^ Cohn, Jonathan (January 18, 2011). \"More Government in Health Care? Yes. You Got a Problem With That?\". The New Republic.\u00a0\nCohn, Jonathan (July 15, 2013). \"Obamacare's Individual Mandate Can't Wait\". The New Republic.\u00a0\n^ McClanahan, Carolyn (August 4, 2013). \"Reader's Questions About Obamacare \u2013 Misinformation Abounds\". Forbes. Retrieved 15 August 2013.\u00a0\n^ a b Pippenger, Nathan (March 28, 2012). \"Health Care Reform Without The Mandate?\". The New Republic.\u00a0\n^ Cohn, Jonathan (April 9, 2010). \"Common Sense\". The New Republic.\u00a0\nCohn, Jonathan (April 2, 2012). \"What If the Mandate Goes?\". The New Republic.\u00a0\n^ Cohn, Jonathan (July 15, 2013). \"Obamacare's Individual Mandate Can't Wait\". The New Republic.\u00a0\nCohn, Jonathan (April 2, 2012). \"What If the Mandate Goes?\". The New Republic.\u00a0\n^ Cohn, Jonathan (June 8, 2012). \"Just in Case: How Reform Might Survive Without the Mandate\". The New Republic.\u00a0\n^ Cohn, Jonathan (April 2, 2012). \"What If the Mandate Goes?\". The New Republic.\u00a0\nCohn, Jonathan (June 8, 2012). \"Just in Case: How Reform Might Survive Without the Mandate\". The New Republic.\u00a0\n^ Krugman, Paul (January 8, 2010). \"One Health Reform, Indivisible\". The New York Times.\u00a0\n^ Banthin, Jessica (March 20, 2012). \"Effects of Eliminating the Individual Mandate to Obtain Health Insurance\". CBO.\u00a0\n^ a b Jonathan Gruber (economist) (February 2011). \"Health Care Reform without the Individual Mandate\" (PDF). Center for American Progress.\u00a0\n^ Eibner, Christine; Price, Carter (2012). \"The Effect of the Affordable Care Act on Enrollment and Premiums, With and Without the Individual Mandate\" (PDF). Rand Health.\u00a0\n^ Cohn, Jonathan (April 9, 2010). \"Common Sense\". The New Republic.\u00a0\nCohn, Jonathan (April 2, 2012). \"What If the Mandate Goes?\". The New Republic.\u00a0\nCohn, Jonathan (December 26, 2011). \"Was the Mandate a Mistake?\". The New Republic.\u00a0\n^ Cohn, Jonathan (December 26, 2011). \"Was the Mandate a Mistake?\". The New Republic.\u00a0\n^ Alonso-Zaldivar, Ricardo (September 19, 2012). \"Tax penalty to hit nearly 6M uninsured people\". Associated Press. Archived from the original on September 20, 2012.\u00a0\n^ Cohn, Jonathan (August 1, 2013). \"Six Reasons Hipsters Will Bite on Obamacare\". The New Republic.\u00a0\n^ a b \"State Decisions For Creating Health Insurance Exchanges, as of May 28, 2013 - Table\". Kaiser Family Foundation. May 28, 2013.\u00a0\n\"State Decisions For Creating Health Insurance Exchanges, as of May 28, 2013 - Map\". Kaiser Family Foundation. May 28, 2013.\u00a0\n^ a b \"State Decisions For Creating Health Insurance Exchanges, as of May 28, 2013 - Notes\". Kaiser Family Foundation. May 28, 2013.\u00a0\n^ \"State Health Insurance Exchange Laws: The First Generation\". The CommonWealth Fund. July 25, 2012.\u00a0\n^ Adams, Rebecca (July 22, 2013). \"The Question of Abortion Coverage in Health Exchanges\". Roll Call.\u00a0\n^ \"Obamacare: Separating Myth From Fact\". Taylor Benefits. December 18, 2013. Retrieved December 18, 2013.\u00a0\n^ a b \"Public Law 111 \u2013 148, section 1332\". Gpo.gov. Retrieved June 29, 2012.\u00a0\n^ \"Preparing for Innovation: Proposed Process for States to Adopt Innovative Strategies to Meet the Goals of the Affordable Care Act\". U.S. Department of Health & Human Services. November 16, 2011. Retrieved April 1, 2012.\u00a0\n^ Goldstein, Amy; Balz, Dan (March 1, 2011). \"Obama offers states more flexibility in health-care law\". The Washington Post.\u00a0\n^ \"Gov. Shumlin issued the following statement on health care rules\". Governor.vermont.gov. March 14, 2011. Retrieved April 1, 2012.\u00a0\n^ Estes, Adam Clark (May 26, 2011). \"Vermont Becomes First State to Enact Single-Payer Health Care\". The Atlantic. Retrieved April 1, 2012.\u00a0\n^ Wing, Nicholas (May 26, 2011). \"Vermont Single-Payer Health Care Law Signed By Governor\". The Huffington Post.\u00a0\n^ http:\/\/www.bostonglobe.com\/business\/2015\/01\/25\/costs-derail-vermont-single-payer-health-plan\/VTAEZFGpWvTen0QFahW0pO\/story.html\n^ Cohen, Tom (October 23, 2013). \"Rough Obamacare rollout: 4 reasons why\". CNN. Retrieved November 5, 2013.\u00a0\n^ Editorial Board (November 4, 2013). \"Obamacare's critics justified: Our view\". USA Today.\u00a0\n^ Holland, Steve; Rampton, Roberta (November 6, 2013). \"Senate Democrats frustrated with botched rollout of Obamacare\". Reuters (Christian Science Monitor). Retrieved November 19, 2013.\u00a0\n^ Kennedy, Kelly (December 1, 2013). \"White House claims success on HealthCare.gov repairs\". USA Today. Retrieved December 1, 2013.\u00a0\n^ Dwyer, Devin (November 6, 2013). \"'Obamacare' Memos Reveal Chaos, Confusion of October Rollout\". ABC News. Retrieved November 19, 2013.\u00a0\n^ Haberkorn, Jennifer; Allen, Jonathan (October 24, 2013). \"Hill Democrats frustrated by Obamacare rollout\". Politico.com. Retrieved November 19, 2013.\u00a0\n^ Jones, Willie (November 4, 2013). \"The Obamacare Rollout: What Really Happened?\". IEEE Spectrum. Retrieved November 19, 2013.\u00a0\n^ Cornwell, Susan (November 1, 2013). \"Factbox: U.S. officials mired in controversy over Obamacare rollout\". Reuters (Yahoo! News). Retrieved November 20, 2013.\u00a0\n^ Blackstone, John (November 8, 2013). \"S.F. programmers build alternative to HealthCare.gov\". CBS News. Retrieved November 19, 2013.\u00a0\n^ Simpson, Connor (November 2, 2013). \"Three Guys Built a Better Healthcare.gov\". TheWire.com. The Atlantic. Retrieved November 19, 2013.\u00a0\n^ Miller, S. A. (November 20, 2013). \"Obama wants to rebrand, remarket ObamaCare\". New York Post. Retrieved November 20, 2013.\u00a0\n^ Gross, Grant (November 5, 2013). \"Senators question security at HealthCare.gov\". NetworkWorld. Retrieved December 1, 2013.\u00a0\n^ Clayton, Mark (November 19, 2013). \"Is HealthCare.gov secure? In Congress, cyber-experts vouch for Obamacare site\". The Christian Science Monitor. Retrieved December 1, 2013.\u00a0\n^ Finkle, Jim; Selyukh, Alina (November 19, 2013). \"Some cyber security experts recommend shutting Obamacare site\". Reuters. Retrieved December 1, 2013.\u00a0\n^ \"Promoting the Affordable Care Act to Indigenous Peoples\". Indian Country Today Media Network. 2014-03-23. Retrieved 2014-03-28.\u00a0\n^ \"Committee Learns Who's Paid for Obamacare: As of April 15, Only 67 Percent of Enrollees in Federal Marketplace Had Paid First Month's Premium\". House Energy and Commerce Committee. April 30, 2014.\u00a0\n^ \"Ranking Member Waxman Releases Memo on Misleading Republican Report on ACA Enrollment\". Energy and Commerce Committee Democrats. April 30, 2014.\u00a0\n^ Werner, Erica (May 7, 2014). \"Health insurers: Payment rates above 80 percent\". Associated Press. Retrieved May 7, 2014.\u00a0\n^ Alonso-Zaldivar, Ricardo (July 31, 2014). \"Probe exposes flaws behind HealthCare.gov rollout\". AP News. Retrieved July 31, 2014.\u00a0\n^ a b c Binckes, Jeremy; Wing, Nick (March 22, 2010). \"The Top 18 Immediate Effects Of The Health Care Bill\". The Huffington Post. Retrieved March 22, 2010.\u00a0\n^ \"I have been denied coverage because I have a pre-existing condition. What will this law do for me?\" (PDF). Health Care Reform Frequently Asked Questions. New Hampshire Insurance Department. p.\u00a02. Retrieved June 28, 2012.\u00a0\n^ H.R. 3590 Enrolled, section 1001 (adding section 2714 to the Public Health Service Act): \"A group health plan and a health insurance issuer offering group or individual health insurance coverage that provides dependent coverage of children shall continue to make such coverage available for an adult child (who is not married) until the child turns 26\u00a0years of age.\"\n^ Pear, Robert (May 10, 2010). \"Rules Let Youths Stay on Parents' Insurance\". The New York Times.\u00a0\n^ \"Key Features of the Affordable Care Act By Year\". HHS.gov. June 7, 2013. Retrieved June 7, 2013.\u00a0\n^ a b c Levitt, Larry; Claxton, Gary; Pollitz, Karen (October 18, 2011). \"Questions About Essential Health Benefits\". Kaiser Family.\u00a0\n^ \"Essential Health Benefits\". HealthCare.gov, managed by the Centers for Medicare and Medicaid Services.\u00a0\n\"What does Marketplace health insurance cover?\". HealthCare.Gov, managed by the Centers for Medicare and Medicaid Services.\u00a0\n^ \"Quick Take: Essential Health Benefits: What Have States Decided for Their Benchmark?\". Kaiser Family. December 7, 2012.\u00a0\n^ a b \"Summary of the Affordable Care Act\" (PDF). Kaiser Family Foundation. April 23, 2013.\u00a0\n^ \"Health Insurance Market Reforms: Prevention\". Centers for Medicare and Medicaid Services. December 21, 2010. Retrieved September 8, 2013.\u00a0\n^ \"Next Steps to Comply with Health Care Reform\". The National Law Review. October 10, 2012. Retrieved October 10, 2012.\u00a0\n^ \"How do I choose Marketplace insurance?\". HealthCare.Gov, managed by the Centers for Medicare and Medicaid Services.\u00a0\n^ \"Health Plan Categories\". HealthCare.Gov, managed by the Centers for Medicare and Medicaid Services.\u00a0\n^ \"Medical Loss Ratio\". Centers for Medicaid and Medicare Services. Retrieved October 2, 2013.\u00a0\n^ \"Medical Loss Ratio Requirements Under the Patient Protection and Affordable Care Act\". Federal Register 76 (235). December 7, 2011. p.\u00a076573. Retrieved April 1, 2012.\u00a0\n^ PPACA, 2713,(a)(4)\n^ Women's Preventive Services Guidelines HRSA, US Department of Health and Human Services\n^ \"Women's Preventive Services Coverage and Non-Profit Religious Organizations\". Centers for Medicare and Medicaid Services. Retrieved September 8, 2013.\u00a0\n^ Kliff, Sarah (August 1, 2012). \"Five facts about the health law's contraceptive mandate\". The Washington Post. Retrieved November 29, 2012.\u00a0\n^ Dept. Health and Human Services (February 10, 2012). \"Group Health Plans and Health Insurance Issuers Relating to Coverage of Preventive Services Under the Patient Protection and Affordable Care Act \u2013 Final Rules\" (77 FR 8725). Federal Register. Retrieved February 15, 2012. Summary: These regulations finalize, without change, interim final regulations authorizing the exemption of group health plans and group health insurance coverage sponsored by certain religious employers from having to cover certain preventive health services under provisions of the Patient Protection and Affordable Care Act.\u00a0\n^ Park, Madison (July 19, 2011). \"Birth control should be fully covered under health plans, report says\". CNN. Retrieved August 27, 2012.\u00a0\n^ Cohn, Jonathan (February 8, 2012). \"Religious Institutions Matter. So Do Their Employees\". The New Republic.\u00a0\n^ Cohn, Jonathan (February 10, 2012). \"Obama's Deal on Birth Control Coverage\". The New Republic.\u00a0\n^ Mears, Bill (March 23, 2014). \"Justices to hear 'Hobby Lobby' case on Obamacare birth control rule\". CNN. Retrieved March 28, 2014.\u00a0\n^ Burwell v. Hobby Lobby, 573 U.S. (United States Supreme Court 2014).\n^ \"Wheaton College v. Burwell (573 U. S. ____ (2014)): 2014-07-03 injunction pending appeal order\" (PDF). U.S. Supreme Court. 3 July 2014. Retrieved 9 July 2014.\u00a0\n^ Liptak, Adam (3 July 2014). \"Birth Control Order Deepens Divide Among Justices\". The New York Times. Retrieved 9 July 2014.\u00a0\n^ Adler, Jonathan A. (3 July 2014). \"Supreme Court grants Wheaton College an injunction against contraception mandate accommodation\". The Washington Post. Retrieved 9 July 2014.\u00a0\n^ Dockterman, Eliana (9 July 2014). \"Supreme Court Rules on Religious College\u2019s Birth Control Plea\". Time Magazine. Retrieved 9 July 2014.\u00a0\n^ Jaschik, Scott (7 July 2014). \"Religious College Exemption\". insidehighered.com. Retrieved 9 July 2014.\u00a0\n^ Liptak, Adam; Pear, Robert (4 July 2014). \"Obama Weighs Steps to Cover Contraception\". Retrieved 9 July 2014.\u00a0\n^ Cohn, Jonathan (April 29, 2013). \"Obamacare Sticker Shock: Not Very Shocking\". The New Republic.\u00a0\nCohn, Jonathan (June 5, 2013). \"Un-rigging the Rate-Shock Debate\". The New Republic.\u00a0\n^ Chait, Jonathan (June 5, 2013). \"Is Obamacare a War on Bros?\". New York.\u00a0\n^ a b Hensley, Scott (September 26, 2013). \"'How Much Will Obamacare Cost Me?' Try Our Calculator\". NPR.\u00a0\n^ Cohn, Jonathan (August 14, 2013). \"The Big Savings Obamacare Critics Miss\". The New Republic.\u00a0\n^ a b c \"Correction Regarding the Longer-Term Effects of the Manager's Amendment to the Patient Protection and Affordable Care Act\" (PDF). Congressional Budget Office. December 19, 2009. Retrieved March 22, 2010.\u00a0\n^ a b \"An Analysis of Health Insurance Premiums Under the Patient Protection and Affordable Health Care Act\". Cbo.gov. November 30, 2009. Retrieved June 29, 2012.\u00a0\n^ Cohn, Jonathan (July 18, 2013). \"The Obamacare Train Still Hasn't Wrecked\". The New Republic.\u00a0\n^ Chait, Jonathan (September 26, 2013). \"Someone Tell Ted Cruz the Obamacare War Is Over\". New York.\u00a0\n^ Goddard, Teagan (September 5, 2013). \"(Kaiser Family Foundation) Study Finds 'Lower Than Expected' Obamacare Premiums\". Teagan Goddard's Wonkwire.\u00a0\n^ Mukherjee, Sy (September 5, 2013). \"Major New Study On Obamacare Premiums Should End The 'Rate Shock' Hysteria Once And For All\". ThinkProgress. Retrieved September 5, 2013.\u00a0\n^ Aigner-Treworgy, Adam (March 27, 2013). \"Health care law will raise insurers' costs, actuaries say\". PoliticalTicker... blog (CNN). Retrieved April 12, 2013.\u00a0\nRobertson, Lori (April 5, 2013). \"Health Insurance Premium Spin\". Philadelphia: FactCheck.org. Retrieved April 12, 2013.\u00a0\n^ a b c Alonso-Zaldivar, Ricardo (November 27, 2011). \"AP Newsbreak: Medicare's drug coverage gap shrinks\". Businessweek. Retrieved October 25, 2012.\u00a0\n^ a b c \"Health Costs and the Federal Budget\". Congressional Budget Office. May 28, 2010. Retrieved April 1, 2012.\u00a0\n^ Cohn, Jonathan (December 11, 2009). \"New Cost Estimate on Senate Bill\". The New Republic.\u00a0\n^ a b c Cohn, Jonathan (January 21, 2011). \"The GOP's Trick Play\". The New Republic.\u00a0\n^ a b Scheiber, Noam (September 17, 2009). \"Is the CBO Biased Against Health Care Reform?\". The New Republic.\u00a0\n^ Gruber, Jonathan (2011). Health Care Reform: What It Is, Why It's Necessary, How It Works. United States: Hill and Wang. p.\u00a0101. ISBN\u00a0978-0-8090-5397-1.\u00a0\n^ Gruber, Jonathan. \"The Impacts Of The Affordable Care Act: How Reasonable Are The Projections?\".\u00a0, revised published in: National Tax Journal, Vol. 64, 2011, p. 893-908\n^ Kuraitis V. (2010). Pilots, Demonstrations & Innovation in the ACA Healthcare Reform Legislation. e-CareManagement.com.\n^ Gawande, Atul (December 14, 2009). \"Testing, Testing\". The New Yorker. Retrieved March 22, 2010.\u00a0\n^ Farley, Robert (March 19, 2010). \"Obama says health reform legislation could reduce costs in employer plans by up to $3,000\". PolitiFact.com. Retrieved April 7, 2010.\u00a0\n^ \"Centers for Medicare and Medicaid Services-Statistics, Trends and Reports\". cms.gov. Retrieved September 23, 2013.\u00a0\n^ Cohn, Jonathan (April 12, 2011). \"More Skin in the Game \u2013 for Seniors?\". The New Republic.\u00a0\n^ a b c Lowrey, Annie (May 7, 2013). \"Slowdown in Rise of Healthcare Costs May Persist\". The New York Times. Retrieved June 10, 2013.\u00a0\n^ Levin, Yuval (May 24, 2013). \"Healthcare Costs and Budget\". National Review Online. Retrieved June 10, 2013.\u00a0\n^ a b Chait, Jonathan (May 29, 2013). \"Yuval Levin Dissembles Madly\". New York.\u00a0\n^ a b Chait, Jonathan (May 10, 2013). \"The Facts Are In and Paul Ryan Is Wrong\". New York.\u00a0\n^ Chait, Jonathan (September 26, 2013). \"Someone Tell Ted Cruz the Obamacare War Is Over\". New York.\u00a0\n^ Wayne, Alex (June 18, 2013). \"Health Cost Growth Slows Further Even as Economy Rebounds\". Bloomberg L.P.\u00a0\n^ \"Assessing the Effects of the Economy on the Recent Slowdown in Health Spending\". Kaiser Family Foundation. April 22, 2013.\u00a0\n^ Krawzak, Paul (June 14, 2013). \"In Spending Debate, Baby Boomer Issue Remains a Headache for Legislators\". Roll Call.\u00a0\n^ \"Another Comment on CBO's Estimates for the Insurance Coverage Provisions of the Affordable Care Act\". Congressional Budget Office. March 16, 2012. Retrieved October 7, 2013.\u00a0\n^ a b \"CBO's Analysis of the Major Health Care Legislation Enacted in March 2010\". Congressional Budget Office. March 30, 2011. Retrieved April 6, 2012.\u00a0\n^ \"Another Comment on CBO's Estimates for the Insurance Coverage Provisions of the Affordable Care Act\". Congressional Budget Office. March 16, 2012. Retrieved April 6, 2012.\u00a0\n^ \"H.R. 4872, Reconciliation Act of 2010\" (PDF). Congressional Budget Office. March 18, 2010. Retrieved March 22, 2010.\u00a0\n^ Dennis, Steven (March 18, 2010). \"CBO: Health Care Overhaul Would Cost $940\u00a0Billion\". Roll Call. Retrieved March 22, 2010.\u00a0\n^ Klein, Ezra (March 22, 2010). \"What does the health-care bill do in its first year?\". The Washington Post.\u00a0\n^ Judith Solomon; Paul N. Van de Water (April 18, 2012). \"Letter: Improving the Strength and Solvency of Medicare\". The Center on Budget and Policy Priorities.\u00a0\n^ \"CBO's Estimates for the Insurance Coverage Provisions of the Affordable Care Act Updated for the Recent Supreme Court Decision\". Congressional Budget Office. July 24, 2012. Retrieved August 6, 2012.\u00a0\n^ Sahadi, Jeanne (March 13, 2012). \"Health reform coverage cost falls slightly\". CNN. Retrieved June 29, 2012.\u00a0\n^ a b \"Affordable Care Act Update: Implementing Medicare Cost Savings\" (PDF). Centers for Medicare and Medicaid Services. August 2, 2010. Retrieved October 7, 2013.\u00a0\n^ \"Higher Spending Relative to Medicare Fee-for-Service May Not Ensure Lower Out-of-Pocket Costs for Beneficiaries\". Government Accountability Office. February 8, 2008. Retrieved October 7, 2013.\u00a0\n^ \"Where does health care reform stand?\". CNN. March 18, 2010. Retrieved May 12, 2010.\u00a0\n^ Farley, Robert (March 18, 2010). \"Pelosi: CBO says health reform bill would cut deficits by $1.2 trillion in second decade\". PolitiFact.com. Retrieved April 7, 2010.\u00a0\n^ \"Sen. Tom Coburn: Obamacare PR campaign anchored in spin, not reality\". The Washington Examiner. July 8, 2006. Retrieved April 1, 2012.\u00a0\n^ James Capretta. \"Obamacare's Cooked Books and the 'Doc Fix'\". National Review.\u00a0\n^ Hogberg, David (November 22, 2010). \"GOP Might Target ObamaCare As Part Of A Medicare 'Doc Fix'\". Investor's Business Daily. Retrieved April 1, 2012.\u00a0\n^ \"Responses to Questions About CBO's Preliminary Estimate of the Direct Spending and Revenue Effects of H.R. 4872, the Reconciliation Act of 2010\" (PDF). Congressional Budget Office. March 19, 2010. Retrieved April 1, 2012.\u00a0\n^ Chait, Jonathan (March 24, 2010). \"The Doc Fix Myth And The Right's Misinformation Feedback Loop\". The New Republic.\u00a0\n^ Van de Water, Peter. \"Debunking False Claims About Health Reform, Jobs, and the Deficit\". Center for Budget and Policy Priorities.\u00a0\n^ Uwe Reinhardt (March 24, 2010). \"Wrapping Your Head Around the Health Bill\". The New York Times. Retrieved October 9, 2010.\u00a0\n^ Holtz-Eakin, Douglas (March 21, 2010). \"The Real Arithmetic of Health Care Reform\". The New York Times.\u00a0\n^ \"Electronic Medical Records (Health Information Technology)\".\u00a0\n^ James, Frank (March 19, 2010). \"Health Overhaul Another Promise U.S. Can't Afford: Expert\". NPR. Retrieved April 7, 2010.\u00a0\n^ \"Congress Has Good Record of Implementing Medicare Savings\". CBPP. Retrieved March 28, 2010.\u00a0\n^ \"Can Congress cut Medicare costs?\". The Washington Post. Retrieved March 28, 2010.\u00a0\n^ a b Chait, Jonathan (July 3, 2013). \"Obamacare Still Not Collapsing\". New York.\u00a0\n^ a b Cohn, Jonathan (July 15, 2013). \"Obamacare's Individual Mandate Can't Wait\". The New Republic.\u00a0\n^ a b Government Printing Office. \"Title 26 - Internal Revenue Code\" (PDF).\u00a0\n^ a b c Cohn, Jonathan (May 21, 2013). \"Weaseling Out of Obamacare\". The New Republic.\u00a0\n^ a b \"Data Note: Americans' Satisfaction with Insurance Coverage\". Kaiser Family Foundation. August 31, 2009.\u00a0\n\"Data Note: Americans' Satisfaction with Insurance Coverage, Poll PDF\" (PDF). Kaiser Family Foundation. September 2009.\u00a0\n^ \"Health Coverage & Uninsured\". Kaiser Family Foundation. June 20, 2013.\u00a0\n\"Health Insurance Coverage of the Total Population\". Kaiser Family Foundation. June 20, 2013.\u00a0\n^ \"Pg 14 of 'Kaiser Health Tracking Poll: June 2013'\" (PDF). Kaiser Family Foundation. June 2013.\u00a0\n^ a b c d Chait, Jonathan (July 3, 2013). \"Obama Employer Mandate Delay Train Wreck! Or Not\". New York.\u00a0\n^ a b c Sarah Kliff (May 6, 2013). \"Will Obamacare lead to millions more part-time workers? Companies are still deciding\". Washington Post.\u00a0\n^ Kincaid, David. \"Obamacare Side Effect: Rise of the Part-Time Economy\". http:\/\/www.freeenterprise.com. Free Enterprise. Retrieved 11 November 2014.\u00a0\n^ Hiltzik, Mike. \"This Boehner\/McConnell Obamacare 'fix' could hurt millions of Americans\". LAtimes.com. LA Times. Retrieved 11 November 2014.\u00a0\n^ a b c Ungar, Rick. \"The Real Numbers On 'The Obamacare Effect' Are In-Now Let The Crow Eating Begin\". http:\/\/www.forbes.com\/. Forbes. Retrieved 11 November 2014.\u00a0\n^ \"Employment Situation Summary\". http:\/\/www.bls.gov\/. Bureau of Labor & Statistics. Retrieved 11 November 2014.\u00a0\n^ Conover, Chris. \"Who Can Deny It? Obamacare Is Accelerating U.S. Towards A Part-Time Nation\". http:\/\/www.forbes.com\/. Forbes. Retrieved 11 November 2014.\u00a0\n^ Bill Sizemore (February 8, 2013). \"Va. workers' part-time hours capped due to health law\". The Virginian-Pilot.\u00a0\nAnnie-Rose Strasser (February 11, 2013). \"Virginia Cuts State Employees' Hours To Avoid Providing Obamacare Coverage\". ThinkProgress.\u00a0\n^ Ned Resnikoff (January 14, 2013). \"Colleges roll back faculty hours in response to Obamacare\". MSNBC.\u00a0\nSy Mukherjee (January 14, 2013). \"Four Public Colleges Will Cut Adjunct Faculty Hours To Avoid Providing Health Coverage Under Obamacare\". ThinkProgress.\u00a0\n^ a b \"As Health Law Changes Loom, A Shift To Part-Time Workers\". NPR. April 29, 2013.\u00a0\n^ Jared Bernstein (September 4, 2013). \"Stop Blaming Obamacare for Part-Time Workers\". Teagan Goddard's Wonkwire.\u00a0\n^ Matthew Yglesias (July 15, 2013). \"Obamacare's Not To Blame For Increasing Part-time Work\". Slate.\u00a0\n^ Timothy Jost (July 2, 2013). \"Implementing Health Reform: A One-Year Employer Mandate Delay\". Health Affairs.\u00a0\n^ a b c Cohn, Jonathan (July 2, 2013). \"Some Bad News About Obamacare That Isn't Bogus\". The New Republic.\u00a0\n^ \"Am I eligible for coverage in the Marketplace?\". HealthCare.Gov, managed by the Centers for Medicare and Medicaid Services.\u00a0\n^ a b c Robert Greenstein and Judith Solomon (July 3, 2013). \"Finance Committee Makes Flawed Employer Requirement in Health Reform Bill Still More Problematic\". Center on Budget and Policy Priorities.\u00a0\n^ a b c d e Ezra Klein (July 2, 2013). \"Will Obamacare lead to millions more part-time workers? Companies are still deciding\". Washington Post.\u00a0\n^ Matthew Yglesias (July 3, 2013). \"Delaying Employer Responsibility Fines Is a Good Idea\u2014the Real Problem Comes Later\". Slate.\u00a0\n^ Chait, Jonathan (July 3, 2013). \"Obamacare Haters Struggling to Understand What 'Nonessential' Means\". New York.\u00a0\nChait, Jonathan (July 3, 2013). \"Obamacare Still Not Collapsing\". New York.\u00a0\n^ Cohn, Jonathan (July 8, 2013). \"An Obamacare Debate We Should Be Having\". The New Republic.\u00a0\n^ \"Union Letter: Obamacare Will 'Destroy The Very Health and Wellbeing' of Workers\", The Wall Street Journal, July 12, 2013\n^ a b c Madara, Matthew R. (February 11, 2014). \"ACA Employer Shared Responsibility Delay Included in Final Regs\". Tax Notes Today. 2014 TNT 28-1.\u00a0\n^ Mazur, Mark. \"Continuing to Implement the ACA in a Careful, Thoughtful Manner\". United States Department of the Treasury. Retrieved July 16, 2013.\u00a0\n^ Torres, Carlos (January 27, 2014). \"Economists See Little Effect on Hiring From U.S. Health-Care Law\". www.businessweek.com. Bloomberg L.P. Retrieved January 27, 2014.\u00a0\n^ \"A Town Hall, and a Health Care Model, in Green Bay\". The White House Blog. The White House. Retrieved November 9, 2013.\u00a0\n^ a b c Jacobson, Louis. \"Barack Obama says that what he'd said was you could keep your plan 'if it hasn't changed since the law passed'\". PolitiFact. Times Publishing Company. Retrieved November 9, 2013.\u00a0\n^ \"After the big Obamacare apology: where things stand\". CNN. November 8, 2013. Retrieved November 9, 2013.\u00a0\n^ \"Obama apologizes for insurance cancellations due to Obamacare\". Cnn.com. Retrieved 2014-07-29.\u00a0\n^ Obama blames 'bad apple' insurers for canceled coverage, Reuters.com, October 30, 2013\n^ Sealover, Ed (November 8, 2013). \"Health insurers say they're canceling plans because of federal law\". Denver Business Journal (bizjournals.com). Retrieved November 9, 2013.\u00a0\n^ \"Obama apologizes to Americans who lost health plans\". Fox News. November 8, 2013. Retrieved November 9, 2013.\u00a0\n^ Schoof, Renee (November 8, 2013). \"Congress weighing laws to let people keep health insurance\". McClatchyDC. Retrieved November 14, 2013.\u00a0\n^ Weigel, David (November 8, 2013). \"The White House's Website Still Says If You Like Your Plan You Can Keep It\". Slate.com. Retrieved November 9, 2013.\u00a0\n^ \"Obamacare: The debacle\". The Economist. November 2, 2013. Retrieved November 8, 2013.\u00a0\n^ With elections looming, Obamacare rattling Democratic nerves, CNN, November 8, 2013\n^ \"Krauthammer: Obamacare Turned A Landslide In Virginia Into A \"Cliffhanger\"\". Real Clear Politics. November 6, 2013. Retrieved November 10, 2013.\u00a0\n^ Goldberg, Jonah (November 5, 2013). \"Jonah Goldberg: Obama health lie freaks Dems\". USA Today.\u00a0\n^ Wemple, Erik (November 6, 2013). \"Jon Stewart of 'The Daily Show' calls Obama 'somewhat dishonest', accuses opponents of 'lying'\". Washington Post.\u00a0\n^ \"Some Illinois Medicaid patients' assets at risk\". chicagotribune.com. 2014-02-05. Retrieved 2014-08-04.\u00a0\n^ O'Donnell, Jayne; Ungar, Laura; Hoyer, Meghan (12 November 2014). \"Rural hospitals in critical condition\". USA Today. Retrieved 28 January 2015.\u00a0\nHamada, Omar L. (18 November 2014). \"Obamacare has detrimental effect on rural hospitals\". The Tennessean (Gannett). Retrieved 28 January 2015.\u00a0\n^ a b \"Obama and Democrats' Health Care Plan\". RealClearPolitics. October 13, 2013. Retrieved March 26, 2014.\u00a0\n^ Swanson, Emily (July 30, 2009). \"Health Care Plan: Favor\/Oppose\". Pollster.com.\u00a0\n^ \"As Health Care Law Proceeds, Opposition and Uncertainty Persist\" (PDF). Pew Research Center. September 16, 2013.\u00a0\n^ Page, Susan (March 24, 2010). \"Poll: Health care plan gains favor\". USA Today. Retrieved March 24, 2010.\u00a0\n^ a b Micah Cohen (May 1, 2013). \"Uncertainty Still Clouds Health Care Law\". FiveThirtyEight.\u00a0\n^ a b Nate Silver (January 23, 2010). \"Health Care Polls: Opinion Gap or Information Gap?\". FiveThirtyEight.\u00a0\n^ a b Zengerle, Patricia (June 24, 2012). \"Reuters-Most Americans Oppose Health Law But Like the Provisions\". Reuters. Retrieved June 28, 2012.\u00a0\n^ Ezra Klein (June 26, 2012). \"Republicans hate 'Obamacare', but like most of what it does\". The Washington Post. Retrieved June 28, 2012.\u00a0\n^ Greg Sargent (June 25, 2012). \"Republicans Support Obama's Health Reforms - As Long As His Name Isn't On Them\". The Washington Post. Retrieved June 28, 2012.\u00a0\n^ Uwe E. Reinhardt (December 18, 2009). \"Reimporting American Drugs From Canada\". Economix.\u00a0\n^ Blendon RJ, Benson JM (April 22, 2010). \"Public opinion at the time of the vote on health care reform\". N. Engl. J. Med. 362 (16): e55. doi:10.1056\/NEJMp1003844. PMID\u00a020375397.\u00a0\n^ \"Negative Views Driven By Many Factors\". Kaiser Family Foundation.\u00a0\n^ \"CNN Opinion Research Poll\" (PDF). CNN. March 22, 2010.\u00a0\n^ Rasmussen, Scott; Schoen, Doug (March 9, 2010). \"Why Obama Can't Move the Health-Care Numbers\". The Wall Street Journal.\u00a0\n^ \"Public Wants Changes in Entitlements, Not Changes in Benefits\". Pew Research Center. July 7, 2011.\u00a0\n^ Cohn, Jonathan (March 23, 2012). \"Obamacare's (Somewhat) Happy Birthday\". The New Republic.\u00a0\n^ Chait, Jonathan (June 13, 2013). \"Obamacare, Public Opinion, and Conservative Self-Delusion\". New York Magazine.\u00a0\n^ Jackson, David. \"Poll: Most oppose blocking Obama health care law\". USA Today. Retrieved July 8, 2012.\n^ \"RAND Health Reform Opinion Study\". RAND Health. May 1, 2014. Retrieved May 10, 2014.\u00a0\n^ \"AP-GfK Poll: Obama's health care fails to gain support\". Associated Press. March 28, 2014. Retrieved March 30, 2014.\u00a0\n^ \"The ObamaCare 8%\". The Wall Street Journal. April 30, 2014. Retrieved May 1, 2014.\u00a0\n^ Amanda Cox, Alicia Desantis and Jeremy White (March 25, 2012). \"Fighting to Control the Meaning of 'Obamacare'\". The New York Times. Retrieved June 29, 2012.\u00a0\n^ a b Baker, Peter (August 3, 2012). \"Democrats Embrace Once Pejorative 'Obamacare' Tag\". The New York Times. Retrieved August 6, 2012.\u00a0\n^ Nelson, Steven (June 8, 2011). \"Democratic Rep. John Conyers wants to reclaim 'ObamaCare', make it a compliment\". The Daily Caller. Retrieved April 1, 2012.\u00a0\n^ Madison, Lucy (August 15, 2011). \"On bus tour, Obama embraces 'Obamacare', says 'I do care'\". CBS News. Retrieved April 28, 2012.\u00a0\n^ Smith, Ben (December 17, 2010). \"HHS Buys 'ObamaCare'\". Politico. Retrieved February 9, 2011.\u00a0\n^ Strauss, Daniel (March 23, 2012). \"Obama camp's pitch to supporters: 'Hell yeah, I'm for Obamacare'\". The Hill. Retrieved March 27, 2012.\u00a0\n^ Prince, Richard (October 2, 2013). \"AP, NPR Curb Use of \"Obamacare\" Term\". Robert C. Maynard Institute for Journalism Education. Retrieved October 5, 2013.\u00a0\n^ Gold, Hadas (October 4, 2013). \"AP, NPR to cut back on 'Obamacare'\". Politico. Retrieved October 19, 2013.\u00a0\n^ a b \"Sarah Palin falsely claims Barack Obama runs a \"death panel\"\". PolitiFact. August 10, 2009.\u00a0\n^ Drobnic Holan, Angie (December 19, 2009). \"PolitiFact's Lie of the Year: 'Death panels'\". PolitiFact. Retrieved November 19, 2010.\u00a0\n^ Henig, Jess; Robertson, Lori (July 29, 2010). \"False Euthanasia Claims\". FactCheck.\u00a0\n^ FactCheck staff (December 24, 2009). \"Whoppers of 2009\u2014We review the choicest falsehoods from a year that kept us busy\". FactCheck. University of Pennsylvania: Annenberg Public Policy Center. Retrieved April 28, 2011.\u00a0\n^ \"'Tweet' 2009 Word of the Year, 'Google' Word of the Decade, as voted by American Dialect Society\" (PDF). American Dialect Society. January 8, 2010. Retrieved October 8, 2010.\u00a0\n^ a b \"Euthanasia Counseling\". Snopes.com. August 13, 2009.\u00a0\n^ Nyhan, Brendan (2010). \"Why the \"Death Panel\" Myth Wouldn't Die: Misinformation in the Health Care Reform Debate\" (PDF). The Forum (Berkeley Electronic Press) 8 (1). doi:10.2202\/1540-8884.1354.\u00a0\n^ Viebeck, Elise (September 26, 2012). \"Poll: Four in 10 believe in Obama healthcare law 'death panels'\". The Hill.\u00a0\n^ \"Seniors Beware\". Snopes.com. August 23, 2012.\u00a0\n^ a b Beutler, Brian (August 13, 2013). \"A new kind of birther and death panel insanity explodes\". Salon.com. Retrieved December 3, 2013.\u00a0\n^ Ebeler, Jack; Neuman, Tricia; Cubanski, Juliette (April 13, 2011). \"The Independent Payment Advisory Board: A New Approach to Controlling Medicare Spending\". Kaiser Family Foundation. p.\u00a03 of 24. Retrieved November 27, 2013.\u00a0\n^ Cohn, Jonathan (April 20, 2011). \"Here We Go Again, With the Death Panels\". The New Republic.\u00a0\n^ Cohn, Jonathan (August 13, 2009). \"Mandatory Death Counseling \u2013 exposed!\". The New Republic.\u00a0\n^ Parsons, Christi; Zajac, Andrew (August 14, 2009). \"Senate committee scraps healthcare provision that gave rise to 'death panel' claims; Though the claims are widely discredited, the Senate Finance Committee is withdrawing from its bill the inclusion of advance-care planning consultations, calling them too confusing\". Los Angeles Times.\u00a0\n^ Chait, Jonathan (August 6, 2013). \"Congress Exempts Itself From Obamacare! Or Something!\". New York.\u00a0\n^ Cohn, Jonathan (August 13, 2013). \"The Latest Obamacare Lie That Just Won't Die\". The New Republic.\u00a0\n^ Bowers, Becky (August 14, 2013). \"Sen. Ted Cruz says Obama 'just granted all of Congress an exception' to Obamacare\". PolitiFact. Retrieved August 19, 2013.\u00a0\n^ Robertson, Lori (January 20, 2010). \"Congress Exempt from Health Bill?\". FactCheck.\u00a0\n^ Viebeck, Elise (27 February 2013). \"Poll: Four in 10 think illegals are covered by Obama healthcare law\". The Hill. Retrieved 7 December 2013.\u00a0\n^ Farley, Robert (January 21, 2010). \"The Democrats' health care bills would provide 'free health care for illegal immigrants'\". PolitiFact. Retrieved August 19, 2013.\u00a0\n^ Stolberg, Sheryl Gay (October 18, 2013). \"States Are Focus of Effort to Foil Health Care Law\". New York Times. Retrieved October 19, 2013.\u00a0\n^ The Editorial Board (January 25, 2014). \"The Koch Party\". New York Times. Retrieved January 25, 2014.\u00a0\n^ Peters, Jeremy (January 20, 2011). \"Conservatives' Aggressive Ad Campaign Seeks to Cast Doubt on Health Law\". The New York Times.\u00a0\n^ Chait, Jonathan (July 23, 2013). \"Conservatives Brace for the Possibility Obamacare Won't Totally Suck\". The New Republic.\u00a0\n^ Michael Cannon (July 6, 2007). \"The Anti-Universal Coverage Club Manifesto\". Cato Institute.\u00a0\n^ Chait, Jonathan (June 25, 2012). \"Health Care As a Privilege: What the GOP Won't Admit\". New York.\u00a0\n^ \"Resolution 54: AFL-CIO Convention Resolution on the Affordable Care Act\". AFL-CIO. September 11, 2013. Retrieved October 7, 2013.\u00a0\n^ \"Union Letter: Obamacare Will \u2018Destroy The Very Health and Wellbeing\u2019 of Workers\". Wall Street Journal. July 12, 2013. Retrieved October 7, 2013.\u00a0\n^ \"Labor leaders' letter to Harry Reid and Nancy Pelosi\". The Washington Post. January 27, 2014. Retrieved February 13, 2014.\u00a0\n^ Cauchi, Richard (November 15, 2013). \"State Legislation and Actions Challenging Certain Health Reforms\". National Conference of State Legislatures. Retrieved November 28, 2013.\u00a0\n^ \"Health Care Lawsuit Case Challenges\". Health Care Lawsuits. Independent Women's Forum. November 26, 2013. Retrieved November 28, 2013.\u00a0\n^ \"Analysis: U.S. Supreme Court Upholds the Affordable Care Act: Roberts Rules?\". The National Law Review. von Briesen & Roper, S.C. June 29, 2012. Retrieved July 2, 2012.\u00a0\n^ \"March 14, 2012 Statement on Religious Freedom and HHS Mandate\". United States Conference of Catholic Bishops. March 14, 2012. Retrieved April 28, 2012.\u00a0\n^ Goodstein, Laurie (May 21, 2012). \"Catholics File Suits on Contraceptive Coverage\". New York Times.\u00a0\n^ a b \"Status of State Action on the Medicaid Expansion Decision, as of October 22, 2013\". Kaiser Family Foundation. October 22, 2013.\u00a0\n^ a b Robert Pear (May 24, 2013). \"States' Policies on Health Care Exclude Some of the Poorest\". The New York Times. Retrieved May 25, 2013. In most cases, [Sandy Praeger, Insurance Commissioner of Kansas], said adults with incomes from 32 percent to 100 percent of the poverty level ($6,250 to $19,530 for a family of three) \"will have no assistance.\"\u00a0\n^ Sarah Kliff (May 5, 2013). \"Florida rejects Medicaid expansion, leaves 1 million uninsured\". The Washington Post. Retrieved May 24, 2013.\u00a0\n^ \"Beyond the pledges: Where the states stand on Medicaid\". The Advisory Board Company. July 26, 2013. Retrieved August 27, 2013.\u00a0\n^ a b c Tami Luhby (July 1, 2013). \"States forgo billions by opting out of Medicaid expansion\". CNN.\u00a0\n^ Kliff, Sarah (July 5, 2012). \"What Happens if a State Opts Out of Medicaid, in One Chart\". The Washington Post. Retrieved July 15, 2012.\u00a0\n^ \"Health Reform and MedicaidExpansion\". HealthCare Reform Magazine. July 13, 2010. Retrieved January 9, 2012.\u00a0\n^ \"Analyzing the Impact of State Medicaid Expansion Decisions\". Kaiser Family Foundation. July 17, 2013.\u00a0\n^ \"Enrollment Policy Provisions in the Patient Protection and Affordable Care Act\" (PDF). Families USA. Retrieved April 1, 2012.\u00a0\n^ Cohn, Jonathan (July 19, 2013). \"We Don't Know Everything About Obamacare. But We Know Who's Trying to Sabotage It\". The New Republic.\u00a0\n^ \"Is Medicaid Expansion Good for the States?\". U.S. News & World Report. n.d.\u00a0\n^ Evan Soltas (June 4, 2013). \"Wonkbook: The terrible deal for states rejecting Medicaid\". The Washington Post.\u00a0\n^ Sandhya Somashekhar (August 29, 2013). \"States find new ways to resist health law\". The Washington Post.\u00a0\n^ a b Norm Ornstein (July 24, 2013). \"The Unprecedented and Contemptible Attempts to Sabotage Obamacare\". National Journal.\u00a0\n^ Robert Pear (August 2, 2013). \"Missouri Citizens Face Obstacles to Coverage\". The New York Times. Retrieved August 3, 2013.\u00a0\n^ Cohn, Jonathan (July 25, 2013). \"The Right's Latest Scheme to Sabotage Obamacare\". The New Republic.\u00a0\n^ Sarah Kliff (August 1, 2013). \"Inside the Obamacare Resistance\". The Washington Post.\u00a0\n^ O'Brien, Michael (March 22, 2010). \"GOP quick to release 'repeal' bills\". The Hill. Retrieved April 1, 2012.\u00a0\n^ \"Bill Summary & Status \u2013 112th Congress (2011\u20132012) \u2013 H.R. 2\". THOMAS. January 19, 2011.\u00a0\n^ \"Final Vote Results for passage of Repealing the Job-Killing Health Care Law Act (H.R. 2)\". THOMAS. January 19, 2011.\u00a0\n^ Beutler, Brian (January 19, 2011). \"Dems Press GOPers To Repeal Their Own Benefits Along With Health Care Law\". Talking Points Memo. Retrieved January 21, 2011.\u00a0\n^ \"Motion to Waive All Applicable Budgetary Discipline Re: McConnell Amdt. No. 13\". U.S. Senate. February 2, 2011. Retrieved April 1, 2012.\u00a0\n^ \"House Passes Health Care Repeal 245\u2013189\". C-SPAN. January 19, 2011.\u00a0\n^ Boles, Corey (June 28, 2012). \"Romney, GOP Pledge to Repeal Health Law\". The Wall Street Journal. Retrieved June 29, 2012.\u00a0\n^ \"House Obamacare Repeal: Thirty-Third Time's the Charm?\". ABC News. July 11, 2012.\u00a0\n^ Walker, Andrea K. (July 11, 2012). \"House of representatives votes to repeal health reform for the 31st time\". Baltimore Sun. Retrieved July 12, 2012.\u00a0\n^ Baker, Sam. (November 7, 2012) \"Conservatives begin to admit defeat in their 3-year war against 'ObamaCare'\". The Hill. Retrieved July 17, 2013.\n^ Deirdre Walsh (3 February 2015). \"House votes -again-to repeal Obamacare\". Reuters. Retrieved 4 February 2015.\u00a0\n^ Jonathan Weisman; Robert Pear (May 26, 2013). \"Partisan Gridlock Thwarts Effort to Alter Health Law\". The New York Times. Retrieved May 27, 2013. we cannot use any of the normal tools to resolve ambiguities or fix problems\u00a0\n^ Lipton, Eric (March 19, 2013). \"In Shift, Lobbyists Look for Bipartisan Support to Repeal a Tax\". New York Times.\u00a0\n^ Cohn, Jonathan (December 23, 2010). \"What Defunding Health Reform Would Do\". The New Republic.\u00a0\n^ Lori Montgomery and Paul Kane (October 1, 2013). \"Shutdown begins: Stalemate forces first U.S. government closure in 17 years\". The Washington Post.\u00a0\nBlake, Aaron (September 19, 2013). \"McCain: Efforts to repeal and defund Obamacare 'not rational'\". The Washington Post. Retrieved September 24, 2013.\u00a0\n^ Beutler, Brian (September 19, 2013). \"New test could expose GOP's pack of charlatans\". Salon. Retrieved September 24, 2013.\u00a0\n^ Cohn, Jonathan (August 7, 2013). \"Tea Party to Republicans: Shut Down the Government, or You're a Sellout\". The New Republic.\u00a0\n^ Moody, Chris (October 9, 2013). \"Meet one of the conservative advocacy groups behind the GOP's government shutdown strategy\". Yahoo! News.\u00a0\n^ Joseph, Cameron (October 9, 2013). \"Heritage Action leader: Paul Ryan's shutdown offer off-target\". The Hill.\u00a0\n^ Miller, Zeke J. (September 30, 2013). \"Hidden Hand: How Heritage Action Drove DC To Shut Down\". Time.\u00a0\n^ Goddard, Teagan (May 17, 2013). \"Blocking the Medicare Reform Board Won't Stop Reform\". WonkWire.RollCall.com.\u00a0\n^ Cohn, Jonathan (May 24, 2010). \"Save Donald\". The New Republic.\u00a0\nCohn, Jonathan (July 6, 2010). \"Meet The Don\". The New Republic.\u00a0\n^ Cohn, Jonathan (July 19, 2011). \"The New Nullification: GOP v. Obama Nominees\". The New Republic.\u00a0\n^ a b \"Paternalism 2.0\". The Economist. 23 August 2014. Retrieved 19 January 2015.\u00a0\n^ \"How the Affordable Care Act Impacts Employers\". Randstad USA. Randstad USA. Retrieved 19 January 2015.\u00a0\n^ a b c Jackson, Brooks; Robertson, Lori (January 7, 2011). \"A 'Job-Killing' Law?\". FactCheck. Retrieved January 23, 2011.\u00a0\n^ Farley, Robert; Holan, Angie Drobnic (January 20, 2011). \"The health care law a 'job killer'? The evidence falls short\". PolitiFact.com. Retrieved January 23, 2011.\u00a0\n^ Cohn, Jonathan (February 11, 2011). \"Sorry, The CBO Did Not Say Health Reform Kills 800,000 Jobs\". The New Republic.\u00a0\n^ Cohn, Jonathan (June 13, 2012). \"Obamacare, Good for the Economy\". The New Republic.\u00a0\n^ Heavey, Susan (February 18, 2011), \"Repealing healthcare law would cost $210 bln: CBO\", Reuters, retrieved March 13, 2011\n^ \"Analysis Of A Permanent Prohibition On Implementing The Major Health Care Legislation Enacted In March 2010\". Congressional Budget Office. May 26, 2011. Retrieved April 1, 2012.\u00a0\n^ \"Letter to the Honorable John Boehner providing an estimate for H.R. 6079, the Repeal of Obamacare Act\". Congressional Budget Office. July 24, 2012. Retrieved July 27, 2012.\u00a0\n\n\nFurther reading\n\nBarr, Donald A. (2011). Introduction to U.S. Health Policy: The Organization, Financing, and Delivery of Health Care in America. JHU Press. ISBN\u00a09781421402185.\u00a0\nCCH (2010). Law, Explanation and Analysis of the Patient Protection and Affordable Care Act: Including Reconciliation Act Impact. CCH Incorporated. ISBN\u00a09780808022879.\u00a0 1183pp\nFeldman, Arthur M. (2011). Understanding Health Care Reform: Bridging the Gap Between Myth and Reality. CRC Press. ISBN\u00a09781439879481.\u00a0\nJacobs, Lawrence R.; Theda Skocpol (2010). Health Care Reform and American Politics. Oxford U.P. ISBN\u00a09780199781423.\u00a0\nJohn E. McDonough (August 2, 2011). Inside National Health Reform. University of California Press. ISBN\u00a09780520270190.\u00a0\nSteven Brill (January 5, 2015). America's Bitter Pill: Money, Politics, Back-Room Deals, and the Fight to Fix Our Broken Healthcare System. Random House. ISBN\u00a0978-0812996951.\u00a0\n\n\nPreliminary CBO documents\n\n\nPatient Protection And Affordable Care Act, Incorporating The Manager's Amendment \u2212 December 19, 2009\n\nEffects Of The Patient Protection And Affordable Care Act On The Federal Budget And The Balance In The Hospital Insurance Trust Fund (December 23, 2009)\nEstimated Effect Of The Patient Protection And Affordable Care Act (Incorporating The Manager's Amendment) On The Hospital Insurance Trust Fund (December 23, 2009)\n\n\nBase Analysis\u00a0\u2013 H.R. 3590, Patient Protection and Affordable Care Act, \u2212 November 18, 2009.\n\u2191 (The Additional and\/or Related CBO reporting that follows can be accessed from the above link)\n\nEstimated Distribution Of Individual Mandate Penalties (November 20, 2009)\nEstimated Effects On Medicare Advantage Enrollment And Benefits Not Covered By Medicare (November 21, 2009)\nEstimated Effects On The Status Of The Hospital Insurance Trust Fund (November 21, 2009)\nEstimated Average Premiums Under Current Law (December 5, 2009)\nAdditional Information About Employment-Based Coverage (December 7, 2009)\nBudgetary Treatment Of Proposals To Regulate Medical Loss Ratios (December 13, 2009)\n\n\n\n\nCenters for Medicare and Medicaid Services (CMS) Estimates of the impact of P.L. 111-148\n\n\n\nCenters for Medicare and Medicaid Services (CMS) Estimates of the impact of H.R. 3590\n\n\n\nSenate Finance Committee Meetings\n\n\nExternal links\n\n\n\nCopies of the Act hosted online or readily downloadable\n\n\n\nOther links\n\n\n\n\n\n\n\n\n\n\n\t\t\t\t\t\t\t\t\t", "source": "en.wikipedia.org", "publishDate": "2015-04-20T07:56:16+02:00", "sourceType": "web", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186696170, "url": "http:\/\/www.thenewage.co.za\/Detail.aspx?news_id=156895&cat_id=1020", "title": "New Zealand Prime Minister John Key on Monday invited Chinese officials to quiz him about reports that Wellington worked with US intelligence on a plan to hack Chinese diplomatic communications. \n", "content": "New Zealand Prime Minister John Key on Monday invited Chinese officials to quiz him about reports that Wellington worked with US intelligence on a plan to hack Chinese diplomatic communications. \n\u00a0 \nBeijing has reportedly expressed concern at the claims, which are based on documents from US whistleblower Edward Snowden obtained by Auckland's Herald on Sunday newspaper. \n\u00a0 \nThe newspaper reported that New Zealand intelligence and the US National Security Agency collaborated on a plan to hack a data link between China's consulate in Auckland and a nearby visa office run by the Chinese. \n\u00a0 \nIt said it was unclear whether the hack went ahead because Snowden fled the NSA in May 2013, before it had come to fruition. \n\u00a0 \nState news agency Xinhua said the Chinese embassy in Wellington issued a statement saying it was concerned about the report and attached great importance to cyber security. \n\u00a0 \n\"We will firmly safeguard our security interests and continue to guarantee our cyber and information security with concrete measures,\" it said. \n\u00a0 \n\"At present, cyber space is riddled with chaos and uncertainty. China proposes to settle disputes through dialogue and formulate codes to regulate cyber space behaviours that are acceptable to all sides.\" \n\u00a0 \nKey refused to comment on the report, saying only that the documents it was based upon had been stolen. \n\u00a0 \n\"I'm not going to talk about any foreign intelligence that we gather from any country or any particular reason, all I can tell you is that we gather information when it's in the best interests of New Zealand,\" he told TV3.\u00a0 \n\u00a0 \nHe refused to speculate on whether the issue could damage relations with China, New Zealand\u2019s largest trading partner. \n\u00a0 \n\"You're asking a hypothetical question and I'm not going to do that because I can't give you an answer, I don't know,\" he said. \n\u00a0 \n\"What I can tell you is we've got an immensely strong relationship with China, it's very open and we talk to them about all sorts of things, \n\u00a0 \n\"If they want to raise any issue with us they're welcome to, but I'd be surprised if they do.\" \n\u00a0 \nNew Zealand is part of the \"Five Eyes\" intelligence network which also includes the United States, Britain, Australia and Canada. \n\u00a0 \nSnowden documents released last month alleged Wellington was conducting mass surveillance on its South Pacific neighbours and passing the information onto its Five Eyes partners. \n\u00a0 \n-AFP \n ", "source": "www.thenewage.co.za", "publishDate": "2015-04-20T06:59:26+02:00", "sourceType": "web", "language": "en", "googleRank": 5, "relatedDocs": [ ] }, { "id": 186691633, "url": "http:\/\/www.thesundaily.my\/news\/1389161", "title": "\n \n \n \n \n \n \n WELLINGTON: New Zealand Prime Minister John Key (pix) on Monday invited Chinese o", "content": "\n \n \n \n \n \n \n WELLINGTON: New Zealand Prime Minister John Key (pix) on Monday invited Chinese officials to quiz him about reports that Wellington worked with US intelligence on a plan to hack Chinese diplomatic communications.\nBeijing has reportedly expressed concern at the claims, which are based on documents from US whistleblower Edward Snowden obtained by Auckland's Herald on Sunday newspaper.\nThe newspaper reported that New Zealand intelligence and the US National Security Agency collaborated on a plan to hack a data link between China's consulate in Auckland and a nearby visa office run by the Chinese.\nIt said it was unclear whether the hack went ahead because Snowden fled the NSA in May 2013, before it had come to fruition.\nState news agency Xinhua said the Chinese embassy in Wellington issued a statement saying it was concerned about the report and attached great importance to cyber security.\n\"We will firmly safeguard our security interests and continue to guarantee our cyber and information security with concrete measures,\" it said.\n\"At present, cyber space is riddled with chaos and uncertainty. China proposes to settle disputes through dialogue and formulate codes to regulate cyber space behaviours that are acceptable to all sides.\"\nKey refused to comment on the report, saying only that the documents it was based upon had been stolen.\n\"I'm not going to talk about any foreign intelligence that we gather from any country or any particular reason, all I can tell you is that we gather information when it's in the best interests of New Zealand,\" he told TV3. \nHe refused to speculate on whether the issue could damage relations with China, New Zealand's largest trading partner.\n\"You're asking a hypothetical question and I'm not going to do that because I can't give you an answer, I don't know,\" he said.\n\"What I can tell you is we've got an immensely strong relationship with China, it's very open and we talk to them about all sorts of things,\n\"If they want to raise any issue with us they're welcome to, but I'd be surprised if they do.\"\nNew Zealand is part of the \"Five Eyes\" intelligence network which also includes the United States, Britain, Australia and Canada.\nSnowden documents released last month alleged Wellington was conducting mass surveillance on its South Pacific neighbours and passing the information onto its Five Eyes partners. \u2013 AFP\n\n \n \n \n \n \n \n \n\n \n ", "source": "www.thesundaily.com", "publishDate": "2015-04-20T05:50:57+02:00", "sourceType": "web", "language": "en", "googleRank": 5, "relatedDocs": [ ] }, { "id": 186698053, "url": "http:\/\/thejakartaglobe.beritasatu.com\/?p=397081", "title": "\n\t\t\t\tA lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in a file photo illustration in Paris in this April 15, 2014 file photo. Hackers, most likely fro", "content": "\n\t\t\t\tA lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in a file photo illustration in Paris in this April 15, 2014 file photo. Hackers, most likely from China, have been spying on governments and businesses in Southeast Asia and India uninterrupted for a decade, researchers at internet security company FireEye Inc said. (Reuters Photo\/Mal Langsdon)\t\tJakarta. Companies in emerging Southeast Asia must start enhancing cyber security to protect from growing potential cyber crimes, a report from global consultant firm KPMG revealed on Thursday.\nLyon Poh, cyber security partner of KPMG in Singapore, said emerging markets are not immune to cyber threats.\nSoutheast Asia\u2019s economy has a growing role in global supply chains which attract cyber attacks, particularly as there is still weak governance in the handling of sensitive data, he said.\n\u201cCyber security in the region used to be less attractive for hackers because they target big companies.\n\u201cBut there are many capital flows here which now clearly attract attention of cyber criminals,\u201d Poh said on the sideline of a presentation in Jakarta on Thursday.\nThe report, titled \u201cCyber Risks in the Emerging Markets,\u201d points out that the risks arise from four areas: the complexity of supply chains, the need to remain low cost to attract investment, the rapid spread of technology without adequate availability or awareness of training on technological risks and weak regulations.\nPoh said there has been increasing awareness for the region\u2019s companies.\nStill, there remain businesses \u2014 particularly small and medium enterprises \u2014 which don\u2019t realize the importance of investing in information security.\nHo Wah Lee, head of emerging markets at KPMG Indonesia, said as technology and digital businesses continue to grow in the region, the risks will also increase.\n\u201cEmerging markets are exposed because the investment for cyber security is limited or seen unnecessary,\u201d he said.\nLee quoted data from the \u201cWorld Economic Forum Global Risks 2015\u201d report which ranked cyber attacks alongside unemployment and climate change as one of the top most significant long term risks worldwide.\nIt was projected in the report that delays to cyber security could cost $3 trillion in losses globally by 2020.\nThe KPMG report said organizations across the world spent $71 billion on information security last year.\nPoh added that companies in the emerging markets can take a few steps to help protect themselves against cyber attacks.\nHe recommends establishing cyber hygiene practices, sharing information with industry peers, having a senior leader advocate the cause, acknowledge good practices and build up threat intelligence.\n\u201cEvery business needs to have good cyber hygiene. You don\u2019t need to invest much, you can do simple things like raising the awareness of users \u2014 human error is the weakest link of cyber security,\u201d he said.\nPoh said the cost of having security systems in the companies\u2019 network could range from a couple of hundreds to thousands of dollar each year.\n\u201cYou just need to do regular check ups and raise awareness of users to be safe with the companies\u2019 credentials,\u201d he said.\nMuliaman D. Hadad, head of the Financial Services Authority (OJK), last year said there had been 36.6 million cyber attacks in the country in the previous three years.\nAccording to the 2013 report \u201cState of The Internet\u201d from Akami, Indonesia ranks second worldwide as the country most prone to cyber attacks he said.\nIn the most recent Indonesian cyber incident customers of three local banks lost up to Rp 5 billion ($389,000), according to Irwan Lubis, deputy commissioner of banking division at OJK.\n\u201cThere are 200 customers whose accounts were hacked,\u201d he said on Thursday as quoted by local news portal Kompas.com.\nGlobeAsia\n\t\t\t\n\t\t", "source": "www.thejakartaglobe.com", "publishDate": "2015-04-20T04:38:21+02:00", "sourceType": "blog", "language": "en", "googleRank": 6, "relatedDocs": [ { "id": 186677256, "url": "http:\/\/thejakartaglobe.beritasatu.com\/?p=397081", "title": "\n\t\t\t\tA lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in a file photo illustration in Paris in this April 15, 2014 file photo. Hackers, most likely fro", "content": "\n\t\t\t\tA lock icon, signifying an encrypted Internet connection, is seen on an Internet Explorer browser in a file photo illustration in Paris in this April 15, 2014 file photo. Hackers, most likely from China, have been spying on governments and businesses in Southeast Asia and India uninterrupted for a decade, researchers at internet security company FireEye Inc said. (Reuters Photo\/Mal Langsdon)\t\tJakarta. Companies in emerging Southeast Asia must start enhancing cyber security to protect from growing potential cyber crimes, a report from global consultant firm KPMG revealed on Thursday.\nLyon Poh, cyber security partner of KPMG in Singapore, said emerging markets are not immune to cyber threats.\nSoutheast Asia\u2019s economy has a growing role in global supply chains which attract cyber attacks, particularly as there is still weak governance in the handling of sensitive data, he said.\n\u201cCyber security in the region used to be less attractive for hackers because they target big companies.\n\u201cBut there are many capital flows here which now clearly attract attention of cyber criminals,\u201d Poh said on the sideline of a presentation in Jakarta on Thursday.\nThe report, entitled \u201cCyber Risks in the Emerging Markets,\u201d points out that the risks arise from four areas: the complexity of supply chains, the need to remain low cost to attract investment, the rapid spread of technology without adequate availability or awareness of training on technological risks and weak regulations.\nPoh said there has been increasing awareness for the region\u2019s companies.\nStill, there remain businesses \u2014 particularly small and medium enterprises \u2014 which don\u2019t realize the importance of investing in information security.\nHo Wah Lee, head of emerging markets at KPMG Indonesia, said as technology and digital businesses continue to grow in the region, the risks will also increase.\n\u201cEmerging markets are exposed because the investment for cyber security is limited or seen unnecessary,\u201d he said.\nLee quoted data from the \u201cWorld Economic Forum Global Risks 2015\u201d report which ranked cyber attacks alongside unemployment and climate change as one of the top most significant long term risks worldwide.\nIt was projected in the report that delays to cyber security could cost $3 trillion in losses globally by 2020.\nThe KPMG report said organizations around the world spent $71 billion on information security last year.\nPoh added that companies in the emerging markets can take a few steps to help protect themselves against cyber attacks.\nHe recommends establishing cyber hygiene practices, sharing information with industry peers, having a senior leader advocate the cause, acknowledge good practices and build up threat intelligence.\n\u201cEvery business needs to have good cyber hygiene. You don\u2019t need to invest much, you can do simple things like rasing the awareness of users \u2014 human error is the weakest link of cyber security,\u201d he said.\nPoh said the cost of having security systems in the companies\u2019 network could range from a couple of hundreds to thousands of dollar each year.\n\u201cYou just need to do regular check ups and raise awareness of users to be safe with the companies\u2019 credentials,\u201d he said.\nMuliaman D. Hadad, head of the Financial Services Authority (OJK), last year said there had been 36.6 million cyber attacks in the country over the previous three years.\nAccording to the 2013 report \u201cState of The Internet\u201d from Akami, Indonesia ranks second worldwide as the country most prone to cyber attacks he said.\nIn the most recent Indonesian cyber incident customers of three local banks lost up to Rp 5 billion ($389,000), according to Irwan Lubis, deputy commissioner of banking division at OJK.\n\u201cThere are 200 customers whose accounts were hacked,\u201d he said on Thursday as quoted by local news portal Kompas.com.\nGlobeAsia\n\t\t\t\n\t\t", "source": "www.thejakartaglobe.com", "publishDate": "2015-04-19T20:18:52+02:00", "sourceType": "blog", "language": "en", "googleRank": 6, "relatedDocs": [ ] } ] }, { "id": 186679198, "url": "http:\/\/edition.cnn.com\/2015\/04\/19\/politics\/david-petraeus-paula-broadwell-fbi-case\/index.html?eref=edition", "title": "In the redacted March 20 deposition, obtained from a source by CNN, Special Agent Frederick W. Humphries II claimed under oath that he \"was told by supervisors that\" the 2012 presidential election \"wo", "content": "In the redacted March 20 deposition, obtained from a source by CNN, Special Agent Frederick W. Humphries II claimed under oath that he \"was told by supervisors that\" the 2012 presidential election \"would explain the potential reason why there was so much interference\" in the case \"from headquarters, that nobody wanted this case during an election cycle.\"The deposition is part of the lawsuit brought by Dr. Scott and Jill Kelley against government agencies, departments and major figures in the Obama administration for allegedly defaming their character in the Petraeus-Broadwell sex scandal. The affair between Petraeus and Broadwell, his biographer-turned mistress, brought a disgraced end to the decorated general's career.Though the Kelleys were the victims of the original cyberstalking case, as the Petraeus scandal exploded in the public, Jill Kelley's name was dragged through the mud by unnamed Obama administration and law enforcement officials and many in the media painted her in a particularly unflattering light, the subject of the Kelley's lawsuit.Petraeus pleaded guilty last month to one federal charge of removing and retaining classified information, having improperly shared his black books with Broadwell and lied about it to the FBI. He is scheduled to be sentenced on Thursday. READ: Petraeus says ISIS isn't the biggest long-term threat facing U.S.All charges against Broadwell were dropped in December 2012.Humphries testified he believed Kelley's name had been leaked by someone at FBI headquarters \"and it seemed to be a purposeful attempt to discredit both Mrs. Kelley and myself.\"Humphries said in his deposition he was confused by FBI's leaders' focus on Jill Kelley instead of Broadwell, whom they identified as the cyberstalker as early as June 2012. He testified her actions compromised security of high-level military intelligence personnel and information, but for some reason higher-ups in the FBI kept interfering in what seemed to him to be a fairly straightforward case. In one incident, FBI agents were called back from the airport as they were about to fly to North Carolina to interview Broadwell.All the while, the FBI kept shifting focus on the victims in the case, Humphries testified, or more specifically on Jill Kelley. He testified he would occasionally hear \"lewd comments\" from FBI agents about Kelley, including one individual making \"a comment that he was pleased that Mrs. Kelley was in the Citizens' Academy and that [he] had nominated her because of her [big] breasts.\"\"I couldn't understand why there was so much animosity\" against Jill Kelley amongst his FBI superiors, Humphries testified. \"[I]t was stated in some ways and reflected in the body language that their view was that Jill Kelley had sort of brought this on herself and was some femme fatale,\" he said. He wondered if this warped view of the case was rooted in \"ineptness, incompetence or was politically motivated,\" he testified.A request for comment made by CNN to a representative of Paula Broadwell was not met by press time.Alan Raul, an attorney for the Kelleys, also declined comment to CNN on Sunday, as did Petraeus attorney Robert Barnett. A spokesman for the Justice Department did not return a call from CNN on Sunday; a spokesman for the FBI did not offer any comment. The administration has refrained from commenting on the case in the past given the current litigation.Other law enforcement officials told CNN what Humphries and others regarded as interference from headquarters could also be seen as efforts to ensure the FBI did everything by the book in a highly sensitive case. (They got court-approved warrants for things normally the FBI can administratively subpoena). Some at the FBI thought Humphries did things to keep inserting himself into the case even after he was told to recuse himself given that he had a friendly relationship with Kelley. Those efforts allegedly include attempts at communication that Humphries is sais to have had during the course of the investigations with then-House Majority Leader Eric Cantor, R-Virginia.He testified that he and his wife and children are friends with the Kelleys and their children through their outreach to the military and law enforcement communities in Tampa, and did not understand his bosses' insinuations or harsh judgments.Were some officials in the Obama administration attempting misdirection away from the CIA Director in the thick of the 2012 presidential race? Were they motivated by sexism or some other pre-judgment of Kelley? These are implicit and explicit suggestions in the lawsuit, respectively, but as of now there has not been any clear answer from the administration as to why -- according to the Kelleys' suit and Humphries' deposition -- law enforcement officials were so skeptical of Jill Kelley.FBI blaming the victims?The story began in May 2012, when four-star Gen. John Allen began receiving e-mails from \"[email protected],\" which \"disparaged\" Kelley and referenced an upcoming private dinner the Kelleys were hosting with \"several senior foreign intelligence, defense and diplomatic officials,\" according to the lawsuit. The email troubled Allen given the potential security concern and \"frightened the Kelleys, as it indicated that Mrs. Kelley was being followed or stalked, and raised serious concerns about her own safety and well being, particularly given the number of terrorist risks faced by CENTCOM leaders.\"SEE: Petraeus pleads guilty to federal chargeBroadwell later admitted to having sent that email as well as another from \"Tampa Angel\" to Dr. Scott Kelley, also disparaging his wife, promising \"embarrassment for all, including spouses, such as info in national headlines.\"Jill Kelley reached out to Humphries, an FBI Agent whom she and her husband knew socially. \"She explained that Gen. Allen had received an odd e-mail,\" Humphries testified, noting that \"whoever sent these e-mails is either in close physical proximity or has penetrated the cyber security of these folks to include the director of the Central Intelligence Agency, Director Petraeus, and I was worried and concerned for his safety, the safety of the generals.\"Humphries thought the emails \"ominous\" and contacted Special Agent Adam Malone of the Tampa Cyber Squad. \"We had already reached the threshold on the cyber or physical security of senior government leadership and possible their email,\" he said.By the third week of June, the FBI had identified Broadwell as the cyberstalker, Humphries said, relating how he saw FBI videotape of \"a BMW pulling up to a Starbucks in North Carolina and shortly thereafter the alleged subject of the case enters and logs on, and some of the e-mails were being sent, so they had a firm idea of who it was.\"In an attempt to apparently suss out whatever rivalry or animus might exist between Broadwell and Kelley, Humphries was asked to call Kelley, \"sort of like a ruse like to see if Mrs. Kelley knew who the subject was.\" He did so, and asked her for a book recommendation for background on Petraeus. But Kelley didn't mention Broadwell or her book about the man with whom she'd had an affair, \"All In: The Education of David Petraeus.\"According to Humphries, when he raised the title of the book, Kelley said, \"Gen. Petraeus doesn't really like that book. He said the person who came and wrote it sort of came in for the guise of being an academic researcher and then ended up writing a book.\"Humphries said he was surprised Kelley didn't know the name of the book let alone the author. If Broadwell \"would have some animus against Mrs. Kelley, Mrs. Kelley doesn't even know who she is,\" he recalled thinking.Meanwhile, others in the FBI were heading in an altogether different direction with their judgments of the jet-setting socialites, Humphries said. \"I was surprised throughout the process of the marginalization of Mrs. Kelley as a victim in this case because I heard comments from them saying things like -- you know, I reminded them at one point, you may not agree with the lifestyle of the Kelleys, but they're victims in this crime,\" he testified.The special agent in charge, Steven Ibison, \"kind of rolled his eyes and snorted at the proposal that I said they were victims,\" Humphries said.\"The only victim is her husband because he has to pay for all the food that she goes out and eats and takes pictures of and sends to everyone,\" said Kevin Eaton, the assistant special agent in charge, according to Humphries. Kelley is often took photos of her food when she goes out to eat and sends them to her friends, a source close to Kelley said.It was a comment that \"shocked and surprised\" Humphries since it revealed that the FBI was looking at Kelley's e-mails beyond the ones relevant to the cyberstalking, contrary to Kelley's explicit instruction.\"Something was starting to shift in my mind to make me realize that they had a different view of this than how I understand what was taking place,\" he testified.This was all \"Completely counter to the Jill Kelley that I had known for three years and her husband, Scott Kelley. And I couldn't understand why there was so much angst over this very simple criminal case that could be resolved very quickly and expeditiously and yet was being made far more complicated,\" he said.But soon the FBI leaders would be challenging Humphries' integrity and marital fidelity as well.The FBI director \"just shoved these up my ass\"It's not surprising that a case involving cyberstalking of top generals and the CIA director would prompt the awareness of higher-ups at the FBI. But the behavior from those officials in Washington, shocked Humphries.In June 2012, Humphries was told by Stacy Arruda, FBI supervisory special agent with the Tampa Division of the Cyber Crime, FBI agents went to the airport to fly to North Carolina to interview Broadwell. \"But they were called back to have their questions reviewed,\" by Ibison, the special agent in charge, Humphries said. He said his understand was that deputy director of the FBI Joyce \"halted\" the interview of Broadwell, which was not consistent with FBI protocol.Arruda became so \"concerned and was frustrated by the high level of direction,\" Humphries said, she ultimately \"felt it was wise to keep a separate copy\" of all the evidence in the case. Ultimately Arruda told Humphries that higher-ups essentially removed her from the case.In July 2012, Joyce summoned Ibison out of meeting, Humphries testified. Humphries testified that he was later told that he was the subject of the discussion; Eaton, the assistant special agent in charge, told Humphries that Joyce and the director of the FBI Robert Mueller suggested that Humphries was having an inappropriate relationship with Jill Kelley.Humphries said he was \"completely blind-sided by that accusation and actually shocked and stunned ... I immediately denied it and offered to voluntarily take a polygraph at the same time.\" He said he was confused as to why the FBI focused on Kelley and him instead of Broadwell.In September 2012 Ibison \"summoned\" Humphries to a meeting and asked him \"whether there was anything in my communications with Jill Kelley for which I would be embarrassed,\" he testified.\"No,\" Humphries said, and Ibison \"threw a bunch of pictures at me and files of my e-mails to Jill Kelley.\"\"Well, I told the director that and he just shoved these up my ass,\" Ibison said, according to Humphries, \"and he tossed the pictures at me.\"The photographs to Humphries were completely innocent, including \"Halloween photos, photos at hookah bars with other employees ... One was a picture of the famous mannequin picture with me shirtless between the two, pictures that I had sent to all my supervisors and they had used at annual conferences as funny pictured from the division.\"The origin of the \"mannequin\" picture -- described in the media when the story broke in November 2012 as a \"shirtless photo\" the FBI agent sent to Jill Kelley -- was hardly seductive, as Humphries describes it.At a range in 2009, members of the SWAT team \"were joking that my bald head looked like the shirtless dummies that we had. And so somebody suggested that we take a picture ... And we took picture and it went out to 50 different people,\" Humphries said. \"I actually sent it to Scott Kelley's email address ... it was never meant to be anything but a joke.\"\"These are pictures you saw before,\" Humphries said, according to the deposition. Ibison's response was, \"Well, it was OK inside the FBI but not OK to share it outside the FBI,\" according to Humphries.Humphries left his meeting with Ibison under the impression that FBI Director Mueller believed \"that I had messed up the case for the government because of my ... alleged inappropriate misconduct with Mrs. Kelley, that I had ruined the government's case to ever be able to fully prosecute without embarrassing the bureau.\"Meanwhile, at this point Petraeus had not been interviewed.When Humphries asked his supervisor about the direction of the case, he was told, \"No one wants to be involved in a case like this during an election cycle.\"Election Day was Nov. 6, 2012. Three days later, Petraeus resigned, after which senior military and law enforcement officials leaked Kelley's name to the media. Accusations soon followed, with ABC News reporting that the FBI had \"uncovered 'potentially inappropriate' emails between Gen. Allen and Kelley\" and Fox News saying the officials \"characterize certain email communications as the \"'equivalent of phone sex over email,'\" charges the Kelleys vociferously deny.Jill Kelley's lawsuit states that her \"reputation is indelibly tainted ... consistently referred to as the 'center' of the 'sex scandal' and is often portrayed as the woman who brought down two American generals.\"In addition, amidst the wild media fracas of this case, Gen. Allen's anticipated promotion to Supreme Allied Commander of Europe for NATO was delayed until an investigation into his relationship with Kelley was completed. By the time he was cleared of all wrongdoing, Allen had retired from the military. Humphries has a long and decorated career with the FBI, working on the Joint Terrorism Task Forces in Seattle and Tampa, as well as serving as program manager for FBI operations at Bagram Air Force Base in Afghanistan. In 2002 he received the director's award for outstanding counterterrorism investigation for his work helping the thwart the would be Millennium bomber Ahmed Ressam; in 2012 he received the FBI Medal of Valor for a 2010 incident where he shot and killed a man wielding a knife outside MacDill Air Force Base. Among the many others whom will likely be deposed in the case are former FBI Deputy Director Sean Joyce, former Secretary of Defense Leon Panetta, and Secretary of the Department of Homeland Security Jeh Johnson, who at the time was general counsel at the Pentagon.CNN's Evan Perez contributed to this report.", "source": "www.cnn.com", "publishDate": "2015-04-20T04:20:49+02:00", "sourceType": "web", "language": "en", "googleRank": 9, "relatedDocs": [ ] }, { "id": 186676322, "url": "http:\/\/robinwestenra.blogspot.com\/2015\/04\/the-chinese-response-to-nz-spying.html", "title": "\n\n\nChina\nconcerned at reports of New Zealand-U.S. plan to spy on diplomats\n\n\n\n\n\n\n\n\n19\nApril, 2014\n\n\n\nWELLINGTON,\nApril 19 (Xinhua) -- China on Sunday expressed concern about a report\nthat New Zealand ", "content": "\n\n\nChina\nconcerned at reports of New Zealand-U.S. plan to spy on diplomats\n\n\n\n\n\n\n\n\n19\nApril, 2014\n\n\n\nWELLINGTON,\nApril 19 (Xinhua) -- China on Sunday expressed concern about a report\nthat New Zealand and United States spy agencies planned to hack into\na data link between Chinese government buildings in Auckland.\n\n\n\nThe\nplan was revealed in documents from U.S. National Security Agency\n(NSA) whistleblower Edward Snowden, the Herald on Sunday newspaper\nreported.\n\n\n\nThe\nproject run by New Zealand's Government Communications Security\nBureau (GCSB) and the NSA appeared aimed at tapping data flowing\nbetween the Chinese Consulate and its visa office in Auckland.\n\n\n\nThe\ndocuments said the GCSB had identified the data link, and agreed to\ncooperate with the NSA to use the link to access China's computer\nsystems, said the report.\n\n\n\nDocuments\nappeared to show the plan was codenamed \"Frostbite\" by the\nGCSB and \"Basilhayden\" -- also identified as fictional spy\nJames Bond's drink of choice -- by the NSA.\n\n\n\nThe\npaperwork revealed the GCSB worked with the NSA's elite hacker team\n-- the Tailored Access Operations division -- which specialized in\ncracking computer systems and planting spyware on computers, said the\nreport.\n\n\n\nA\n2013 NSA document showed China at the top of a list of targets it was\nhaving monitored by the GCSB, saying the New Zealand agency gave the\nNSA \"access to areas and countries that are difficult for the\nUnited States to access.\"\n\n\n\nBut\nit is unknown if the plan went ahead because, as sign-off was being\nsought, Snowden walked out of his job with a mass of top secret\ndocuments.\n\n\n\nThe\nChinese Embassy in New Zealand issued a statement Sunday, saying that\nChina was concerned about the report and attached great importance to\nthe cyber security issue.\n\n\n\n\"We\nwill firmly safeguard our security interests and continue to\nguarantee our cyber and information security with concrete measures,\"\nsaid the statement.\n\n\n\n\"At\npresent, cyber space is riddled with chaos and uncertainty. China\nproposes to settle disputes through dialogue and formulate codes to\nregulate cyber space behaviors that are acceptable to all sides.\"\n\n\n\nXinhua\nwas unable to contact anyone in New Zealand Prime Minister John Key's\noffice for a response on Sunday, but the Herald on Sunday reported\nthat a spokeswoman for Key said the government would not respond to\nclaims made from documents \"stolen \" by Snowden.\n\n\n\nShe\nsaid the intelligence agencies contributed to \"our national\nsecurity and the security of New Zealanders at home and abroad.\"\n\n\n\nThe\nopposition Green Party said Key and the government pointlessly\nendangered New Zealand's relationship with its largest trading\npartner.\n\n\n\n\"Breaking\ninternational agreements to spy on Chinese diplomatic communications\nin Auckland is reckless. It would bring very little, if any, benefit\nto New Zealand,\" Greens co-leader Russel Norman said in a\nstatement.\n\n\n\n\"The\ntest is, would we have spied on China on our own accord? It's very\nunlikely. So why is New Zealand spying on behalf of the Americans?\"\n\n\n\n\n\nKey\nthreatens trade with China after new Snowden spying revelations\n\nMartyn\nBradbury\n\n\n\n\n\n\n\n\n\n19\nApril, 2014\n\n\n\n\nThe\ndrip, drip, drip of corrosive information detailing the scope and\nscale of mass surveillance by the GCSB for the NSA continues and\u00a0now\nwe have clear evidence\u00a0that the GCSB have been breaching\ninternational law by spying on China\u2019s consulate\u2026\n\n\n\n\nThe\ndocuments highlight a two-faced New Zealand government policy towards\nChina and raise questions about whether the GCSB has violated\ninternational treaties that prohibit the interception of diplomatic\ncommunications.\n\nPublicly,\nthe government has declared a good relationship with China is crucial\nto New Zealand\u2019s economic future. Key has talked about expanding\nlinks to grow trade and explore other opportunities with the North\nAsian economic powerhouse. Since the Free Trade Agreement was signed\nin Beijing in 2008 \u2013 after 15 rounds of talks over three years \u2013\ntwo-way trade is worth $20 billion a year and rising.\n\nBut\nit is fragile. Scares such as the Fonterra botulism milk powder\nrecall risk the relationship, and Australia has recently signed an\nFTA with China, prompting concern that could affect our existing\ndeal.\n\nAt\na Beijing meeting with the Chinese President, Xi Jinping, in March\nlast year, Key said: \u201cThis relationship has never been stronger.\u201d\n\nXi\nJinping visited New Zealand later that year, stating the China-New\nZealand relationship was based on friendly co-operation and mutual\nrespect, and \u201cset a fine example for the pursuit of successful\nstate-to-state relations\u201d.\n\nKey\nreplied that he looked forward to \u201cseeing how we can take our\nrelationship to an even greater height\u201d. The relationship was not\n\u201cpurely trading\u201d, he said. \u201cIt is so much broader and much\ndeeper than that.\u201d\n\nBut,\nas minister in charge of the GCSB, Key was also overseeing the plot\nto spy on China, which included the top-secret planned operation\nagainst the Chinese consulate in Auckland.\n\n\n\n\n\u2026on\nthe one hand we are selling all our milk powder to China \u00a0while\nlazy immigration from there continues to prop up Auckland\u2019s\nproperty bubble and on the other hand we are spying on China for\nAmerica.\n\n\n\n\nThe\nprice of our role in the 5 Eyes Club could be far higher if China\ndecides to send our economy into a death spiral by cutting milk\npowder imports and open up more Government zero interest loans for\ntheir citizens to\u00a0buy more \u00a0residential land in Auckland.\n\n\n\n\n\n\n\n", "source": "robinwestenra.blogspot.com", "publishDate": "2015-04-20T02:51:00+02:00", "sourceType": "blog", "language": "en", "googleRank": 2, "relatedDocs": [ ] }, { "id": 186679324, "url": "http:\/\/www.businessspectator.com.au\/news\/2015\/4\/20\/technology\/former-brit-spook-joins-cyber-review", "title": "\n The Abbott government has recruited the former head of the British spy agency to be a cyber security advisor.Sir Iain Lobban, who retired last October as director of Britain's Government Communic", "content": "\n The Abbott government has recruited the former head of the British spy agency to be a cyber security advisor.Sir Iain Lobban, who retired last October as director of Britain's Government Communications Headquarters, will join an independent expert panel reviewing Australia's cyber security.The review is expected to be completed by mid-year.Since the review was announced last November, the Australian Cyber Security Centre has responded to 164 cyber intrusions on government agencies and almost 3000 on businesses.There were countless other cyber attacks on businesses that were managed by themselves. \n", "source": "www.businessspectator.com.au", "publishDate": "2015-04-20T02:21:02+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186643438, "url": "http:\/\/usa.chinadaily.com.cn\/world\/2015-04\/19\/content_20473341.htm", "title": "WELLINGTON - China on Sunday expressed concern about a report that New Zealand and United States spy agencies planned to hack into a data link between Chinese government buildings in Auckland. \nThe pl", "content": "WELLINGTON - China on Sunday expressed concern about a report that New Zealand and United States spy agencies planned to hack into a data link between Chinese government buildings in Auckland. \nThe plan was revealed in documents from US National Security Agency (NSA) whistleblower Edward Snowden, the Herald on Sunday newspaper reported. \nThe project run by New Zealand's Government Communications Security Bureau (GCSB) and the NSA appeared aimed at tapping data flowing between the Chinese Consulate and its visa office in Auckland. \n\n\n\n\n\nThe documents said the GCSB had identified the data link, and agreed to cooperate with the NSA to use the link to access China's computer systems, said the report. \nDocuments appeared to show the plan was codenamed \"Frostbite\" by the GCSB and \"Basilhayden\" -- also identified as fictional spy James Bond's drink of choice -- by the NSA. \nThe paperwork revealed the GCSB worked with the NSA's elite hacker team -- the Tailored Access Operations division -- which specialized in cracking computer systems and planting spyware on computers, said the report.\nA 2013 NSA document showed China at the top of a list of targets it was having monitored by the GCSB, saying the New Zealand agency gave the NSA \"access to areas and countries that are difficult for the United States to access.\" \nBut it is unknown if the plan went ahead because, as sign-off was being sought, Snowden walked out of his job with a mass of top secret documents. \nThe Chinese Embassy in New Zealand issued a statement Sunday, saying that China was concerned about the report and attached great importance to the cyber security issue. \n\"We will firmly safeguard our security interests and continue to guarantee our cyber and information security with concrete measures,\" said the statement. \n\"At present, cyber space is riddled with chaos and uncertainty. China proposes to settle disputes through dialogue and formulate codes to regulate cyber space behaviors that are acceptable to all sides.\" \nXinhua was unable to contact anyone in New Zealand Prime Minister John Key's office for a response on Sunday, but the Herald on Sunday reported that a spokeswoman for Key said the government would not respond to claims made from documents \"stolen \" by Snowden. \nShe said the intelligence agencies contributed to \"our national security and the security of New Zealanders at home and abroad.\" \nThe opposition Green Party said Key and the government pointlessly endangered New Zealand's relationship with its largest trading partner. \n\"Breaking international agreements to spy on Chinese diplomatic communications in Auckland is reckless. It would bring very little, if any, benefit to New Zealand,\" Greens co-leader Russel Norman said in a statement. \n\"The test is, would we have spied on China on our own accord? It's very unlikely. So why is New Zealand spying on behalf of the Americans?\" \n\n\n", "source": "usa.chinadaily.com.cn", "publishDate": "2015-04-20T00:00:58.580+02:00", "sourceType": "web", "language": "en", "googleRank": 4, "relatedDocs": [ ] }, { "id": 186650692, "url": "http:\/\/feedproxy.google.com\/~r\/cnet\/tcoc\/~3\/O0ENfAhsCLw\/story01.htm", "title": "\n \n \n \nThe hacking group reportedly exploited security holes in Adobe's Flash and Microsoft's Windows.\n Gett", "content": "\n \n \n \nThe hacking group reportedly exploited security holes in Adobe's Flash and Microsoft's Windows.\n Getty Images\/Ikon Images\n A group of Russian hackers has been using flaws in two popular pieces of software -- Adobe's Flash and Microsoft's Windows operating system -- to try to get information about other governments, according to a report published by FireEye, a well-known United States security firm.FireEye in October said the group, called APT28, is after information about governments, militaries and security organizations -- including the US and other diplomatic targets -- that would \"likely benefit the Russian government.\" One of the ways it has been doing that has been to exploit security holes in Windows, the top operating system for desktop computers, and Adobe's Flash, which lets you see animations and designs on the Web. Reuters earlier wrote about the FireEye report.Adobe has already issued a fix and Microsoft is currently working on one, according to FireEye. The Microsoft problem is reportedly less dangerous because it involves \"enhanced powers\" on a computer that an ordinary user would not have, according to Reuters.Adobe and Microsoft did not immediately return requests for comment. \n \n Cybersecurity has become a top of mind issue not only in Silicon Valley but across all other industries. Part of that is thanks to high-profile attacks in recent years against governments, newspapers and big companies. A devastating hack of Sony Entertainment in November revealed embarrassing secrets about the company, including financial data, information about its executives and plans for upcoming projects. Some, including the FBI, blamed the hack on the North Korean government. The report comes a day before the beginning of the RSA conference in San Francisco, the US's largest confab of companies and experts from the cyber security industry. APT28 has been at it since 2007 and allegedly has a government sponsor based in Moscow, said FireEye. Other security firms have tied the group to a breach in the US State Department, seeking information about President Barack Obama's travel schedule.\n\n \n \n\n \n\n ", "source": "news.cnet.com", "publishDate": "2015-04-19T23:55:01+02:00", "sourceType": "blog", "language": "en", "googleRank": 8, "relatedDocs": [ { "id": 186616420, "url": "http:\/\/feedproxy.google.com\/~r\/cnet\/tcoc\/~3\/O0ENfAhsCLw\/story01.htm", "title": "\n \n \n \nThe hacking group reportedly exploited security holes in Adobe's Flash and Microsoft's Windows.\n Gett", "content": "\n \n \n \nThe hacking group reportedly exploited security holes in Adobe's Flash and Microsoft's Windows.\n Getty Images\/Ikon Images\n A group of Russian hackers has been using flaws in two popular pieces of software -- Adobe's Flash and Microsoft's Windows operating system -- to try to get information about other governments, according to a report published by FireEye, a well-known United States security firm.FireEye in October said the group, called APT28, is after information about governments, militaries and security organizations -- including the US and other diplomatic targets -- that would \"likely benefit the Russian government.\" One of the ways it has been doing that has been to exploit security holes in Windows, the top operating system for desktop computers, and Adobe's Flash, which lets you see animations and designs on the Web. Reuters earlier wrote about the FireEye report.Adobe has already issued a fix and Microsoft is currently working on one, according to FireEye. The Microsoft issue is reportedly less dangerous because it involves \"advanced powers\" on a computer that an ordinary user would not have, according to Reuters.Adobe and Microsoft did not immediately return requests for comment. \n \n Cybersecurity has become a top of mind issue not only in Silicon Valley but across all other industries. Part of that is thanks to high-profile attacks in recent years against governments, newspapers and big companies. A devastating hack of Sony Entertainment in November revealed embarrassing secrets about the company, including financial data, information about its executives and plans for upcoming projects. Some, including the FBI, blamed the hack on the North Korean government. The report comes a day before the beginning of the RSA conference in San Francisco, the US's largest confab of companies and experts from the cyber security industry. APT28 has been at it since 2007 and allegedly has a government sponsor based in Moscow, said FireEye. Other security firms have tied the group to a breach in the US State Department, seeking information about President Barack Obama's travel schedule.\n\n \n \n\n \n\n ", "source": "news.cnet.com", "publishDate": "2015-04-19T19:30:43+02:00", "sourceType": "blog", "language": "en", "googleRank": 8, "relatedDocs": [ ] } ] }, { "id": 186653634, "url": "http:\/\/www.foreignpolicyjournal.com\/2015\/01\/23\/review-of-james-risens-pay-any-price-greed-power-and-endless-war\/#comment-268933", "title": "James Risen, Pay Any Price: Greed, Power and Endless War (New York: Houghton Mifflin Harcourt, 2014).Following the events in Paris at Hebdo Charlie and the accompanying media frenzy concerning freedom", "content": "James Risen, Pay Any Price: Greed, Power and Endless War (New York: Houghton Mifflin Harcourt, 2014).Following the events in Paris at Hebdo Charlie and the accompanying media frenzy concerning freedom of expression and freedom of the press, James Risen\u2019s recent book Pay Any Price becomes, ironically, even more important than its original intention of uncovering the abuses of governmental power that tend to be hidden from view of the mainstream media.Much of what Risen writes about are the efforts of the government and its various agencies and cohorts trying to maintain secrecy around its efforts to keep the endless war going in order to keep the profits rolling in.Following on a previous expose on the CIA \u00a0that highlighted the secrecy and manipulations of the CIA within the Bush \u201cwar on terror\u201d (State of War, Free Press, 2006), Pay Any Price highlights how the Obama administration is a continuation of the Bush administration. \u201cObama\u2019s great achievement\u2014or great sin\u2014was to make the national security state permanent\u201d, he writes.Further, \u201cAmerica has become accustomed to a permanent state of war\u2026.the creation of a homeland security complex at a time of endless war has bequeathed us with the central narrative of the war on terror\u2014modern tales of greed joined hand in hand with stories of abuse of power.\u201dEach chapter focuses on one or two particular story lines to highlight the activities of these deeper government activities and their efforts to keep them quiet.\u00a0 Quirky characters who managed to ingratiate themselves with the powerful in Washington are presented alongside those who have stood against the tide of corruption, secrecy, greed and power.Business, money and powerThe first chapter, \u201cPallets of Cash\u201d explores the billions of dollars in cash that were distributed in Iraq during the 2003 war, much of which went missing, unaccounted for, while a couple billion more are reportedly stored in a Lebanon \u2018safe site\u2019.\u00a0 One of Risen\u2019s current problems stems from the nature of his sources, many of whom he does not identify\u2014for obvious reasons\u2014but who are of interest to the powers that be in order to squelch them.\u00a0 As for the billions of dollars of missing cash, one has to wonder how much of that has gone to fund the strange rise of ISIS, its well-armed devotees, and its well-trained units.In \u201cThe Emperor of the War on Terror\u201d, the story of Dennis Montgomery\u2019s scam of the CIA creating \u201cone of the most elaborate and dangerous hoaxes in American history\u201d is outlined.\u00a0 The CIA \u201cburied the episode and acted like it never happened\u2026trying to block any information about Montgomery and his schemes from becoming public.\u201d\u00a0\u00a0 More wonder, as this puts into question all the \u2018saves\u2019 claimed by the government against supposed terrorist actions.As with all wars, money is to be made. \u201cThe New Oligarchs\u201d looks at the companies and personnel involved with the drone wars (General Atomics), Abu Ghraib (CACI), and the training of Afghan police (Dyncorp).\u00a0 Power is the accompaniment to money.\u00a0 In \u201cRosetta\u201d, Risen outlines the convoluted history of the 9\/11 lawsuit against the Saudi financial elites.\u00a0 It is an awkward story to follow as shady characters acting within the shadows of government (including some within government) work towards their own ends, not necessarily those of the plaintiffs.Risen writes, \u201cThe web of relationships that developed among Motley Rice, Mike Asimos, Rosetta, the Pentagon, the FBI, and the DEA operated completely outside the government\u2019s normal intelligence-gathering processes \u2026 so dependent on personal contacts that few people in the government ever had the nerve to go back and try to unravel exactly what happened.\u201dThe story of Rosetta shows how Bush \u201creached for a national security answer to terrorism rather than a law enforcement solution \u2026 using the courts was never an option.\u201d\u00a0 It also shows how \u201cgreed and ambition have been married to unlimited rivers of cash\u201d to create \u201crogue intelligence operations with little or no adult supervision.\u201dThese currents of cash, power and ambition continue in the next chapter, \u201cAlarbus\u201d, a tale of \u201ca runaway covert action program\u201d underscoring \u201chow greed and the hunt for cash have all too often become the main objects of\u00a0 the war on terror.\u201dNot to be outdone for cash and power, \u201cToo Big To Fail\u201d looks at KBR, the spin off from Dick Cheney\u2019s Halliburton, the former \u201cconnected to the \u2018vast majority\u2019 of war-zone fraud cases referred to investigators.\u201d\u00a0\u00a0 KBR became the \u201cbiggest money machine of the Iraq war\u201d, with a \u201ccontracting bonanza on an unprecedented scale,\u201d and a \u201cvirtual monopoly over basic services,\u201d giving KBR \u201cenormous influence and inevitably helped shape the course of the war.\u201dHumanityPart III, \u201cEndless War,\u201d has three chapters titled \u201cThe War on\u2026 Decency\/Normalcy\/Truth.\u201d\u00a0\u00a0 The overriding theme concerns the lack of respect in general for humanity and what should be humanitarian principles of interaction domestically and with foreign affairs.\u00a0 It is the story of torture, domestic security in the physical sense, and finally the efforts of the NSA to establish itself as the hub of cyberspace security around the world.The first idea, decency, examines the excuses and abuses for the application of torture, an idea that has surfaced before[1] and more recently with the Senate report condemning the CIA\u2019s use of enhanced interrogation.\u00a0 Risen\u2019s story follows that of Damien Corsetti, who described Abu Ghraib by saying, \u201cif an evil place ever existed, that was it.\u00a0 It was all just death and fucking death.\u00a0 That single place changed everyone who was there.\u00a0 A cancerous growth went on there.\u201d\u00a0 As should be common knowledge, \u201cThe only people who have been held to account are those who were at the very bottom of the chain of command.\u201dThe whole torture archipelago, which extended well beyond Abu Ghraib and the CIA, \u201cwas built on a myth \u2026 despite strong evidence to the contrary.\u201d The newly redefined torture tactics\u2014\u201cenhanced interrogation techniques\u201d\u2014\u201chad been originally designed to break men and force them to spout lies and propaganda,\u201d but the advocates claimed \u201cthey would elicit the truth, and not lies and propaganda. In the upside down world of the global war on terror, their explanations were widely accepted.\u201dAfter reading this chapter, another wonder rises:\u00a0 why would anyone bother to visit a psychiatrist or psychologist, as they and their associations were complicit in the torture setup.\u201cThe War on Normalcy\u201d first explores the towns of Derbyline, VT, and Stanstead, Quebec, really just one village bisected by the international border and, before 9\/11, without any concerns about citizens meandering back and forth going about their daily business.\u00a0 That of course changed post 9\/11, as one resident said, \u201cThere\u2019s no negotiating with these people [Homeland Security].\u00a0 It\u2019s totally senseless.\u00a0 There is no thought put into it.\u00a0 Al Qaeda has won.\u00a0 They have changed our lives.\u201d\u00a0 Big business, big money, has also won.To this day, \u201cThe rush to transform the United States from an open society to a walled fortress \u2026 has not been curbed by the killing of Osama bin Laden.\u201d\u00a0 The U.S., and indeed much of the western world, has succumbed to the fear of terror, \u201creinforced by the network of independent terrorism analysts that has grown up around the global war on terror \u2026 by consistently warning that America is under siege [they] have built a cottage industry out of fear.\u201dTerror is used as a political strength.\u00a0 \u201cIn the White House and Congress \u2026 American leaders have learned that keeping the terrorist threat alive provides enormous political benefits.\u201d\u00a0 It is also used to create wealth for those in power and connected to power, \u201cFear sustains the multibillion dollar security industry through both Republican and Democratic administrations.\u201dThis fear factor carries over into the final chapter, \u201cThe War on Truth,\u201d which discusses the burgeoning role of the NSA and cyber security.\u00a0 It is \u201cthe story of the people who tried to stop the NSA\u2019s domestic spying program \u2026 in the face of money, power, and greed.\u00a0\u00a0 It is also the story of how government secrecy\u2014and a crackdown on whistleblowers\u2014has enabled the worst excesses of the post 9\/11 era to go unchecked, from torture to data mining on a massive scale.\u00a0 Secrecy has enabled a new class of national security entrepreneurs and wild freebooters.\u00a0 Secrecy breeds corruption.\u201dSecrecy, greed, and corruption go together, \u201cgovernment secrecy has prevented the public from understanding the true nature of the cyber threat or knowing the full extent of the government\u2019s intrusions into their online privacy in the name of cybersecurity.\u201d\u00a0\u00a0 There is, as per Edward Snowden, \u201clittle real difference between cybersecurity and domestic surveillance.\u201dThere is now a whole new cybersecurity industrial complex, one which is also used offensively, as \u201cthe NSA is now one of the world\u2019s leaders in the use of offensive cyberattacks,\u201d and \u201chas been behind some of the most sophisticated and damaging cyberattacks ever mounted,\u201d\u2014except of course for those we do not hear about, either from the U.S.\/Israel side, or the \u2018other\u2014evil\u2019 side.In closing, Risen says that his response to both the government\u2019s campaign against him and to the endless wars and endless fear factors is the writing of Pay Any Price.\u00a0 It is his answer as \u201cto how best challenge the government\u2019s draconian efforts to crack down on aggressive investigative journalism and suppress the truth in the name of ceaseless war.\u201dRisen\u2019s writing is clear and concise.\u00a0 He notes when certain personnel have refused comment on a particular subject, and has kept some of his sources at their request, from being named.\u00a0 The information he provides is well referenced and he uses outside indicators to support his anecdotal material.\u00a0\u00a0 It is an enlightening read for the individual stories that are told, and for the repercussions that the global war on terror, and its associated\u00a0 power, greed, and secrecy has had on our daily lives.Note[1] Two books well worth reading concerning torture, its history, applications and illegalities:Philippe Sands, Torture Team: Deception, Cruelty and the Compromise of Law (New York: Allen Lane, 2008).Alfred W. McCoy, A Question of Torture:\u00a0 CIA Interrogation, From the Cold War to the War on Terror (New York: \u00a0Metropolitan Books, 2006).See my review of Torture Team in the Palestine Chronicle.Related ", "source": "www.foreignpolicyjournal.com", "publishDate": "2015-04-19T22:47:00+02:00", "sourceType": "web", "language": "en", "googleRank": 5, "relatedDocs": [ ] }, { "id": 186648802, "url": "http:\/\/www.forbes.com\/sites\/giovannirodriguez\/2015\/04\/19\/the-big-assist-can-israel-help-reframe-the-narrative-about-the-future-of-driving\/", "title": "\n\n\n\t\t\t\t\t\t\nIf you get the opportunity to visit Israel anytime soon, and your objective is to get a read on the rapidly expanding technology sector, there is no doubt that at some point in your journey ", "content": "\n\n\n\t\t\t\t\t\t\nIf you get the opportunity to visit Israel anytime soon, and your objective is to get a read on the rapidly expanding technology sector, there is no doubt that at some point in your journey you are going to hear about \u2014 or run into \u2014 the people at Mobileye (NYSE: MBLY). In 2014, it enjoyed the biggest IPO in Israeli history, raising about $1B at a market capitalization of $5.3B (last time I checked, the market cap was close 10B). That might modest here, in Silicon Valley. But in Israel, the impact is huge. And not just in terms in dollars. They are an inspiration to many start-ups in Start-up Nation who until last year could only imagine smaller exits. But it\u2019s also about the tech: Mobileye has developed a unique set of technologies that assist drivers by warning them of potential collisions and recommending moves to mitigate risk. \nThe key word is assist. When I met with leaders of the company \u2013 as part of a recent delegation to Israel \u2013 their elevator pitch was not only crisp but nicely focused on the idea that the company was in the business of building \u201cdriver assistance systems.\u201d Working with car manufacturers, they are also part of a future market whose narrative has been hijacked by visions of driverless cars. But the way Mobileye has been telling its story, the narrative has a more human element. We may look to the future not just as a place where technology does the driving for us, but where technology may in fact make us better drivers. \nAdding a human element to the narrative about the future of driving is a good thing. The narrative today is creepy, and may not be effective with consumers (it robs people of their sense of agency; machines, not humans, will be in control). The new narrative could also be good for expanding the market for the future of driving. At a time when a broad set of technologies are accelerating so quickly that we fear them, we can be thinking about markets that will grow by putting these technologies to empower people, not disenfranchise them. \nIn other words, there may soon be a bigger market for \u201cassistive technologies.\u201d And in Israel, we\u2019re beginning to see what might very well become a new market for assistive vision technologies. Directly after we spoke with the Mobileye execs, we met with one of the founders of Orcam, a company that has developed a wearable device \u201cdesigned to assist people who are visually impaired\u201d (emphasis added). Amnon Shashua, co-founder of Mobileye is also a co-founder of Orcam. And while the technologies and use cases are different, the orientation toward human experience is consistent. \nThey might also inspire more innovation of this kind. Just as Israel has developed ecosystems for tech categories like cyber security (the subject of an article I posted several weeks ago) and agriculture, the subject of an article I plan to post later), Israel might develop a rich ecosystem for a broader range of assistive technologies and medical devices. I got peek into that world during my visit to the MEDinISRAEL\u00a0conference. But after I returned to the states, I heard directly from a company called RayGo that\u2019s running a thus-far successful Indiegogo campaign to deliver a device you clamp onto your steering wheel that enables you to more safely respond to incoming messages on your mobile apps. The company, which developed \u201ceye-free patented technology created for the blind,\u201d sees an opportunity to assist consumers with the future of driving, Mobileye\u2019s market. \nWill we see more tech like this coming out of Israel? If yes, it could be good for entrepreneurs, good for the nation \u2013 it is still growing, and it can and should be known for more than its prowess in cyber security \u2013 and good for all of us. The narrative should not be \u201cman versus machine,\u201d but rather \u201cmachine at the service of man.\u201d \u00a0That\u2019s could be the meta-narrative for all future technology development. \u00a0Let\u2019s see how well Israeli entrepreneurs can get behind it. \n\n \n Source: Mobileye video\n \n\u00a0 \n\u00a0 \n\u00a0 \n\u00a0\n\n\n\n\t\t\t\t\t\n\n\t\t\t\t", "source": "www.forbes.com", "publishDate": "2015-04-19T22:34:00+02:00", "sourceType": "web", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186612151, "url": "http:\/\/palashbiswaslive.blogspot.com\/2015\/04\/the-khazarian-mafia-plotting-another-911.html", "title": "After the 9\/11 attack, Benjamin Netanyahu was elated. Based on what he said publicly, he probably went to a party on the same day to celebrate the ideological paradigm shift which happened shortly aft", "content": "After the 9\/11 attack, Benjamin Netanyahu was elated. Based on what he said publicly, he probably went to a party on the same day to celebrate the ideological paradigm shift which happened shortly after the buildings went down. He probably knew that the disastrous event was going to bring about some kind of\u00a0tikkum olam. The mad man was so happy that he could not hide his feelings. During a conference at Bar-Ilan University, he said:\"We are benefiting from one thing, and that is the attack on the Twin Towers and Pentagon, and the American struggle in Iraq.\"[1]All of those diabolical events, Netanyahu continued to say, \"swung American public opinion in our favor.\"[2]Phew! When your sons and daughters and loved ones died at the World Trade Center, it was a victory for Netanyahu. What he ended up saying was that no price is too high for the Israeli regime. He also ended up saying that because of the 9\/11 attack, the Israeli regime could grab Washington and much of America by the balls and squeeze them.Much of America, indeed, did not pay close attention to what the mad man in Tel Aviv was actually saying because the \"Khazarian Mafia\" had already saturated the culture with the message that Netanyahu was some kind of a savior who will bring world peace, crush terrorism, and promote \"democracy and freedom\" in the Middle East.For example, Sean Hannity cannot function without quoting Netanyahu approvingly with respect to issues in the Middle East:https:\/\/www.youtube.com\/watch?feature=player_embedded&v=qTqHqYEjqWEHad the vast majority of Americans known about the diabolical work of the psychopath in Tel Aviv, they would have almost certainly chanted that America needs to send the regime back into the dark ages.The Zionist media indeed knew that there would have been an uproar if they did not bombard Americans with fake news day in and day out. To suppress serious research, the Zionist media quickly began to label people who began to examine the 9\/11 attack \"conspiracy nuts.\" But politicians in the Middle East were not that blind. Former Iran's President Mahmoud Ahmadinejad declared then,\"Four or five years ago, a suspicious event occurred in New York. A building collapsed and they said that 3,000 people had been killed but never published their names. Under this pretext, they [the U.S.] attacked Afghanistan and Iraq and since then, a million people have been killed only in Iraq.\"[3]Netanyahu, of course, did not like Ahmadinejad's statement. As the saying goes, truth always hurts, particularly when you don't like it. Ahmadinejad, according to Netanyahu, was Adolf Hitler in a physical body.\"Where that [Nazi] regime embarked on a global conflict before it developed nuclear weapons,\" he said, \"This regime [Iran] is developing nuclear weapons before it embarks on a global conflict.\"[4]Ahmadinejad has been out of office since 2013 and Iran still doesn't have the bomb. In other words, the mad man in Tel Aviv continues to lie. But puppets like Sean Hannity never got the memo.The question that we should all ask is this: If the Israeli regime gets another chance, or if they think that another 9\/11 would swing \"American public opinion in our favor,\" would they do it? Listen to Col. (res.) Dr. Gabi Siboni, director of the Cyber Security Program at the Institute for National Security Studies (INSS) inTel Aviv, and try to read between the line here:\"The disruption and possible infiltration of critical infrastructure is the most severe form of cyber attack. Such attacks on airplanes or air traffic control towers, for instance, means that hackers could cause accidents, or even paralyze entire flight systems.\"As of now, this area of capabilities is the exclusive domain of developed states. I strongly believe however, that the next 9\/11 will happen without suicide bombers aboard the plane with box-cutters but will occur because of a cyber incident perpetrated by a terror organization.\"[5]Which terror organization? And why would Siboni even entertain that thought when he does not give us concrete evidence of the so-called terrorist organization?Furthermore, does Siboni mean to tell us that \"ISIS\" or \"Al-Qaeda\" or the Syrian rebels\/terrorists have enough technological devices or lucrative and political power to do this highly sophisticated act of terrorism? If so, then the so-called \"Jewish genius\" as propounded by people like Charles Murray[6]\u00a0needs revision. Members of \"Al-Qaeda\" out-think the Dreadful Few?The next frightening thought is this: What if Siboni's assessment is a perverse way of saying that the Israeli regime does have enough technological leverage to create another 9\/11? Is this far-fetched? Once again, perhaps we need to bring in Israeli military historian Martin van Cleveld:\"We possess several hundred atomic warheads and rockets and can launch them at targets in all directions, perhaps even at Rome. Most European capitals are targets for our air force.\"Let me quote General Moshe Dayan: 'Israel must be like a mad dog, too dangerous to bother.'\"I consider it all hopeless at this point. We shall have to try to prevent things from coming to that, if at all possible. Our armed forces, however, are not the thirtieth strongest in the world, but rather the second or third.\"We have the capability to take the world down with us. And I can assure you that that will happen before Israel goes under.\"[7]\u00a0https:\/\/www.youtube.com\/watch?feature=player_embedded&v=JWpWc_suPWoAnother issue\u00a0that needs further exploration is that if Siboni is really worrying about cyber attacks, shouldn't he explain to us that it was the Israel regime that created cyber attacks? For example Stutxnet, the virus which actually created panic in Iran, was the invention of the NSA and the Israel.[8]What Siboni is telling us here is that the real joker in this discussion is certainly the Israeli regime. \"Israeli industry is coming to show its technology,\" he said.\u00a0\"Israeli companies and American companies are real business partners.\"[9]Netanyahu, back in 2014, put the issue into proper perspective when he said, \"We are in a new world. We are preparing with new forces.\"[10]Here Netanyahu was not specifically talking about literal guns and bullets. He was postulating that in this \"new world\"\u2014and Yuri Slezkine would have called it \"The Jewish Century\"\u2014psychological warfare must be used to divert important issues, to confuse enemies, and to postulate lies if necessary if necessary.This became very clear when Netanyahu again declared, \"Iran and its proxies take advantage of the security and anonymity of cyberspace.\"[11]About two days ago,\u00a0Netanyahu\u00a0twitted:\"Just as the Nazis aspired to crush civilization and to establish a 'master race' as ruler of the world while annihilating the Jewish people, o too does Iran strive to gain control over the region and then spread further, with the explicit intent of obliterating the Jewish state.\"How dumb can this be? Isn't it the Israeli regime that constantly attacks Iran? Wasn't it the same regime that assassinated Iranian scientists? Listen to this admission by a U.S. official, followed by other testimonies:https:\/\/www.youtube.com\/watch?feature=player_embedded&v=n8bRSt5SK5Ehttps:\/\/www.youtube.com\/watch?feature=player_embedded&v=_VHjtv9A1VQhttps:\/\/www.youtube.com\/watch?feature=player_embedded&v=SkZQiOlHBzgAll of this has been corroborated by Israeli writers.[12]\u00a0Again, who is really the joker in this political discussion? Iran?The answer is no. The Dreadful Few are part of the problem. AsPreston James and Mike Harris\u00a0have recently put it,\"Jesus drove them out of the temple for their evil, anti-social inhuman ways and we must do the same before they mass-murder us all like they did to the Russian Peasants in 1917 and are systematically and progressively doing so to the Palestinians while they steal more and more of their ancestral lands.\"It is past time that we bring those \"Khazarian\" evildoers to court and charge them for their criminal activity. It is also time that we charge those who forged alliance with them. I am thinking of people like Bush, Rice, Cheney and others.https:\/\/www.youtube.com\/watch?feature=player_embedded&v=-_8ckfGaNKYhttps:\/\/www.youtube.com\/watch?feature=player_embedded&v=68_3rjp0Rkw[1]\u00a0\"Report: Netanyahu says 9\/11 terror attacks good for Israel,\"Haaretz, April 16, 2008.[2]\u00a0Ibid.[3]\u00a0Ibid.[4]\u00a0Ibid.[5]\u00a0Quoted in Yaakov Lappin, \"Hackers have 'begun targeting nuclear power plants,' cyber warfare expert warns,\"\u00a0Jerusalem Post, April 16, 2015.[6]\u00a0Charles Murray, \"Jewish Genius,\"\u00a0Commentary, April 1, 2007.[7]\u00a0Quoted in \"The War Game,\"\u00a0Guardian, September 21, 2003.[8]\u00a0\"Leaker Snowden says Israel, US created Stuxnet virus,\"\u00a0Times of Israel, July 8, 2013;\u00a0\u00a0William J. Broad, John Markoff, and David E. Sanger,\u00a0\"Israeli Test on Worm Called Crucial in Iran Nuclear Delay,\"NY Times, January 15, 2011.[9]\u00a0Quoted in Yaakov Lappin, \"'States preparing cyber-attack options to cripple enemies' infrastructure,'\"\u00a0Jerusalem Post, March 26, 2015.[10]\u00a0Quoted in Herb Keinon, \"Gov't to establish upgraded cyber security authority,\"\u00a0Jerusalem Post, September 21, 2014.[11]\u00a0Ibid.[12]\u00a0See for example Michael Bar-Zohar and Nissim Mishal,\u00a0Mossad: The Greatest Missions of the Israeli Secret Service\u00a0(New York: HarperCollins, 2012); Dan Raviv and Yossi Melman,\u00a0Spies Against Armageddon: Inside Israel's Secret Wars\u00a0(New York: Levant Books, 2014).http:\/\/www.veteranstoday.com\/2015\/04\/17\/the-khazarian-mafia-plotting-another-911\/", "source": "palashbiswaslive.blogspot.com", "publishDate": "2015-04-19T18:29:00+02:00", "sourceType": "blog", "language": "en", "googleRank": null, "relatedDocs": [ ] }, { "id": 186615105, "url": "http:\/\/ambedkaractions.blogspot.com\/2015\/04\/the-khazarian-mafia-plotting-another-911.html", "title": "The \u201cKhazarian Mafia\u201d Plotting Another 9\/11?", "content": "After the 9\/11 attack, Benjamin Netanyahu was elated. Based on what he said publicly, he probably went to a party on the same day to celebrate the ideological paradigm shift which happened shortly after the buildings went down. He probably knew that the disastrous event was going to bring about some kind of\u00a0tikkum olam. The mad man was so happy that he could not hide his feelings. During a conference at Bar-Ilan University, he said:\"We are benefiting from one thing, and that is the attack on the Twin Towers and Pentagon, and the American struggle in Iraq.\"[1]All of those diabolical events, Netanyahu continued to say, \"swung American public opinion in our favor.\"[2]Phew! When your sons and daughters and loved ones died at the World Trade Center, it was a victory for Netanyahu. What he ended up saying was that no price is too high for the Israeli regime. He also ended up saying that because of the 9\/11 attack, the Israeli regime could grab Washington and much of America by the balls and squeeze them.Much of America, indeed, did not pay close attention to what the mad man in Tel Aviv was actually saying because the \"Khazarian Mafia\" had already saturated the culture with the message that Netanyahu was some kind of a savior who will bring world peace, crush terrorism, and promote \"democracy and freedom\" in the Middle East.For example, Sean Hannity cannot function without quoting Netanyahu approvingly with respect to issues in the Middle East:https:\/\/www.youtube.com\/watch?feature=player_embedded&v=qTqHqYEjqWEHad the vast majority of Americans known about the diabolical work of the psychopath in Tel Aviv, they would have almost certainly chanted that America needs to send the regime back into the dark ages.The Zionist media indeed knew that there would have been an uproar if they did not bombard Americans with fake news day in and day out. To suppress serious research, the Zionist media quickly began to label people who began to examine the 9\/11 attack \"conspiracy nuts.\" But politicians in the Middle East were not that blind. Former Iran's President Mahmoud Ahmadinejad declared then,\"Four or five years ago, a suspicious event occurred in New York. A building collapsed and they said that 3,000 people had been killed but never published their names. Under this pretext, they [the U.S.] attacked Afghanistan and Iraq and since then, a million people have been killed only in Iraq.\"[3]Netanyahu, of course, did not like Ahmadinejad's statement. As the saying goes, truth always hurts, particularly when you don't like it. Ahmadinejad, according to Netanyahu, was Adolf Hitler in a physical body.\"Where that [Nazi] regime embarked on a global conflict before it developed nuclear weapons,\" he said, \"This regime [Iran] is developing nuclear weapons before it embarks on a global conflict.\"[4]Ahmadinejad has been out of office since 2013 and Iran still doesn't have the bomb. In other words, the mad man in Tel Aviv continues to lie. But puppets like Sean Hannity never got the memo.The question that we should all ask is this: If the Israeli regime gets another chance, or if they think that another 9\/11 would swing \"American public opinion in our favor,\" would they do it? Listen to Col. (res.) Dr. Gabi Siboni, director of the Cyber Security Program at the Institute for National Security Studies (INSS) inTel Aviv, and try to read between the line here:\"The disruption and possible infiltration of critical infrastructure is the most severe form of cyber attack. Such attacks on airplanes or air traffic control towers, for instance, means that hackers could cause accidents, or even paralyze entire flight systems.\"As of now, this area of capabilities is the exclusive domain of developed states. I strongly believe however, that the next 9\/11 will happen without suicide bombers aboard the plane with box-cutters but will occur because of a cyber incident perpetrated by a terror organization.\"[5]Which terror organization? And why would Siboni even entertain that thought when he does not give us concrete evidence of the so-called terrorist organization?Furthermore, does Siboni mean to tell us that \"ISIS\" or \"Al-Qaeda\" or the Syrian rebels\/terrorists have enough technological devices or lucrative and political power to do this highly sophisticated act of terrorism? If so, then the so-called \"Jewish genius\" as propounded by people like Charles Murray[6]\u00a0needs revision. Members of \"Al-Qaeda\" out-think the Dreadful Few?The next frightening thought is this: What if Siboni's assessment is a perverse way of saying that the Israeli regime does have enough technological leverage to create another 9\/11? Is this far-fetched? Once again, perhaps we need to bring in Israeli military historian Martin van Cleveld:\"We possess several hundred atomic warheads and rockets and can launch them at targets in all directions, perhaps even at Rome. Most European capitals are targets for our air force.\"Let me quote General Moshe Dayan: 'Israel must be like a mad dog, too dangerous to bother.'\"I consider it all hopeless at this point. We shall have to try to prevent things from coming to that, if at all possible. Our armed forces, however, are not the thirtieth strongest in the world, but rather the second or third.\"We have the capability to take the world down with us. And I can assure you that that will happen before Israel goes under.\"[7]\u00a0https:\/\/www.youtube.com\/watch?feature=player_embedded&v=JWpWc_suPWoAnother issue\u00a0that needs further exploration is that if Siboni is really worrying about cyber attacks, shouldn't he explain to us that it was the Israel regime that created cyber attacks? For example Stutxnet, the virus which actually created panic in Iran, was the invention of the NSA and the Israel.[8]What Siboni is telling us here is that the real joker in this discussion is certainly the Israeli regime. \"Israeli industry is coming to show its technology,\" he said.\u00a0\"Israeli companies and American companies are real business partners.\"[9]Netanyahu, back in 2014, put the issue into proper perspective when he said, \"We are in a new world. We are preparing with new forces.\"[10]Here Netanyahu was not specifically talking about literal guns and bullets. He was postulating that in this \"new world\"\u2014and Yuri Slezkine would have called it \"The Jewish Century\"\u2014psychological warfare must be used to divert important issues, to confuse enemies, and to postulate lies if necessary if necessary.This became very clear when Netanyahu again declared, \"Iran and its proxies take advantage of the security and anonymity of cyberspace.\"[11]About two days ago,\u00a0Netanyahu\u00a0twitted:\"Just as the Nazis aspired to crush civilization and to establish a 'master race' as ruler of the world while annihilating the Jewish people, o too does Iran strive to gain control over the region and then spread further, with the explicit intent of obliterating the Jewish state.\"How dumb can this be? Isn't it the Israeli regime that constantly attacks Iran? Wasn't it the same regime that assassinated Iranian scientists? Listen to this admission by a U.S. official, followed by other testimonies:https:\/\/www.youtube.com\/watch?feature=player_embedded&v=n8bRSt5SK5Ehttps:\/\/www.youtube.com\/watch?feature=player_embedded&v=_VHjtv9A1VQhttps:\/\/www.youtube.com\/watch?feature=player_embedded&v=SkZQiOlHBzgAll of this has been corroborated by Israeli writers.[12]\u00a0Again, who is really the joker in this political discussion? Iran?The answer is no. The Dreadful Few are part of the problem. AsPreston James and Mike Harris\u00a0have recently put it,\"Jesus drove them out of the temple for their evil, anti-social inhuman ways and we must do the same before they mass-murder us all like they did to the Russian Peasants in 1917 and are systematically and progressively doing so to the Palestinians while they steal more and more of their ancestral lands.\"It is past time that we bring those \"Khazarian\" evildoers to court and charge them for their criminal activity. It is also time that we charge those who forged alliance with them. I am thinking of people like Bush, Rice, Cheney and others.https:\/\/www.youtube.com\/watch?feature=player_embedded&v=-_8ckfGaNKYhttps:\/\/www.youtube.com\/watch?feature=player_embedded&v=68_3rjp0Rkw[1]\u00a0\"Report: Netanyahu says 9\/11 terror attacks good for Israel,\"Haaretz, April 16, 2008.[2]\u00a0Ibid.[3]\u00a0Ibid.[4]\u00a0Ibid.[5]\u00a0Quoted in Yaakov Lappin, \"Hackers have 'begun targeting nuclear power plants,' cyber warfare expert warns,\"\u00a0Jerusalem Post, April 16, 2015.[6]\u00a0Charles Murray, \"Jewish Genius,\"\u00a0Commentary, April 1, 2007.[7]\u00a0Quoted in \"The War Game,\"\u00a0Guardian, September 21, 2003.[8]\u00a0\"Leaker Snowden says Israel, US created Stuxnet virus,\"\u00a0Times of Israel, July 8, 2013;\u00a0\u00a0William J. Broad, John Markoff, and David E. Sanger,\u00a0\"Israeli Test on Worm Called Crucial in Iran Nuclear Delay,\"NY Times, January 15, 2011.[9]\u00a0Quoted in Yaakov Lappin, \"'States preparing cyber-attack options to cripple enemies' infrastructure,'\"\u00a0Jerusalem Post, March 26, 2015.[10]\u00a0Quoted in Herb Keinon, \"Gov't to establish upgraded cyber security authority,\"\u00a0Jerusalem Post, September 21, 2014.[11]\u00a0Ibid.[12]\u00a0See for example Michael Bar-Zohar and Nissim Mishal,\u00a0Mossad: The Greatest Missions of the Israeli Secret Service\u00a0(New York: HarperCollins, 2012); Dan Raviv and Yossi Melman,\u00a0Spies Against Armageddon: Inside Israel's Secret Wars\u00a0(New York: Levant Books, 2014).http:\/\/www.veteranstoday.com\/2015\/04\/17\/the-khazarian-mafia-plotting-another-911\/", "source": "ambedkaractions.blogspot.com", "publishDate": "2015-04-19T18:29:00+02:00", "sourceType": "blog", "language": "en", "googleRank": 0, "relatedDocs": [ ] }, { "id": 186607916, "url": "http:\/\/himalayanaltitudes.blogspot.com\/2015\/04\/the-khazarian-mafia-plotting-another-911.html", "title": "After the 9\/11 attack, Benjamin Netanyahu was elated. Based on what he said publicly, he probably went to a party on the same day to celebrate the ideological paradigm shift which happened shortly aft", "content": "After the 9\/11 attack, Benjamin Netanyahu was elated. Based on what he said publicly, he probably went to a party on the same day to celebrate the ideological paradigm shift which happened shortly after the buildings went down. He probably knew that the disastrous event was going to bring about some kind of\u00a0tikkum olam. The mad man was so happy that he could not hide his feelings. During a conference at Bar-Ilan University, he said:\"We are benefiting from one thing, and that is the attack on the Twin Towers and Pentagon, and the American struggle in Iraq.\"[1]All of those diabolical events, Netanyahu continued to say, \"swung American public opinion in our favor.\"[2]Phew! When your sons and daughters and loved ones died at the World Trade Center, it was a victory for Netanyahu. What he ended up saying was that no price is too high for the Israeli regime. He also ended up saying that because of the 9\/11 attack, the Israeli regime could grab Washington and much of America by the balls and squeeze them.Much of America, indeed, did not pay close attention to what the mad man in Tel Aviv was actually saying because the \"Khazarian Mafia\" had already saturated the culture with the message that Netanyahu was some kind of a savior who will bring world peace, crush terrorism, and promote \"democracy and freedom\" in the Middle East.For example, Sean Hannity cannot function without quoting Netanyahu approvingly with respect to issues in the Middle East:https:\/\/www.youtube.com\/watch?feature=player_embedded&v=qTqHqYEjqWEHad the vast majority of Americans known about the diabolical work of the psychopath in Tel Aviv, they would have almost certainly chanted that America needs to send the regime back into the dark ages.The Zionist media indeed knew that there would have been an uproar if they did not bombard Americans with fake news day in and day out. To suppress serious research, the Zionist media quickly began to label people who began to examine the 9\/11 attack \"conspiracy nuts.\" But politicians in the Middle East were not that blind. Former Iran's President Mahmoud Ahmadinejad declared then,\"Four or five years ago, a suspicious event occurred in New York. A building collapsed and they said that 3,000 people had been killed but never published their names. Under this pretext, they [the U.S.] attacked Afghanistan and Iraq and since then, a million people have been killed only in Iraq.\"[3]Netanyahu, of course, did not like Ahmadinejad's statement. As the saying goes, truth always hurts, particularly when you don't like it. Ahmadinejad, according to Netanyahu, was Adolf Hitler in a physical body.\"Where that [Nazi] regime embarked on a global conflict before it developed nuclear weapons,\" he said, \"This regime [Iran] is developing nuclear weapons before it embarks on a global conflict.\"[4]Ahmadinejad has been out of office since 2013 and Iran still doesn't have the bomb. In other words, the mad man in Tel Aviv continues to lie. But puppets like Sean Hannity never got the memo.The question that we should all ask is this: If the Israeli regime gets another chance, or if they think that another 9\/11 would swing \"American public opinion in our favor,\" would they do it? Listen to Col. (res.) Dr. Gabi Siboni, director of the Cyber Security Program at the Institute for National Security Studies (INSS) inTel Aviv, and try to read between the line here:\"The disruption and possible infiltration of critical infrastructure is the most severe form of cyber attack. Such attacks on airplanes or air traffic control towers, for instance, means that hackers could cause accidents, or even paralyze entire flight systems.\"As of now, this area of capabilities is the exclusive domain of developed states. I strongly believe however, that the next 9\/11 will happen without suicide bombers aboard the plane with box-cutters but will occur because of a cyber incident perpetrated by a terror organization.\"[5]Which terror organization? And why would Siboni even entertain that thought when he does not give us concrete evidence of the so-called terrorist organization?Furthermore, does Siboni mean to tell us that \"ISIS\" or \"Al-Qaeda\" or the Syrian rebels\/terrorists have enough technological devices or lucrative and political power to do this highly sophisticated act of terrorism? If so, then the so-called \"Jewish genius\" as propounded by people like Charles Murray[6]\u00a0needs revision. Members of \"Al-Qaeda\" out-think the Dreadful Few?The next frightening thought is this: What if Siboni's assessment is a perverse way of saying that the Israeli regime does have enough technological leverage to create another 9\/11? Is this far-fetched? Once again, perhaps we need to bring in Israeli military historian Martin van Cleveld:\"We possess several hundred atomic warheads and rockets and can launch them at targets in all directions, perhaps even at Rome. Most European capitals are targets for our air force.\"Let me quote General Moshe Dayan: 'Israel must be like a mad dog, too dangerous to bother.'\"I consider it all hopeless at this point. We shall have to try to prevent things from coming to that, if at all possible. Our armed forces, however, are not the thirtieth strongest in the world, but rather the second or third.\"We have the capability to take the world down with us. And I can assure you that that will happen before Israel goes under.\"[7]\u00a0https:\/\/www.youtube.com\/watch?feature=player_embedded&v=JWpWc_suPWoAnother issue\u00a0that needs further exploration is that if Siboni is really worrying about cyber attacks, shouldn't he explain to us that it was the Israel regime that created cyber attacks? For example Stutxnet, the virus which actually created panic in Iran, was the invention of the NSA and the Israel.[8]What Siboni is telling us here is that the real joker in this discussion is certainly the Israeli regime. \"Israeli industry is coming to show its technology,\" he said.\u00a0\"Israeli companies and American companies are real business partners.\"[9]Netanyahu, back in 2014, put the issue into proper perspective when he said, \"We are in a new world. We are preparing with new forces.\"[10]Here Netanyahu was not specifically talking about literal guns and bullets. He was postulating that in this \"new world\"\u2014and Yuri Slezkine would have called it \"The Jewish Century\"\u2014psychological warfare must be used to divert important issues, to confuse enemies, and to postulate lies if necessary if necessary.This became very clear when Netanyahu again declared, \"Iran and its proxies take advantage of the security and anonymity of cyberspace.\"[11]About two days ago,\u00a0Netanyahu\u00a0twitted:\"Just as the Nazis aspired to crush civilization and to establish a 'master race' as ruler of the world while annihilating the Jewish people, o too does Iran strive to gain control over the region and then spread further, with the explicit intent of obliterating the Jewish state.\"How dumb can this be? Isn't it the Israeli regime that constantly attacks Iran? Wasn't it the same regime that assassinated Iranian scientists? Listen to this admission by a U.S. official, followed by other testimonies:https:\/\/www.youtube.com\/watch?feature=player_embedded&v=n8bRSt5SK5Ehttps:\/\/www.youtube.com\/watch?feature=player_embedded&v=_VHjtv9A1VQhttps:\/\/www.youtube.com\/watch?feature=player_embedded&v=SkZQiOlHBzgAll of this has been corroborated by Israeli writers.[12]\u00a0Again, who is really the joker in this political discussion? Iran?The answer is no. The Dreadful Few are part of the problem. AsPreston James and Mike Harris\u00a0have recently put it,\"Jesus drove them out of the temple for their evil, anti-social inhuman ways and we must do the same before they mass-murder us all like they did to the Russian Peasants in 1917 and are systematically and progressively doing so to the Palestinians while they steal more and more of their ancestral lands.\"It is past time that we bring those \"Khazarian\" evildoers to court and charge them for their criminal activity. It is also time that we charge those who forged alliance with them. I am thinking of people like Bush, Rice, Cheney and others.https:\/\/www.youtube.com\/watch?feature=player_embedded&v=-_8ckfGaNKYhttps:\/\/www.youtube.com\/watch?feature=player_embedded&v=68_3rjp0Rkw[1]\u00a0\"Report: Netanyahu says 9\/11 terror attacks good for Israel,\"Haaretz, April 16, 2008.[2]\u00a0Ibid.[3]\u00a0Ibid.[4]\u00a0Ibid.[5]\u00a0Quoted in Yaakov Lappin, \"Hackers have 'begun targeting nuclear power plants,' cyber warfare expert warns,\"\u00a0Jerusalem Post, April 16, 2015.[6]\u00a0Charles Murray, \"Jewish Genius,\"\u00a0Commentary, April 1, 2007.[7]\u00a0Quoted in \"The War Game,\"\u00a0Guardian, September 21, 2003.[8]\u00a0\"Leaker Snowden says Israel, US created Stuxnet virus,\"\u00a0Times of Israel, July 8, 2013;\u00a0\u00a0William J. Broad, John Markoff, and David E. Sanger,\u00a0\"Israeli Test on Worm Called Crucial in Iran Nuclear Delay,\"NY Times, January 15, 2011.[9]\u00a0Quoted in Yaakov Lappin, \"'States preparing cyber-attack options to cripple enemies' infrastructure,'\"\u00a0Jerusalem Post, March 26, 2015.[10]\u00a0Quoted in Herb Keinon, \"Gov't to establish upgraded cyber security authority,\"\u00a0Jerusalem Post, September 21, 2014.[11]\u00a0Ibid.[12]\u00a0See for example Michael Bar-Zohar and Nissim Mishal,\u00a0Mossad: The Greatest Missions of the Israeli Secret Service\u00a0(New York: HarperCollins, 2012); Dan Raviv and Yossi Melman,\u00a0Spies Against Armageddon: Inside Israel's Secret Wars\u00a0(New York: Levant Books, 2014).http:\/\/www.veteranstoday.com\/2015\/04\/17\/the-khazarian-mafia-plotting-another-911\/", "source": "himalayanaltitudes.blogspot.com", "publishDate": "2015-04-19T18:29:00+02:00", "sourceType": "blog", "language": "en", "googleRank": 0, "relatedDocs": [ ] }, { "id": 186617925, "url": "http:\/\/unitedblackuntouchablesworldwide.blogspot.com\/2015\/04\/the-khazarian-mafia-plotting-another-911.html", "title": "After the 9\/11 attack, Benjamin Netanyahu was elated. Based on what he said publicly, he probably went to a party on the same day to celebrate the ideological paradigm shift which happened shortly aft", "content": "After the 9\/11 attack, Benjamin Netanyahu was elated. Based on what he said publicly, he probably went to a party on the same day to celebrate the ideological paradigm shift which happened shortly after the buildings went down. He probably knew that the disastrous event was going to bring about some kind of\u00a0tikkum olam. The mad man was so happy that he could not hide his feelings. During a conference at Bar-Ilan University, he said:\"We are benefiting from one thing, and that is the attack on the Twin Towers and Pentagon, and the American struggle in Iraq.\"[1]All of those diabolical events, Netanyahu continued to say, \"swung American public opinion in our favor.\"[2]Phew! When your sons and daughters and loved ones died at the World Trade Center, it was a victory for Netanyahu. What he ended up saying was that no price is too high for the Israeli regime. He also ended up saying that because of the 9\/11 attack, the Israeli regime could grab Washington and much of America by the balls and squeeze them.Much of America, indeed, did not pay close attention to what the mad man in Tel Aviv was actually saying because the \"Khazarian Mafia\" had already saturated the culture with the message that Netanyahu was some kind of a savior who will bring world peace, crush terrorism, and promote \"democracy and freedom\" in the Middle East.For example, Sean Hannity cannot function without quoting Netanyahu approvingly with respect to issues in the Middle East:https:\/\/www.youtube.com\/watch?feature=player_embedded&v=qTqHqYEjqWEHad the vast majority of Americans known about the diabolical work of the psychopath in Tel Aviv, they would have almost certainly chanted that America needs to send the regime back into the dark ages.The Zionist media indeed knew that there would have been an uproar if they did not bombard Americans with fake news day in and day out. To suppress serious research, the Zionist media quickly began to label people who began to examine the 9\/11 attack \"conspiracy nuts.\" But politicians in the Middle East were not that blind. Former Iran's President Mahmoud Ahmadinejad declared then,\"Four or five years ago, a suspicious event occurred in New York. A building collapsed and they said that 3,000 people had been killed but never published their names. Under this pretext, they [the U.S.] attacked Afghanistan and Iraq and since then, a million people have been killed only in Iraq.\"[3]Netanyahu, of course, did not like Ahmadinejad's statement. As the saying goes, truth always hurts, particularly when you don't like it. Ahmadinejad, according to Netanyahu, was Adolf Hitler in a physical body.\"Where that [Nazi] regime embarked on a global conflict before it developed nuclear weapons,\" he said, \"This regime [Iran] is developing nuclear weapons before it embarks on a global conflict.\"[4]Ahmadinejad has been out of office since 2013 and Iran still doesn't have the bomb. In other words, the mad man in Tel Aviv continues to lie. But puppets like Sean Hannity never got the memo.The question that we should all ask is this: If the Israeli regime gets another chance, or if they think that another 9\/11 would swing \"American public opinion in our favor,\" would they do it? Listen to Col. (res.) Dr. Gabi Siboni, director of the Cyber Security Program at the Institute for National Security Studies (INSS) inTel Aviv, and try to read between the line here:\"The disruption and possible infiltration of critical infrastructure is the most severe form of cyber attack. Such attacks on airplanes or air traffic control towers, for instance, means that hackers could cause accidents, or even paralyze entire flight systems.\"As of now, this area of capabilities is the exclusive domain of developed states. I strongly believe however, that the next 9\/11 will happen without suicide bombers aboard the plane with box-cutters but will occur because of a cyber incident perpetrated by a terror organization.\"[5]Which terror organization? And why would Siboni even entertain that thought when he does not give us concrete evidence of the so-called terrorist organization?Furthermore, does Siboni mean to tell us that \"ISIS\" or \"Al-Qaeda\" or the Syrian rebels\/terrorists have enough technological devices or lucrative and political power to do this highly sophisticated act of terrorism? If so, then the so-called \"Jewish genius\" as propounded by people like Charles Murray[6]\u00a0needs revision. Members of \"Al-Qaeda\" out-think the Dreadful Few?The next frightening thought is this: What if Siboni's assessment is a perverse way of saying that the Israeli regime does have enough technological leverage to create another 9\/11? Is this far-fetched? Once again, perhaps we need to bring in Israeli military historian Martin van Cleveld:\"We possess several hundred atomic warheads and rockets and can launch them at targets in all directions, perhaps even at Rome. Most European capitals are targets for our air force.\"Let me quote General Moshe Dayan: 'Israel must be like a mad dog, too dangerous to bother.'\"I consider it all hopeless at this point. We shall have to try to prevent things from coming to that, if at all possible. Our armed forces, however, are not the thirtieth strongest in the world, but rather the second or third.\"We have the capability to take the world down with us. And I can assure you that that will happen before Israel goes under.\"[7]\u00a0https:\/\/www.youtube.com\/watch?feature=player_embedded&v=JWpWc_suPWoAnother issue\u00a0that needs further exploration is that if Siboni is really worrying about cyber attacks, shouldn't he explain to us that it was the Israel regime that created cyber attacks? For example Stutxnet, the virus which actually created panic in Iran, was the invention of the NSA and the Israel.[8]What Siboni is telling us here is that the real joker in this discussion is certainly the Israeli regime. \"Israeli industry is coming to show its technology,\" he said.\u00a0\"Israeli companies and American companies are real business partners.\"[9]Netanyahu, back in 2014, put the issue into proper perspective when he said, \"We are in a new world. We are preparing with new forces.\"[10]Here Netanyahu was not specifically talking about literal guns and bullets. He was postulating that in this \"new world\"\u2014and Yuri Slezkine would have called it \"The Jewish Century\"\u2014psychological warfare must be used to divert important issues, to confuse enemies, and to postulate lies if necessary if necessary.This became very clear when Netanyahu again declared, \"Iran and its proxies take advantage of the security and anonymity of cyberspace.\"[11]About two days ago,\u00a0Netanyahu\u00a0twitted:\"Just as the Nazis aspired to crush civilization and to establish a 'master race' as ruler of the world while annihilating the Jewish people, o too does Iran strive to gain control over the region and then spread further, with the explicit intent of obliterating the Jewish state.\"How dumb can this be? Isn't it the Israeli regime that constantly attacks Iran? Wasn't it the same regime that assassinated Iranian scientists? Listen to this admission by a U.S. official, followed by other testimonies:https:\/\/www.youtube.com\/watch?feature=player_embedded&v=n8bRSt5SK5Ehttps:\/\/www.youtube.com\/watch?feature=player_embedded&v=_VHjtv9A1VQhttps:\/\/www.youtube.com\/watch?feature=player_embedded&v=SkZQiOlHBzgAll of this has been corroborated by Israeli writers.[12]\u00a0Again, who is really the joker in this political discussion? Iran?The answer is no. The Dreadful Few are part of the problem. AsPreston James and Mike Harris\u00a0have recently put it,\"Jesus drove them out of the temple for their evil, anti-social inhuman ways and we must do the same before they mass-murder us all like they did to the Russian Peasants in 1917 and are systematically and progressively doing so to the Palestinians while they steal more and more of their ancestral lands.\"It is past time that we bring those \"Khazarian\" evildoers to court and charge them for their criminal activity. It is also time that we charge those who forged alliance with them. I am thinking of people like Bush, Rice, Cheney and others.https:\/\/www.youtube.com\/watch?feature=player_embedded&v=-_8ckfGaNKYhttps:\/\/www.youtube.com\/watch?feature=player_embedded&v=68_3rjp0Rkw[1]\u00a0\"Report: Netanyahu says 9\/11 terror attacks good for Israel,\"Haaretz, April 16, 2008.[2]\u00a0Ibid.[3]\u00a0Ibid.[4]\u00a0Ibid.[5]\u00a0Quoted in Yaakov Lappin, \"Hackers have 'begun targeting nuclear power plants,' cyber warfare expert warns,\"\u00a0Jerusalem Post, April 16, 2015.[6]\u00a0Charles Murray, \"Jewish Genius,\"\u00a0Commentary, April 1, 2007.[7]\u00a0Quoted in \"The War Game,\"\u00a0Guardian, September 21, 2003.[8]\u00a0\"Leaker Snowden says Israel, US created Stuxnet virus,\"\u00a0Times of Israel, July 8, 2013;\u00a0\u00a0William J. Broad, John Markoff, and David E. Sanger,\u00a0\"Israeli Test on Worm Called Crucial in Iran Nuclear Delay,\"NY Times, January 15, 2011.[9]\u00a0Quoted in Yaakov Lappin, \"'States preparing cyber-attack options to cripple enemies' infrastructure,'\"\u00a0Jerusalem Post, March 26, 2015.[10]\u00a0Quoted in Herb Keinon, \"Gov't to establish upgraded cyber security authority,\"\u00a0Jerusalem Post, September 21, 2014.[11]\u00a0Ibid.[12]\u00a0See for example Michael Bar-Zohar and Nissim Mishal,\u00a0Mossad: The Greatest Missions of the Israeli Secret Service\u00a0(New York: HarperCollins, 2012); Dan Raviv and Yossi Melman,\u00a0Spies Against Armageddon: Inside Israel's Secret Wars\u00a0(New York: Levant Books, 2014).http:\/\/www.veteranstoday.com\/2015\/04\/17\/the-khazarian-mafia-plotting-another-911\/", "source": "unitedblackuntouchablesworldwide.blogspot.com", "publishDate": "2015-04-19T18:29:00+02:00", "sourceType": "blog", "language": "en", "googleRank": 1, "relatedDocs": [ ] }, { "id": 186610917, "url": "http:\/\/www.shanghaidaily.com\/national\/China-concerned-at-spy-plans-by-NZUS\/shdaily.shtml", "title": "\n CHINA has expressed concern about a report that New Zealand and United States spy agencies planned to hack into a data link between Chinese government buildings in Auckland. \n", "content": "\n CHINA has expressed concern about a report that New Zealand and United States spy agencies planned to hack into a data link between Chinese government buildings in Auckland. \n \nThe plan was revealed in documents from US National Security Agency whistleblower Edward Snowden, the Herald on Sunday newspaper reported. \n \nThe project run by New Zealand\u2019s Government Communications Security Bureau and the NSA appeared aimed at tapping data flowing between the Chinese Consulate and its visa office in Auckland. \n \nThe documents said the GCSB had identified the data link, and agreed to cooperate with the NSA to use the link to access China\u2019s computer systems, said the report. \n \nDocuments appeared to show the plan was codenamed \u201cFrostbite\u201d by the GCSB and \u201cBasilhayden\u201d \u2014 a bourbon favored by James Bond in one of the novels \u2014 by the NSA. \n \nThe paperwork revealed the GCSB worked with the NSA\u2019s elite hacker team \u2014 the Tailored Access Operations division \u2014 which specialized in cracking computer systems and planting spyware on computers, said the report. \n \nA 2013 NSA document showed China at the top of a list of targets it was having monitored by the GCSB, saying the New Zealand agency gave the NSA \u201caccess to areas and countries that are difficult for the United States to access.\u201d \n \nBut it is unknown if the plan went ahead because, as sign-off was being sought, Snowden walked out of his job with a mass of top secret documents. \n \nThe Chinese Embassy in New Zealand issued a statement yesterday saying that China was concerned about the report and attached great importance to cyber security. \n \n\u201cWe will firmly safeguard our security interests and continue to guarantee our cyber and information security with concrete measures,\u201d it said. \u201cAt present, cyber space is riddled with chaos and uncertainty. China proposes to settle disputes through dialogue and formulate codes to regulate cyber space behaviors that are acceptable to all sides.\u201d \n \nThe Herald on Sunday reported that a spokeswoman for New Zealand Prime Minister John Key said the government would not respond to claims made from documents \u201cstolen\u201d by Snowden. She said the intelligence agencies contributed to \u201cour national security and the security of New Zealanders at home and abroad.\u201d \n \nThe opposition Green Party said Key and his government pointlessly endangered New Zealand\u2019s relationship with its largest trading partner. \n \n\u201cBreaking international agreements to spy on Chinese diplomatic communications in Auckland is reckless. It would bring very little, if any, benefit to New Zealand,\u201d Greens co-leader Russel Norman said. \n \n\u201cThe test is, would we have spied on China on our own accord? It\u2019s very unlikely. So why is New Zealand spying on behalf of the Americans?\u201d \n\n \n \n \n \u00a0 \nSubscribe to our products \n \n \n \n \n \n\n ", "source": "www.shanghaidaily.com", "publishDate": "2015-04-19T18:10:00+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186615351, "url": "http:\/\/www.apnnews.com\/2015\/04\/19\/manageengine-to-highlight-its-it-security-compliance-management-solutions-at-gisec-2015\/", "title": "\n\n \n \n \n\n ManageEngine to Highlight Its IT Security & Compliance Management Solutions at GISEC 2015\n \n\n \n \nDubai, UAE\u00a0 : ManageEngine, the real-time IT management company, today announced its part", "content": "\n\n \n \n \n\n ManageEngine to Highlight Its IT Security & Compliance Management Solutions at GISEC 2015\n \n\n \n \nDubai, UAE\u00a0 : ManageEngine, the real-time IT management company, today announced its participation at Gulf Information Security Expo & Conference (GISEC 2015), the region\u2019s leading cyber security exhibition to be held between April 26 and 28 at the Dubai World Trade and Convention Centre. The company will showcase its entire range of IT security and compliance management solutions, demonstrate its latest security products, and profile success stories that address today\u2019s security concerns as well as ongoing operational challenges.\n\u201cWith the growing number of sophisticated cyber attacks and threats, the global security landscape has been changing significantly over the last few years. IT security has become a top priority for CIOs and safeguarding the business from evolving, sophisticated security threats has become the need of the hour for them. The situation is no different in the Middle East, where organizations are looking for ways to bolster internal controls, identify and remediate vulnerabilities, control changes, continuously monitor activities, reduce risks and mitigate known and unknown threats,\u201d said Nirmal Kumar Manoharan, Regional Director (Sales-Middle East) at ManageEngine.\n\u201cGISEC, being the Middle East\u2019s only large-scale information security event that brings together industry, government and thought leaders, is a perfect platform for ManageEngine to reach out to the region\u2019s CIOs, address their IT security concerns and help them\u00a0 mitigate those risks as effectively as possible. Apart from showcasing our best-in-class IT security & compliance management solutions, our technical experts will also hold product demos and share global and regional success stories with customers,\u201d Mr. Manoharan added.\nAt the region\u2019s information security exhibition, ManageEngine will showcase its best-in-class IT security product portfolio, which includes Password Manager Pro, Eventlog Analyzer, Firewall Analyzer, Network Configuration Manager, and Desktop Central. These solutions help organizations strengthen internal controls, combat security threats, and enhance operational efficiency.\n \n \n\n \n \n \n", "source": "apnnews.com", "publishDate": "2015-04-19T18:02:40+02:00", "sourceType": "blog", "language": "en", "googleRank": 2, "relatedDocs": [ ] }, { "id": 186590562, "url": "http:\/\/www.ft.com\/cms\/s\/0\/5cfcbcbc-e692-11e4-afb7-00144feab7de.html?ftcamp=published_links%2Frss%2Fcompanies%2Ffeed%2F%2Fproduct", "title": "Cyber security funding tops $1bn", "content": "Amount raised by sector doubles year-on-year after hacker breaches at Sony Pictures and Home Depot", "source": "www.ft.com\/home\/uk", "publishDate": "2015-04-19T17:18:19+02:00", "sourceType": "news", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186585648, "url": "http:\/\/www.4-traders.com\/FIREEYE-INC-14325709\/news\/Russian-cyber-gang-targeting-US-govt-used-Adobe-Windows-flaws-FireEye-Russian-cyber-gang-targe-20218041\/", "title": "\nA Russian hacking group that targeted US State Department computers exploited vulnerabilities in Adobe Flash and Microsoft Windows to mount its campaign, Reuters reported, citing statements from cybe", "content": "\nA Russian hacking group that targeted US State Department computers exploited vulnerabilities in Adobe Flash and Microsoft Windows to mount its campaign, Reuters reported, citing statements from cyber-security company FireEye.\nThe group may be the same one that infiltrated the White House non-classified network in October, gaining access to the president's schedule, but FireEye did not confirm this.\nFireEye, known for its forensic work through its acquired subsidiary Mandiant, has dubbed the Russian group APT28 and believes it has been operating since 2007. Apart from US targets, APT28 has infiltrated NATO offices and monitored government officials in Georgia.\nTrend Micro also appeared to refer to the group's operations in a 16 April whitepaper and blogpost. The cyber security firm warned of \"Operation Pawn Storm\", which it described as \"an active economic and political cyber-espionage operation that targets a wide range of entities, like the military, governments, defence industries, and the media\".\n\"The group is composed of a determined group of threat actors active since at least 2007 with a very specific modus operandi,\" Trend Micro said in its blogpost. \"We so named it due to the attackers' use of multiple connected tools and tactics to hit a specific target - a strategy mirroring the chess move of the same name.\"\nAdobe has since issued a fix for the vulnerability used by APT28 and Microsoft is reportedly working on a patch for the Windows flaw.\n(c) 2015 ITP Business Publishing Ltd. All Rights Reserved. Provided by SyndiGate Media Inc. (Syndigate.info)., source Middle East & North African Newspapers\n", "source": "www.4-traders.com", "publishDate": "2015-04-19T16:04:10+02:00", "sourceType": "web", "language": "en", "googleRank": 5, "relatedDocs": [ ] }, { "id": 186575371, "url": "http:\/\/www.chinadaily.com.cn\/world\/2015-04\/19\/content_20473281.htm", "title": "\n\n\n\n\n\n\nA cybersecurity expert monitors telecommunications traffic at a network operations center in a Verizon facility in Ashburn, Virginia in this July 15, 2014 file photo.[Photo\/Agencies]\nWELLINGTON", "content": "\n\n\n\n\n\n\nA cybersecurity expert monitors telecommunications traffic at a network operations center in a Verizon facility in Ashburn, Virginia in this July 15, 2014 file photo.[Photo\/Agencies]\nWELLINGTON - China on Sunday expressed concern about a report that New Zealand and United States spy agencies planned to hack into a data link between Chinese government buildings in Auckland. \nThe plan was revealed in documents from US National Security Agency (NSA) whistleblower Edward Snowden, the Herald on Sunday newspaper reported. \nThe project run by New Zealand's Government Communications Security Bureau (GCSB) and the NSA appeared aimed at tapping data flowing between the Chinese Consulate and its visa office in Auckland. \n\n\nThe documents said the GCSB had identified the data link, and agreed to cooperate with the NSA to use the link to access China's computer systems, said the report. \nDocuments appeared to show the plan was codenamed \"Frostbite\" by the GCSB and \"Basilhayden\" -- also identified as fictional spy James Bond's drink of choice -- by the NSA. \nThe paperwork revealed the GCSB worked with the NSA's elite hacker team -- the Tailored Access Operations division -- which specialized in cracking computer systems and planting spyware on computers, said the report.\nA 2013 NSA document showed China at the top of a list of targets it was having monitored by the GCSB, saying the New Zealand agency gave the NSA \"access to areas and countries that are difficult for the United States to access.\" \nBut it is unknown if the plan went ahead because, as sign-off was being sought, Snowden walked out of his job with a mass of top secret documents. \nThe Chinese Embassy in New Zealand issued a statement Sunday, saying that China was concerned about the report and attached great importance to the cyber security issue. \n\"We will firmly safeguard our security interests and continue to guarantee our cyber and information security with concrete measures,\" said the statement. \n\"At present, cyber space is riddled with chaos and uncertainty. China proposes to settle disputes through dialogue and formulate codes to regulate cyber space behaviors that are acceptable to all sides.\" \nXinhua was unable to contact anyone in New Zealand Prime Minister John Key's office for a response on Sunday, but the Herald on Sunday reported that a spokeswoman for Key said the government would not respond to claims made from documents \"stolen \" by Snowden. \nShe said the intelligence agencies contributed to \"our national security and the security of New Zealanders at home and abroad.\" \nThe opposition Green Party said Key and the government pointlessly endangered New Zealand's relationship with its largest trading partner. \n\"Breaking international agreements to spy on Chinese diplomatic communications in Auckland is reckless. It would bring very little, if any, benefit to New Zealand,\" Greens co-leader Russel Norman said in a statement. \n\"The test is, would we have spied on China on our own accord? It's very unlikely. So why is New Zealand spying on behalf of the Americans?\" \n", "source": "www.chinadaily.com.cn", "publishDate": "2015-04-19T15:55:50.260+02:00", "sourceType": "web", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186574886, "url": "http:\/\/www.chinadaily.net\/world\/2015-04\/19\/content_20473281.htm", "title": "\n\n\n\n\n\n\nA cybersecurity expert monitors telecommunications traffic at a network operations center in a Verizon facility in Ashburn, Virginia in this July 15, 2014 file photo.[Photo\/Agencies]\nWELLINGTON", "content": "\n\n\n\n\n\n\nA cybersecurity expert monitors telecommunications traffic at a network operations center in a Verizon facility in Ashburn, Virginia in this July 15, 2014 file photo.[Photo\/Agencies]\nWELLINGTON - China on Sunday expressed concern about a report that New Zealand and United States spy agencies planned to hack into a data link between Chinese government buildings in Auckland. \nThe plan was revealed in documents from US National Security Agency (NSA) whistleblower Edward Snowden, the Herald on Sunday newspaper reported. \nThe project run by New Zealand's Government Communications Security Bureau (GCSB) and the NSA appeared aimed at tapping data flowing between the Chinese Consulate and its visa office in Auckland. \n\n\nThe documents said the GCSB had identified the data link, and agreed to cooperate with the NSA to use the link to access China's computer systems, said the report. \nDocuments appeared to show the plan was codenamed \"Frostbite\" by the GCSB and \"Basilhayden\" -- also identified as fictional spy James Bond's drink of choice -- by the NSA. \nThe paperwork revealed the GCSB worked with the NSA's elite hacker team -- the Tailored Access Operations division -- which specialized in cracking computer systems and planting spyware on computers, said the report.\nA 2013 NSA document showed China at the top of a list of targets it was having monitored by the GCSB, saying the New Zealand agency gave the NSA \"access to areas and countries that are difficult for the United States to access.\" \nBut it is unknown if the plan went ahead because, as sign-off was being sought, Snowden walked out of his job with a mass of top secret documents. \nThe Chinese Embassy in New Zealand issued a statement Sunday, saying that China was concerned about the report and attached great importance to the cyber security issue. \n\"We will firmly safeguard our security interests and continue to guarantee our cyber and information security with concrete measures,\" said the statement. \n\"At present, cyber space is riddled with chaos and uncertainty. China proposes to settle disputes through dialogue and formulate codes to regulate cyber space behaviors that are acceptable to all sides.\" \nXinhua was unable to contact anyone in New Zealand Prime Minister John Key's office for a response on Sunday, but the Herald on Sunday reported that a spokeswoman for Key said the government would not respond to claims made from documents \"stolen \" by Snowden. \nShe said the intelligence agencies contributed to \"our national security and the security of New Zealanders at home and abroad.\" \nThe opposition Green Party said Key and the government pointlessly endangered New Zealand's relationship with its largest trading partner. \n\"Breaking international agreements to spy on Chinese diplomatic communications in Auckland is reckless. It would bring very little, if any, benefit to New Zealand,\" Greens co-leader Russel Norman said in a statement. \n\"The test is, would we have spied on China on our own accord? It's very unlikely. So why is New Zealand spying on behalf of the Americans?\" \n", "source": "www.chinadaily.net", "publishDate": "2015-04-19T15:54:20.733+02:00", "sourceType": "web", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186574410, "url": "http:\/\/dc.citybizlist.com\/article\/261112\/recorded-future-raises-12m-series-d", "title": "\n \n \n\tIt\u2019s a really exciting time at Recorded Future. Our real-time, interactive, threat intelligence analytics platform is being adopted by leading organizat", "content": "\n \n \n\tIt\u2019s a really exciting time at Recorded Future. Our real-time, interactive, threat intelligence analytics platform is being adopted by leading organizations. We now help protect four of the top five companies in the world.\n\n\n\tIn 2014, our bookings grew by over 100%. Our new enterprise customers include the top financial institutions, technology companies, cyber security companies, MSSPs, and government agencies. In addition, thousands of information security professionals subscribe to Recorded Future\u2019s free daily\u00a0threat alerts. (Go here to subscribe.)\n\n\n\tWe\u2019ve built a massive platform that indexes billions of events, powered by our patented Web Intelligence Engine which continuously analyzes the open Web to give you unmatched insight into emerging threats. You can read about big data until you\u2019re blue in the face, but we live and breathe it every day, ingesting truly massive amounts of unstructured data from across the Web and turn it into actionable intelligence available through interactive visualizations, real-time alerts, and APIs.\n\n\n\tTo drive our continued expansion and take full advantage of the growing market demand for threat intelligence, we just closed our Series D round of financing and raised $12 million. This funding round was led by Reed Elsevier Ventures, and Kevin Brown, General Partner, will join the Recorded Future board. MassMutual Ventures, the corporate venture capital arm of Massachusetts Mutual Life Insurance Company, also co-invested in the round. Existing investors, Google Ventures, In-Q-Tel, Atlas, IA Ventures, and Balderton all participated in this round.\n\n\n\tKevin Brown puts it in a great way, \u201cRecorded Future has built a unique and strong differentiation in the fast-growing threat intelligence market. Turning data from the Web into intelligence is an amazing idea but hard to do really well. Recorded Future has created and executed on this vision superbly. The best proof of Recorded Future\u2019s value is seeing their growth in both new and existing enterprise customers. We are delighted to be part of Recorded Future.\u201d\n\n\n\tMark Goodman, Managing Director at MassMutual Ventures adds, \u201cWe have been very impressed with the strong traction Recorded Future has gained across a broad spectrum of industries, including financial services with demanding cyber security requirements. With the backing and expertise of a Fortune 100 company, we look forward to supporting Recorded Future as it scales new heights.\u201d\n\n\n\tOur team continues to grow, and now includes veterans from Spotfire, Endeca, Google, US Department of Defense, CIA, McKinsey, Cisco, Vertica, and other big data, analytics, and security organizations. Want to be part of shaping the future with a team of very smart and passionate people? Take a look at our job openings here.\n\n\n\tAbout Recorded Future\n\n\n\tWe arm you with real-time threat intelligence so you can proactively defend your organization against cyber attacks. With billions of indexed facts, and more added every day, our patented Web Intelligence Engine continuously analyzes the open Web to give you unmatched insight into emerging threats. Recorded Future helps protect four of the top five companies in the world.\n \n \n ", "source": "dc.citybizlist.com", "publishDate": "2015-04-19T15:52:39.310+02:00", "sourceType": "web", "language": "en", "googleRank": 5, "relatedDocs": [ ] }, { "id": 186574390, "url": "http:\/\/english.sina.com\/2015\/0418\/802668.html", "title": " \n\nWELLINGTON, April 19 (Xinhua) -- China on Sunday expressed concern about a report that New Zealand and United States spy agencies planned to hack into a data link between Chinese government bui", "content": " \n\nWELLINGTON, April 19 (Xinhua) -- China on Sunday expressed concern about a report that New Zealand and United States spy agencies planned to hack into a data link between Chinese government buildings in Auckland. \n\nThe plan was revealed in documents from U.S. National Security Agency (NSA) whistleblower Edward Snowden, the Herald on Sunday newspaper reported. \n\nThe project run by New Zealand's Government Communications Security Bureau (GCSB) and the NSA appeared aimed at tapping data flowing between the Chinese Consulate and its visa office in Auckland. \n\nThe documents said the GCSB had identified the data link, and agreed to cooperate with the NSA to use the link to access China's computer systems, said the report. \n\nDocuments appeared to show the plan was codenamed \"Frostbite\" by the GCSB and \"Basilhayden\" -- also identified as fictional spy James Bond's drink of choice -- by the NSA. \n\nThe paperwork revealed the GCSB worked with the NSA's elite hacker team -- the Tailored Access Operations division -- which specialized in cracking computer systems and planting spyware on computers, said the report. \n\nA 2013 NSA document showed China at the top of a list of targets it was having monitored by the GCSB, saying the New Zealand agency gave the NSA \"access to areas and countries that are difficult for the United States to access.\" \n\nBut it is unknown if the plan went ahead because, as sign-off was being sought, Snowden walked out of his job with a mass of top secret documents. \n\nThe Chinese Embassy in New Zealand issued a statement Sunday, saying that China was concerned about the report and attached great importance to the cyber security issue. \n\n\"We will firmly safeguard our security interests and continue to guarantee our cyber and information security with concrete measures,\" said the statement. \n\n\"At present, cyber space is riddled with chaos and uncertainty. China proposes to settle disputes through dialogue and formulate codes to regulate cyber space behaviors that are acceptable to all sides.\" \n\nXinhua was unable to contact anyone in New Zealand Prime Minister John Key's office for a response on Sunday, but the Herald on Sunday reported that a spokeswoman for Key said the government would not respond to claims made from documents \"stolen \" by Snowden. \n\nShe said the intelligence agencies contributed to \"our national security and the security of New Zealanders at home and abroad.\" \n\nThe opposition Green Party said Key and the government pointlessly endangered New Zealand's relationship with its largest trading partner. \n\n\"Breaking international agreements to spy on Chinese diplomatic communications in Auckland is reckless. It would bring very little, if any, benefit to New Zealand,\" Greens co-leader Russel Norman said in a statement. \n\n\"The test is, would we have spied on China on our own accord? It's very unlikely. So why is New Zealand spying on behalf of the Americans?\" \n\n\t\t\t\t \n\n\t\t\t\t", "source": "english.sina.com", "publishDate": "2015-04-19T15:52:35.506+02:00", "sourceType": "blog", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186587598, "url": "http:\/\/www.findata.co.nz\/News\/37450198\/Google_Inc39s_GOOG_New_Security_Chief_Views_Security_and_Privacy_As_.htm", "title": " \n \n \n \n \nGoogle Inc.\u2019s (NASDAQ:GOOG) recently appointed chief of security, Gerhard Eschelbeck weighed in on his role at the organization in an interview with AFP. Eschelbeck gave ", "content": " \n \n \n \n \nGoogle Inc.\u2019s (NASDAQ:GOOG) recently appointed chief of security, Gerhard Eschelbeck weighed in on his role at the organization in an interview with AFP. Eschelbeck gave his two cents on the issue of user privacy being compromised at times as a result of companies like Google ramping up their security. \nEschelbeck says otherwise, noting that \"security and privacy\" go hand in hand instead of in opposing streams. He describes privacy in the same light as security, deeming it as a user\u2019s right to protect his or her personal information from being displayed on the internet without consent. Eschelbeck adds that Google has been making increased efforts to \"double down\" on privacy. He aims to bring in increased security to the internet telling AFP, \"I hope for a time when all the traffic on the Internet is encrypted.\" Eschelbeck is certain that by 2018 users will be subject to a great number of checks aside from the typical password. \nLast year Google was scrutinized by for breaching people\u2019s privacy. The company was accused of wrongfully putting up certain bits of information that a user prefers to keep private. Accordingly a Spanish citizen filled a case against Google wherein he demanded that the company take down a photo of his repossessed home from its search results. EU\u2019s Court of Justice subsequently ordered Google to delist or take down links to old \u2018irrelevant \u2018information on special request. Google meanwhile expressed disappointment over this arguing that this act was sheer censorship. \nGerhard Eschelbeck joined Google as its security chief earlier this year. During his interview he expressed great excitement over the prospect of managing online security on such a large scale. Considering that the search engine giant has a plethora of products, it could face cyber attacks on several fronts. This however also means that Google\u2019s security experts use advanced technological equipment to tackle these attacks. \nEschelbeck has been involved with cyber security for almost 20 years, with the majority of that time being spent at computer security pioneer McAfee. He has also worked with a variety of tech companies as a consultant owns a lot of network security patents. During his longstanding career he has come across a diverse range of issues with regards to security. \nGoogle\u2019s new sheriff however believes that online security technology has to be constantly updated as new types of threats appear from time to time. Saying that as a \"security guy\" he is \"never comfortable\", Eschelbeck however assures that his team is highly capable of dealing with all sorts of attacks. Shares of Google closed down by 2% at $532.74 on Friday. \n \n \n \n \n \n\t\t\t \n\t\t\t\tApple Could Be World's First Trillion Dollar Company; Microsoft Teams Up With Cyanogen \n\t\t\t \n \n \n \n \n \n ", "source": "www.findata.co.nz", "publishDate": "2015-04-19T14:33:45+02:00", "sourceType": "blog", "language": "en", "googleRank": 5, "relatedDocs": [ ] }, { "id": 186644443, "url": "http:\/\/www.finanznachrichten.de\/nachrichten-2015-04\/33442669-secure-channels-inc-throws-down-the-gauntlet-with-their-hacker-humbling-technologies-offering-a-dollar-50k-prize-at-rsa-conference-2015-secure-channels-256.htm", "title": "IRVINE, CA -- (Marketwired) -- 04\/19\/15 -- Secure Channels Inc., the Technology Innovators\u2122, today announced a challenge to any hacker attending the RSA Conference 2015 offering to pay $50,000 to any", "content": "IRVINE, CA -- (Marketwired) -- 04\/19\/15 -- Secure Channels Inc., the Technology Innovators\u2122, today announced a challenge to any hacker attending the RSA Conference 2015 offering to pay $50,000 to anyone who can break their FIPS 142-20 encrypted file. Hacker Humbling technologies is a technological innovation created by Secure Channels to prevent hacker's use of private sensitive data that has been otherwise breached from the perimeter or from the inside the network perimeter. \nAt Black Hat 2014, 155 hackers entered a contest to beat Secure Channels and none were able to do so despite aggressive attempts to crack the super enciphered encrypted file. Hackers attending the RSA 2015 Conference wishing to participate in the contest must pick up the USB drive at the Secure Channels booth, the QR code on the drive will take them to a page to register and agree to the contest terms and conditions. Secure Channels' booth is in the OATH Pavilion - Booth #915. The first hacker to beat Secure Channels' encryption will receive a $50,000 payment. \n\"Of course we believe that any security technology is ultimately hackable with the right equipment and enough time,\" said Richard Blech, CEO, of Secure Channels. \"I cannot speak for others, but with Secure Channels we have done the math. It would take a super computer running 19 quadrillion calculations per second, at 30 times the age of the Universe to break the key set, using the Secure Channels patented encryption process using traditional methods.\" \nSecure Channels has received several industry awards in a short time including a 2015 Data Center Insights Summit top award, being named one of 10 Security Start-Ups to Watch in 2015 by Network World, a 2015 MVP Award from Computer Technology Review, and a 2015 Govies Award from Security Products and Security Today for best encryption. \n\"Our technology is developed to combat the onslaught and proliferation of breaches,\" added Blech. \"Hackers are engaging in massive offensive cyber warfare against our digital assets.\" \nAt RSA, Secure Channels will be demonstrating their Suite of Solutions, answering a market currently under attack by hackers. As the security companies struggle to keep up, Secure Channels deploys a paradigm shift in how sata security is defined; covering a wide array of systems with quality solutions for the mobile device, desktop, data center and the cloud. The award winning \"Unbreakable\" pedigree of PKMS2\u2122 and SPHERE\u2122 is joined by the WBFDE FPP\u2122 suite, covering data at capture (POS terminals, desktop applications, mobile devices), data at rest (file server, cloud storage - Box, OneDrive, GDrive), data in process (databases - SQL, Oracle, Mongo, Hadoop, and others), and authentication (SUBROSA\u2122 \"Humanized\" Multi-factor Authentication), all done while deploying a hardened FIPS-compliant key management\/lifecycle methodology as the core. \nSecure Channels enables wide-adoption and extensibility into private data centers, cloud infrastructure, cloud software and databases worldwide. With a goal of hardening and securing data and its interactions, Secure Channels deploys a holistic strategy to cover the enterprise. Enabling a full suite of on-premise data center (VMware, Hyper-V, Xen), off-premise infrastructure (Amazon, Azure, Rackspace), cloud SaaS providers (Gmail, Office365, Salesforce, Box, S3), and critical data systems (SQL, Oracle, MySQL, MongoDB, Cassandra, Hadoop), Secure Channels covers today's modern data center with a quality, efficient, and speedy suite of solutions. \nAbout Secure Channels, Inc.Secure Channels Inc. is a cyber-defense firm focused on Technology Innovation, creating patented encryption technologies, identity trueness and authentication solutions compatible with every type of data available today. Secure Channels offers its Suite of Solutions and innovative technologies with the ability to create the next level of cyber security to stay ahead of advanced threats. \nWith its Suite of Services and products founded on its core technologies, Secure Channels creates and leverages it to define, design, develop and deploy solutions for a market currently under siege from offensive cyber warfare. Fostering innovative disruptive technologies while remaining user-defined has become a cornerstone for Secure Channels. \nCompliant with government standards being data and platform agnostic, while developing patented processes to harden existing encryption systems and envelop resources in such a way as to render the data unbreakable and useless to the hacker. Secure Channels provides solutions for mobile, financial institutions, digital currency, healthcare, cloud storage, entertainment, retail, and gaming with products and services offered through our channel partners to the government and the enterprise IT marketplace. \nProximity Technologies, a division Secure Channels Inc., secures data for the Internet of Things (IoT). Secure Channels will be delivering real time analytics, payment processing, and data collection to any mobile platform or device protected with its encryption process. For more information, go to www.securechannels.com. \n \nContact: Dan ChmielewskiMadison Alexander PREmail Contact1-714-832-87161-949-231-2965 ", "source": "www.finanznachrichten.de", "publishDate": "2015-04-19T13:01:00+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186578161, "url": "http:\/\/www.military-technologies.net\/2015\/04\/19\/secure-channels-inc-throws-down-the-gauntlet-with-their-hacker-humbling-technologies-offering-a-50k-prize-at-rsa-conference-2015\/", "title": "\nIRVINE, CA--(Marketwired - Apr 19, 2015) - Secure Channels Inc., the Technology Innovators\u2122,\u00a0today announced a challenge to any hacker attending the RSA Conference 2015 offering\u00a0to pay $50,000 to any", "content": "\nIRVINE, CA--(Marketwired - Apr 19, 2015) - Secure Channels Inc., the Technology Innovators\u2122,\u00a0today announced a challenge to any hacker attending the RSA Conference 2015 offering\u00a0to pay $50,000 to anyone who can break their FIPS 142-20 encrypted file. Hacker Humbling technologies is a technological innovation created by Secure Channels to prevent hacker's use of private sensitive data that has been otherwise breached from the perimeter or from the inside the network perimeter.\nAt Black Hat 2014, 155 hackers entered a contest to beat Secure Channels and none were able to do so despite aggressive attempts to crack the super enciphered encrypted file. Hackers attending the RSA 2015 Conference wishing to participate in the contest must pick up the USB drive at the Secure Channels booth, the QR code on the drive will take them to a page to register and agree to the contest terms and conditions. Secure Channels' booth is in the OATH Pavilion - Booth #915. The first hacker to beat Secure Channels' encryption will receive a $50,000 payment.\n\"Of course we believe that any security technology is ultimately hackable with the right equipment and enough time,\" said Richard Blech, CEO, of Secure Channels.\u00a0\"I cannot speak for others, but with Secure Channels we have done the math.\u00a0It would take a super computer running 19 quadrillion calculations per second, at 30 times the age of the Universe to break the key set, using the Secure Channels patented encryption process using traditional methods.\"\nSecure Channels has received several industry awards in a short time including a 2015 Data Center Insights Summit top award, being named one of 10 Security Start-Ups to Watch in 2015 by Network World, a 2015 MVP Award from Computer Technology Review, and a 2015 Govies Award from Security Products and Security Today for best encryption.\n\"Our technology is developed to combat the onslaught and proliferation of breaches,\" added Blech. \"Hackers are engaging in massive offensive cyber warfare against our digital assets.\"\nAt RSA, Secure Channels will be demonstrating their Suite of Solutions, answering a market currently under attack by hackers.\u00a0As the security companies struggle to keep up, Secure Channels deploys a paradigm shift in how sata security is defined; covering a wide array of systems with quality solutions for the mobile device, desktop, data center and the cloud.\u00a0The award winning \"Unbreakable\" pedigree of PKMS2\u2122 and SPHERE\u2122 is joined by the WBFDE FPP\u2122 suite, covering data at capture (POS terminals, desktop applications, mobile devices), data at rest (file server, cloud storage - Box, OneDrive, GDrive), data in process (databases - SQL, Oracle, Mongo, Hadoop, and others), and authentication (SUBROSA\u2122 \"Humanized\" Multi-factor Authentication), all done while deploying a hardened FIPS-compliant key management\/lifecycle methodology as the core.\nSecure Channels enables wide-adoption and extensibility into private data centers, cloud infrastructure, cloud software and databases worldwide. With a goal of hardening and securing data and its interactions, Secure Channels deploys a holistic strategy to cover the enterprise.\u00a0Enabling a full suite of on-premise data center (VMware, Hyper-V, Xen), off-premise infrastructure (Amazon, Azure, Rackspace), cloud SaaS providers (Gmail, Office365, Salesforce, Box, S3), and critical data systems (SQL, Oracle, MySQL, MongoDB, Cassandra, Hadoop), Secure Channels covers today's modern data center with a quality, efficient, and speedy suite of solutions.\nAbout Secure Channels, Inc.\nSecure Channels Inc. is a cyber-defense firm focused on Technology Innovation, creating patented encryption technologies, identity trueness and authentication solutions compatible with every type of data available today. Secure Channels offers its Suite of Solutions and innovative technologies with the ability to create the next level of cyber security to stay ahead of advanced threats.\nWith its Suite of Services and products founded on its core technologies, Secure Channels creates and leverages it to define, design, develop and deploy solutions for a market currently under siege from offensive cyber warfare. Fostering innovative disruptive technologies while remaining user-defined has become a cornerstone for Secure Channels.\nCompliant with government standards being data and platform agnostic, while developing patented processes to harden existing encryption systems and envelop resources in such a way as to render the data unbreakable and useless to the hacker. Secure Channels provides solutions for mobile, financial institutions, digital currency, healthcare, cloud storage, entertainment, retail, and gaming with products and services offered through our channel partners to the government and the enterprise IT marketplace.\u00a0\nProximity Technologies, a division Secure Channels Inc., secures data for the Internet of Things (IoT). Secure Channels will be delivering real time analytics, payment processing, and data collection to any mobile platform or device protected with its encryption process.\u00a0For more information, go to www.securechannels.com.\n\n", "source": "www.military-technologies.net", "publishDate": "2015-04-19T13:00:00+02:00", "sourceType": "blog", "language": "en", "googleRank": 2, "relatedDocs": [ ] }, { "id": 186543939, "url": "http:\/\/www.china.org.cn\/world\/2015-04\/19\/content_35361012.htm", "title": " China on Sunday expressed concern about a report that New Zealand and United States spy agencies planned to hack into a data link between Chinese government buildings in Auckland.\nThe plan was reveal", "content": " China on Sunday expressed concern about a report that New Zealand and United States spy agencies planned to hack into a data link between Chinese government buildings in Auckland.\nThe plan was revealed in documents from US National Security Agency (NSA) whistleblower Edward Snowden, the Herald on Sunday newspaper reported.\nThe project run by New Zealand's Government Communications Security Bureau (GCSB) and the NSA appeared aimed at tapping data flowing between the Chinese Consulate and its visa office in Auckland.\nThe documents said the GCSB had identified the data link, and agreed to cooperate with the NSA to use the link to access China's computer systems, said the report.\nDocuments appeared to show the plan was codenamed \"Frostbite\" by the GCSB and \"Basilhayden\" -- also identified as fictional spy James Bond's drink of choice -- by the NSA.\nThe paperwork revealed the GCSB worked with the NSA's elite hacker team -- the Tailored Access Operations division -- which specialized in cracking computer systems and planting spyware on computers, said the report.\nA 2013 NSA document showed China at the top of a list of targets it was having monitored by the GCSB, saying the New Zealand agency gave the NSA \"access to areas and countries that are difficult for the United States to access.\"\nBut it is unknown if the plan went ahead because, as sign-off was being sought, Snowden walked out of his job with a mass of top secret documents.\nThe Chinese Embassy in New Zealand issued a statement Sunday, saying that China was concerned about the report and attached great importance to the cyber security issue.\n\"We will firmly safeguard our security interests and continue to guarantee our cyber and information security with concrete measures,\" said the statement.\n\"At present, cyber space is riddled with chaos and uncertainty. China proposes to settle disputes through dialogue and formulate codes to regulate cyber space behaviors that are acceptable to all sides.\"\nXinhua was unable to contact anyone in New Zealand Prime Minister John Key's office for a response on Sunday, but the Herald on Sunday reported that a spokeswoman for Key said the government would not respond to claims made from documents \"stolen \" by Snowden.\nShe said the intelligence agencies contributed to \"our national security and the security of New Zealanders at home and abroad.\"\nThe opposition Green Party said Key and the government pointlessly endangered New Zealand's relationship with its largest trading partner.\n\"Breaking international agreements to spy on Chinese diplomatic communications in Auckland is reckless. It would bring very little, if any, benefit to New Zealand,\" Greens co-leader Russel Norman said in a statement.\n\"The test is, would we have spied on China on our own accord? It's very unlikely. So why is New Zealand spying on behalf of the Americans?\"\n\n\n", "source": "www.china.org.cn", "publishDate": "2015-04-19T12:02:41.433+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186540985, "url": "http:\/\/www.chinadaily.com.cn\/world\/2015-04\/19\/content_20473281.htm", "title": "WELLINGTON - China on Sunday expressed concern about a report that New Zealand and United States spy agencies planned to hack into a data link between Chinese government buildings in Auckland. \nThe pl", "content": "WELLINGTON - China on Sunday expressed concern about a report that New Zealand and United States spy agencies planned to hack into a data link between Chinese government buildings in Auckland. \nThe plan was revealed in documents from US National Security Agency (NSA) whistleblower Edward Snowden, the Herald on Sunday newspaper reported. \nThe project run by New Zealand's Government Communications Security Bureau (GCSB) and the NSA appeared aimed at tapping data flowing between the Chinese Consulate and its visa office in Auckland. \n\n\n\n\n\nThe documents said the GCSB had identified the data link, and agreed to cooperate with the NSA to use the link to access China's computer systems, said the report. \nDocuments appeared to show the plan was codenamed \"Frostbite\" by the GCSB and \"Basilhayden\" -- also identified as fictional spy James Bond's drink of choice -- by the NSA. \nThe paperwork revealed the GCSB worked with the NSA's elite hacker team -- the Tailored Access Operations division -- which specialized in cracking computer systems and planting spyware on computers, said the report.\nA 2013 NSA document showed China at the top of a list of targets it was having monitored by the GCSB, saying the New Zealand agency gave the NSA \"access to areas and countries that are difficult for the United States to access.\" \nBut it is unknown if the plan went ahead because, as sign-off was being sought, Snowden walked out of his job with a mass of top secret documents. \nThe Chinese Embassy in New Zealand issued a statement Sunday, saying that China was concerned about the report and attached great importance to the cyber security issue. \n\"We will firmly safeguard our security interests and continue to guarantee our cyber and information security with concrete measures,\" said the statement. \n\"At present, cyber space is riddled with chaos and uncertainty. China proposes to settle disputes through dialogue and formulate codes to regulate cyber space behaviors that are acceptable to all sides.\" \nXinhua was unable to contact anyone in New Zealand Prime Minister John Key's office for a response on Sunday, but the Herald on Sunday reported that a spokeswoman for Key said the government would not respond to claims made from documents \"stolen \" by Snowden. \nShe said the intelligence agencies contributed to \"our national security and the security of New Zealanders at home and abroad.\" \nThe opposition Green Party said Key and the government pointlessly endangered New Zealand's relationship with its largest trading partner. \n\"Breaking international agreements to spy on Chinese diplomatic communications in Auckland is reckless. It would bring very little, if any, benefit to New Zealand,\" Greens co-leader Russel Norman said in a statement. \n\"The test is, would we have spied on China on our own accord? It's very unlikely. So why is New Zealand spying on behalf of the Americans?\" \n", "source": "www.chinadaily.com.cn", "publishDate": "2015-04-19T11:55:19.011+02:00", "sourceType": "web", "language": "en", "googleRank": 8, "relatedDocs": [ ] }, { "id": 186553769, "url": "https:\/\/fidest.wordpress.com\/2015\/04\/19\/exin-expands-security-framework-with-ethical-hacking-foundation-certification\/", "title": "\n\t\tEXIN Expands Security Framework with Ethical Hacking Foundation\u00a0Certification\n\n\t\tPosted by fidest on Sunday, 19 April 2015\n\n\t\t\n\t\t\t, the Netherlands, EXIN expands their Security Framework with a new", "content": "\n\t\tEXIN Expands Security Framework with Ethical Hacking Foundation\u00a0Certification\n\n\t\tPosted by fidest on Sunday, 19 April 2015\n\n\t\t\n\t\t\t, the Netherlands, EXIN expands their Security Framework with a new exam: Ethical Hacking Foundation. This exam, globally launched at the Cyber Security Week in The Hague in The Netherlands, builds on the recently launched EXIN Secure Programming certification.Estimates of current annual cost to the global economy from cybercrime range between $375 and $575 billion, according to a recent study published by McAfee.* The worldwide cyber security market on the other hand is an emerging market and expected to grow from $71 billion in 2014 to $155+ billion by 2019, according to the latest forecast from Gartner, Inc.\nAs worldwide cyber security threats and the global cyber security services market are on the rise, EXIN experiences a growing demand for certifications in the field of cyber security related subjects. Anticipating this trend EXIN recently launched its Security Framework \u2013 a certification cluster with an expanding portfolio of cyber security exams such as Ethical hacking.\nThe global availability of the EXIN Ethical Hacking Foundation certification means IT professionals are provided with a vendor-neutral Ethical Hacking competence confirmation, from an internationally acknowledged certification institute. The new exam tests IT professionals on basic knowledge and understanding of \u201cEthical Hacking\u201d \u2013 the ability to evaluate IT security systems by exploiting hardware and software vulnerabilities using hacking techniques. Ethical hacking is a well-known method of duplicating the intent and actions of malicious hackers, also known as black hats, used by security professionals, the white hats, to locate and evaluate infrastructural weaknesses.\nThe EXIN Ethical Hacking Foundation certification covers a variety of hacking related subjects and techniques, including network traffic analyzing, wireless network hacking, network scanning and the penetration of computer systems and websites.\nMore in detail, candidates are tested on their knowledge and understanding with regards to (but not limited to) the following topics:\n\u2022 Network sniffing (gathering information from network traffic)\n\u2022 Cracking a WPA(2) key from a wireless network\n\u2022 An introduction to worms and botnets\n\u2022 Network vulnerability scanning\n\u2022 Basic penetration of computer systems\n\u2022 Password cracking\n\u2022 Web-based hacking, containing SQL Injections (SQLi), Cross-Site Scripting (XSS), Remote File Inclusions (RFI)\n\u2022 Analyzing log files\n\u201cEthical Hacking Foundation is another proof of EXIN\u2019s ability to deliver the right IT certifications at the right time,\u201d said Bernd Taselaar, CEO of EXIN. \u201cCyber-Security will remain a hot topic in 2015 and beyond. We already had the management focused Information Security based on ISO\/IEC 27002 certification. Next to that, the expanding Security Framework now caters to the growing security certification needs of IT professionals like programmers and developers. EXIN sees a strong market demand for high-quality IT security certifications. The e-CF principles incorporated in EXIN\u2019s exams ensure that the certifications live up to market expectations.\u201d\nRecently launched within the Security Framework is EXIN Secure Programming Foundation, a certification for software developers and programmers who want to have their skills in Building Security In validated. EXIN Ethical Hacking Foundation builds on the Secure Programming certification, by adding risk assessment within application and web development to EXIN\u2019s certification portfolio.The new certification, based on the e-Competence Framework (e-CF)** will initially be made available in English, with language localizations in a variety of global markets following soon. The exam is available through EXIN\u2019s partner channel and EXIN Anywhere in more than 165 countries worldwide.\nThe EXIN Ethical Hacking Foundation and EXIN Secure Programming certifications are developed in joint cooperation with Security Academy, a European training institute with its focus on Information Security, Business Continuity Management (BCM) and Security Management. The partnership with Security Academy is meant to combine hands-on, practical and job-oriented ICT security experience with EXIN\u2019s vendor independent IT certification knowledge base, both at a high international level.\nLike this:Like Loading...\n\n\t\t\t\t\t\t\n\t\t\t\t \t\tThis entry was posted on Sunday, 19 April 2015 at 11:22\t\t\t\t\t\tand is filed under Economia, Estero, Recensioni.\n\t\t\t\t\t\tTagged: certification, exin, expands, security. \t\t\t\t\t\tYou can follow any responses to this entry through the RSS 2.0 feed.\n\n\t\t\t\t\t\t\t\t\t\t\t\t\tYou can leave a response, or trackback from your own site.\n\n\t\t\t\t\t\t\t\t\t\n\n\t\n\n\t\t\n\t\t\t\t\t\t\t", "source": "fidest.wordpress.com", "publishDate": "2015-04-19T11:22:29+02:00", "sourceType": "blog", "language": "en", "googleRank": 3, "relatedDocs": [ ] }, { "id": 186521698, "url": "http:\/\/www.gulf-times.com\/qatar\/178\/details\/435549\/%e2%80%98protecting-critical-infrastructure-key-to-qatar%e2%80%99s-cyber-security-approach%e2%80%99", "title": "Protecting critical infrastructure has always been a prime objective of Qatar\u2019s cyber security approach, HE the Minister of Information and Communications Technology Dr Hessa al-Jaber has said.\u201cWe sta", "content": "Protecting critical infrastructure has always been a prime objective of Qatar\u2019s cyber security approach, HE the Minister of Information and Communications Technology Dr Hessa al-Jaber has said.\u201cWe started early with the establishment of the region\u2019s first CERT in 2008. The 2014 Qatar National Cyber Security Strategy was drafted through a multi-stakeholder committee and focuses on five key objectives: safeguarding national critical infrastructure, responding adequately to cyber incidents, establishing cyber legal and regulatory frameworks, fostering a culture of cyber security and developing national capabilities,\u201d she said while participating in the fourth Global Conference on CyberSpace 2015 in The Hague, Netherlands, recently.HE Dr al-Jaber, who represented Qatar at the key event, said in a policy statement: \u201cQatar has taken steps for transitioning from a traditional hydrocarbon-based economy to a digital economy. We have grown extremely fast and are constantly developing with high adoption rates of ICT. However, digital inter-connectedness is only beneficial if we can ensure our citizens and businesses are safe in the digital world that we are transitioning to.\u201d\u201cIn data privacy,\u201d she said, \u201cQatar is an active player in promoting the right to privacy in the digital age. We support the United Nations\u2019 efforts in this regard.\u201dHE the Minister emphasised that privacy was not just a technological challenge, but also a people-centric issue.She said, \u201cWe must not forget the importance of education and awareness on its risks.\u201dGovernments need to strike a balance between the citizens\u2019 natural aspirations to protect their information while also enabling business to grow. Governments should reinforce the mechanisms that promote transparency and open data access.With regard to social and economic growth, she said Qatar had created an environment that fostered ICT innovation through the development of proper legal framework and skills.\u201cOur cyber safety and digital literacy programme is embedded in the early stages of our education system, while also providing Internet access and ICT training to minority groups and the labour workforce. We have also issued various policies and regulations in line with international treaties and practices such as the 2014 cybercrime law, policies to ensure open data and transparency, and a law on personal information privacy protection will be released soon,\u201d HE Dr al-Jaber noted.The Internet, she said, must become more resilient across nations.\u201cWe applaud the concerted efforts of the ITU and ICANN in this regard. International co-ordination should continue in helping bridging the digital divide between nations. Governments should harmonise their jurisdictions in cyberspace through UN initiatives,\u201d she added.HE the Minister also urged public authorities to work closely with private sectors and civil societies by engaging in open discussions, sharing information and developing public-private partnerships to enhance the protection of nations\u2019 critical assets.Governments, she said, should build a common understanding of threats through norms and standards. Establishing a common cyber risk information exchange framework between nations will help address the challenges of predictability of cyber threats.\u201cQatar is supporting the UN reports highlighted by the Seoul framework, which can serve as a basis to develop such an information-sharing model,\u201d she stressed. \n ", "source": "www.gulf-times.com", "publishDate": "2015-04-19T07:53:15.665+02:00", "sourceType": "web", "language": "en", "googleRank": 7, "relatedDocs": [ ] }, { "id": 186507302, "url": "http:\/\/www.moroccoworldnews.com\/2014\/04\/129412\/karima-rhanem-only-moroccan-to-take-part-in-model-united-nations-in-the-balkan\/", "title": " \n \t\t\t\t \t \n \n\t \n \t\t\t \n \nRabat \u2013 Moroccan young leader Karima Rhanem will take part in the largest Model United Nations in the Bal", "content": " \n \t\t\t\t \t \n \n\t \n \t\t\t \n \nRabat \u2013 Moroccan young leader Karima Rhanem will take part in the largest Model United Nations in the Balkan scheduled to take place in Albania on\u00a0May 2-5. \nMs. Rhanem will be the only\u00a0\u00a0guest speaker from Morocco for the opening of the conference and a chair of the simulation of the United Nations General Assembly Disarmament and International security committee (DISEC).\n\u201cI am very honored to have been selected by the Balkan Model United Nations Secretariat to open the conference among other national and international personalities. I am more thrilled for my selection to chair the DISEC committee to discuss important issues for the international community such as cyber crime and terrorism,\u201d Ms Rhanem told Morocco World News.\nShe added: \u201cbeing the only Moroccan to take part in the Balkan MUN is a great responsibility and I will do my best to better represent Morocco, hoping to see an increase in the number of Moroccan young leaders in such international gatherings.\u201d\nKlevis Rreshka, Secretary General of Balkan Model United Nations 2014 said: \u201cwe have chosen Karima Rhanem as a guest speaker in the Balkan MUN, because of her spirit to inspire young delegates. Young diplomats like Karima will be an added value to our conference and we are looking forward to learning from her wide experience in youth work and public diplomacy. Her background in cyber security and internet Governance will also help delegates from Balkan Countries to draft resolutions to fight cyber attacks.\u201d\nFor Karima, participating in conferences such as Model United Nations illustrates the important role these public diplomacy conferences play in preparing a new generation of young diplomats who could be their country\u2019s future decision makers.\n\n\n\u201cAmbassadorship of a given country is not solely the responsibility of official diplomats, but also of a young generation of today\u2019s leaders who could play a key role in advancing foreign policy goals and influencing international decision-making through non-governmental and people to people diplomacy,\u201d she stressed.\nKarima Rhanem has been involved in youth and NGO empowerment work for the past 15 years and in public diplomacy for the past 6 years. Thanks to her continuous involvement in several development and diplomacy programs worldwide, she has been nominated Morocco World News good will Ambassador for the year 2012.\u00a0 She was also appointed by the Moroccan Ministry in charge of Relations with the Parliament & Civil Society member of the national commission in charge of the Dialogue on Civil Society and Constitutional Prerogatives. Recently, she has been selected by UNDP Regional Bureau for Arab States member of the Arab Human Development Report (AHDR) 2015 Youth Consultative Group to promote genuine youth-led reflections on development choices in the Arab region, through meaningfully consulting young people to bring their voices to policy-makers.\nShe has also received several awards from international institutions for her creativity in communications, management of youth and civil society programs, and for her efforts in promoting good governance and peace in the MENA region. In 2012, she was nominated, among several young leaders from different parts of the world, Crans Montana Forum \u201cNew Leader of\u00a0Tomorrow.\u201d She was also awarded a certificate of appreciation from the Association for Public policy and the Administration for her professionalism and contribution to the causes of peace and sound governance in the Middle East.\nWith a rich international experience, she took part in world leading conferences and seminars such as the 2003 Young Ambassadors MENA Leaders Program at Dickinson College in Pennsylvania (USA), the Youth General Assembly at the United Nations in New York in 2011, the International Symposium on Cultural Diplomacy in Geneva in 2012, the world Forum of Young Diplomats in Turkey in 2013, Crans Montana Forum 15th\u00a0International Summit on Transnational Crime and Security in 2013. She has also participated as a guest speaker and workshop facilitator at several conferences \u2013 in Europe, USA and the MENA region \u2013 designed for youth inclusion and empowerment and for the use of media for sustainable and human development.\nThroughout her career, she founded several non-governmental organizations such as \u201cDialogue for Peace Association\u201d and \u201cThe Moroccan Association for Development and Public Diplomacy,\u201d and organized various youth forums at the national level. She currently serves as a MENA representative of the London based Non-profit Global Diplomatic Forum, and director of \u2018Dialogue for Peace\u201d cooperating circle of United Religions Initiative in Morocco.\n\u00a9 Morocco World News. All Rights Reserved. This material may not be published, rewritten or redistributed.\n\n \n \n \n Join the Conversation. What do you think?\t\t \n\t \n \n\t\t \n ", "source": "moroccoworldnews.com", "publishDate": "2015-04-19T03:52:15.120+02:00", "sourceType": "blog", "language": "en", "googleRank": 5, "relatedDocs": [ ] }, { "id": 186507005, "url": "http:\/\/www.moroccoworldnews.com\/2015\/04\/156351\/morocco-hails-dutch-initiative-launch-global-forum-cyber-expertise\/", "title": " \n \t\t\t\t \t \n \n\t \n \t\t\t \n \nThe Hague- Morocco hailed the initiative of the Dutch government to launch the Global Forum on Cyber Expe", "content": " \n \t\t\t\t \t \n \n\t \n \t\t\t \n \nThe Hague- Morocco hailed the initiative of the Dutch government to launch the Global Forum on Cyber Expertise, on the sidelines of the 4th Global Conference on Cyberspace (GCC), held in The Hague on April 16-17.\nThis forum, in which Morocco participates as a founding partner, seeks to be a global platform that contributes to cyber capacity building and stimulates new funding streams and the sharing of expertise and experiences in the field of cyber security, cybercrime, data regulation and e-development.\nMorocco\u2019s position was expressed by Morocco\u2019s Ambassador to the Netherlands, Abdelouahad Bellouki, who leads a high-level delegation to the 2015 GCC.\n\nThe Global Conference on Cyberspace was launched by the UK government back in 2011, bringing together stakeholders from various backgrounds to discuss the challenges facing online freedom and cyber stability.\n\n \n \n \n Join the Conversation. What do you think?\t\t \n\t \n \n\t\t \n ", "source": "moroccoworldnews.com", "publishDate": "2015-04-19T03:50:59.464+02:00", "sourceType": "blog", "language": "en", "googleRank": 5, "relatedDocs": [ ] }, { "id": 186507509, "url": "http:\/\/www.vanguardngr.com\/2015\/04\/buharis-government-ict-stakeholders-set-digital-agenda\/", "title": "\nBy Emeka Aginam\nAlthough technology was at the center of the\u00a0 just concluded 2015 elections, Nigerian IT practitioners have expressed fresh concern saying that Nigeria may not reap the benefits of di", "content": "\nBy Emeka Aginam\nAlthough technology was at the center of the\u00a0 just concluded 2015 elections, Nigerian IT practitioners have expressed fresh concern saying that Nigeria may not reap the benefits of digital economy of the 21st century unless the incoming government listens to the wake up call of making Information Technology the centerpiece of national development mission.\nThe Wired World: A graphic representation of the Internet\nFor the IT Professionals who believe that they have been totally eclipsed out of the process against the spirit of Nigeria Local Content ACT 2010 and\nthe Computer Professionals Registration Council of Nigeri\n(CPN)Act 49 of 1993,the gains of digital promise of the knowledge economy is at stake unless the new government makes IT a national priority.\nAccording to the concerned IT experts, Nigeria will continue to be digitally colonized if she fails to take advantage of the digital promise and opportunities of knowledge automation presented by the 21st century information society\n\u00a0\nPay attention to indigenous products -Uwaje\nFor transparent leadership and governance, the immediate President of Institute of Practitioners of Nigeria, ISPON, Chris Uwaje who has been preaching local content said that the incoming government must pay attention to locally developed solution to free the country from digital slavery by the western powers.\n\u201cI am concerned, just like other IT Professionals and Practitioners that while technology is at the center of the electoral processes, this is the time to pay attention to IT as the bedrock of national development.\n\u201cGeneral Muhammadu Buhari is elected to govern 180 million Nigerians, but he may not deliver the dividend of Democracy, unless Information Technology and IT Professionals are at the centre of his leadership program.\n\u201c It is practically impossible today to govern effectively and transparently without Information Technology.\n\u201cIT\u00a0\u00a0 has made the great difference in the 2015 Presidential election. It has relatively rescued transparency and restored truth as the ultimate currency for the prosperous future of Nigeria. Therefore, sustaining the critical path and role of information technology to deliver peoples-first, smart and innovative governance is a strategic imperative for our survivability and global competitiveness\u201d, the Oracle of the Nigerian IT industry who championed the IT policy blueprint in 2001 said.\nTo resolve the national IT challenge, Uwaje who many industry watchers see as the next President of the Nigerian Computer Society, (NCS)\u00a0\u00a0 said that the new government must do the following:\n*Mandatory automation of all Government processes, functions and operations (long overdue)\n*Create a consolidated and centralized National Database (overdue 40 years ago)\n*Establish Office of the Chief Information Technology General of the Federation\n*Approve the pending National Software Strategic Policy and Cyber Security Bill. (long Overdue)\n*Create ten IT or Knowledge Innovation Parks in the 1st 100 Days in Office\n*Establish two Software Engineering Institutes (SEI) within two years in Office \u2013 in fulfilment of the spirit of the Local Content Development ACT\n*Convert the NYSC to an IT Retooling Camp as IT capacity Disaster Recovery Strategy\n*Create a meaningful stimulus Package to empower the IT Industry.\n\u00a0\nRecognize importance of ICT in socio-economic dev\u2014ISPON\nIn the opinion of the President of ISPON, Pious Okigbo Junior, Nigeria may not attain digital economy unless the new government recognizes the importance of ICT in the socio-economi development.\n\u201cMy expectation is that the incoming administration will recognize the immense importance of ICT in development (social and economic) and set in play policies to drive economic development with ICT. There isn\u2019t much one can hope for until they layout what their vision for the nation is in the coming years. We can only hope that the gains made by GEJ in the sector will be built on\u201d, the ISPON President said.\n\u00a0\nCulture of process automation in governance\u2014AfICTA\nAlso speaking, former President of Information Technology Association of Nigeria, ITAN, Dr. Jimson Olufuye who is also the Chairman of the Africa Information & Communication Technologies Alliance, AFICTA, for a better governance, he expected Buhari\u2019s \u201cChange\u201d to affect government ICT culture.\n\u201cI expect a culture of process automation of all government service deliverables to citizens as minimum requirement to foster anti-corruption and transparency campaign.\nAlso, I expect ICT regulation and oversight role of government streamlined for better service delivery to industry actors (e.g. Telcos).\n\u201cIam particularly interested in strong government engagement with ICT stakeholders locally as it is done in Egypt where government is actively involved in developing the ICT industry and internationally at the UNCSTD, WSIS, ICANN, ITU and AU\u201d, he explained.\n\u00a0\nIT Professionals in government boards\u2014Awe\nIn building a digital society, the role of IT professionals, according to Jide Awe, Innovation and Development Advisor cannot be restricted to contract awards, supply, provision and support of IT solutions.\nIT professionals, he noted should\u00a0\u00a0 to be represented at the highest levels in the policy and decision making process.\n\u00a0\nGaps In cyber security\nFor Awe, gaps in cyber Security and IT legislation portend grave implications for IT development and national security.\n\u201cThe enactment of relevant laws has been slow. The call for strategic intervention to fast track the enactment of appropriate legislation is long overdue\u201dhe said.\n\u00a0\n\u00a0\n\u00a0\n\u00a0\n\u00a0\n\u00a0\n\u00a0\n\u00a0\n\n\n\n", "source": "www.vanguardngr.com", "publishDate": "2015-04-19T01:50:25+02:00", "sourceType": "web", "language": "en", "googleRank": 6, "relatedDocs": [ ] }, { "id": 186511468, "url": "http:\/\/robinwestenra.blogspot.com\/2015\/04\/spying-on-ourselves-spying-and.html", "title": "\n\nThere have been more revelations today about New Zealand's GCSB assisting the NSA with spying - this time with China.\n\n\n\nNEW\nZEALAND PLOTTED HACK ON CHINA WITH NSA\n\nRyan\nGallagher and Nicky Hager\n\n\n", "content": "\n\nThere have been more revelations today about New Zealand's GCSB assisting the NSA with spying - this time with China.\n\n\n\nNEW\nZEALAND PLOTTED HACK ON CHINA WITH NSA\n\nRyan\nGallagher and Nicky Hager\n\n\n\n\n\n\n\n\n18 April, 2015\n\n\n\nNew\nZealand spies teamed with National Security Agency hackers to break\ninto a data link in the country\u2019s largest city, Auckland, as part\nof a secret plan to eavesdrop on Chinese diplomats, documents reveal.\n\n\n\nThe\ncovert operation,\u00a0reported\nSaturday by New Zealand\u2019s\u00a0Herald\non Sundayin\ncollaboration with\u00a0The\nIntercept,\nhighlights the contrast between New Zealand\u2019s public and secret\napproaches to its relationship with China, its largest and most\nimportant trading partner.\n\n\nThe\nhacking project suggests that New Zealand\u2019s electronic surveillance\nagency, Government Communications Security Bureau, or GCSB, may have\nviolated international treaties that prohibit the interception of\ndiplomatic communications.\n\nNew\nZealand has signed both the 1961 Vienna Convention on Diplomatic\nRelations and the 1963 Vienna Convention on Consular Relations,\ninternational treaties that protect the \u201cinviolability\u201d of\ndiplomatic correspondance. The country\u2019s prime minister, John Key,\nsaid in a\u00a0recent\nspeech\u00a0on\nsecurity that New Zealand had an obligation to support the rule of\nlaw internationally, and was \u201cknown for its integrity, reliability\nand independence.\u201d\n\n\nLast\nyear, Key\u00a0said\u00a0that\nNew Zealand\u2019s relationship with China, worth an estimated $15\nbillion in annual two-way trade, had \u201cnever been stronger.\u201d The\nrelationship was not just about \u201cpurely trading,\u201d he\u00a0said,\n\u201cit is so much broader and much deeper than that.\u201d\n\n\n\nIn\n2013, Key\u00a0described\u00a0a\nmeeting with top Chinese officials in Beijing as \u201cextremely warm\u201d\nand told of how he was viewed as a \u201creal friend\u201d by the country\u2019s\npremier, Li Keqiang.\n\n\n\nAt\nthe same time, as minister in charge of the GCSB, Key was overseeing\nspying against China \u2013 which included the top-secret planned\noperation in Auckland, aimed at the Chinese consulate.\n\n\n\nThe\nhacking project is outlined in documents obtained by\u00a0The\nInterceptfrom NSA whistleblower Edward Snowden.\n\n\n\nA\nsecret report called \u201cNSA activities in progress 2013,\u201d\nincludes\u00a0an\nitem\u00a0titled\n\u201cNew Zealand: Joint effort to exploit Chinese MFA [Ministry of\nForeign Affairs] link.\u201d The operation, according to\u00a0another\nNSA document,\nhad \u201cidentified an MFA data link between the Chinese consulate and\nChinese Visa Office in Auckland,\u201d two buildings about a five-minute\nwalk apart on the city\u2019s busy Great South Road.\n\n\nThe\ndocument added that the New Zealand agency was \u201cproviding\nadditional technical data\u201d on the data link to the NSA\u2019s\u00a0Tailored\nAccess Operations,\na powerful unit that hacks into computer systems and networks to\nintercept communications. The agencies had \u201cverbally agreed to move\nforward with a cooperative passive and active effort against this\nlink,\u201d it said.\n\n\nPassive\nsurveillance refers to a method of eavesdropping on communications\nthat intercepts them as they are flowing over Internet cables,\nbetween satellites, or across phone networks. Active surveillance is\na more aggressive tactic that involves hacking into computers; in the\ncase of the Auckland operation, active surveillance could have\ninvolved planting spyware in the Chinese government computers or\nrouters connected via the consulate data link.\n\n\nThe\ndocuments do not reveal whether the operation was successfully\ncompleted, due to the timeframe that the records cover. In May 2013,\nSnowden left his Hawaii-based intelligence job and flew to Hong Kong\ncarrying the cache of secret files. In April 2013, shortly before\nSnowden\u2019s departure, \u201cformal\ncoordination\u201d\non the hacking plan had begun between the NSA and its New Zealand\ncounterpart, according to the documents.\n\n\nMore\nNew Zealand operations targeting China appear to have been ongoing at\nthat time. In\u00a0another\nApril 2013 NSA document\u00a0describing\nthe agency\u2019s relationship with New Zealand spies, under the heading\n\u201cWhat partner provides to NSA,\u201d the first item on the list is\n\u201ccollection on China.\u201d New Zealand\u2019s GCSB surveillance agency\n\u201ccontinues to be especially helpful in its ability to provide NSA\nready access to areas and countries that are difficult for the United\nStates to access,\u201d the report said.\n\n\nChina\nintelligence is handled inside the New Zealand agency by a special\nsection that focuses on economic analysis. According to sources with\nknowledge of the agency\u2019s operations, its economic section, known\nas the \u201cIBE,\u201d specialised in Japanese diplomatic communications\nfrom 1981 until the late 2000s. In recent years its focus has shifted\nto intercepted Chinese communications, the sources say.\n\n\n\nIn\nresponse to the revelations, a spokesman for the Chinese Embassy in\nNew Zealand told the\u00a0Herald\non Sunday\u00a0that\nthe country was \u201cconcerned\u201d about the spying. \u201cWe attach great\nimportance to the cyber security issue,\u201d the spokesman said, adding\nthat \u201cChina proposes to settle disputes through dialogue and\nformulate codes to regulate cyber space behaviors that are acceptable\nto all sides.\u201d\n\n\n\nChina\nitself is known to be a major perpetrator of espionage on the global\nstage, and it has been\u00a0repeatedly\u00a0accused\u00a0by\nthe U.S. government of hacking into American computer networks. Last\nyear, China was\u00a0linked\u00a0to\nan apparent intelligence-gathering hack on a powerful New Zealand\nsupercomputer used to conduct weather and climate research.\n\n\nBut\nthe Snowden documents have shown that countries in the so-called\n\u201cFive Eyes\u201d surveillance alliance \u2013 which includes New Zealand,\nthe United States, the United Kingdom, Canada, and Australia \u2013 are\nalso heavily involved in conducting aggressive spying and hacking\noperations across the world.\n\n\nPrevious\nrevelations have detailed how agencies in the alliance have\nhacked\u00a0law-abiding\u00a0companies,\u00a0foreign\ngovernment computers,\u00a0and\ndesigned technology to\u00a0attack\u00a0and\u00a0destroy\u00a0infrastructure\nusing cyberwar techniques. Last year,\u00a0The\nIntercept\u00a0revealed\u00a0how\nthe NSA had developed the capability to deploy millions of malware\n\u201cimplants\u201d to infect computers and steal data on a large scale.\n\nThe\nNSA, the GCSB and the New Zealand prime minister\u2019s office each\ndeclined to answer questions about this story.\n\n\nGCSB\u2019s\nacting director, Una Jagose, said in an emailed statement that the\nagency \u201cexists to protect New Zealand and New Zealanders.\u201d She\nadded: \u201cWe have a foreign intelligence mandate. We don\u2019t comment\non speculation about matters that may or may not be operational.\nEverything we do is explicitly authorised and subject to independent\noversight.\u201d\n\n\nHere\nis the parallel article from the NZ Herald\n\n\n\n\n\n\nThe government is using ISIS to up the terrorist alert in\u00a0the\u00a0country (while 'not exaggerating\u00a0the\u00a0threat). \u00a0This Radio New Zealand report discusses the likelihood of an attack in New Zealand but skirts round the issue of using the situation to counter internal dissent\n\n\n\nHow\nreal is the terrorist threat to NZ?\n\n\n\n\n\n\n19 April, 2015\n\n\n\n\n\n\n\n\n\nRebecca\nKitteridge is a worried woman.\n\n\n\nSince\nMs Kitteridge took on the job as director of the Security\nIntelligence Service 11 months ago, she tells\u00a0Insight,\nthe threat of a terrorist attack in New Zealand has risen.\n\n\n\nLast\nyear she reported the SIS had a watch-list of 30 to 40 people it was\nmonitoring closely.\n\n\n\nIn\ntypical spy speak she now says the people under watch has increased\nto the high end of that range, not the low end. Some are considering\nterrorist action in this country.\n\n\n\nBut\nRebecca Kitteridge does not want to exaggerate the threat.\n\n\n\n\n\n\nShe\nsays people can still go to the supermarket without worrying about\nthe prospect of being caught up in a terrorist attack.\n\n\n\nMs\nKitteridge says it is her job to worry so the public do not have to.\n\n\n\nWhat\nmainly worries her is the influence of Islamic State, as it uses\nsocial media to reach out to disaffected people in the West to not\njust travel to Syria and Iraq to fight, but to also carry out attacks\nin their own countries.\n\n\n\n\"I\nthink it's the first time that we've seen a terrorist organisation\nactively trying to recruit people to commit attacks internationally\nand that is the difference from what we see now to what we have seen\nbefore.\n\n\n\n\"So\nthere is an active effort to recruit anybody who might be susceptible\nto this kind of propaganda to and to give them information on how to\ncommit attacks too.\"\n\n\n\nIslamic\nState uses a professionally designed and produced magazine Dabiq to\nget its message across.\n\n\n\n\n\n\n\nBut\nhow serious is the threat and is anyone in the Muslim community\ntaking note of the propaganda?\n\n\n\nYoung\nMuslims say they are not aware of Islamic State's social media\ncampaign getting any traction in New Zealand.\n\n\n\nTayyaba\nKhan is the chief executive of the Change Makers Refugees Forum in\nWellington.\n\n\n\n\"I\nknow for a fact that through my work and through the work that I do\nwith different organisations within the Muslim community, we are not\naware of any such social media interaction that can be seen as\nthreatening or concerning,\" Ms Khan says.\n\n\n\nAuckland\nblogger Latifa Daud agrees.\n\n\n\n\"No,\nactually, I haven't seen anything.\"\n\n\n\nMs\nDaud says she has not heard anyone talking about Dabiq.\n\n\n\nBoth\nshe and Ms Khan worry that the focus on Islamic State has made the\nMuslim community in New Zealand a target.\n\n\n\nMs\nKetteridge says she has been very careful to avoid that.\n\n\n\n\"The\nfact that there is a very tiny group who might be categorised as\nMuslim... I think the most important thing to think about with these\npeople is not what is their religion but what are they doing.\n\n\n\n\"What\nbehaviours are they exhibiting that means that they may be a\nterrorist risk to this country?\" she says.\n\n\n\nMs\nKhan says while the Muslim communities themselves are peaceful, there\nmight be one or two individuals attracted by Islamic State's\npropaganda.\n\n\n\n\"We\nare extremely concerned about those who might be likely to be\naffected by this recruitment process and like I said I think we want\nto get involved because who better to get involved in changing things\nthan the Muslim community themselves.\"\n\n\n\n\nThe\nSIS has been given greater powers to monitor people, particularly by\nbeing able to conduct urgent video surveillance before a warrant is\nissued.\n\n\n\nThose\nchanges were rushed through Parliament late last year, prompting\nwidespread concern from Muslims who felt they were not consulted over\npowers they believe are directly aimed at them.\n\n\n\nMs\nKitteridge says the new powers, plus extra money for the SIS to\nexpand its activities, have helped.\n\n\n\nBut\nwill those new powers and sending troops to Iraq make New Zealanders\nsafer as they go about their daily business?\n\n\n\nOne\nsecurity contractor, who wishes to remain anonymous, believes it is\nonly a matter of time before there is a terrorist incident in this\ncountry.\n\n\n\nHe\nis appalled by security at public venues, particularly airports.\n\n\n\nHe\nsays the main threat will come from a so-called lone wolf attack, not\nfrom some planned and coordinated terrorist plot.\n\n\n\nNo\none can discount an incident of that nature, including Otago\nUniversity lecturer Najibullah Lafraie, a former foreign minister for\nAfghanistan.\n\n\n\n\"That\nkind of incident, isolated but nonetheless affecting someone and then\nISIS trying to find it and influence so\u00a0that's possible. Hopefully\nthat's not there but, as I said, we cannot rule it out.\"\n\n\n\nBut\nProfessor Ramesh Thakur from the Australian National University says\npeople have to keep the threat in perspective, and made reference to\nthe 2008 terrorist attacks in India when 10 gunmen belonging to the\nIslamist\u00a0 terror group, Lashker-e-Taiba, carried out a three-day\nrampage in Mumbai\u2019s main railway station, five-star hotels and a\ncafe killing more than 160 people.\n\n\n\n\"Think\nof the attention that was given to the terrorist attack on Mumbai. Of\ncourse it was a serious incident. But, as I said, in terms of people\nwho are killed on the roads in India and in India it is pedestrians\nand cyclists who are killed much more than people in the cars, or any\nother way you look at it, in terms of the real threats to people's\nsafety and security terrorism should rank way down in the\u00a0sale.\"\n\n\n\n\n\nA\nfire blazes at the Taj Mahal Hotel on 29 November 2008 - one of\nseveral sites attacked that month in Mumbai. - Photo:\u00a0AFP\n\n\n\nHe\nsays Western governments have exaggerated the threat of terrorism to\njustify giving their spy agencies stronger powers and to win public\nsupport for military intervention in the Middle East.\n\n\n\nMs\nKetteridge says she has no interest in exaggerating the threat.\n\nShe\nsays her job is to worry about the unthinkable so ordinary New\nZealanders do not have to worry when they visit the shopping mall.\n\n\n\nThis program was aired a week ago , featuring Keith Locke of the Green Party who was spied on from the age of 11( for most of his adult life), \u00a0and a former SIS spy.\n\n\nSpying\non ourselves - A panel discussion\n\n\n\n\n\n\n\nA\ncouple of weeks back we took a look at the ethics of spying on your\nfriends and neighbours, today we're exploring the ethics of spying on\nourselves. Keith Locke is a former Green MP whose SIS file revealed\nthat he had been under surveillance since he was 11 years old and\nattended a William Morris social evening; Rhys Ball is a former SIS\nintelligence officer turned Massey University academic; and Kathleen\nKuehn is a Victoria University media studies lecturer and author of a\nforthcoming BWB text on surveillance in New Zealand.\n\n\n\n\n\n\n\n\nAnd\nhere is a story about the outing of a police spy\n\n\n\n", "source": "robinwestenra.blogspot.com", "publishDate": "2015-04-19T01:49:00+02:00", "sourceType": "blog", "language": "en", "googleRank": 2, "relatedDocs": [ ] }, { "id": 186459171, "url": "http:\/\/www.theborneopost.com\/2015\/04\/19\/kiwi-culture-shock-but-its-all-good\/", "title": "A kiwi is treated at Massey University\u2019s veterinary teaching hospital.BEFORE any international students can settle in after moving to New Zealand (NZ) for higher education, there is likely to be cultu", "content": "A kiwi is treated at Massey University\u2019s veterinary teaching hospital.BEFORE any international students can settle in after moving to New Zealand (NZ) for higher education, there is likely to be culture shock.For 21-year-old Tun Muhammad Amar Tun Rafaee, now doing a bachelor\u2019s degree in mechanical engineering at the University of Waikato, his lecturers\u2019 accents were something he found really hard to handle.\u201cThe Kiwi accent is difficult enough \u2014 then I found myself facing lecturers from many other countries. It was really hard for me in the beginning. However, once past that stage, things got so much better and I now thoroughly enjoy myself here,\u201d he said.Tun Muhammad said not all culture shocks were negative, adding that some were actually pleasant discoveries.\u201cThe people I met here \u2014 local or foreigners \u2014 are very friendly and helpful. They are not shy to greet you with a smile. I was \u2018shocked\u2019 by their friendliness and eagerness to help. After a while, their friendliness made me feel I am not a stranger here. And I also started greeting everyone with a smile. Their friendliness is contagious,\u201d he said enthusiastically.He also noted that most Kiwi drivers are very polite.\u201cThey give way to pedestrians instead of the other way round. The police are strict but very helpful and efficient. What has impressed me most is the cleanliness here. Most places are so clean that people can go barefoot everywhere \u2013 something they do a lot of during summer on campus and other recreational places such as the beach.\u201dA Mara-sponsored student, Tun Muhammad has been allocated NZ$1,100 per week for living expenses. However, as the cost of living in Waikato is one of the cheapest in NZ, he only has to pay NZ$70 for rental.He has been saving his weekly allowance for a flight ticket back to Malaysia every long holiday. During the university term, he goes shopping for groceries, among other necessities, and visiting friends on weekends.Since coming to NZ, this outdoors-loving Malaysian student has taken up hiking and fishing, going to the beach and skiing. Life has been good with the pristine mountains being only three hours away and the beach, even nearer.It is, thus, quite understandable that he now plans to stay on to do his Master\u2019s at the same university.Malaysian students\u2019 associations in NZFor fellowship and help, Malaysian students such as Tun Muhammad can always turn to the Malaysian students\u2019 associations across New Zealand \u2013 apart from university staff.When the Education New Zealand (ENZ) media team was invited to attend Orientation Day organised by the Otago Malaysian Students\u2019 Association (Omsa), on March 7, it was quite a surprise to see the big hall packed with hundreds of Malaysians.It was even more impressive that Omsa was able to prepare some authentic Malaysian dishes and drinks \u2014 Sarawak laksa and roti canai to go with either teh tarik or yam jelly.Omsa president Cheah Seng Wei, 24, a fourth-year Pharmacy student, said the association was set up in 1963.The purpose was to bring Malaysian students together, help new Malaysian students adapt and organise activities not only to make student-life in NZ more interesting but also to introduce Malaysian culture to non-Malaysians.Activities for the rest of the year include Malam Malaysia showcasing the diverse cultures of Malaysia, Malaysian Carnival and a trip to Quarantine Island.\u201cWe\u2019re doing all this for one main purpose \u2014 to bring home closer to Malaysians studying in NZ,\u201d Cheah said.Khor Sze Yuin, a third-year marketing student at the University of Canterbury, shared that when she first landed in Christchurch at 5am, it was members of the Christchurch Malaysian Students\u2019 Association who came to meet her and help her settle in.Auckland University of Technology (AUT) student Samantha Hiew, who is cultural officer of the Auckland Malaysian Students\u2019 Association, said there are seven such associations in the eight NZ universities.Meetings have been held for the biggest Malaysian event in NZ \u2014 the Bersatu Games, an annual sports event where various competitions such as rugby, badminton, tennis, table tennis, football and futsal are held. For this year, there will also be a debating contest.Hiew, a third year law student, said through these games, Malaysians in NZ could come together to have a good time, and many Malaysian students actually flew to the game\u2019s venue to participate.With a strong theme statement \u2014 \u2018Sail to Glory\u2019 \u2014 it is not surprising the Bersatu Games sees tough competition and a strong spirit among the participants.As a green country, NZ\u2019s bins separate recyclables and organic waste.University of WaikatoLocated in the river city of Hamilton, the university is known for its beautiful 65ha campus with three ornamental lakes.Established in 1964, it is well-known as a modern and innovative university. Its academic success has placed it among the top 2 per cent of the 17,000 universities in the world, according to the European Universities\u2019 Association \u2014 with more than 90 per cent of its academic staff being research-active.In terms of subjects, it now has five ranked in the top 150 in the world. Its education programme has been ranked 46th in the world by the QS Subject Rankings last year while its modern languages, economics and econometrics, law and computer science and info systems were all ranked between 101 and 150.In view of growing global demand for skilled cyber security professionals at 3.5 times the pace of the overall job market, the university is the first in New Zealand to offer a Master\u2019s degree in cyber security that trains new security professionals as well as retrains existing computer science and IT professionals to be cyber security specialists.The Master of Cyber Security course covers the technical, legal and management aspects of cyber security and addresses new topics as they emerge in cyberspace.Cyber Security Lab senior lecturer and head Dr Ryan Ko explained that the Computing and Mathematical Sciences Faculty and US\u2019 National Aeronautics and Space Administration (Nasa) started Internet connection in New Zealand on the campus in 1989.\u201cOur Machine Learning-Data Mining groups are world-renowned. A prominent tool used worldwide is Weka with more than three million downloads. Then, there\u2019s the world-renowned Digital Library research group whose Greenstone Digital Library software is used in more than 60 countries,\u201d said Ko of several of the faculty\u2019s achievements.With alumni including big names such as Google engineering director Dr Graig Nevill-Manning and Academy Award winner John Allitt (special effects for \u2018The Lord of The Rings\u2019, \u2018The Hobbit\u2019 and \u2018Avatar\u2019) and a long history of winning student competitions, the faculty which has a strong applied research culture and entrepreneurial mindset is the platform for students serious about exploring cyber space.As a cyber security expert with full awareness that the skills learnt may be abused, Ko has a clear idea of where to start the cyber programmes.\u201cWe start our courses with the teaching of ethics to lay a good foundation for our students.\u201dBelieving strongly the world needs a software that returns control of data back to the users in view of easy data excess to hackers, apart from adopting \u2018Return Control\u2019 as the lab\u2019s motto, Ko is also in the midst of developing software to allow individuals to tighten their own cyber security.Victoria UniversityKnown for its scenic hills, deep blue sea and safety, the city of Wellington is compact with every part of the city centre reachable on foot. It is a city free of traffic jams, pollution and population pressures. Though the capital city of NZ, Wellington comes across as affordable and convenient.Victoria University was chosen by the NZ government as the top university for research in 2013.Its law faculty has been named the leading law school in the country. Other specialities include foreign languages and linguistics, human geography, pure and applied mathematics, Maori knowledge and development, molecular, cellular and whole organism biology, philosophy and statistics.Globally, Victoria has been ranked among the world\u2019s top 150 universities by the QS Subject Rankings last year in 11 subjects, including law, arts and social sciences, psychology, earth sciences and information technology. Its Business School is among the global elite group of 60 given the triple crown of international commerce accreditations.Of its total 22,000 students, 14 per cent are international students, and Victoria Business School (VBS), situated close to crucial government buildings, including the Beehive, the executive arm of NZ\u2019s parliament, is one of the most popular in attracting foreign students.Prof John Davies said VBS\u2019 location is self-explanatory in terms of relevance as close proximity to decision-making government departments means the school\u2019s strength lies in the fact that it is recognised and accredited by international academic bodies or business professional associations.One-sixth of VBS students are international students with Malaysians being the third largest group after Chinese nationals and Vietnamese.Next year VBS will welcome another batch of 150 Malaysian students mainly from Kolej Yayasan Saad. The young Malaysians have just finished their foundation year at the University of Auckland and the University of Canterbury.\u201cVBS\u2019 partnership with overseas counterparts has not only helped enrich the cultures of NZ students but at the same time, the school is able to help produce significant numbers of qualified accountants for overseas countries such as Malaysia,\u201d Davies said.Ko (centre) is seen at the Cyber Security Lab.Massey UniversityMassey University started off as Massey Agriculture College in 1927, and was upgraded to university status in 1964. With its roots in agriculture and food, the university has over the years earned its place as an authority in this field.In terms of agriculture, it is ranked the top in the country and 19th in the world.This state-funded university with its 80 years of tradition has also proven itself through academic excellence and outstanding performance.Housing 32,449 students, of whom some 15,000 are long distance learners and about 4,000 international students, the university has consistently been placed by QS World University Ranking in the top 3 per cent of universities in the world.Apart from agriculture, it leads the world in courses such as food technology, veterinary medicine, aviation, biotechnology, volcanology, communication and media studies, defence, accounting and finance.It is the only NZ university with a veterinary teaching hospital and the only university offering a degree in aviation.Renowned for its world-class research and achievements as the world leader in distance education, the university has international collaboration with tertiary institutions globally with 218 active international partnership agreements.Vice-chancellor Steve Maharey said the university has embraced change both from within and in the wider world to meet new needs.While continuing to build up its traditional strengths, the university also initiates new and diverse efforts to address upcoming issues such as food security.\u201cLast century, the world faced the issue of producing more food. This has become more pressing now as food security is at the top on the agenda for most governments worldwide.\u201cOn top of that, there is the issue of food safety, which was not so much of an issue in the last century. Sustainability of production and environmental issues have become extremely important. There are now issues of traceability and use of IT to support the food industry,\u201d said Maharey, who is a former education minister.With agriculture and food being the university\u2019s forte, Maharey said Massey University has much to contribute to the world in these areas as any research outcomes or new findings would not only benefit NZ but also other countries.He also highlighted the university\u2019s efforts to find new business and economic approaches, given that the present economic model, built by the west, has been suffering from economic crises every 10 years.The university is also pushing the boundary in scientific research, and endeavouring to maintain its leading position in areas such as communications, engineering and advanced technology.To cater for the needs of Muslim students across the world, Massey University has set up an Islamic Centre by the lakeside on its main campus at Palmerston North.The project built with the grants sponsored by the Sabahan government, was initiated by a Malaysian \u2014 Associate Prof Alex Chu \u2014 who was also a former Massey lecturer.ConclusionElijah Wood, the lead actor of \u2018The Lord of the Rings\u2019 trilogy once said: \u201cThere\u2019s a real purity in New Zealand that does not exist in the US. It is actually not an easy thing to find in our world any more. It\u2019s a unique place because it is so far away from the rest of the world. There is a sense of isolation and also being protected.\u201dWood was quite right.Situated in the far south, away from the rest of the world, NZ has been well protected by the Pacific Ocean and has grown into a mature country with style, personality and its own way of doing things.The country can be strange in the eyes of those familiar with other parts of the world but to those preferring natural beauty, simplicity and traditional values, it is a paradise. NZ may be isolated physically but it\u2019s not alone academically with all its universities establishing partnerships with different educational institutions across the globe.Powered by traditional values of upholding truth, kindness and beauty, there is a general spirit of seeking excellence, which has put all its universities on the list of world-renowned tertiary institutions.For students seeking a unique experience as residents and a world-class qualification, NZ is a country that can offer both.International students will enjoy NZ\u2019s many scenic gems.", "source": "www.theborneopost.com", "publishDate": "2015-04-18T19:52:35.438+02:00", "sourceType": "blog", "language": "en", "googleRank": 6, "relatedDocs": [ ] }, { "id": 186464684, "url": "http:\/\/news.windowstorussia.com\/the-usa-and-china-contradiction-growth-in-security-sphere-in-the-apr.html", "title": " \n \nWith Chinese building up comprehensive national power, a variety of contradictions between Beijing and Washington are continuously expanding. Over the period of more than twenty years of \u2018", "content": " \n \nWith Chinese building up comprehensive national power, a variety of contradictions between Beijing and Washington are continuously expanding. Over the period of more than twenty years of \u2018unipolar moment\u2019 existence, the United States of America, having accustomed to their unchallenged dominance in global and regional matters, are not ready to accept the right of another state to \u2018shape the future of the world\u2019 on an equal basis with Washington. Washington evermore intends to continue setting the tone of global development, to prescribe remedies for economic prosperity and to dictate rules of \u2018appropriate\u2019 behavior to other states both in international and internal domestic affairs, which can\u2019t but trigger quite understandable irritation and resistance on the part of the strengthening Beijing.\nContrary to official eloquence of the US and China senior officials, and their public claptrap on strengthening of bilateral cooperation and possible development of \u2018relations of a new type between the Great Powers\u2019, in reality there is an increase of rivalry and contradictions in the American-Chinese relations. If at the beginning of XXI century the \u2018negative\u2019 agenda included the Taiwan issue, human rights discourse (Tibetan and Uighur issues, the problem of Chinese dissidents, freedom of speech, etc.) and a range of economic problems, then in the last few years in record-breaking time this list of contradictions was supplemented by a range of problems related to the South China and the East China Seas, cyber security issues, freedom of Internet in China, the situation in Hong Kong, and also intensifying rivalry between the two countries in the APR, as well as at other regional venues (the Middle East, Africa, Latin America, etc.).\nWidening of the spheres of contradictions between the USA and China lends evidence for the thesis on the inevitability of rivalry between a firmly established state \u2013 global leader and a potential super-power rapidly expanding its might, both of which drastically differ in ideology, value system, political and economic model.\nIn this relation the augmentation of the American-Chinese contradictions in security sphere in the APR is extremely indicative. The both states which since the beginning of XXI century have boosted their involvement in this region\u2019s affairs give each other a handle for grounded concern and building up of distrust.\nBeijing\u2019s growing discontent and deep concern is related to the US intervention since summer 2010 into territorial disputes in the South China and the East China Seas, to strengthening by Washington of the military alliances and formation of new partner relations in the APR (in particular, Washington\u2019s \u2018drawing over to its side\u2019 of such key Asian countries as Vietnam and Myanmar), to the American policy for China demonization, to the intensification of the US joint exercises in this region, to the US continuing intelligence-gathering activities in close vicinity to China\u2019s territory. Behind the events in Hong Kong, Beijing also sees the US\u2019 purposeful activities in accordance with the proven scheme of triggering \u2018colored\u2019 revolutions, aimed in this case at destabilization of the situation in China and erosion of the CPC legitimacy. Beijing often interprets the majority of critical situations which China currently faces in its internal and external policy, as a result of measures implemented by Washington to deter China.\nFor Washington there are also more and more issues for concern in relation to the current situation in the security sphere in the APR. Now it is hard to deny the fact that China becomes a new centre of power and influence in the APR. Chinese defense budget demonstrates sustainable growth in absolute terms (in 2015 defense expenditures will grow by 10.1% compared to 2014 and will amount to USD 142 bn), China\u2019s war potential is considerably consolidating, operating capabilities of its armed forces keep growing, China\u2019s push in implementation of its national interests also increases.\nIncidents with the Chinese and American marine vessels and aircraft standoffs in the water areas around China and aerial domains over them have long become common occurrence. China, upholding the principle of absolute ban for foreign war ships\u2019 navigation within the 200-mile exclusive economic zone of a coastal state, disturbs the American ships\u2019 navigation in its exclusive economic zone and sometimes outside it. Yet another incident took place in August 2014, when a Chinese fighter aircraft Su-27 impeded the navigation of an American maritime patrol aircraft P-8 flying at the distance of 145 miles from the Chinese Hainan Island. By contrast with the similar incident which ended up in the plane collision and the death of the Chinese pilot, the August incident was without losses and resulted only in protests on the American part.\nA peculiar response to the continuing intelligence operations by the American Navy and Air Force in the Chinese exclusive economic zone was introduction by China since 2012 of the practice of conducting military maneuvers within the limits of the US exclusive economic zone, in particular in the area of Guam and Hawaii islands in the Pacific Ocean. Such maneuvers became possible due to enhancement of Chinese armed forces\u2019 operational capabilities. Increased capabilities of the China\u2019s fleet to overpass \u2018the first island chain\u2019 and enter the Pacific Ocean unhindered were demonstrated in July 2013, when for the first time in history Chinese ships sailed through the La Perouse Strait located between the Sakhalin and Hokkaido islands. At the end of March 2015 another showcase incident took place: for the first time the Chinese Air Force crossed \u2018the first island chain\u2019 and held maneuvers in the Western part of the Pacific Ocean. Prospectively, one can predict further expansion of military exercise level and the increase of the number of China\u2019s maneuvers in the Western part of the Pacific Ocean near the American territory with all that it implies.\nRapid strengthening of China\u2019s military power is accompanied by Beijing\u2019s attempts to spread its control over navigable and air routes in the APR. The creation by China of the air defense identification zone in the East China Sea in November 2013 was the first signal, which caused a massive outcry in the region and an extremely negative response on the part of the USA. The second signal followed at the end of March 2015, when China, without relevant coordination with the interested parties, officially opened a new air route M503, only 8 km away from the West of the Taiwan Strait water parting line. Such proximity of the new air route to transportation corridors of Taiwan, the US long-standing partner in the region, can obstruct both civil and military operations for Taiwan, in particular, affect communication between Taiwan and Taiwan-controlled islands of Kinmen and Matsu.\nWashington also shows deep concern in view of Beijing\u2019s spinning-up activities in vindicating its claims for disputed islands and water zones of the South China Sea. In 2014, Beijing designated its new tactics in materialization of territorial claims: China undertakes extraordinary in scale and unprecedented in speed works on the creation of artificial islands in the South China Sea. Over the past year China constructed through sluicing at least five artificial islands. In mid-November 2013, Jane\u2019s Defense Weekly made public satellite images of the construction of the Jongshu Island that was even then larger, in terms of area, than Taiwan-controlled Itu Aba \u2013 the largest natural island of the Spratly Islands. In February 2015, the world community\u2019s attention was drawn to sluicing by China of the Yunsidao Island \u2013 the largest in the group of the Paracel Islands. Compared to 2013, the island area almost doubled. The construction of new islands and the enlargement of those already existing can considerably strengthen China\u2019s positions in the South China Sea, which is certainly in conflict with the US interests.\nAnd finally, contradictions between the USA and China can reach their pinnacle in relation to the actively promoted by China idea of creating a new regional security system in the APR, that should replace the currently functioning system based primarily on the bilateral allied relations between the USA and the five countries of the region. On the basis of statements from Chinese high officials, heard throughout the last year, Washington has come to the conclusion that Beijing intends to bolster the creation of the new system of regional security without the US\u2019 participation under the principle \u2018Asia for Asians\u2019.\nYana\u00a0Leksyutina, Dr. Sc., Associate Professor at Saint-Petersburg State University,\u00a0exlusively\u00a0for the online magazine\u00a0\u201cNew Eastern Outlook.\u201c \nArticle source: http:\/\/journal-neo.org\/2015\/04\/17\/rus-ssha-i-kitaj-rost-protivorechij-v-sfere-bezopasnosti-v-atr\/ \n \n \n", "source": "news.windowstorussia.com", "publishDate": "2015-04-18T18:10:39+02:00", "sourceType": "blog", "language": "en", "googleRank": 3, "relatedDocs": [ ] }, { "id": 186433327, "url": "http:\/\/polforumblogroll.blogspot.com\/2015\/04\/fwd-grendelreport-hackers-not-suicide.html", "title": "\n \u00a0Israeli Cyber Expert: Hackers, Not Suicide Bombers, Will Cause Next 9\/11The next 9\/11-style terror attack will be perpetrated by hackers infiltrating an a", "content": "\n \u00a0Israeli Cyber Expert: Hackers, Not Suicide Bombers, Will Cause Next 9\/11The next 9\/11-style terror attack will be perpetrated by hackers infiltrating an air traffic control system or other critical infrastructure, according to\u00a0Col. (res.) Dr. Gabi Siboni,\u00a0director of the Cyber Security Program at Israel's Institute for National Security Studies (INSS). The Times of Israel reported \u00a0on Siboni's assessment Wednesday.\"Computer hackers have begun targeting electric and nuclear power plants and other critical operations around the world in audacious and continuous efforts to take control of them.\" \u2026\"The next 9\/11 will happen without suicide bombers aboard the plane with box-cutters but will occur because of a cyber incident perpetrated by a terror organization,\" he said.\"Cyber aggression is widely utilized and has become a basic weapon used in international conflicts. Countries are responsible for attacks on most national infrastructure, and governments across the Western world have understood that they must allocate resources not only to purchase new tanks and aerial defense systems but also in defensive cyber infrastructure,\" he added.Siboni offered his assessment in advance of an American-Israel cybersecurity conference scheduled to take place later this\u00a0month in Washington D.C. Siboni called on the United States and Israel to increase their cooperation in order to counter this threat.Last year saw major multinational corporations investing in Israel's growing cyber-security hub.\u00a0This past\u00a0October \u00a0The Washington Post reported that Israel had become the number two exporter of cyber products and was becoming a \"cybersecurity superpower.\" In February, The New York Times reported that the United States was increasingly turning to allies Britain and Israel to counter the cyber threats emanating from Iran.Illustrating how \"[c]yber aggression\" has become a weapon utilized in conflicts, Claudia Rosett wrote in How Iran and North Korea Became Cyber-Terror Buddies, which was published in the January 2015 issue of The Tower Magazine:The Sony hack has monopolized media attention over the past month, and finally aroused public concern over the cyber-warfare capabilities of rogue states like North Korea. There are signs of Iranian involvement in the attack, but no conclusive evidence. There is conclusive evidence, however, of far-ranging collaboration between North Korea and Iran on cyber-warfare and numerous other forms of military technology.These go far beyond the realm of cyberspace. They include such devastating conventional weapons as ballistic missiles and\u2014most importantly\u2014the development of nuclear technology and nuclear weapons. Clearly, the relationship between these two rogue totalitarian states represents a clear and present danger to the entire free world.The really important question, then, is not precisely who hacked Sony's computer network. It is what we might see if the administration rolled back the curtain and showed us whatever it knows about the full extent of North Korea's rogue ventures, especially its long-standing romance with Iran.[Photo: iloque \/ Flickr ]\u00a0\u00a0 __._,_.___ __,_._,___ -- -- Thanks for being part of \"PoliticalForum\" at Google Groups. For options & help see http:\/\/groups.google.com\/group\/PoliticalForum \u00a0 * Visit our other community at http:\/\/www.PoliticalForum.com\/ * It's active and moderated. Register and vote in our polls. * Read the latest breaking news, and more. --- You received this message because you are subscribed to the Google Groups \"PoliticalForum\" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected] For more options, visit https:\/\/groups.google.com\/d\/optout. \n\n\n", "source": "polforumblogroll.blogspot.com", "publishDate": "2015-04-18T13:29:00+02:00", "sourceType": "blog", "language": "en", "googleRank": null, "relatedDocs": [ ] } ], "countByLang": [ { "en": 200 }, { "it": 1 } ], "countBySourceType": [ { "name": "web", "num": 95 }, { "name": "blog", "num": 83 }, { "name": "news", "num": 16 }, { "name": "cyber security", "num": 4 }, { "name": "webzine", "num": 3 } ], "topSources": [ ], "searchId": 187346260 } }

Install SDK for (Node.js)Unirest

OAuth2 Authentication
Client ID
Client Secret
OAuth2 Authentication