US, UK embassies in Yemen close due to al-Qaeda threat

Monday, January 4, 2010

The United States and the United Kingdom closed their embassies in Yemen Sunday, pointing to ongoing terrorist threats. The closures came after the two nations pledged to boost counter-terrorism support to the Yemeni government.

The American embassy’s website said the threats come from al-Qaeda in the Arabian Peninsula, the group linked to the failed Christmas Day airplane bombing attempt in the United States. The message in part said, “The U.S. Embassy in Sana’a is closed today, January 3, 2010, in response to ongoing threats by Al-Qaeda in the Arabian Peninsula (AQAP) to attack American interests in Yemen.”

Further adding, “On December 31, the U.S. Embassy sent a warden message to Americans citizens in Yemen to remind them of the continuing threat of terrorist actions and violence against American citizens and interests throughout the world. The U.S. Embassy reminds U.S. citizens to maintain a high level of vigilance and to practice enhanced security awareness.”

Deputy National Security Advisor for Homeland Security and Counterterrorism John O. Brennan said on CNN’s State of the Union with John King, “There are indications that al Qaeda is planning to carry out an attack against a target inside of Sana’a, possibly our embassy.” Brennan added, “And what we do is to take every measure possible to ensure the safety of our diplomats and citizens abroad, so the decision was made to close the embassy.”

The U.S. Embassy in Sana’a is closed today, January 3, 2010, in response to ongoing threats by Al-Qaeda in the Arabian Peninsula (AQAP) to attack American interests in Yemen.

A spokesperson for the British Foreign Office said their embassy would be closed on Sunday and a decision to reopen would be made on Monday.

The closures come a day after U.S. General David Petraeus visited the capital, Sana’a, to discuss security issues with President Ali Abdullah Saleh. The general, who oversees the U.S. wars in Afghanistan and Iraq, recently announced that the United States would more than double its security aid to the impoverished nation.

The United States gave $67 million last year to Yemen, the only country that receives more aid is Pakistan with $112 million, according to the Associated Press.

Yesterday, in his weekly radio address, President Barack Obama linked the suspect in the attempted bombing of Northwest Airlines Flight 253 to al-Qaeda saying, “We know that he traveled to Yemen, a country grappling with crushing poverty and deadly insurgencies. It appears that he joined an affiliate of al-Qaeda, and that this group, al-Qaeda in the Arabian Peninsula, trained him, equipped him with those explosives and directed him to attack that plane headed for America.”

Obama annouced, “So, as President, I’ve made it a priority to strengthen our partnership with the Yemeni government-training and equipping their security forces, sharing intelligence and working with them to strike al-Qaeda terrorists.”

Obama said that they had already results prior to the Christmas Day bombing attempt saying, “So, as President, I’ve made it a priority to strengthen our partnership with the Yemeni government-training and equipping their security forces, sharing intelligence and working with them to strike al-Qaeda terrorists.”

Britain has also announced plans to join with the United States in funding a counter-terrorism police unit in Yemen, as well as plans to hold an international conference on Yemeni security later this month.

Earlier today, British Prime Minister Gordon Brown told the BBC, “This is a new type of threat and it is from a new source which is obviously Yemen, but there are many other potential sources Somalia, as well as Afghanistan and Pakistan.”

Editor Hakim Almasmari, of the Yemen Post newspaper, thinks the conference might be advantageous if it results in more development projects for rural Yemen. However, he fears what any foreign-backed military attacks could mean.

“Al-Qaeda right now is not very strong,” Almasmari said. “Its followers are not more than 400 in all. However, if the U.S. does attack Yemen, al-Qaeda will get stronger and stronger because people who lose their families in the airstrikes will join al-Qaeda not because they want to but because they want revenge against the Americans and the Yemeni government for the attacks.”

The situation has gained new urgency as the government in Sana’a finds itself overwhelmed not only by the growing terrorist threat, but also two separate rebellions, one of which has become something of a proxy war, at least in rhetoric, between Iran and Saudi Arabia.

U.S. military experts have warned that vast reaches of the impoverished nation, with its booming population and dwindling resources, could spin permanently out of the government’s control.

Militant groups from Somalia said that they would send fighters to help aid al-Qaeda in Yemen. Yemen has vowed to keep foreign extremists out.

The U.S. embassy has faced attacks from the local al-Qaeda group before, with an assault outside its gates in 2008 that left 19 people – civilians and militants – dead.

Retrieved from “https://en.wikinews.org/w/index.php?title=US,_UK_embassies_in_Yemen_close_due_to_al-Qaeda_threat&oldid=3340158”

Ontario Votes 2007: Interview with Family Coalition Party candidate Ray Scott, Algoma-Manitoulin

Tuesday, October 2, 2007

Ray Scott is running for the Family Coalition Party in the Ontario provincial election, in the Algoma-Manitoulin riding. Wikinews’ Nick Moreau interviewed him regarding his values, his experience, and his campaign.

Stay tuned for further interviews; every candidate from every party is eligible, and will be contacted. Expect interviews from Liberals, Progressive Conservatives, New Democratic Party members, Ontario Greens, as well as members from the Family Coalition, Freedom, Communist, Libertarian, and Confederation of Regions parties, as well as independents.

Retrieved from “https://en.wikinews.org/w/index.php?title=Ontario_Votes_2007:_Interview_with_Family_Coalition_Party_candidate_Ray_Scott,_Algoma-Manitoulin&oldid=1052031”

On Chexsystems? Consider Debit Card Accounts To Get Back To Banking

By Kurt Lehmann

If you’ve ever written a bad check (whether it was on purpose or accidental) or have had problems with banks, there’s a pretty good chance that you’re on a list maintained by ChexSystems. This list can cause you a lot of problems when it comes to getting a new bank account or doing other banking tasks. ChexSystems is a Consumer Reporting Agency, like TransUnion, Experian, and others. It provides a list of customers that it considers to be high risk to banks across the country.

Not everyone on this list really is a big risk, though. Some people end up on it because of errors in data, theft of their identities, and many other mistakes. Once you’re on the list, however, it becomes very hard to get a new bank account. Most banks use ChexSystems data to decide whether or not you’ll be allowed to open an account, whether or not that data is accurate. If you’ve been trying to find a bank that doesn’t use the ChexSystems database in your area, you might have gotten frustrated, and resigned to going through life without an account. However, don’t give up hope yet. Debit cards and Internet bank accounts are still an option.

If you’re tired of constantly carrying cash, getting money orders, and using check cashing services, getting a debit card account could be the answer you’re looking for. You can use these cards just like regular credit cards – at bookstores, gas stations, the grocery store, restaurants and online. Anywhere a Visa or MasterCard is accepted, you can use your debit card, including for getting cash from the ATM.

[youtube]http://www.youtube.com/watch?v=7fIix2wFips[/youtube]

A debit card automatically deducts the amount of the purchase from your account, meaning that you don’t have to pay interest or deal with credit. Since the transactions show up on your bank statement, you’ll be able to track your spending. If you want, you can choose to have your paycheck deposited directly into your debit card account. That way, you won’t have to use check cashing stores to get your money.

The biggest difference between a regular checking account and a debit account is that you normally don’t get a checkbook with your debit card. You’ll be able to pay your bills online via Echeck, or automatic debit. Many people prefer to use online banking services (such as those provided by debit card accounts), because they are free — you don’t even need to pay for a stamp and an envelope! Further, using online banking makes it even easier to keep your account balanced, so you avoid further banking problems.

This means that you still get most of the advantages of an ordinary checking account. There are still plenty of banks that permit opening a debit card account for people who are on the ChexSystems list. That makes this an excellent option if you’re on the list and can’t find a local bank that doesn’t use it. A debit card account is a great alternative to an ordinary bank account.

About the Author: Kurt Lehmann is a financial services expert, researching and writing about topics including

ChexSystems

,

Payday Loans

, and

Second Chance Checking

.

Source:

isnare.com

Permanent Link:

isnare.com/?aid=212554&ca=Finances

Harrier jet crashes in Rutland, England, pilot survives

Monday, June 16, 2008

A Royal Navy pilot has safely ejected from his Harrier GR7 aircraft moments before it crashed in a field near the small village of Ashwell in the county of Rutland in England. The crash occurred at about 1350 BST today.

The pilot was taken by air ambulance to Queen’s Medical Centre in Nottingham for treatment for spinal injuries.

Local resident Vic Harrison spoke to the BBC about the incident: “I thought he didn’t stand a chance, but I looked up and saw the parachute of the pilot. I really thought he had hit the houses. It was a narrow miss – it must have been just 400 yards from our house. It has been an exceptionally lucky escape.”

The plane, from the nearby RAF Cottesmore airbase, was on a training mission and is said not to have been carrying any weapons.

Retrieved from “https://en.wikinews.org/w/index.php?title=Harrier_jet_crashes_in_Rutland,_England,_pilot_survives&oldid=750176”

UAE launches national authority for scientific research

Wednesday, March 19, 2008

The United Arab Emirates (UAE) has announced its first national authority for scientific research (NASR) to coordinate and fund scientific research in the country.

The national authority for scientific research was announced on March 7 by Shaikh Nahyan bin Mubarak Al Nahyan, UAE minister for higher education and scientific research. NASR will begin with an annual budget of AED100 million (approximately US$27.2 million). The authority hopes to receive additional contributions from the public and the private sector.

NASR will look to fund research projects in various fields, including engineering, technology, medicine, water and agriculture, proposing specific projects to be competed for by researchers at universities and private research institutes.

“Projects are going to be selected to help promote scientific research and the growth of UAE society and we will compare them with international scientific research criteria,” Gulf News quoted Al Nahyan as saying at the launch.

NASR will also train scientists and develop programmes for promoting public science awareness. It will also coordinate with government authorities on the issue of intellectual property rights, by providing advice on how companies and research centres should go about protecting their discoveries in the form of patents or licenses. It will also provide scholarships for researchers in the UAE to work on international research programmes, and organise national scientific conferences. NASR forms part of the UAE’s strategic plan to improve higher education and scientific research.

Zakaria Maamar, associate professor at the College of Information Technology at Zayed University, UAE, told Science and Development Network (SciDev.Net) that, “This initiative is another boost to the research and development activities that are carried out in the UAE. It will definitely provide researchers with the appropriate funds to sustain such activities and promote best practices in the community.”

Said Elnaffar, assistant professor at the college of information technology at the United Arab Emirates University, told SciDev.Net that, with this initiative, the UAE is taking the lead and setting a good example by building a strong development infrastructure founded on knowledge discovery and research.


This article is based on UAE launches national authority for scientific research by scidev.net (Wagdy Sawahel) which has a copyright policy compatible with our CC-BY 2.5. Specifically “CC-BY-2.0 UK

Retrieved from “https://en.wikinews.org/w/index.php?title=UAE_launches_national_authority_for_scientific_research&oldid=625053”

Man remanded in custody after allegedly spraying urine on goods in Gloucestershire, UK

Monday, May 19, 2008

Sahnoun Daifallah, of White City, Gloucester, was today remanded in custody by Cheltenham magistrates after being arrested for spraying a “foul-smelling, brown substance” from a sports bottle. The liquid is thought to have contaminated food, books, wine bottles, and other items across several stores in Gloucestershire.

Mr Daifallah, the court was today told, committed the offences over multiple days. The attack on a Tesco supermarket, where frozen chips and wine bottles were contaminated with what Tesco claims to be a “mix of human urine, faeces, and domestic products” happened on Friday. He is also accused of a similar offence in a Morrisons supermarket 4 miles away on the same day. Two days previously, Mr Daifallah is accused of spraying the substance inside a pub near Cheltenham, contaminating food, and contaminating over 700 books in a Waterstone’s bookstore in nearby Cirencester.

Mr Daifallah today confirmed that he was at the locations stated, however he indicated he will be pleading not guilty to the charges. He has been remanded in custody until May 28th, when he will appear before Stroud magistrates via videolink to be committed to Gloucester Crown Court – a decision made by magistrates after the estimated damage by the defendant was given at over £10,000, plus cleaning and replacement expenses.

Retrieved from “https://en.wikinews.org/w/index.php?title=Man_remanded_in_custody_after_allegedly_spraying_urine_on_goods_in_Gloucestershire,_UK&oldid=1972971”

What Are Survivable Computer Systems

Submitted by: Darren Miller

Definition Of A Survivable Computer System

A computer system, which may be made up of multiple individual systems and components, designed to provide mission critical services must be able to perform in a consistent and timely manner under various operating conditions. It must be able to meet its goals and objectives whether it is in a state of normal operation or under some sort of stress or in a hostile environment. A discussion on survivable computer systems can be a very complex and far reaching one. However, in this article we will touch on just a few of the basics.

Computer Security And Survivable Computer Systems

Survivable computer systems and computer security are in many ways related but at a low-level very much different. For instance, the hardening of a particular system to be resistant against intelligent attacks may be a component of a survivable computer system. It does not address the ability of a computer system to fulfill its purpose when it is impacted by an event such as a deliberate attack, natural disaster or accident, or general failure. A survivable computer system must be able to adapt, perform its primary critical functions even if in a hostile environment, even if various components of the computer system are incapacitated. In some cases, even if the entire “primary” system has been destroyed.

As an example; a system designed to provide real-time critical information regarding analysis of specialized medications ceases to function for a few hours because of wide spread loss of communication. However, it maintains the validity of the data when communication is restored and systems come back online. This computer system could be considered to have survived under conditions outside of its control.

[youtube]http://www.youtube.com/watch?v=t8QuUEwrKm8[/youtube]

On the other hand, the same system fails to provide continuous access to information under normal circumstances or operating environment, because of a localized failure, may not be judged to have fulfilled its purpose or met its objective.

Fault Tolerant And Highly Availability Computer Systems

Many computer systems are designed with fault tolerant components so they continue to operate when key portions of the system fail. For instance; multiple power supplies, redundant disk drives or arrays, even multiple processors and system boards that can continue to function even if its peer component is destroyed or fails. The probability of all components designed to be redundant failing at one time may be quite low. However, a malicious entity that knows how the redundant components are configured may be able to engineer critical failures across the board rendering the fault tolerant components ineffective.

High availability also plays a role in a survivable computer system. However this design component may not maintain computer system survivability during certain events such as various forms of malicious attack . An example of this might be a critical web service that has been duplicated, say across multiple machines, to allow continuous functionality if one or more the individual web servers was to fail. The problem is that many implementations of high availability use the same components and methodology on all of the individual systems. If an intelligent attack or malicious event takes place and is directed at a specific set of vulnerabilities on one of the individual systems, it is reasonable to assume the remaining computer systems that participate in the highly available implementation are also susceptible to the same or similar vulnerabilities. A certain degree of variance must be achieved in how all systems participate in the highly available implementation.

What’s The Difference Between An Attack, Failure, And Accident? How Do These Differences Impact A Survivable Computer System

In many cases when I am discussing the security of systems with customers, the question of business continuity and disaster recovery come up. Most companies that provide a service that they deem critical just know the system needs to be operational in a consistent manner. However, there is typically little discussion about the various events or scenarios surrounding this and that can lead to great disappointment in the future when what the customer thought was a “survivable computer system” does not meet their expectations. Some of the items I like to bring up during these conversations is what their computer systems goal and objective is, what specifically does continuous operation mean to them, and specifically what constitutes an attack, failure, or accident that can cause loss of operation or failure to meet objectives.

A failure may be defined as a localized event that impacts the operation of a system and its ability to deliver services or meet its objectives. An example might be the failure of one or more critical or non-critical functions that effect the performance or overall operation of the system. Say, the failure of a module of code that causes a cascading event that prevents redundant modules from performing properly. Or, a localize hardware failure that incapacitates the computer system.

An accident is typically an event that is outside the control of the system and administrators of a local / private system. An example of this would be natural disasters such as hurricanes, if you live in south Florida like I do, or floods, or wide spread loss of power because the utility provider cut the wrong power lines during an upgrade to the grid. About two years ago, a client of mine who provides web based document management services could not deliver revenue generating services to their customers because a telecommunications engineer cut through a major phone trunk six blocks away from their office. They lost phone and data services for nearly a week.

An now we come to “attack”. We all know accidents will happen, we know that everything fails at one time or another, and typically we can speculate on how these things will happen. An attack, executed by an intelligent, experienced individual or group can be very hard to predict. There are many well known and documented forms of attacks. The problem is intelligence and human imagination continuously advance the form of malicious attacks and can seriously threaten even the most advanced designed survivable computer systems. An accident or failure does not have the ability to think out of the box or realize that a highly available design is flawed because all participants use the same design. The probability that an attack might occur, and succeed may be quite low, but the impact may be devastating.

Conclusion

One of the reasons I wrote this article was to illustrate that it’s not all about prevention. Although prevention is a big part of survivable computer system design, a critical computer system must be able to meet its objectives even when operating under hostile or stressful circumstances. Or if the steps taking for prevention ultimately prove inadequate. It may be impossible to think of all the various events that can impact a critical computer system but it is possible to reasonably define the possibilities.

The subject of survivable computer systems is actually one of complexity and ever evolving technology. This article has only touched on a few of the basic aspects of computer system survivability. I intend on continuing this article to delve deeper into the subject of survivable computer systems.

About the Author: Darren Miller is an Information Security Consultant with over seventeen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals.Please visit us at

defendingthenet.com

Source:

isnare.com

Permanent Link:

isnare.com/?aid=40163&ca=Computers+and+Technology

Saturn moon Enceladus may have salty ocean

Thursday, June 23, 2011

NASA’s Cassini–Huygens spacecraft has discovered evidence for a large-scale saltwater reservoir beneath the icy crust of Saturn’s moon Enceladus. The data came from the spacecraft’s direct analysis of salt-rich ice grains close to the jets ejected from the moon. The study has been published in this week’s edition of the journal Nature.

Data from Cassini’s cosmic dust analyzer show the grains expelled from fissures, known as tiger stripes, are relatively small and usually low in salt far away from the moon. Closer to the moon’s surface, Cassini found that relatively large grains rich with sodium and potassium dominate the plumes. The salt-rich particles have an “ocean-like” composition and indicate that most, if not all, of the expelled ice and water vapor comes from the evaporation of liquid salt-water. When water freezes, the salt is squeezed out, leaving pure water ice behind.

Cassini’s ultraviolet imaging spectrograph also recently obtained complementary results that support the presence of a subsurface ocean. A team of Cassini researchers led by Candice Hansen of the Planetary Science Institute in Tucson, Arizona, measured gas shooting out of distinct jets originating in the moon’s south polar region at five to eight times the speed of sound, several times faster than previously measured. These observations of distinct jets, from a 2010 flyby, are consistent with results showing a difference in composition of ice grains close to the moon’s surface and those that made it out to the E ring, the outermost ring that gets its material primarily from Enceladean jets. If the plumes emanated from ice, they should have very little salt in them.

“There currently is no plausible way to produce a steady outflow of salt-rich grains from solid ice across all the tiger stripes other than salt water under Enceladus’s icy surface,” said Frank Postberg, a Cassini team scientist at the University of Heidelberg in Germany.

The data suggests a layer of water between the moon’s rocky core and its icy mantle, possibly as deep as about 50 miles (80 kilometers) beneath the surface. As this water washes against the rocks, it dissolves salt compounds and rises through fractures in the overlying ice to form reserves nearer the surface. If the outermost layer cracks open, the decrease in pressure from these reserves to space causes a plume to shoot out. Roughly 400 pounds (200 kilograms) of water vapor is lost every second in the plumes, with smaller amounts being lost as ice grains. The team calculates the water reserves must have large evaporating surfaces, or they would freeze easily and stop the plumes.

“We imagine that between the ice and the ice core there is an ocean of depth and this is somehow connected to the surface reservoir,” added Postberg.

The Cassini mission discovered Enceladus’ water-vapor and ice jets in 2005. In 2009, scientists working with the cosmic dust analyzer examined some sodium salts found in ice grains of Saturn’s E ring but the link to subsurface salt water was not definitive. The new paper analyzes three Enceladus flybys in 2008 and 2009 with the same instrument, focusing on the composition of freshly ejected plume grains. In 2008, Cassini discovered a high “density of volatile gases, water vapor, carbon dioxide and carbon monoxide, as well as organic materials, some 20 times denser than expected” in geysers erupting from the moon. The icy particles hit the detector target at speeds between 15,000 and 39,000 MPH (23,000 and 63,000 KPH), vaporizing instantly. Electrical fields inside the cosmic dust analyzer separated the various constituents of the impact cloud.

“Enceladus has got warmth, water and organic chemicals, some of the essential building blocks needed for life,” said Dennis Matson in 2008, Cassini project scientist at NASA’s Jet Propulsion Laboratory in Pasadena, California.

“This finding is a crucial new piece of evidence showing that environmental conditions favorable to the emergence of life can be sustained on icy bodies orbiting gas giant planets,” said Nicolas Altobelli, the European Space Agency’s project scientist for Cassini.

“If there is water in such an unexpected place, it leaves possibility for the rest of the universe,” said Postberg.

Retrieved from “https://en.wikinews.org/w/index.php?title=Saturn_moon_Enceladus_may_have_salty_ocean&oldid=4453704”

Reserve Bank of Australia considers interest rate rise

Monday, November 5, 2007

The Australian Prime Minister John Howard is bracing himself for the probable interest rate rise on Wednesday. Experts are saying that a rise is almost certain and that as many as three could occur within the next three months. Interest rates have never risen so close to a federal election (this year’s election on November 24) but the Prime Minister says that some interest rate rise is unavoidable in a good economy.

“Now is not the time to replace an experienced government on economic issues with an inexperienced government,” Howard warned today. Labor leader Kevin Rudd recalls the Prime Minister’s promise at the 2004 election to keep interest rates low – labelled the ‘big interest rate con’ by the opposition leader.

Treasurer Peter Costello reaffirms the Coalition’s policy on the workplace relations laws, saying that a reversal of the laws by a Labor government would push up inflation and interest rates.

Retrieved from “https://en.wikinews.org/w/index.php?title=Reserve_Bank_of_Australia_considers_interest_rate_rise&oldid=521758”

How To Buy Wholesale Clocks

By Mitch Gleason

Are you interested in setting up a home business selling clocks online? Buying wholesale from suppliers is easier than you might think and you will save a huge percentage on retail price – leaving you a decent profit after sales. This article is a guide to the product itself, buying your merchandise and finding the correct supplier for you.

Clocks are used absolutely everywhere. Many houses have them in every room, business have them everywhere, even public places are filled with clocks. So you need have no fear that there is no market for clocks.

If you want to sell clocks, you’ll have to know a bit about them. You may want to specialize, given that there is almost no limit to the amount of different designs, and no one could reasonably stock even a fraction of the available kinds.. For example, clocks have been in use for hundreds of years, and you may want to specialize in antiques or crafted clocks. Mechanical clocks have existed since the late 13th century (though not quite how we’d picture clocks now!), electric clocks since 1840 and there is a huge market for collectors in old clocks. Antiques can sell for enormous prices, and getting involved can be difficult, unless you are an expert in the area. Apprasing the expected value of an antique clock is an acquired skill. Perhaps more accessible to a newcomer would be handmade crafted clocks. Such types of clock also come in a wide variety of shapes and sizes, from the elegant to the brash.

[youtube]http://www.youtube.com/watch?v=ylcWOzeIESA[/youtube]

Alternatively, there is also a large level of demand for generic and mass-produced clocks. After all, not everyone wants to pay a fortune – they just want to know the time. Cheap and cheerful functional clocks come in a huge variety of shapes, designs, sizes. The range of available novelty clocks is probably only limited by your imagination. If you can think of it, it’s probably already on a clock. If not, why not sell one?

Suppliers, somewhat contrary to what you might think, are more likely to be Chinese (or East Asian in general) these days than Swiss or German. If you are in the business for mass produced clocks meant for general home use on a large scale, then one of these suppliers may be useful for you. One of the most important aspects of buying clocks wholesale is to secure favorable terms. Negotiating with firms from overseas can be a sticking point. Many buyers use representatives that can help overcome language barriers as well as help with the myriad of regulations and red tape that vary from country to country. You may find these representatives listed in overseas manufacturer directories.

If you are looking for beautiful hand-crafted pieces, then this may not be the right direction. There are still German producers out there selling into a US market, such as Hubert Herr clocks, which are made in traditional Black Forest cuckoo clock style, and offer a 40% discount on retail price. This may be the type of seller for you if you’re looking at a more upscale market.

So there you go, your guide to finding suppliers and buying clocks wholesale!

About the Author: Mitch Gleason is the manager of the

wholesale information

site, supply-wholesale.com. For information about thousands of wholesale products visit this

wholesale products

site.

Source:

isnare.com

Permanent Link:

isnare.com/?aid=309081&ca=Advice