Meralco locks down Phoenix for 3rd straight win

first_imgPBA IMAGESMeralco picked up where it left off and whipped Phoenix, 81-66, in the 2017 PBA Commissioner’s Cup to inch closer to the elusive twice-to-beat advantage on Wednesday at Smart Araneta Coliseum.Baser Amer unloaded 20 points and three assists to lead the Bolts to their third straight win to formally clinch a playoff berth.ADVERTISEMENT Need for a new naturalized player urgent, says Guiao LIST: Jan. 20 class suspensions due to Taal Volcano eruption Palace: Crisis over ABC-CBN franchise unlikely MOST READ Jameel McKay topped Phoenix with 16 points, 16 rebounds and three blocks, while Cyrus Baguio had 10 in the loss.The defeat further endangered the Fuel Masters’ position as they are precariously holding on to the eighth spot with their 3-5 slate.The Scores:MERALCO 81 – Amer 20, Newsome 19, Stepheson 15, Grey 8, Hodge 7, Caram 4, Hugnatan 3, Nabong 2, Chua 2, Daquioag 1, Dillinger 0, Faundo 0.PHOENIX 66 – McKay 16, Baguio 10, Jazul 7, Borboran 6, Torres 6, Dehesa 5, W. Wilson 5, Alolino 4, Kramer 3, Intal 2, J. Wilson 2, Miranda 0, Lanete 0.ADVERTISEMENT LATEST STORIES Panelo: Duterte only wants to emulate strong political will of Marcos View comments Don’t miss out on the latest news and information. Taal Volcano evacuees warned against going home Bulacan town gears up for biggest cookie jar Ex-Bulacan town vice mayor, village chief shot dead Wildlife rescuers asked to turn over animals to DENR Quarters: 13-16, 34-29, 53-46, 81-66.Sports Related Videospowered by AdSparcRead Next Palace: Crisis over ABC-CBN franchise unlikely Ai-Ai delas Alas on Jiro Manio: ‘Sana pinahalagahan niya ang naitulong ko’ Filipinos turn Taal Volcano ash, plastic trash into bricks PLAY LIST 01:40Filipinos turn Taal Volcano ash, plastic trash into bricks01:32Taal Volcano watch: Island fissures steaming, lake water receding02:14Carpio hits red carpet treatment for China Coast Guard02:56NCRPO pledges to donate P3.5 million to victims of Taal eruption00:56Heavy rain brings some relief in Australia02:37Calm moments allow Taal folks some respite Chris Newsome also got 19 markers, four boards, and three assists, while Alex Stepheson got 15 points and 20 rebounds for Meralco, which tightened its grip of the second place with its 7-1 card.“Defensively, we’re pretty sharp tonight and it held up for the entire game,” said coach Norman Black. “I’m really happy with the defense. The guys really devoted to the game plan we had for Phoenix and executed really well on the defensive end.”FEATURED STORIESSPORTSEnd of his agony? SC rules in favor of Espinosa, orders promoter heirs to pay boxing legendSPORTSBreak new groundSPORTSMcGregor blasts Cerrone in 40 seconds in UFC returnComing off a 16-day break, the Bolts shook off the cobwebs early and zapped their way back from an early nine-point deficit before regaining control in the second quarter to grab the 34-26 halftime lead.The low-scoring duel continued in the second half before the Bolts finally wiggled out of the Fuel Masters’ grasp as they opened the fourth quarter with a 17-7 blast, turning a tight 53-46 lead at the end of the third quarter to a comfortable 70-53 advantage, punctuated by an Amer jumper with 4:03 left in the game.last_img read more

Share your views on better policing

first_img24 June 2013 The government has launched a public consultation process to encourage South Africans to give their input on plans to improve policing in the country through a Green Paper on Policing. The Green Paper sets out the broad policy thrust for the South African Police Service (SAPS) over the medium to long term, providing a framework for building a professional, accountable, transparent and responsive police service. During a quarterly meeting between Police Minister Nathi Mthethwa and provincial MECs responsible for policing in Boksburg on Friday, a call was made to South Africans to contribute and share their views and suggestions on the kind of policing they want in future. Mthethwa said the policy had to position the police service to adapt and respond to a constantly evolving crime landscape while remaining steadfast in its commitment to democratic policing. “This policy document therefore articulates the Ministry of Police’s vision for policing for the future. This piece of legislation has far-reaching safety implications, hence the importance of a broader consultation process.” The meeting stressed that the Civilian Secretariat for Police would need to ensure that it reached the majority of South Africans as part of its consultative process, so that views from even the remotest and rural areas were included. The MECs were tasked to use their existing community structures, constituencies and stakeholder forums to get public discussions going. South Africans have until 7 July to make inputs on the Green Paper on Policing, which is available on and A copy can also be obtained from the Civilian Secretariat for Police by contacting them on 012 393 2519. Source: read more

Movie legend John Travolta visits 707’s new Aussie home

first_imgThe quid pro quo was that Qantas took over the aircraft’s expensive maintenance.The actor put the plane up for sale several years ago and decided to donate it after an approach from HARS.Bringing the aircraft back to Australia is a costly exercise and anyone keen to support the project can make a tax-deductible donation. The email is John Travolta with his 707 in Sydney during a visit some years ago. New photos have emerged of a quick visit by movie star John Travolta to the future home of his donated Boeing 707-138 in November during an Australian speaking tour.The surprise visit to the Historical Aircraft Restoration Society at Albion Park, south of Sydney, saw the aviation enthusiast take a flight on the society’s restored Lockheed Super Constellation, affectionately known as Connie.READ: American app now scans your passport chip.Travolta has donated his ex-Qantas Boeing 707 to HARS and the aircraft is currently in Brunswick, Georgia where it is being prepared for the flight to its new home at newly renamed Shellharbour Airport early next year.The latest HARS newsletter said the movie legend met many HARS volunteers and visitors and enjoyed a tour of the museum before going for the flight on the Constellation.TravoltaHollywood legend John Travolta with “Connie”. Photos: M. Keech courtesy of HARSThe 737 was originally scheduled to arrive in November but was relocated to a hangar in Brunswick while work was done to comply with an Airworthiness Directive relating to the attachment fittings for the aircraft’s four engines.The plane, which started life as VH-EBM,  is the last of 13 707s specially built for Qantas and known as “hotrods”.The Boeing 138B was about 10ft shorter than the standard 707 to give it better airfield performance and range.TravoltaTravolta’s aircraft was delivered to Qantas in 1964 and sold to Braniff International Airways in 1969.It was converted to a VIP jet in 1973 and had a number of owners, including singer Frank Sinatra and billionaire Kirk Kirkorian.Travolta first came into contact with it while filming “Get Shorty” but had to wait three years before it hit the right price in 1998.travoltaTravolta bore the cost of maintaining the aircraft for the first four years, before striking a deal with then Qantas chief executive Geoff Dixon to paint the plane in Qantas colors and come on board as the airline’s ambassador.last_img read more

Why Nation States Hack Personal Information

first_imgUS Office of Personnel Management (OPM) recently announced a massive data breach, containing very personal and private data of government and military personnel.  The stolen data was originally gathered to process security clearances and contains a plethora of background information, including criminal records, mental conditions, drug usage, veteran status, birthdates, social security numbers, pay histories and pension figures, insurance data, financial records, home addresses, contacts, and other profile data.  Millions of records in total were stolen, for current and previous government workers, contractors, and partners.  Investigators concluded the attack was conducted by another nation state.  This leads to the question of why would another nation launch such an attack and how will they use such personal information to their advantage?  The answers might be shocking.Unlike cybercriminals, who would be interested in opening lines of credit, filing fictions tax refunds, creating false identities, siphoning financial assets, and fraudulently charging on accounts, nation states have different motivations which drive their actions.  Nation states are interested in influencing policies in their favor across the globe, boosting national economic strength, military power projection, enhancing intelligence gathering capabilities, and protecting themselves from foreign attempts to do the same against them.For centuries, one of the best ways to accomplish these goals has been by influencing, manipulating, or outright controlling important people in other countries.  Employing tactics to achieve such lofty goals requires two things.  First, key foreigners with the necessary power or access must be identified.  Secondly, the means to best influence them must be determined.  History has shown that with both pieces to the puzzle, governments can maneuver in advantageous ways to achieve nothing short of world change.   Many nations have elaborate infrastructures and organizations dedicated to these goals.  They use a variety of Open Source Intelligence (OSINT), Human Intelligence (HUMINT), and Cyber Intelligence (CYBINT) methods to gather insights and data.  Nowadays, OSINT is very effective and with the meteoric rise in social media sharing and personal applications, has become a highly productive tool at providing personal details of a populace.  However, the deepest secrets and most private information is still difficult to come by.  CYBINT can fill the gaps and provide the hard to come by intelligence and personal connections which are highly valuable for these campaigns.  Profile IntelligenceWith the wealth of personal data fleeced from OPM, an attacker can begin building a database of interlocking profiles.  The result is a network showing people, connections, access, knowledge, and spheres of influence.  This information will be blended with any other high confidence data, garnered from other sources, to paint a better picture of individuals who may be of interest.  They will likely be looking for those who are active in local and national politics, drive or enforce inter-agency government policies, leaders and technical advisors to the military, those who possess influence in the decisions of others, have internal access to valuable data, are part of the offensive/defensive intelligence apparatus, and people who have earned the trust of those in power.These people become targets of focus and opportunity for various types of influencing tactics, including bribery, blackmail, marketing, facilitation of revenge, social pressure, ethical conundrums, retribution of justice, and demonstrations of patriotism.   Professional manipulators can be very creative in how to position and push people in certain directions.Methods of InfluenceThese profiles are also intended to give insights to how people can be motivated and controlled.  Building a collective social picture can show how key individuals are influenced.  It may highlight the respected close community around a target who offer advice and guidance.  Past indiscretions can provide an understanding of how someone is vulnerable to situations involving drugs, money, sex, ideology, or fame.  This can be exactly what is needed by manipulators.  Personal and private information can be embarrassing or give the necessary signs of weakness.  Some people can be blackmailed, threatened, tricked, cheated, bribed, or flipped to provide information, access, or facilitate the influence of others.  A cascade effect can take place as people are linked.  In rare cases, some assets may be groomed to become direct action operatives, where the risks, impacts, and rewards can be much higher.  Achieving success is no easy task for nation state orchestrators.  Private information is a highly prized chip in this game.  The more sensitive, revealing, and humiliating the data, the more valuable it is to those who plan to use it as leverage for their benefit.Beyond the targeting of individuals, such data can be valuable in other ways.  To disrupt the operational effectiveness of an organization, key personnel can be affected with campaigns to publicly embarrass or undermine renewals for top clearances therefore causing gaps or delays in the work of important positions.  This can also provide advancement avenues for others who may be more conducive to support the attacker’s objectives.Compromising computer systems becomes much easier.  In the cybersecurity realm, private information and a list of known contacts makes phishing attacks near impossible to defend against.  Emails, texts, attachments, and files can appear to be sent from friends, family, coworkers, academia, and professional colleagues with no good way for the average person to discern the difference between legitimate and malicious, until it is too late.  These phishing attacks can bypass system defenses and allow hackers to gain access to computers, networks, databases, and cloud environments.  Follow-on attacks in this manner should be expected, both at home and work.  Infecting and controlling devices of people with security clearances is an opportunity not likely passed-up by nation state attackers.The data itself has value and can be sold, traded, or given to a variety of other groups.  Terrorists, allies, political rivals, in-country revolutionaries, radicals, or other nation state intelligence agencies would be likely interested parties.  There are national economic advantages as well.  Discretely providing profile data to state-owned companies can greatly improve their business negotiations, bidding, pricing, employee recruiting activities, and overall competiveness abroad.  This can boost domestic economies while undermining foreign positions.   Politically, in a bit of irony, such attacks may also drive the desire of attacked nations to establish international accords governing global cybersecurity practices with their attackers.  In essence, hacking can motivate governments to come to the negotiation table and put them at a disadvantage in the agreement of terms.    With the loss of millions of highly personal records, the outlook is not a pretty picture.  Time will tell which of these tactics will be employed by those who took OPM data.  But keep in mind such spycraft has been around for thousands of years.  The intents and purposes are not new, just the scale, tactics, and tools have changed to include the information rich world of cyber.  My heart goes out to those whose data was part of the recent breach, their families, friends, and associates.  In a very personal way, they are all now part of a larger geopolitical game.  Take all necessary precautions to protect your name, reputation, finances, history, and honor.  Although the attack cannot be undone, governments around the world can learn from these situations and institute better controls, data policies, and political responses to protect future generations.last_img read more

Leakage of my letter to PM should be treated as high treason: Army chief

first_imgFacing demands for his dismissal, Indian Army Chief General V.K. Singh on Thursday said the leak of his letter to Prime Minister Manmohan Singh presenting a grim picture of the force’s defence preparedness should be treated as “high treason” and the source of leakage dealt with “ruthlessly”.The assertion by the General to trace the source of the leak came even as Defence sources said that Intelligence Bureau has been asked to inquire into leakage of the letter to the media.As tensions between him and the government escalated over the leak of his official letter to Prime Minister Manmohan Singh, Gen Singh hit back saying a “cynical approach” to tarnish his reputation should stop.In a brief statement released by Army Headquarters, Gen Singh, who is currently in Jammu and Kashmir, further said his official communication with the Prime Minister and Defence Minister A.K. Antony is “privileged” communication.”The leakage of the letter should be treated as high treason. Cynical approach to tarnish my reputation should stop. Sources of the leakage should be found and dealt with ruthlessly,” said Singh, who is due to retire on May 31.Singh’s leaked letter led to demands by political parties — Samajwadi Party, Janata Dal (United) and Rashtriya Janata Dal (RJD) — for his dismissal on Wednesday even as government and Opposition were agreed his concerns should not have come out in the open.There was a strong demand to launch a probe how the letter was leaked to the media. It was also felt that the Army chief should have first raised his concerns on the risk to the country’s security directly with the Defence Minister. The General was also accused of breach of discipline.The media leak of the letter came on top of an acrimony between the Army chief and the government since early this week over his media interview in which he had claimed that he was offered a bribe of Rs 14 crore by a retired Lt Gen for swinging a sub-standard defence deal.”I have made serious note of the observations. After consulting the prime minister and colleagues, we will take appropriate action,” Antony said in Rajya Sabha on Wednesday after members expressed serious concerns over issues of national security.advertisementlast_img read more

Heise invites mother of Kelsey Smith to testify before House committee on

first_img17Feb Heise invites mother of Kelsey Smith to testify before House committee on Kelsey’s Law State Rep. Kurt Heise and the House Criminal Justice Committee today heard testimony from Missy Smith, the mother of Kelsey Smith, on the importance of allowing police to use a person’s cell phone location in certain emergency situations.House Bill 4006, sponsored by Heise, requires wireless telecommunication providers to disclose a user’s location to police in emergency situations where there is a serious risk of death or bodily harm.“The story of Kelsey Smith is a tragic one,” said Heise, chair of the committee. “We must do everything we can to make sure every Michigan resident is safe, which is possible if we put in place procedures that allow police to respond quickly to save those who are in need of protection.”Missy Smith gave testimony about the horrific story of her daughter’s 2007 death, where Kelsey was kidnapped, raped, sodomized and murdered. During her testimony, she stressed the importance of allowing police to access cell phone locations, noting that if the police had access to Kelsey’s cell phone location she may still be alive today.“In emergency situations, every minute matters,” said Heise, R-Plymouth Township. “We have a duty to make sure that stories like Kelsey’s never happen again. Kelsey’s Law gives our police officers the necessary tools to respond quickly, which can be the difference between life and death.”Heise also said that in order to protect an individual’s privacy and to combat abuse, the bill requires an officer to seek a court order to continue using or requesting pings after 48 hours.HB 4006 unanimously passed the committee and now heads to the House floor.### Categories: Newslast_img read more