Saturday, June 30, 2012

Christian Marriage Suggestions ? Start Healing The Relationship ...

Why is it that Alfredia marriage advice typically seems to be exactly the same, wherever you look? Are you looking for perception that can help you to solve problems and enhance your bond with your spouse? Have you noticed that you might behave as Christians at chapel on Sunday, nevertheless reverted to ungodly behavior during the rest of the week? Whether you are a practicing Religious, or if you are basically seeking some Religious marriage advice as a final solution to conserving a struggling connection, recognizing you have a problem is just the first step. Listed here are three ways you can start recovery your marriage now.

Solve Problems Before They begin: Recognize the Needs Of Each partner

So called christian marriage vows that says one particular partner is more crucial than the other will be wrong! Both wife and husband make important efforts to the marriage and also family, and each an affiliate the relationship has their needs. As a betrothed partner, it is your choice to meet those requires.

Jesus said that as we keep God?s rules, then we demonstrate the love and commitment to him. (John 14:15). God?s best command is the commandment to adore and serve not only him, but the other! Love and provide your spouse by identifying his or her unique bodily, emotional, and non secular needs, and gratifying them as best it is possible to. Both of you will be more happy as a result.

Recovering From Mistrust

Infidelity breaks the covenant with each other, also it breaks our agreement with God! If you believe your spouse is being untrue, find out for sure, and also seek help to resolve your marriage.

If you have been unfaithful, then you need to adopt a close look at precisely why it happened. It can be up to you to work toward repairing the damage that has been caused ? and also take steps to be sure the idea never happens once again.

There are many reasons for cheating within marriage ? and often, they have to do with the fact that certain requirements are not being achieved. If your spouse has been unfaithful, you should pause and consider how to prevent it from happening once again.

Yes, you have the to certainly feel angry along with betrayed if you have been scammed on. Try to eliminate your spouse ? and seek Christian relationship advice from an Orlando marriage counselor. You may be capable of finding help within your belief community, but if you would rather keep your problems confidential, finding help online is simple and effective.

Marriage Coaching Will help you Move Forward

Whether the troubles in your marriage are generally barely even noticeable most of the time, or if you might be constantly struggling, union coaching is one of the finest kinds of ongoing Christian marriage advice you can get. Often, churches provide coaching for people who are in the process of preparing for matrimony, and some churches offer help for people who have any excuses for ongoing help with their relationships. You can learn how to relate to each other better, how to improve your physical connection, and how to really be better
Christians toward each other in your marriage.

For more information about Christian Book Reviews visit our website.

Source: http://www.expertsarticles.com/christian-marriage-suggestions-start-healing-the-relationship/

hilary duff michigan state michigan state city creek center andrew luck pro day josh johnson kim kardashian flour

What You Might Not Be Aware About Singapore Real Estate

With a total land area of 704 square kilometers, Singapore is considered as one of the smaller countries in the world. Strategically located in Southeast Asia, this country boasts of robust economic and commercial activity and is one of the leading financial centers in the world, making it a great place to put money into primary property along with other real estate holdings. The home listings in Singapore's real estate market function a great deal of top-notch residential and business structures which can be ensconced in distinctive compounds and estates which supply superb amenities to possible purchasers. If you are still doubtful, check us out to find more details on V on Shenton.

Since it is comparatively smaller when it comes to land region, a lot of the properties within the market in Singapore are inside the sort of multi-story structures these kinds of as condominiums and superior towers utilized for workplace structures. Though some may possibly feel what this means is tight, crowded rooms with barely sufficient space to maneuver, flats and condominiums are created with operation and spaciousness in head in order that they are ideal for singles, couples, and people who enjoy city everyday living but would really like to have some peace and quiet concurrently.

Do you need more information about Five on Shenton, It is best to go to the mentioned link. Once you acquire property in Singapore, you can find some variables that you just really should contemplate so that you can maximize your house. Select property listings in Singapore which are of greater resale price and return of investment. The value of such homes in these areas is well-known to increase overnight. It may also be beneficial to hunt for attributes having a sales agent. This agent will likely be able to suggest you which parts have a very superior rental yield which might be the spots it is best to stay clear of. It will even be of aid to take take note in the units. Which means a two bed room or a few bed room flats will likely be better than getting greater sized flats for the reason that rental costs can reward you while in the prolonged run. Purchasing homes located in Singapore gives a great deal of advantages.

Once you have worked your sums and they are relaxed together with the budget you've got established, you are willing to go shopping on your home. You most likely have observed residence investment gurus stressing that it is about location when it involves property. In Singapore, qualities located close to facilities are usually in greater demand. Folks are prepared to pay for additional for staying in close proximity to to MRT stations, good colleges, purchasing centres and foods outlets. A home in the vicinity of an international school or even a business park can command better lease.

Site is rather critical since it can have an impact on the standard of one's daily life and also the functionality of one's business when you can be a corporation. In such cases, district maps are available in useful so as to have a have a look at what parts might appeal to you most for you personally as well as your family members or your business. When it comes to companies, everyone knows that place is very important due to the fact site can impact how properly a business does according to what sort of client it is focusing on. If it can be a manufacturer, then a substantial plot of land goes for being desired. But during the circumstance on the individual, site is equally essential because of accessibility to specific requirements and these kinds of.

Last of all, you'll be able to also look at Government Condominiums. They can be smaller than non-public Condominiums but greater compared to normal HDB flats. Executive Condominiums are usually desired by younger partners you aren't capable to afford the greater pricey houses but. You can find many different types of houses available in Singapore nowadays. Selecting the most appropriate form of Singapore residences would require figuring out your desired area, your price range also as other feasible contributing components to seek out the a single you like. Click To Find Out More lavidaatonethirty.

Source: http://www.vh-ulm.de/groups/anonym/weblog/19c10/

pat buchanan slither slither chris christie naacp glen campbell jerusalem artichoke

Friday, June 29, 2012

Chimps attack, severely injure American man at Jane Goodall sanctuary in South Africa

JOHANNESBURG - Chimpanzees at a sanctuary founded by famed primatologist Jane Goodall pulled a Texas graduate student into their fenced-off enclosure, dragging him nearly a half-mile and biting his ear and hands.

Andrew F. Oberle was giving a lecture to a group of tourists at the Chimp Eden sanctuary on Thursday when two chimpanzees grabbed his feet and pulled him under a fence into their enclosure, said Jeffrey Wicks of the Netcare911 emergency services company.

The 26-year-old anthropology student at the University of Texas at San Antonio, suffered "multiple and severe bite wounds," Wicks said.

He was in critical condition Friday after undergoing surgery at the Mediclinic hospital in Nelspruit, 180 miles (300 kilometers) from Johannesburg, hospital officials said.

Oberle, who was doing research at the sanctuary, had crossed the first of two fences separating the chimpanzees from visitors and was standing close to the second fence, which is electrified, at the time of the attack, said Edwin Jay, chairman of the Jane Goodall Institute South Africa.

The sanctuary was temporarily closed after the attack, said David Oosthuizen, the institute's executive director.

"The safety of our visitors and staff is paramount," Oosthuizen said. "We have never had an incident like this, and we have closed the sanctuary to investigate how we can ensure it will not happen again."

Oberle lost part of an ear and parts of his fingers in the attack, according to the South African newspaper Beeld. It said the sanctuary's manager, Eugene Cussons, fired into the air to scare the chimps away from Oberle, then chased them back into their enclosure. Cussons is the host of Animal Planet's "Escape to Chimp Eden."

The two chimpanzees were placed in their night enclosure after the attack and will be held there pending the investigation, after which they would be returned to their enclosure, Jay said.

Steve Ross, an ape expert at Chicago's Lincoln Park Zoo, said chimpanzees are "naturally a fairly violent species, naturally aggressive, very interested in things like power and hierarchy."

Even researchers who understand their power, "sometimes just relax a little bit," Ross said. "And you can never relax with these chimps. They are so unbelievably fast, strong, and they're always looking for an opportunity."

Ross has worked to raise awareness, but says many chimpanzees are still bred and sold as pets in the United States. People who raise them from infancy often end up trying to place them in zoos when they become aggressive adolescents.

The Goodall institute opened the Chimpanzee Eden sanctuary in 2006 as a haven for chimpanzees, which are not native to South Africa, rescued from elsewhere in Africa. Some lost their parents to poachers in countries where they are hunted for their meat or to be sold as pets, and others were held in captivity in cruel conditions.

According to the sanctuary's website, one of the animals involved in the attack, a chimp named Amadeus, was orphaned in Angola and brought to South Africa in 1996, where he was kept at the Johannesburg Zoo until the sanctuary opened. The other, named Nikki, came from Liberia in 1996 and was among the first chimps at the sanctuary. Before arriving, he had been treated like a son by his owners, who dressed him in clothes, shaved his body and taught him to eat at a table using cutlery, the website said.

In the United States, a Connecticut woman, Charla Nash, was attacked in 2009 by a friend's chimpanzee that ripped off her nose, lips, eyelids and hands before being killed by police. The woman was blinded and has had a face transplant. Lawyers for Nash filed papers this week accusing state officials of failing to seize the animal before the mauling despite a warning that it was dangerous.

Claire Jones, spokeswoman for the Jane Goodall Institute, said in an email that Goodall would have no comment "out of respect for the young man and his family."

Goodall, a Cambridge University-trained ethnologist, began studying chimpanzees in Tanzania's Gombe National Park in 1960. Since 1994, her institute has been involved in conservation programs across Africa. The institute says its Tchimpounga Chimpanzee Rehabilitation Center in Congo is the largest chimpanzee sanctuary in Africa.

____

Associated Press writers Paul Weber in San Antonio, Texas, and Kim Chakanetsa in Johannesburg contributed to this report.

Source: http://www.startribune.com/world/160810665.html

katy perry and russell brand katy perry divorce brock lesnar retires new years wake forest wake forest old dominion

Bing Venue Maps gets global-sized update, makes Euros' shopping trips easier

Bing Venue Maps gets global-sized update, makes Euros' shopping trips easier

In case you thought all those 165TB of satellite shots would slow down the Bing Maps updates -- think again. And while this one might not be as loaded as the aforementioned goods, the latest refresh to Redmond's mapping service is likely to make at least a few shopaholic Europeans very happy. To make things short, Microsoft -- in partnership with Nokia -- is taking Bing Venue Maps over to the Vieux Continent, boosting the total number of mall-friendly maps to over 2,700, and making it more than 30 countries in which the offering's now live. For those unfamiliar with Venue Maps, the service allows you to find stores, bathrooms and even ATMs located within a good amount of shopping malls across North America, Europe and Asia. Even better, you can see if your favorite spot is one of them at the source link below, where you'll find the full list of venues supported.

Continue reading Bing Venue Maps gets global-sized update, makes Euros' shopping trips easier

Bing Venue Maps gets global-sized update, makes Euros' shopping trips easier originally appeared on Engadget on Thu, 28 Jun 2012 20:54:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceBing Maps  | Email this | Comments


Source: http://feeds.engadget.com/~r/weblogsinc/engadget/~3/Spz48R2JZtU/

michael buble michael buble teddy roosevelt rita hayworth rita hayworth lakers rumors alfa romeo giulietta

Former Michigan GOP Spokesman Asks If 'Armed Rebellion' Needed Over Supreme Court Ruling

Like many conservatives, Matt Davis, the former spokesman for the Michigan Republican Party, was upset that the Supreme Court upheld most of President Obama?s health care law on Thursday.

But unlike those who simply saw it as a rallying cry to elect more conservatives in November, Davis wants to know whether an ?armed rebellion? will be necessary to overturn the law.

Michigan Capitol Confidential got a copy of an email the Michigan attorney sent to fellow conservatives after the ruling. The news service posted it online:

If government can mandate that I pay for something I don?t want, then what is beyond its power? If the Supreme Court?s decision Thursday paves the way for unprecedented intrusion into personal decisions, then has the Republic all but ceased to exist? If so, then is armed rebellion today justified?

God willing, this oppression will be lifted and America free again before the first shot is fired.

Davis told the news service he was serious about his email.

?You can?t have people walking with lattes and signs and think the object of your opposition is going to take you seriously,? he told Capitol Confidential. ?Armed rebellion is the end point of that physical confrontation.?

(h/t @maddow)

Image via Shutterstock/Donald Gargano

Guns, HCR/SCOTUS, Michigan, Supreme Court
Nick R. Martin

Nick Martin is a reporter for TPMMuckraker. He comes to the site from Arizona, where he worked as a freelance journalist, investigating serial killers, extremist groups, politicians and scoundrels of all stripes for a variety of local and national news outlets. He also operated the award-winning news blog, Heat City. Contact him: nick [at] talkingpointsmemo.com

Source: http://feedproxy.google.com/~r/TPMmuckraker/~3/YUZod6pAJTw/michigan_matt_davis_gop_armed_rebellion.php

oosthuizen great expectations jake owen oosthuizen louis double eagle bubba masters winner

Thursday, June 28, 2012

India for big push to investment in Afghanistan

?Let the grey suits of company executives take the place of olive green or desert brown fatigues of soldiers and CEOs?

India has called for greater private investments in Afghanistan, which will help replace military fatigues now dominating the country with grey suits of company executives.?

?Let the grey suits of company executives take the place of olive green or desert brown fatigues of soldiers and CEOs, the place of Generals?there should be something productive in its place, said External Affairs Minister S. M. Krishna while inaugurating the first ever regional conference on Afghanistan, jointly organised by the Ministry of External Affairs and the Confederation of Indian Industry, here on Thursday.

The tone for an upbeat narrative on economic opportunities in Afghanistan was set the previous night by India?s Permanent Representative in the United Nations Hardeep Puri during a discussion in the Security Council. ?We see the Delhi Investment Summit as a critical link between the Istanbul Process and the Tokyo Conference on July 8. The summit will also be helpful in countering the current narrative of anxiety of withdrawal and in reversing it with a narrative of opportunity and hope,?? he had observed.

Mr. Krishna and Mr. Puri were wary of the security situation and felt the?security gains achieved during the last decade in Afghanistan were still tenuous and fragile.?From the Afghan side, Foreign Minister Zalmai Rassoul dwelt on the security considerations and Commerce and Industry Minister Anwar-ul-Haq Ahady on the advantages and downside of doing business.

These?senior political figures from Kabul were frank with their appraisal of the current situation, confessing that they had to make efforts to improve the security situation as well as ease of doing business.

?Despite high level of return on investments and our efforts and measures to create enabling environment for investment, one of the major factors, which has significant impact on the level of investor interest in Afghanistan, is concern over security. While it?s true that there are certain areas in Afghanistan where security situation is no ideal, we should remember that these areas represent a small part of the country,?? said Mr. Rassoul.

Mr. Ahady acknowledged Afghanistan?s low ranking in the World Bank?s Doing Business Indicators (DBI) and complaints about business climate getting affected by administrative obstacles.

'; } else if (google_ads[0].type == "html") { s += google_ads[0].snippet; } else if (google_ads[0].type == "text") { // Adjust text sizes to occupy the majority of ad space. if (google_ads.length == 1) { ad_title_class = 'ad_title_large'; ad_text_class = 'ad_text_large'; ad_url_class = 'ad_url_large'; } else { ad_title_class = 'ad_title'; ad_text_class = 'ad_text'; ad_url_class = 'ad_url'; } for(var i=0; i

rising stars challenge star trek 2 kathy ireland brooke mueller all star weekend lent undercover boss

In Age of Hulu, Netflix, YouTube, House Hearing Tackles Online Video

If there?s one thing everyone can agree on about today?s communications laws, it's that they?re woefully out of date. Crafted years before Netflix, Google or Apple offered video programming on the Internet, the laws regulating cable and satellite TV and TV broadcasting say nothing about their new competitors.

Now, in addition to the dispute between pay TV providers and broadcasters over carriage deals, there are emerging issues for online video providers like Netflix that depend on Internet service providers like the cable systems for their distribution.

During the future of video hearing before a House subcommittee Wednesday, lawmakers heard from an all-star panel of execs representing the old and new in TV video services, touching on a broad range of issues.
.
?The Federal Communications Commission regulates based on a bygone era,? said Rep. Greg Walden (R-Ore.), chairman of the House Subcommittee on Communications and Technology. Walden specifically referred to the 1992 Cable Act, when cable TV controlled 98 percent of the pay TV market. Today, that?s dropped to 53 percent. ?It was meant to spur competition and it worked. But the act does not apply to YouTube, iTunes, Netflix, Amazon, Hulu, Roku and Sky Angel.?

The hearing comes amid reports that the Dept. of Justice has opened up an antitrust investigation into whether cable companies are using broadband data caps to steer consumers to their own Internet video services and discourage, by pricing, the usage of video services not controlled by the cable company. It?s been a pet issue of Netflix, which has accused Comcast of doing just that.

?When you couple limited broadband competition with a strong desire to protect a legacy video distribution business, you have both the means and motivation to engage in anti-competitive behavior,? David Hyman, Netflix?s general counsel, told lawmakers. ?Add to this mix a regulatory and legislative framework largely crafted before the modern Internet era, and you have the makings for confusion and gamesmanship.?

Taking on the attacks, Michael Powell, former FCC commissioner and president and CEO of the National Cable and Telecommunications Association, called accusations that the cable industry is involved in any effort to stop Netflix and others is ?flatly wrong and belied by the facts.?

?Netflix is the largest provider of subscription video in the country,? Powell said. ?We sell broadband. Their services help stimulate the services we sell.?

Dish Network?s chairman Charlie Ergen has never been shy about his continuing dissatisfaction with rules that he says give broadcasters the edge in retransmission negotiations. He used the hearing to open those old rules and defend Auto Hop, a technology that has enraged broadcasters because it allows its subscribers to automatically skip all commercials during prime-time programming.

Sky Angel, which recently lost access to distribute CSPAN and Discovery over its Internet video service, argued for some of the protections regulations give cable operators but not others.

?Everybody wants a little better deal, the other guy?s deal,? noted Walden.

Lawmakers will need more than one hearing to figure out which rules should be tossed or if new ones should be written.

?I know it?s too late to do a bill in this Congress," said Rep. Joe Barton (R-Tex). ?In general, I think we need less regulation than more. I look forward to big things happening in the next Congress, but it has to be done in a bipartisan basis.?

ncaa oakland news alec baldwin alec baldwin college basketball oakland pinnacle airlines

EU Oil Embargo on Iran Goes into Effect Sunday

backgroundblue line Thursday 28th June, 2012

EU Oil Embargo on Iran Goes into Effect Sunday ??



?????Thursday 28th June, 2012??Source: VOA ??
LONDON -- European Union sanctions on Iran's oil industry go into full effect on Sunday, adding to the pressure on Iranian leaders to negotiate a settlement of the international concerns about their nuclear program.
The world runs on oil, much of it transported on ships from countries in the Middle East, including Iran.
But the European Union has all but stopped its imports from Iran, and the flow will stop completely by Sunday.
The m...
Read the full story at VOA

Breaking News
Thursday 28th June, 2012


Our network flyer service provides a medium for putting your important news into a flyer on the web.
Whether it be a new product launch, announcing a community event, promoting a Web site, or advertising your business, then our Network Flyers service is for you.
Click here for more details

oklahoma city thunder act rajon rondo sunoco titanic ii babe ruth new jersey nets

Wednesday, June 27, 2012

Breaking News! Aaron Walker SWATted? ? The Daley Gator

Bob Belvedere has the scoop

All we have is Aaron?s Tweet so far [tip of the fedora to?Stacy McCain]:

Aaron Worthing??@AaronWorthing?6m

BREAKING NEWS: tonight I was swatted. More details to come.

More when I get it.

[This post will remain at the top of this column until further notice]

UPDATED at 1935?

The?latest Tweet?from Aaron:

Aaron Worthing??@AaronWorthing

My wife and I are safe. Will be more details when I can provide it. Wife was very upset dealing with her.

UPDATE at 2011?

-Twitchy is on the story and updating?here.

-From?Joe Brooks:

Brett Kimberlin ally makes blind threat on his website (no safe link available):

?And speaking of fun? I?m told that we have something coming up in the future ourselves that will be killer diller! Hot stuff. Hubba hubba! And I ain?t kidding. I haven?t even been told who it is yet, and already I?m looking forward to it. ?

More details coming soon.

Hmmm.

UPDATE at 2017?

From Patterico:

No joke. It happened around 6 p.m. Eastern. I briefly talked with one of the police officers at the scene, who confirmed that someone had called saying he had shot his wife, and sent officers to Aaron?s address.

He also reports the police has machine guns at the ready.

UPDATE at 2037?

The?latest Tweet?from Dustin:

Dustin ?@Dust92

Spoke with Aaron. He?s OK. He?ll put a post up tonight, but it?ll be a bit.

Expect more Updates.

Bob has more, as does Stacy McCain?It looks as if some miscreants are up to their same old games, and Stacy notes that this comes right on the heels of a legal victory for Walker

At a hearing this morning in Rockville, Maryland, a Montgomery County Circuit Court granted an emergency motion on behalf of attorney/blogger Aaron Walker. The effect of the ruling will permit Walker to resume writing and speaking about convicted terrorist bomber Brett Kimberln.

Judge Nelson W. Rupp Jr. presided over today?s hearing, with attorneyReginald W. Bours III?representing Walker, who did not attend the hearing at Judicial Center in Rockville. In a brief telephone interview, Walker said that Kimberlin filed a counter-motion that did not address the First Amendment legal issues at stake, but rather ?made a bunch of new accusations? against Walker.

It is important to note that Judge Rupp?s ruling only temporarily permits Walker to speak and write about Kimberlin, pending a July 5 hearing in Maryland state appeals court. Walker is appealing a May 29 ruling by Montgomery County District Court Judge C.J. Vaughey that granted a peace order sought by Kimberlin against Walker.

Walker said he plans to file a report on today?s hearing at?his blog, Allergic to Bull. A Virginia attorney, Walker has become the center of national attention since May 17, when he published a 28,000-word blog post entitled, ?How Brett Kimberlin Tried to Frame Me for a Crime (And How You Can Help!).? Walker?s post highlighted Kimberlin?s?long-running efforts harass and intimidate bloggers who had written about Kimberlin?s criminal history.

Go read the rest. The Kimberlin/Rauhauser/SWATting story has ?twist after twist, after twist.

UPDATE! Lee Stranahan at Breitbart has more

Breitbart News contacted the Prince William County, Virginia police department to confirm the swatting. A dispatcher affirmed that police were called to the home of Mr. Walker based on a fraudulent 911 call. The individual did not take the call and could not disclose any details of the call?s content but immediately confirmed that Mr. Walker had been swatted.?

The swatting occurred hours after Walker?s hearing. A judge had modified a previous ruling that prohibited Mr. Walker from exercising his right to free speech.?

Walker told Breitbart News that he was home with his wife this evening at approximately 6:00pm when there was a ?pretty insistent? knock at his door. Walker answered to find about six police cars in the street and two officers taking positions against the wall with M4 rifles. Since he was aware of the previous swattings of Patrick ?Patterico? Frey, Erick Erickson, and Mike Stack, Mr. Walker asked the police if someone had called and claimed he had killed his wife, and police confirmed that that was the case.

In a statement to Breitbart News, Walker said,??This is obviously very upsetting but my wife and I are fine. Whoever did this had the intent to put our lives in danger.?

?

Like this:

Be the first to like this.

uk vs louisville university of kansas buckeye west side story final four 2012 bridesmaids winning lottery numbers

Feds: Sting targeted online financial fraud

NEW YORK (AP) ? Two dozen people on four continents, including alleged two hackers from New York, have been arrested in an elaborate sting targeting a black market for online financial fraud, federal officials said Tuesday.

U.S. officials called the crackdown in the United States, Europe, Asia and Australia the largest enforcement effort ever against computer crooks who specialize in stealing and trafficking credit card, bank and other personal identification information on the Internet ? a practice known as "carding."

The officials claimed the two-year FBI sting protected more than 400,000 potential victims and prevented losses of around $205 million.

The arrests "cause significant disruption to the underground economy and are a stark reminder that masked (Internet protocol) addresses and private forums are no sanctuary for criminals and are not beyond the reach of the FBI," Janice Fedarcyk, head of the FBI's New York office, said in a statement.

U.S. Attorney Preet Bharara called the international investigation an unprecedented demonstration that "fraudsters cannot count on being able to prowl the Internet in anonymity and with impunity, even across national boundaries."

According to a criminal complaint unsealed Tuesday in federal court in Manhattan, the suspects bought and sold hacking programs and stolen information via secure websites.

In June 2010, undercover investigators set up their own website "as an online meeting place where the FBI could locate cybercriminals, investigate and identify them and disrupt their activities," the complaint said. The site ? called "Carder Profit" ? was rigged to allow agents to monitor and record private messages and identify the computers of registered users.

The complaints charged two alleged "carders" from the Bronx, Joshua Hicks and Mir Islam, with fraud. Both were released on bail following brief appearances in federal court in Manhattan. Neither entered a plea.

Undercover agents say they bought stolen data related to 15 American Express, MasterCard and Discover accounts from Hicks, a 19-year who lives with his mother and goes by the name "OxideDox" on the Internet.

In one instance, an undercover investigator delivered a digital camera as payment to Hicks for one of the stolen information "dumps," the complaint added. When the agent later asked the defendant in a chat if he liked the camera, the defendant responded, "A different model ... would have been better, but hey, a free camera is a free camera."

Using the name "JoshTheGod", the 18-year-old Islam advised another website user to keep fraudulent purchases from Apple under $350 to avoid detection, the court papers said. He also provided an undercover investigator with credit card numbers and Card Verification Value numbers and corresponding names and addresses, they said.

After Islam's arrest, authorities say Islam admitted that he also used the site to advertise his "doxing" service ? a term referring to the sharing of an "individual's name, address, phone number, date of birth, Social Security number, email address in order to embarrass, harass or retaliate against such individual."

Another defendant from Tucson, Ariz., was accused of trying to sell viruses on the FBI site that was designed to take over and remotely control a victim's computer. The malware programs allowed buyers to turn on the web camera of an infected computer and spy on the users, and to record user names and passwords on bank and other accounts, authorities said.

The registration process for the bogus website required unwitting users "to agree to terms and conditions, including that their activities on the site were subject to monitoring for any purpose," the complaint said.

Investigators made 11 arrests in various states, including New York, Florida, Wisconsin and California. Thirteen others were picked up in the United Kingdom, Bosnia, Norway, Italy, Japan and elsewhere overseas. In addition, search warrants were executed in Australia and Canada.

If convicted, the U.S. defendants face five to 20 years in prison.

___

Associated Press Writer Larry Neumeister contributed to this report.

ipad 3 release date apple store down apple live blog ohio primary cell phone jammer sandra fluke g8 summit

Tuesday, June 26, 2012

Exclusive: Matt Sandusky details abuse at dad's hands

NBC News has exclusively obtained a tape, recorded by police detectives the week before Jerry Sandusky's conviction, in which his own adopted son, Matt, talks about being sexually abused by the former Penn. State coach. NBC's Michael Isikoff reports.

By Michael Isikoff, NBC News

Jerry Sandusky?s adopted son Matt told police he was sexually molested by his father for years ? and once fled in fear from the Sandusky home ? during a secret police interview that took place in the middle of his father?s trial for child sex-abuse, according to a copy of the tape obtained by NBC News. ?? ?

Matt Sandusky, 33, ?said his father would enter his bedroom at night and ?blow raspberries? on his stomach, then move his hand down his body, rubbing up against his genitals. Matt Sandusky said he would sometimes cower ?in a fetal position? in his bed trying to avoid his father. ?? ?

?It just was, just became very uncomfortable. You know, just with everything that was going on,? he said on the tape.?? ?

?What was, what was going on?? a police detective asked.?? ?

?With like the showering, with the hugging, with the rubbing, with the just talking to me. The way he spoke. And just, the whole interaction with him alone. Anything, anytime we were alone just those interactions?? Matt Sandusky said on the tape. ?? ?

But unlike some of the victims who testified at Sandusky?s trial, Matt Sandusky said he could not remember if his father ever actually engaged in certain sex acts with him.??

?You said at the beginning of our interview last night that things happened to you, but there was no, that you can recall, there was no penetration or oral sex. Is that correct?? the police detective asked.??

?Yes. As of this time, I don?t recall that.?? ? ?

NBC News has exclusively obtained the 29-minute audiotape, which was recorded by police detectives on June 15, four days after the Jerry Sandusky trial began. At the time, the detectives were preparing Sandusky?s son to testify as a surprise prosecution witness at his father?s trial.?? ?

For years, Matt Sandusky had publicly stood by his father and even showed up on the first day of the trial, sitting with the rest of the Sandusky family. But after listening to the first day of testimony from a young man known in court documents as "Victim 4," Matt Sandusky contacted police and volunteered to testify on behalf of the prosecution. The prosecutors? plan was to use Matt Sandusky as a rebuttal witness if Jerry Sandusky took the stand in his own defense. ?

It turned out to be a crucial turning point in the Sandusky trial. When Jerry Sandusky learned that his own adopted son was prepared to testify against him, it was a ?complete shock," and it played a big role in his decision not to take the witness stand, according to one of his lawyers, Karl Rominger.?? ?

?You have to understand that Matt has worked with him, Matt has helped the defense, Matt literally carried boxes in the courthouse with us,? Rominger said. ?Matt has given multiple investigators from the government and our side ironclad statements of support for his father.??? ?

?That was the first day where he (Jerry Sandusky) really was visibly shaken, or upset,? Rominger added. Asked how big a role Matt Sandusky played in his client?s decision not to testify, Rominger said: ?It was a huge factor.??? ?

Had Matt Sandusky actually taken the stand, he added, ?We would have hit Matt with both barrels. ? He told the police 'no,' he told our investigator, 'no,' he told the A.G.?s office 'no,' he told the grand jury 'no.' And then one day in the middle of the trial he suddenly says, 'All these things happened?'?? ?

In his interview with police, Matt Sandusky was asked directly why he decided to change his previous denials of abuse and cooperate with police. ?? ?

?I came forward, I mean, for different reasons,? he said. ?But I mean for my family you know so that they can really have closure and see what the truth actually is. And just to right the wrong, honestly, of going to the grand jury and lying.??? ?

Matt Sandusky also said that he has been working with a therapist and, as a result, ?more memories are coming back.? ??

Related stories

Matt Sandusky: From staunch defender to his dad's accuser?

Ghosts of Sandusky's dreams haunt home where his charity was born

Matt met Jerry Sandusky through The Second Mile, the charity the former Penn State University defensive coordinator founded to help at-risk children. Like many other Second Mile boys, he began staying overnight at the Sandusky house. Sandusky?and his wife, Dottie,?later became his foster parents and adopted him at age 18.?? ?

But Matt Sandusky told police he was molested for much of that time, saying?that his father would become sexually aroused by rubbing against him in the shower, during wrestling sessions and in bed. The sexual overtures at one point caused him to try to escape his father?s clutches by fleeing from the house barefoot at night in a thunderstorm and running to his grandfather?s house to hide in the basement.?? ?

On another occasion, he and a girlfriend, who was also staying at the Sandusky house, tried to commit suicide by overdosing on aspirin at a hotel. Matt Sandusky told police he finds it ?hard to believe? that his father?s abuse wasn?t a factor in causing him to try to kill himself, although ?I don?t have any concrete evidence.?? ?

?But I know that I really wanted to die at that point in time so that?s best I can really answer that.? Matt Sandusky also said that his father?s molesting stopped when he started to ?transition? to another young man who used to stay at the Sandusky house. That boy, now a man known in court documents as "Victim 4," was the first witness at Sandusky?s trial, testifying to years of sexual abuse.?

The police detective said on the tape, ?You told us that you feel (Victim 4) took over for you, and that he was your dad?s transition??

?I believe my dad moved on from me to (Victim 4), yes,? Matt Sandusky replied.?? ?

In a statement Monday night to NBC News, Matt Sandusky?s lawyers, Andrew Shubin and Justine Andronici, said: ?This tape demonstrates Matt?s tremendous courage and strength as he begins to disclose that Jerry Sandusky sexually abused him when he was a child. Although the tape was released without Matt?s knowledge or permission, he made the difficult decision to come forward and tell the painful truth to investigators despite the extraordinary pressure to support his father.???

After a two-week trial, Jerry Sandusky was convicted Friday night on 45 of 48 counts of child sex abuse. His lawyer, Rominger, said he was the first to visit Sandusky in jail Monday and described his client as defiant.?? ?

?He?s not a beaten man,? he said. ?He is pacing a cell right now, being held in solitary confinement, wanting to get out and get his story out and continue to defend himself.? He added: ?I don?t think Jerry believes there?s anything to feel sorry for. At this point, he maintains his innocence adamantly.??????

More content from msnbc.com and NBC News:

Follow US News on msnbc.com on Twitter and Facebook

miguel cabrera michael bay ninja turtles san antonio weather mike daisey nicollette sheridan apple dividend snow white and the huntsman

Kids' Lack of Sleep: Nothing New About Blaming It on Modern Life ...

Feb. 13, 2012 ? It is a common complaint of our modern age that kids and teens don?t get enough sleep.

Video games, TV, social media, and other trappings of our increasingly tech-centric lives are often blamed, but a new study shows that long before Facebook or PlayStation 3, kids were sleeping less than experts said they should.

When researchers in Australia reviewed sleep recommendations and actual sleep times among children over the past century, they found that kids consistently slept about 37 minutes less than recommended at the time.

Each time, new technological marvels ? be it the light bulb in the early 1900s, TV in the 1950s, or computer gaming systems and social networking today ? were blamed for declining sleep times.

?The message that children don?t get enough sleep has been the same for over 100 years,? says researcher Tim S. Olds, PhD, of the University of South Australia.

Sleep Recommendations Not Scientific

Olds says health policymakers have been making recommendations about how much sleep children should get each night for more than a century, with very little scientific evidence to back the recommendations up.

That is because studying optimal sleep times during childhood is very difficult.

Getting too little sleep has been linked to an increased risk for obesity, poor school performance, behavioral problems, and substance abuse.

But like adults, individual children and teens appear to have different sleep needs, Olds says.

When they explored sleep recommendations over the last century, Olds and colleague Lisa Anne Matricciani found 32 sets of age-specific sleep recommendations since the late 1800s and about 200 studies examining actual sleep times among children and teens.

On average, age-specific sleep recommendations declined by about 0.71 minutes per year between 1897 and 2009, and this paralleled a similar decline in sleep times.

Actual sleep times were consistently 37 minutes less than recommended over the observation period.

The study appears online today and in the March issue of the journal Pediatrics.

?The rationale for sleep recommendations was also strikingly consistent for more than 100 years: Children were overtaxed by the stimulation of modern living, although that stimulation was embodied in whatever the technological avatar of the time was,? the researchers write.

Some Kids Need More Sleep, Some Need Less

According to the National Sleep Foundation, school-aged children who are 12 and under need at least 10 to 11 hours of sleep each night, while teenagers need eight-and-a-half to nine-and-a-half hours of sleep.

Olds says parents should not be too concerned if their children or teens get a little more or a little less sleep each night, as long as they seem to be functioning well at home and school.

Pediatric sleep specialist William Kohler, MD, agrees.

Kohler is medical director of the Florida Sleep Institute at Florida Hospital in Tampa.

?A child who is alert and doing well in school with no behavioral issues is probably getting enough sleep,? he says.

But he adds that when there are issues, poor sleep quantity or quality should be one of the first suspects.

?We may not have good standards for understanding how much sleep an individual child needs, but there is plenty of good evidence that getting too little sleep or having poor-quality sleep leads to a wide range of health and behavioral problems,? he tells WebMD.

sleigh bells meek sturgis sturgis whitney houston laid to rest daytona bike week amazing race

Celebrate (Or Mourn) the Court?s Obamacare Decision at Power Line Live (Powerlineblog)

Share With Friends: Share on FacebookTweet ThisPost to Google-BuzzSend on GmailPost to Linked-InSubscribe to This Feed | Rss To Twitter | Politics - Top Stories News, RSS Feeds and Widgets via Feedzilla.

bobby brown leaves funeral donnie mcclurkin whitney houston funeral live stream kevin costner whitney houston whitney houston funeral live pat buchanan slither

Monday, June 25, 2012

Bar Jar shooting victim remembered (Rochester Democrat and Chronicle)

Share With Friends: Share on FacebookTweet ThisPost to Google-BuzzSend on GmailPost to Linked-InSubscribe to This Feed | Rss To Twitter | Politics - Top Stories News, RSS Feeds and Widgets via Feedzilla.

lisa marie presley florida panthers tannehill joel ward mock draft dr oz washington redskins

Nano-sandwich technique slims down solar cells, improves efficiency

ScienceDaily (June 25, 2012) ? Researchers from North Carolina State University have found a way to create much slimmer thin-film solar cells without sacrificing the cells' ability to absorb solar energy. Making the cells thinner should significantly decrease manufacturing costs for the technology.

"We were able to create solar cells using a 'nanoscale sandwich' design with an ultra-thin 'active' layer," says Dr. Linyou Cao, an assistant professor of materials science and engineering at NC State and co-author of a paper describing the research. "For example, we created a solar cell with an active layer of amorphous silicon that is only 70 nanometers (nm) thick. This is a significant improvement, because typical thin-film solar cells currently on the market that also use amorphous silicon have active layers between 300 and 500 nm thick." The "active" layer in thin-film solar cells is the layer of material that actually absorbs solar energy for conversion into electricity or chemical fuel.

"The technique we've developed is very important because it can be generally applied to many other solar cell materials, such as cadmium telluride, copper indium gallium selenide, and organic materials," Cao adds.

The new technique relies largely on conventional manufacturing processes, but results in a very different finished product. The first step is to create a pattern on the substrate using standard lithography techniques. The pattern outlines structures made of transparent, dielectric material measuring between 200 and 300 nm. The researchers then coat the substrate and the nanostructures with an extremely thin layer of active material, such as amorphous silicon. This active layer is then coated with another layer of dielectric material.

Using dielectric nanostructures beneath the active layer creates a thin film with elevated surfaces evenly spaced all along the film -- like crenellations at the top of a medieval castle.

"One key aspect of this technique is the design of the 'nanoscale sandwich,' with the active materials in the middle of two dielectric layers. The nanostructures act as very efficient optical antennas," Cao says, "focusing the solar energy into the active material. This focusing means we can use a thinner active layer without sacrificing performance. In the conventional thin-film design, using a thinner active layer would impair the solar cell's efficiency."

The paper, "Dielectric Core-shell Optical Antennas for Strong Solar Absorption Enhancement," is published online in Nano Letters. Lead author of the paper is Yiling Yu, a Ph.D. student at NC State. Co-authors include Drs. Vivian Ferry and Paul Alivisatos of the University of California, Berkeley. The research was supported, in part, by the U.S. Department of Energy.

Share this story on Facebook, Twitter, and Google:

Other social bookmarking and sharing tools:


Story Source:

The above story is reprinted from materials provided by North Carolina State University.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Journal Reference:

  1. Linyou Cao, Yiling Yu, A. Paul Alivisatos, Vivian E. Ferry. Dielectric Core-shell Optical Antennas for Strong Solar Absorption Enhancement. Nano Letters, 2012; 120611122627002 DOI: 10.1021/nl301435r

Note: If no author is given, the source is cited instead.

Disclaimer: Views expressed in this article do not necessarily reflect those of ScienceDaily or its staff.

lyme disease symptoms cardinals jessica sanchez robert kennedy san diego weather north korea frances bean cobain

Teen lesbian couple shot in Texas park

By Miranda Leitsinger, msnbc.com

Police are investing the shooting of two teenage girls in a small Texas community along the Gulf of Mexico. KRIS reporter Lindsay Curtis has the story.

Two teenage girls in a relationship were found with gunshot wounds to the head in a south Texas park, with one of them dying from her injuries, media reports say. Police were searching for the gunman.

Mollie Judith Olgin, 19, and Mary Christine Chapa, 18, were found in knee-deep grass in a nature area in Portland by a couple Saturday, said Portland Police Chief Randy Wright, who confirmed to msnbc.com details first reported by the Corpus Christi Caller Times.


Olgin, originally from Ingleside but recently living in Corpus Christi, died; Chapa, of Sinton, was rushed to a hospital where she had surgery and was in serious but stable condition on Sunday, local NBC affiliate kristv.com reported. Wright said Chapa was still in the hospital on Monday.

Friends told local NBC affiliate, kristv.com, that the girls had been together five months. Wright said he didn?t have any information about their relationship, noting that ?we understood from their friends that they were (in a romantic relationship). I know from ? Mollie?s parents that they were very close.?

When asked if police had been able to determine if the girls' sexuality played any role in the shootings, Wright told msnbc.com: ?That?s always something that we?re looking for, but as of this point, we have not been able to establish that that had anything to do with the attack.?

He said they had been in communication with Chapa. He noted all indications were that ?third parties? were involved in the assault.

?If we had a name, you know, we?d be having a different conversation right now. But we have not been able to gather enough information to identify a suspect yet,? he said. ?It appears as if ? this was not just a random attack but that?s something that we really have to develop over time.?

Wright said police had recovered a bullet casing from a large-caliber gun at the scene, but they haven?t found the weapon. A resident living nearby reported hearing two loud bangs Friday before midnight but believed?they were?from firecrackers, the newspaper said.

The park, more of nature area with some parts overgrown and no lights, was generally frequented by visitors during the day. It is located along a bluff overlooking a bay, Wright said, with some homes situated nearby.

?We?re not really sure how they got to the point that they were found,? he said of the girls. ?It is a scenic overlook with a wooden deck and there is a place at the edge of the deck where you can actually go down a very steep incline into a grassy area that leads down to the shoreline and that?s where they found.?

Friends of the girls gathered at a local high school on Sunday. Olgin's roommate, Samantha Garrett, told kristv.com that the fun-loving couple hadn?t gotten any negative responses to their relationship and could not think of why anyone would want to harm them.

The crime rate is low in Portland, a bedroom community of Corpus Christi on the Gulf of Mexico, Wright said. The last homicide occurred two years ago.

More content from msnbc.com and NBC News:

Follow US News on msnbc.com on Twitter and Facebook

magic johnson jetblue pilot solicitor general neighborhood watch dennis rodman dodgers sale tami roman

Euro in good shape despite Spain's woes: Nowotny

[ [ [['Connery is an experienced stuntman', 2]], 'http://yhoo.it/KeQd0p', '[Slideshow: See photos taken on the way down]', ' ', '630', ' ', ' ', ], [ [['Connery is an experienced stuntman', 7]], ' http://yhoo.it/KpUoHO', '[Slideshow: Death-defying daredevils]', ' ', '630', ' ', ' ', ], [ [['know that we have confidence in', 3]], 'http://yhoo.it/LqYjAX ', '[Related: The Secret Service guide to Cartagena]', ' ', '630', ' ', ' ', ], [ [['We picked up this other dog and', 5]], 'http://yhoo.it/JUSxvi', '[Related: 8 common dog fears, how to calm them]', ' ', '630', ' ', ' ', ], [ [['accused of running a fake hepatitis B', 5]], 'http://bit.ly/JnoJYN', '[Related: Did WH share raid details with filmmakers?]', ' ', '630', ' ', ' ', ], [ [['accused of running a fake hepatitis B', 3]], 'http://bit.ly/KoKiqJ', '[Factbox: AQAP, al-Qaeda in Yemen]', ' ', '630', ' ', ' ', ], [ [['have my contacts on or glasses', 3]], 'http://abcn.ws/KTE5AZ', '[Related: Should the murder charge be dropped?]', ' ', '630', ' ', ' ', ], [ [['have made this nation great as Sarah Palin', 5]], 'http://yhoo.it/JD7nlD', '[Related: Bristol Palin reality show debuts June 19]', ' ', '630', ' ', ' ', ], [ [['have made this nation great as Sarah Palin', 1]], 'http://bit.ly/JRPFRO', '[Related: McCain adviser who vetted Palin weighs in on VP race]', ' ', '630', ' ', ' ', ], [ [['A JetBlue flight from New York to Las Vegas', 3]], 'http://yhoo.it/GV9zpj', '[Related: View photos of the JetBlue plane in Amarillo]', ' ', '630', ' ', ' ', ], [ [['the 28-year-old neighborhood watchman who shot and killed', 15]], 'http://news.yahoo.com/photos/white-house-stays-out-of-teen-s-killing-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/cv/ip/ap/default/120411/martinzimmermen.jpg', '630', ' ', 'AP', ], [ [['He was in shock and still strapped to his seat', 6]], 'http://news.yahoo.com/photos/navy-jet-crashes-in-virginia-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/cv/ip/ap/default/120406/jet_ap.jpg', '630', ' ', 'AP', ], [ [['xxxxxxxxxxxx', 11]], 'http://news.yahoo.com/photos/russian-grannies-win-bid-to-sing-at-eurovision-1331223625-slideshow/', 'Click image to see more photos', 'http://l.yimg.com/a/p/us/news/editorial/1/56/156d92f2760dcd3e75bcd649a8b85fcf.jpeg', '500', ' ', 'AP', ] ]

[ [ [['did not go as far his colleague', 8]], '29438204', '0' ], [ [[' the 28-year-old neighborhood watchman who shot and killed', 4]], '28924649', '0' ], [ [['because I know God protects me', 14], ['Brian Snow was at a nearby credit union', 5]], '28811216', '0' ], [ [['The state news agency RIA-Novosti quoted Rosaviatsiya', 6]], '28805461', '0' ], [ [['measure all but certain to fail in the face of bipartisan', 4]], '28771014', '0' ], [ [['matter what you do in this case', 5]], '28759848', '0' ], [ [['presume laws are constitutional', 7]], '28747556', '0' ], [ [['has destroyed 15 to 25 houses', 7]], '28744868', '0' ], [ [['short answer is yes', 7]], '28746030', '0' ], [ [['opportunity to tell the real story', 7]], '28731764', '0' ], [ [['entirely respectable way to put off the searing constitutional controversy', 7]], '28723797', '0' ], [ [['point of my campaign is that big ideas matter', 9]], '28712293', '0' ], [ [['As the standoff dragged into a second day', 7]], '28687424', '0' ], [ [['French police stepped up the search', 17]], '28667224', '0' ], [ [['Seeking to elevate his candidacy back to a general', 8]], '28660934', '0' ], [ [['The tragic story of Trayvon Martin', 4]], '28647343', '0' ], [ [['Karzai will get a chance soon to express', 8]], '28630306', '0' ], [ [['powerful storms stretching', 8]], '28493546', '0' ], [ [['basic norm that death is private', 6]], '28413590', '0' ], [ [['songwriter also saw a surge in sales for her debut album', 6]], '28413590', '1', 'Watch music videos from Whitney Houston ', 'on Yahoo! Music', 'http://music.yahoo.com' ], [ [['keyword', 99999999999999999999999]], 'videoID', '1', 'overwrite-pre-description', 'overwrite-link-string', 'overwrite-link-url' ] ]

duggars peter facinelli bobby rush supreme court justices 19 kids and counting danny o brien alicia silverstone

Sunday, June 24, 2012

Mowing the Law: Evolution of Indian Cyber Law from 2000 to 2012

Introduction :- ?

? ?The internet interprets the US congress ?as? system damage and route around it?? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ??Jeanne DeVoto.? ??

hand cuff arrested keyboard computer amendment of it act 2000, e-mail laws, indian evidence act, information technology, it act 2008, monica mishra legal awareness, offences, The Evolution of Indian Cyber Law from 2000 to 2012?Computer crime, or?cybercrime, refers to any crime that involves a computer and network. The computer may have been used in the?commission of a crime, or it may be the target. Net crime?refers to criminal exploitation of the?Internet. Cybercrimes are
defined as :- "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the?victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat?rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation?s security and financial?health. Issues surrounding this type of crime have become high-profile, particularly those surrounding?cracking,?copyright infringement,?child pornography, and?child grooming. There are? problems of?privacy?when?confidential?information is lost or intercepted, lawfully or otherwise. ? (Image taken from here.)? ? ? ? ? ? ? ? ? In simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both .Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.

????? Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000.?? We can categorized cyber crimes in two ways they are :-1. The Computer as a Target :- using a computer to attack other computers.e.g. ?Hacking, Virus/Worm attacks, DOS attack etc.2.The computer as a weapon :- using a computer to commit real world crimes.e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
Cyber Crime regulated by Cyber Laws or Internet Laws.

?Part I

(a)????????????????? Evolution of cyber law :- ?Rohas? Nagpal is the founder President of Asian School of Cyber Laws. he advises Governments and corporate around the world in cyber crime investigation and cyber law related issues. He has assisted the Government of India in drafting rules and regulations under the Information Technology Act, 2000.?The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since

3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to?discourage Jacquard from further use of the new technology. This is the first recorded cyber crime! Today, computers have come a long way with neural networks and nanocomputing promising to turn every atom in a glass of water into a computer capable of performing a billion operations per second. In a day and age when everything from microwave ovens and refrigerators to nuclear power plants are being run on computers, cyber crime has assumed rather sinister implications. Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief. The abuse of computers has also given birth to a gamut of new age crimes such as hacking, web defacement, cyber stalking, web caking etc.

A simple yet powerful definition of cyber crime would be either a tool of ?unlawful acts wherein the computer is either a tool or target or both?.? The term computer used in this definition does not only mean the conventional desktop or laptop computer. It includes Personal Digital Assistants (PDA), cell phones, sophisticated watches, cars and a host of gadgets.(b)????????????????? Technical AspectsTechnological advancements have created new possibilities for criminal activity, in particular the criminal misuse of information technologies such as :-

?? Unauthorized access & Hacking:-Access means gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network.Unauthorized access would therefore mean any kind of access without the permission of either the rightful owner or the person in charge of a computer, computer system or computer network.

The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. The name Trojan Horse is popular .Trojans come in two parts, a Client part and a Server part. When the victim (unknowingly) runs the server on its machine, the attacker will then use the Client to connect to the Server and start using the trojan.TCP/IP protocol is the usual protocol type used for communications, but some functions of the trojans use the UDP protocol as well. (Image taken from here.)

c. Virus and Worm attack:-A program that has capability to infect other programs and make copies of itself and spread into other programs is called virus. programs that multiply like viruses but spread from computer to computer are called as worms.

d. E-mail & IRC related crimes:-Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source.

Email "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter. (Image taken from here.)

3. Sending malicious codes through emailE-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code.E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.5. Sending threatening emails8. IRC related.? Three main ways to attack IRC are: a."verbal??8218;??#8220; .attacks, b.clone attacks, and c.flood attacks.(c)? Cyber law India ?:-? INDIA PASSES ITS FIRST CYBERLAW WITH ?DRACONIAN POWERS ?by , SHRI PAVAN DUGGAL, CYBERLAW CONSULTANT, PRESIDENT, CYBERLAWS.NET member, MAC, ICANN. ?Before the ICANN , The government of united states controlled the domain name system of internet . The original mandate ICANN came from the united state government, spanning the presidential administration of both Bill CLINTON and and George W. Bush. On January 30, 1998 The national telecommunication and information administration (NTIA), an agency of the U.S.? department of commerce , issued for comment ,? A Proposal to Improve the Technical Management of Internet Names and Addresses." The proposed rule making, or "Green Paper", was published in the Federal Register on February 20, 1998, providing opportunity for public?comment NTIA received more than 650 comments as of March 23, 1998, when the comment period closed. The Green Paper proposed certain actions designed to privatize the management of Internet names and addresses in a manner that allows for the development of robust competition and facilitates global participation in Internet management. The Green Paper proposed for discussion a variety of issues relating to?DNS?management including private sector creation of a new not-for-profit corporation (the "new corporation") managed by a globally and functionally representative Board of Directors ICANN was formed in response to this?policy The?IANA?function currently exists under an agreement with the?U.S. Department of Commerce ICANN was incorporated in California on September 30,1998.

The Parliament of India has passed its first Cyber law, the Information?Technology Act, 2000 which not only provides the legal infrastructure for??E-commerce in India but also at the same time, gives draconian powers to?the Police to enter and search, without any warrant , any public place? for? the? purpose? of nabbing cyber criminals and preventing cyber crime.???????????????????????? ? ? ? ? ? ? ? ? ?

The good features of the said IT Act are that? it? legally recognizes email as? a valid form of? communication in India.? Also acceptance in a electronic? form? of any offer, culminating into an electronic contract ,has also been declared legal and enforceable. The new act has recognized digital? signature for the first time in Indian law . The said new law has also?granted a hierarchy of infrastructure consisting of a Controller for?? certifying authorities, Adjudicating Officers and Cyber Appellate? Tribunal.?The? most? distressing part of the new IT Act 2000 is its absolute trampling? of cyber liberties and freedom. A police officer of the rank a Deputy?superintendent of Police has? been? granted? unheard of powers in Cyber law? history to do almost anything for the purpose of nabbing a cyber criminal. The said unrestricted power given to police officer is in the form of an absolute discretion given to the police officer to enter and search any? public place and arrest any person without? warrant? who is? "reasonably suspected" of having committed or of committing a cyber crime? or if he is? about? to commit a cyber crime. The discretion of the police officer further extends to defining as to who is going to be "reasonably suspected"? of a? cybercrime.? Also, the? Indian Cyber law talks of the arrest of any person who is about to commit a cyber crime. It is indeed alien to Cyber law jurisprudence as to how any police officer is going to decide as to whether a person is about to commit? a cybercrime.? Also, the? requirements of cyberspace are very different from the actual world. Most of the times, it is difficult to? decide? till? the? last? moment? as? to? whether? any? cybercrime? is?? about?? to?? be committed.?To top it all, the IT Act,? 2000 ?gives immunity to the? Central Government? and?? its officials including police? from any suit, prosecution and other legal proceedings for any act done in good faith in pursuance of the provisions of? the Act. Effectively , this rules out any remedy for? any? person who is made a target of abuse and misuse of discretion by the police.


?????????????????????????????????????????????????????????????? Part IITHE INFORMATION TECHNOLOGY ACT, 2000 - INDIA 'S FIRST CYBERLAW????? Aims to provide the Legal infrastructure for e-commerce in India.????? India?s codified cyber Law is the Information technology Act,2000 (act 21 of 2000)????? Based on INCITRAL model Law on electric commerce , 1996.????? IT act is divide into 13 chapter and has 94 sections.????? Administration to IPC , Indian evidence Act, bankers evidence Act and RBI act have??? been effected.? THE ACT PROVIDE FOR :-????? Legal recognition of Electronic Document.????? Legal Recognition of Electronic Commerce transition.????? Legal acceptance of digital signatures.????? Punishment for cyber obscenity and crimes.????? Establishment of Cyber regulation advisory committee and the cyber regulations? appellate tribunals.????? Facilitation of electronic filing maintenance of electronic records.?? THE IT ACT 2000 ? OBJECTIVES????? To provide for Legal recognition for transaction.????? Carried out by electronic data interchange and,????? Other means of electronic communication commonly referred to as ? electronic commerce?, involving the use of alternatives to paper- based methods of communication and storage of information,????? To facilitate electronic filing of documents with the government agencies.????? To amend the Indian Penal Code, the Indian evidence act ,1872, the banker?s book evidence act ,1981 and the Reserve bank of India act,1934.????? Aims to provide for the Legal framework so the legal sanctity is accorded ?to all electronic records and other activities carried by electronic means.??

ACCORDING TO? THE INDIAN IT ACT , 2000 THEVARIOUS CYBER OFFFENCES ARE :- ??? Tampering with computer source documents.?? Hacking with computer system.?? Publishing of information which is obscene in electronic form.?? Not to obey the direction? of controller.?? Directions of controller to a subscriber extend facilitate to decrypt information.?? Intrusion into protected instrument.?? Penal action for misrepresentation.?? Breach of confidentiality and privacy.?? Publishing digital signature certificate false in certain particular etc.?? Act to apply for offence or contravention? committed outside India andTHE IT ACT 2000 -?? POSITIVE ASPECTS ?? E-mail will now be a valid and legal form of communication in our country.?? Can be duly produced and proved in a court of law. India?s strategy for prevention of computer crimes ?? Stipulating the offence which would constitute computer crimes.?? Identification of domestic criminal law for possible amendment to meet the requirements of prevention of computer related crimes.?? Improving international collaboration.?? Effective prosecution under the existing criminal law.?? Adaption and classification of OECD (organization of economic cooperation and development) guidelines.?? ??Development of security guidelines and manuals for implementation of such guidelines.Crimes prevention under the IT Act?? Chapter IX provides for penalties and adjudication ?? Chapter XI provides for offence. The object of IT Act is to protect?? ?All electronic system for intrusion ;?? Privacy of certain messages;?? Protect the computer system for unauthorized access.The object of IT Act is to ensure:

?? Compliance ?to the provision of the act;

?? Non -publishing of obscene information;

?? Assistance in the decrypting information in the interest of state and crime control.

The act also aims at preventing misrepresentation , falsity and fraud and provides for penalty.????? IT ACT 2000 ? overall prescriptive ? The IT Act 2000 is a first step take by the government of India towards promoting the ????growth of e- commerce it is the? first historical step.?

CHANGES? BROUGHT? BY? THE AMENDMENT ACT? OF 2008:-

?? The name of Cyber Regulations Appellate Tribunal has been changed to Cyber Appellate Tribunal.?? Cyber Appellate Tribunal has been made a multi-member entity. This will provide for more expertise for the Tribunal.

?? Section 2(ta) introduces the term ?electronic signature?.?Now ?digital signature? has been made a subset of ?electronic signature?. In the definition of ?electronic signature? it has been given that it includes ?digital signature?.?? Section 3A has been introduced for electronic signature which says that a?subscriber may authenticate electronic records by electronic signature. The authentication was earlier possible only by digital signature.?? Section 2(tb) has been introduced to define the term ?electronic signature certificate?. Now ?digital signature certificate? has been made a subset of ?electronic signature certificate?.?? Definition of ?intermediary? has been modified.?As per the amendments in various sections now intermediaries are made more responsible and liable towards their acts.?New Section 67C asks intermediaries to preserve and retain certain records for a stated period. New Section 69B is also quite stringent to intermediaries.?? ??Section 6A introduced to provide for?appointment of Service Providers?by appropriate government for e-governance services.

????????? Section 7A makes?audit of electronic documents mandatory?wherever physical documents, records required audit. This provision will put considerable work load on the government

????????? Section 69A has been introduced to enable blocking of websites by the central government.????????? Section 69B provides?powers to central government to collect traffic data from any computer resource. It could be either in transit or in storage. This move by the government was necessary for national security purpose but it may lead to abuse of power by government.

Section 66A ? Sending offensive messages

Section 66B ? Receiving a stolen computer resource

Section 66C ? Identity theft

Section 66D ? Cheating by personation

Section 66E ? Violation of privacy, video voyeurism

Section 66F ? Cyber Terrorism (Life Sentence)

????????? New Sections introduced -

Section 67A ? To cover material containing ?sexually explicit act?

Section 67B ? To cover child pornography

Section 67C ? To make intermediaries preserve and retain certain records for a stated period. (Imprisonment 3 years and fine.)


????????? Section 1(4) in the Information Technology Act, 2000 contained a list of documents which were excluded from the applicability of the act. The list has now been moved to Schedule 1 of the ITA 2008. This move can be considered as a procedural simplification made by the amendment. A notification will be required to make additions or deletions to this list. Every notification issued in this regard shall be laid before each House of Parliament.????????? Some more new definitions added ? ?communication device?, ?cyber caf??, ?cyber security?.????????? Compensation limit has been removed from Section 43.????????? Section 43A introduced to make body corporate liable to pay damages by way of compensation for failure to protect sensitive personal data or information. No limit has been set for compensation.????????? Changes in Section 46 have brought Civil Court below the High Court into the cyber related disputes for the first time. The powers of the Adjudicator has been limited for claims upto Rs 5 crores.?For claims above Rs 5 crores Civil Court?s authority has been introduced.????????? In Section 66 ?dishonesty? and ?fraudulent? intention has been made necessary.????????? Section 72A has been introduced for data protection purpose. It provides for punishment for disclosure of information in breach of lawful contract. Imprisonment of 3 years or fine upto Rs 5 lakhs or both for cases relating to data breach has been provided.????????? Section 77A introduced to provide for compounding of offences with punishment upto 3 years.????????? The powers under Section 80 were earlier available to DSP is now available to Inspectors.????????? Section 81 has been amended to keep the primacy of Copyright and Patent Acts above ITA 2000.????????? New Section 84C introduced to make ?an attempt to commit an offence? punishable. The punishment will be half of the punishment meant for the offence.????????? State Governments will be exercising far more powers?under the ITAA 2008 than what was envisaged under ITA 2000.
Monica is pursuing her B.L.S/LL.B Degree from Government Law College, (Churchgate). She has great interest in Legal writing .Besides Legal Writing she also writes Poems on different subjects. She wants to be an I.A.S officer . She is ever ready to provide people in need with legal aid. She is also the founder of her own blog?Legal Awareness.

msnbc i will always love you maine caucus whitney houston has died blue ivy carter whitney houston death the vow