Monday, April 29, 2013

mid Tax Review: Fix Now, Save Later

Taxes, now?

Yes, right now.

April 15 is too late to make changes that can improve your tax situation. But now? Timing is perfect.

"The main reason to think about taxes now than at the time it is now possible to do tax planning strategies that could reduce the tax when deadlines are not coming," said Michael Maye, a certified financial planner and certified public accountant MJM Financial Advisers in Berkeley Heights, NJ

Here's what you should pay attention now, while there is still time to take action and reduce your tax bill.

Look Income Business

It's time for some simple math. Add up the year-to-date earnings. If you pay estimated taxes, you pay too much, or too little, to the IRS.

If your business is down because of the economy, the IRS gives you an interest-free loan by paying too much estimated tax, says Sally HERIGSTAD, a certified public accountant and the author of Help! I can not Pay My Bills. Instead, you can invest that money in your business.

"Pay too little, and penalties and interest can be brutal. These difficulties will need to watch and make adjustments throughout the year, "said HERIGSTAD.

Mid-year review is very important to make sure you have a good understanding of the financial situation of your company.

Now is a good time to think continue in 2011.

If the current tax laws remain unchanged, the 2011 tax rate is scheduled to increase, said Becky Krieger, a certified financial planner and certified public accountant with a recognized investor in Edina, Minn.

"It will negatively affect business owners interested in selling their business and transition next year," said Krieger. "Knowing that the tax rate is likely to increase, consider accelerating income cut this year or defer until 2011, when you pay a tax rate increase."

You have to formulate strategies to improve collection efforts before the end of the year, Krieger suggests. Your client may receive if they are looking for more cut this year.

Organize your deductions

Apr. 15 months later, and even the brightest minds in the business are likely to forget the little things. But the little things add up.

You have to monitor closely the amount of deductible you throughout the year, and if you keep the deductible receipt in the pile, it is a good time to sort through them - as before the memory. If you can not remember why you keep your receipt, you will not be able to use it as a cost deduced.

"Do you remember buying books related to work next April? Not a chance, "said HERIGSTAD.

"Nor are most of us remember the business lunch and justification for deducting such organizations in small pieces as you go along makes more sense than trying to recreate it all for a year and a half later .. "

If you do not have a system to track the amount of deductible, consider implementing one. Establish a file folder into categories like "food and entertainment," and "The Office." Or better yet, start scanning immediately all receipts and add them to the back- up folders on your computer. Organization today, and as you go through the rest of this year, save lots of time during the tax.

While you're at it, buy a small notebook to keep in your car to record mileage for business travel.

For 2010, the deductible rate for mileage decreased from $ 0.54 in 2009 $ 0.50 in 2010, according to Krieger.

Make a contribution Retirement Plan

Sources pensions are offering business owners a significant tax break.

If you wait until the end of the year your contribution, you could be faced with a shortage of cash if you need to come up with a lump sum to invest, Maye says, and you will also lose the benefit of potential stock market by waiting .

If you have not started a retirement plan, read more about the options for small businesses. Some require a contribution before the year is out, while the other allows you to wait until the tax filing deadline.

"Some plans, such as Simplified Employee Pension (SEP) plans, allowing you to make a contribution to wait until you file your tax return, which could be by the end of October 15 of the calendar year following the revenue generated, "said Krieger. "It provides an opportunity to assess the resources and cash available to meet the objectives defined contribution pension plan."

Krieger said period also allows you to decide whether the contributions and associated tax savings gained in the current year, or if the contribution is deferred until next year.

Another consideration for this year: small business owners find themselves in the lower tax bracket in 2010 to evaluate the benefits of the pension plan assets to convert to a Roth IRA or contribute to A Roth IRA instead of making a deductible contribution to a traditional IRA, Krieger said.

Talk to your tax advisor about whether a conversion sense for your situation.

Operating Expenses Today

If a business needs to undertake major expenditure in the coming months, a review of the overall revenue now will help you decide if the purchase should be done this year or next.

Your business may qualify for a reduction in Section 179.

"Reducing essentially allows qualified businesses to cut capital goods by treating it as a burden rather than using and depreciating it over several years," said Maye. "Does it make sense to do this depends on whether the business is likely to receive more extensive benefits by charging now with the current tax rate than depreciation from time to time in the rate of tax in the future. "

Qualified business continues to cost up to $ 250,000 of section 179 property for tax year 2010, and experts predict will reduce the significant reductions in 2011. Again, this is something to cope with your tax expert.

Making Charitable Contributions

Unless your business is a corporation, the business itself will not get a tax deduction for charitable contributions. But if you have an LLC or S Corp - flow-through what is called entity - you can take deductions on your personal income tax return.

HERIGSTAD says you can do better with your charitable contribution by delivering continuous throughout the year.

"Not only is it easier to give more like it, but the charity has the opportunity to plan their cash flow," he said. "Donations will not affect cash is very intelligent, but they are not as easy as picking up the phone and make a donation by credit card. Find a charity to receive or make use of your old business equipment, for example, takes time. "

If you have items you want to donate, start your research now. Waiting until the end of the calendar year may mean running time.

And Do not Forget:

Work Opportunity Tax Credit: If you need a few employees, think about taking advantage of the Work Opportunity Tax Credit (WOTC). Is a federal tax credit provided to the private sector implements business people from certain groups, such as unemployed veterans or those who have received some kind of federal aid.

"Work Opportunity Tax Credit was increased on August 31, 2011," Maye said. "Credit is available once associated with each member of the target groups and are based on wages paid for the period of one year from the date the individual begins work for the employer."

The maximum qualifying first-year wages are limited to $ 6,000, or $ 3,000 for employees youth summer.

Learn more about credits on the website of the Department of Labor.

The increase in Capital gains and dividend Tax: your investment may have an impact on your tax situation forward.

In 2011, the dividend return is taxed as ordinary income, so the tax rate can be as high as 39 percent, compared to 2010 levels of 15 percent. And capital gets taxed at 20 percent, up from 15 percent this year, said HERIGSTAD.

"It makes dividend-earning stocks suddenly less attractive," said HERIGSTAD. "If you have to undergo an investment value, think about selling them and taking profits in 2010."

Watch Out for AMT: Although many on-again, off-again debate in Washington, DC, does not look like we'll see a patch for the Alternative Minimum Tax (AMT) this year.

"This means that more taxpayers will depend on the extra layer of taxes other than income tax permanent," said Krieger.

The AMT exemption falls to $ 45,000 for couples and $ 33,750 for individual taxpayers in 2010 unless Congress acts to raise the exemption approach 2009 levels to around $ 71,000 for students Couples and $ 47,000 for individuals, he said.

Thursday, April 25, 2013

Pakistan want their trash TV, Too

In both Nihal prepare for marriage Behlul, glitch: weapons held stepmother He declared undying love for the groom. Dangerous liaisons between-e-Ishq memnu, or Forbidden Love, the biggest Turkish drama on television hit Pakistan this past winter. In reaching its peak, steamy story of Turkish tycoon and his family watched by a third of cable and satellite TV audience.The success of the importing country Pakistan spur manufacturers to explore new themes. Samina Ahmed, an actor and TV producer, played a role earlier in his career would have been unthinkable, the mother of the girl to call my grandmother and her family fled to the wedding. "This success shows that a number of Pakistani Drama consume entertainment in a way that is no different than other communities," he said. Women's rights, domestic violence, and gay marriage is featured in the drama produced and broadcast in Pakistan. Serials dissect the relationship with his wife and daughter Mullah, and presented a poor woman struggling to survive in an elite school.A parliamentary committee in January found the "alien attack drama" so toxic recommend against. Undaunted, the local network command series over Turkey in the studio. "A fundamental shift is happening," said Salman Danish, chief executive MediaLogic Pakistan, which provides ranking for non-state TV channels. "The competition extrusion strict production house to produce bold subject. But the biggest surprise is that the public will accept and enjoy this freedom. "For many people, the import Soap Opera is an escape of dietary 24-hour news networks' violence and political intrigue. "I'm sick of the news," said Zermeena Shah, 35, Islamabad housewife who spent six hours a day watching dramas and cooking channels. "Television is the only practical choice of entertainment for most women in Pakistan. We get a lot more variety, and the quality has improved. "Strictly controlled state TV and radio channels monopolized the airwaves until 2002. When military ruler Pervez Musharraf open broadcasting to private investors. A decade later, Pakistan can choose among 84 satellite TV channels and 120 FM radio stations.One everything in Pakistan may agree to more content produced locally required. Some politicians support a campaign by the Pakistan Film Producers Association on foreign series. Although Pakistan revive the TV production business, producers fear the network will eventually drop the show produced locally to import more famous. "There is a consensus among the political parties that we are not allowed to broadcast foreign content during prime time," said Proforma Hasnain, chairman of the standing committee of the National Assembly for Information and Broadcasting. "India and Turkey play destroy our values ​​and local industry. You bet 800,000 jobs "However, Hasnain acknowledged that the theme of soap imported" very interesting "Bottom Line: Pakistan has gone from three tightly controlled state-owned channel in the 2002-84 TV channel operated by the private sector now.

Tuesday, April 23, 2013

Why Will not Let Employees Work From Home Yahoo!?

(An earlier version of this story ran online.) On February 22 leaked memo sent from Jacqueline navel, Yahoo! 's (YHOO) executive vice president of people and development (the code for HR), Yahoo announced that employees will not be able to work from home. Even in the days that employees have an obligation to the family or to "stay at home for the cable man," insisted navel them to "use your best judgment." Yahoo bucking the national Trends: According to the Telework Research Network, an independent research work in the company, the number of people working remotely up 73 percent from 2005 to 2011. Today, 20 million to 30 million Americans work from home at least once a week. But Yahoo is not the only company forced workers into a remote office. In December, Bank of America (BAC) down My Work, work from home program that began in 2005 and in 2010 along with more than 15,000 employees. To cut costs and improve efficiency, each department assess individual banks now telecommuting. Both Twitter and Google (GOOG) which Yahoo Chief Executive Officer Marissa Mayer No employee. 20-encourage staff to work in the office because it makes a more collaborative environment. While Google does not have an official policy, Chief Financial Officer Patrick Pichette said last week, "Working from the office is really important." So how many people telecommute at Google? "As little as possible," he said. For Google exec, Pichette seems uncharacteristically interact with the data. Several academic studies reported significant catches of productivity when employees are given the freedom to work where and when they want. A February study from Stanford University found that when employees of Chinese travel agencies are allowed to work from home, they are 13 percent more productive than when they were working in the building, eventually saving the company $ 2,000 per person per year. "Is it easier to all in the same place? Yes, of course. But that does not mean it's necessarily better, "said Brett Caine, senior vice president and general manager of Citrix Online, a mobile network. "Telecommuting ... allowed me to have a career and a mother, "write" digital mom "babble anger following the announcement of Yahoo. But as popular among employees with children as parents. And mothers are no more likely to work from home rather than the father, according to Telework. "It's kind of a shame made a mommy thing, because the family will generally require flexibility," says Kate Lister, President Telework it. Face time is important for racing. According to tagapagpananaliksik Kimberly Elsbach and Daniel Cable, people who come to the office is more likely to promote or receive better performance reviews than their remote colleagues. "Look only at the workplace, without any information about what you are actually doing, cause people to think higher," they wrote in the summer issue of MIT Sloan Management 2012 of Review. And people at home working in the Stanford study? Although they are more productive, their level of performance-based promotion reduced by half. But repeated surveys show that 80 percent to 86 percent of employees want the opportunity to work from home. The workers have more flexibility, higher job satisfaction and less likely they are to leave the company. And they do work hard. A 2010 study at Brigham Young University found that office workers work only 38 hours a week before they feel as if they neglect their lives at home, while working from home can watch 57 hours before they stretched too thin. That is because they adjust their schedules to their needs, rather than trying to Cram each work, doctor appointments, and homework sessions in a few precious hours when they are not in the office.

Thursday, April 18, 2013

Identify A Chinese hacker discovered today

Joe Stewart begins at 6:30 am in Myrtle Beach, SC, with a sandwich of peanut butter, sugar-free Red Bull, and 50,000 or more pieces of malware are waiting for e-mail in box. Stewart, 42, is the director of malware research at Dell SecureWorks, a unit of Dell (DELL), and he was going hunting days for Internet spying. Malware blanket term for malicious software that allows your computer hacker successors, clients and fellow researchers continue to send Stewart suspicious specimens harvested from tissue attacked. His job is to sort through and separate the toxic haul what he had seen before: He's looking for things like software that could let hackers break into a database, control the security cameras, and monitor e-mail.Within industry, Stewart is known. In 2003 he unraveled one of the first spam botnets, which allows hackers foreclosure tens of thousands of computers at once and ordered them to stuff the box with millions of unwanted e-mails. He spent a decade helping to keep criminals from breaking into online bank accounts and such. In 2011, Stewart turned his sights on China. "I think it will I think in two months," he said. Two years later, trying to identify and develop countermeasures Chinese malware is pretty much all he does.Computer attacks from China will sometimes cause a flurry of news, as did the hack last month's New York Times (NYT). Previous wave of media attention crested in 2010, when Google (GOOG) and Intel (INTC) announced that it has been hacked. But the report does not convey the nature of unrelenting attack. It's not about an isolated incident, it is an ongoing invasion.

Story: Close, but not hack

Malware from China have flooded the Internet, targeting Fortune 500 companies, technology startups, government agencies, news organizations, embassies, universities, law firms, and everything must be in order to protect intellectual property assets. A new set of secret intelligence assessment described this month in the Washington Post found that the U.S. is the target of a massive campaign and sustained in computer espionage from China that threaten the U.S. economy. With the possible exception of the U.S. Department of Defense and a small number of three-letter agencies, victim outmatched by the enemy with vast resources and a long head start.Stewart said he met more and more people for its focus on China, some even want known to the public, either because their companies have access to a data line or the fear of side effects from the mainland. Why is he not unusual willingness to share its findings with other researchers. The motivation is part of an obsession with solving the puzzle, the sense of fair play. "I see the U.S. economy went south, with high unemployment and all that good company press China ... I just do not like it, "he said. "If they do it fair and square, more power to them. But to deceive one. "Stewart tracks about 24,000 domains on the Internet, he said Chinese spies hack lease or for the purpose of espionage. They include marketing firm in Texas and a private site owned by prominent political figures in Washington. He cataloged malware he saw in the category, which is usually associated with a team hack especially in China. He said 10 teams were deployed more than 300 malware group, double the number 10 months ago. "There are a large number of manpower thrown at it from their side," he said.

Story: In the Boom Chinese Corporate Espionage

Investigators in dozens of commercial security companies suspect many if not most hackers either military or their command of some Chinese intelligence organizations much or supervision. In general, they said the attack was organized and a very wide range of activities freelancer. Secret diplomatic cables published by WikiLeaks connected to the well-publicized Google hack Politburo officials, and the U.S. government has long been the intelligence Classified keep some hacker attacks linked to the man's Liberation Army (PLA), according to former intelligence officials. There is no public evidence, however, and the authorities in China have for years denied any involvement.Up now, private sector researchers like Stewart can reduce the success of putting a face to hack. There cryptic clues left behind, the alias used in registering the domain, old online profile, or post to a discussion board that provides a unique glimpse of the work of hackers but rarely identified. Sometimes, though, the hackers make mistakes. More recently, a hacker mistake led a reporter right at his door. Stewart is working on a bleak gray building surrounded by barbed wire. It recognizes a small sign with a key-locked doors as Dell SecureWorks. There are other tagapagpananaliksik, Stewart operates a patchwork of more than 30 computers to fill the small room. When he examined a sample of the malware, it fluctuated between full-screen and a white board to write the data in technical terms and notes that Chinese intelligence agencies.

VIDEO: NY Times Highlights Cyber ​​Hacking Vulnerability

Photo by Stephen Morton / BloombergDell SecureWorks facilityThe Myrtle Beach office computer to run most of the programs that he wrote himself to carve and fix malware and knew he was dealing with a variation of the old code or something completely new. As computers up to code, look for tricks Stewart signature to help him recognize the work of a writer or team; writer software compares unique slant and curve of the hands of individual letters. A system, technical work hard to give birth or confuse most people, but Stewart. He will remove the pattern. After work, he relaxes with a 15-minute session with a drum kit, play the same phrases and Stewart over.A most of the work is to understand how malware is developed, which makes it a beautiful-impressive level of detail. He can tell the computer languages ​​in which it is coded to help identify malware discovered by Russian crime syndicate from those used by Chinese spies. The most important thing he did, however, know who or what software do the talking. Once in the computer, malware is set to signal the server or servers scattered around the world, looking for additional commands. It is known in the business of information security as a "house call." Found Stewart and his fellow detectives tens of thousands of domains, known as the command and control nodes, where a hacker directs them attacks.Discovery Spurs command nodes dramatically improved tone vote for Stewart, it was about as much excitement she showed visitors. When a company begins to hack knows the Internet Protocol (IP) address of the node command, it can shut down all communications to those addresses. "Our main goal is to learn about tools and strategies and malware they use, so that we can prevent it," said Stewart.

VIDEO: The Hacking Software Specification What you see

The Internet is like a map, and every point on every IP map belonging to someone with a name and address recorded in the register. Spies, naturally, tend not to use their real names, and the majority of internet addresses Stewart evaluated, identifying details are obviously fake. But there are ways to get at the truth. In March 2011, Stewart was evaluated by a piece of malware that looks different from the work of Russian or Eastern European identity thieves. As he began to explore the command node is connected to the suspicious code, Stewart realized that since 2004, about a dozen were registered under the same name, one or two Tawnya Grilth or Eric Charles, both list two Hotmail accounts usually a city in California. Some are listed in the city of Sin amazed misspelled Digoo.Some also considered to address Chinese espionage campaign documented by other researchers. They are part of a block of approximately 2,000 addresses owned by China Unicom (CHU), one of the nation's largest Internet service providers. Go to hack Stewart led a group of addresses again and again, and he believed that they were used by one of China's top two teams digital spy, which he calls Beijing Group. It's about as far as Stewart and his fellow detectives usually get places and groups can be real, but not in individual hackers. But he had the good fortune over the next few Grilth months.Tawnya registered node command using the URL. It's a little too close to the name of the employer Stewart. So he contacted Stewart said Icann (Internet Corporation for Assigned Names and Numbers), the organization that oversees the Internet address and adjudicate disputes names. Stewart argues that by using the word Dell, hackers violate trademark of employers. Grilth never answered, and Icann Stewart agreed and handed over control of the domain. In November 2011 he could see a computer hack called home from around the world, he watched the development of an active campaign espionage.

Story: The Battle to Protect Confidential Data

He monitors the activities during the three months, a slow computer recognition of victims. January 2012, Stewart mapped 200 compromised machines in the world. Many are in government ministries in Vietnam, Brunei, and Myanmar, as well as oil companies, newspapers, a nuclear safety agency, and embassies in China mainland. Stewart said he had never seen such a wide target focuses on the countries of Southeast Asia. He expanded his search for the IP address listed by Tawnya Grilth or "her" e-mail,, and found a few more. The contact listed xxgchappy touch. Addresses new lead to more links, including posts to discussion forums and website strategies malware, malware storage where researchers learn hacking techniques from around the world.

VIDEO: Anyone Safe from hackers?

After Stewart discovered something more unusual: One domain is hosted by an actual business, which offered, for a fee, to generate positive post and "like" on social networking sites like Twitter and Facebook (FB). Stewart profile found under the name Tawnya BlackHatWorld hacker forums to promote website and PayPal account (eBay) fees collected and channeled into the Gmail account that includes the surname Zhang. Hacker stewart marvel affected his personal life such degree.In February 2012, Stewart published a 19-page report on the site SecureWorks coincide with the RSA Conference in San Francisco, one of the biggest events in the security industry. He prefaced with an epigraph from Sun Tzu's The Art of War: "We can not enter into alliances until we are acquainted with the information design of our neighbors and our enemies plan" is Stewart not zhang chase. His work was done. He learned enough to protect customers and moving into other paraphernalia of malware. But the report has generated interest in the security of the world, because it is very difficult to find traces of the identity of the hacker. In particular, Stewart's work attracted other tagapagpananaliksik immediately took up the challenge unmasking Tawnya Grilth. That was 33 years tagapagpananaliksik blog under Cyb3rsleuth name, identity he says he continues to run his intelligence than India-based computer company. He asked that his name not be used to avoid unwanted attention, including hacking attempts on company.Cyb3rsleuth said he had found the outing called Eastern European hackers identity and submit claims information on the two individual governmental authorities. Stewart's work inspired him to send his findings public, and he said he expects to dig out more details about the individual hacker will provide evidence of the government to take action. The hackers and people make mistakes, thus misleading find connections that lead to identity, Cyb3rsleuth said.

Story: Mandiant, Go-To Office for Security Attacks on cyber-espionage

As the new Stewart works placed on the ground, lift the window Tawnya Grilth world. There are posts on a car forum, an account with a Chinese hacker sites, and personal photos, including one showing a man and a woman to bundle upwind in what looks like a pagoda in the tourist sites background.Cyb3rsleuth follow hackers attempt to drum up business for services social media campaigns with the alias and forums tied to a Hotmail account. Finally he stumbled into a second business, this one with a physical location. The company, Henan Mobile Network, wholesale cell phones, according to the business directory and post online promotion. Website shop Hotmail account is registered with Jeno and Eric Charles pseudonym.Cyb3rsleuth China evaluated online business directory for technology companies and not just a telephone number for the company but also the contact's name, Zhang, and address in Zhengzhou, a city of more than 8 million in provincial China middle, Henan. List of directories given three account numbers for Chinese QQ instant messaging service called. The service works along the lines of MSN Messenger, each account is assigned a unique number. One of the accounts that use an alternative e-mail that includes xxgchappy deal of work and registered to use "education."

Story: Why hack hacker bill Congress To Stop

Putting e-mail in the Chinese search engine, Cyb3rsleuth discovered that he also registered, a Facebook-style Chinese site, a Zhang Changhe, Zhengzhou. Profile image of Zhang Kaixin lotus blossom, a traditional Buddhist symbols. Go QQ account, Cyb3rsleuth find related blogs here, again with a Buddha-themed profile picture, in which users go through Changhe, pronounced the same as the given name of the user Kaixin, although it makes the other characters. Reflections on Buddhism blog content, including, from the posts written in Chinese and titled "repentance": "It's on January 31, 2012 which is now, I've converted to Buddhism for nearly five years. In the last five years, I broke all the Five Precepts, without killing living beings, not stealing, no sexual harassment, no lies, and no alcohol, and I feel very sorry. "In the middle of the list of sins, from a lack of sympathy with the defensive in lies, No. 4:" I am constantly and shamelessly steal, wish I could stop in the future. "

VIDEO: Rep. Mike Rogers: Obama maya either Down-Payment Order

The same number appears in the auto QQ called xCar forum, where users are listed as part of the club for owners of Peugeot, Dongfeng 307 four-door sporty popular among China's middle class emerged and in which users are asked, about the year 2007 on the spot to buy the license holder . In-special plate pictures taken in 2009, Zhang was standing on the beach, squinting in the sun on her back in waves, holding hands with her husband the picture caption saying the same pagoda. His thick hair was cut short in March face.In young, Cyb3rsleuth published what he found on his personal blog, hoping that the government, the research community, or some many victims of hacking. He knew there was no response so far. However, he was happy. He found a ghost face, he said. City sprawls near Zhengzhou Yellow River in Henan province. City government website describes it as Kung-fu fans passing through on their way to the Shaolin Temple, the center of "examples of a very rapidly changing in China (without minor tourism clutter)." Buddhism and martial arts, 56 km south-west. The city is almost serves as a transit hub colossal for moving people and goods by train to other areas throughout China.

VIDEO: Why Iran hackers target U.S. Bank?

Tan, seven-story building with dirty facades and red characters to read the Central Plains Communications Digital Cities around south 500 meters walk from the central train station. The building is full of small shops, many valuable electronics. The address listed for the business Zhang phone on the fourth floor, room A420.Central Plains City of Digital Communications at ZhengzhouUnder dim fluorescent lights, two young employees told reporters they did not know Zhang Changhe or Henan Mobile Network. Commercial building manager, Wang Yan, said the previous tenants moved A420 three years ago, she said she did not know what a business does, except that the owner was not there often and do not last long.A operating Chinese Google searches turn up links to several academic papers co -created by Zhang Changhe. One, from 2005, was associated with the technique of computer espionage. He also contributed to explore Windows rootkit, sophisticated hacker strategy, in 2007. In 2011, Zhang co-create the analysis of the types of security vulnerabilities and attack vectors computer memory for it. This paper identified as Zhang worked with PLA Information Engineering University. China Institute is one of the major centers for electronic intelligence, where professors train junior officers to serve in operations throughout China, said Mark Stokes of the Project 2049 Institute, a think tank in Washington. As the U.S. National Security Agency has a university.

VIDEO: Paul Barrett: Cyber ​​Security Threats Are No Joke

Gated campus of PLA Information Engineering University of Zhengzhou, about four miles north of Zhang Changhe mobile store. The main entrance is at the end of a tree-lined, and the uniformed men and women came and went, with guards checking vehicles and identification cards. Reached on the phone number listed on the blog QQ, Zhang confirmed its identity as a teacher at the university, adding that he is far from Zhengzhou to work trips. Asked whether he still maintained Henan business phone, he said: ". No, sorry "about the link for the hack and domain node command, Zhang said:" I'm not sure "About what he taught at the university:" .. not convenient for me to talk about it "He denied working for the government, said he would not answer further questions about his work, and hung up. The gates to the PLA Information Engineering UniversityStewart will continue to open up clues pointing to Zhang's involvement in computer network intrusion. Piece SecureWorks malware discovered last year and called Mirage infected more than 100 computers, especially in Taiwan and the Philippines. Tawnya Grilth owned by one of the domain ordered. Late last year, Stewart was seen malware hit the Russian and Ukrainian defense and targets. Samples of the types of malware that only he could find in its database is one that phoned home to command node. Billing name used for enrollment: Zhang Changhe. Stewart said Zhang is affiliated with Beijing groups, which may involve dozens of people, from infrastructure management command center programmer to translate documents and data stolen. As Stewart discusses it, his voice flat. He's realistic. Sightseeing someone involved in the team does not stop hackers from China computer intrusion. Zhang is a cog in a larger machine and, given how China has become a major operation, to find Zhang more likely to get any easier. It shows enough evidence, Stewart character, and finally the Chinese government can not deny his role. "It may take a few more years like the weight piled on the report very strong evidence that it is ridiculous, and they say, 'Oh, this is us,'" said Stewart. "I do not know that they would stop, but I want to make it more difficult for them to go."

Sunday, April 14, 2013

an oil company Exxon stake Buy China Mei Iraq

A little more than a year after President Barack Obama declared an end to the war in Iraq, the Chinese company is a leading player in the oil sector country. China National Petroleum Corp (CNPC) jointly operates three fields in southern producing 1.4 million barrels per day more than half of Iraqi production. China and Malaysia are the largest part of international contracts, said Abdul Mahdy al-Ameedi, an official with the Iraqi Oil Ministry. "We are very satisfied with the work of Chinese companies," said al-Ameedi, responsible for the oil contracts and oil licensing.Now Chinese can buy (Xom) ExxonMobil's position in the field of Qurna, West 1, which has reserves worth $ 50 billion. Derek Scissors, a senior research fellow at the Heritage Foundation, an expert in Chinese state-owned enterprise, speaking in December with the Chinese oil company executives talk about Iraq Exxon sharing. China executive warned it is not a done deal, Scissors said. Iraq Ministry of Oil and Exxon not comment on the possibility of Iraq's oil industry was abuzz with rumors that agreement.The CNPC Hong Kong-listed subsidiary, PetroChina, is the leading bidder. PetroChina spokesman did not return phone calls and e-mails. A stake in the West Qurna 2 field nearby, you can go to China as well. Lukoil is Russia running on the field, but the project partners, Statoil of Norway, is pulled. "An interesting partner for us is China, where there is a strong growth in demand," said the head of Lukoil Vagit Alekperov journalists in Russia on Jan. 15. Iraq, which produces about 3 million barrels of crude oil per day, is expected to reach 8 million barrels in 2035, according to the International Energy Agency based in Paris. At that time, 80 percent of Iraq's production will go to China. "Baghdad to Beijing is the new Silk Road of global oil oil workers from Baghdad and capital investment from Beijing," said Fatih Birol, chief economist at the IEA. Chinese construction of power plants is cemented relationships. It helps China develop the field at a lower cost than their competitors, said Wenran Jiang, a political scientist at the University of Alberta who studies China's energy industry. Chinese managers and engineers usually get a quarter of the wages paid by Western companies, estimated Jiang. Iraq offered foreign carriers as little as a few dollars per barrel produced, it is difficult to get the money, said Trevor Houser, energy and natural resource expert on China-focused consultancy Rhodium Group. Some companies, including Exxon, move to Kurdish, the more liberal terms. China may have little choice but to accept the terms offered by the Iraqi Oil Ministry. Foreign oil to meet nearly 60 percent of the needs of China today. Which is likely to increase to 80 percent by 2035, said Lin Boqiang, director of the China Center for Energy Economics Research at Xiamen University. "It is not that the Chinese wanted to go to Iraq," says Lin. But "not many places left." Bottom line: fast bulking Chinese oil companies in Iraq, which could sell 80 percent of crude oil production in Nayla Razzouk China.With, Kadhim Ajarash, and Matthew Philips

Tuesday, April 2, 2013

France: Where are you still afraid of Freemasons Magazine

and newspapers all have stories to run them in one form or another, year in, year out. Details may vary, but the big story is the same everywhere, striking a universal chord sex, health, and money. Some crops, however, are not traveling. They drilled deep into the psyche of the nation while others are scratching their heads and saying, "Huh?" In France, a story that keeps coming back is about the Freemasons. It is everywhere. The greatest French magazine has run at least one big cover mason year. Books carve "state within a state," to borrow from the title recently. Blog thick. "France has some Marronniers-chestnut," said Alain Bauer, a former master of the French Grand Orient Masonic lodge and liaison President Nicolas Sarkozy. "There is the price of real estate and how to treat head, and then there are Freemasons. Is a bricklayer with headaches that move the story very French magazine. We do not want this story, but at the same time, we adore them, because they make us feel like we are still worthwhile. "Huh? Yes, Freemasons: old fraternal order known in the U.S. for American Masonic lodges that dot the city, deteriorated stirring reminder Masonry American melting pot. Or for the mysterious Masonic symbols engraved on every dollar bill. Or a silly note, to Shriners with their red fezzes. (The Shriners was founded in the 1870s to add a little levity regular Freemasonry Mission accomplished ..) In France, though, there's nothing funny about the Freemasons. The way the French see it, Mason fifth column in the French society, a powerful gang of politicians, businessmen and intellectuals who have a hidden agenda that is difficult to pin down because, well, hidden. No one knows what to Mason, but they all suspected something. "Freemasons, how they manipulate the candidates," ran the cover line on 2012 January 10 issue of L'Express, one of the three major newsweeklies France. After reading a few, the "how" and "manipulated" part remains unclear, and even Francois Koch, author, admitted that the title was Le Point "fully extended.", A major weekly magazine, followed the January 26 edition ". Freemasons, the intruders "The third weekly news magazine, Le Nouvel Observateur, get this game holds election cycle:. They run the Mason-and-conquer politics last August "subject never fails to generate interest," said Koch. "It is a mystery that attracts attention." Cover Story Koch sale newsstand 80,000 copies, nearly 10 percent more than the average L'Express's 73,000 copies. "We always get at least average sales, and sales are sometimes really big. It's always a gamble worth taking. "Two years ago, Koch, which normally applies to criminal justice, launched a blog dedicated to matters.To Mason Masonic understand how the French go under the magnifying glass of national requires a brief part of a trip through history. No one knows exactly where Freemasonry originated, but most experts agree their origins lie in medieval England the union laid the foundation stone of the great cathedrals. Masonry modern date in building the first Grand Lodge in London in 1717, and now the United Grand Lodge of England still kind Mason Masonic mothership.Those English first loose lay teaching covers most masonic practice. Mason meets regularly to improve themselves morally and spiritually, as well as doing your love and help each other. They were told to believe in the supreme being and keep politics. And no women are allowed. Solidarity is reinforced by detailed web crap together, signs, symbols, secret handshakes and code words either sexy, unreasonable, or threatening, depending on who saw them.Masonry spread of English only when explanations make the world Mason friendly safe for such value as an anti-clericalism and scientific. Best and brightest to join the world in a stampede. Voltaire, John Locke, and Goethe all signed up. In the New World, Benjamin Franklin became America's favorite Mason early Mason.The made enemies on all sides. Church labeled them anti-Christian, political order established brand them revolutionary, and many others are elitist and find them creepy. It can be expected. Every international fraternity with secret handshakes and symbolic jewelry begging put his name on conspiracy theories. Mason provoked a lot, up to the Nazis, risk factors continent.In U.S. European Masonry, prejudice united in 1825. An apostate Mason from New York named Morgan disappeared after threatening to expose his brother and their rituals. Mason said they paid $ 500 and drove to the Canadian border, but he has heard from again.The "Morgan Affair" anti-Mason sparked disturbances that lasted 25 years, which is 100 anti-Mason in a newspaper published and several lodges looted . Anti-masonic Party even run a presidential candidate in 1831-the first movement of a third party in U.S. history. Masonic membership has dropped from 100,000 to less than 40,000. Over time, American Masonry managed to build himself back, but it came as, non-confidential less aggressive. Today, 1 million Americans Mason likely to meet each other in a Masonic temple Masonic barbecue. Masons in other countries have followed a similar path.Not France. In many ways, French Masonry beaten themselves, ignoring the basic principles of Anglo-Saxon brothers and positioning itself as a counterweight to the strain of deep Catholic and monarchist conservative French society. "Freemasonry has always had a political role in France," said Pierre Mollier, archives director of Grand Orient de France, the country's largest and most cottages. "We did not want to tell people who to choose, but we are not moral authority." From 1880-1905, the Grand Orient of the Catholic Church to fight for the souls of the French, and still considers Its Third Republic nephews. "Republicans take the support of the Freemasons, a third of the deputies were Masons," said Mollier. "All the progressive legislation of the Third Republic is here," he said, pointing around at the headquarters of Grand Orient on rue Cadet. "The current presidential candidates are all knocking on our door this year. For Freemasons British or American, just awful! "Adding insult to injury, the Grand Orient in 1880 to remove all references to the deity. Everywhere away from organized religion, and they do not talk about God Freemasons. But they insist on belief in what the jargon calls Masonic Grand Architect of the Universe, but each member can define it. Huh, French said. Right behind religion by door.All have helped make the modern pariah 160,000 French Masons Masonic world. The United Grand Lodge of England is not known for two of the three main French Lodges, the Grand Orient and the Grande Loge de France. Recently suspended recognition of the three large cabin, the Grande Loge Nationale Fran├žaise, but mostly because of internal squabbles that tore them apart from the inside. "France instead of continuing attitude towards what we do," said John Hamill, director of special projects for the United Grand Lodge of England. Millier Grand Orient Pierre responded: "Do not Protestants do not care if they are recognized by the Pope? We just turn the other cheek. "Jean-Claude ZAMBELLI is a French government employee who has lived in the U.S. for 30 years. He first joined the Masonic lodge in San Francisco America. In 1996 he helped found the George Washington re-union, lodge patterned after and recognized by the Grand Orient. It is quite French. God: no. Female members:. Yes "When we explained to Mason Americans, they physically restrain myself," said ZAMBELLI. "It's just not the same Masonry. They do more charity work, such as major hospitals in San Francisco Shriner. We are doing more work for ourselves. We are not a social club. We are here for spiritual progress. If not, what is the point of all this? The Americans stuck to Mason and Mason showed them the ring. We saw amazing. "The French are indeed playing their cards closer to the vest membership than other Masons. Increasing intrigue do much to keep them on the cover. It also assures people that Masons must have something to hide.Occasionally, they do. Networks blur them, no questions-asked desire to help the Mason brothers, and the code of silence lodges create a breeding ground for shady business deal affairisme what France calls. Membership in the French lodges quadrupled in the last 40 years, an impressive increase. The recent growth has been fueled by the recruitment drive is inappropriate, especially by the Grande Loge Nationale Fran├žaise discredited Grand Orient as they struggle for influence. Masonry French chicken with a sign reading: "Welcome, fox" "We had a hard time defending themselves against affairistes, said Jean-Claude ZAMBELLI. "It's hard to show bad faith toward the Mason brothers. That has helped the mafia outfit hiding behind various Masonic networks. "Sophie Coignard Beat Mason covers the magazine Le Point and wrote the book A State of the State A. "Most of the Masons I know are overweight are honest," said Coignard. "But it's also fair to say that most of the financial and political Scandals of the last 20 years, you will see a Freemason." Coignard fleas from small African Aquitaine bribery scandal, scandal Paris housing project in the 1990s, and now the Carlton affair, an ongoing investigation of a prostitution ring in Lille. "They almost all Masons," said Carlton Coignard group leader (Dominique Strauss-Kahn, Carlton for engaging, not Mason.) Solution, says journalist and author Eric Giacometti, is for the French Mason out of the closet. This will help them clean up the house, and took pleasure trying to peek through the keyhole closet. Giacometti was not Mason, but his fictional creation, Detective Christian MARCAS, is, and he stuck to say. MARCAS appeared in seven detective with combined sales of one million copies since 2005. It makes Giacometti and co-writer Jacques Ravenne valuable third best mystery writer in France. "We decided to go straight to everything you read in the media that when we choose to make MARCAS mason," Giacometti said. "That the success of the series. Francois Koch told L'Express We just provide free advertising for the Freemasons, but we did not care. I would say the Freemasons, 'Proud Freemason who has some extraordinary. "No one knows the story! "Meanwhile, the French continued to press card. Sophie Coignard he sniffed financial scandal with Mason in his heart. "When Mason," said Coignard, "I have never confused for inspiration."