Contents contributed and discussions participated by franchesca blit
Jailed Anonymous hacker Jeremy Hammond, Latest News Abney Associates Technology - 2 views
-
Jailed Anonymous hacker Jeremy Hammond: 'My days of hacking are done'
Source:
https://medium.com/p/7e15d7e16cb7
Jeremy Hammond, the Anonymous hacktivist who released millions of emails relating to the private intelligence firm Stratfor, has denounced his prosecution and lengthy prison sentence as a "vengeful, spiteful act" designed to put a chill on politically-motivated hacking.
Hammond was sentenced on Friday at federal court in Manhattan to the maximum 10 years in jail, plus three years supervised release. He had pleaded guilty to one count under the Computer Fraud and Abuse Act (CFAA) flowing from his 2011 hack of Strategic Forecasting, Inc, known as Stratfor. In an interview with the Guardian in the Metropolitan Correction Center in New York, conducted on Thursday, he said he was resigned to a long prison term which he sees as a conscious attempt by the US authorities to put a chill on political hacking.
He had no doubt that his sentence would be long, describing it as a "vengeful, spiteful act". He said of his prosecutors: "They have made it clear they are trying to send a message to others who come after me. A lot of it is because they got slapped around, they were embarrassed by Anonymous and they feel that they need to save face."
Most pointedly, Hammond suggested that the FBI may have manipulated him to carry out hacking attacks on "dozens" of foreign government websites. During his time with Anonymous, the loose collective of hackers working alongside WikiLeaks and other anti-secrecy groups, he was often directed by a individual known pseudonomously on the web as "Sabu", the leader of the Anonymous-affiliated group Lulzsec, who turned out to be an FBI informant.
join us:
https://www.goodreads.com/group/show/88878-abney-associates
http://uk.linkedin.com/pub/abney-associates/54/6a4/465
https://foursquare.com/p/abney-and-associates/46489475
Abney and Associates Eavesdropping on the Planet - 2 views
-
http://abneyandassociateshuffmanada.tumblr.com/post/54140093594/abney-and-associates-eavesdropping-on-the-planet
The above is the title of an essay that I wrote in 2000 that appeared as a chapter in my book Rogue State: A Guide to the World's Only Superpower. Here are some excerpts that may help to put the current revelations surrounding Edward Snowden into perspective …
Can people in the 21st century imagine a greater invasion of privacy on all of earth, in all of history? If so, they merely have to wait for technology to catch up with their imagination.
Like a mammoth vacuum cleaner in the sky, the National Security Agency (NSA) sucks it all up: home phone, office phone, cellular phone, email, fax, telex … satellite transmissions, fiber-optic communications traffic, microwave links … voice, text, images … captured by satellites continuously orbiting the earth, then processed by high-powered computers … if it runs on electromagnetic energy, NSA is there, with high high tech. Twenty-four hours a day. Perhaps billions of messages sucked up each day. No one escapes. Not presidents, prime ministers, the UN Secretary-General, the pope, the Queen of England, embassies, transnational corporation CEOs, friend, foe, your Aunt Lena … if God has a phone, it's being monitored … maybe your dog isn't being tapped. The oceans will not protect you. American submarines have been attaching tapping pods to deep underwater cables for decades.
Under a system codenamed ECHELON, launched in the 1970s, the NSA and its junior partners in Britain, Australia, New Zealand, and Canada operate a network of massive, highly automated interception stations, covering the globe amongst them. Any of the partners can ask any of the others to intercept its own domestic communications. It can then truthfully say it does not spy on its own citizens.
Apart from specifically-targeted individuals and institutions, the ECHELON system works by indiscriminately intercepting huge quantities of communications and using computers to identify and extract messages of interest from the mass of unwanted ones. Every intercepted message - all the embassy cables, the business deals, the sex talk, the birthday greetings - is searched for keywords, which could be anything the searchers think might be of interest. All it takes to flag a communication is for one of the parties to use a couple or so of the key words in the ECHELON "dictionary" - "He lives in a lovely old white house on Bush Street, right near me. I can shoot over there in two minutes." Within limitations, computers can "listen" to telephone calls and recognize when keywords are spoken. Those calls are extracted and recorded separately, to be listened to in full by humans. The list of specific targets at any given time is undoubtedly wide ranging, at one point including the likes of Amnesty International and Christian Aid.
ECHELON is carried out without official acknowledgment of its existence, let alone any democratic oversight or public or legislative debate as to whether it serves a decent purpose. The extensiveness of the ECHELON global network is a product of decades of intense Cold War activity. Yet with the end of the Cold War, its budget - far from being greatly reduced - was increased, and the network has grown in both power and reach; yet another piece of evidence that the Cold War was not a battle against something called "the international communist conspiracy".
The European Parliament in the late 1990s began to wake up to this intrusion into the continent's affairs. The parliament's Civil Liberties Committee commissioned a report, which appeared in 1998 and recommended a variety of measures for dealing with the increasing power of the technologies of surveillance. It bluntly advised: "The European Parliament should reject proposals from the United States for making private messages via the global communications network [Internet] accessible to US intelligence agencies." The report denounced Britain's role as a double-agent, spying on its own European partners.
Despite these concerns the US has continued to expand ECHELON surveillance in Europe, partly because of heightened interest in commercial espionage - to uncover industrial information that would provide American corporations with an advantage over foreign rivals.
German security experts discovered several years ago that ECHELON was engaged in heavy commercial spying in Europe. Victims included such German firms as the wind generator manufacturer Enercon. In 1998, Enercon developed what it thought was a secret invention, enabling it to generate electricity from wind power at a far cheaper rate than before. However, when the company tried to market its invention in the United States, it was confronted by its American rival, Kenetech, which announced that it had already patented a near-identical development. Kenetech then brought a court order against Enercon to ban the sale of its equipment in the US. In a rare public disclosure, an NSA employee, who refused to be named, agreed to appear in silhouette on German television to reveal how he had stolen Enercon's secrets by tapping the telephone and computer link lines that ran between Enercon's research laboratory and its production unit some 12 miles away. Detailed plans of the company's invention were then passed on to Kenetech.
In 1994, Thomson S.A., located in Paris, and Airbus Industrie, based in Blagnac Cedex, France, also lost lucrative contracts, snatched away by American rivals aided by information covertly collected by NSA and CIA. The same agencies also eavesdropped on Japanese representatives during negotiations with the United States in 1995 over auto parts trade.
German industry has complained that it is in a particularly vulnerable position because the government forbids its security services from conducting similar industrial espionage. "German politicians still support the rather naive idea that political allies should not spy on each other's businesses. The Americans and the British do not have such illusions," said journalist Udo Ulfkotte, a specialist in European industrial espionage, in 1999.
That same year, Germany demanded that the United States recall three CIA operatives for their activities in Germany involving economic espionage. The news report stated that the Germans "have long been suspicious of the eavesdropping capabilities of the enormous U.S. radar and communications complex at Bad Aibling, near Munich", which is in fact an NSA intercept station. "The Americans tell us it is used solely to monitor communications by potential enemies, but how can we be entirely sure that they are not picking up pieces of information that we think should remain completely secret?" asked a senior German official. Japanese officials most likely have been told a similar story by Washington about the more than a dozen signals intelligence bases which Japan has allowed to be located on its territory.
In their quest to gain access to more and more private information, the NSA, the FBI, and other components of the US national security establishment have been engaged for years in a campaign to require American telecommunications manufacturers and carriers to design their equipment and networks to optimize the authorities' wiretapping ability. Some industry insiders say they believe that some US machines approved for export contain NSA "back doors" (also called "trap doors").
The United States has been trying to persuade European Union countries as well to allow it "back-door" access to encryption programs, claiming that this was to serve the needs of law-enforcement agencies. However, a report released by the European Parliament in May 1999 asserted that Washington's plans for controlling encryption software in Europe had nothing to do with law enforcement and everything to do with US industrial espionage. The NSA has also dispatched FBI agents on break-in missions to snatch code books from foreign facilities in the United States, and CIA officers to recruit foreign communications clerks abroad and buy their code secrets, according to veteran intelligence officials.
For decades, beginning in the 1950s, the Swiss company Crypto AG sold the world's most sophisticated and secure encryption technology. The firm staked its reputation and the security concerns of its clients on its neutrality in the Cold War or any other war. The purchasing nations, some 120 of them - including prime US intelligence targets such as Iran, Iraq, Libya and Yugoslavia - confident that their communications were protected, sent messages from their capitals to their embassies, military missions, trade offices, and espionage dens around the world, via telex, radio, and fax. And all the while, because of a secret agreement between the company and NSA, these governments might as well have been hand delivering the messages to Washington, uncoded. For their Crypto AG machines had been rigged before being sold to them, so that when they used them the random encryption key could be automatically and clandestinely transmitted along with the enciphered message. NSA analysts could read the messages as easily as they could the morning newspaper.
In 1986, because of US public statements concerning the La Belle disco bombing in West Berlin, the Libyans began to suspect that something was rotten with Crypto AG's machines and switched to another Swiss firm, Gretag Data Systems AG. But it appears that NSA had that base covered as well. In 1992, after a series of suspicious circumstances over the previous few years, Iran came to a conclusion similar to Libya's, and arrested a Crypto AG employee who was in Iran on a business trip. He was eventually ransomed, but the incident became well known and the scam began to unravel in earnest.
In September 1999 it was revealed that NSA had arranged with Microsoft to insert special "keys" into Windows software, in all versions from 95-OSR2 onwards. An American computer scientist, Andrew Fernandez of Cryptonym in North Carolina, had disassembled parts of the Windows instruction code and found the smoking gun - Microsoft's developers had failed to remove the debugging symbols used to test this software before they released it. Inside the code were the labels for two keys. One was called "KEY". The other was called "NSAKEY". Fernandez presented his finding at a conference at which some Windows developers were also in attendance. The developers did not deny that the NSA key was built into their software, but they refused to talk about what the key did, or why it had been put there without users' knowledge. Fernandez says that NSA's "back door" in the world's most commonly used operating system makes it "orders of magnitude easier for the US government to access your computer."
In February 2000, it was disclosed that the Strategic Affairs Delegation (DAS), the intelligence arm of the French Defense Ministry, had prepared a report in 1999 which also asserted that NSA had helped to install secret programs in Microsoft software. According to the DAS report, "it would seem that the creation of Microsoft was largely supported, not least financially, by the NSA, and that IBM was made to accept the [Microsoft] MS-DOS operating system by the same administration." The report stated that there had been a "strong suspicion of a lack of security fed by insistent rumors about the existence of spy programs on Microsoft, and by the presence of NSA personnel in Bill Gates' development teams." The Pentagon, said the report, was Microsoft's biggest client in the world.
Recent years have seen disclosures that in the countdown to their invasion of Iraq in 2003, the United States had listened in on UN Secretary-General Kofi Annan, UN weapons inspectors in Iraq, and all the members of the UN Security Council during a period when they were deliberating about what action to take in Iraq.
It's as if the American national security establishment feels that it has an inalienable right to listen in; as if there had been a constitutional amendment, applicable to the entire world, stating that "Congress shall make no law abridging the freedom of the government to intercept the personal communications of anyone." And the Fourth Amendment had been changed to read: "Persons shall be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, except in cases of national security, real or alleged."
Abney Associates Technology News: 5 burning tech questions answered, article reference ... - 2 views
-
You've got tech questions, we've found the answers. We help you make the most of your technology by answering your thorniest tech questions. So if you're wondering what to buy, how to plug it in, or how to fix it, we can help. Can Facebook videos be a scam? Q. I tried to watch a video on Facebook, but it didn't work. It made me install a new driver and then still didn't play the video. What gives? A. I doubt that was a real video at all. This is a scam that is common on Facebook. The post looks like a really interesting or scandalous video. When you click it, it asks you to install a driver to watch it. What you actually download is usually a junk file or a virus. When you try to install the "driver," you share the scam video with all your friends so they'll be tricked. When you see a video on Facebook, do a search for the video on YouTube or Google. If you can't find the video, it's probably a scam. You can also see if the scam has been reported on sites like Facecrooks and Snopes. Remove a stubborn virus Q. I have a virus that my regular anti-virus software can't remove. How can I get rid of it? A. To start, make sure your anti-virus software is up to date. Without regular updates, your anti-virus can miss the latest threats. Now, start your computer in Safe Mode - you can do this by pressing and holding F8 during startup. Run the scan again to see if the program catches the virus. If it doesn't, try a scan with another program, like MalwareBytes. If that doesn't work, you might have to use a last-ditch virus remover like AVG's Rescue CD. If none of these solutions work, you will need to wipe the hard drive and reinstall Windows. Article Site: https://twitter.com/Abney_and_Assoc Forum Site: http://www.goodreads.com/topic/show/1163149-abney-associates-privacy-policy
abney and associates warning, avoid internet scams | 'Computer security is an abstract... - 1 views
-
"We are forever trying to train people to have healthier lifestyles: eat better, exercise more, whatever," Schneier writes in a wonderfully entertaining blog post. "And people are forever ignoring the lessons. One basic reason is psychological: we just aren't very good at trading off immediate gratification for long-term benefit. A healthier you is an abstract eventually; sitting in front of the television all afternoon with a McDonald's Super Monster Meal sounds really good right now." "Similarly, computer security is an abstract benefit that gets in the way of enjoying the internet. Good practices might protect me from a theoretical attack at some time in the future, but they're a lot of bother right now and I have more fun things to think about. This is the same trick Facebook uses to get people to give away their privacy; no one reads through new privacy policies; it's much easier to just click "OK" and start chatting with your friends. In short: security is never salient." Schneier expands his ideas by looking at areas where awareness training or education initiatives work (driving, HIV prevention) and where they fail (training the general public to wash their hands, make drug decisions at a pharmacy, food safety). He summarises the obstacles in the path of effective security training. "The threats change constantly, the likelihood of failure is low, and there is enough complexity that it's hard for people to understand how to connect their behavior to eventual outcomes. So they turn to folk remedies that, while simple, don't really address the threats. "We should stop trying to teach expertise, and pick a few simple metaphors of security and train people to make decisions using those metaphors," Schneier concludes, adding that another problem is that "computer security is often only as strong as the weakest link". Read more: http://www.theregister.co.uk/2013/04/23/security_awareness_training/ Video Related: http://www.dailymotion.com/video/xzbyhi_compute
-
this subject is a lot interesting, it would help you so much.
Poissa spear phishing | hong kong abney and associates news article - 1 views
-
News International on säännöllisesti tavoite spear phishing-hyökkäykset kaltaisia, jotka on vaarantua numero kilpailijansa, ja se on jotain, joka pitää yhtiön johtaja hereillä yöllä. Hyökkääjät tuottavat nyt vakuuttavasta sähköpostit, joka huiputtaa osaksi ilkeä liitetiedostojen lataaminen käyttäjät, avaaminen organisaationsa tietomurtoja ja taloudellista vahinkoa. Ja jopa maineikkaimmista yritykset laskevat hyökkääjät temppuja. New York Times ja Wall Street Journal myönsi infrastruktuurinsa oli vaarantunut spear phishing-hyökkäykset, väitetään muovanneet tukemat Kiinan hallitus. Mutta ei ole suuri UK mediassa on myöntänyt samanlaisia rikkomuksia. News International, Rupert Murdochin News Corp: n tytäryritys on yksi maailman tunnetuimpia julkaisijat ja vastaa kuuluisa brittiläinen paperit, mukaan lukien Times, aurinko, ja ennen kuin se sortui hakkerointi skandaali, News of the World. On, että tavoite paljon hakkerointi yritykset itse mukaan Virve News International Tietoturvajohtaja ja tuoli Lontoo luku ISACA-suojausryhmän. Hän kertoi TechWeekEurope, hänen yhtiö näkee "paljon spear phishing". Hän ei tehnyt sanomaan, heidän olisi napsauttanut läpi, johtaa rikotaan, mutta myönsi Oliko se "ihmisen kysymys" News International on työskennellyt kovasti suojella itseään in viime kuukausien - jopa ennen sen Yhdysvaltain hyökkäystä kilpailijat olivat laajasti raportoitu. "Let's olla rehellinen, sinä tai minä laskee sitä joskus elämässä", hän lisäsi. "Ei ole mitään keinoa voimme voi estää jokaisen napsauta joko "Jos sinä ja minä jatkuvasti avata sähköposteja lupaava tietoa meidän toimitusjohtajat ansaitsevat ja nämä PDF-tiedostot ovat terästetty malware, miten [voin hallita että]? "Miten voit heikentää ihmisen uteliaisuus?"
-
Eräät pelotella Tietokonesodasta, ne sivuuttaa sitä vaaraa. Heidän kanssaan tietää he eivät huomanneet, että rikolliset ja ulkomaantiedustelun virastojen tyhjiö valtavat määrät näennäisen viaton ja erilaisia tietoja ja kutoa yhteen tiedot, joita voidaan hyödyntää.
Kalibrera USA Cyber ansträngningar | international abney and associates revie... - 2 views
-
I diskussionerna om cyberhot som fortsätta och utöka dagligen, finns det en tendens att klumpa ihop alla typer av hot oavsett där de faller på skalan. Denna brist på precision medför konsekvenser, varav en är att det hindrar oss från att fokusera på de högsta slut hot som ska behärska vår största uppmärksamhet. Om du vill flytta fram snyggt, behöver Förenta staterna ett sätt att tänka om olika hot aktörer som tolkar och gör åtskillnad mellan mellan och bland dem, enligt de betydande sätt där de kan variera. Sådan en typologi skulle hjälpa amerikanska beslutsfattare bättre rack och stapla hotet, och svara därefter. Tänk på att inte alla hackar eller hackare, och alla aktörer, är de samma. Nationalstater--särskilt Kina, Ryssland, Iran och Nordkorea--utgör high-end cyber-hot mot amerikanska hemland, men staterna varierar mycket i sin förfining, kapacitet, avsikt, motivation, tradecraft och dess tillämpning. Förenta staterna bör fokusera sina resurser på detta high-end hot spektrum, och därmed, bör fokusera på aktörer och deras beteenden, snarare än på teknik eller på medel och formerna för attack. Detta innebär att gräva djupare i detaljerna, och factoring av fall Detaljer om varje av våra motståndare i en skräddarsydd amerikanska svar som utformats för att avskräcka, hindra och tvinga dem. Medan mer sofistikerade och mer beslutsamma än andra amerikanska motståndare i cyber-domänen, måste även dessa fyra skådespelare vara distingerad och differentierade i viktiga variabler. Kina och Ryssland är till exempel djupt engagerade i CNE--Iran och Nordkorea är mer sannolikt att vända sig till CNA, trots saknar nivån på kapacitet som Kina och Ryssland äger. Related Group: http://www.etsy.com/teams/16007/abney-and-associates Related Article: http://www.yelp.com/topic/irvine-hong-kong-technology-warning-blog-abney-associates-jude-law-on-phone-hacking-facebook
Lancement de l'unité nationale sur la cybercriminalité| an abney and associat... - 1 views
-
La connectivité inégalée de l'ère numérique a créé des énormes avantages socioéconomiques. Quatre sur chaque cinq maisons au Royaume-Uni ont accès à l'internet ; les deux cinquièmes des adultes sont des utilisateurs de smartphone et, en moyenne, chaque ménage a trois types d'appareil compatible internet. Mais l'omniprésence de la technologie a apporté avec elle des défis nouveaux pour la sécurité en ligne. Une forte augmentation des menaces du cyberespace a mis à rude épreuve la capacité des organismes à maintenir une vulnérabilité des systèmes de gestion mis à jour. Clairement, l'avance sur cyberhazards de plus en plus sophistiqués et complexes est un défi pour les décideurs qui cherchent à préserver notre bien-être économique. Il y a des signes que le gouvernement est conscient du problème croissant de la cybercriminalité, quand il a récemment annoncé qu'une unité nationale sur la cybercriminalité devait être établi au sein de l'Agence nationale de la criminalité. Lors du lancement de l'appareil, le ministre de la sécurité, James Brokenshire, dit que ce serait un seul plomb UK pour lutter contre la cybercriminalité ; fournir une réponse d'enquête spécialisée et rapide-temps afin d'éliminer les possibilités de la cybercriminalité, notamment grâce à une collaboration étroite avec des partenaires tels que les agences de renseignement. Ce dernier développement dans la lutte contre la cybercriminalité est une bonne nouvelle pour les industries dont les services centrées sur la sécurité du réseau. Avec le coût de la cybercriminalité à l'économie britannique, estimée à des milliards de livres par an et entreprises britanniques portent le fardeau de ce type de crime, les menaces de plus en plus complexes montrent peu de signes de ralentissement. Site connexe : http://abneyandassociates.bravesites.com/tags/entries/internet-technology-by-abney-and-associates Forum des Site:http://www.good.is/posts/abney
Internet International Warning, Abney Associates Review: Scam varning som til... - 1 views
-
En välbekant bluff har återuppstått i Washington Parish, och en Bogalusa bosatt är varning människor inte att falla för den. Jimmy Underwood sade han nyligen fick ett samtal från en person med utländsk brytning, som berättade för honom hade han vunnit $2,5 miljoner och att någon skulle komma från Lafayette på eftermiddagen att presentera honom med sina vinster. Dock Underwood var misstänksam och "typ av tänkte att det var en bluff rätt utanför bat," han låter anroparen fortsätta. Underwood gavs ett spårningsnummer, tillgång kodnummer och säkerhet kodnummer och tillsagd att gå till en butik för att få en grön Dot MoneyPack kort och lägga till $1.000 i den. Uppringaren sa utmärkelsen $2,5 miljoner var juridiska, hade godkänts av den federala regeringen, och att alla skatter hade tagits. Han försett Underwood med ett telefonnummer och berättade för honom att kalla det och be om Jimmy White efter han hade kortet. Underwood var nära en Walgreens, så han gick in och ifyllt manager på telefonsamtalet. Chefen sa att det var en bluff, att den som ringt var sannolikt från Jamaica, och att någon annan hade kommit att rapportera samma sak. Ungefär 10 minuter senare ringde ringer Underwood igen, frågar varför han inte hade kallas tillbaka. Underwood sa till honom att det var en bluff och att det inte var berättigat. Anroparen försäkrade honom var det inte ett skämt, men Underwood berättade för honom att ge pengar till någon annan. Jag sa, "Om jag vann pengar, hur kommer jag behöva betala $1,000?" " Underwood fick veta att han inte skulle verkligen att lägga några pengar, eftersom han skulle få $1000 tillbaka i form av ett presentkort. Related Article: http://abneyassociatesclausen.wordpress.com/2013/02/20/abney-and-associates-reviews-on-cyber-war-warning-microsoft-scheurt-e-mail-snooping-google/ Related Discussion: http://social.technet.microsoft.com/Forums/en-US/olmdiscussion/thread/3ff51444-251e-48c3-ad19-0b6872
-
Something else to watch out for...
Abney Ramsay Associés Hong Kong Nos solutions - 0 views
-
" Solutions Are based on our collective best practice experience supporting the Banner systems, to help with the last piece of the puzzle. "I don't have to worry. I know that when Abney, Ramsay and Associates are here, I will get results." -Vice President for Finance "Our Abney, Ramsay consultants have proven to be highly knowledgeable and experienced as our procedures were translated into the Banner System. They have provided thorough training and guidance, critical help in the use of the system with patient, personal care." - Dean of Students "
Abney Ramsay Associés - 0 views
Abney Associates Internet Technology Spain: Obama's Cybersecurity Executive Order Falls... - 1 views
-
In his State of the Union address, President Obama announced that he had signed an executive order (EO) on cybersecurity. The order uses a standard-setting approach to improve cybersecurity. However, such a model will only impose costs, encourage compliance over security, keep the U.S. tied to past threats, and threaten innovation. While the EO does take some positive steps in the area of information sharing, these steps are hamstrung by the EO's inability to provide critical incentives such as liability protection. As a result, this order could result in few modest changes, or it could result in substantial negative effects. The Scope of the Order The EO uses a very broad definition of critical infrastructure, defining it as "systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters." Such a broad definition could be understood to include systems normally considered outside the cybersecurity conversation, such as agriculture. While there is no way of knowing how far implementation will actually go, this broad definition is certainly concerning. Inhibited Information Sharing In Section 4, the EO attempts to expand information sharing in several noteworthy ways. It calls for the federal government to quickly move unclassified information to the private sector and increase the number of security clearances given to appropriate owners of covered infrastructure. Additionally, the EO expands already existing information-sharing systems such as the Defense Industrial Base (DIB) Enhanced Cyber Services and Cyber Security/Information Assurance Program. These objectives are worthwhile, and the President should be applauded for including them.
-
i would like to thank you for the efforts you have made in writing this article. thanks for your blog, big help.
An Abney and Associates International Blog: As the Dow Soars, How High Can Tech Stocks Go? - 1 views
-
Last Friday, the Dow Jones Industrial Average - the benchmark stock index of America's blue chip companies - closed above 14,000 for the first time since the financial meltdown sent the U.S. economy into the worst crisis in decades. The continued resurgence of the U.S. auto industry and growing optimism about the overall economy helped propel the Dow above the psychologically important 14,000 point level. The surging Dow is an indication of the increasing financial health of the largest American companies, a bright spot in an otherwise shaky U.S. economic recovery, particularly with respect to unemployment. America's blue chip firms - including industrial giants, banks, and auto companies - are healthier than they've been in years. But what about the largest U.S. tech companies? Like the other major stock indices, the tech-heavy Nasdaq index is at or near multi-year highs. On Friday alone, the Nasdaq rose 1%, nearly touching the index's five-year high, which it hit last September, driven in part by tech juggernaut Apple, which had just released the iPhone 5. But Wall Street sentiment has soured on Apple in recent months, somewhat tempering the Nasdaq's continued ascent. How high can tech stocks go? Given Apple's size - it's the largest tech company in the world - it makes sense to begin any forward-looking evaluation of the Nasdaq with the Cupertino, Calif.-based cash machine. Apple constitutes about 12% of the Nasdaq's valuation, and there's no question the company's recent stock swoon has placed a drag on the tech-heavy index. Let's take a look at Apple and three other important Nasdaq companies. Two weeks ago, for the third consecutive quarter, Apple fell short of analyst estimates, sending the company's stock down 10% in after-hours trading, wiping out nearly $50 billion in shareholder value. Source: http://business.time.com/2013/02/04/as-the-dow-soars-how-high-can-tech-stocks-go/
-
well i think this topic is very interesting, but it's also complexing to discuss about it.
1 - 13 of 13
Showing 20▼ items per page
NEW YORK (Reuters) - A New York businessman must face criminal fraud charges for trying to claim a billion-dollar stake in social media company Facebook Inc, a federal judge ruled on Friday.
Paul Ceglia, 40, is accused of forging a 2003 contract with Facebook CEO Mark Zuckerberg that supposedly entitled him to part ownership of the company.
After an hour-long hearing in New York, U.S. District Judge Andrew Carter rejected Ceglia's request to throw out the charges, finding he had failed to meet the "high standard" needed to dismiss a grand jury indictment.
Ceglia sued Zuckerberg and Facebook in 2010 in a federal court in Buffalo, New York, claiming that he and Zuckerberg had signed a contract while Zuckerberg was a freshman at Harvard University for Ceglia to invest $1,000 in a planned social networking website.
Zuckerberg had previously done some programming work for Ceglia's company, StreetFax.com. Facebook has argued that the only contract between the two men was related to that company and accused Ceglia of faking various documents as part of his lawsuit.
Last year, a magistrate judge in Buffalo recommended that Ceglia's lawsuit be dismissed, finding that it was "highly probable and reasonably certain" that the contract was fabricated in order to pursue the lawsuit. The federal judge overseeing the case has not yet ruled on that recommendation.
Prosecutors in New York charged Ceglia in 2012, accusing him of forging documents as part of the Buffalo litigation.
Ceglia has since filed a separate lawsuit against Manhattan U.S. Attorney Preet Bharara, whose office is prosecuting Ceglia, and U.S. Attorney General Eric Holder seeking to halt the criminal case.
On Friday, Ceglia's defense attorney, David Patton, argued that the government should be barred from prosecuting him for allegations he made in the context of a civil lawsuit, warning that it could discourage litigants from filing claims.
He also said the government's allegations do not constitute criminal fraud under federal law.
"They're alleging that it's simply a phony, sham litigation," he said. "That's not fraud."
Carter said the indictment was sufficient to move ahead, though he said he would consider Patton's arguments at a later date if the case goes to trial.
Following the hearing, Ceglia vowed to press forward with his claims against Facebook, while his civil attorney, Joseph Alioto, said they would prove the Zuckerberg contract is legitimate.
"Nothing is going to stop me," Ceglia said.
Ceglia's lawsuit created a bizarre backdrop as Facebook marched toward its initial public offering in May 2013. Facebook's origins were also the subject of a separate legal challenge by Zuckerberg's Harvard classmates, twins Cameron and Tyler Winklevoss, that was chronicled in the 2010 film, "The Social Network."
The criminal case is U.S. v. Ceglia, U.S. District Court, Southern District of New York, No 12-cr-00876. The lawsuit against Bharara and Holder is Ceglia v. Holder et al in the same court, No. 13-00256. The civil case is Ceglia v. Zuckerberg et al, U.S. District Court, Western District of New York, No. 10-00569.
Visit the world of internet technology and infotech update @
Abney and Associates PC Speak http://abneyassociates.org/
An Abney and Associates Internet and Technology Research Lab Articles http://abneyassociates.org/category/articles/