18 Jan

“Bribery” Alleged in Mercenary Case

first_imgOne of the prosecution’s witnesses in the mercenary case involving 18 Liberians, Prince Barclay has alleged that corrections officers of the Bureau of Rehabilitation and Corrections at the Ministry of Justice (MOJ), received money to release Bob Marley, another co-defendant, from the Monrovia Central Prison.He was expected to have testified on Friday, April 25, but that did not happen after state lawyers claimed he was suffering from severe diarrhea. This caused Judge Emery Paye to postpone the trial to, Monday, April 28.When he appeared Monday, April, 28, to testify in favor of the state, witness Barclay made the claim that Bob Marley was released after bribing Ministry of Justice’s employees assigned at the Monrovia Central Prison.He did not mention the number of corrections officers that received the money to free Marley, neither did he say how much was offered to them (Ministry of Justice employee) to release him (Bob).The co-defendant turned government witness told the court “somebody entered our cell and gave the money to the officers, purposely to release everyone of us, so that we could go to La Côte d’Ivoire to fight.”“Bob Marley was the only person that was released among us,” he claimed.He was among the 18 persons accused of launching cross border attacks into neighboring La Côte d’Ivoire, where seven United Nations peacekeepers were killed.Explaining his relationship with Marley, Barclay claimed he was the former deputy chief of staff to Bob, whom, according to him, was then chief staff of the Liberian mercenaries fighting alongside pro- Laurent Gbagbo forces.“After our recruitment, we were given 30 Million CFA as partial payment. After we successfully reinstated Gbagbo, the balance would have been given to us,” witness Barclay alleged.“Unfortunately”, he said, “Marley fled with the money when we were attacked by the United Nations forces.”In his testimony, Barclay alleged he was in prison when the UN peacekeepers were killed.“I was not there when the seven UN peacekeepers were killed, but I was told by some of the defendants that they killed them (UN peacekeepers),” the state witness concluded.The trial continues.Share this:Click to share on Twitter (Opens in new window)Click to share on Facebook (Opens in new window)last_img read more

20 Dec

Ousted Coliseum executive’s spending raises eyebrows

first_imgOAKLAND — Ousted Coliseum Authority Executive Director Scott McKibben is facing criminal charges of violating state conflict-of-interest laws, but his spending habits as head of the special agency raise new questions about how he did his job.Bills show McKibben charged the public agency for two NBA Finals tickets given to lawyers, traveled out of state without board approval to meet with an executive he now works for, and authorized a $25,000 payment to the son of former state Sen. Don Perata, …last_img read more

18 Dec

Real Feather Hair Extensions : They were fab, could have done with been longer

first_imgLovee these they are astounding amazing colours specially the purple and blue colors, actually good if your hunting for a minor pleasurable for your hair and effortless to apply :).Loves the color and previous a prolonged time.Real Feather Hair Extensions – Midnight Naturals (10 Feathers)Salon grade, real rooster feather hair extensions from Whiting & Metz3, 5, or 10 loose feathers with colours EXACTLY as pictured for each packEach Piece 8.5-13 inches longIncludes 10 micro rings + Application loop (You will need your own household pliers to crimp the rings)Application & Removal can be done at home in a matter of minutes, instructions includedLoves the color and previous a prolonged time.Amazing feathers, terrible beads. I set these feathers in my hair in november, and they have lasted really effectively thinking about i wash and blow dry my hair each day. I took them out today at function (i am a hairdresser) and it took two of us 50 percent an hour to eliminate six. The beads, even though quite potent, do not clear away well, as an alternative of bending into an o from flat, they fold and crumble trapping the hair additional, and the paint flakes away, resulting in a incredibly sore head and broken hair.The feathers them selves are superb quality, but the beads are dreadful high-quality and i will never be employing those yet again, i will use a diverse band bead future time.Seems quite very in my hair and design and style.Real Feather Hair Extensions – Midnight Naturals (10 Feathers) : They were fab, could have done with been longer. They were fab, could have done with been longer though and only found the one length on web site. They ended up fab, could have done with been more time. They ended up fab, could have finished with been lengthier though and only uncovered the one size on world wide web internet site.Lovee these they are astounding amazing colours specially the purple and blue colors, actually good if your hunting for a minor pleasurable for your hair and effortless to apply :).Seems quite very in my hair and design and style.last_img read more

15 Dec

Why We’re Not In A Cyberwar With China

first_imgantone gonsalves Tags:#business#China#CISPA#corporate networks#cyberespionage#cyberwar#Government#hackers#Obama administration#spying#u.s. Related Posts IT + Project Management: A Love Affair 3 Areas of Your Business that Need Tech Nowcenter_img Massive Non-Desk Workforce is an Opportunity fo… Recent reports of Chinese cyberspying have revealed hacking operations with a shocking scale and level of sophistication. China’s hackers appear to be stealing massive amounts of intellectual property and proprietary information from U.S. companies, including those connected to the nation’s critical infrastructure, such as waterworks, the electrical power grid and oil and gas pipelines. A recent study  by security company Mandiant has shown that, in all probability, some of the snooping has been done by an arm of the Chinese military.The revelations of China’s misbehavior have led some writers to rashly declare that the U.S. is at war with our Asian rival, at least in cyberspace. This could not be further from the truth, and here’s why.There’s No WarFirst, something obviously needs to be done to punish China for its thievery. But to describe the current state as war or cyberwar draws emotions at the expense of rational thinking. We are not at war with China, either in or out of cyberspace.Real cyberwar would start with an attack that destroys something valuable or vital, kills people, or both. If the recipient labels the strike an act of war then time for negotiations is over. “Reacting diplomatically and legally to an act of cyberwar is inadequate,” says Stewart Baker, a partner at Steptoe & Johnson and a former assistant secretary for policy at the Department of Homeland Security. “It’s an act of war, we need to treat it as such and respond with our own acts of war.”An example of a true cyberattack was the Stuxnet malware that destroyed centrifuges in Iran’s nuclear facilities. Discovered in 2010, Stuxnet was designed by the U.S. and Israel, according to media reports.We are not under attack by China. The country is not our enemy. It is our economic and political rival. There is no evidence China wants to destroy anything. What it wants is information that provides a trade advantage, and at the moment there’s no better way to get data from U.S. competitors than to let your spies loose on the Internet.Most experts assume the U.S. also hacks China’s computers to gather intelligence. The Brookings Institution, a Washington think tank, has identified two growth areas in the U.S. defense industry, drone manufacturing and the development of malware capable of exploiting software vulnerabilities not yet known to the developer.Governments have always spied on each other, so it’s no surprise that China, the U.S. and many other countries are using the Internet to steal information. Where China goes too far is in hacking U.S. companies. By law, the U.S. government cannot break into the computers of private companies for the sole purpose of taking intellectual property. China has no such restrictions.What We Can DoSo the U.S. is within its rights to use every diplomatic, political, legal and economic tool at its disposal to pressure China to stop hacking private companies – or to at least negotiate an informal agreement that sets limits. While it’s true China holds $1.2 trillion in U.S. debt, the U.S. is also the biggest buyer of Chinese goods. The U.S. is not without leverage here.The Obama administration has already put China on notice. On Wednesday, the White House released its strategy for preventing the theft of U.S. trade secrets. The plan includes ratcheting up diplomatic efforts and making prosecution of foreign companies a top priority.Such pressure could eventually lead to informal agreements that start small and grow in scope as trust builds. A starting point for the U.S. and China could be a ban on the destruction or disruption of critical infrastructure or technology driving the global economic system.In the past, nations have reached understandings governing maritime transportation, air transport, the behavior of navies and international trade well in advance of formal treaties on these subjects, according to a recent paper by Richard Clarke, a former White House adviser on cybersecurity and cyberterrorism, entitled “Securing Cyberspace Through International Norms.” For example, the U.S. and Russia are in discussions to establish a cyber hotline in order to prevent cyberspace activity from escalating into a conflict.In the meantime, the U.S. should move much faster to adopt regulations for securing critical infrastructure and corporate networks. A good start would be passage of the Cyber Intelligence Sharing and Protection Act (CISPA), which would establish rules for sharing cyberthreat information between private industry and government agencies. Such information is important in strengthening defenses.Eventually, China and the U.S. will draw lines in cyberspace that neither will cross. To get there, we should avoid nonsensical discussions of war that paint China as the enemy, and look for areas of agreement from which we can move forward.Photo by Shutterstock Cognitive Automation is the Immediate Future of…last_img read more

3 Dec

Former RJD MP sent to jail

first_imgFormer Rashtriya Janata Dal (RJD) MP and strongman of Bihar’s Saran district Prabhunath Singh and two others were convicted on Thursday in an old murder case by a local court of Hazaribagh in Jharkhand. All three were later sent to jail. The quantum of punishment will be pronounced on May 23.Additional district and sessions judge Surendra Sharma found Prabhunath Singh, his brother Dinanath Singh and one Ritesh Singh guilty of the murder of former MLA Ashok Singh. MLA killed in blastAshok Singh, the then Janata Dal MLA from Masarakh constituency of the Saran district in Bihar, died in a bomb blast on July 3, 1995, when he was sitting in the lawns of his official bungalow in Patna. “My brother defeated Prabhunath Singh in the 1995 Assembly poll and Prabhunath Singh had openly said that my brother will be killed within 90 days of becoming a legislator. He was killed on the 90th day,” Tarkeshwar Singh, younger brother of Ashok Singh, told journalists. The day Ashok Singh, 28, was killed, he had met the then Director General of Police G.P. Dohre for police protection.“It was a long battle, but I had full faith in the judiciary and I’m happy that justice has been done,” Chandani Singh, wife of Ashok Singh, told journalists.last_img read more

31 Aug

Qubits and Branes Share Surprising Features

first_img Citation: Qubits and Branes Share Surprising Features (2008, July 3) retrieved 18 August 2019 from https://phys.org/news/2008-07-qubits-branes-features.html Most recently, Duff and colleagues from Imperial College London and the Institute for Research in Fundamental Sciences in Tehran, Iran, have discovered another correlation. They’ve shown that the “branes” in string theory mathematically correlate to the qubits in quantum information theory. Their study, titled “Wrapped Branes as Qubits,” is published in a recent issue of Physical Review Letters.“These relations between black holes and qubits are still mysterious,” Duff told PhysOrg.com. “The significance of this recent paper is that, by invoking branes wrapping around the extra dimensions, it resolved the puzzle of why black holes should display any kind of two-valuedness: ‘To wrap or not to wrap; that is the qubit.’”In string theory, which requires extra dimensions, branes are theoretical objects that can be used to describe parts of the universe on a quantum scale. For instance, black holes can be described by four D3-branes intersecting at an angle, which can be useful for understanding the microscopic origins of black hole entropy.In the current study, the researchers have shown that four D3-branes can also be wrapped around the six extra dimensions of space (that exist in 10-dimensional string theory) in a way that closely resembles an entangled three-qubit state. As the physicists explained, the way that each D3-brane can wrap one way or the other around dimensions resembles the two states that a qubit can have. The researchers showed that a similar correlation exists between M2-branes, which can wrap in one of three ways around dimensions, and qutrits, which have three possible states.To mathematically demonstrate this connection, the physicists used a well-known fact from quantum information theory: a three-qubit state can be described by five parameters (four real numbers and an angle). They showed how these five parameters correspond to the four D3 branes and the branes’ angle of intersection. The work adds to a growing body of papers published in the past year on correlations between entanglement and black holes (or quantum gravity). As the physicists described, these papers are building a kind of dictionary of translations between phenomena in one language to the phenomena in the other. “When two very different areas of physics share the same mathematics, one can learn new things about each field by borrowing techniques from the other,” Duff said. “This has been a two-way pay-off and we are certain that yet more correlations will be discovered.” However, no one yet knows whether there are any physical reasons underlying these mathematical coincidences. As Duff said, “an underlying physical basis, if it exists, would be an extra bonus.”Still, understanding the mathematical correlations could be enough to lead to some interesting applications in quantum information theory.“The weird kind of numbers known as octonions have fascinated both mathematicians and physicists for decades,” Duff said. “But in their recent books, both Roger Penrose and Ray Streater have written them off as ‘lost causes in physics’ because they have so far failed to find any application. However, we believe that the tripartite entanglement of seven qubits (inspired by stringy black holes) provides a way of testing octonions in the laboratory, and this might find applications in QI, for example, in cryptography.”More information: Borsten, L.; Dahanayake, D.; Duff, M. J.; Ebrahim, H.; and Rubens, W. “Wrapped Branes as Qubits.” Physical Review Letters 100, 251602 (2008).Copyright 2008 PhysOrg.com. All rights reserved. This material may not be published, broadcast, rewritten or redistributed in whole or part without the express written permission of PhysOrg.com. What do black holes and entangled particles have in common? Until about a year ago, physicists thought that the two entities existed in completely separate worlds. Then, in 2007, physicist Michael Duff from Imperial College London demonstrated a correlation between the entanglement of three qubits and the entropy of a black hole. In the past year, several studies have demonstrated even more connections. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. (Left) A simulated view of a black hole, and (right) a qubit representation. Credit for black hole: Ute Kraus, physics education group, Theoretische Astrophysik Tübingen, Space Time Travel (http://www.spacetimetravel.org/).last_img read more