Wednesday, February 29, 2012

NSW: Sartor denies any backroom deal over development


AAP General News (Australia)
02-27-2008
NSW: Sartor denies any backroom deal over development

SYDNEY, Feb 27 AAP - NSW Planning Minister Frank Sartor has told parliament he was
not involved in any secret deal to approve a controversial housing development under the
flight path of Canberra airport.

Mr Sartor today defended his decision to ignore the findings of an expert panel and
give the go-ahead to the development, undertaken by the Village Building Company in the
Queanbeyan area called Tralee.

It has been revealed the Village Building Company donated $164,900 to the Labor Party
over the past five years.

In response to an …

A decade after 9/11, US hails killing of Osama bin Laden in Pakistan firefight. Obama: This is a good day for America. PM calls assassination 'a victory for justice, freedom and for our common civil


HILARY LEILA KRIEGER /Jerusalem Post correspondent
Jerusalem Post
05-03-2011
A decade after 9/11, US hails killing of Osama bin Laden in Pakistan firefight. Obama: This is a good day for America. PM calls assassination 'a victory for justice, freedom and for our common civilization.' Al-Qaida leader dies in gun-battle with Navy SEALs after using wife as human shield. US warns its citizens Islamists will try to carry out retaliatory strikes
Byline: HILARY LEILA KRIEGER /Jerusalem Post correspondent
Edition: Daily
Section: News
Type: News

WASHINGTON - "This is a good day for America."

So proclaimed US President Barack Obama Monday as America and much of the world celebrated the death of the man behind the deadliest terror attack on American soil, a day after US Navy SEALs took out Osama bin Laden in a covert helicopter raid in Pakistan.
Leaders across the globe congratulated the US, including Prime Minister Binyamin Netanyahu, who released a video Monday praising America's president and military on their operational triumph.

"It took 10 years to track Osama bin Laden down. It took 10 years to bring a measure of justice to his victims. But the battle against terror is long and relentless and resolute," he said. "This is a day of victory, victory for justice, for freedom and for our common civilization."

Bin Laden was killed in a carefully planned helicopter raid that was kept secret even from the Pakistani government. US officials revealed that the al-Qaida leader, who masterminded the 9/11 attacks and taunted the US repeatedly in video and audio messages issued over the past decade, used his wife as a human shield during the gun- battle that took his life. After bin Laden's identity was confirmed, his body was thrown into the ocean.

"Our country has kept its commitment to see that justice is done," Obama told families of war veterans receiving the Medal of Honor at the White House. "The world is safer. It is a better place because of the death of Osama bin Laden."

But American officials warned that the fight against al-Qaida and the other extremist groups that threaten America is far from over.

"The fight continues and we will never waver," Secretary of State Hillary Clinton declared at the State Department Monday morning. "We must take this opportunity to renew our resolve and redouble our efforts."

In particular, she stressed, "In Afghanistan we will continue taking the fight to al-Qaida and their Taliban allies."

In the short term, top US officials were also warning that the country, and particularly Americans abroad, should brace for retaliatory strikes.

CIA Director Leon Panetta said al-Qaida would "almost certainly" try to avenge the killing of Osama bin Laden.

"Though bin Laden is dead, al-Qaida is not. The terrorists almost certainly will attempt to avenge him, and we must - and will - remain vigilant and resolute," Panetta said.

The State Department sent out an unusual worldwide travel warning for American citizens in anticipation that there could be revenge attacks, though the Department of Homeland Security said it had no information of specific threats to upgrade its alert system.

On the local level, however, security personnel were stationed outside sensitive sites, including synagogues.

White House counter-terrorism adviser John Brennan said that minimizing the risk to American operatives and the surrounding civilian population informed the decision about which of several different approaches to take against the compound believed to hold bin Laden in Pakistan.

He said that a small-team helicopter raid was chosen also because it would gave the US the best chance at being able to verify that they had taken bin Laden and to minimize friction with the Pakistani government, which was not informed of the raid before it occurred.

Brennan said that while the US had a high degree of confidence that bin Laden was inside the compound - a million-dollar, high- walled, one-of-its-kind estate lacking Internet and phone connectivity in the affluent town of Abbottabad, some 35 miles north of Islamabad - there was no confirmation before the early morning operation that bin Laden was inside.

Brennan said Obama's decision to go ahead with the raid, despite lacking unanimity among his advisors, was one of the "gutsiest calls of any president in recent memory."

He said that the US is now "99.9 percent" certain that the US commandos had killed bin Laden, given DNA, appearance and other telling information, but demurred on whether the government would release photos as many have demanded.

The order was given to take bin Laden alive if possible, but if encountering likely resistance, he could be killed on sight, according to Brennan. He said bin Laden was killed in a firefight, along with his son, two couriers at the house and his wife, the latter of whom appeared to have been used as a human shield.

Bin Laden's body was thrown into the ocean so it will not become a shrine for terrorists, Brennan said.

In addition to whether to release the photo of bin Laden, who apparently died of gunshot wound to the head, the elimination of al- Qaida's top leader has triggered a number of policy debates. Chief among them are how to deal with Islamabad - which US officials repeatedly called a "partner" and active in counter-terror work despite serious questions about how bin Laden could have lived in such an unusual, urban compound without the knowledge of at least some Pakistani officials.

Critics of the war in Afghanistan are also suggesting that the fight there can now wind down more quickly since its chief objective has been met.

But Brennan said the purpose of the fighting in Afghanistan was to make sure al-Qaida could never again operate out of the mountainous country, and US Senator Joe Lieberman, an Independent from Connecticut who heads the Homeland Security Committee, said it would be a mistake to back off now.

"The killing of bin Laden gives us increased momentum in the war in Afghanistan," he said. "If I were a leader of the Taliban, if I were Mullah Omar, I'd be frightened right now."

He added that the US had to seize the opportunity presented by this moment in history to support the emergence in democracy in the Middle East.

"To rid our world not only bin Laden but bin Ladenism, it is critical that we do everything we can to help the democratic forces in the Middle East succeed," he said. "For it will be at the hands of his fellow Arabs and his fellow Muslims that bin Laden is finally and firmly consigned to the trash heap of history."

Regarding the replacement of extremism with democracy, Clinton said, "There is no better rebuke to al-Qaida and its heinous ideology."

Brennan assessed that eliminating bin Laden struck a major blow against al-Qaida and its appeal to terrorist groups across the world, as it cut off the head of the snake.

"This is a strategic blow to al-Qaida," he said.

But other terrorism and foreign policy experts disagree with how significant this development will be to the global fight against extremism.

"As welcome as this is, I don't think it transforms the nature of the threat or the challenge that we face," Richard Haass of the Council on Foreign Relations warned. "We were successful in this case in killing Osama bin Laden, but this disease and the scourge of terrorism remains. We have to be prepared for the long haul."(c) Copyright Jerusalem Post. All rights reserved.

Illustrations/Photos:
Caption: JUSTICE, FINALLY. People in New York's Times Square early
yesterday celebrate the killing of Osama bin Laden, hours after
President Barack Obama had announced the death of the al-Qaida chief
in a 'targeted operation' north of Islamabad, Pakistan. The video
frame shows the interior of the mansion where bin Laden died in a
firefight with US commandos.

(Copyright 2011 The Jerusalem Post)

QLD:Lockyer Valley residents to pay flood levy


AAP General News (Australia)
08-29-2011
QLD:Lockyer Valley residents to pay flood levy

Ratepayers in one of Queensland's worst flood-hit regions will pay an annual 30 dollar
levy to pay for preparations for future disasters.

Lockyer Valley Regional Council handed down its budget today, with more than 108 million
dollars due to be spent on road and bridge infrastructure alone, after January's floods.

The floods all but destroyed the valley's small towns of Grantham, Murphys Creek and
Spring Bluff, and claimed at least 17 lives.

AAP RTV gd/wf

KEYWORD: RECOVERY LOCKYER (BRISBANE)

� 2011 AAP Information Services Pty Limited (AAP) or its Licensors.

New M86 Security Labs: Spam Volume Drops and 3rd-Party Phishing Increases


Wireless News
02-18-2011
New M86 Security Labs: Spam Volume Drops and 3rd-Party Phishing Increases
Type: News

Frustrated email users may have noticed a significant drop in spam in recent months, but cybercriminals are gaining ground with creative new phishing methods, according to the latest Security Labs Report from M86 Security.

Investigating the cyber threat trends in the second half of 2010 for its bi-annual report, M86 Security Labs analyzed spam, phishing, and malware activity, and tracked global Internet security trends. Millions of email messages, infected Web pages and malware samples were reviewed and then correlated with their own Web exploit and vulnerability research, providing M86 with a vantage point to report on these trends.
"What is especially noteworthy is that our findings demonstrate that vulnerabilities already patched are continuing to be successfully used for malicious gain.Organizations and individuals must get better at updating their applications and staying ahead of attacks on their devices and their networks," said Bradley Anstis, vice president of technical strategy, M86 Security. "While the M86 Security Labs report notes that great strides are being made in thwarting cyber-criminal attempts, there is always something else coming through the back door."

Key findings by the M86 Security Labs for the second half of 2010:

-Email Spam is Declining, though Far from Dead: According to the M86 SecurityLabs research, spam volume has slowed considerably, down to one-third thelevel at year end when compared to June 2010. Using the M86 SecurityLabs Spam Volume Index, which tracks changes in the volume of spamreceived by representative domains, the research shows that spam reductionwas affected by botnet disruptions and the closure of a popular affiliate program. This is the lowest sinceNovember 2008, when the rogue hostingprovider McColo was taken offline.

-Botnet Take-downs andSpamit.com Closure: Notably, Spamit.com, an underground affiliate programused by several spamming botnets, was shut down in late September 2010.Spamit.com was linked to Glavmed and the "Canadian Pharmacy" brand ofbogus online pharmacies. The Rustock botnet was most affected, with itsspam output drastically reduced. However, plenty of other botnets moved upto take its place, and trends in this threat category will continue to bemonitored for changes and increases. Other spamming categories in the topfour include those for replica watches, fake diplomas and cheap watches.

In August, notorious spammer/botnet, Pushdo/Cutwail, was taken down, resulting in a significant spam volume decrease due to a coordinated takedown attempt by security researchers.According to Anstis, such efforts are typically short lived, with the botnets returning to their normal activities.

Another botnet, Mega-D, has been taken down multiple times since 2008, only to return. In November 2010, the FBI identified and apprehended Oleg Nikolaenko, a Russian behind the botnet. The botnet since has generated less than 5 percent spam by volume.M86 Labs analysts point to the continuing need to go after and prosecute botnet operators for more long-term impact on spam operations and volumes.

-Third-Party Phishing on the Rise: The good news about phishing isthat such practices delivered via email are declining dramatically asusers are becoming more aware of fake e-mails claiming to be from bankinginstitutions. The bad news: cyber-thieves have found more effective meansof stealing bank information from users visiting legitimate bankingwebsites. Malware, including Trojans like SpyEye and ZeuS, areincreasingly popular methods for criminals to make off with personal andfinancial information.

Additionally, attacks posing as third-party agencies such as the IRS and the New Zealand Department of Inland Revenue are being used to phish for a user's bank account information under the guise of receiving bogus tax refunds. This makes it easier for thieves to obtain information from unsuspecting users by providing multiple options to the user to select the bank of their choice, thus eliminating the guessing game typically played to determine where a user conducts their banking. UK banking customers have been similarly affected, receiving a falsified email purporting to be from HM Revenue and Customs with the same legitimate looking page with options for all banks in that specific region.

-Exploit Kits with Virus Scanners, Social NetworkAttacks Increase: Aspreviously reported by M86 Security, the popularity of exploit kits is onthe rise. The newest trend is that more kits are offering services to theircustomers thus becoming more of a "one- stop shop." The scanning module inthe Siberia Exploit kit and Neosploit's new Malware-as-a-Service offeringare just a couple of significant examples signaling a shift in exploit kitcapabilities.

While traditional forms of spamming via email are down, spam techniques using such social networking sites as Twitter, Facebook and LinkedIn, continue to expand. The LinkedIn scam has a legitimate look and feel, inviting users to connect with others in their "network," only to be connected with the Phoenix exploit kit infection page, which tries to exploit the victims' computer through various vulnerabilities.

M86 Security Labs is a group of security analysts specializing in Email and Web threats, from spam to malware.

More Information:

www.m86security.com

http://m86.it/2h2010

((Comments on this story may be sent to newsdesk@closeupmedia.com))

Copyright 2011 Close-Up Media, Inc. All Rights Reserved.
n/a

FED:Qantas carries out more engine checks


AAP General News (Australia)
12-02-2010
FED:Qantas carries out more engine checks

Qantas is conducting further inspections of its troubled A380 engines .. while officials
identify the possible cause of the mid-air engine explosion over Indonesia.

The Australian Transport and Safety Bureau (ATSB) has today alerted all airlines and
safety authorities of a potential manufacturing defect in the Rolls-Royce Trent 900 engines
.. and recommended a further round of inspections.

Qantas says it'll conduct the checks at its Sydney base today on its two A380s that
were returned to service last weekend .. but its remaining A380s remain grounded after
the November 4 mid-air engine explosion.

Qantas says there is no immediate risk to flight safety .. or an effect on international
flights .. but contingencies are in place.

The ATSB will release its preliminary report into the engine explosion tomorrow.

AAP RTV dmc/jmc

KEYWORD: QANTAS (SYDNEY)

� 2010 AAP Information Services Pty Limited (AAP) or its Licensors.

ACT: Main stories in Tuesday's Canberra newspapers


AAP General News (Australia)
04-27-2010
ACT: Main stories in Tuesday's Canberra newspapers

CANBERRA, April 27 AAP - The main stories in Tuesday's Canberra Times:

Page 1: Melbourne Storm former chief executive Brian Waldron says he wasn't the sole
architect of the club's salary cap rort. The federal government's funding for environment
protection programs could be slashed by up to 25 per cent in next month's budget.

Page 2: The retirement savings of many Australians could be boosted by up to $50,000
under a federal government plan. Troy Buswell's future as West Australian treasurer is
in jeopardy.

Page 3: The fallout from the Labor preselection battles in the seats of Canberra and
Fraser continues. Safety was second to job creation under the federal government's home
insulation scheme, a whistleblower says.

World: The Pope has told priests to safeguard children from evil. Thailand's Red Shirt
protesters have told followers to ditch their usual crimson attire and go undercover.

Finance: Australian firms want the Henry tax review to give them less taxes and red
tape. The Australian dollar ended US1c higher, after the Greek government's request for
aid boosted sentiment for high-yielding assets.

Sport: ACT Brumbies flyhalf Matt Giteau has called for referee Steve Walsh to be dumped
for Saturday night's clash with the Queensland Reds. Melbourne Storm former chief executive
Brian Waldron asked for an amnesty period for clubs to admit breaching the NRL salary
cap three years ago.

AAP bsb/rs

KEYWORD: MONITOR FRONTERS ACT

2010 AAP Information Services Pty Limited (AAP) or its Licensors.

FED: Hospital study shows full moon's "werewolf" effect


AAP General News (Australia)
12-13-2009
FED: Hospital study shows full moon's "werewolf" effect

A hospital study has found a spike in out-of-control "werewolf" patients during a full moon.

Almost a quarter of the 91 emergency cases rated as having violent and acute behavioural
disturbance at the Calvary Mater hospital in Newcastle over 12 months occurred under a
full moon.

LEONIE CALVER .. a clinical research nurse in toxicology .. says all had to be sedated
and physically restrained to protect themselves and others .. as some attacked the staff
like animals ... biting .. spitting and scratching.

She says modern day werewolves are more likely to be influenced by alcohol and drugs
than belladonna and nightshade from mythology.

AAP RTV dr/jmt

KEYWORD: WEREWOLF (SYDNEY)

2009 AAP Information Services Pty Limited (AAP) or its Licensors.

Qld: Charity can can? French say charity can't can't


AAP General News (Australia)
08-04-2009
Qld: Charity can can? French say charity can't can't

By Steve Gray

BRISBANE, Aug 4 AAP - Some Aussie kids won't be learning to speak French in a hurry.

A Queensland charity has been forced to rebadge planned fundraisers after being threatened
by lawyers for the famed Moulin Rouge cabaret in Paris.

The Hear and Say Centre is one of the leading children's deafness and cochlear implant
centres in the world. It teaches children who are deaf or hearing impaired to listen and
speak.

The charity had planned Brisbane and Gold Coast fundraisers themed on the Moulin Rouge
experience, with wine, the Can Can, monsieurs et mademoiselles.

Posters and tickets were printed, publicity was creeping along - and then came a letter
from lawyers representing the Paris cabaret telling Hear and Say to cease and desist.

"I'm absolutely appalled, but at the same time excited that they've probably done the
opposite to what they were trying to do - by giving us publicity," said the Gold Coast
event's organiser, Nicholas Rone.

"What we did immediately was remove Moulin Rouge from the website, which is, I guess
where they found it."

Mr Rone said another donor had done the printing for free and all the material now
had to be reprinted.

"So many people have put in so much hard work to make this thing come off," he said.

"It's all to try and raise funds in a very difficult economy."

The Brisbane event is now billed as "Le Windmill de Rouge (due to unprecedented legal
action from Paris)" and says "all proceeds will be donated to the Hear and Say Centre
to help Queensland children learn to hear, listen and speak (but not in French)".

The Gold Coast event is now the Gala Charity Ball but still with the French trimmings.

"I just think it's a bunch of people sitting there with far too much time on their
hands," Mr Rone said of the legal threat.

AAP stg/pjo/mmr/cdh

KEYWORD: CHARITY

2009 AAP Information Services Pty Limited (AAP) or its Licensors.

WA: Specialist crews fly to Victoria


AAP General News (Australia)
02-10-2009
WA: Specialist crews fly to Victoria

A team of specialist officers from Western Australia is flying to Victoria today to
help authorities deal with the aftermath of the bushfires.

The five disaster victim identification officers and two vehicles will follow a team
of 22 Department of Environment and Conservation .. and Fire and Emergency Services Authority
officers .. while WA firefighters remain on standby.

DEC officer ROGER ARMSTRONG has told ABC Radio he's not convinced the controversial
stay-or-go policy is wrong .. saying those who lost their lives while on the run from
Victoria's fires .. had probably left it too late.

AAP RTV jp/jmt

KEYWORD: BUSHFIRES VIC WA (PERTH)

2009 AAP Information Services Pty Limited (AAP) or its Licensors.

NSW: Main stories in today's Sydney newspapers =2


AAP General News (Australia)
08-23-2008
NSW: Main stories in today's Sydney newspapers =2

THE SYDNEY MORNING HERALD

Page 1: Don Bradman's elusive four runs that would have given him a perfect average
of 100 Test runs may have been found, a sports statistician claims.

Page 2: At least 13 young children from India were kidnapped, given new identities
and adopted by unsuspecting Australian families, according to Indian police.

Page 3: Sydney's leafy north shore municipality of Ku-ring-gai continues to fall prey
to developers thanks to its own council and the NSW government.

World: Russia has given conflicting signals about whether it will withdraw its troops
from Georgia before last night's self-imposed deadline.

Business: Two of ANZ Bank's most senior executives resigned following a review of its
securities lending business, including its relationship with the failed margin lender
Opes Prime.

Sport: Australia's entrants in the men's and women's BMX racing at the Beijing Olympics
both crashed in the deciders.

MORE vpm/rs

KEYWORD: MONITOR FRONTERS NSW 2 SYDNEY

2008 AAP Information Services Pty Limited (AAP) or its Licensors.

Vic: Car believed to be gangland lawyers burns


AAP General News (Australia)
04-17-2008
Vic: Car believed to be gangland lawyers burns

A luxury car reportedly owned by prominent Melbourne gangland lawyer NICOLA GOBBO went
up in flames last night.

News Limited says the car was destroyed and police are treating the fire as suspicious.

Ms GOBBO'S underworld clients include crime boss TONY MOKBEL and gangland killers CARL
WILLIAMS and NICHOLAS IBRAHIM .. crime boss LEWIS MORAN and MOKBEL'S wife DANIELLE MCGUIRE.

AAP RTV gr/gfr/af/bart

KEYWORD: CAR (MELBOURNE)

2008 AAP Information Services Pty Limited (AAP) or its Licensors.

Fed: Howard congratulates McKew on official Bennelong victory


AAP General News (Australia)
12-13-2007
Fed: Howard congratulates McKew on official Bennelong victory

JOHN HOWARD says he has no complaints after ending his 33-year parliamentary career.

He conceding defeat officially in the Sydney seat of Bennelong yesterday .. and congratulated
Labor's MAXINE MCKEW as she was confirmed as the new MP for the seat he had held since
1974.

After a polite handshake .. he wished her well.

The defeated leader has remained largely out of the public eye since his 11-year-old
government's shattering defeat on November 24.

But he appeared at the ceremony in Sydney yesterday .. at which Australian Electoral
Commission officials formally declared Ms MCKEW the victor in Bennelong.

Mr HOWARD'S the second sitting prime minister to lose his seat at an election .. after
STANLEY BRUCE in 1929.

AAP RTV hn/sp/wz/crh

KEYWORD: POLL07 BENNELONG (SYDNEY)

2007 AAP Information Services Pty Limited (AAP) or its Licensors.

SA: Be active challenge for SA students


AAP General News (Australia)
04-30-2007
SA: Be active challenge for SA students

ADELAIDE, April 30 AAP - The South Australian government is challenging primary school
and early high school students to be more active in a bid to reduce childhood obesity.

The government has launched the $1.8 million Premier's Be Active Challenge, which will
encourage students from reception to year nine to be physically active for at least one
hour each day over a 10-week period.

"We want children to turn off the television and computer games and turn to physical
activity," Education Minister Jane Lomax-Smith said.

"The healthy habits we teach children today can help to reduce their risk of type two
diabetes, heart disease and other obesity-related health conditions in the future.

"It's critical that our young people get plenty of physical activity whether it's playing
in a local park, enjoying physical education lessons at school or taking part in organised
sport."

Students who take part in the challenge will be rewarded with medals and other awards
while schools will be eligible for sports equipment grants.

AAP tjd/cp/bwl

KEYWORD: ACTIVE

2007 AAP Information Services Pty Limited (AAP) or its Licensors.

NSW: Investigators still want to talk to man over bin death


AAP General News (Australia)
12-30-2006
NSW: Investigators still want to talk to man over bin death

Police are still searching for a dark-skinned man in his early 20s in connection with
the death of an elderly Sydney woman on Wednesday.

81 year old KATHERINE SCHWEITZER was found strangled .. her body stuffed into a wheelie bin.

Police believe she was killed in her Bellevue Hill unit between 2.15 pm and 6.45 pm
(AEDT) on Wednesday .. with her body then dumped in a bin that was abandoned in the corridor
outside her door.

Officers have released a description of an unidentified man they want to talk to who
was seen in Mrs SCHWEITZER's building at about 3.30 pm on the day of her death.

Police say while they're eager to speak to the man .. it is possible he may have had
legitimate reason to be at the units.

AAP RTV nr/crh

KEYWORD: BIN (SYDNEY)

2006 AAP Information Services Pty Limited (AAP) or its Licensors.

Fed: Hopes high for Ajax deal to avert car stand-downs = 2


AAP General News (Australia)
08-22-2006
Fed: Hopes high for Ajax deal to avert car stand-downs = 2

Adelaide-based manufacturer Mitsubishi also joined the rescue package.

Mitsubishi buys only one part directly from Ajax, but is supplied with brake components
by PBR for the 380 sedans built at its Tonsley Park plant in Adelaide's south.

"We've agreed to put money in (to the package)," spokesman Kevin Taylor told AAP.

Mitsubishi has "a couple of weeks" of parts in stock before stand-downs would be necessary,
Mr Taylor said.

AAP jrd/gfr/sp

KEYWORD: AJAX 2ND D/L 2 MELB (REOPENS)

) 2006 AAP Information Services Pty Limited (AAP) or its Licensors.

NSW: NSW gov't to reform land tax system


AAP General News (Australia)
04-15-2006
NSW: NSW gov't to reform land tax system

NSW Treasurer MICHAEL COSTA says the state budget will be good news for taxpayers ..

with the government reportedly looking to overhaul its land tax system.

Fairfax newspapers say Mr COSTA will announce the changes as part of his first state
Budget on June 6.

The reforms are expected to include the averaging of land valuations over three years
.. and a new .. transparent appeal process.

Mr COSTA is also looking at allowing the valuer-general more time to assess value property
.. and a small cut in the 1.7 per cent tax rate.

AAP RTV nr/wf

KEYWORD: TAX NSW (SYDNEY)

2006 AAP Information Services Pty Limited (AAP) or its Licensors.

Monday, February 27, 2012

Fed: Howard no longer interested in code of conduct, says Labor


AAP General News (Australia)
12-10-2004
Fed: Howard no longer interested in code of conduct, says Labor

CANBERRA, Dec 10 AAP - Prime Minister John Howard had showed his code of ministerial
conduct meant nothing and he was treating Australians as mugs over the De-Anne Kelly controversy,
Labor said today.

Mr Howard today defended his decision not to sack Mrs Kelly, the Veterans Affairs Minister,
for breaching the code of conduct.

Mrs Kelly yesterday admitted she did not seek a statement of private interests from
senior Nationals figure Ken Crooke before employing him - a breach of Mr Howard's code.

Mr Crooke had been a consultant to a dairy company that was later given a $1.2 million
grant by Mrs Kelly while she was parliamentary secretary for regional services.

"Once upon a time John Howard's code of ministerial conduct meant something, when you
had ministers like Jim Short and Brian Gibson sacked for a perceived conflict of interest,"

Labor's regional affairs spokesman Kelvin Thomson told reporters.

"But, in the case of De-Anne Kelly, Calamity De-Anne, with an actual conflict of interest,
no action has been taken.

"Her staff member undertook that he would not carry out any activities as a director
of A2 Milk, or the corporation acting as lobbyist for A2 Milk, but off he went to the
Queensland Primary Industries Minister in the company of directors from A2 Milk."

Mr Thomson said that not only did Mrs Kelly fail to advise Mr Howard of this conflict
of interest, and fail to act concerning that matter, she went on to award $1.72 million
to a company which was facing criminal charges.

"John Howard's code of ministerial conduct is in tatters. He has simply lost all interest
in enforcing it," he said.

"He is treating the people of Australia like mugs and it's simply not good enough."

Mr Thomson also called for answers from the government on what had become of $660,000
of taxpayers' money given under the regional partnerships program (RPP) to a Beaudesert
Shire Railway Support Group project.

"It appears that that $660,000 has gone the same way as a $5 million centenary of federation
fund grant to that project," he said.

"It is bad enough that $5 million in centenary of federation funding was wasted, was
lost. It is even worse if this $660,000 has gone off the rails as well.

"We know that this project ceased operation in May last year. We know that the Howard
government has provided $660,000 in RPP funding for it.

"We understand that $440,000 of that money was used to repay creditors and that $220,000
was spent on ongoing operations of the company.

"We know that that operation has ceased.

"So there are some very serious questions here."

AAP dep/sb/bes/de

KEYWORD: REGIONAL LABOR

2004 AAP Information Services Pty Limited (AAP) or its Licensors.

at call

at call Denoting secured money that has been lent on a short-term basis and must be repaid immediately on demand. Discount houses in the City of London are the main borrowers of money at call, accounting for 4–6% of the banks' eligible liabilities.

Butler County Residents Will Be Able to Pay Taxes Online Through U.S. Bank E-Payment Service.

Business Editors

HAMILTON, Ohio--(BUSINESS WIRE)--Jan. 8, 2003

U. S. Bank (NYSE:USB) and the Butler County treasurer's office have entered into a final agreement to provide the residents of Butler County a more convenient method for making County payments. The system should be up and running around January 15, 2003, when real estate tax payments can be made via the Internet to Carole B. Mosketti, Butler County treasurer, just in time for the first half real estate tax due date of February 14, 2003.

Using the U. S. Bank E-Payment Service, residents of Butler County, Ohio will be able to pay their real estate property taxes and their water and sewer payments online directly through the Butler County website at www.butlercountyohio.org.

Mosketti said, "We have enjoyed a successful relationship with U.S. Bank for more than 20 years and are very excited about our expanded partnership. The E-Payment Service is one more way the treasurer's office is making it more convenient for the residents of our county to make their payments to us. Our goal is to one day expand this service making it available for all county departments so that Butler County residents have the option of making all county payments on line."

After receiving and reviewing their bills, residents will have the ability to sign onto the Butler County website and select a 'payment' option. Residents will then provide specific information about the type of payment they are making and submit their payment direct to the County electronically, without the need to write a check and mail it to the county offices. This electronic payment option is all done in a safe, secure Internet environment, and without the need to leave their homes.

According to Don Leedom, CCM, vice president and regional team leader for U.S. Bank's corporate treasury management group in Cincinnati, Ohio, "The U.S. Bank E-Payment Service is a one of the newest forms of electronic payment applications available to business organizations. The decision by Butler County to employ this program, and the efficiencies that it creates for the county, signifies a win-win for both the county and its residents." U.S. Bank has served Butler county since 1863 and currently has 17 local branches within the community.

Caren Galloway, U.S. Bank regional manager of government banking, said, "U.S. Bank is currently working with several state agencies to bring E-payment solutions to their communities."

U.S. Bank is a subsidiary of U.S. Bancorp. With assets in excess of $174 billion, it is the 8th largest financial services holding company in the United States. The company operates 2,133 banking offices and 4,680 ATMs, and provides a comprehensive line of banking, brokerage, insurance, investment, mortgage, trust and payment services products to consumers, businesses and institutions. U.S. Bancorp delivers quality customer service, articulated by its Five Star Service Guarantee, or it pays customers for their inconvenience. U.S. Bancorp is the parent company of U.S. Bank. Visit U.S. Bancorp on the web at usbank.com.

Sunday, February 26, 2012

Life after Stuxnet: the cyberattack on Iran's nuclear facilities has upped the ante for those in charge of critical infrastructure.(Critical infrastructure)

[ILLUSTRATION OMITTED]

Iran had a fallout problem at two nuclear facilities last July, but it wasn't radiation that leaked. Rather, after the plants' computer systems were infected with a worm, later dubbed Stuxnet, fallout took the form of a dramatic shift in what cyberattackers are capable of and how security professionals must respond.

This was clearly the opening salvo in what many suspect could be a new strategy in attacking an enemy. The worm, according to a Symantec report, exploited four zero-day vulnerabilities, compromised two digital certificates and injected code into the programmable logic controllers, or PLCs, of the facilities' industrial control systems, components used specifically to manage power plants, oil refineries and gas pipelines. The malware relayed instructions to the physical machinery that literally made the equipment blow a gasket.

Iranian scientists at a uranium processing center in Natanz and a nuclear reactor in Bushehr quickly replaced centrifuge machines that were affected by the worm, so actual disruption of their forging of low-enriched uranium was contained, but the cyberattack has put the global security community on notice that their enterprise or government infrastructure is susceptible to a similar infection that could cripple computer systems that control physical facilities.

"Stuxnet has changed our jobs entirely," says Kevin Rowney, founder of the data leakage prevention division at Symantec. Panic is not necessary at this time, but security does need to be re-evaluated, he says.

Certainly with the arrival of Aurora, Stuxnet and WikiLeaks, it has been an "off-the-hook" year, says Rowney, who is also director of the breach response team at Symantec. "How fast things have progressed."

Others agree. Stuxnet was definitely a game-changer in terms of what it could do, says David Kennedy, director of information security at Diebold, a security integrator that provides protection and detection solutions. "What it showed was that our current ways of thinking about security are flawed."

The fact that the intrusion happened from the inside points out that hackers are bypassing traditional defenses, he says. "Stuxnet should have been detected."

He says that the anamolous traffic on the system should have alerted somebody. "We can't treat the internal environment as a safe haven anymore," Kennedy says. "Internal users are untrusted now. We need to look at critical infrastructure and put controls around it."

But others say it will take more than technology to safeguard systems. Following Stuxnet, executives should place emphasis on policies and procedures, says Amichai Shulman, CTO at Imperva, a Redwood Shores, Calif.-based data security vendor. Stuxnet was successful because the code was distributed using USB sticks or key fobs, probably giveaways at some event, he says. These were then inserted carelessly in protected networks which unleashed the bug.

Shulman advises that rather than focusing efforts on protecting the control systems in SCADA networks, as he has seen in some government entities, it would be better to beef up security around management systems, using the same tools and techniques used to protect web-facing applications. IT professionals should consider everything outside of the SCADA network to be hostile. To protect the power grid, he says it is essential to isolate the SCADA management network away from other functions, such as HR, finance and transportation.

But, this might not be enough as the SCADA systems in Iran were protected well by most standards, says Charlie Miller, principal analyst of software security at Independent Security Evaluators, a security consulting firm. They ran on an isolated [non-internet-connected] network that consisted of fully patched Windows computers running up-to-date anti-virus. "This is really all you could hope for in these critical infrastructures," Miller says.

Ahead of the curve

Still, the complexity of infrastructure systems invites any number of exploits that, experts say, can only be thwarted by staying on top of the latest threat intelligence. Attackers are constantly changing and adapting, so the best defense is one that is dynamic and flexible, says Don Jackson, director of threat intelligence at Dell SecureWorks. His recommendation is that those responsible for building and managing critical infrastructure systems employ the services of objective security professionals to continuously refine threat models by incorporating data from the latest incidents and intelligence on emerging threats.

"Assessments need to take into account new information learned about the financial resourcefulness, technical sophistication, determination and the impact of threat agents, such as those behind Stuxnet," Jackson says. "Those assessments inform funding and policy regarding critical infrastructure protection."

He believes there should be a shift to whitelist approaches for code packages, integrity controls and anomaly detection features that operate at supervisory layers, operating systems that have smaller attack surfaces, and security models that are more strict about access to process memory and the kernel.

Eric Knapp, director of critical infrastructure markets at NitroSecurity, agrees that whitelisting is essential to fight zero-days, as well as strong edge policies to make it harder to access target networks.

"We've always hardened the entry points into SCADA and internet connection sharing (ICS) networks by securing the enterprise network that contains them, while leaving those critical networks relatively unprotected from the inside," Knapp says. "The control systems have to be as hard if not harder to breach--a defense-in-depth strategy comprising elements including specialized ICS firewalls, and compatible network and application whitelisters."

[ILLUSTRATION OMITTED]

Lessons from Stuxnet

Few would argue that traditional security strategies are sufficient in a post-Stuxnet world. The attack in Iran should have taught security professionals many things, says Michael Assante, president and CEO of the National Board of Information Security Examiners (NBISE), a nonprofit that develops examinations and certification requirements. "One realization is that the perimeter protection model used to protect critical systems is more aligned with cyberthreats of yesterday and is most effective against less directed and intelligent types of cyberattacks."

Stuxnet also demonstrates the need to address security and resilience at the design and building stage, says Assante, former CSO at the North American Electric Reliability Corp. (NERC). "We can't continue to look solely toward owners and operators and expect to bolt on security to manage risk around difficult-to-secure technology."

Meanwhile, legislation may help change the regulatory structure around critical infrastructure protection, he says. "The key will be balance. Incentives are not the entire answer, neither is prescriptive regulation."

Copycat attacks to follow

But perhaps the biggest impact is yet to come. It is the descendents of the worm that are causing concern for a lot of security personnel. "Even if they can't get hold of sample code from Stuxnet, it helps ill-intentioned people understand which threat vectors are vulnerable," says Symantec's Rowney.

A version of the base code was among a cache of emails that the activist hacking group Anonymous stole from HBGary, a security company that was studying the threat. Though this easier-to-read "study" version is a reduction of the original binary code, experts contend there is enough there to supply miscreants with a foundation on which to build copycat attacks. Some expect these to occur within weeks.

And just where the next attack may come from or who it may target is anyone's guess. Rowney points to the fact that Stuxnet was clearly written with a disciplined approach that likely took six to 10 coders working for six months to produce. "It doesn't sound like hackers in a basement or an Eastern European cyber gang," he says. "This sounds like nation-state."

Rowney hopes nothing like Stuxnet is seen again. But, he admits, it is hard to rule out. "The stakes are entirely raised," he says.

STUXNET: Up close

* Stuxnet was a targeted attack on five different organizations.

* 12,000 infections can be traced back to these five organizations.

* Three organizations were targeted once, one was targeted twice, and another was targeted three times.

* All targeted organizations have a presence in Iran.

* Three variants of the worm exist and a fourth variant likely exists but has never been recovered.

Source: Symantec

Geographicaldistributionof StuxnetinfectionsUSA               0.89%Great Britain     0.57%Russia            0.61%Iran             58.31%Uzbekistan        0.71%Azerbaijan        3.40%India             9.96%Pakistan          1.40%Malaysia          1.16%Indonesia        17.83%

Healthy meals for kids will spark a food fight; ShOpTAlk HigH street Buyer's guide ruki.sayid@mirror.co.uk K.(Features)(Buyers guide)

Byline: ruki sayid

OUR biggest grocer has turned to its US arm for inspiration and is launching a range of healthy option grub for children after the Goodness range went down a storm across the Pond.

launched last year at its Fresh & easy stores in the US, the ready meals and lunchbox treats have arrived in the UK as the chain cashes in on the idea.

It's the first label to be imported from the Stateside business which Tesco is aiming to turn a profit on by the end of 2013.

and it plans to take on asda's Great Stuff range in the children's food market, which is worth billions of pounds.

and rival Sainsbury's is aiming to launch its range of food for youngsters under the eric the elephant label later this year as the supermarkets square up for another food fight.

Great Stuff has 63 products from fresh and dried fruit to ready meals, drinks and yoghurts and Tesco is planning to bite into its hold on the primary school market with more than 70 items in the Goodness range.

First on the shelves is its Cottage Pie (280g) for pounds 2 compared with Great Stuff Cottage Pie (300g) for pounds 1.48 and Four Creamy Yoghurts for pounds 1 while a four-pack Great Stuff Strawberry Yoghurts cost 88p.

More lines from pasta dishes and smoothies to cakes and raisins will start appearing on shelves over the summer with the full range up and running by the end of the school holidays.

With all products tested by an expert panel of children and tastes tweaked for the young British palate, Tesco is confident it has a recipe for success.

Sarah Bradbury, Tesco food marketing director, says: "Fresh & easy customers really like the Goodness range.

"So we were keen to share it with our British shoppers.

"The products are ideal for those busy days when parents want convenient, yet healthy, prepared meals and snacks that their children will enjoy."

Many of the meals have hidden veg to contribute towards the five-a-day portions of fruit and veg, pasta shapes have oat and wheat for extra fibre and even the Goodness Mini Jam Doughnuts are baked, not fried.

The move into healthy option snacks for the under-eights comes as the food industry has been heavily criticised for using online games and popular social media sites to target children on sugary snacks and drinks.

a key report from the International association for the Study of Obesity claimed firms like Haribo and Nestle were using the internet to push sweets and drinks.

McDonald's came under fire for using spin-off toys from the Kung Fu Panda 2 movie to promote Happy Meals while the packaging of Kellogg's Krave chocolate cereal was said to be more appealing to children than adults.

Our Slamming the use of websites to promote junk food, report author Dr Tim lobstein said: "Firms are now using new technologies to encourage children to market to each other and bypass any parental controls.

"The consequences are very low standards of control and continued exposure of children to powerful inducements to eat junk food.

"The food industry is competitive and a company will always put its own interests first."

He added that the industry's attempt to police itself over junk food promotions was "chaotic".

a spokesman for the Incorporated Society of British advertisers, which represents food advertising, defended the industry and said it had reduced marketing to children.

Obesity is at an all-time high with a quarter of Britain's four to five-year-olds overweight or obese, along with more than a third of 10 to 11-year-olds.

CAPTION(S):

RANGE Z Tesco's Goodness meals

Tehran says U.S. has no right to militarily intervene in Syria.

TEHRAN, June 14 (MNA) -- Iranian Foreign Ministry spokesperson Ramin Mehmanparast has said that the United States has no right to militarily intervene in Syria. Mehmanparast made the remarks during his weekly press briefing on Tuesday in response to a question about the U.S. alleged plan to make a military intervention in Syria. "We think that the Americans have no right to militarily intervene in any regional country, including Syria," Mehmanparast said. If they do that, it will have severe repercussion for the entire region, he added. The pro-democracy movements in certain regional countries have posed a threat to the interests of the U.S.

and the Zionist regime and therefore these countries are making every effort to undermine the axis of resistance against the Zionist regime, he added. He also said that the Syrian issue is an internal affair, and the Syrian people are politically mature to help resolve the country's internal problems. Illegal military intervention would set a wrong precedent On the NATO military campaign against Libya, Mehmanparast said that any military intervention in another country without legal ratification is in contravention of international law and would set a precedent that will destabilize the world. Cyber war against Iran will inflict a heavy defeat on West Mehmanparast also replied to a question about the "Internet in a suitcase" plan that the United States and certain other Western countries have drawn up to wage cyber warfare against Iran. The Western countries will suffer a crushing defeat in cyber warfare against the Islamic Republic, he stated. The New York Times reported on June 12 that the U.S. administration is leading a global effort to deploy "shadow" Internet and mobile phone systems that dissidents can use to undermine governments that seek to silence them by censoring or shutting down telecommunications networks. Side issues will not hinder development of Tehran-Cairo ties Asked about a request by the visiting Egyptian delegation that Iran should rename Khaled Eslamboli Street in Tehran, Mehmanparast said what is important is that the Iranian and Egyptian officials are determined to restore relations, and Iran does not think that such minor issues would hinder the development of Tehran-Cairo relations. Intl.

convention on nuclear disarmament must be adopted He also spoke about the second International Conference on Disarmament and Non-proliferation which was hosted by Tehran on June 12 and 13, saying an international convention on nuclear disarmament should be ratified. High-ranking officials to attend intl.

conference on terrorism in Tehran Mehmanparast also announced that a number of presidents and foreign ministers, as well as officials from the United Nations, the European Union, and the Organization of Islamic Conference have been invited to participate in the Global Campaign against Terrorism Conference, which will be held in Tehran from June 25 to 26. Iran has not submitted request for SCO membership He also announced that Iran had not submitted any request to the Shanghai Cooperation Organization (SCO) to participate in the 10th summit of this organization as a full member. The 10th SCO summit is scheduled to open in Astana, Kazakhstan, tomorrow. And Iran is attending the meeting as an observer member. EP/PA END MNA

2003-2011 Mehr News Agency

Provided by Syndigate.info an Albawaba.com company

INTERVIEW WITH LAWRENCE LESSIG, LAW PROFESSOR AT HARVARD : COPYRIGHT: "20TH CENTURY LAWS ARE TOTALLY INEFFECTIVE".

Renowned American lawyer Lawrence Lessig is a Harvard Law School professor and director of its Center for Ethics. Well known for defending the cause of internet freedom, he is one of the most respected voices in debates on the limits of online copyright, the most controversial subject at the e-G8 in Paris, on 24-25 May.

Rights holders are building pressure in Europe for better protection of copyright on the internet, especially through screening for illegal content or use of the French Hadopi model of warnings and sanctions. What are your views?

In my opinion, before we ask ourselves how to implement copyright on the internet, we should ask ourselves what copyright should be like. In other words, we need the effects of copyright laws but we have to give thought to the right architecture. Copyright laws regulate culture far too much today. Their scope is too wide. When you see children take things on the internet, combine them and share them with their friends: all of that is ambiguous from the standpoint of European copyright laws, it's even clearly not authorised. But why should these laws regulate the lives of children who take videos on the internet and share them with their friends? That should be something to encourage, not to regulate. First, we should hold a debate on the scope of copyright laws. Where can they be improved? How can we create incentives for the innovation we need? This is about the future. We have these totally ineffective laws from the 20th century and now we are thinking up the most vicious ways of applying them. That doesn't make sense. We need a discussion on what copyright laws should be like in the digital era. It used to be that if you had never touched a photocopying machine, then you had never breached copyright. Today, we live in a world where the slightest gesture raises the problem of copyright. The difference is tremendous. Let's find other solutions, maybe direct commercial transactions, but I don't want to make assumptions about the outcome.

Which countries are most advanced?

Germany leads the way, in my view, with Sweden. The United Kingdom engaged in a real intellectual debate on the fact that we need to think differently. But governments are not taking action yet.

And which are lagging behind the most?

This one here [France - Ed].

Telecoms operators are pressuring European policy makers to be allowed to intervene on the internet and to secure bandwidth

We need to keep in mind the brief history of high-speed internet. In 1996, the United States adopted the Telecommunications Act. It entails the ideas of open access and neutrality. The rest of the world, like Japan, the United Kingdom and Europe, follows these same principles of open access and making competition easier. The United States soon changed its policy, however. During the Bush era, all the 1996 commitments - open access and neutrality - were reversed. I remember when that happened. I took part in a debate and said that we were going to go through a very interesting experience: the United States would end up working by one set of rules and the rest of the world by another. The experience came to an end. Then came the fantastic report by the Federal Communications Commission (FCC) - which the FCC itself ignored - demonstrating a radical difference in the success of high-speed connections: the countries that continued to implement open access and neutrality policies had the fastest and least expensive internet, including France, and the countries that followed the United States had terrible results. We could have expected more countries to follow the European and French model (prices in the United States are very high and connections are slow). But now we are starting to see people in Europe talk about switching to the American model. Even though it's a failure! Why? Because telecoms companies in Europe want this policy. There is no net neutrality in the United Kingdom but there is more competition in high-speed access. This competition could be called into question. And I think that it is Britain's goal to adopt the American model.

You said you were surprised that France pays more heed to business interests than to civil society...

I am not surprised by Nicolas Sarkozy because we know him. But I am surprised that a French president thinks that public policies should result from what companies think. That is what the American government has done for years. Yet companies are paid by their shareholders to say what is in their interests, not the country's interests. It is surprising to see that here in France. Sarkozy is acting like an American.

NSFOCUS Debuts in North America at INTEROP, Delivering a Network Security Ecosystem to Protect Corporate-Critical Information.(Company overview)

Superior protection for small, mid-sized enterprises; knowledge, experience gained from safeguarding the world's largest bank, telecom, web portal

LAS VEGAS, May 9, 2011 /PRNewswire/ -- INTEROP LAS VEGAS -- NSFOCUS, a proven global leader in active network perimeter security, today formally announced the launch of its North American operations. The company said it is delivering a complete line of appliances and services designed to meet the information security needs of a full range of companies, from small and medium-sized enterprises (SMEs) to service providers.

NSFOCUS, a privately held company, made the announcement at the opening of INTEROP Las Vegas, the platform for showcasing technology developments and driving the future of IT. NSFOCUS is a participating exhibitor at the conference, in the Security Zone (booth #656). NSFOCUS is a market leader in the Asia/Pacific region, serving companies in the financial, telecom, manufacturing and other strategic verticals.

The NSFOCUS ecosystem of security appliances delivers superior levels of powerful protection to companies, helping them secure their networks, applications, websites and corporate-critical information from unauthorized access:

* Web Application Firewall (WAF): NSFOCUS's WAF helps secure web applications and data, ensuring the highest level of business continuity and availability. It also enables companies to meet a full range of government and industry compliance regulations, such as the PCI Data Security Standard (PCI DSS) requirements.

* Anti DDoS System (ADS): NSFOCUS's ADS defends data centers, Metropolitan Area Networks (MANs), Internet service providers (ISPs), backbone networks, and enterprises against damaging DDoS attacks. Equipped with a purpose-built operating system and integrating advanced anomaly recognition, source verification, and anti-spoofing technologies, NSFOCUS's ADS delivers robust and comprehensive anti-DDoS protection to businesses of all sizes.

* Network Intrusion Prevention System (NIPS): NSFOCUS's Network IPS is a next-generation, inline-deployed security gateway, providing a comprehensive and easy-to-use solution that identifies, classifies and stops known and unknown malicious traffic and network threats. NSFOCUS's NIPS delivers high-performance security effectiveness, manageability, stability and reliability in threat detection and protection to ensure business continuity and availability.

"NSFOCUS is well-established in its home region, and has proven its ability to help large companies secure their networks," said Robert Ayoub, Global Program Director, Network Security at Frost & Sullivan. "In entering the North American market, its challenge will be to translate the credibility it has built abroad into trust among customers here. By combining a channel-centric approach with products that ably defend several of the world's largest institutions, NSFOCUS is positioning itself for solid, steady growth."

NSFOCUS also said it is introducing its WebSafe(TM) service, delivering 24/7 website monitoring, scanning and reporting to companies. WebSafe, which will be administered by a network of trusted channel partners throughout North America, ensures that web content is secure and constantly protected against malware, defacement, information leaks and other malicious attacks.

Each of NSFOCUS' appliances leverages the knowledge and real-world expertise of the company's team of network security specialists. That expertise is applied every day in defending the networks at:

* The Industrial and Commerce Bank of China (ICBC), the world's largest financial institution, with more than $1.6 trillion in assets;

* China Telecom, the world's largest telecommunications provider; and

* QQ.com, the world's most visited web portal, with more than 100 million online accounts.

"By helping world-class organizations like ICBC, China Telecom and QQ.com secure their networks, NSFOCUS has demonstrated its capability to help companies of virtually any size do the same," said Deni Connor, founding analyst at Systems Strategies NOW. "Its WebSafe service offering leverages its experience in the global market, and promises to allow service providers throughout North America to deliver a higher level of website protection to their clients."

"The growing number of threats makes it more imperative than ever for companies to actively defend their networks," said Frank Ip, NSFOCUS's vice-president of North American operations. "Day in and day out, they require proven performance, capable of stopping those threats dead in their tracks before they can have a harmful impact. Our family of security appliances proves its worth, day after day, helping companies protect their most valuable asset. We're proud to offer these solutions to the North American market," he added. Ip noted that NSFOCUS has one of the world's largest dedicated anti-threat staffs, with hundreds of full-time operational staff members and researchers, actively seeking out malevolent trends and their solutions around the clock.

NSFOCUS said it is pursuing a channel-centric sales strategy in North America, seeking to leverage resellers' existing, trusted relationships. It said retail pricing on its ecosystem of network security appliances will begin at $16,995.

About NSFOCUS

NSFOCUS (www.nsfocus.com/en) is a proven global leader in active perimeter security, focusing on industry-leading security research, products and services. With North American headquarters in Santa Clara, NSFOCUS offers its customers and channel partners a full range of appliances and SaaS-based offerings that help companies secure their networks and corporate-critical information.

SOURCE NSFOCUS

Saturday, February 25, 2012

Sam Houston State University Montgomery County District Attorney's Office Regional Crime Lab; Montgomery County Cracks Down on Synthetic Marijuana.

Byline: Sam Houston State University

MONTGOMERY COUNTY, Texas, April 22 (AScribe Newswire) -- The possession of or sale of synthetic marijuana substances became illegal in the State of Texas today. The Montgomery County District Attorney's Office will prosecute those offenders arrested for this crime after a laboratory analysis is done.

The state placed five synthetic cannabinoid substances in Schedule I of the Texas Schedules of Controlled Substances, making it illegal to manufacture, distribute, possess and sell the substances. Penalties for the manufacture, sale, or possession with intent to deliver synthetic marijuana like K2 or Spice are Class A misdemeanors. Possession of the banned substances is a Class B misdemeanor.

Law enforcement in Montgomery County will be working closely with the Sam Houston State University Regional Crime Lab in The Woodlands, which has developed tests to detect the illegal substances and has been routinely analyzing for the substances since January. The accredited, independent crime lab provides fee-based services for controlled substances and toxicology in criminal and civil cases, as well as death investigations.

Products like K2 or Spice, which are marketed as herbal incense, contain substances that produce psychoactive effects similar to those from smoking marijuana. These marijuana-like substances are readily available through smoke shops, gas stations, and the Internet.

The U.S. Drug Enforcement Administration used its emergency scheduling authority to temporarily ban synthetic marijuana or similar "fake pot" products that mimic the effects of marijuana. The DEA action March 2 made it illegal to manufacture, sell or possess these products for at least one year. Schedule I, the most restrictive category on the Texas Schedules of Controlled Substances, is reserved for unsafe, highly abused substances with no accepted medical use. Five chemicals, JWH -018, JWH-073, JWH-200, CP-47,497, and cannabicyclohexanol that are found in K2 were placed on the Schedule.

Since January 2010, approximately 600 calls were made to the Texas Poison Center Network related to K2 exposure. Reported adverse effects associated with use of these marijuana-like substances include chest pain, heart palpitations, agitation, drowsiness, hallucinations, nausea, vomiting, dizziness and confusion.

The District Attorney will prosecute all individuals violating this statute. Law enforcement in the county will be warning businesses that they may face criminal prosecution for selling or possessing these substances.

- - - -

CONTACT: Dr. Sarah Kerrigan, crimelab@shsu.edu, (000)-000-0000

Warren Diepraam, warren.diepraam@mctx.org, (000)-000-0000

Live, from Columbia City, Luke Burbank's 'audio blog'.(YourThursday)

Byline: Andrew Matson; Special to The Seattle Times

Luke Burbank -- ex-journalist, hip guy, good talker and comedian -- didn't necessarily want to become a home-studio podcaster. That was just the best way to retain his audience and momentum when KIRO-AM canceled his talk/music show, "Too Beautiful To Live," last September over low ratings.

But with TBTL's (www.tbtl.net) current number of those downloading the show dwarfing its old listener numbers and various monetization techniques actually working, he seems to know what he's doing.

Burbank stages a version of TBTL called "Summer Slam 2010" Friday and Saturday at the Columbia City Theater with guests ranging from Sir Mix-A-Lot to "Jeopardy" champ Ken Jennings.

"Since the show's been growing a lot, people have been approaching me to give these little talks," says Burbank, who says TBTL averaged 200,000 radio listeners a month in 2009 and now gets almost 2 million downloads in the same span in 2010.

"They want me to show up and be the voice of this thing, this idea, 'the digital future of radio.' And I don't know if I'm that at all."

Admittedly, Burbank's not the most tech-savvy guy, but he behaves like an Internet-literate millennial, and as indie rappers say, is on his grind.

"TBTL is basically an audio blog," he says. Like a blogger, he plays DJ/analyst to other outlets' stories/reportage as much as generates his own content about the news of the day and discerning-person's pop entertainment. TBTL's business models are borrowed as well, hustled together from public and private radio.

Last January's pledge drive will sustain it for nearly a year, and KIRO still sells ads for the podcast, which it hosts at www.mynorthwest.com, recently inking a deal with Ford. Burbank possesses blogger traits and values, compulsively oversharing and maintaining extreme transparency, relating his daily struggles with body weight and alcohol consumption.

"The trust between me and my audience, that's all I have," he says.

His interaction with indie-rock culture isn't forced, either. Burbank's natural tastes run to underdog snobby, like local labels Sub Pop and Barsuk Records, whose artists get TBTL airtime. Burbank calls his audience "the Tens," as in quantity, paralleling Sub Pop's self-deprecating aesthetic; he channels Barsuk's bookish cool, with obscure pop-culture references and the odd literary nod.

Grass-roots as TBTL is, Burbank ends up innovating on the fly, and his podcast runs a strong parallel to underground rap culture, which uses message boards and blogs to promote itself by any means necessary. It's all sincere and functional, and applied to Burbank's vague morning-show-style format, translates as a brand.

"It's not the quality of 'This American Life,' " he says, "but I think TBTL works for that type of person. A sort of overeducated, slightly over-navel-gazey, hipster-type person."

From years working at NPR, Burbank's seen "next big things" come and go -- he was one, back when he covered Congress in his 20s -- and he's reticent to call himself the digital future of radio because the designation sets him up for failure. It puts in the ether a day when that's no longer the case. But for now, it is. He is. Whether he wants to be or not. And though he's not trying to toot his own horn, he feels good not to be floundering.

"I felt there was a way to do a show like this and get enough people listening to it, so that you could make it financially doable," he said. "And it's happening. And I feel very satisfied by that."

Andrew Matson: matsononmusic@gmail.com

TBTL Summer Slam

Luke Burbank stages a live version of "Too Beautiful to Live," called "Summer Slam 2010" at 7 p.m. Friday and Saturday at the Columbia City Theater with guests Sir Mix-A-Lot, The Long Winters, Rachel Flotard, Andy Haynes and Ben Huh on Friday (sold out), and Blue Scholars, Smoosh, Say Hi and "Jeopardy" champ Ken Jennings on Saturday (almost sold out). Columbia City Theater, 4916 Rainier Ave. S., Seattle; $35 (www.columbiacitytheater.com).

CAPTION(S):

Dean Rutz / The Seattle Times: ''It's not the quality of 'This American Life,''' says Luke Burbank, ''but I think TBTL works for that type of person. A sort of overeducated, slightly over-navel-gazey, hipster-type person.'' (0413218896)

Copyright (c) 2010 Seattle Times Company, All Rights Reserved.

DRI Corporation Receives a Significant Order From a Bus Vehicle Manufacturer in India.

* Order Exceeds $4 Million USD - a Record High for a Single Mobitec[R] Order

* This Year's India Orders Now in Excess of $10 Million USD

* Deliveries Expected to Start in Fourth Quarter 2009

DALLAS -- DRI Corporation (DRI) (NASDAQ: TBUS), a digital communications technology leader in the global surface transportation and transit security markets, announced today that the Company's Mobitec Group in Sweden, through its Castmaster Mobitec India Private Limited joint venture in India, has received an order worth more than $4 million USD from a single transit bus vehicle manufacturer in India.

David L. Turney, the Company's Chairman, President and Chief Executive Officer, said: "The Mobitec[R] products ordered will be installed on new bus vehicles for New Delhi. Delivery is expected to commence in fourth quarter 2009 and to conclude in the last half of 2010. This order has been developing for quite some time; for the Mobitec Group, it is a record-high single order. It also demonstrates the strong market position of DRI in the vast Indian market. Putting this into perspective, we believe the combined total value of this order and the other India orders we announced last week is relatively close to an entire year of orders for full-size bus vehicles in the U.S. market, according to data published by the American Public Transportation Association. Leaders in India are to be commended for their bold vision as exemplified by the ongoing investment in transit infrastructure. They obviously understand the vital role that such investments play in developing healthy and livable cities and a strong economy."

The Mobitec[R] products ordered thus far by all bus vehicle manufacturers in India include MobiLED electronic destination sign systems, MobiSTOP indicators, and MobiVOICE announcement and control systems.

Mobitec Group, a global supplier of electronic information display systems, is highly respected for its products, technology, service, and quality. Mobitec Group is based in Herrljunga, Sweden. It also operates business units in Australia and Germany, as well as joint ventures in Brazil and India. For more information, visit www.mobitec.eu.

ABOUT THE COMPANY

DRI Corporation is a digital communications technology leader in the global surface transportation and transit security markets. Our products include: TwinVision[R] and Mobitec[R] electronic destination sign systems, Talking Bus[R] voice announcement systems, Digital Recorders[R] Internet-based passenger information and automatic vehicle location/monitoring systems, and VacTell[TM] video actionable intelligence systems. Our products help increase the mobility, flow, safety, and security of people who rely upon transportation infrastructure around the globe. Using proprietary hardware and software applications, our products provide easy-to-understand, real-time information that assists users and operators of transit bus and rail vehicles in locating, identifying, boarding, tracking, scheduling, and managing those vehicles. Our products also aid transit vehicle operators in their quest to increase ridership and reduce fuel consumption, as well as to identify and mitigate security risks on transit vehicles. Positioned not only to serve and address mobility, energy conservation, and environmental concerns, our products also serve the growing U.S. Homeland Security market. For more information about the Company and its operations worldwide, go to www.digrec.com.

FORWARD-LOOKING STATEMENTS

This press release contains "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. In particular, statements concerning the timing of the deliveries of orders; our joint venture growth opportunities in India; the size of the Indian market for our products; future growth of the Indian market for our products; as well as any statement, express or implied, concerning future events or expectations or which use words such as "expect," "fully expect," "expected," "appears," "believe," "plan," "anticipate," "would," "goal," "potential," "potentially," "range," "pursuit," "run rate," "stronger," "preliminarily," "forecast," "opinion," etc., is a forward-looking statement. These forward-looking statements are subject to risks and uncertainties, including risks and uncertainties associated with the timing of the deliveries of orders; the risk that future anticipated growth in the Indian market may prove inaccurate; the risk that our estimate of the size of the Indian market for our products may prove inaccurate; the risk that our estimate for the growth of the Indian market for our products may prove inaccurate; as well as other risks and uncertainties set forth in our Annual Report on Form 10-K filed March 31, 2009, and as updated in our Quarterly Report on Form 10-Q filed May 15, 2009, particularly those identified in Risk Factors Affecting Our Business. There can be no assurance that any expectation, express or implied, in a forward-looking statement will prove correct or that the contemplated event or result will occur as anticipated.

EARTHLINK NETWORK TO TAP PSINET BACKBONE FOR 28.8 AND 1SDN CUSTOMER ACCESS

HERNDON, Va., and PASADENA, Calif., July 23 /PRNewswire/ -- EarthLink Network, Inc. and PSINet, Inc. (Nasdaq: PSIX) today announced a major agreement for EarthLink to utilize PSINet's network infrastructure for delivering Internet access to its customers. The agreement includes both 28.8k and ISDN dial-up services.

Under the terms of the deal, EarthLink customers will have access to the Internet through facilities provided by PSINet in more than 237 locations in the U.S. and Canada. EarthLink already delivers Internet access to more than 120,000 customers in North America.

"At EarthLink, we are committed to providing an excellent Internet experience for our customers," said Sky Dayton, EarthLink's founder and chairman. "Early on, we recognized the value of partnering with industry leaders. Our new partnership with PSINet gives our customers access to one of the best Internet networks in the world, and augments our existing infrastructure."

EarthLink's Internet customers will not notice any change in their service with this new announcement, but EarthLink will be able to better ensure quality of service by providing access in each city according to the best available network.

"This announcement is part of our new strategy to focus directly on building and maintaining the best high-performance, reliable Internet network for businesses and large wholesale customers," said William L. Schrader, PSINet's chairman and CEO. "EarthLink understands how to attract and satisfy the consumer Internet user, and they have maintained their leadership in customer care during their enormous growth. They make an ideal partner for PSINet's strategy."

The agreement includes a provision for PSINet to send new sales leads it receives for consumer dial-up Internet access directly to EarthLink. The financial terms of the agreement were not disclosed.

EarthLink Network provides reliable, easy-to-use Internet access services.

PSINet is a leading provider of Internet access, services and products to both organizations and individuals throughout the U.S. and abroad. The Company's PSINet network offers access to the Internet from more than 350 points-of-presence (POPs) worldwide, including Holland, Japan, Canada, South Korea and the U.K. Internet access options range from high-speed modem dial-up and ISDN for telecommuters and small office LANs to dedicated high-speed circuits for corporate connectivity. Network Computing Magazine recently named PSINet a winner of its Well-Connected Award as "Best Internet Access Provider."

The Company has its headquarters in Herndon, VA., with sales and service offices across the U.S.; Cambridge, England; Toronto; and Tokyo. Further product and pricing information can be obtained by calling 703-904-4100, through PSINet's Web site at http://www.psi.net; or by sending an e-mail request to info@psi.com.

* All brands, product and service names mentioned are trademarks or registered trademarks of their respective owners.

     -0-                      7/23/96 

/CONTACT: Brian Muys, Manager, Corp. Communications of PSINet, 703-904-4285, muysb@psi.com, or Vikki Holmes of EarthLink, 818-296-2467, vh@earthlink.net/

(PSIX)

CO: PSINet Inc.; EarthLink Network, Inc. ST: Virginia IN: CPR SU: PDT

ER-JA -- DCTU004 -- 2964 07/23/96 09:10 EDT

Major Opportunities in Sub-Saharan Tourism Industry.

LYON, France -- Reportlinker.com announces that a new market research report related to the African tourism industry is now available to its catalogue.

Opportunities in Sub-Saharan Tourism Industry

http://www.reportlinker.com/p058419/Subsaharan-Tourism- Industry.html

(Due to its length, this URL may need to be copied/pasted into your Internet browser's address field. Remove the extra space if one exists.)

This report is a comprehensive work on the status of tourism industry in the Sub-Saharan African region. It discusses the present scenario and future prospects of the industry with foci on its different aspects, including foreign tourism, domestic tourism, expenditure by foreign tourists, expenditure by domestic tourists, accommodation facilities, transportation facilities, hospitality sector, tourism contribution to GDP, government support and major attractions in the region.

The report evaluates 13 countries of the Sub-Saharan Africa, which are performing well in the tourism sector. The countries have been ranked according to their respective tourist arrivals for the year 2006. The countries include South Africa, Zimbabwe, Kenya, Swaziland, Senegal, Mauritius, Namibia, Zambia, Ghana, Tanzania, Nigeria, Mozambique and Uganda.

The forecast given in this report is not based on a complex economic model, but is intended as a rough guide to the direction in which the industry is likely to move. This forecast is based on a correlation between past market growth and growth of base drivers, such as growing Sub-Saharan Africa tourism, GDP growth, tourism contribution to employment, infrastructure development competitive structure and government rules and regulations.

Key Findings

* The international tourist arrival in the Sub-Saharan Africa has shown a growth of 11.1% in the year 2006 compared to 2005. This growth was the second highest globally.

* South African government is spending huge sum of money on the airport modernization. The government is going to spend Rand 18 Million more on the construction part (terminal building) in the year 2007 compared to 2006.

* Tourist arrival in Zimbabwe had shown a negative growth of 15.9% in the year 2004-2005. However, the industry rebounded and reported a positive growth of 41.1% in the year 2006 compared to year 2005.

* In international tourism receipts, Zimbabwe has shown a negative growth of around 49% in the year 2004-2005. However, in the year 2003-2004, it registered a massive 217.5% hike.

* In the year 2005, out of total tourists visited Swaziland, 74% came via road. Out of this, tourists travelled with self-drives/cars accounted for 53%.

* In Uganda, air is leaving road behind as the most preferred mode of travel. The CAGR growth in tourist arrival by road was 11.77% and that by air was 14.80% for the period spanning from 2001 to 2005.

* Senegal has shown a positive growth of 15.3% in the year 2004-2005. However, this growth shown by the Senegal was smaller than the previous year (2003-2004) change of 34.7%.

* Zambia government is providing support to the tourism sector by giving out incentives to the hotel industry, tax rebate to the investors to invest in rural enterprises, not taking visa fees from the tour operators, among other measures.

* Investment in tourism sector of Zambia was at all time high in the year 2006 in the last three years and the major part of the investment (75%) was diverted to the accommodation sector.

Key Issues & Facts Analysed

* What is the performance of global tourism industry in terms of inbound tourists for the period 2004-2006?

* What is the performance of international tourism receipt by region during 2005-2006?

* What is the position of the Sub-Saharan tourism industry with respect to the world tourism industry in 2006?

* What are the investment opportunities in Ghana in sectors like rail, road, air, water and accommodation?

* Why conference tourism in South Africa is growing?

* Which factors are driving the Sub-Saharan African tourism industry?

* Which factors are capping the growth of the Sub-Saharan Africa tourism industry?

* What are the opportunities and future trends of the tourism industry in Sub-Saharan Africa?

* Who are the major players in airline and hotel industry in the region?

Key Players Analysed

The key players section analyses the different players of aviation and hotel sector operating in the market and gives their business description and key financial information. Airlines section gives an overview of various airlines, like South African Airways, Air Mauritius and Kenya Airways. Hotels section discusses various hotels, like Cape Grace Hotels, Holiday Inn, Royal Swazi Spa Valley Resort, Le Meridien President, Hilton Mauritius Resort & Spa etc.

Research Methodology Used

Information Sources

The information has been sourced from books, newspapers, trade journals, and white papers, industry portals, government agencies, trade associations, monitoring industry news and developments, and through access to more than 3000 paid databases.

Analysis Method

The analysis methods include ratio analysis, historical trend analysis, linear regression analysis using software tools, judgmental forecasting and cause and effect analysis.

Table of content

1. Analyst View

2. Industry Overview

2.1 Global Tourism - Current Scenario

2.1.1 International Tourists Arrival

2.1.1.1 By Purpose of Visit

2.1.1.2 By Mode of Travel

2.1.2 International Tourists Expenditure

2.2 Global Tourism - By Regional Segmentation

2.2.1 International Tourists Arrival

2.2.2 International Tourism Receipts

2.3 Global Tourism - Future Scenario (2010 & 2020)

3. Sub-Saharn Africa Tourism Overview

3.1 By Country

3.1.1 South Africa

3.1.1.1 Overview

3.1.1.2 Performance Indicators

3.1.1.2.1 Tourism & GDP

3.1.1.2.1.1 Contribution of Tourists Expenditure to GDP

3.1.1.2.1.1.1 By Tourist Category

3.1.1.2.2 International Tourists Arrival

3.1.1.2.2.1 By Continent

3.1.1.2.3 Domestic Tourism

3.1.1.2.3.1 By Trips & Travelers

3.1.1.2.3.2 By Purpose of Visit

3.1.1.2.4 Tourism Expenditure

3.1.1.2.4.1 International Tourists Expenditure

3.1.1.2.4.2 Domestic Tourists Expenditure

3.1.1.2.5 Length of Stay

3.1.2 Zimbabwe

3.1.2.1 Overview

3.1.2.2 Types of Tourism

3.1.2.2.1 Safari

3.1.2.2.2 Adrenaline Sports

3.1.2.2.3 Hiking & Trekking

3.1.2.2.4 Other Activities

3.1.2.3 Performance Indicators

3.1.2.3.1 International Tourists Arrival

3.1.2.3.2 International Tourism Receipts

3.1.3 Kenya

3.1.3.1 Overview

3.1.3.2 Performance Indicators

3.1.3.2.1 Tourism & Economy

3.1.3.2.1.1 Contribution of Tourism to Employment

3.1.3.2.1.2 Contribution of Tourism to Balance of Payment

3.1.3.2.2 International Tourists Arrival & Earning

3.1.3.2.3 Length of Stay

3.1.3.2.3.1 Tourists Night Spent

3.1.3.2.3.2 By Purpose of Visit

3.1.4 Swaziland

3.1.4.1 Overview

3.1.4.2 Performance Indicators

3.1.4.2.1 International Tourists Arrival

3.1.4.2.1.1 By Purpose for Visit

3.1.4.2.1.2 By Mode of Travel

3.1.4.2.2 Domestic Tourists Departure

3.1.4.2.3 Length of Stay

3.1.4.2.3.1 Tourists Night Spent

3.1.4.2.3.2 Accommodation - By Category

3.1.5 Nigeria

3.1.5.1 Overview

3.1.5.2 Performance Indicators

3.1.5.2.1 International Tourists Arrival

3.1.5.2.2 International Tourism Receipts

3.1.6 Namibia

3.1.6.1 Overview

3.1.6.2 Performance Indicators

3.1.6.2.1 International Tourists Arrival

3.1.6.2.1.1 By Region

3.1.6.2.1.2 By Purpose of Visit

3.1.6.2.1.3 By Mode of Travel

3.1.6.2.2 Length of Stay

3.1.6.2.2.1 By Region

3.1.6.2.2.2 By Accommodation Capacity

3.1.7 Senegal

3.1.7.1 Overview

3.1.7.2 Performance Indicators

3.1.7.2.1 International Tourists Arrival

3.1.8 Mauritius

3.1.8.1 Overview

3.1.8.2 Performance Indicators

3.1.8.2.1 Tourism Employment

3.1.8.2.2 International Tourists Arrival

3.1.8.2.2.1 By Purpose of Visit

3.1.8.2.3 Domestic Tourists Departure

3.1.8.2.3.1 By Country

3.1.8.2.4 International Tourism Receipts

3.1.8.2.5 Length of Stay

3.1.8.2.5.1 Tourists Night Spent

3.1.8.2.5.2 Hotel Occupancy Rate

3.1.8.2.5.3 Large Hotel Occupancy Rate

3.1.9 Mozambique

3.1.9.1 Overview

3.1.9.2 Performance Indicators

3.1.9.2.1 International Tourists Arrival

3.1.10 Zambia

3.1.10.1 Overview

3.1.10.2 Performance Indicators

3.1.10.2.1 International Tourists Arrival

3.1.10.2.2 Investments in Tourism Sector

3.1.10.2.3 Investment in Accommodation Sector

3.1.11 Tanzania

3.1.11.1 Overview

3.1.11.2 Performance Indicators

3.1.11.2.1 International Tourists Arrival

3.1.12 Uganda

3.1.12.1 Overview

3.1.12.2 Performance Indicators

3.1.12.2.1 International Tourists Arrival

3.1.12.2.2 Domestic Tourists Departure

3.1.12.2.3 Mode of Travel

3.1.13 Ghana

3.1.13.1 Overview

3.1.13.2 Performance Indicators

3.1.13.2.1 International Tourists Arrival

3.1.13.2.1.1 By Purpose of Visit

3.1.13.2.2 International Tourism Receipts

3.1.13.2.3 Hotel Industry

4. Industry Analysis

4.1 Drivers

4.1.1 Kenya - Face Lift of Eco-tourism from Wildlife Conservation Pact

4.1.2 Zambia - Government Support

4.1.2.1 Enhanced Capital Allowances on Hotel Buildings

4.1.2.2 Income Tax Rebate on Rural Enterprises

4.1.2.3 Zero Rating Relief on Tour Packages

4.1.2.4 Other Initiatives

4.1.3 South Africa - Government Support

4.1.4 Beauty Pageants Improves Brand Image

4.2 Opportunities

4.2.1 Kenya - Boom in Airline Industry

4.2.2 Zimbabwe Tourism

4.2.3 Growing Online Travel Sites

4.2.4 FIFA World Cup - 2010

4.2.5 Availability of Wide Range of Products

4.2.6 Ghana - Investment Opportunities

4.2.7 South Africa - Growing Conference Tourism

4.3 Challenges

4.3.1 Poor Infrastructure

4.3.2 Negative Tourism Publicity

4.3.3 Terrorism

4.3.4 Diseases

4.3.5 Competition from Other Countries

5. Key Players

5.1 Airlines

5.1.1 South African Airways

5.1.2 Air Zimbabwe

5.1.3 Air Mauritius

5.1.4 Kenya Airways

5.2 Hotels

5.2.1 Cape Grace Hotels

5.2.2 Three Cities

5.2.3 Holiday Inn

5.2.4 The Victoria Falls Hotel

5.2.5 Royal Swazi Spa Valley Resort

5.2.6 Le Meridien President

5.2.7 Hilton Mauritius Resort & Spa

More market research reports? Go to http://www.reportlinker.com

http://www.reportlinker.com/ci041/Tourism-market-research.html

http://market-research.typepad.com/agricultural_chemicals/