Wednesday, October 1, 2014

The #09, #90 Phone Call Warning is Back-Hoax


There is a message doing rounds on social media warning phone users against receiving calls from or about certain numbers blah blah....
I received an email from a former client and friend with this forwarded message;

Dear All,

If you receive a phone call on your mobile from any person, saying that, he or she is a company engineer, or telling that they're checking your mobile line, and you have to press # 90 or #09 or any other number. End this call immediately without pressing any numbers. There is a fraud company using a device that once you press #90 or #09 they can access your "SIM" card and make calls at your expense. Forward this message to as many friends as you can, to stop it.

All mobile users pay attention if you receive a phone call and your mobile phone displays (XALAN) on the screen don't answer the call, END THE CALL IMMEDIATELY, if you answer the call, your phone will be infected by a virus..
This virus will erase all IMEI and IMSI information from both your phone and your SIM card, which will make your phone unable to connect with the telephone network. You will have to buy a new phone. This information has been confirmed by both Motorola and Nokia.
PLEASE FORWARD THIS PIECE OF INFORMATION TO ALL YOUR FRIENDS HAVING A MOBILE.

LIKE MY  FACEBOOK PAGE 

Now, is there any truth to this or is it just another email scam?

Detailed Analysis

This message, which has circulated, first via email,
and more lately via social media and text message,
since at least 2005, warns that fraudsters are
hijacking mobile phones by tricking users into
pressing a specific combination of digits. It further
warns of a supposed virus that can destroy your
mobile phone if you answer a call that displays
"XALAN" on your phone screen.
However, the message is a hoax. None of the
information provided in the email is in any way valid
for mobile phone users.

The first part of the hoax email claims that pressing
#90 or a similar combination of digits will give a
fraudster access to your sim card and allow him or
her to make calls at your expense. This is untrue
and has been denied by Australian telecommunications giant, Telstra , South African
communications company, MTN, and other service
providers around the world. This part of the hoax is derived from earlier, partially factual, warnings about scammers who try to use "90#" to hijack fixed line phones.

This scam does not affect residential or cell phone customers — it only applies to businesses, hospitals, government agencies, and other organizations that still use telephone private branch
exchanges (PBXs) rather than Centrex lines to handle their calls. On certain PBX systems (i.e. ones for which pressing '9' is the signal to obtain an outside line, and there are no restrictions placed on outgoing calls), a scammer could gain access to place expensive, long-distance phone calls by tricking an employee into initiating the #-9-0 sequence. Outside of a few other settings where one might have to press '9' to obtain an outside line (such as hotels), the likely result of pressing #-9-0 will simply be a fast busy signal.

Later versions of this warning evolved to include mention of the risk that terrorists utilizing the #90 sequence could "frame innocent people" (presumably by making terrorism-related calls linked to the phone numbers of those innocent
parties) and remotely access cell phone SIM cards:

Follow Me on  Twitter 

The second part of the hoax claims that a virus that displays the word "XALAN" can destroy your mobile phone. This information is totally untrue.

Although mobile phone viruses are possible, there is no virus like the one described in the email message. There are a number of alternative versions of the "warning" message, some of which list the word displayed as "UNAVAILABLE" or "ACE" rather than "XALAN". Again, Telstra , MTN, and other providers
have denied the existence of such viruses.

Follow me on  Instagram 

Thursday, September 25, 2014

Google Kenya to Discontinue the free .kbo.co.ke- Get Kenya Businesses Online platform!!!

Google has just announced that it will be discontinuing the free KBO.CO.KE website/blog platform by the end of this year.

On emails sent to users if the platform today, The Get Kenyan Businesses Online Team expressed Google's intention to terminate the free website building program by 31st December 2014.

Follow us on Google Plus

Here is an excerpt of the mail announcement;

At Google, we want businesses like yours to get the most from the web, and we hope that your Get Kenyan Business Online website ydee.kbo.co.ke has helped you to connect with more customers.

We are announcing that Business Sitebuilder websites within the Get Kenyan Business Online Program will no longer be accessible from December 31 2014, but there are some great alternatives available to you.

Earlier this year, we introduced Google My Business to connect you directly with customers, whether they're looking for you on Search, Maps or Google+.

You also have the option to move your existing website to our trusted partner, Hostgator, an international provider of cloud-based web presence solutions with over 15 years of experience helping small businesses succeed online. Their family of brands, through parent company Endurance International Group, serve over 3.7 million subscribers worldwide.

Moving your website to the Hostgator platform lets you continue with your website, and also allows you to access a range of powerful business features, including eCommerce, website security, backup and restore, and 24 hour support. Learn more at africa.hostgator.com/kenyagetonline.

Remaining online is a huge asset for your business, and you can do so by independently signing up for Google My Business, or filling out this online form for assistance. The team of experts at Hostgator can then guide you through the process of signing up for Google My Business, transferring your current website, or creating a new one....

Was this on Google's plan all along or is it that the websites are not racking in the expected clicks for advertisers and Google? 

Wednesday, September 24, 2014

Kali Linux “NetHunter” Released – Turn Your Android Device into Hacking a Weapon

After making its influence in hacker and securitycircles, Kali Linux has now been published with Kali Nethunter, a version of the security suite forAndroid devices.

The tool is a mobile distribution
designed to compromise systems via USB when
installed and run on an Android phone.

Kali Linux NetHunter project provides much of thepower to Nexus users, those running the NetHunterpenetration testing platform can now launch attacks including Teensy keyboard via HID style attacks
and BadUSB man-in-the-middle (MITM) networkingattacks via USB human interface device (HID),wireless 802.11 frame injection, and could setup evil access points in a single click.

"Our NetHunter images support programmable HID keyboard attacks, (a-la-teensy), as well as
“BadUSB” network attacks, allowing an attacker to
easily MITM an unsuspecting target by simply
connecting their device to a computer USB port, ”
the Offensive Security team said. “ In addition to
these built in features, we’ve got a whole set of
native Kali Linux tools available for use, many of
which are configurable through a simple web
interface. ”
Nethunter is currently available for Nexus devices
only, but builds for other Android devices are likely
on the way. Nethunter contained a full Kali Linux
toolset, including support for self destruction,
software defined radio and the ability to launch a
Kali desktop VNC session on Nexus phone.

The tools are designed for use by an attacker who
has physical access to a device — an insider threat
— or someone who gains access through social
engineering, tailing etc.

On one hand, Teensy Keyboard attacks on PCs can
be used to automatically elevate privileges on a
Windows PC and install a reverse-HTTP tunnel to a
remote workstation. On the other hand, BadUSB can
force a Windows PC to recognize the USB-
connected phone as a network adapter and re-route
all the traffic of the PC through it for monitoring
purposes.

Additionally, the Kali NetHunter configuration
interface helps users to easily manage complex
configuration files through a local web interface,
which together with 802.11 wireless injection and a
pre-configured connect VPN service make it a
“formidable network security tool or discrete drop box– with Kali Linux at the tip of your fingers wherever you are. ”

Kali NetHunter open source security platform supports Nexus 10 and 7 tablets and Nexus 5phones built on the existing Kali (formerlyBacktrack) Linux platform. The official KaliNetHunter images can be downloaded from theOffensive Security NetHunter download page.

Was Your Email Read-How to find out.

We'll show you how to check if that important e-mail
you sent was actually read by the recipient. The process is fairly straight forward and you need to make sure you are using a mail client with HTML
turned on.

Follow and + us on G+

Here is the link to TAIL MAIL: http://
mobileshortcut.com/T... (then click FREE USAGE).

Once at the site, generate a code and copy the hidden image into the bottom of your email. Send off your message and give it some time to be read. You can now paste your unique code into the look-up box and and get up to the minute information on the status of your email.
Tune back in every Monday, Wednesday and Friday for more quick tips from Household Hacker...
Watch Video
Serious Business Inquiries Only:  Email
   

  

Tuesday, August 26, 2014

SAFETY and TIPS

Secure your household

Recognizing the rising threats facing society, we are happy to share Safety and tips as a guide to remaining safe and secure. Reducing the likelihood of being a victim of crime requires a pro-active approach. We are glad to offer safety and tips for different scenarios to ensure
safety for members of the public:

Home Security When on Holiday/Work

Vehicle Safety

Commercial Security

Anti- Terrorism

HOME SECURITY

1. Ensure shrubs and bushes are cleared in the areas leading up to your driveway. These may act as hiding places for potential criminals.
2. Install an adequate fence/ wall which acts as a barrier to would be criminals
3. Install lighting throughout areas of your compound,
remember criminals are deterred by light and spurred on by darkness!
4. Contract the guarding services of a professional company, members of the KSIA are generally recommended.

5. Install an alarm system from a KSIA member. In the event of criminal activity, assistance can be sought.
Ensure your system is serviced regularly.
6. Fortify your house, consider the following:
Strong front door, with relevant locks
Reinforce windows with grills.
Consider a safe area.
Install a safe for documents, valuables cash etc
7. Fully insure your property and its contents
8. Enquire as to relevant best practice security/fire arrangements using the services of a qualified Consultant.
9. In the event of an intrusion:
Try to run away if possible Remain calm, cooperate where required. Your life is more important than property.

Vehicle Security

VEHICLE SECURITY

Travelling in your car can be the highest Risk activity you are involved in. Whilst driving occurrences such as: car jacking, kidnap, road traffic accidents (RTA) can occur. In fact when arriving at, or leaving your property, you are at highest Risk.

The following tips can reduce this:

1. Ensure your vehicle is well serviced, therefore mechanically reliable.
2. Turn down your music system when approaching your property
3. Always be aware of your environment, so check your mirrors make sure you’re not being followed.
4. Always be alert when approaching your driveway. Be aware of any suspicious cars or people.
5. When exiting your car be aware of anything that may hide a potential carjacker.
6. Upon returning always ensure your home is well lit at night.
7. Lock all your doors and windows before setting off. If possible try not to open windows more than 5cm.

8. If a stranger approaches you while in your car, try to drive off if possible or hoot to attract attention.
9. If you notice any suspicious behaviour while driving call your security company rescue or police assistance.

Make Your business a Success

Be prepared/informed

Secure Your Business

COMMERCIAL SECURITY

Operating a successful business means protecting your assets. This includes your staff and your property. Therefore a detailed Risk  Analysis report is recommended to act as a professional guide in achieving this.

Legal requirements such as Insurance, Fire & Life safety means these measures are mandatory.

For more information arrange a Risk Assessment with one of our consultants:
  

+ us on  Google Plus 

ANTI-TERRORISM

Kenya’s global position, her ties with western business as well as foreign policy mean we face a High-Risk of terrorist attacks.

Sectors like Embassies, Retail malls, Hotels and High profile businesses have been forced to assess the Risks facing their institutions.

Facing this situation, it is advisable to seek the advice of Security firms or Independent consultants for suitable measures. A confidential security
survey with recommendations, should provide best practice guidelines to assess terrorist threats.

Wednesday, July 30, 2014

What To Know About Ebola

In order to help our Embassy Community better understand some of the key points about the Ebola virus we have consulted with our medical specialists at the U S State Department and assembled this list of bullet points worded in plain language for easy comprehension. Our medical specialists remind everyone that they should be following the guideline from the center for Disease Control and the World Health Organisation.
• The suspected reservoirs for Ebola are fruit bats.

• Transmission to humans is thought to originate
from infected bats or primates that have become infected by bats.
• Undercooked infected bat and primate (bush) meat transmits the virus to humans.

• Human to human transmission is only achieved by physical contact with a person who is acutely and gravely ill from the Ebola virus or their body fluids.

• Transmission among humans is almost
exclusively among caregiver family members or health care workers tending to the very ill.

• The virus is easily killed by contact with soap, bleach, sunlight, or drying. A washing machine will kill the virus in clothing saturated with infected body fluids.
• A person can incubate the virus without
symptoms for 2-21 days, the average being 5-8 days before becoming ill. THEY ARE NOT CONTAGIOUS until they are acutely ill.

• Only when ill does the viral load express itself first in the blood and then in other bodily fluids (to include vomit, feces, urine, bosom milk, Fluid and sweat).
• If you are walking around you are not infectious to others.

• There are documented cases from Kikwit, DRC of an Ebola outbreak in a village that had the custom of children never touching an ill adult. Children living for days in small one room huts with parents who died from Ebola did not become infected.

• You cannot contract Ebola by handling money, buying local bread or swimming in a pool.
• There is no medical reason to stop flights, close borders, restrict travel or close embassies, businesses or schools.

• As always practice good hand washing
techniques, but you will not contract Ebola if you do not touch a dying person.

• Please share this information with your friends and families and try not to spread panic on social media.

Thanks

[US Embassy Nigeria]

Google Plus 

Wednesday, June 18, 2014

U.S. Trained The Iraq Rebels-ISIS at Secret Jordan Base

Members of the Islamic State of Iraq and the Levant, or ISIS, were trained in 2012 by U.S. instructors working at a secret base in Jordan, according to informed Jordanian officials.


The officials said dozens of ISIS members were trained at the time as part of covert aid to the insurgents targeting the regime of Syrian President Bashar al-Assad in Syria. The officials said the training was not meant to be used for any future campaign in Iraq.
The Jordanian officials said all ISIS members who received U.S. training to fight in Syria were first vetted for any links to extremist groups like al-Qaida.

In February 2012, WND was first to report the U.S., Turkey and Jordan were running a training base for the Syrian rebels in the Jordanian town of Safawi in the country’s northern desert region. That report has since been corroborated by numerous other media accounts. Last March, the German weekly Der Spiegel reported Americans were training Syrian rebels in Jordan.


Quoting what it said were training participants and organizers, Der Spiegel reported it was not clear whether the Americans worked for private firms or were with the U.S. Army, but the magazine said some organizers wore uniforms. The training in Jordan reportedly focused on use of anti-tank weaponry. The German magazine reported some 200 men received the training over the previous three months amid U.S. plans to train a total of 1,200 members of the Free Syrian Army in two camps in the south and the east of Jordan. Britain’s Guardian newspaper also reported last March that U.S. trainers were aiding Syrian rebels in Jordan along with British and French instructors. Reuters reported a spokesman for the U.S. Defense Department declined immediate comment on the German magazine’s report.


The French foreign ministry and Britain’s foreign and defense ministries also would not comment to Reuters. The Jordanian officials spoke to WND amid concern the sectarian violence in Iraq will spill over into their own country as well as into Syria. ISIS previously posted a video on YouTube threatening to move on Jordan and “slaughter” King Abdullah, whom they view as an enemy of Islam.


WND reported last week that, according to Jordanian and Syrian regime sources, Saudi Arabia has been arming the ISIS and that the Saudis are a driving force in supporting the al-Qaida-linked group.


WND further reported that, according to a Shiite source in contact with a high official in the government of Iraqi Prime Minister Nouri al-Maliki, the Obama administration has been aware for two months that the al-Qaida- inspired group that has taken over two Iraqi cities and now is threatening Baghdad also was training fighters in Turkey. The source told WND that at least one of the training camps of the group Iraq of the Islamic

State of Iraq and the Syria, the ISIS, is in the vicinity of Incirlik Air Base near Adana, Turkey, where American personnel and equipment are located. He called Obama “an accomplice” in the attacks that are threatening the Maliki government the U.S. helped establish through the Iraq war.

The source said that after training in Turkey, thousands of ISIS fighters went to Iraq by way of Syria to join the effort to establish an Islamic caliphate subject to strict Islamic law,
or Shariah.

Saturday, April 5, 2014

MAN WHO HAD 30 KIDS WITH 11 WOMEN OVERWHELMED BY CHILD SUPPORT.

You have to say this much for Desmond
Hatchett: He has a way with the ladies.
The 33-year-old Knoxville, Tenn., resident has
reportedly set a Knox County record for his
ability to reproduce. He has 30 children with
11 women. And nine of those children were
born in the last three years, after Hatchett —
who is something of a local celebrity — vowed
“I’m done!” in a 2009 TV interview, saying he
wouldn’t father more children.
But Hatchett is back in the news this week
because he’s struggling to make ends meet on
his minimum-wage job. His inability to make
child-support payments on such a meager
salary also means he’s back in court again
and again, most recently to ask for a break on
those payments.
“Yes, we’ve got several cases with Mr.
Hatchett,” Melissa Gibson, an assistant
supervisor with the Knox County child support
clerk’s office, said with a sigh.
Hatchett’s attorney, Keith Pope, did not return
phone calls seeking comment.
Under the law, there’s nothing officials can do
to force Hatchett to keep his pants on.
“If there’s something out there like that, I’m
unaware of it,” Gibson told The Times, before
adding, “It definitely needs to be.”
Gibson said Hatchett is believed to hold the
Knox County record for most children. (He’d
hold a similar record in most counties in the
U.S., which might explain why news of his
predicament was pinging around the Internet
on Friday.)
Gibson said she couldn’t say whether any of
his children receive public assistance. The
youngest is a toddler; the oldest is 14. Asked
in a TV interview whether he can “keep up with
it all,” Hatchett said he knows all their names,
ages and birth dates.
Also in a TV interview, Hatchett tried to
explain — in a PG-rated way how he managed
to end up with so many kids: “I had four kids
in the same year. Twice.”
When Hatchett is working, he is required to
turn over 50% of his wages for child support —
the maximum allowed under law. Child
support payments are based in part on the
ages and needs of the children.
Some of the mothers of Hatchett’s children get
only $1.49 a month, reported WREG in
Memphis.

Sunday, March 16, 2014

Signs of Spousal Infidelity

A cheater punished by partner.

Statistics say that 85% of women who feel
their lover is cheating are correct and 50% of
men who feel their lover is cheating are right.
If you have suspicious, consider some of the
following and be as impartial as possible.
Have you noticed a:

-Sudden increase in time away from home
-Decreased sexual interest with you

-Cheating spouse is often distracted and day dreaming

-Cheating husband or wife is often “unavailable” while at work

-Cheating spouse attends new functions outside of work or not wants to go alone

-Cell phone calls from you are not returned in timely fashion

-Cheating spouse leaves house or goes to other rooms to talk on the telephone

-Cheating spouse uses computer alone and secretly

-Cheating spouse asks about your schedule more often than usual

-Mileage on car is high yet he / she reports only short distance errands

-Clothes smell of perfume or cologne

-Cheating spouse gets his / her laundry done independently

-Unexplained payments on bank statements

-Cheating spouse has more cash on hand without accountability

-Cell phone bills contain calls with long duration

-Cheating spouse now has a phone card but never used one before

-Cheating wife or husband has unexplained
receipts in wallet or purse

-Cheating spouse has suspicious phone voice-mail messages

-Cheating spouse has suspicious cell phone numbers stored or dialed

-Internet web browser history list (this is arecord of web sites visited) contains unusual sites

-Cheating spouse begins to use new or free e-mail account

-Cheating spouse is suddenly deleting e-mail messages

-You may also want to consider reviewing your spouse’s credit card bills.
-Unexplained MPesa transactions.

If You notice a few of these signs, Contact Us for Discreet Infidelity Investigations.

Important Information about Private Investigations:

If you feel that your husband, wife, boy friend or girl friend is cheating on you, be sure to tell us eveything. As your private investigator, we are only able to get you the proof and evidence you need if you tell us the whole story. Anything less can have a dramatic affect on our ability to get you the information you seek. Although we are among the best private investigators in the industry specializing in infidelity and cheating cases who are recognized experts in court, we are not magicians! We cannot make things exist that don’t. We cannot find infidelity where it does not exist and sometimes, despite signs to the contrary, there is no infidelity or it is too infrequent or too well hidden to be found.
Accordingly, we do not guarantee any outcome on any case.

Posted via Blogaway
 


Posted via Blogaway

The Cheating Spouse and Infidelity Private Investigator

Infidelity, adultery, cheating, being
unfaithful, mpango wa kando, life boat, having an affair...
...whatever you care to call it, is
likely to be one of the most painful
and devastating things that can
happen to you. Not knowing if your
spouse is cheating on you or not is
equally as painful. Even the prospect
of a loved one being unfaithful is
painful and extremely disruptive.
Each private investigator at PremierPI helps clients like you with this issue every day. We know that you need a private investigator to get you proof so that you can move forward with your life.
Unfortunately, once someone seriously suspects infidelity, more often than not, their suspicions are correct.
This pain and fear is very real and each private investigator at PremierPI takes your pain seriously.

Let us end your fear and anxiety and
get you the truth!
Whether you are the husband or wife, boyfriend or girl friend, you deserve to know if your partner is cheating and PremierPI can help
you get that proof and piece of mind you need to move forward with your life. Whether you are in Mombasa, Nakuru, Eldoret, Garissa, Kisumu, or somewhere in between, you may find it useful to review some common Signs of Infidelity developed by a private investigator to help you get better perspective on your situation and see if an investigation is right for your circumstances. A private investigator can discreetly, accurately and affordably help you.

We realize that having to hire a
private investigator and
discussing a possible affair by
your loved one is a difficult
thing to do. With that in mind,
you have our every assurance
that we are committed to using
the utmost discretion and good
taste in providing you with
investigative services that will give you peace
of mind to move forward with your life while
maintaining your dignity. You dont have to be
in pain any longer. That is our Private
Investigator promise.

We get you proof and give you the peace ofmind you deserve.

Regardless of whether you need to know the
truth simply to go forward with your life, or if
you need proof of cheating & infidelity to win
in court, PremierPI is the Private Investigator
agency for you. We leave nothing to chance!
If you think that spousal surveillance can help
you, we recommend that you read a quick
Overview of Spousal Surveillance.
Private Investigators have the ability to watch
your spouse, monitor who they are with, where
they go and what they do, discreetly and
confidentially. We can do this through
surveillance, utilization of vehicle tracking
devices and providing you with software to
monitor e-mail, chat room discussions and
internet activity.
Although spousal surveillance by a private
investigator is one of the most frequently used
tools for uncovering infidelity, each set of
circumstances can call for different measures.
Some of the other more commonly requested
services we provide when investigating
infidelity that can be done in conjunction with
an infidelity or spousal surveillance
investigation are as follows:

-Monitoring the cheating spouse's E-Mail, Chat
-Room Discussions and Internet Activity
_Tracking the cheater's vehicle
-Asset Searches
-Electronic Eavesdropping Detection
-E-Mail Tracing
-Computer Forensics
-Identification of the “Other Person”
-Child Custody & Support Investigations

Because each case is unique, we recommend that you call us and speak to a private investigator about your situation to better
assess which type of investigation would work best for you. The consultation with a private investigator is strictly confidential. Get the piece of mind you deserve and the ability to move forward with your life.
Call/WhatsApp/Telegram  today +254-789-766-130

Twitter

LinkedIn

Facebook Fanpage.

Signs Of a Cheating Spouse

      

Posted via Blogaway  


Posted via Blogaway

Thursday, March 13, 2014

Cheating and Infidelity Statistics:  Are Men Cheating More Than Women 

This may come as a complete surprise, butmost extramarital affairs are not about sex.What then, is the main factor that causesinfidelity? One should pay attention to thereason most people find intimacy withsomeone outside of their marriage is becauseof their emotional needs are not being met.

Yes, it is true in most cases of infidelity andabout wanting to feel emotionally connectedto someone.
According to a poll over over 1,100 womenconducted by WomanSavers.com, over 62% ofwomen thought that men cheat more thanwomen. However, in a similar Woman Saviour  poll of over 850 women, only 67% saidthey would never cheat on theirpartner

According to the current infidelity
statistics 60% of men and 40% of women areinvolved in extramarital affair. These figuresare even more drastic when the total numbersof marriages are considered. Because it is lesslikely that all the men and women havingextramarital affairs do happen to be marriedto each other.

Contact a pi here #Telegram/#WhatsApp +254-789-766-130

At least half of the women having affairs are married to men are notincluded in the 60% ofmen having affairs, thenat least one partner will have an affair inabout 80% of all marriages. With this studyyou can see that many marriages are gettingaffected and it is unreasonable to think affairsare due to the failures and shortcomings of individual husbands or wives. Leave alone the entire world, only in U S, 17% of divorces arecaused by unknown misconceptions such asinfidelity.

Suspect Infidelity? Contact Us For Photographic Evidence to Prove or Disprove Infidelity.

There exists even strong evidence,
which proves that there is a high correlationbetween on-line infidelity and subsequentreal-time sexual affairs.The reality is that there are a lot ofunsatisfying and empty relationships outthere, but however, the reason why infidelitystatistics are as high as they are is becausepeople place a higher value on their careers,children, friends or hobbies and not on theirrelationships with their partners. Think aboutit, when you neglect any of these areas, it isjust a matter of time before they deteriorateand ultimately lead to its untimely death. Thefailure in the relationship becomes imminent. The bottom line is that if you want to avoidbecoming yet another case that adds to theinfidelity statistic, then you must nurture andprioritize your relationship with your spouse orpartner. As you may have already figured out,unlike planes, relationships cannot bemaintained on "auto-pilot".

Written by Stephany Alexander  

A Wearable Football Shirt That Lets You Feel What The Players Feel

The latest piece of wearable tech is a shirt
you can wear when watching a football match
--- and experience all the sensations felt by
the players. Australian telecommunications
company Foxtel and agency CHE Proximity
devised the game to coincide with the new
season of Aussie Rules Football.
The idea is that the shirt can be worn during
live games shown on FOX FOOTY and FOXFOOTY HD on Foxtel. Real-time game data is
transmitted via a mobile Bluetooth app to the
electronics inside the so-called "Alert Shirt."
The shirt converts this data into sensations
that simulate the live sporting contest.

Suspect Infidelity? Contact PI for photographic evidence

Duringthe development, CHE Proximity and wearable
technology firm Wearable Experiments
(We:Ex) worked with well-known players Scott
Pendlebury, Luke Hodge and Trent Cotchin to
get a deeper understanding of how the body
feels during key moments of the professional
game. The shirt is available to AFL club
members who purchase Foxtel as well as
loyal Foxtel fans.
Side thought: can you imagine what the adult
film industry could do with this technology?   
Source - Creativity Online

Get Us On;     

LinkedIn

Google Plus   

 


Posted via Blogaway

Wednesday, March 12, 2014

Intelligence and Defense Reafirms Kenya Airforce Will Opt F-15 Fighters

An F-15C Eagle prepares to refuel mid Air
An F-15's high thrust-to-weight ratio and low wing loading let it shoot off the ground at a sharp angle.
The F-15 Strike Eagle (bottom) carries a number of air-to-ground weapons in addition to the air-to-air weapons you'll find on an F-15C

Intelligence and defense
experts in Kenya will take
F-15 fighter jets to upgrade
the current fleet of F-5
fighters.

Previous reports and
intelligence news on the
acquisition of new jets for
Kenya airforce were based on
the military assessment on
which aircraft suited them
best.
Various types of air defense
air crafts ‘(fighter jets) have
been reviewed at air force
facilities including Embakasi
and Laikipia airbase to verify
various aspects of the
operational context and the
F-15 has been the most
compatible with current KDF
control and support
resources.

The Boeing F-15 Eagle
remains world’s best
interceptor fighters and
primary air-superiority
fighter.
It is a large, light twin-
engined aircraft with high,
shoulder-mounted fixed-
geometry swept wings and
twin tails and can carry up to
16,000 pounds of bombs, fuel
tanks, and missiles
The F-15 fits KDF transition
from the F-5 platform based
on a number of factors such
as radar control and support
systems besides weather and
air defense monitoring
systems.
The F-15 will fit in an
upgraded F-5 environment
thats why various types of
upgrades have been ongoing
in Laikipia airbase and the
Wajir airbase which the KDF
will use as a second air force
main base.
The F-15 fighter jet is all
weather night and day fighter
bomber with a track record of
zero defeat and superior
avionics in comparison with
any other fighter aircraft such
as the Russian Sukhoi.
It uses the Northrop
Grumman Electronic Systems
AN/ALQ-131 electronic
countermeasures pod also
used by the F-5 fighter.


Posted via Blogaway

More than 251Million Barrels of Oil Found in Block 2B Anza Basin in Northern Kenya

Taipan Resources, a Canadian oil exploration firm reported latest data on Block 2B located in Mandera County can produce more than 251 million barrels of oil.

The company prospects oil
and gas contracted BGP
Group to survey Block 2b in
North Eastern Kenya.
Taipan Resources announced
the latest data on sections of
the block.
The company also reported
BGP Group had completed a
196.2km 2d Seismic survey
which confirmed closure at
the Baadada prospect.
Taipan Resources has focus
on Africa and is the 4th
largest oil prospecting
acreage owner in Kenya where
it owns Block 1 and Block 2B
onshore Kenya.
The acreage lies on the Anza
Basin, the largest Tertiary-
age rift-basins in the East
African Rift systems.
The Anza Basin alone has
multi-billion barrels of oil
discoveries to its credit.
Kenya lies on the Anza
Basin’s sweet spot and
massive oil discoveries have
continued to be made by
Tullow Oil, a British explorer
which might start oil
production in Kenya by 2017.


Posted via Blogaway

Kenya: President Uhuru Vows to Equip Security Forces to Curb Somalia Threats

Addis Ababa, 8 March, 2014

– There is a
high threat from regional neighbours and
local terrorism in Kenya. The main threat
is from Somali militants of Al Shabaab, a
they opposed to the Somalia governments and
its allies. Somali Al Shabaab has issued public
threats against Kenyan Authorities because of
its military intervention in Southern Somali
city of Kismayo. The Kenyan Security forces
have increased security to counter potential
reprisal attacks from Somalia.
Therefore, Kenyan President Uhuru Kenyatta
today vowed to equip Kenyan security forces
in response to emerging challenges such as
terrorism.
Uhuru, who addressed Kenyan cabinet and
principal secretaries during the ongoing
retreat in Nanyuki, said his government has
embarked on a modernization of all its
security agencies to cope with emerging
security threats.
“For a long time, the security sector has not
been given the attention it deserves. We are
changing that,” the president said.
The East African nation faces security
challenges related to resurgence of militias in
the coastal region and war against Al- Qaida
linked Al-Shabaab in Somalia.
President Kenyatta said more resources will be
allocated to the Kenya Defense Forces and the
National Police Service to enable them to
carry out their mandate more effectively.
He listed steps taken to boost security
including the training of officers, the purchase
of modern equipment, the leasing of vehicles
to boost mobility and the construction of new
houses for officers.
Defense Cabinet Secretary Raychelle Omamo
welcomed the president’s assurance of a
larger allocation of resources to the KDF.
Omamo said the move would enable the KDF
to better play its role in defending and
protecting the country’s sovereignty and
territorial integrity.
She said the increased allocation would make
KDF more efficient in its cooperation with
other authorities in situations of emergency
and disaster anywhere in the country.
She also commended the KDF for its
exemplary peacekeeping performance, both
regionally and globally.
According to the 2013 military ranking, the
Kenyan defense forces is sixth in Africa after
Egypt, Ethiopia, South Africa, Nigeria and
Algeria; and 46th in the world.

(Sources Xinhua News Agency and HAN)


Posted via Blogaway

China says can't confirm satellite images connected to missing plane

Tribune staff and wire reports

KUALA LUMPUR— Search planes were
flying on Thursday to an area where a
Chinese satellite has seen objects that could
be debris from the Malaysian airliner
missing for almost six days, but those
waters had been checked before and nothing
found, officials said.
At the same time, China heaped pressure on
Malaysia to improve its coordination over
the search for the Malaysia Airlines plane,
which disappeared early on Saturday on a
flight from Kuala Lumpur to Beijing. Of the
239 people on board, up to 154 were
Chinese.
Premier Li Keqiang, speaking at a news
conference in Beijing, demanded that the
"relevant party" step up coordination while
China's civil aviation chief said he wanted a
"smoother" flow of information from
Malaysia, which has come under heavy
criticism for its handling of the disaster.
Vietnamese and Malaysian planes would
scan waters where a Chinese government
agency website said a satellite had
photographed three "suspicious floating
objects" on Sunday. The location was close
to where the plane lost contact with air
traffic control.

"We are aware and we sent planes to cover
that area over the past three days,"
Vietnamese Deputy Transport Minister Pham
Quy Tieu told Reuters. "Today a CASA plane
will search the area again," he said,
referring to a twin-turboprop military
aircraft.
Malaysian Transport Minister
Hishammuddin Hussein said on his Twitter
feed: "Malaysia Maritime Enforcement
Agency Bombardier has already been
dispatched to investigate alleged claims of
debris being found by Chinese satellite
imagery."
China's civil aviation chief, Li Jiaxiang, said
there was no proof that the objects in the
South China Sea were connected to the
missing aircraft.
One U.S. official close to the plane
investigation also said the Chinese satellite
report was a "red herring."
It was the latest in scores of often confusing
leads for a multi-national search team that
has been combing 27,000 square nautical
miles, an area the size of Hungary, for the
Boeing 777-200ER.
On Wednesday, Malaysia's air force chief
said military radar had traced what could
have been the jetliner to an area south of
the Thai holiday island of Phuket, hundreds
of miles to the west of its last known
position.
His statement followed a series of
conflicting accounts of the flight path of the
plane, which left authorities uncertain even
which ocean to search in for Flight MH370.
The last definitive sighting on civilian radar
screens came shortly before 1:30 a.m. on
Saturday, less than an hour after the plane
took off from Kuala Lumpur, as it flew
northeast across the mouth of the Gulf of
Thailand.
What happened next remains one of the
most baffling mysteries in modern aviation
history and the differing accounts put out
by various Malaysian officials have drawn
criticism of their handling of the crisis.
"The Malaysians deserve to be criticized -
their handling of this has been atrocious,"
said Ernest Bower, a Southeast Asia
specialist at the Center for Strategic and
International Studies in Washington.
Rodzali Daud, the Malaysian air force chief,
told a news conference on Wednesday that
an aircraft was plotted on military radar at
2:15 a.m., 200 miles northwest of Penang
Island off Malaysia's west coast at the
northern tip of the Strait of Malacca.
But there has been no confirmation that the
unidentified plane was Flight MH370,
Rodzali said, and Malaysia was sharing the
data with international civilian and
military authorities, including those from
the United States.
"We are corroborating this," he added. "We
are still working with the experts."
AGONISING WAIT
According to the data cited by Rodzali, if
the radar had spotted the missing plane, the
aircraft would have flown for 45 minutes
and dropped only about 5,000 feet in
altitude since its sighting on civilian radar
in the Gulf of Thailand.
There was no word on which direction it
was then headed, but if this sighting was
correct, the plane would have turned
sharply west from its original course,
travelling hundreds of miles over the Malay
Peninsula from the Gulf of Thailand to the
Andaman Sea.
-Reuters

Posted via Blogaway


Posted via Blogaway

DPP, IG want media barred from Hemed case

The Director of Public Prosecutions
Keriako Tobiko and Inspector General of
Police David Kimaiyo want the case on
the missing suspect Mr Hemed Salim
Hemed be heard in private.
The two have have filed an application
seeking media and members of the public
be barred from a habeas corpus
proceedings on the whereabouts of Mr
Hemed.
Mr Hemed was arrested last month during
the Masjid Musa mosque police raid but
he was later declared missing.
In their application before Justice Edward
Muriithi, Mr Tobiko and Mr Kimaiyo, listed
as first and second respondents
respectively, argued that the media is
being insensitive in their reporting of the
proceeding.
Through senior principal prosecution
counsel Mr Alexander Muteti, the two
respondents further submitted that the
media coverage has endangered the lives
of deputy Mombasa DCIO Inspector Evans
Wesonga and police constable Owino
Okuto.
The two officers have been in the dock
testifying over Mr Hemed’s
disappearance.
Mr Muteti told Justice Muriithi that
photographs of the two officers posted by
unknown person have been circulating on
social media, thereby endangering their
lives.
“It is hard to test who is posting these
images and for what purpose it is serving.
We are not asking this court to limit the
rights of habeas corpus. We are asking
for the limitation of the freedom of
expression. Let the court limit what the
public is doing in a court of law,” he
added.
(Read More at Daily Nation)


Posted via Blogaway