They acquit a former Arandina player and reduce the sentence to the other two convicted

first_imgThe Civil and Criminal Chamber of the Superior Court of Justice of Castilla y León, regarding the appeals filed by the defenses of the three former soccer players in Arandina, convicted by the Provincial Court of Burgos for crimes of sexual assault, has agreed to acquit R.C.H. and has reduced the sentences to C.C.S (‘Lucho’) and V.V.R. (‘Viti’), who remain in four and three years in prison, respectively.The Chamber, which has seen the appeals of the three convicts, each of whom had been sentenced to 38 years in prison, has understood that the facts constitute a crime of sexual abuse, committed in the person of a minor, and has appreciated as mitigating factors the closeness of age and proximity in the degree of maturity with the victim.On the one hand, the Chamber has totally excluded R.C.H, who has already been acquitted by the Provincial Court of the events that occurred in his room, arguing the same reasons, although it also acquits him of what happened in the living room of the house.On the other, eThe Court has lowered the guilt of C.C.S. and V.V.R. and has sentenced them to four years in prison for the first and three years in prison for the second, as well as jointly and severally indemnifying the minor with the sum of 10,000 euros, sources from the TSJCyL Press Office informed Europa Press.The sentence indicates that the declaration of the minor -valued jointly with the rest of the evidence, witnesses, experts and documentaries (video, conversations and telephone messages) – It enjoys full credibility regarding the reality of the events that occurred in the living room of the apartment, but it lacks it regarding the way in which they occurred.Specific, the Chamber does not consider the existence of intimidation to be proven, when appreciating the contradictions that are revealed between his statement – in which he attributes what he did with the three convicts (masturbate and practice fellatio on all three) to the blockade caused by fear – and the behavior observed both in the previous moments -in which he exchanged messages of sexual content with one of them and agreed to accompany him to his house the next day-, as in the immediately following ones -in which he left the room, to voluntarily maintain a complete sexual relationship with one of them in a adjoining room (fact declared proven in the judgment of the Hearing that has not been contested) and after what happened boast before his friends.These contradictions, according to the resolution, show cracks in the credibility of the declaration which is also not corroborated by the peripheral elements to it, since neither the witness statements transmitting what the minor herself told them nor the crossed telephone messages at first, allow us to affirm that in the living room of the house she acted against her will when being gripped by fear, a version that she later transmitted to her parents and to the counselor who treated her in Madrid later.Consequently and in use of its faculties, the Court has modified the proven facts, removing the reference to bullying, and has classified them as a crime of sexual abuse to a child under 16 years of age, whose consent has no legal significance since the reform of the Penal Code of 2015, which raised the age of consent from 13 to 16 years. Regarding the criminal responsibility of the appellants, the judgment considers that it should not be appreciated that they did not know the age of the minor, nor did they ignore that sexual acts with a minor under 16 years of age are punishable by law.What the Chamber does value is the closeness of age and the proximity in the degree of maturity with the least, accredited by means of psychological expert evidence, to acquit RCH – who had already been acquitted of the sexual relationship maintained in his room with the girl immediately after the events, prosecuted for understanding that they were both close in age and of a similar degree of maturity- – as well as to mitigate the responsibility of CCS and V.V.R. when evaluating the relative proximity of their ages with that of the victim and their lack of maturity.Updating penaltiesSo that, The Court has sentenced C.C.S. to four years in prison. and three years to V.V.R, with the accessories of special disqualification for the right to vote; prohibition on communicating by any means or computer or telematic instrument, written, verbal or visual contact with the minor; prohibition to approach her, her home, school and any other that is frequented by the victim at a distance of less than a thousand meters and for a period of eight years; probation for a period of five years; and special disqualification for any profession or trade, whether or not paid, that involves regular and direct contact with minors for a period of more than three years than the duration of the sentences of deprivation of liberty imposed respectively.In addition, the Chamber has ordered them to jointly and severally pay civil liability, set at 10,000 euros, and the proportional part of the costs, including those of the private prosecution.The former players, “excited” with the “overturn” of the caseTwo of the three former players of Arandina, Raúl Calvo and Víctor Rodríguez, Viti, have been “excited” by the ruling of the TSJCyL that acquits the former and reduces the sentence of 38 years in prison to Viti and Carlos Cuadrado, Lucho, to three and four years, respectively.Rafael Uriarte, lawyer for Calvo and Viti, explained to the EFE Agency that his clients are “excited” with the judgment of the High Court, which is “much fairer” since the evidence provided by all parties has been valued.The attorney has acknowledged that are “more satisfied with this sentence”, assuring that it is noted that it is made “by a professional of the Law” while in that of the Provincial Court of Burgos the influence of social pressure was noted.Uriarte has highlighted that the evidence provided by both parties has been taken into account, assessing the expertise of mobile phones or the maturity tests of footballers.However, he regretted that the witness testimony of the only eyewitness to the events, a fourth footballer who was in the home when the events happened, was hardly affected.The lawyer has not wanted to rule yet on whether to appeal this new sentence before the Supreme Court, postponing this decision until the new sentence is studied in depth.In this sense, in addition, he has indicated that the terms, due to the special circumstances that are caused by the isolation by COVID-19, are not so rigid, so they will have more time to think about it.last_img read more

Read More »

Stars hold Ethiopia to go top of Group F

first_img0Shares0000Harambee Stars attacking midfielder Eric Johannah tries to tackle Ethiopian midfielder Gatuoch Panom during their 2019 AFCON Qualifier at the Bahir Dar Stadium on October 10, 2018. PHOTO/CourtesyNAIROBI, Kenya, Oct 10 – Harambee Stars moved top of Group F in the 2019 African Cup of Nations (AFCON) qualifiers after holding hosts Ethiopia to a barren draw at the Bahir Dar Stadium on Wednesday evening.The result means Stars go to four points having beaten Ghana last month and a win on Sunday in the return leg at the Moi Sports Centre Kasarani will see Kenya inch closer to an AFCON qualification for the first time since 2004. Stars withstood a tough second half surge by the home side pushed on by a full-to-capacity stadium to pick up the points that pushes them closer to Cameroon.CAF is yet to decide whether or not results picked by teams against Sierra Leone – who are under FIFA suspension – will stand in the road to qualification.Sierra Leone were scheduled to play Ghana on Thursday but the game has since been called off.-Two changesHead coach Sebastien Migne made two changes from the team that won 1-0 against Ghana last month, skipper Victor Wanyama slotting straight into the starting team for Ismail Gonzalez who started off the bench.Harambee Stars duo of Eric Johannah and Ovellah Ochieng pair up on an Ethiopian player during their 2019 AFCON Qualifier at the Bahir Dar Stadium on October 10, 2018. PHOTO/CourtesyDefender Brian Mandela who was returning to the squad after serving his one match suspension went into the heart of defense to partner Musa Mohammed in the absence of Joash Onyango who is suspended having been sent off against Ghana.Though Harambee Stars had a conservatist approach to the match, they had the best chances especially in the opening 45. They should have gone to the break 1-0 up but Michael Olunga’s 43rd minute goal was cancelled as referee Bakary Gassama adjudged him to have fouled an Ethiopian defender before scoring.It was the Ethiopians who threatened first, Getaneh Kebede having a second minute chance turned behind for a corner by Patrick Matasi after some good change of passes on the left.On the turn, Olunga forced Ethiopian keeper Samson Asefa to turn the ball out for a corner after he rose high at the back post to connect to an Abud Omar cross from the left.Ethiopia kept the possession as Kenya played behind the ball and they had a chance on the quarter hour with a freekick from range but Gatuoch Panom shot just wide.-Stars chancesHarambee Stars fans cheer on the team during their 2019 AFCON Qualifier against Ethiopia at the Bahir Dar Stadium on October 10, 2018. PHOTO/CourtesyStars had two brilliant back to back chances which should have been buried in the least.In the 20th minute, Eric Johannah sent Olunga away on the left but the striker’s effort was saved by Asefa. Five minutes later, Skipper Wanyama sent Johannah through with a brilliant defense splitting pass, but the Sweden based midfielder curled the ball wide with only the keeper to beat.A minute later, another chance presented itself when Johannah sent Ovellah Ochieng through on the right but Asefa was on point once again to make a super block at his near post.Having thrice dodged bullets, the Walias sought more urgency, looking for that one goal to send the fully packed Bahir Dar Stadium buzzing.In the 29th minute, another neat interchange of passes between the Ethiopians saw Bekele break into the box, but the diminutive midfielder’s final shot came off the side netting.-Two substitutionsMigne started the second half by pulling out Johannah who had struggled to make hgis presence felt and in his place came Ismail Athuman Gonzalez. The change meant Gonzalez and Dennis Odhiambo paired in midfield while Wanyama stepped upfront.Harambee Stars left back Abud Omar tries to clear the ball as Ethiopian rightback Abdulkerim Mohammed attempts to block during their 2019 AFCON Qualifier at the Bahir Dar Stadium on October 10, 2018. PHOTO/CourtesySeven minutes into the half, Migne would be forced to another change with Omar coming off with a suspected groin injury and his place taken by Erick ‘Marcelo’ Ouma.The Ethiopians pinned Kenya in their own half, playing dangerous balls into the box but their finishing left a lot to be desired.They came very close in the 66th minute when Bekele took a shot on the first time volley after a long ball from deep in defense found him inside the box, but his shot came off the outside of the upright, a let off for Stars.Migne’s side kept defending deep with Olunga left an isolated man upfront, not much of balls coming his way. After 72 minutes, the French tactician decided to spice up things in attack by bringing in speedy winger Paul Were.-Good save MatasiBut still, the home side kept pressing and in the 82nd minute, Matasi was forced into a good save to keep away a shot from Kebede from distance.The home side thought they had scored in the 83rd minute when Abebo Reshad tapped in at the back post from an Abdulkerim Mohammed cross but the second assistant referee had his flag up for offside.Stars had to manage the game with Ethiopia increasing the pressure and keeper Matasi played his role by slowing down play.0Shares0000(Visited 5 times, 1 visits today)last_img read more

Read More »

Moorpark still undefeated in Marmonte

first_imgMOORPARK – There would be no excuses from either side following Friday night’s Marmonte League girls’ soccer showdown between Moorpark and Westlake. The Musketeers, one of the area’s surprise teams, were without sophomore sweeper Kaitlin Paletta, who was in Las Vegas – along with her father and Moorpark head coach Frank Paletta – competing for the Cal South 89 (16-under) team in the Olympic Development Program Western Regional tournament. Westlake midfielder Kylie McDonald was also competing with Paletta in Las Vegas, thus leveling the playing field for both teams. The game remained even for 72 minutes, until junior Laura Spivack tapped in a Kendall Fisher cross to keep Moorpark undefeated in league with a 1-0 victory over the visiting Warriors, the Daily News’ fourth-ranked team. It was just the second goal this year for Spivack, who helped the Musketeers (7-5-3, 5-0-2) continue to build their case as one the league’s elite teams with a victory over Westlake, which has won six of the past seven league titles. “We all knew we would play this well this year,” Spivack said. “We’re not surprised at all because we’ve worked hard to get here. I think we’re the best team in the Marmonte League.” Moorpark, which has yet to win a Marmonte League title, has finished in the middle of the pack for the past few years. But the Musketeers’ victory enabled them to keep pace with No. 6 Agoura for first place. Agoura (7-1-4, 5-0-2) defeated Calabasas 5-0 Friday night. Moorpark outshot Westlake (6-2-2, 2-1-1) by a 10-9 margin, but the Warriors had significant scoring chances late. Westlake’s Megan Connor shook a Moorpark defender to create an open look from 20 yards in the 63rd minute, but Connor’s shot struck the crossbar and fell out of bounds. Two minutes later, Westlake’s Kate Edwards found space from a similar distance, but her shot sailed 4 feet over the crossbar. “We had a chance to win this game,” said Westlake coach Frank Marino, whose team had its eight-game unbeaten streak snapped. “We missed a couple of shots late, but we really played poorly in the first half. It’s still very early, though, and we can still win league.” Moorpark, unbeaten in its past seven games, plays host to defending league champion Royal of Simi Valley on Wednesday. Westlake, now in fourth place behind Agoura, Moorpark and Thousand Oaks (6-2-4, 3-1-3), will look to rebound when it plays host to Agoura on Wednesday. 160Want local news?Sign up for the Localist and stay informed Something went wrong. Please try again.subscribeCongratulations! You’re all set! AD Quality Auto 360p 720p 1080p Top articles1/5READ MOREGift Box shows no rust in San Antonio Stakes win at Santa Anitalast_img read more

Read More »

Masaza Cup Final: Bulemezi eye second title

first_imgThe Kabaka of Buganda, His Majesty Ronald Muwenda Mutebi II, will be in attendance. (PHOTO/Courtesy)Masaza Cup Final 2019Bulemezi vs BusiroMandela National Stadium, NambooleSaturday, 26-10-2019 @3pmNAMBOOLE – The Masaza Cup final will take center stage as Bulemezi and Busiro square off at the Mandela National Stadium on Saturday afternoon.The usual suspects Gomba, Ssingo and Buddu were dumped out of the competition in the initial stages paving way for two sides whose chances of winning it-at the start were slim.It has been a tournament of shocks but the final is now evenly poised and it is hard to call for a victor.Bulemezi will feel they have the upper hand in this one as they have won the tournament in past.Their victory came in 2012, a year after they had lost their first-ever final.For Busiro, they are first time finalists and will hope to be first time lucky as they bid to become the 9th side to win the competition.What the coaches are saying ahead of the gamePeter Mugerwa, Bulemezi“We are determined to win the trophy before the Kabaka.“From the first game to where we have reached, the players have been focused.”Deo Sserwadda, Busiro“We are the underdogs here because we have never won the championship.“In a bid for our first title, we hope to put up a fine performance.”How they got hereBulemeziBulemezi collected 14 points at the group stage after losing just once.At the quarter-finals, they eliminated Kyaggwe 2-1 on aggregate after drawing 1-1 away from home and winning the return leg 1-0.In the semis, they progressed past Kyadondo 2-1 on aggregate following a 1-0 win in the second leg after a 1-1 draw in the first.BusiroFor Busiro, they finished on 11 points in their group before eliminating Ssese 3-1 on aggregate after winning both legs (2-1 & 1-0).In the semi-finals, the defeated pre-tournament favourites Buddu, progressing to the finals 3-1 on aggregate after once again, winning both legs.Ssese’s Denis Mwemezi leads the scoring charts with 7 goals going into the final.The third-place playoff match will be between Buddu and Kyadondo and will start at 11am.The Kabaka of Buganda, His Majesty Ronald Muwenda Mutebi II will present the winners with the trophy.Masaza Cup past winners2018 – Ssingo2017 – Gomba2016 – Buddu2015 – Ssingo2014 – Gomba2013 – Mawokota2012 – Bulemezi2011 – Buluri2010 – Not Held2009 – Gomba2008 – Kyadondo2007 – Mawokota2006 – Kooki2005 – Mawokota2004 – GombaComments Tags: BudduBulemeziBusiroDenis MwemeziDeo SserwaddaKyadondoMasaza Cup FinalPeter MugerwaSseselast_img read more

Read More »

DD Gardening: Children and gardening!

first_imgIn this weekend’s gardening column, I discuss the many benefits and the importance gardening has for children. As the summer looms in to sight many parents are planning an array of activities to keep their children active and to ensure they stay in touch with their friends and classmates.Gardening in general is a very important life skill and teaches children and adults alike so much. Advertisement Unfortunately, I feel that there is a skills and knowledge gap from the older generation on how they worked the land and grew their foods.I believe that these skills and knowledge need to be re-instilled once again and to ensure they are not entirely lost.We live in a world where many find it difficult to distinguish the difference between many of our common fruit and vegetables. Is this a problem?Gardening teaches us to take responsibility from either ensuring a tiny seed germinates and becomes a seedling to ensuring that this tiny seedling becomes an established plant. Advertisement The seed won’t germinate overnight and neither will the seedling become an established plant in an instance. This teaches us to be patient. A skill almost lost in today’s society where we tend to expect everything to happen at the click of our fingers.Learn to accept failure and from failure we learn. Not every single seed you sow will become a seedling and not every seedling will become a plant. As someone once told me, a mistake is a mistake unless you learn from it then it’s a lesson. This very much applies to the gardening world.We tend to learn so much more from not succeeding and it encourages and teaches us to succeed. I think that’s one of the important lessons that gardening can teach anyone.If we develop an understanding of how nature and the environment work, we then can have a better understanding to make changes.If we learn how the cycle of photosynthesis and how trees grow we can then understand how critically important they are to us and our very existence. We owe our very existence to around 15cm of soil and from this we grow most of the food that feeds the world. If we can appreciate and learn about what makes soils so important then we can go and protect it.Horticulture can prove to be a very interesting and rewarding career. We need more young people pursuing a career in it too. By getting children to develop an interest and understanding at a young age, at a later stage perhaps they would pursue a career.As I discussed in a previous gardening column gardening has so many benefits for our mental and physical health. It can also be a brilliant social activity to get together, share some gardening stories and what you’re currently growing.I will be delivering a two-hour gardening workshop aimed at children between the ages of 9 to 12 years old at The BASE Enterprise Centre in Stranorlar. The workshop will run from 10am-12am and will cover the importance of soil, the superpowers of seeds and children will grow their very own sunflower too. More information on Facebook page or contact me via email or Whatsapp.Happy Gardening! Conor GallinaghBAgrSc, Horticulture, Landscape, & Sportsturf ManagementMCIHortWebsite: conorgallinagh.comEmail: cghorticultureconsultant@gmail.comFacebook: Conor Gallinagh – Horticulture ConsultantInstagram: @conorgallinaghTwitter: @ConorGallinaghDD Gardening: Children and gardening! was last modified: June 1st, 2019 by Conor GallinaghShare this:Click to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)Click to share on Pocket (Opens in new window)Click to share on Telegram (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on Skype (Opens in new window)Click to print (Opens in new window)Tags:childrenConor GallinaghGardeninglast_img read more

Read More »

Bulldogs clinch league volleyball championship

first_imgRedding >> The Los Molinos Lady Bulldogs volleyball team clinched the 5 Star League title Tuesday night with a 3-set win over the Redding Christian Lions, taking them to 9-0 in league play with one game left in the season.In a close first match, the Bulldogs prevailed 25-22 and then cruised to victory 25-16, 25-16 in the second and third sets over the second place Lions.Liset Castillo led the way for the Bulldogs with 16 kills, 4 aces, a block and 16 digs.Rachel Rogers had 10 digs, 2 aces, 3 …last_img read more

Read More »

Better Solar Cells with Diatoms

first_imgLet’s start with the operative quote before the subject matter: “Nature is the engineer, not high tech tools.  This is providing a more efficient, less costly way to produce some of the most advanced materials in the world.”  OK, now the subject: how to build better solar cells, by imitating diatoms.  See the story on Science Daily.    The tiny pores in the silica tests (cases) of diatoms are very efficient at scattering light.  “These tiny, single-celled marine life forms have existed for at least 100 million years and are the basis for much of the life in the oceans,” the article said, assuming the evolutionary timeline, “but they also have rigid shells that can be used to create order in a natural way at the extraordinarily small level of nanotechnology.”    Researchers at Oregon State (OSU) have found a way to not just imitate the diatoms, but actually incorporate them.  “The new system is based on living diatoms, which are extremely small, single-celled algae, which already have shells with the nanostructure that is needed,” the press release says.  “They are allowed to settle on a transparent conductive glass surface, and then the living organic material is removed, leaving behind the tiny skeletons of the diatoms to form a template.”  Presto: a solar cell with better efficiency than those hard-to-manufacture ones.  It’s cheaper, easier, and better: “Steps that had been difficult to accomplish with conventional methods have been made easy through the use of these natural biological systems, using simple and inexpensive materials” that are already available in abundance.    The researchers don’t even understand the physics.  They just know it works: “the tiny holes in diatom shells appear to increase the interaction between photons and the dye to promote the conversion of light to electricity, and improve energy production in the process.”    That’s good news to a world looking for green ways to extract energy from renewable resources.The evolutionary timeline and historical fluff was really unnecessary.  It just added a little humor here and there to a serious – and wonderful – application of biomimetic research.  Nothing in biomimetics makes sense except in the light of design.(Visited 9 times, 1 visits today)FacebookTwitterPinterestSave分享0last_img read more

Read More »

What’s in Your Username?

first_imgThe first rule for choosing a username – make sure it fits in a tiny logbook! The username is the geocacher’s calling card, signature, or tag.It’s as primeval a mark of territory as a bear scratching trees in the woods. It’s “I was here!” yelled at the top of the lungs on a steep mountainside at twilight next to a small Tupperware container.Like the superheros who grace the pages of dime store comic books, every username has an Origin Story. Some usernames are born great, some usernames achieve greatness, and some usernames have greatness thrust upon them.We asked geocachers in and around Geocaching HQ how they chose their usernames—or did the usernames choose them? Read them, then answer the question at the end. Some usernames are unexpected.Gunguy&fam – Is a forensic firearms examiner who started geocaching with his family.Sparkle Donkey – Is a fan of the Sparkle Donkey brand of Tequila (El Burro Esparkalo).Grillography – Was given a ‘Big Green Egg‘ Grill for his birthday and is also an avid photographer.Some usernames evoke personal memories.ThumbsGarcia – Had an intimate encounter with an X-Exacto knife that came abruptly and aggressively to life during a design project.Ursa_Minor – A personal nickname used fondly in conjunction with her close friend’s nickname, Ursa Major. Little Bear and Big Bear.SalemPirates – Started geocaching for the first time in Salem, Oregon, during a family member’s ‘Pirate’-themed 40th birthday party.Some usernames just work.Eliot Mechanism – Is a perfect anagram of this user’s real name.Moun10Bike  – When this user signed up in 1990, AOL only allowed 10 characters in a username, hence the shortening of the name. (His son’s username: Moun10Tyke)Prying Pandora – References the bit in The Phantom of the Opera when the Phantom calls Christine, “You Little Prying Pandora!” after she pulls his mask off. Pandora…Boxes…Geocaching. Voila!Love – “Is all you need.”The joy of seeing your name in the FTF spot: pricelessIt’s a requirement of Geocaching.com that every username be unique. But we think it’s more the story behind the alias rather than its characters that creates distinction.Now we ask you—what’s the story behind your username? Share with your Friends:Morecenter_img SharePrint RelatedHow to make the most of Planetary PursuitMarch 19, 2018In “News”Geocachers make history at Geowoodstock 2018June 29, 2018In “News”Dear Geocaching Diary: 31 Days of Adventure with Geocaching HQAugust 7, 2013In “Community”last_img read more

Read More »

Cartoon: Get Thee Behind Me, Twitalyzer!

first_img5 Outdoor Activities for Beating Office Burnout More Noise to Signal. I’m a numbers junkie.Oh, I talk a good line about how it’s the quality of the conversation that matters, and the connections you make… but you won’t see a day go by when I’m not checking on stats. Twitter followers, Klout score, blog traffic: if I can measure it, I’m counting.And it’s not like those numbers aren’t important… so long as they’re measuring something that ultimately represents some kind of impact I can have on the world, or vice versa.But that doesn’t explain why it’s such a compulsion for me – and, let’s face it, for an awful lot of people. I’ve subscribed to a number of theories over the years, most of them variants on “It’s all about making up for not being cool in high school.”That still makes some sense to me. Yet it doesn’t seem to capture something even more primal: the innate attraction of just plain measuring. Especially when it’s measuring, comparing, and passing milestones.For instance, this cartoon came about because one of the people I follow on Twitter mentioned on Friday that he was a single follower away from 3,000, and wouldn’t that be a nice way to start the weekend? I and a few others retweeted his request; he crossed the threshold; and then someone else tweeted to remind us both that what’s important is content, and not the number of people following you.She’s completely right. But it’s also true that it’s human nature to watch as the odometer turns over, to commemorate 40th birthdays, or to take quiet notice when we ram-lap. (Ram-lapping? That’s when you finally get a computer that has the same amount of RAM as your first computer’s hard drive size.) And when my Twitter follower count passes its next round number, I fully intend to mark the occasion. (Not with anything royal-wedding in scale, but something more than just a cupcake with blue icing.)Of course, as part of an online strategy, measurement should lead to actionable insights. But it can be a pleasure to measure. And maybe recognizing that is the under-appreciated first step in keeping metrics in perspective. rob cottingham Related Posts 12 Unique Gifts for the Hard-to-Shop-for People… 4 Keys to a Kid-Safe App 9 Books That Make Perfect Gifts for Industry Ex… Tags:#Cartoons#web last_img read more

Read More »

The Internet Of Things Might Try To Kill You

first_imgRelated Posts Lawrence Pingree could be voted Most Likely To Become A Supervillain. The Gartner research director has put an inordinate amount of thought into various ways bad actors might compromise the hardware systems we have today—not to mention the ones we may have tomorrow.For instance: Given the profusion of sensors and controllers in today’s automobiles, and the fact that their numbers will continue to mushroom as we move closer to self-driving cars, it’s probably only a matter of time before someone can—theoretically, at least—seize control of your car and effectively turn it into a multi-ton weapon of metal, glass and fuel. Hello, Christine.Here’s another. Consider the world of medical devices, increasing numbers of which feature wireless connections that allow remote programming. (The advantage for implanted devices such as pacemakers is obvious: Wireless reprogramming obviates the need for a second surgery.) It’s not hard to envision these devices eventually connected to the Internet for monitoring, analysis of health data and firmware updates.Now suppose hackers find a way to hijack these systems to injure or kill their users. Diabetics and heart patients aren’t the only ones at risk; biomedical monitors, “smart” drug patches and even hospital devices such as robotic surgical systems are all potentially vulnerable.Let’s Get SmallThe example of medical devices highlights a problem that’s endemic to many of the new gadgets now linking up to the Internet of Things: They’re frequently built to tight specs with limited memory and processing power that barely accommodates the functions their designers have crammed into them. There often isn’t much headroom for anything else. Like, well, security.Such limitations are widespread. So even if a manufacturer had the wherewithal to retrofit existing devices with hardened security, there may be very real limitations preventing such upgrades. And that, in turn, means that many of the “things” on the Internet may already be wide open to selective attack.You don’t need a hypothetical scenario to see some of these threats. All you really need is a specialized search engine like Shodan.Shodan is designed specifically to locate devices that have been carelessly plugged into the Internet without much attempt at preventing unauthorized access. It’s sometimes portrayed as the scary bogeyman of the Internet of Things, an all-powerful master search engine that can find any device connected to the Internet at any time.The reality isn’t quite that dramatic; Shodan isn’t very user friendly and performing searches takes time. But sophisticated users won’t have any trouble using Shodan or similar tools to find unguarded systems to attack.Why Disaster Hasn’t Yet StruckSo what’s holding them back?“Hackers usually want to keep systems up and running,” Pingree says. Destruction of the systems hackers subvert would—usually—run counter to their goals of profiting or making a broader social/political point. At the individual level, only a true supervillain would want to blow things up for the sake of blowing things up. Which is good news, since as we’ve recently learned, prisons sometimes have trouble keeping regular villains locked up.What we have seen, thus far, has been the small stuff, the kind of activities that one would expect from hackers. Just this summer, for example:An unknown person hacked into a baby monitor-camera in a 2-year-old’s room in Houston, Texas. The hacker bypassed the manufacturer’s security and used the established connection to shout obscenities though the monitor’s speakers.Security expert Nitesh Dhanjani released a whitepaper detailing the security vulnerabilities of the Philips Hue lighting system. The vulnerability could theoretically allow an attacker to black out locations via remote control, though there aren’t any known exploits. Yet.Forbes reporter Kashmir Hill was walked through a demonstration of a connected home system hack, which had her controlling the lighting system of a complete stranger’s home.But Simon Mullis, a systems engineer at the security firm FireEye, raises a new concern. Compromising lower-level devices such as simple sensors could offer hackers a way to move up the food chain toward their real target. A hacked low-level device, Mullins warns, could help inject malware into a government or company control system with more authority, and thus create a major security breach.“You could use a device to inject bad shell code into another device, and up the chain until you take over one of the company’s servers,” Mullis said.Nation-states and terrorists, by contrast, might harbor fewer qualms about such destruction. Financial systems, power grids, sewage systems, oil and natural-gas pipelines communications—all might be fair game in a declared or undeclared cyberwar, Pingree argues. If things go badly wrong, it won’t be groups like Anonymous or LulzSec or a real-life Lex Luthor to blame, but a state or terrorist actor bent on doing real, serious damage.What Is To Be Done?Preventing such scenarios is simple but not easy. Pingree wants to start at the beginning by setting up and enforcing strict security standards at the manufacturing level, so that devices are hardened before they leave the factory. Developers and engineers also need to start putting on their black hats, he said, and really start thinking about scenarios where things could go sideways with their devices.It may also come down to a complete revision of how such devices are utilized. CoreTalk Founder and CEO Sandy Klausner proposes a model where devices are explicitly connected to a domain controlled by a single entity (a person, corporation or government). Any functions directed to a device from someone outside the domain would always be blocked. Only domain-specific commands would be regarded as true, and pretending to be inside the domain would be impossible.All this is more easily said than done. At the moment, there’s no authority ready to devise and enforce new security standards for thermostats and the like. Some manufacturers may take on that challenge themselves, but that would only offer piecemeal protection. Sad to say, it may take an actual disaster to get the attention of device builders.Will the Internet of Things will be the harbinger of a post-apocalyptic world where we’re all huddled over smoldering fires and munching on lichens? Probably not. But it’s time to take security more seriously to minimize the odds that malefactors can wreak havoc via the smallest of our devices. Tags:#Internet of Things#security brian proffitt Of course, it sounds insane to plug the controls for a nuclear power plant or hydroelectric dam into the open Internet. But we’re also talking about large numbers of fairly innocuous devices like thermostats, monitor screens and residential power meters. That doesn’t sound so bad, does it?Not really—at least, not until they develop minds of their own, at which point the downstream effects of minor security breaches can get serious, fast.Consider the hypothetical disaster above. Innocuous pressure sensors in the tires of BMW M7s overheated at the behest of malicious commands, causing the tires to blow. Master control of data-center cooling went down because attackers fooled associated sensors into reporting emergency conditions that warranted immediate shutdown. Home alarms were easily tripped with faulty sensor data. Transformers exploded when outside commands disabled their surge-protection features and then jolted them with current spikes.Viewed this way, the Internet of Things is comprised of a multitude of potential security weaknesses, each largely innocuous in itself. But put them all together, and ya got Trouble with a capital T.Control A Controller, Crash A Car Top Reasons to Go With Managed WordPress Hostingcenter_img The Internet of Things promises to make life easier in countless ways. But don’t make it angry. You won’t like it when it’s angry.Rise Of The MachinesScene: New York City in mid-July, not too many years from now—the first day of a new war.The Holland Tunnel connecting New Jersey with lower Manhattan is just over a mile and a half long. One of six thoroughfares managed by the Port Authority of New York and New Jersey, it features 84 massive fans that can change out air throughout the tunnel every 90 seconds.One Monday morning in the middle of rush hour, those fans suddenly stop. So do the ventilation systems of every other tunnel leading into Manhattan. Within minutes, air quality nose-dives—though, oddly, automatic alarms fail to sound. Drivers woozy from carbon monoxide plow into guardrails, walls, and each other. The carnage is terrible; multiple huge pileups block exits in all directions, trapping thousands of people amid toxic fumes and inevitable conflagrations as spilled gasoline ignites. Over on the George Washington Bridge, all is chaos when a string of BMW M7 coupes—the hot new car among Wall Streeters—experience multiple-tire blowouts while crossing the span. Many drivers survive the resulting crashes thanks to airbags; others are not so lucky after exiting their crumpled vehicles, only to find another 4,642 pounds of luxury sports car screeching toward them, sparks flying from their tireless rims.Other new BMWs soon experience surges of unexpected acceleration and brake failures, with predictable results. In a matter of minutes, traffic across the city is hopelessly snarled across its major arteries and intersections, as often as not in flaming vehicular pileups. Other major cities up and down the eastern seaboard are similarly plagued with gridlock and blazes that no fire company can easily reach.Meanwhile, up and down the East Coast, cooling systems in dozens of data centers inexplicably shut themselves down, defying technicians’ attempts to coax them back to life. The enormous heat generated by endless racks of servers soon forces now-understaffed IT managers to shut them down, costing businesses millions of dollars an hour—and also taking offline critical systems such as emergency response.Residential and business alarm systems inexplicably begin sounding all over the five boroughs, overloading 911 systems and adding to the general chaos. Power transformers all over Manhattan then blow out all at once, as do others of the same model in Newark, Philadelphia, and Baltimore. Fires start to burn in cities paralyzed with crumpled vehicles and conflicting reports.By the end of the day, more than 1,600 people are dead in New York and other East Coast cities, amid confused and badly sourced reports of war, terrorism and rioting. When the dust finally settles, experts agree that the tragedy was the most damaging cyberterror attack in history—a coordinated effort that subverted both public and private infrastructure to wreak unprecedented death, destruction and panic at an eventual cost of several hundred billion dollars. The only consolation was that it could have been much, much worse.All because folks let the Internet of Things get out of hand.Meanwhile, Back In RealityThat hypothetical example points to a largely unspoken yet very real concerns about the coming Internet of Things: the way that a distributed but “intelligent” network of ordinary devices could threaten normal commerce, personal privacy, and even human life should malicious types figure out how to hack it.The Internet of Things is basically today’s Internet on steroids—one that’s connected to an incredible variety of handheld, household and industrial gadgets, each of which can transmit data to or even control other connected devices without human intervention. Some classic theoretical examples include the car that signals the maintenance center when a part is close to failing, or the toaster that tweets when your bagel is ready.See also: What’s Holding Up The Internet Of Things and How The Internet Of Things Will ThinkThere’s still a lot of work to do before that kind of semi-autonomous network actually comes into existence. And it’s easy to envision it as a technological haven where devices work in concert to ease the burden of our daily lives by directing traffic in our cities, managing power consumption in our homes and letting us know when our kids are on their way home from school.But if we’re not careful, the Internet of Things could also turn out to be one of the most dangerous weapons around. Subverted by malicious intent, the Internet of Things could just as easily turn our lives into a horror movie, one in which the everyday objects we depend on have suddenly developed a new urge—the urge to kill.Spoof A Sensor, Destroy A Data CenterDevices on the Internet of Things generally fall into one of two categories: sensors and controllers. Let’s talk sensors for a moment.Sensors monitor anything that can be measured: temperature, location, power, hydroflow, radiation, atmospheric pressure—you name it. More sophisticated sensors can also watch and listen to their surroundings. Link them all to the Internet of Things and suddenly you have a nervous system for much of the planet, one replete with feedback systems that loop in other devices.Many of those other devices are the controllers. These are the gadgets that act on the world around them—actuators, switches, servos, valves, turbines and ignition systems, just to name a few. (You may recognize some of these controllers as common elements of critical infrastructure such as power plants and transportation systems.) Though fewer controllers are connected to the Internet than sensors, engineers are rapidly redressing that imbalance. How Intelligent Data Addresses the Chasm in Cloud Serverless Backups: Viable Data Protection for … Cloud Hosting for WordPress: Why Everyone is Mo…last_img read more

Read More »