[
    {
        "key": "UI42KMM5",
        "version": 19,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/UI42KMM5",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/UI42KMM5",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1548567,
                "username": "aldrianepinchy",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/aldrianepinchy",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "UI42KMM5",
            "version": 19,
            "itemType": "blogPost",
            "title": "Latest News Abney Associates Technology, US police force pay bitcoin ransom in Cryptolocker malware scam",
            "creators": [],
            "abstractNote": "US police force pay bitcoin ransom in Cryptolocker malware scam\n\nMassachusetts police have admitted to paying a bitcoin ransom after being infected by the Cryptolocker ransomware.\n\nThe Cryptolocker malware infects a computer, normally via a legitimate-looking email that urges the reader to open an attachment often posing as a voicemail, fax, invoice or details of a suspicious transaction that is being queried.\n\nOnce the Windows computer is infected, the malware encrypts the user's hard drive and then begins displaying a countdown timer, while demanding payment for the release of the data of 2 bitcoins – an almost untraceable, peer-to-peer digital online currency – which at current exchange rates equates to about £832 or $1338.\n\n“(The virus) is so complicated and successful that you have to buy these bitcoins, which we had never heard of,” Swansea Police Lt. Gregory Ryan talking to the Herald News. “It was an education for (those who) had to deal with it.”\n\nRelated: \nhttp://abneyassociates.org/",
            "blogTitle": "Latest News Abney Associates Technology, US police force pay bitcoin ransom in Cryptolocker malware scam",
            "websiteType": "",
            "date": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.theguardian.com/technology/2013/nov/21/us-police-force-pay-bitcoin-ransom-in-cryptolocker-malware-scam",
            "accessDate": "",
            "ISSN": "",
            "shortTitle": "",
            "language": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": " latest news abney associates technology, US police force pay bitcoin ransom in cryptolocker malware scam"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-11-25T06:19:09Z",
            "dateModified": "2013-11-25T06:19:09Z"
        }
    },
    {
        "key": "WRCEM23D",
        "version": 18,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/WRCEM23D",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/WRCEM23D",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/155906/items/9BAET63E",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "WRCEM23D",
            "version": 18,
            "parentItem": "9BAET63E",
            "itemType": "note",
            "note": "",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-08-08T04:27:24Z",
            "dateModified": "2013-08-08T04:27:24Z"
        }
    },
    {
        "key": "HK5CU8HX",
        "version": 18,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/HK5CU8HX",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/HK5CU8HX",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/155906/items/9BAET63E",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "HK5CU8HX",
            "version": 18,
            "parentItem": "9BAET63E",
            "itemType": "note",
            "note": "<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 12.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\"><a href=\"http://belmont-ca.patch.com/groups/announcements/p/the-boiler-room-asheville-the-music-venue\">The&nbsp;BOILER ROOM&nbsp;Asheville: The Music Venue John Abney Blog</a></span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">&nbsp;</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\"><a href=\"http://archive.org/details/PartyAtTheGroveHouseBoilerRoomAshevilleAbneyCompanyAssociates\">the boiler room Ashville by John Abney and its associates personal blog</a></span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">If you want a good night well spent then spend it here. A live music and live entertainment venue located in the basement of the GROVE HOUSE Entertainment Complex, The BOILER ROOM, offers great acoustics for live music of any genre and hosts local, and also out of town live music scenes.&nbsp;</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">&nbsp;</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">Source Article:</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><a href=\"http://boilerroomasheville.com/\" target=\"_blank\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #2862c5;\">http://boilerroomasheville.com/</span></strong></a></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><a href=\"http://boilerroomasheville.com/boilercontact.html\" target=\"_blank\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #2862c5;\">http://boilerroomasheville.com/boilercontact.html</span></strong></a></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">&nbsp;</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">According to the official site, <a href=\"http://www.topix.com/forum/world/germany/TVNTV41CE7Q0LDSOE\">The&nbsp;BOILER ROOM</a>&nbsp;strives to be a &lsquo;launching pad&rsquo; for the community to grow beyond Asheville and is renowned for being attentive and accommodating to the needs of all artists, entertainers, and patrons alike.&nbsp; We are a place for bands to showcase &ldquo;Original&rdquo; works and materials only, for you won&rsquo;t find ANY cover bands here!&nbsp;&nbsp;BOILER ROOM&nbsp;is capable of adapting to the demands of nearly any event and its staff will strive to make that event rock!&nbsp; We guarantee an unforgettable impression on your fans and guests.&nbsp; And definitely the place is living to its promise.</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">&nbsp;</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">The good thing about the place is that you have the choice because The&nbsp;BOILER ROOM&nbsp;may be divided to be its own separate venue, or combined with&nbsp;</span></strong><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman';\"><a href=\"http://online.wsj.com/community/groups/abney-associates-1685/topics/party-grove-house-boiler-room\">Scandals Nightclub&nbsp;</a><span style=\"color: #454545;\">and/or&nbsp;</span><a href=\"http://forums.abebooks.com/discussions/AbeBookscom_Community_Forum/General/Courtesy_of_Mr_John_Abney_and_its_Associates_The_BOILER_ROOM_Asheville_The_Mus/abecom/30579.1?redirCnt=2&amp;nav=messages&amp;mobile=y\">Club Eleven on Grove</a><span style=\"color: #454545;\">, depending on the size of the event.</span></span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">&nbsp;</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">Here is how you can reach The&nbsp;BOILER ROOM (Company Courtesy of Mr. John Abney and its Associates, Hooray for the great food!)</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">&nbsp;</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">Physical/Mailing Address</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">Grove House Entertainment Complex</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">11 Grove Street</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">Asheville, NC 28801</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">Telephone: 828-505-1612</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">Email:&nbsp;</span></strong><a href=\"mailto:contact@boilerroomasheville.com\" target=\"_blank\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #2862c5;\">mailto:contact@boilerroomasheville.com</span></strong></a></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">&nbsp;</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">Another great thing about the place is that when you left something like important cards such as credit cards you can claim it back.&nbsp;</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">&nbsp;</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">How to Claim Left Credit Cards and/or IDS</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">&nbsp;</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">&nbsp;All credit cards or forms of identification lost or forgotten within the GROVE HOUSE venues are secured within the office of the general manager. As the GROVE HOUSE hours of operation vary by event, it is necessary to stop in during our business hours or contact us by phone/email to arrange a pick-up time.</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">&nbsp;</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">Items are frequently left behind at the <a href=\"http://www.socialbookmarkssite.com/tag/abney-and-associates-real-estate-company-party-at-the-boiler-room-asheville-the-grove-house-music-review/\">GROVE HOUSE</a>. Found items are stored in a secure area</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">for NO MORE THAN 30 days.</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">&nbsp;</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><em><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">Please Note: The entire property is throughly cleaned every Tuesday. If an item has NOT been recovered by the janitorial staff by Wednesday, it is highly unlikely that it is on the premises. If this occurs, check with the friends you were with during your visit as they may have your item.</span></em></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><strong><span style=\"font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">the boiler room Ashville by John Abney and its associates personal blog</span></strong></p>\n<p class=\"MsoNormal\">Source Article:</p>\n<p class=\"MsoNormal\"><a href=\"http://archive.org/details/PartyAtTheGroveHouseBoilerRoomAshevilleAbneyCompanyAssociates\">http://archive.org/details/PartyAtTheGroveHouseBoilerRoomAshevilleAbneyCompanyAssociates</a></p>\n<p class=\"MsoNormal\"><a href=\"http://www.citeulike.org/groupforum/3029\">http://www.citeulike.org/groupforum/3029</a></p>\n<p>&nbsp;</p>\n<p class=\"MsoNormal\"><a href=\"http://www.mouthshut.com/blog/iacboqpopm/The-BOILER-ROOM-Asheville-The-Music-Venue-John-Abney-Blog\">http://www.mouthshut.com/blog/iacboqpopm/The-BOILER-ROOM-Asheville-The-Music-Venue-John-Abney-Blog</a></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-08-08T04:27:24Z",
            "dateModified": "2013-08-08T04:27:24Z"
        }
    },
    {
        "key": "9BAET63E",
        "version": 18,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/9BAET63E",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/9BAET63E",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1324013,
                "username": "mariahabney",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mariahabney",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 2
        },
        "data": {
            "key": "9BAET63E",
            "version": 18,
            "itemType": "journalArticle",
            "title": "The BOILER ROOM Asheville: The Music Venue John Abney Blog",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "The Boiler Room Ashville by John Abney and its associates personal blog"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-08-08T04:27:24Z",
            "dateModified": "2013-08-08T04:27:24Z"
        }
    },
    {
        "key": "TXQDNBIS",
        "version": 17,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/TXQDNBIS",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/TXQDNBIS",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1307589,
                "username": "hansximilain",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/hansximilain",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "TXQDNBIS",
            "version": 17,
            "itemType": "journalArticle",
            "title": "Ransomware Computer Virus Poses Financial Threat to Computer Users- Allvoices",
            "creators": [],
            "abstractNote": "abney and associates, Ransomware Computer Virus Poses Financial Threat to Computer Users\n\nOver recent years, computer and broadband related technology has come a long way. This has resulted in both consumers and individuals becoming increasingly reliant on their PCs and other internet enabled devices. However, while this advanced technology has provided commercial and residential users with far greater ease and convenience in a huge number of ways, it has also given rise to the growing breed of crime known as cyber-crime.\n\nUsed for everything from extorting money and obtaining information through to the out-and-out sabotage of systems, cyber-crime has become a huge problem in the United States and in other countries around the world. In a recent warning, federal authorities in the United States have urged users to be vigilant as a result of another virus that is current doing the rounds with the intention of obtaining money from unsuspecting users.\n\nAccording to authorities, the 'ransomeware' computer virus is duping users into handing over their cash by locking their computer systems and displaying a warning message. The contents of the message are designed to lead users into thinking that the warning is from the Department of Justice or the courts. Users are told via the message that they have to make a payment or they could be prosecuted. However, officials have confirmed that government departments do not send out messages of this nature and the computer is locked by a virus that has been set up by cyber criminals looking to extort money from the public.\n\nDan Steiner, Security Expert from Online Virus Repair advised that making a payment in response to the message will not result in the user's computer being unlocked by the criminals. He said:\n\nComputers affected by this virus will remain frozen until the user makes arrangements to have the virus removed. Those affected by the virus should refrain from making what is essentially a ransom payment, even if they are desperate to regain control of their computer, as paying will make no difference to anything other than their bank balances.\n\nThis is one in a long line of computer viruses that cyber-criminals are using to target both individuals and businesses. A similar virus was reported late last year, where users were receiving similar messages demanding payment and threatening prosecution. The U.S Justice Department has set up a hotline for those who want to obtain more information as well as those who have already fallen victim to this scam and wish to report it.\n\nOver recent weeks, reports have highlighted how this virus has been gaining popularity, affecting computer users on a global basis. Authorities are hoping that raising awareness about the scam will help to stop more people falling victim to it.\n\nRead more:\nhttp://abneyassociates.org/\nhttp://www.linkedin.com/groups/Abney-Associates-4518705\nhttp://abneyassociates.org/category/articles/",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.allvoices.com/contributed-news/15032269-ransomware-computer-virus-poses-financial-threat-to-computer-users-instructables",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Ransomware Computer Virus Poses Financial Threat to Computer Users"
                },
                {
                    "tag": "abney and associates"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-07-21T04:16:47Z",
            "dateModified": "2013-07-21T04:16:47Z"
        }
    },
    {
        "key": "8MC5NGEP",
        "version": 16,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/8MC5NGEP",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/8MC5NGEP",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1307589,
                "username": "hansximilain",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/hansximilain",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "8MC5NGEP",
            "version": 16,
            "itemType": "journalArticle",
            "title": "iPhone 6 Alert: World’s slimmest smartphone screen is here",
            "creators": [],
            "abstractNote": "Apple Inc. (NASDAQ:AAPL) remains embroiled with the numerous patent disputes with Samsung.\n\nEven a US Court ruled yesterday that it violated antitrust law in a price-fixing case, saying the Cupertino-based tech giant “conspired to restrain trade” with publishers to boost the price of e-books. READ: iPhone-maker found guilty, vows to fight back.\n\nIn addition, Samsung's spearhead smartphone Galaxy S4 seems to be fighting its own set of fires. READ: Samsung Galaxy S4 catches fire while charging. \n\nGrabbing that opportunity with both hands, smart smartphone-makers such as LG are quietly but quickly embarking on a road that made Apple Inc. as successful as it is today – the road to innovation.\n\nThis morning, LG Display showcased the world’s slimmest Full HD LCD panel for smartphones. The South Korean giant said it will soon unveil the screen in one of its premium smartphones, but did not reveal which smartphone exactly will be the first to sport it. However, with the company rumoured to launch the LG Optimus G2 in August, to beat the rumoured launch of iPhone 6 (or 5S, as the case may be) in September.\n\nIn fact, according to rumours floating around much before LG Display actually unveiled the world’s slimmest screen, the LG Optimus G2 will be so thin that it won’t be able to sport buttons on its side, and power and volume buttons have been taken off the side of the phone and LG has moved them to the back – which is another first. Until now, no smartphone maker has seemingly realized that since we hold the phone in our palm, we can use our index finger to control basic functional buttons. Still, it has to be a delicate balance between functionality and, well, complete inanity, and we’ll be quite interested in seeing how well can LG accomplish that.\n\nThere’s even a leak video that shows the functionality, and we must say it looks pretty impressive, at least in the first look. Coming back to the screens, smartphones with screens more than 5-inch have been generally criticized for being too bulky to be held in the average person’s palm, but LG Display maintains that its 5.2-inch panel features better “grip-ability,” as the screen will be just 2.2mm thin.\n\nThe state-of-the-art 5.2-inch panel is an exciting advancement for the premium mobile device market enabling sleeker Full HD smartphones featuring and a superior viewing experience, LG Display said in a statement.\n\nOnly 2.2mm thin with a 2.3mm bezel, LG Display’s new panel is both slimmest and narrowest among existing Full HD LCD panels designed for mobile devices. “Today’s introduction of the world’s slimmest Full HD LCD panel represents an exciting advancement for the high-end smartphone segment, and is possible due to our world-class expertise in IPS and touch technologies,” said Dr. Byeong-Koo Kim, Vice President and Head of LG Display’s IT and Mobile Development Group.\n\n“LG Display will continue its commitment to developing products that maximise consumer value as well as opening new doors for the mobile and tablet PC industry,” he added.\n\nThis world’s slimmest Full HD LCD panel will provide larger visible display space on smartphones, critical as mobile devices are used for multimedia viewing more than ever before. Additionally, the panel will make devices easier to grip as well as lighter in weight.\n\nKey to realizing the world’s slimmest panel is LG Display’s Advanced One-Glass-Solution (OGS), the latest touch technology enabling an enhanced touch screen experience, developed and applied to the new panel for the first time ever.\n\nDual Flexible Printed Circuits, superior to a single circuit, have been inserted between the panel and touch film, reducing the number of lines on the panel by more than 30 percent. Utilization of a direct bonding system has also resulted in Optical Clear Resin between the panel and touch film for greater brightness.\n\n The new panel’s superiority in displaying resolution, brightness, and contrast ratio results in enhanced outdoor readability. By utilizing 1,080X1,920 pixels consisting of Red, Green, Blue (RGB) sub-pixels, the panel is a true Full HD display.\n\nAnd with a brightness of 535 nits at maximum, LG Display claims its panel outperforms all current mobile Full HD LCD panels. It adds that measuring contrast in real-life surroundings with Ambient Contrast Ratio results in a reading of 3.74:1 based on 10,000 lux, confirming the perfect performance of the panel even in strong outdoor sunlight conditions. \niPhone 6 Alert: World’s slimmest smartphone screen is here\n\nSee more article:\nhttps://getsatisfaction.com/abneyassociates\nhttp://www.dailymotion.com/video/xy0g92_nep-belastingaangiften-zou-op-stijging-vanwege-sc-hacken-abney-associates-informational-data-online_news#.UdrHpflgdhw",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.emirates247.com/business/iphone-6-alert-world-s-slimmest-smartphone-screen-is-here-2013-07-11-1.513980",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "iPhone 6 Alert: World’s slimmest smartphone screen is here"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-07-11T23:52:25Z",
            "dateModified": "2013-07-11T23:52:25Z"
        }
    },
    {
        "key": "FFGE9EZ8",
        "version": 15,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/FFGE9EZ8",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/FFGE9EZ8",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1342436,
                "username": "ricocoriv",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ricocoriv",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "FFGE9EZ8",
            "version": 15,
            "itemType": "journalArticle",
            "title": "Abney and Associates Microsoft wants to reveal US data queries / behance",
            "creators": [],
            "abstractNote": "MICROSOFT has joined Google in a legal push for permission to disclose more information about secret government requests for data, according to a US court filing.Microsoft's legal request with the Foreign Intelligence Surveillance Court (FISA) on June 19 came a day after a similar petition by Google.\n\nThe US technology titans argue they want to reassure people who use their products and services in the aftermath of revelations the National Security Agency had accessed vast amounts of data in a surveillance program under the supervision of the special court, which operates in secret.\n\n\"The media has erroneously reported that the alleged PRISM program enables the US government to 'tap directly into the central servers' of Microsoft and other electronic communication service providers,\" the filing made public on Wednesday argued.\n\n\"Microsoft has sought, and continues to seek, to correct the misimpression, furthered by such inaccurate media reporting, that it provides the US government with direct access to its servers and network infrastructures.\"\n\nMicrosoft asked the court to grant it permission to disclose aggregate data about government requests that are deemed secret, noting that deputy counsel general John Frank has 'top secret' clearance with the Department of Defense.Google has asked the court for permission to reveal numbers of government requests for data from the internet giant.\n\nGoogle said it already publishes in its \"transparency report\" data on requests from law enforcement and so-called National Security Letters from the FBI.\"However, greater transparency is needed,\" a Google spokesperson said at the time of the filing.\"We have petitioned the Foreign Intelligence Surveillance Court to allow us to publish aggregate numbers of national security requests, including FISA disclosures, separately.\"\n\nApple, Facebook, Microsoft and several other top internet and technology companies have come under heightened scrutiny since word leaked of a vast, covert internet surveillance program US authorities insist targets only foreign terror suspects and has helped thwart attacks.\n\nThe program was reportedly set up in 2007 and has grown to become the most prolific contributor to President Barack Obama's Daily Brief, the US leader's top-secret daily intelligence briefing.\n\nsource\nhttp://www.heraldsun.com.au/news/breaking-news/microsoft-wants-to-reveal-us-data-queries/story-fni0xqll-1226671026764\n\nhttp://www.behance.net/gallery/Abney-and-Associates-Microsoft-wants-to-reveal-US-data/9571665",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.behance.net/gallery/Abney-and-Associates-Microsoft-wants-to-reveal-US-data/9571665",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "abney and associates Microsoft wants to reveal US data queries"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-06-29T17:58:03Z",
            "dateModified": "2013-06-29T17:58:03Z"
        }
    },
    {
        "key": "XZKHU6DN",
        "version": 14,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/XZKHU6DN",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/XZKHU6DN",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1324013,
                "username": "mariahabney",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mariahabney",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "XZKHU6DN",
            "version": 14,
            "itemType": "journalArticle",
            "title": "Shelfari: Abney and Associates Real Estate Company Party",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "abney and associates real estate company party at the boiler room asheville The Grove House music review"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-06-27T04:12:47Z",
            "dateModified": "2013-06-27T04:12:47Z"
        }
    },
    {
        "key": "B2CFBTA5",
        "version": 14,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/B2CFBTA5",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/B2CFBTA5",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/155906/items/XZKHU6DN",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "B2CFBTA5",
            "version": 14,
            "parentItem": "XZKHU6DN",
            "itemType": "note",
            "note": "<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-size: 12.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\"><a href=\"http://www.yelp.com/topic/stockholm-abney-and-associates-real-estate-company-party\">Abney and Associates Real Estate Company Party at the Boiler room Asheville&nbsp;<span style=\"background-position: initial initial; background-repeat: initial initial;\">The</span></a><span style=\"background-position: initial initial; background-repeat: initial initial;\"> Grove House music review</span></span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-size: 12pt; font-family: Helvetica, sans-serif; color: #454545; background-position: initial initial; background-repeat: initial initial;\"><a href=\"http://boilerroomasheville.com/\">See you at The BOILER ROOM Asheville, The Grove House Music Review.</a></span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-size: 12pt; font-family: Helvetica, sans-serif; color: #454545; background-position: initial initial; background-repeat: initial initial;\">A hot and happening music space located at The Grove House, The Boiler Room is famous for its patronage to underground music. Also on offer are genres like shoe gaze, ambient, experimental, garage, indie and pop among others. The venue popularly hosts a host of live acts and music performances by upcoming bands and artists on a regular basis. Check website for more details on current and upcoming events.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-size: 12pt; font-family: Helvetica, sans-serif; color: #454545; background-position: initial initial; background-repeat: initial initial;\">So I was new to Asheville and I am hearing about this place, The BOILER ROOM. They <a href=\"http://boilerroomasheville.com/boilercalendar.html\">say the place is a bit new as well but I have been hearing lots of compliments about the</a> place.&nbsp;&nbsp;I made a few researches first before checking it out and I found the above text and I thought it is good to share it to people too.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-size: 12pt; font-family: Helvetica, sans-serif; color: #454545; background-position: initial initial; background-repeat: initial initial;\">As I continue on researching, I think I am getting fair votes regarding if the place is cool or not.&nbsp;&nbsp;I am a music lover so I guess I will be enjoying the place.&nbsp;&nbsp;And some says the place is really nice so what&rsquo;s not to try.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-size: 12pt; font-family: Helvetica, sans-serif; color: #454545; background-position: initial initial; background-repeat: initial initial;\"><a href=\"http://boilerroomasheville.com/pricingservicesbr.html\">Here comes the day that I tried hanging-out in The BOILER ROOM, and it was a lot of</a> fun!&nbsp;&nbsp;The experience was a blast!&nbsp;</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-size: 12pt; font-family: Helvetica, sans-serif; color: #454545; background-position: initial initial; background-repeat: initial initial;\">I was there last May 31<sup>st</sup>, the guest bands were Live Music by Saint Famine Society, Mindshapefist and Polly Panic.&nbsp;&nbsp;Their music was like, the genre of music is hard rock/punk/experimental.&nbsp;&nbsp;This is Saint Famine Society&rsquo;s CD release show.&nbsp;&nbsp;Their music was really cool!&nbsp;&nbsp;I enjoyed the night so much!&nbsp;&nbsp;I couldn&rsquo;t find enough words to described the enjoyment we felt.&nbsp;&nbsp;Oh yeah we, I was with some friends who are actually fanatics of <a href=\"http://abneynicoleturpin.blogspot.nl/2013/06/abney-and-associates-real-estate.html\">the same music genre like I do.</a></span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-size: 12pt; font-family: Helvetica, sans-serif; color: #454545; background-position: initial initial; background-repeat: initial initial;\">We arrived at exactly 9pm.&nbsp;&nbsp;We went to the bar and wow boy the crowd here were very friendly, even the bartender who for sure was really tired was really accommodating.&nbsp;&nbsp;He smiles a lot which makes the place very inviting actually.&nbsp;&nbsp;It was very easy to get familiar with the place and be comfortable even though we were new <a href=\"https://archive.org/details/AbneyAndAssociatesRealEstateCompanyParty\">there.</a></span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-size: 12pt; font-family: Helvetica, sans-serif; color: #454545; background-position: initial initial; background-repeat: initial initial;\">Now it is a date we will be hanging out at The BOILER ROOM every FRIDAY!&nbsp;&nbsp;This is a perfect place to unwind after a tiring week for a music lover like me.&nbsp;&nbsp;See you there!</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-size: 12.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">Abney and Associates Real Estate Company Party at the Boiler room Asheville&nbsp;<span style=\"background-position: initial initial; background-repeat: initial initial;\">The Grove House music review</span></span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt; text-align: justify; background-position: initial initial; background-repeat: initial initial;\"><span style=\"font-size: 12.0pt; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">&nbsp;</span></p>\n<p>&nbsp;</p>\n<p class=\"MsoNormal\"><strong><span style=\"font-size: 12.0pt; line-height: 115%; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\">You can visit at:</span></strong><span style=\"font-size: 12.0pt; line-height: 115%; font-family: 'Helvetica','sans-serif'; mso-fareast-font-family: 'Times New Roman'; color: #454545;\"><br /> <a href=\"http://boilerroomasheville.com/\" target=\"_blank\"><span style=\"color: #2862c5;\">http://boilerroomasheville.com/</span></a><br /> <a href=\"http://boilerroomasheville.com/boilercalendar.html\" target=\"_blank\"><span style=\"color: #2862c5;\">http://boilerroomasheville.com/boilercalendar.html</span></a><br /> <a href=\"http://boilerroomasheville.com/pricingservicesbr.html\" target=\"_blank\"><span style=\"color: #2862c5;\">http://boilerroomasheville.com/pricingservicesbr.html</span></a></span></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-06-27T04:12:47Z",
            "dateModified": "2013-06-27T04:12:47Z"
        }
    },
    {
        "key": "7BUDBVNR",
        "version": 13,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/7BUDBVNR",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/7BUDBVNR",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1301322,
                "username": "ghanem2013",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ghanem2013",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "7BUDBVNR",
            "version": 13,
            "itemType": "journalArticle",
            "title": "Abney and Associates - The Secret War: Infiltration, Sabotage, Devastating Cyber Attacks",
            "creators": [],
            "abstractNote": "Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.\n\nThis is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.\n\nAlexander runs the nation’s cyber war efforts, an empire he has built over the past eight years by insisting that the US’s inherent vulnerability to digital attacks requires him to amass more and more authority over the data zipping around the globe. In his telling, the threat is so mind-bogglingly huge that the nation has little option but to eventually put the entire civilian Internet under his protection, requiring tweets and emails to pass through his filters, and putting the kill switch under the government’s forefinger. “What we see is an increasing level of activity on the networks,” he said at a recent security conference in Canada. “I am concerned that this is going to break a threshold where the private sector can no longer handle it and the government is going to have to step in.”\n\nIn its tightly controlled public relations, the NSA has focused attention on the threat of cyber-attack against the US—the vulnerability of critical infrastructure like power plants and water systems, the susceptibility of the military’s command and control structure, the dependence of the economy on the Internet’s smooth functioning. Defense against these threats was the paramount mission trumpeted by NSA brass at congressional hearings and hashed over at security conferences.",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.globalresearch.ca/the-secret-war-infiltration-sabotage-devastating-cyber-attacks/5338882",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "abney and associates,The Secret War: Infiltration, Sabotage, Devastating Cyber Attacks"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-06-17T14:32:12Z",
            "dateModified": "2013-06-17T14:32:12Z"
        }
    },
    {
        "key": "RD8CEGAS",
        "version": 12,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/RD8CEGAS",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/RD8CEGAS",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1324013,
                "username": "mariahabney",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mariahabney",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "RD8CEGAS",
            "version": 12,
            "itemType": "journalArticle",
            "title": "Abney Associates Internett sikkerhetsnyheter: Hartford dampkjeler lanserer cyberangrep beskyttelse for små bedrifter",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-06-13T23:51:08Z",
            "dateModified": "2013-06-13T23:51:08Z"
        }
    },
    {
        "key": "W6FEHRJV",
        "version": 12,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/W6FEHRJV",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/W6FEHRJV",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/155906/items/RD8CEGAS",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "W6FEHRJV",
            "version": 12,
            "parentItem": "RD8CEGAS",
            "itemType": "note",
            "note": "<p><a href=\"http://blogg.by/nicoleturpin/abney-associates-internett-sikkerhetsnyheter-hartford-dampkjeler-lanserer-cyberangrep\">http://blogg.by/nicoleturpin/abney-associates-internett-sikkerhetsnyheter-hartford-dampkjeler-lanserer-cyberangrep</a></p>\n<p class=\"MsoNormal\"><strong><span style=\"font-size: 12.0pt; line-height: 115%;\"><a href=\"https://twitter.com/Abney_and_Assoc\">Reviews of abney and associates on cyber security</a></span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><a href=\"http://studfyler.skyrock.com/tags/dmYdv5DJ4-abney-associates-technology-hong-kong-review.html\"><span style=\"font-size: 12.0pt; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';\">Hartford dampkjeler</span></a><span style=\"font-size: 12pt; font-family: Arial, sans-serif;\"> inspeksjon og forsikring co (HSB), en del av M&uuml;nchen Re, har lansert HSB CyberOne, en ny cyber risiko forsikring dekning for sm&aring; bedrifter. Det nye produktet utvider HSB'S suite av produkter og tjenester som er utformet for &aring; beskytte mindre kommersielle organisasjoner fra den &oslash;kende trusselen fra informasjon sikkerhet eksponeringer.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman';\">&nbsp;</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><a href=\"http://nicoleturpin.blog.ca/2013/06/13/abney-associates-internett-sikkerhetsnyheter-hartford-dampkjeler-lanserer-cyberangrep-beskyttelse-for-sma-bedrifter-16119376/\"><span style=\"font-size: 12.0pt; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';\">Virus og andre dataangrep</span></a><span style=\"font-size: 12pt; font-family: Arial, sans-serif;\"> kan f&oslash;re til tapte n&aelig;ringsinntekt og kostnader for &aring; gjenopprette systemer og gjenopprette data. Med en liten bedrift betydelig fare for &aring; miste viktig informasjon som er n&oslash;dvendig for daglige driften, skade sitt rykte og potensielt &aring; bli utsatt for kostbare tvistem&aring;l, kj&oslash;per flere selskaper cyber forsikring.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman';\">&nbsp;</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><a href=\"http://blogg.by/nicoleturpin/abney-associates-internett-sikkerhetsnyheter-hartford-dampkjeler-lanserer-cyberangrep\"><span style=\"font-size: 12.0pt; font-family: 'Arial','sans-serif'; mso-fareast-font-family: 'Times New Roman';\">NBIS forsikring og risiko</span></a><span style=\"font-size: 12pt; font-family: Arial, sans-serif;\">-Management-tjenester kan du st&aring;r ved din side &aring; gi deg den beste sjansen i tilfelle reklamasjon! V&aring;re one-of-a-kind Risk Management st&oslash;ttesystem gir kundene verkt&oslash;yene som trengs for &aring; minimere totalkostnad og risikoprofil.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman';\">&nbsp;</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 12pt; font-family: Arial, sans-serif;\">HSB-CyberOne gir dekning med grenser opp til $100.000 for &aring; beskytte risikoene som er typisk for sm&aring; organisasjoner. Det hjelper forsikringstakere gjenopprette fra skade &aring; systemer som er for&aring;rsaket av en datamaskin-angrep, og ogs&aring; gir forsvar og ansvar dekning for visse s&oslash;ksm&aring;l som p&aring;st&aring;r tredjeparts skade som f&oslash;lge av en feil ved forsikret &aring; adekvat sikre sitt eget datasystem.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 12.0pt; font-family: 'Times New Roman','serif'; mso-fareast-font-family: 'Times New Roman';\">&nbsp;</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 12pt; font-family: Arial, sans-serif;\">Andre forsikringsselskaper kan legge HSB-CyberOne i en gruppe av deres sm&aring;bedrifter politikk s&aring; det er rimeligere enn produkter underwritten en policy om gangen. Det kan v&aelig;re inkludert som en del av en virksomhet eiere produkt (BOP) eller en kommersiell multi-peril (CMP) politikk.</span></p>\n<p class=\"MsoNormal\"><strong><span style=\"font-size: 12.0pt; line-height: 115%;\">Reviews of abney and associates on cyber security</span></strong></p>\n<p class=\"MsoNormal\"><strong><span style=\"font-size: 12.0pt; line-height: 115%;\">Read related articles:</span></strong></p>\n<p class=\"MsoNormal\"><a href=\"http://studfyler.skyrock.com/tags/dmYdv5DJ4-abney-associates-technology-hong-kong-review.html\"><span style=\"font-size: 12.0pt; line-height: 115%;\">http://studfyler.skyrock.com/tags/dmYdv5DJ4-abney-associates-technology-hong-kong-review.html</span></a></p>\n<p>&nbsp;</p>\n<p class=\"MsoNormal\"><a href=\"https://twitter.com/Abney_and_Assoc\"><span style=\"font-size: 12.0pt; line-height: 115%;\">https://twitter.com/Abney_and_Assoc</span></a></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-06-13T23:51:08Z",
            "dateModified": "2013-06-13T23:51:08Z"
        }
    },
    {
        "key": "6PFU6CM7",
        "version": 11,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/6PFU6CM7",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/6PFU6CM7",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/155906/items/DNBB8XCZ",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "6PFU6CM7",
            "version": 11,
            "parentItem": "DNBB8XCZ",
            "itemType": "note",
            "note": "<p class=\"MsoNormal\"><strong>abney associates article reference number 85258081704 A&amp;A</strong></p>\n<p class=\"MsoNormal\">Yandex today announced that it has banded together with Opera Software, SlideME and CodeNgo to</p>\n<p class=\"MsoNormal\">kick off and support a new &lsquo;open-source&rsquo; initiative dubbed the One Platform Foundation (OPF).</p>\n<p class=\"MsoNormal\">According to its boiler plate, the OPF wants to &ldquo;help the Android ecosystem evolve by enabling</p>\n<p class=\"MsoNormal\">developers to easily code and submit their apps across multiple alternative application stores&rdquo;.</p>\n<p class=\"MsoNormal\">In case you didn&rsquo;t know, Opera and Yandex are among Google&rsquo;s prime competitors in the mobile</p>\n<p class=\"MsoNormal\">browser space, and the latter company in particular has been ruffling the Mountain View-based</p>\n<p class=\"MsoNormal\">Internet search giant&rsquo;s feathers in numerous other ways.</p>\n<p class=\"MsoNormal\">Android marketplaces represent another battlefield.</p>\n<p class=\"MsoNormal\">One of OPF&rsquo;s first projects is AppDF (short for App Description File), a format that allows developers to</p>\n<p class=\"MsoNormal\">describe their Android applications in one file and publish it to multiple app stores in one fell swoop.</p>\n<p class=\"MsoNormal\">The AppDF format is for now supported by Yandex.Store, Opera Mobile Store, SlideME and CodeNgo.</p>\n<p class=\"MsoNormal\">The OPF says all app stores are welcome to join the movement, and some are already looking into it.</p>\n<p class=\"MsoNormal\">Victor Shaburov, VP of Storefront Services at Opera Software, says:</p>\n<p class=\"MsoNormal\">&ldquo;AppDF is a great tool that allows cross-store app submission. It simplifies the work of developers a lot</p>\n<p class=\"MsoNormal\">and is set to drive them a lot of new users.&rdquo;</p>\n<p class=\"MsoNormal\">Chris Jones, co-founder of self-publishing platform CodeNgo, added:</p>\n<p class=\"MsoNormal\">&ldquo;We believe that AppDF will significantly lower the obstacles for developers trying to monetize their</p>\n<p class=\"MsoNormal\">apps and also enable a healthier alternative app store ecosystem.&rdquo;</p>\n<p class=\"MsoNormal\">(Also read: InMobi offers Android developers a free way to distribute their apps to 130+ stores)</p>\n<p class=\"MsoNormal\">Another project from the OPF initiative is OpenIAB (short for Open In-App Billing), a library that allows</p>\n<p class=\"MsoNormal\">Android app developers to support in-app billing APIs of multiple application stores with a single piece</p>\n<p class=\"MsoNormal\">of code.</p>\n<p class=\"MsoNormal\">The One Platform Foundation says it basically aims to alleviate many of the problems faced by Android</p>\n<p class=\"MsoNormal\">app developers worldwide today:</p>\n<p class=\"MsoNormal\">The OPF was created to solve some of the big problems for Android app developers &ndash; app store market</p>\n<p class=\"MsoNormal\">fragmentation and lack of time and resources to allocate apps to any of more than 30 alternative app</p>\n<p class=\"MsoNormal\">stores other than Google Play.</p>\n<p class=\"MsoNormal\">The reason why developers usually ignore the smaller app stores is that each app store has its own</p>\n<p class=\"MsoNormal\">app description format, form for app submission, etc.</p>\n<p class=\"MsoNormal\">We estimate that it takes on average from 30 minutes to an hour to wrap an app for each app store. It</p>\n<p class=\"MsoNormal\">can cost up to 300 man-hours per year total (without potential updates) to cover all app stores.</p>\n<p class=\"MsoNormal\">The OPF&rsquo;s mission is to help Android app developers increase the number of stores their applications</p>\n<p class=\"MsoNormal\">are distributed in without spending a lot of time and resources on it, and ultimately increase revenues</p>\n<p class=\"MsoNormal\">by broadening the potential audience.</p>\n<p class=\"MsoNormal\">Of course, this will also help providers of alternative Android app stores grow and make money</p>\n<p class=\"MsoNormal\">themselves, so it&rsquo;s not like Yandex, Opera and other backers of the initiative are doing it out of sheer</p>\n<p class=\"MsoNormal\">goodwill.</p>\n<p class=\"MsoNormal\">Also read:</p>\n<p class=\"MsoNormal\">Yandex signs Google agreement for submitting contributions to the Chromium project alongside Nvidia,</p>\n<p class=\"MsoNormal\">Opera</p>\n<p class=\"MsoNormal\">Opera partners with TIM to bring its App Store to 70 million Brazilian mobile users</p>\n<p class=\"MsoNormal\">Opera&rsquo;s WebKit-powered browser for Android comes out of beta with full launch</p>\n<p>&nbsp;</p>\n<p class=\"MsoNormal\"><strong>abney associates article reference number 85258081704 A&amp;A</strong></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-06-02T02:54:46Z",
            "dateModified": "2013-06-02T02:54:46Z"
        }
    },
    {
        "key": "DNBB8XCZ",
        "version": 11,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/DNBB8XCZ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/DNBB8XCZ",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1324013,
                "username": "mariahabney",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mariahabney",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "DNBB8XCZ",
            "version": 11,
            "itemType": "journalArticle",
            "title": "Opera and Yandex start One Platform Foundation to “help the Android ecosystem evolve”",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "abney associates article reference number 85258081704 A&A"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-06-02T02:54:46Z",
            "dateModified": "2013-06-02T02:54:46Z"
        }
    },
    {
        "key": "2INKS8B7",
        "version": 10,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/2INKS8B7",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/2INKS8B7",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1301322,
                "username": "ghanem2013",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ghanem2013",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "2INKS8B7",
            "version": 10,
            "itemType": "journalArticle",
            "title": "Reviews by Abney and Associates, Code 85258081704 – blog.fc2",
            "creators": [],
            "abstractNote": "http://beatrizlopez970.blog.fc2.com/blog-entry-1.html\n\nThe US Federal Trade Commission has carried out a huge international crackdown on a number of \"tech support\" scams being run out of India which have conned people in the UK, US, Canada and elsewhere out of millions of pounds since 2008.\n\nAs explained by the Guardian in 2010, the scams used \"boiler room\" tactics, dialling through phone books for English-speaking countries. People who answered the phone were told the call came from Microsoft or their internet service provider, and that the person's computer was \"reporting viruses\". \n\nThe caller would then perform an unnecessary \"fix\" on the computer and charge the person for it – and sometimes sign them up to multi-year \"support\" contracts. The cost could run to hundreds of pounds.\n\nPeople in the US, UK, Canada, Australia and New Zealand were targeted because they, like the people carrying out the scam, are English-speaking. The Guardian understands that the scam was worth millions of pounds a year to the organised gangs carrying it out.\n\nAt the FTC's request in six cases, a federal district judge froze the US assets of 17 people and 14 companies that have been accused of taking part in the operations. The FTC has also shut down 80 internet domain names and 130 phone numbers used in the US to carry out the scams.The FTC is seeking an end to the scams, and repayments for people who were conned out of money.\n\nThough the FTC said it could not put a figure on how many people had been scammed, or how much they had lost, Microsoft – which has been working with the commission for the past two years to try to catch the criminals – provided data on more than a thousand people who had been scammed, whose losses averaged $875 each.\n\nMicrosoft has repeatedly pointed out that it would not call people about any problems with their computers. In some cases, the scammers would try to sell antivirus software from reputable companies, and in some cases would install new copies of Windows on a machine. However the licence key used on the software allowed Microsoft to trace it back to its buyer, which aided the investigation.\n\nThe fraud occurred in several English-speaking countries. Joining the FTC in the enforcement action were the Australian Communications and Media Authority, the Canadian Radio-Television and Telecommunications Commission and the UK's Serious Organised Crime Agency. David Vladeck, director of the FTC's Bureau of Consumer Protection, said it was working with law enforcement officials in India to catch the alleged perpetrators. The commission has also referred the cases to the US justice department for possible criminal prosecution.\n\nSource Link\nhttp://atheenalie.deviantart.com/art/Reviews-by-Abney-and-Associates-Code-85258081704-371377544\n\nReviews by Abney and Associates, Code 85258081704\n\nRead more:\nhttp://www.goodreads.com/topic/show/1319924-abney-associates-internet-security-news-hartford-steam-boiler-launches\n\nhttp://www.good.is/posts/wordpress-reviews-by-abney-and-associates-code-85258081704\n\nhttp://chirpstory.com/li/77901\n\nhttp://nicoleturpin2012.wordpress.com/",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://beatrizlopez970.blog.fc2.com/blog-entry-1.html",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Reviews by Abney and Associates, Code 85258081704"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-27T02:23:44Z",
            "dateModified": "2013-05-27T02:23:44Z"
        }
    },
    {
        "key": "6WCH23PM",
        "version": 9,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/6WCH23PM",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/6WCH23PM",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1324013,
                "username": "mariahabney",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mariahabney",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "6WCH23PM",
            "version": 9,
            "itemType": "journalArticle",
            "title": "Wattpad/Cyber rikollisuus, terrorismi ja iso paha susi",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "article code 85258081704-Abney Associates"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-05-23T02:33:09Z",
            "dateModified": "2013-05-23T02:33:09Z"
        }
    },
    {
        "key": "NPIFNUQR",
        "version": 9,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/NPIFNUQR",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/NPIFNUQR",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/155906/items/6WCH23PM",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "NPIFNUQR",
            "version": 9,
            "parentItem": "6WCH23PM",
            "itemType": "note",
            "note": "<p class=\"MsoNormal\"><strong>article code 85258081704-Abney Associates</strong></p>\n<p class=\"MsoNormal\"><a href=\"http://nicoleturpin2012.wordpress.com/\">Britanniassa on h&auml;vinnyt sodan internet-rikosten johtava poliisi on my&ouml;nt&auml;nyt</a>, kun k&auml;vi ilmi, ett&auml;</p>\n<p class=\"MsoNormal\">tietoverkkorikollisuutta maksaa Brittil&auml;isille yrityksille noin 205 miljoonaa puntaa menetettyin&auml; tuloina</p>\n<p class=\"MsoNormal\">viime vuonna.</p>\n<p class=\"MsoNormal\">Se on melko pelottava otsikko, ja jos totta on syyt&auml; olla huolissaan. Mutta loput artikkeli ei edes</p>\n<p class=\"MsoNormal\">mainita t&auml;st&auml; aiheutuvia kustannuksia. Sen sijaan siin&auml; puhutaan sen sijaan k&auml;ytt&auml;&auml; Interneti&auml;</p>\n<p class=\"MsoNormal\">kohdistaa niiden uhrien huijareita:</p>\n<p class=\"MsoNormal\">J&auml;sen Adrian Leppard, Lontoon Cityn poliisin p&auml;&auml;llikk&ouml; sanoi, petoksilta kasvaa \"eksponentiaalisesti\"</p>\n<p class=\"MsoNormal\">eniten hy&ouml;kk&auml;ykset per&auml;isin It&auml;-Euroopasta ja Ven&auml;j&auml;lt&auml;.</p>\n<p class=\"MsoNormal\">Arvoisa Leppard sanoi puolet petoksista Yhdistyneess&auml; kuningaskunnassa maksaa maan &pound;70bn</p>\n<p class=\"MsoNormal\">vuodessa, nyt tehd&auml;&auml;n verkossa.</p>\n<p class=\"MsoNormal\">Uhreja ovat varakkaat el&auml;kel&auml;iset, jotka ovat huijatuksi pois suuria summia rahaa vilpillisi&auml; osuus</p>\n<p class=\"MsoNormal\">j&auml;rjestelmien kustannukset &pound;3 .5bn vuodessa.</p>\n<p class=\"MsoNormal\">Keskim&auml;&auml;r&auml;isen kustannuksen uhrille on &pound;25.000 ja puolet niist&auml;, jotka menett&auml;v&auml;t j&auml;rjestelmiss&auml; on yli</p>\n<p class=\"MsoNormal\">65.</p>\n<p class=\"MsoNormal\"><a href=\"http://atheenalie.deviantart.com/art/Reviews-by-Abney-and-Associates-Code-85258081704-\">Artikla ei anna tietoja, mutta merkitsee sit&auml;, ett&auml; monet perinteiset huijauksia</a>, kuten \"kattilahuoneet\"</p>\n<p class=\"MsoNormal\">yh&auml; tehd&auml;&auml;n Internetin kautta eik&auml; puhelimitse tai postitse. Phishing, liian, luultavasti kuuluvat samaan</p>\n<p class=\"MsoNormal\">luokkaan &ndash; ihmiset menett&auml;v&auml;t rahaa pankkitililleen j&auml;lkeen on huijattu lahjoittaa niiden</p>\n<p class=\"MsoNormal\">kirjautumistiedot.</p>\n<p class=\"MsoNormal\">Eli selv&auml;sti, ongelma ja kansainv&auml;linen luonne Internet helpottaa paljon olemaan yhdess&auml; osassa</p>\n<p class=\"MsoNormal\">maailmaa ja niiden uhrien toisessa rikollisille. Minusta ei ollenkaan yll&auml;tt&auml;v&auml;&auml;, ett&auml; Ven&auml;j&auml;n ja It&auml;-</p>\n<p class=\"MsoNormal\">Euroopan aiheuttaa eniten t&auml;llaiset petokset. Mutta artikkeli on erilainen, hieman h&auml;mment&auml;v&auml; v&auml;ite:</p>\n<p class=\"MsoNormal\">Riitt&auml;&auml; \"todisteet\" ett&auml; al-Qaida ja muut terroristiryhm&auml;t k&auml;ytt&auml;v&auml;t online petokseen rahoittaa</p>\n<p class=\"MsoNormal\">toimintaansa, h&auml;n sanoi. Poliisin ja turvallisuuspalvelujen pyrkiv&auml;t h&auml;irit&auml; suuntaan rahoitusta.</p>\n<p class=\"MsoNormal\"><a href=\"http://abneynicoleturpin.blogspot.com/\">Nyt Soita tiet&auml;m&auml;t&ouml;n jos haluat, mutta en</a> tiennyt, ett&auml; al-Queda oli merkitt&auml;v&auml; l&auml;sn&auml;olo It&auml;-Euroopassa.</p>\n<p class=\"MsoNormal\">Ja totuus on, olisin yll&auml;ttynyt, jos on merkitt&auml;v&auml;&auml; p&auml;&auml;llekk&auml;isyytt&auml; ja It&auml;-Euroopan petosten jengit online</p>\n<p class=\"MsoNormal\">toiminnan al-Queda.</p>\n<p class=\"MsoNormal\">Joten anteeksi, jos olen kyyninen vain hieman, mutta ihmettelen, jos al-Queda ei oikeastaan hieman</p>\n<p class=\"MsoNormal\">enemm&auml;n kuin tiukkapipoa t&auml;ss&auml; keskustelussa. Loppujen lopuksi kuten artikkelin menee sanoa</p>\n<p class=\"MsoNormal\">Kuitenkin Arvoisa Leppard varoitti, ett&auml; 800 asiantuntija internet rikollisuuden virkamiehet kasvot</p>\n<p class=\"MsoNormal\">leikata nelj&auml;nnes alle menojen leikkauksia.</p>\n<p class=\"MsoNormal\">Onko hallitus on kuuro Arvoisa Leppard saataviin j&auml;&auml; n&auml;ht&auml;v&auml;ksi, mutta on vaikea n&auml;hd&auml; sit&auml; jotain</p>\n<p class=\"MsoNormal\">enemm&auml;n kuin pala propagandaa. Rikoksesta on kysymys, ja meid&auml;n t&auml;ytyy olla tietoisia suuntauksista</p>\n<p class=\"MsoNormal\">teknologiaan perustuva rikollisuuden ja asianmukaisin toimenpitein, pysy&auml; ajan tasalla. Mutta minusta</p>\n<p class=\"MsoNormal\">tuntuu, ett&auml; kysymys on enemm&auml;n mahdollisuuksia kuin rahoitusta, ja minulla on tunne, ett&auml; en ole</p>\n<p class=\"MsoNormal\">ainoa:</p>\n<p class=\"MsoNormal\">Keith Vaz, commons sis&auml;asioiden tutkintakomitean puheenjohtaja ehdotti j&auml;sen Leppard ett&auml; internet</p>\n<p class=\"MsoNormal\">rikollisia \"pit&auml;&auml; k&auml;ynniss&auml; renkaat noin paras poliisit maassa\", lis&auml;t&auml;&auml;n: \"Ovat voittaa t&auml;m&auml;n taistelun?\"</p>\n<p class=\"MsoNormal\">Mit&auml; enemm&auml;n huolestuttavaa, poliittisesta n&auml;k&ouml;kulmasta on, ett&auml; peliss&auml; al-Queda kortti on usein</p>\n<p class=\"MsoNormal\">alkusoittoa pyyt&auml;&auml; enemm&auml;n rahaa lis&auml;ksi lis&auml;&auml; valtaa. Kun otetaan huomioon, ett&auml; luonnos tiedot</p>\n<p class=\"MsoNormal\">Viestint&auml;lakiin on saapunut k&auml;siss&auml; parlamentin erityisvaliokunnan mauling, on t&auml;m&auml; vain yksi temppu</p>\n<p class=\"MsoNormal\">yritt&auml;&auml;kseen julkisen ja poliittisen mielipiteiden manipuloimiseen? Minulla on tunne, ett&auml; vastaus on</p>\n<p class=\"MsoNormal\">\"kyll&auml;\".</p>\n<p class=\"MsoNormal\">Muuten menee takaisin aiemmin mainittu lausuntoja, on selv&auml;&auml;, ett&auml; vanhemmat ihmiset ovat paljon</p>\n<p class=\"MsoNormal\">enemm&auml;n online petosriski&auml;. N&auml;m&auml; ovat, tietenkin, juuri niit&auml;, jotka ovat todenn&auml;k&ouml;isesti v&auml;hemm&auml;n</p>\n<p class=\"MsoNormal\">perehtyneit&auml; Internetin ja erityisesti v&auml;ltt&auml;m&auml;tt&auml; tied&auml; kuinka helppoa on fake identiteetin verkossa.</p>\n<p class=\"MsoNormal\">Joten minusta tuntuu, enemm&auml;n k&auml;ytt&auml;j&auml;n koulutus-ja parempi security management online</p>\n<p class=\"MsoNormal\">toimielinten olevan suuria lankku ratkaisua. Ja \"paremmin security management\" En tarkoita tarvitaan</p>\n<p class=\"MsoNormal\">monimutkaisempia salasana tai rimaa entisest&auml;&auml;n k&auml;ytt&auml;jille hyp&auml;t&auml; kautta mutta kehitt&auml;&auml; j&auml;rjestelmi&auml;,</p>\n<p class=\"MsoNormal\">jotka ovat suunniteltu. Suurimmat syylliset ovat pankit ja luottokorttiyhti&ouml;t, jotka ovat kehitt&auml;neet</p>\n<p class=\"MsoNormal\">ensisijaisesti tarkoitettu erist&auml;&auml; heid&auml;t petosten kustannuksia sen sijaan, ett&auml; itse asiassa v&auml;hent&auml;&auml;</p>\n<p class=\"MsoNormal\">sit&auml;. Pikemminkin viittaa siihen, ett&auml; poliisi ilmeisesti eiv&auml;t ole tietoisia n&auml;ist&auml; systeemisi&auml; puutteita</p>\n<p class=\"MsoNormal\">kuluttajien suojelemiseksi n&auml;enn&auml;isesti mekanismeilla Keith Vaz on paikalla h&auml;nen kommentteja.</p>\n<p class=\"MsoNormal\"><strong>article code 85258081704-Abney Associates</strong></p>\n<p class=\"MsoNormal\">READ MORE:</p>\n<p class=\"MsoNormal\"><a href=\"http://nicoleturpin2012.wordpress.com/\">http://nicoleturpin2012.wordpress.com/</a></p>\n<p class=\"MsoNormal\"><a href=\"http://atheenalie.deviantart.com/art/Reviews-by-Abney-and-Associates-Code-85258081704-\">http://atheenalie.deviantart.com/art/Reviews-by-Abney-and-Associates-Code-85258081704-</a></p>\n<p class=\"MsoNormal\"><span class=\"MsoHyperlink\"><a href=\"http://atheenalie.deviantart.com/art/Reviews-by-Abney-and-Associates-Code-85258081704-\">371377544</a></span></p>\n<p class=\"MsoNormal\"><a href=\"http://abneynicoleturpin.blogspot.com/\">http://abneynicoleturpin.blogspot.com/</a></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-05-23T02:33:09Z",
            "dateModified": "2013-05-23T02:33:09Z"
        }
    },
    {
        "key": "XV47QQ37",
        "version": 8,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/XV47QQ37",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/XV47QQ37",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/155906/items/VC9GG7EW",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "XV47QQ37",
            "version": 8,
            "parentItem": "VC9GG7EW",
            "itemType": "note",
            "note": "<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><strong><span style=\"font-size: 10pt; font-family: Arial, sans-serif;\">Abney And Associates Technology News Blog</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">WASHINGTON-USAs milit&aelig;re er &oslash;ke budsjettet for cyber-krigf&oslash;ring og utvide sin offensive evner, inkludert muligheten til &aring; avslutte sine kommando-systemer i tilfelle krig, eller blind fiendens radar i henhold til to defense tjenestemenn.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">I 2014 forsvarsbudsjettet lansert forrige uke, steg bevilget for cyber-operasjoner til $4.7 milliarder, opp fra $3,9 milliarder. Mye av de ekstra pengene g&aring;r inn i utviklingen av offensive evner, vanligvis referert til som nettverk for dataangrep, if&oslash;lge budsjett dokumenter.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">Tjenestemenn sier dette er evner-inkludert rettet mot milit&aelig;re datanettverk &mdash; at en sjef m&aring; kanskje i en konflikt, og ville bli brukt kun i henhold til loven om v&aelig;pnet konflikt.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">Utvidelsen er en anerkjennelse av at cyberkrig vil trolig v&aelig;re minst en del av fremtidig konflikt. De siste &aring;rene, har Pentagon brukt hundrevis av millioner av dollar p&aring; &aring; bygge cyber-evner, en innsats som har f&aring;tt haster som Kina, Russland, Nord-Korea og andre nasjoner har brukt cyberspace &aring; angripe motstandere eller stjele hemmeligheter.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">\"N&aring;r du ser p&aring; det strategiske landskapet fra v&aring;rt perspektiv, det blir verre,\" vitnet Army gen Keith Alexander, leder av Cyber Command, nylig til Kongressen.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">Amerikanske tjenestemenn sier de har en rekke sofistikerte cyber-angrep funksjoner b&oslash;r de v&aelig;re n&oslash;dvendig av sjefer i en konflikt. Ferdighetene er forgjengelig og krever konstant honing, sa defense tjenestemenn.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">\"Fra alt jeg sa, vi er s&aring; god som noen og sannsynligvis bedre,\" sier Martin Libicki, en cyber-krigf&oslash;ring analytiker ved Rand.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">Luftforsvaret, for eksempel har utviklet systemer designet for \"exfiltration av informasjon mens opererer innenfor motstander informasjonssystemer,\" If&oslash;lge budsjett dokumenter. Luftforsvaret nektet &aring; l&oslash;slate informasjon om programmet, sa det var klassifisert.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">Neste &aring;r, Air Force planer &aring; tilbringe $14 millioner for &aring; utvikle offensive cyber-evner, viser budsjett dokumenter, mens det planer om &aring; vie ca $5.8 millioner til forskning for cyber-forsvaret.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">Cyber-angrep er ofte vanskelig &aring; spore. En cyber-angrep p&aring; iranske atomanlegg i 2010 skadet sentrifuger p&aring; Natanz uran berikelse anlegget. Ingen har hevdet ansvar for angrepet, men USA og Israel er mistenkt.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">Defense tjenestemenn er forsiktig med &aring; si at de ikke er \"militarizing\" cyberspace og er bare &aring; utvikle alternativer tilgjengelig for sjefer i tilfelle krig.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">Da er reist bekymringer for personvernet, sa de er vanligvis sentrert rundt regjeringens defensiv oppgave fordi det kan inneb&aelig;re &aring; trekke ut informasjon som sendes over Internett, Libicki.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">Pentagons rolle i cyber-sikkerhet er begrensa til &aring; forsvare nasjonen, sa Pentagon. Etterretningsorganisasjoner og Homeland Security spille en rolle i cyber-sikkerhet operasjoner, inkludert tiltak for &aring; motvirke tyveri av forretningshemmeligheter.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">Alexander har sagt rutinemessig tyveri av &aring;ndsverk ikke ville vanligvis bli betraktet som en krigshandling. En stor angrep p&aring; infrastruktur, men kunne bli vurdert slik handling.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">Pentagon er n&aelig;rmer seg ferdigstillelse av et revidert sett med &laquo;rules of engagement\"som vil hjelpe feltet sjefer bestemmer hvordan og n&aring;r til &aring; bruke de nye cyber-funksjonene, Pentagon sa. Reglene vil v&aelig;re hemmelige.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">Strategien er st&oslash;ttet av utviklingen av en ny cyber-force. I 2016, Pentagon planlegger &aring; v&aelig;re i stand til mer enn 100 lag-feltet. Lagene deles inn i tre kategorier: forsvare milit&aelig;re nettverk, skade egenskapene til fiendtlige nettverk og bidra til &aring; forsvare landets infrastruktur.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">Pentagon sier det vil overholde internasjonalt aksepterte reglene for krigf&oslash;ring n&aring;r du bruker cyber-taktikk. Slike regler inkluderer et konsept at svar skal v&aelig;re proporsjonal.</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><strong><span style=\"font-size: 10pt; font-family: Arial, sans-serif;\">Abney And Associates Technology News Blog</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">&nbsp;</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><strong><span style=\"font-size: 10pt; font-family: Arial, sans-serif;\">READ MORE VIDEOS:</span></strong></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\">&nbsp;</span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\"><a href=\"http://www.videofy.me/v/1423074\">http://www.videofy.me/v/1423074</a></span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\"><a href=\"http://www.flixya.com/video/4951228/Pentagon-utvider-cyber-angrep-evner\">http://www.flixya.com/video/4951228/Pentagon-utvider-cyber-angrep-evner</a></span></p>\n<p class=\"MsoNormal\" style=\"margin-bottom: 0.0001pt;\"><span style=\"font-size: 9pt; font-family: Arial, sans-serif;\"><a href=\"http://www.4shared.com/video/rK27tn3F/abney_and_associates_technolog.html\">http://www.4shared.com/video/rK27tn3F/abney_and_associates_technolog.html</a></span></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-04-25T06:13:11Z",
            "dateModified": "2013-04-25T06:13:11Z"
        }
    },
    {
        "key": "VC9GG7EW",
        "version": 8,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/VC9GG7EW",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/VC9GG7EW",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1324013,
                "username": "mariahabney",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mariahabney",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "VC9GG7EW",
            "version": 8,
            "itemType": "journalArticle",
            "title": "Pentagon utvider cyber-angrep evner/FLIXYA",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "abney and associates technology news blog Pentagon expands cyber-attack capabilities "
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-04-25T06:13:11Z",
            "dateModified": "2013-04-25T06:13:11Z"
        }
    },
    {
        "key": "HHFUJDZE",
        "version": 7,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/HHFUJDZE",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/HHFUJDZE",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1301322,
                "username": "ghanem2013",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ghanem2013",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "HHFUJDZE",
            "version": 7,
            "itemType": "journalArticle",
            "title": "An Abney Associates Hong Kong Security warning -Manieren om veilig online,goodreads",
            "creators": [],
            "abstractNote": "An Abney Associates Hong Kong Security warning\nKATHMANDU: Persoonlijke veiligheid of het veilige beheer van persoonlijke records, financiën en andere afzonderlijke effecten hebben is steeds meer overgebracht naar geautomatiseerde gegevensbestanden  die zijn ondergebracht op het world wide web. Alle informatie binnen het bereik van een soort van online server rijst de vraag of de veiligheid van digitale opslag. Bestanden opslaan op de veelgeprezen . \n'Almachtige cloud' is slechts sympathiek draai voor 'uw gegevens is op iemand anders server.' Watprecies is veilig over uw gegevens worden op iemand anders computersysteem toch? Hoe kan een individu beter controle over hun online gegevens in deze omgeving?\nTen eerste, beveiligen van gegevens is het plaatsen van strakke controle over het vrijgeven van het in de eerste plaats. Ervoor zorgen dat de informatie wordt niet gegeven aan phishing of andere  correspondentie die terloops vragen om te onthullen wachtwoord, kritieke gegevens, accounts en sofi-nummer. Wellicht moet nadenken over de voors en tegens van een gedetailleerde-profiel van jezelf op sociale sites. Een uitgebreide individuele profiel kan worden gebruikt om te helpen bijhouden en spion op uw activiteiten van partijen die pretenderen te zijn uw vriend door te contacteren via die dezelfde   sociale gemeenschappen.\nTen tweede, neemt u de duik met Facebook of Twitter, wees voorzichtig met wat je op dergelijke sites post. Vele beroemdheden hebben de lastige verlegenheid om te ontdekken dat wat zij dachten waren schattig maar 'persoonlijke' berichten naar vrienden en volgelingen werden behandeld als een de facto openbare mededeling al meegemaakt.\n\nRelated story:\nhttp://abneyassociates1.tumblr.com/post/48092044341/an-abney-associates-hong-kong-security-warning\n\nSource:\nhttp://www.thehimalayantimes.com/fullNews.php?headline=Ways+of+being+secure+online&NewsID=372799",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.goodreads.com/topic/show/1291866-an-abney-associates-hong-kong-security-warning-tumblr",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "Manieren om veilig online, an abney associates hong kong security warning"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-04-16T08:01:44Z",
            "dateModified": "2013-04-16T08:01:44Z"
        }
    },
    {
        "key": "73FGA5WT",
        "version": 6,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/73FGA5WT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/73FGA5WT",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1301322,
                "username": "ghanem2013",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ghanem2013",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "73FGA5WT",
            "version": 6,
            "itemType": "journalArticle",
            "title": "Vårt syn: Stivne cyber forsvar",
            "creators": [],
            "abstractNote": "Når Internett-tyver oppdaget hvor enkelt det er å stjele en persons kredittkortnummer og annen verdifull informasjon, var det uunngåelig ville de søker større og mer potensielt lukrativ ofre. Den amerikanske regjeringen, for eksempel.\n\nEt teknologiselskap for sikkerhet ansatt av The Washington Post nylig rapportert at 115 amerikanske myndigheter og private selskaper hadde blitt hacket av kinesisk cyber spioner som opererer fra en Shanghai kontorbygg People's Liberation Army cyber-kommandoen boenhet.\n\nHackere har trengt vår nasjons mest kraftfulle institusjoner, inkludert føderale byråer, militære kontraktører, congressional kontorer, nyhetsorganisasjoner og advokatfirmaer. De har infiltrated systemer som styrer våre power grid og vann systemer.\n\nDet reiser spørsmål om potensialet for fremtidige høyteknologiske terroranslag. Men tyvene har onde hensikter, eller var de stjele forretningshemmeligheter av ledende amerikansk innovatører i vitenskap, romfart og energi? Ingen synes å vite.\n\nVi vet at hackere i mange land, inkludert vår egen, har vært snusing og stjele i år. Men kinesiske angrepet har vært utsatt som de nyeste og mest aggressive noensinne oppdaget.\n\nObama-administrasjonen har bestilt forbedringer i USA cybersecurity, og Pentagons egen Cyber Command unit tar aggressiv mottiltak. Vi kan ikke flytte raskt nok til å styrke våre cyber beskyttelse og forsvar.\n\nKanskje er Kina bare engasjert i gammeldags industriell spionasje å få en økonomisk overtaket. Men forestill deg hva grusomheter et land med skumlere hensikter kan begå?",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.theolympian.com/2013/04/10/2498809/harden-cyber-defenses.html",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "abney and associates cyber reviews, Our View: Harden cyber defenses"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-04-11T06:09:01Z",
            "dateModified": "2013-04-11T06:09:01Z"
        }
    },
    {
        "key": "ETGTT4PW",
        "version": 5,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/ETGTT4PW",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/ETGTT4PW",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1343957,
                "username": "rodelholst",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/rodelholst",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "ETGTT4PW",
            "version": 5,
            "itemType": "newspaperArticle",
            "title": "Abney Associates Cyber Technology News: Malcovery Security and Radiance Technologies Partner",
            "creators": [],
            "abstractNote": "Malcovery ®, ledaren i leverera angripbara intelligens som kan användas för att neutralisera hot och åtgärder cyberkriminella inom områdena nätfiske, skräppost och sabotageprogram, tillkännagav idag man har ingått ett strategiskt partnerskap med Radiance Technologies, Inc. att ge network security intelligence services som en del av Radiance Technologies kontrakt för Agile Cyber teknik (ACT) genom Air Force Research Lab (AFRL). Radiance är en av sex entreprenörer utvalda i juli 2012 för att ge security services som en del av en utmärkelse som värderas på upp till 300 miljoner dollar.\nLAGEN programmet fokuserar på utveckling av cyber kapacitet tekniklösningar som behandlar specifika användarkrav. leverans av prototyp teknik för utvärdering och feedback i samband med användarens operativa miljön. och en mekanism för användaren förvärv av begränsad produktkvantiteter som krävs för fungerande införande av teknik. De tekniska kraven kommer att inkludera snabba forskning och utveckling, design, prototyping, demonstration, utvecklingsscenario, experiment och utvärdering, integration, testning, teknisk installation, övergång, och stödja genom inledande drift av IT-teknik.\nCyber security forskningsområden är Hot undvikande och cyber försvar; Cyber verksamhet. nätverket utnyttjande. medvetenheten om läget; kommando och kontroll. modellering, simulering och war-gaming; IT-infrastruktur och mission assurance.\n\nContinue Reading:\nhttp://www.prweb.com/releases/2013/4/prweb10573344.htm\n\nRelated Articles:\nhttp://www.good.is/posts/abney-associates-online-security-internett-har-banet-vei-for-nye-rasen-av-organiserte-kriminelle\nhttp://www.nattstad.se/mardie.lavender?id=6729459",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "edition": "",
            "section": "",
            "pages": "",
            "ISSN": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.prweb.com/releases/2013/4/prweb10573344.htm",
            "accessDate": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "abney associates cyber technology news"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-04-04T06:34:12Z",
            "dateModified": "2013-04-04T06:34:12Z"
        }
    },
    {
        "key": "6TE9NDF4",
        "version": 4,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/6TE9NDF4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/6TE9NDF4",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1299494,
                "username": "beatrizlopez",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/beatrizlopez",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "6TE9NDF4",
            "version": 4,
            "itemType": "journalArticle",
            "title": "UPDATE: CGI vaststelt Ottawa cyber security centre",
            "creators": [],
            "abstractNote": "CGI groep is opening van een nieuwe security Center in Ottawa die zij Canadese inkomsten zal stimuleren hoopt door een betere beroep op bedrijven geconfronteerd met toenemende cyber bedreigingen van de veiligheid.\n\nHet Montreal-gebaseerde informatie technologie diensten bedrijf zei dat het Centre of Excellence zal worden uitgerust om te bieden de klok rond expertise aan publieke en privécliënten van meer dan 200 security professionals. Het centrum maakt ook een gemeenschappelijke ruimte ter ondersteuning van beveiligingsmaatregelen in Canada en in het buitenland.\nCGI (TSX:GIB.A) vice-voorzitter Lorne Gorber zei dat de wijziging maakt deel uit van de inspanningen van het bedrijf tot doel nieuwe productie van financiële diensten en andere sectoren in de komende jaren te versnellen platte inkomsten in Canada.\n\"Als alles goed is gegaan, het zou zeker duwen het Canadese bedrijf en ongetwijfeld de Ottawa businessunit goed in groei met dubbele cijfers grondgebied,\" zei hij in een interview.\n\nHij zei dat CGI verdient tientallen miljoenen dollars aan inkomsten per jaar in Canada en honderden miljoenen wereldwijd vanuit haar activiteiten die veiligheid van de cyberruimte doel.\nCGI zei het centrum veiligheidsoperaties - een van drie dergelijke erkende security evaluatie test centra in Canada - Canada's grootste bedrijven beschermen en ongeveer 45 miljoen potentiële cyber evenementen elke week behandelen.\nVorig jaar, de kosten van cyberaanvallen in Canada groeide tot 1,4 miljard dollar, ondermijnen bedrijfswinsten en reputaties, aldus het bedrijf in een release.\nGorber zei dat het centrum van Ottawa kan na verloop van tijd een paar medewerkers toevoegen aangezien het verbetert de Canadese aanbieden aan nieuwe klanten zoeken en bestaande klanten te gebruiken meer van haar veiligheidsdiensten, die variëren van product testen om hun eigen systemen meer veilige en bestrijding van bedrijfsspionage overtuigen.\n\"Dit is echt een uniforme wereldwijde aanbod dat nu kan we terug te gaan en klop op de deuren van al onze klanten maken,\" zei hij, toe te voegen dat CGI zal gaan na grensoverschrijdende kansen.\n\nOnder de klanten is de Canadese betalingen Association, die ervoor zorgt dat meer dan 170 miljard dollar van transacties veilig worden uitgeschakeld via hun systemen dagelijks.\nOndertussen, CGI zei dinsdag dat het Wereld Anti-Doping Agentschap zich aangemeld met haar dochteronderneming Logica in Europa om een nieuwe telefoon app waarmee atleten over de hele wereld aan het Bureau van hun verblijfplaats om out-of-competition test gemakkelijk kennis te geven.\nDe nieuwe app is beschikbaar op de iPhone en Android smartphones in het derde kwartaal.\nDe app werd oorspronkelijk vorig jaar door de Nederlandse autoriteit Doping gelanceerd voor zijn eigen atleten. Terwijl het brengt de aandacht aan Logica van operaties, zei de service geen aanzienlijke inkomsten gegenereerd Gorber. Terwijl CGI met bedrijven werken zal om particuliere apps, heeft het geen plannen om een bredere markt van de consument.\n\"U niet zal zien ons ontwikkelen van een catalogus van apps die we uit daar verkopen voor 99 centen,\" zei hij.",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "http://www.obj.ca/Technology/2013-04-02/article-3212033/UPDATE:-CGI-establishes-Ottawa-cyber-security-centre/1",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "abney and associates cyber security update, UPDATE: CGI establishes Ottawa cyber security centre"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-04-04T05:54:03Z",
            "dateModified": "2013-04-04T05:54:03Z"
        }
    },
    {
        "key": "WMW63QFV",
        "version": 3,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/WMW63QFV",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/WMW63QFV",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/155906/items/QR6EJJXT",
                "type": "application/json"
            }
        },
        "meta": {
            "numChildren": 0
        },
        "data": {
            "key": "WMW63QFV",
            "version": 3,
            "parentItem": "QR6EJJXT",
            "itemType": "note",
            "note": "<p><a href=\"http://newyork.cbslocal.com/2013/04/01/seen-at-11-cyber-war-in-europe-is-causing-internet-disruptions-everywhere/\">http://newyork.cbslocal.com/2013/04/01/seen-at-11-cyber-war-in-europe-is-causing-internet-disruptions-everywhere/</a></p>\n<p class=\"MsoNormal\"><strong>Abney and Associates Cyber War News</strong></p>\n<p class=\"MsoNormal\">NEW YORK (CBSNewYork) &mdash; Etwas los Tausende von Meilen entfernt k&ouml;nnte noch beeinflussen Ihre Internet &mdash; von langsameren Verbindungen zu Service-Unterbrechungen.Wie CBS 2 Maurice DuBois Montag berichtet, ist es das Ergebnis eines Cyber-Kriegs, mit Millionen von normalen Internet-Nutzer wie Sie immer in der Mitte gefangen. Es dauert in der Regel nur wenige Sekunden f&uuml;r Shannon Lee auf Netflix zugreifen. Aber vor kurzem sagte sie Minute nach Minute verging und ihrem Laptop Bildschirm eingefroren und leer blieb.\"Er nimmt meine Zeit\" Lee sagte, \"und es ist wirklich, wirklich frustrierend.\"</p>\n<p class=\"MsoNormal\">Es w&uuml;rde unter keinen Umst&auml;nden frustrierend sein, aber in letzter Zeit wurde es schlimmer, weil in diesem Fall alles aus einen Streit Tausende von Meilen entfernt in einem Cyber-Krieg stammt. \"Durchschnittliche Internet-Nutzer wollen einfach nur ihre e-Mails anzuzeigen oder zu einem Spiel; Sie im Kreuzfeuer gefangen sind,\"sagte CNET Editor Declan McCullagh. Sie wird durch ein Kreuzfeuer von zwei konkurrierenden Unternehmen in Europa verursacht wird, und das Endergebnis wurde weit verbreitete Staus und einer Verlangsamung aller Service &uuml;berall. \"Sie finden Systeme verlangsamen; nicht auf bestimmte Sites erhalten kann, wenn Sie wollen,\"sagte McCullagh. \"Es ist besonders schlimm f&uuml;r Echtzeit-streaming-Websites.\"</p>\n<p class=\"MsoNormal\">Einige machen sich sorgen die beispiellose Angriff k&ouml;nnten e-Mail und Banksysteme weiter auswirken. Sicherheitsexperten sagte, dass es eine n&uuml;chterne Erinnerung ist, dass das Internet nicht entworfen wurde, um den Schaden und Fallout von einem Cyber-Krieg zu widerstehen. \"Die langfristige L&ouml;sung ist das System von Grund auf zu fixieren, damit es nicht wieder passiert,\" sagte McCullagh. \"Aber das geht nicht, diese Woche geschehen. L&auml;ngerfristige Kontrollverlust wird zwei bis drei Jahre dauern.\" F&uuml;nf internationale Cyber-Polizei soll die Angriffe untersucht werden. Leider Experten sagten, es gibt nicht viel Internet Benutzer zu beschleunigen Dienst tun k&ouml;nnen, bis diese Cyber-Krieg behoben worden ist.</p>\n<p class=\"MsoNormal\"><strong>Abney and Associates Cyber War New</strong></p>\n<p class=\"MsoNormal\">READ MORE:</p>\n<p class=\"MsoNormal\"><a href=\"http://social.technet.microsoft.com/Forums/en-US/olmdiscussion/thread/3ff51444-251e-48c3-ad19-0b6872f1e3ba\">http://social.technet.microsoft.com/Forums/en-US/olmdiscussion/thread/3ff51444-251e-48c3-ad19-0b6872f1e3ba</a></p>\n<p class=\"MsoNormal\"><a href=\"http://abneyandassociates.tumblr.com/\">http://abneyandassociates.tumblr.com/</a></p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2013-04-03T08:20:45Z",
            "dateModified": "2013-04-03T08:20:45Z"
        }
    },
    {
        "key": "QR6EJJXT",
        "version": 3,
        "library": {
            "type": "group",
            "id": 155906,
            "name": "Abney and Associates Internet and Technology",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/155906/items/QR6EJJXT",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/abney_and_associates_internet_and_technology/items/QR6EJJXT",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 1324013,
                "username": "mariahabney",
                "name": "",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/mariahabney",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 1
        },
        "data": {
            "key": "QR6EJJXT",
            "version": 3,
            "itemType": "journalArticle",
            "title": "Abney Und Associates Cyber-Krieg News Gesehen Bei 11: Cyber-Krieg In Europa Verursacht Internet Unterbrechungen \n\nÜberall",
            "creators": [],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "",
            "accessDate": "",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [
                {
                    "tag": "News Gesehen Bei 11: Cyber-Krieg In Europa Verursacht Internet Unterbrechungen   Überall abney and associates cyber war news"
                }
            ],
            "collections": [],
            "relations": {},
            "dateAdded": "2013-04-03T08:20:45Z",
            "dateModified": "2013-04-03T08:20:45Z"
        }
    }
]