![]() ![]() ![]() Harold Wanyama (UGA) and Hicham Hamdouchi (MAR) finished 2 full points behind the winner and 1½ behind the runner-up, but it was the player from Uganda the one to get away with the medal, thanks to a better tie-break. Adly would go on to win the remaining four games, getting the Gold, while Amin would concede one more draw -against the local star GM Hicham Hamdouchi- having to content himself with the Silver medal. Their paths crossed in the 5th round, when they were already the only two players with a perfect score, and they settled for a draw in an uneventful game. Having already won the Gold in the Teams Championship -played during the first two days of competition- the Egyptians went on to take the top spots also in the individual rapid and blitz events, both in the open and women's categories.Īfrican Games - Individual Rapid ChampionshipĪhmed Adly and Bassem Amin swept the competition in the rapid championship, topping the standings without one single loss. Terrorism and cyber security have their own categories where we find words like chemical weapon, Hamas, Hezbollah, eco terrorism, botnet, DDOS, malware, phishing, hacker and, of course, China.Egypt clean sweep of gold medals at the African GamesĮgypt was the absolute ruler at the African Games Chess Championships, taking home all the Gold medals in dominating fashion. When it comes to the keywords they’re looking for, we find United Nations, Red Cross, assassination, shots fired, organized crime, bomb, hazmat, nuclear, radiation, and even viruses and diseases such as Ebola, H5N1 (bird flu), salmonella, plague and tuberculosis. News websites that cover security issues are also on their list, security researcher Brian Krebs’ personal blog being among them. Map sites, photo sites and those that relate to social media, such as Twitter, Facebook and MySpace, are also under their radar. The NOC will use this information to fulfill the statutory mandate set forth above to include the sharing of information with foreign governments and the private sector as otherwise authorized by law,” the document reads.Īn appendix attached to the document lists the exact tools the DHS utilizes, the websites it monitors and whether or not they require a password for access.įor General Search they rely on websites such as Collecta, Who’s Talking and Shrook RSS reader, and when it comes to video sites, Time Tube, YouTube, Vimeo and MySpace Video are just a few of the targeted ones. “The NOC will identify and monitor only information needed to provide situational awareness and establish a common operating picture. While they claim that the initiative is not designed to collect private information there are exceptions in the case of a “life and death” situation, the policies for these practices being very strict. The “Publicly Available Social Media Monitoring and Situation Awareness Initiative” shows that the NOC is assisting the DHS in providing situational awareness and establishing a common operating picture for the federal government. A recent report published by the Department of Homeland Security (DHS) on the organization’s official website reveals that the National Operations Center (NOC) actively monitors certain websites looking for things that may concern national security, hacking operations and nuclear threats. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |