Secretary of State Kris Kobach stands by his comments to a caller on his weekly radio show Sunday that although he thought it unlikely, it would not be “a huge jump” for the Obama administration to call for an end to the prosecution of African-American suspects.
A caller to the Kris Kobach Show on KCMO Talk Radio asked if Kobach thought that, based on President Obama’s instruction against the enforcement of some immigration laws, it would be possible that one day the president would announce that “any black person accused of a crime, charged with a crime, is not going to be prosecuted, regardless of the crime.”
The question prompted Kobach to refer to a controversy surrounding the Justice Department’s decision to drop charges against members of the New Black Panther Party accused of intimidating voters in Philadelphia in 2008.
Archaeologists and cultural officials have expressed heartbreak and outrage about the bulldozing of the ancient Assyrian city of Nimrud in Iraq.
Islamic State militants began demolishing the site on Thursday, Iraqi officials said.
The UN cultural body’s Iraq director, Alex Plathe, called it “another appalling attack on Iraq’s heritage”.
“They are erasing our history,” Iraqi archaeologist Dr Lamia al-Gailani told the BBC.
IS says ancient shrines and statues are “false idols” that have to be smashed.
A woman was arrested at Miami International Airport on Thursday afternoon after she attempted to drive her vehicle through the airport entrance, crashed her car into a Miami-Dade Police patrol car, screamed at officers in what is believed to be Arabic and then, in English, claimed she had a bomb on her person, according to Miami-Dade police.
“At this time there appears to be no nexus to terrorism,” Michael Leverock, special agent, FBI Miami, said in a statement.The woman, whom the FBI has identified as Julissa Magdalena Maradiaga-Iscoa, 33, a Honduran citizen, is facing federal charges. Miami Dade police turned over the case to the FBI; she is expected to appear in federal court in Miami on Friday.
At about 4 p.m. Thursday, authorities shut down the upper level departure area around Concourse D as they investigated, calling it a “security incident.”
Larry Weas spent a cold night hunkered down in his car after getting caught in a logjam along a Interstate 65 in Kentucky. To conserve fuel during his 11-hour ordeal, he kept his car turned off for long stretches and scooped snow into a bucket to have something to drink. A stranded couple gave him a bottle of Gatorade and candy until a rescue worker took him to town.
“This has been a lesson of survival,” said the 54-year-old Elizabethtown man, who is diabetic.
Thousands of stranded motorists endured agonizingly long waits Thursday lasting nearly 24 hours for some as a winter storm walloped Kentucky with up to 2 feet of snow and frustrated travelers dealt with gas tanks and stomachs close to empty.
In an unusual public raid in India, thousands stormed a jail and dragged out a rape suspect before beating him to death on the streets, authorities said Friday.
The 35-year-old suspect, who was described as an illegal immigrant from Bangladesh, died from severe injuries before officers could rescue him, said L.L. Doungal, a police official in the remote Nagaland state, where the attack occurred Thursday evening.
“There were thousands of them. Many of them were students in uniform,” Doungal said, referring to the mobs involved in the incident.
The suspect was accused of raping a local woman last month.
The European Central Bank will begin its big new stimulus program on Monday, the bank’s president, Mario Draghi, said. He predicted improvements in the economy and in the eurozone’s inflation picture as a result of the effort.
The starting date, announced on Thursday, was one of many details the financial markets had been awaiting since the central bank announced in January that it would embark on a program of large-scale asset purchases intended to fix the collapse in consumer prices.
At a news conference in Cyprus, which is still recovering from a severe banking crisis two years ago, Mr. Draghi appeared unruffled by recent political turmoil in the eurozone, provoked by a change in government in Greece. Instead, he offered one of his most optimistic assessments in months of the eurozone economy — and gave the central bank much of the credit.
At least five people were injured Friday when a motorist rammed his car into a group of pedestrians near an east Jerusalem light rail stop, police said.
Israeli police say the driver got out of the vehicle wielding a knife and attempted to stab passersby before he was shot by police. Israeli Police spokeswoman Luba Samri described Friday’s assault as a “terror attack” and says four of those injured in the attack were police
While searching for some electronic parts in a closet, I came across my first computer. After the recent discussions of first computers, programming experiences, etc. I thought some folks might enjoy seeing this.
This computer was actually built before IBM introduced the PC. Prior to the introduction of the PC, mainframe computers were the norm and there was a small market for hobbyist computers. Learning to program required access to machines, a difficult thing at the time. So it seemed logical to build my own machine. Of course, at the time that meant actually designing the computer from scratch, not just plugging boards together. I did the schematic on a roll of kindergarten paper (about 2 foot high paper); the schematic is about 15 feet long.
Every connection on every chip was hand-wired (wire-wrapped) or soldered. I built the machine into a briefcase for portability (it was a laptop!). Several interesting design notes:
Programming was in machine code, entered by hand. First the high address, then the low address, then the data, deposit the entry, then on to the next address in memory, etc. Input was in hex for convenience, output and bus data displayed in binary (it was after all, intended as a learning tool).
CPU is an Intel 8085
2K of RAM
4K of EPROM
keypad was from a calculator
For troubleshooting, you could single step through the instructions. I included circuitry to show the operation being performed (op code fetch, memory read, i/o write, etc.) as well as the bus and output data displayed in binary.
Kids today are so spoiled. Why, in my day, we had to ….
But as the corporate money flows in, with it can come expectations from some musicians that the dollars will trickle down. On Wednesday, the band Ex Cops, from Brooklyn, took to Facebook to single out McDonald’s for its Austin offer: The group could play the company’s sponsored stage but would be compensated only with free food.
Brian Harding, one half of the duo, wrote: “In lieu of being paid like a real artist, or anyone who is employed to do a service, McDonald’s assures us that we will ‘be featured on screens throughout the event,’ as well as POSSIBLY mentioned on McDonald’s social media accounts like Facebook (57MM likes!).”
In December, the fast food behemoth vowed to “improve the SXSW experience for everyone” with its corporate patronage, in the form of the McDonald’s Lounge, offering coffee and Wi-Fi, and the “Fry-Fi” food truck, with fries and even more Internet access.
The rest of the story: there are also legacy apps running elder versions of embedded Apache vulnerable to the same short key exploit, but that’s been known for years. So why did it take so long to find this?
Computers running all supported versions of Microsoft Windows are vulnerable to “FREAK,” a bug disclosed Monday that for more than a decade has made it possible for attackers to decrypt HTTPS-protected traffic passing between vulnerable end-users and millions of websites.
Microsoft confirmed the vulnerability in an advisory published Thursday. A vulnerability-scanning service at freakattack.com, a site that offers information about the bug, confirmed the advisory, showing that the latest version of IE 11 running on a fully patched Windows 7 machine was susceptible. Previously, it was believed that the Windows system was immune to the attacks.
FREAK attacks—short for Factoring attack on RSA-EXPORT Keys—are possible when an end-user with a vulnerable device connects to a vulnerable HTTPS-protected website. Vulnerable sites are those configured to use a weak cipher that many presumed had been retired long ago. In analyses immediately following Monday’s disclosure of FREAK, it was believed Android devices, iPhones and Macs from Apple, and smartphones from Blackberry were susceptible. The addition of Windows dramatically increases the number of users known to be vulnerable.