Add Zone For You

SITE123 - Website Builder

freemexy's blog

The idea of someone hacking your laptop camera, spying on you and then blackmailing you into releasing the footage publicly might sound like a cliche Hollywood plot, but it’s not as impossible as you may think. “Camfecting” is one of the most common hacks. If you suspect that your camera might be hacked, keep reading.

How to tell if your webcam is hacked
All webcam hackers need to do to hijack your webcam is to slip remote-control malware into your laptop (this also gives them access to your personal files, messages, and browsing history). However, it’s easy to spot the warning signs and put a stop to it. Read on to find out how.

Step 1: Check the indicator light
If your webcam indicator light is on or it’s acting abnormally (you see a blinking LED) even though you haven’t turned the webcam on, it’s a sign that something might not be right. But don’t freak out just yet – it may only be another program or browser extension running in the background and using your webcam. Let’s double-check it.

Step 2: Check browser extensions
Reboot your computer and launch your browser. If the webcam light turns on the moment you open the browser, the problem is likely to be in a browser extension. But which one exactly? Deactivate your extensions one at a time to identify the culprit.

Step 3: Check apps
Another potential reason why your light is flashing might be applications. To test them, do this: launch an application and see if the webcam indicator lights up, if yes – bingo, if not – continue to open apps one by one until you spot the one secretly using it.

Since you may have a lot of them on your computer, the process might be time-consuming. Try using the Process Explorer tool for Windows. On macOS, go to Terminal and enter specific commands. You can find a tutorial here.

If your webcam light turns on a few seconds after you reboot your computer, without launching any applications – you might’ve been hacked. If this is what’s happening, move on to the next step.

Step 4: See if your webcam process is running
Go to the Task Manager and look for all currently running programmes under the Processes tab. Check for webcam utility. Again, don’t panic yet if you do find it. It may simply be a default setting to launch once you reboot your device. You can test it by restarting your computer and checking if the webcam utility has started automatically.

Step 5: Try running the webcam
Close all the programs and apps and try turning the webcam on. If you get an error message stating that your camera is already in use, it might be that your laptop’s camera has been hacked… or there’s an app running in the background (you can check this by following the instructions in Step 1).

Step 6: Look for audio and video recordings
If a hacker has been secretly snooping on you, you might be able to find audio and/or video recordings you don’t remember. Go to the folder where your webcam stores such files. Also double check your webcam’s settings and whether that folder hasn’t been changed without your knowledge. However, don’t trust only this method as some hackers might simply live stream everything they can see through your webcam to their device.

Step 7: Run a malware scan
If it turns out that an unfamiliar piece of software is secretly using your camera, scan your computer system for malware immediately. If it finds anything, move the file to quarantine. If it doesn’t solve the problem and you still have suspicion that your camera is hacked, it’s time to speak to a tech professional.

How to avoid computer camera spying
Prevent webcam hacking

All you need to do is some homework:

#1: Enable firewall
A firewall protects your system by monitoring the network traffic and blocking suspicious connections. Make sure your computer’s inbuilt firewall is up and running.

To access firewall settings on Windows, go to Control Panel > System and Security > Windows Defender Firewall > Turn Windows Firewall On or Off.

On macOS, head to System Preferences > Security & Privacy > Firewall.

#2: Use a reliable antivirus
Choose one with advanced protection against malware, spyware, and viruses. An antivirus program will take care of detecting and busting malicious threats before they do any harm.

#3: Don’t fall into a phishing trap
Hackers may disguise themselves as support agents and contact you saying there’s an issue with your system/computer/program and they have to take care of it. Don’t believe them. It’s a common phishing technique cybercriminals use to slip remote-access software into your device. Such software then allows them to access your camera and manage its permissions.

Another way to lure victims into downloading RAT software is through phishing emails that hide spoofed URLs and malicious files. Treat emails from unknown senders with caution and don’t click on suspicious links or download fishy attachments.

#4: Stay secure on public Wi-Fi
Secure your Wi-Fi connection with a VPN

Public Wi-Fi networks are extremely vulnerable to hacking. Cybercriminals often target people at free hotspots and try to slip malware into their devices. Always use a VPN to secure your Wi-Fi connection and protect yourself from unwanted snoopers.

Most of the VPNs has military-grade encryption and advanced security features. It not only makes your Internet traffic private but also shields you from cyber threats, including malware.

#5: Cover your webcam
Tape it. Yes, that’s right. Even Mark Zuckerberg does it. It’s the easiest and 100% reliable way to prevent someone from watching you through your computer camera. If you feel like the tape is not classy enough, many retailers are now offering covers that attach to a webcam and slide to open or close.
VPN download
Can this simple smartphone hack empty your bank account?
You did everything right. Your accounts had strong passwords, you never clicked on random links, and you had two-factor authentication set up. But you still wake up one morning to find that you’re locked out of your email and your bank account is empty.

This has happened to people who’ve fallen victim to a SIM swapping (or SIM jacking) attack. Criminals use this attack to take over someone’s phone number by transferring it to their own SIM card.

SIM swapping was especially widespread in 2017 and 2018. However, new attacks were reported in recent weeks and the victims lost large sums of money.

How do SIM swap attacks work?
Unfortunately, this attack that costs its victims thousands of dollars is relatively easy to carry out. The attacker calls your mobile provider and asks them to transfer your SIM card to a device that they control. This usually happens late at night so the victim doesn’t realize they’ve lost their mobile service or brushes it off as a minor tech issue and goes to sleep.

While you are asleep, however, the attacker uses your phone number to reset your email password. They receive a 2FA verification code and gain access to all of the accounts associated with the primary email.


Why is it so easy to transfer a phone number?
It seems that neither T-Mobile nor AT&T (both of whose customers were repeatedly targeted in SIM swapping attacks) have any serious security measures in place. AT&T’s guidelines do state that you can create a password for your account. However, employees will not always ask for it.

T-Mobile suffered a data breach in August 2018. Hackers stole over 2 million people’s information. The data did not include anything particularly valuable, like financial information. Instead, it served a different purpose.

It contained T-Mobile’s clients’ billing information, which is enough to perform a SIM swap: account number, name of the holder, and their address. Even if you have a pin or password set up, the attacker can get away by just claiming that they forgot it.

This attack is not new or particularly complicated, but mobile providers don’t do anything to stop it. It’s up to users to protect their accounts.

What should you do if you become a victim of a SIM swapping attack?
Call your provider and explain the situation. Ask for your phone number to be transferred back to your SIM. If that’s not possible, request that they temporarily block it until you can visit a physical location to verify your identity.
Record and save everything. Any information you find on your accounts could be useful later when you contact the authorities.
When you have your phone number back, access your email and change the password. Make sure to check for the attacker’s back-up emails and phone numbers and delete them if you find any. Review your email provider’s security settings and see if these types of attacks can be prevented in the future.
Check your bank account for any suspicious transactions. If something looks odd, notify the bank.
Prioritize your accounts and secure them. Change the password, enable 2FA, and check whether the attacker changed any of the information on the account.
Take special care with your financial accounts like PayPal or Coinbase. If you are not 100% sure they are safe, block your credit cards or transfer your money to a secure bank account. If you no longer use the service – delete it.
Add additional security steps to your mobile account. Don’t wait for the next day, or you might lose your phone number again. Demand that changes to your account would only be made after visiting a physical store and providing identification.
Contact law enforcement. Make sure you include your phone number, mobile provider, all the relevant dates and times, any screenshots from your accounts with additional information, and a detailed report of the steps you took.
How to protect yourself from SIM swapping

We want to trust our mobile providers, but even after these incidents were widely reported, neither AT&T nor T-Mobile implemented any new security measures. However, there are some things you can do to protect both your SIM card and online accounts.

Ask your mobile provider for additional security measures.
Consider disconnecting your sensitive accounts from your phone number or SIM card.
Minimize the number of accounts your email is connected to and delete anything you are no longer using.
Never sign up for a service using your Google, Facebook, or Twitter accounts.
Be smart about your passwords. Choose a complicated and unique password for every website, app, or service. And never save them on your browser or Google account – use a password manager instead.
Implement two-factor authentication where possible but opt for a method other than text message or phone call.
Don’t store any sensitive information on your Google Drive. Use an offline hard drive or choose a less vulnerable cloud service provider.
Make sure you minimize your digital footprint. Don’t use geotags, don’t disclose your private information online, avoid public Wi-Fi, and use a VPN when browsing.
VPN download
Our phones contain the major part of our lives. Also, it is a tool we carry daily in our pockets, so it is always exposed to data snatchers or thieves. Thus, the safety measures should be adequate.

Hackers are always sharpening their tools. Here’s how to identify and protect yourself from a phone hack.

How your phone can be hacked
There are various ways to hack your phone. Some don’t even require advanced tech knowledge:

Sim Swap attack. By using this attack, hackers can transfer your phone number to their own SIM card and take over your accounts;
Spyware that collects your data. Some spy apps are pretty easy to get hold of and can be used by a person without advanced IT knowledge. This lets them remotely monitor your phone activities. A person can install such an app by getting a direct access to your device;
You might get malicious software via public Wi-Fi networks or charging stations. Hackers can set up fake Wi-Fi networks to redirect you to phishing websites or steal data via USB cable in a charging station;
Phishing text, Facebook or email messages with malicious links that install malware and snatch your data;
You might also download malware from suspicious sites while downloading apps or by clicking on unreliable pop-ups or links.
How to know if your phone is hacked
Have you ever wondered “Is my phone hacked?” Here are some signs:

You notice something you don’t recognize on your phone (e.g., apps, messages you didn’t send, purchases you didn’t make, suspicious phone calls);
Your phone works slow. It uses way more resources and battery power and becomes hotter than usual. Some hacker-initiated operations might reduce its power significantly;
Your data usage increases dramatically without any changes on your part. Malicious processes might be consuming your mobile data in the background as they track what you do;
Your phone behaves strangely. The apps do not run the way they should, it switches on and off unexpectedly, or applications crash or fail to load;
Pop-ups appear. If you notice lots of pop-ups appearing on your screen, you probably have spyware or malware.
How to find out who hacked your phone
Unless the attack was specifically targeted at you, finding the culprit can be quite difficult. Try checking all the apps you don’t recognize and any suspicious phone numbers or social media accounts that have interacted with you. A quick search might find some associations, but tracking hackers usually requires a cybersecurity expert. It’s usually worth it to report such cases to your local or national law enforcement for further investigation.

What to do if your phone has been hacked
If your phone has been hacked, do the following:

Change your passwords immediately. You can find out our tips for stronger passwords here;
Remove all the suspicious software immediately;
Inform your friends to ignore suspicious messages coming from you;
Stop broadcasting your personal hotspot when in public as this makes it easier for hackers to breach your device;
Install mobile security software immediately. It scans for malware and might protect sensitive apps from infection;
Restore your phone to its factory settings. That might help if tons of pop-ups or malicious apps made your phone impossible to use. This one is a nuclear option, so use it only as a last resort.
How to prevent your phone from being hacked
Do not transmit your personal hotspot openly when in public. If you do, make sure you’ve made the settings as secure as possible.
Do not use Wi-FI or charging spots you don’t trust. If you must use public WiFi, never do so without a VPN. Hackers might also establish a fake access point with the name of a genuine network and obtain your data or track you. Always report these dodgy access points to the staff of a place, where your try to connect. Also, don’t forget to disconnect from public Wi-Fi once you’ve stopped using it.
Switch your Bluetooth off when not using it as it can also be an access point for hackers.
Lock your phone with a password or lock screen.
Never leave your phone unobserved and do not let people you don’t know use it.
Regularly look through the apps on your phone to see if there are any you don’t recognize.
Do not open suspicious messages, links, or files. They can be malware or spyware in disguise.
Install anti-malware apps and constantly update your software.
Use a VPN service to protect your online traffic and browse safely and privately.
Do not use download sites you don’t trust. They are a potential source of malware.
Net neutrality pros and cons: what you need to know
It’s been well over a year since the Federal Communications Commission (FCC) revoked net neutrality. A lot has happened since, and the debate over whether net neutrality is good or bad is ongoing.

What is net neutrality?
Net neutrality (also known as the Open Internet) is the principle that all internet connections should be treated equally. If there’s no net neutrality, internet service providers (ISPs) can discriminate against sites or services and regulate what users can and can’t see.

The FCC first started talking about rolling back net neutrality rules in 2017. By no longer classifying ISPs under Title II of the Communications Act of 1934, they could charge more for specific content, slow down their competitors’ services, or block internet access altogether.

By the end of 2017, the FCC had revoked net neutrality and allowed ISPs to sell their users’ data without their permission. In 2019, the House of Representatives attempted to reinstate net neutrality, but that effort is still underway.

Is net neutrality good or bad?
It significantly affects both internet users and ISPs in very different ways, so there are a lot of arguments for and against net neutrality. From the consumers’ point of view, net neutrality is a guarantee that all connections are treated equally and ISPs won’t censor the internet. To ISPs, however, net neutrality means that the government will heavily control how they do their business.

Pros and cons of net neutrality
Equal playing field. Net neutrality means that no one receives special treatment because they have more money. Without it, ISPs can slow down the websites or services of small businesses that can’t afford to pay for faster connections. The same goes for small creators, whose main source of income is their YouTube channel. None of them would be able to compete with large corporations.
Freedom of expression. ISPs can’t block content or slow down webpages just because they don’t like it. With no net neutrality, nothing is stopping them from censoring online content.
No exclusion. Net neutrality guarantees that everything on the internet is available to everyone. If accessing high-quality content online becomes a luxury only wealthy people can enjoy, this will increase social exclusion.
No additional costs for content. Without net neutrality, ISPs can charge companies more to improve their services, like faster video streaming, online gaming, etc. If this happens, these companies will just transfer their new financial burden on to the users.
No one is paying for the data. With net neutrality, users only pay for the service, not the data they consume. Video streaming services were responsible for 57% of the bandwidth used worldwide in 2018. Customers who use less bandwidth may not want to pay for the infrastructure needed to support high-bandwidth activities.
Illicit content is widely available. Offensive, dangerous, and illegal content is accessible to everyone and difficult to remove. Removing net neutrality makes it easier for ISPs to filter dangerous content, although this is a small step from censorship.
No new infrastructure. If ISPs can’t charge more for their services, they can’t invest in their infrastructure. With net neutrality, large amounts of data are consumed without paying for it – this money could be used to expand the high-speed network to rural areas.
Tiresome regulations. Under net neutrality, the FCC must monitor the ISPs’ compliance with these rules. This includes reports two times a year, which can become costly for ISPs of any size.
Will net neutrality be restored?
Even though the Save the Internet Act was passed in the House, nothing is for sure. The bill still needs to succeed in the Senate, and despite the arguments for net neutrality, this is not currently likely.

The net neutrality debate will most likely continue for some time, as there is still no sign of compromise. But if you’re worried about your privacy online – secure your traffic. With a VPN, you can hide your online activity from your ISP and enjoy unrestricted internet access without bandwidth throttling.
In recent years, tungsten rings have emerged as one of the more popular choices for men’s wedding rings because of their attractive looks, durability and low cost. In fact, tungsten carbide is now the top selling metal for men’s wedding bands in the United States. However, we’re here to tell you that many jewelry stores and producers are not selling tungsten any longer, and the reasons why you should buck the trend and look into other options.brushed mens tungsten rings

The Pros of Tungsten Wedding Rings
First, let’s be clear that there are some reasons to get a tungsten wedding ring.For starters, tungsten carbide is a tough material, and is, in fact, the most scratch resistant material in existence. Tungsten rings are also low cost, especially since you won’t ever need to buff out any scratches.Tungsten has an attractive weight, similar to gold and platinum rings, and will not lose its shape in an accident. This does have the side effect of potentially, causing more injury to your finger, but the ring itself is very resistant to damage.

The Cons of Tungsten Wedding Rings
Despite those merits, we still believe you should not get a tungsten wedding ring, and the cons below serve as our reasons why. Let’s take a look.

Tungsten Rings Cannot Be Resized
It is natural for your fingers to change in size and shape over time. Your knuckles especially will continue to grow long after the rest of our bodies have stopped. However, your tungsten ring is not solderable, meaning the size you get is the size you are stuck with for life. You may even reach a point where you cannot take the ring on or off, which, if it is the latter, could be a real problem… take it from us.Tungsten rings are made in a machine shop (massed produced), not by a jeweler, so while they may be affordable up front, they may cost you later should you need maintenance, a new size, or a replacement.

Meanwhile, gold and platinum rings can be soldered, sized and fixed by most jewelers. You can easily size up your gold or platinum ring in the years to come when you need to make adjustments. But you will have a really difficult time finding anyone who can work on tungsten rings in any capacity and will likely be stuck buying a new one.
Tungsten Can Be Broken
While tungsten is indeed scratch resistant like a diamond, this does not mean that it is indestructible. In its raw form, it’s very brittle and hard to work with. If enough force is applied, a tungsten ring can be broken, shattered, or cut. The rings are not entirely indestructible because pure tungsten rings are not possible. Most rings are around 85% tungsten carbide with the rest being made up of a binding alloy like nickel. If your tungsten ring slips off and falls on a hard surface like granite tile or cement it’s likely the ring will shatter into pieces.We should note that many jewelers will offer lifetime warranties that will provide you with a replacement ring if your ring is accidentally broken. Jewelers will also often offer lifetime sizing policies to give you a replacement ring when the time comes. However, since they are rather inexpensive, the rings themselves have zero intrinsic value and are basically worth 1 penny.

Tungsten is a Cheap Metal
While an inexpensive ring might seem attractive for the obvious reason that it is cheap, consider what the wedding ring you wear is meant to symbolize: your undying devotion to and love for your partner. Does a cheap material really showcase your feelings in the best way?
Your ring stands for your commitment and should not be tossed away every time there is wear and tear or you need a new size. You need a ring that matches your promise, not one that you exchange every decade or so. Consider also that your children will likely inherit your ring, so you want something that holds special value. This is the most important piece of jewelry you will ever have.

It’s also worth mentioning that materials like gold and platinum have a long history as engagement ring metals and hold intrinsic value. You will not be able to trade in your tungsten ring for cash, but gold is still traded on the market and is very liquid, meaning anyone can exchange gold for cash.
After six months of research, The Federal Trade Commission (FTC) completed its investigation of certain advertising claims made by Scott Kay, Inc. and has determined no action is warranted. The National Advertising Division of the Council of Better Business Bureaus (NAD) referred Scott Kay Inc.'s advertising to the Federal Trade Commission after the company declined to participate in a NAD proceeding. The NAD and FTC inquired about Scott Kay Inc.'s claims in advertising, point-of-purchase collateral material and personal demonstrations following a challenge by Frederick Goldman, Inc., a primary supplier of tungsten carbide wedding rings to the jewelry industry. women tungsten rings
The FTC agreed to close its investigation and Scott Kay, Inc. has agreed to ensure that the company will not make expressed or implied claims that tungsten carbide wedding bands are fragile unless the company possesses adequate substantiation for such claims. Nothing in this agreement precludes Scott Kay, Inc. from using the word "brittle" as associated with the hardness factor of Tungsten Carbide as substantiated. Scott Kay, Inc. will refrain from making unsubstantiated claims about the environmental impact of the manufacturing process for BioBlu27 cobalt rings.
"I will continue to demonstrate my strong conviction to the jewelry industry in disclosing the confusion and clarity of the performance of tungsten carbide for use in wedding bands," stated Scott Kay, CEO. "As new contemporary metals are introduced into our industry, especially non-molten metal, such as "cemented carbides" (cemented metals) it is our fiduciary and moral responsibility to test and substantiate all claims, and then release the findings and facts. Fact: Tungsten carbide is brittle. We can't be afraid to admit and represent the truth. Wedding bands should never be at risk of cracking, fracturing or breaking."
There has been a host of aquatic action at YCIS Puxi’s Ronghua Campus, as swimming lessons and swim teams took place over the semester. The state-of-the-art campus, which opened in February 2018, is home to a beautiful new swimming pool. Located in the campus’ B1 level, the pool is part of an extensive fitness centre including a gym, rock climbing walls, and a dance studio.Children swimming in Shanghai

Swim programmes for both YCIS Primary and Secondary students started at the beginning of the semester and included trials for places on swim teams which compete against other international schools across Shanghai and China. Year 4 Teacher, Ms Laurie Joynt, leads the Primary Programme and Ms Annie Wright leads the Secondary Programme.

Ms Joynt said of the programme: “Alongside swimming lesson for all our Primary students, we are very excited to have established a competitive swimming team to represent YCIS Puxi in swim meets this year. The children went through the process of trials, which took place over three days. We selected a team consisting of 20 children from Years 3 to 6. Congratulations to those who made the team, and we encourage all students to keep on swimming and developing their skills! Swimming is loads of fun and is good for the entire body as it uses many different muscle groups. During training sessions, the children swim laps that add up to more than a kilometre. They also learn the correct techniques for strokes, how to dive, and tumble turning. The coaches are very proud of the hard work and dedication that has been displayed thus far, and we are looking forward to great results from our swimmers during the course of the year.”

YCIS Puxi Secondary students take a short, three-minute walk to Ronghua Campus for lessons with Ms Wright, who added “This is a really exciting time for the Secondary swim team, as we have also just selected the squad who will represent us at various swim meets over the school year. The students are training hard for our first competition in just a few weeks. They are particularly enjoying learning race techniques, such as starts and turns.”

Swimming is just one of a wide range of sporting and Co-Curricular Activities (CCAs) available at YCIS Shanghai. To learn more about our CCA Programme, please click here.
Goshen schools awarded nearly $9.4 milliongrant for teacher training

When it comes to resources for training teachers, Goshen Community Schools just got a nearly $10 million boost.

During a special gathering in Indianapolis Tuesday morning, Goshen Community Schools officials learned the district is one of three Indiana school systems that will share a five-year, $47 million federal grant from the National Institute for Excellence in Teaching aimed at supporting educators’ career opportunities, professional learning and strategic compensation.Teacher training for early years or nursery education

According to NIET CEO Candice McQueen, the $47 million grant was awarded to NIET by the federal Teacher and School Leader Incentive Program with the goal of expanding and sustaining work to support teachers and improve students’ academic success in three Indiana school districts: Goshen Community Schools, Perry Township Schools south of Indianapolis and Brown County Schools.

“Our partnerships across Indiana and nationally show that when teachers and principals lead schools with a focus on excellence, reflection, and collaboration, students excel,” McQueen said in a provided statement. “This grant is a win for educators and students and will create a lasting impact in these school communities. We look forward to deepening the work in Perry, Goshen, and Brown and building on their progress to strengthen teaching and learning in every classroom every day.”

Specifically, the grant will support the implementation of the TAP System for Teacher and Student Advancement across the districts’ combined 32 K-12 schools, serving more than 25,000 students, 1,500 teachers, and 80 school leaders, McQueen explained.

According to the NIET, TAP helps build educators’ effectiveness and enables school staffs to develop teachers as instructional leaders, plan weekly professional learning tailored to individual needs of teachers and students, create a shared vision for improving teacher practice and student achievement, and implement strategic compensation systems.

In addition, TAP has also shown success in schools in Indiana and across the country with closing achievement gaps, increasing student achievement, improving teacher retention, and strengthening teachers’ abilities, she explained
NBA Commissioner Adam Silver tried to walk a fine line Tuesday as he defended the league's reputation as a progressive purveyor of free speech — but also to limit the financial damage caused by a single tweet that China deemed a direct insult.To get more china news, you can visit shine news official website.

China's behemoth national broadcaster CCTV announced it would no longer air the two NBA preseason games set to take place in China this week. They said it was in response to Houston Rockets general manager Daryl Morey's "inappropriate Hong Kong-related remarks."
Morey sent a tweet voicing support for Hong Kong's pro-democracy protesters over the weekend, then deleted it. He sent several tweets apologizing for offending any Chinese people, and Rockets owner Tilman Fertitta also tweeted what amounted to an apology and distanced the team from the general manager's remarks.

Silver and the NBA came to Morey's defense but tried to keep the league's stance neutral. The league released a statement on the controversy accepting that Morey's remark might have "deeply offended" some fans in China, and stressing that the Rockets GM "does not represent the Rockets or the NBA."

Silver has been put in a delicate position since Morey's tweet went public, mainly due to the business relationship the NBA has with China. The NBA said the number of pro basketball fans in China is twice the U.S. population. The NBA also has a $1.5 billion deal with a Chinese streaming company.

"I don't think it's inconsistent on one hand to be sympathetic to them, and at the same time stand by our principles," said Silver during a news conference in Tokyo. Silver was in Japan on Tuesday for a preseason game between the Rockets and the Toronto Raptors.

That qualified defense brought criticism from U.S. politicians of all stripes, who slammed the league for bending to Chinese pressure. Republican U.S. senators Ted Cruz of Texas, Rick Scott of Florida and Josh Hawley of Missouri and Democrat Brian Schatz of Hawaii all chimed in to criticize the apologetic tone adopted by the NBA.

"We're better than this; human rights shouldn't be for sale & the NBA shouldn't be assisting Chinese communist censorship," said Cruz in a tweet.Hawley sniped: "Chinese govt has a million people locked in concentration camps & is trying to brutally repress Hong Kong demonstrators — and NBA wants to 'bridge cultural divides'? Cultural divides?'"

The statement released by China's CCTV on Tuesday shows the struggle for U.S. organizations that do business with a nation that takes a starkly different view on "free speech."

"We are strongly dissatisfied and opposed Adam (Silver)'s claim to support Morey's rights of free expression. We believe that any speech that challenges national sovereignty and social stability is not within the scope of freedom of speech," the network said. "To this end, CCTV Sports Channel decided to immediately suspend the current broadcast arrangements of the NBA preseason (China games) and immediately investigate all cooperation and exchanges involving the NBA."

The relationship between China and the NBA is worth billions of dollars between media rights, online streaming or games and huge merchandise sales, and Silver conceded Tuesday that the effect of the spat was apparent.

"There is no doubt, the economic impact is already clear," Silver told Japanese news agency Kyodo. "There have already been fairly dramatic consequences from that tweet, and I have read some of the media suggesting that we are not supporting Daryl Morey, but in fact we have."

"There are the values that have been part of this league from its earliest days, and that includes free expression," Silver told Kyodo. "I think as a values-based organization that I want to make it clear ... that Daryl Morey is supported in terms of his ability to exercise his freedom of expression."

"I accept that it is also Chinese governments' and Chinese businesses' right to react to those words and, at least from my long-time experience in the NBA, it will take some time to heal some of these issues," Silver said on Tuesday.

Silver said the NBA would continue to protect NBA employees' right to voice their opinions, regardless of consequences. He said the league had spoken with Hall of Fame player and Chinese Basketball Association President Yao Ming, whom he described as "extremely upset."

"I think it's unfortunate," said Silver, who will meet with Chinese officials on Wednesday. "But if that's the consequence of us adhering to our values, we still feel it's important."
China poured cold water on hopes for a trade deal, signaling it would retaliate against the U.S. threat to put Chinese tech companies on a blacklist, just two days ahead of the highly anticipated trade talks in Washington.To get more china breaking news, you can visit shine news official website.

Chinese Foreign Ministry spokesman Geng Shuang on Tuesday said "stay tuned," when asked whether China would retaliate for the blacklist over alleged human rights violations against Muslim minorities.

"We urge the U.S. to immediately correct its mistake, withdraw the relevant decision and stop interfering in China's internal affairs," Geng said at a news conference according to a transcript on the Foreign Ministry's website. "China will continue to take firm and forceful measures to resolutely safeguard national sovereignty, security and development interests."

The comments deepened the tensions between the two economic superpowers before they resume high-level trade talks Thursday. The White House is also reportedly discussing blocking government pension funds from investing in China, further dimming expectations for a trade deal. Peter Navarro, the Trump administration's trade policy director, however, last week denied reports the White House is considering limiting U.S. investments in China, calling them "fake news."
China's delegation led by Vice Premier Liu He may cut short its planned stay in Washington and depart Friday instead of Saturday to remove the possibility to extend the talks into Friday evening, the South China Morning Post reported Tuesday, citing a source briefed on preparations for the trade talks.

There's not much optimism," the source told the paper, which is run by Alibaba but often criticized for being biased in favor of the state.This time, Liu will not carry the title of "special envoy," which empowered him to negotiate on behalf of President Xi Jinping in May. This could be an indication that Xi has not given Liu any instructions for the negotiations.

Deputy-level talks took place Monday and principle-level negotiations are planned for Thursday and Friday. The Trump administration has imposed tariffs on more than $500 billion of Chinese goods, with another round of tariffs set to go into effect later this month.

A blog called Taoran Notes on Chinese social media WeChat, followed by analysts covering China and market participants for cues on the trade battle, is also toning down expectations for a deal, a reversal from its post last month predicting "new developments.""Some people may ask, if the U.S. raises tariffs further, is it still necessary to continue the talks … the answer is that it's as necessary to take countermeasures as to continue the talks," a blog post Monday evening reads, adding the talks will be a continuation of "talking while fighting."

Run by a state-owned newspaper called Economic Daily, the blog has been cited by U.S. media including Bloomberg News for additional color from the China side.

However, there are conflicting reports out of Chinese media on Tuesday. The state-run Global Times said the Chinese delegation is one of "the largest and broadest teams" in the history of U.S.-China trade talks, indicating Beijing is "sincerely looking to reach a comprehensive trade deal."
Pages: «« « ... 44 45 46 47 48 ... » »»

Sabyasachee Koun Hai ?

Alexa Global Rank 99000

google ranking checker

Website Page View Hit