Thứ Bảy, 1 tháng 7, 2017

Waching daily Jul 1 2017

A

Guide for the Savvy Journalist in a World of Ever Decreasing Privacy

by Edward Morgan

You can see the eBook PDF-version of this guide here.

1.

Introduction

Many veteran journalists, but not only these, surely noticed that we are all of a sudden

bombarded again from all-over with mentions of Watergate.

Books like George Orwell�s 1984 are on display at bookstores and an air of danger to freedom

of speech and freedom of the press is spreading slowly like a dark cloud over the Western

Hemisphere, raising old fears.

When an American serving president accuses a former president of surveillance; when he

prevents central US media outlets access � so far always granted, and taken for granted

� to press conferences he holds; and when he incessantly knocks and accuses the media

of being the country�s enemy number one, it isn�t surprising that memories of President

Nixon surface up more with every self-pitying tweet about SNL, and that even Republican

Senators such as John McCain express fear for the future of democracy.

And McCain is not alone.

Many journalists whom I have spoken with recently, expressed concern for whatever lays ahead

for the freedom of the press.

At a time when it�s possible to express the following statement � �Donald Trump

controls the NSA� � and not be held a liar, anything�s possible.

Add that to the fact that recent news on CIA taught us that almost all encryption systems

can be compromised, if someone has the perseverance to crack them � and you are en route to

envisioning an utterly Dystopian world, where you cannot even get too comfortable laying

on your sofa, in front of your own smart TV.

The good news is that it is nevertheless possible to make it difficult for anyone to try and

intercept your emails, the text messages you�re sending or your phone calls.

You can take measures to make the lives of those who want to uncover your sources and

the information being revealed to you, much harder.

Of course, the degree of effort you�re prepared to take to protect your privacy, your sources�

anonymity and your data�s safety, should be commensurate to the likelihood of a real

threat, be that hacking or spying.

�The old-fashioned promises � I�m not going to reveal my source�s identity or

give up my notes � are kind of empty if you�re not taking steps to protect your

information digitally�, says Barton Gellman of the Washington Post, whose source, former

NSA contractor Edward Snowden, helped uncover the scope of the NSA�s and British GCHQ�s

operations, to his interviewer Tony Loci.

Loci herself, who covered American judicial system for AP, The Washington Post and USA

Today, and was herself held in contempt of court for refusing to identify sources, would

probably endorse that.

So, what is it that needs to be done to ensure that a journalist�s sources and data are

secure and well?

Grosso modo, the tips can be described as falling within the following categories:

Securing on-device applications and functions- This is known as reducing the �attack surface�,

i.e. limiting the installed apps to the bare minimum, installing only from trusted sources,

selecting apps that require minimal rights, keeping the system fully patched and updated,

and having as many security controls (based on recent best-practices white papers) on

the device.

Isolating your devices and/or their environment� For example, the physical insulation of a

computer for the purpose of checking files, or the use of prepaid mobile devices.

Acting cautiously both in the digital and real world- This has a lot to do with common

sense and a little less to do with software: For example, never write down the name of

the source, certainly not on any app or on any document that�s stored on your computer

� and most certainly not on anything stored on the cloud.

2.

Communicating with your source and safeguarding the sensitive data

Let�s begin by listing what you can do when it comes to communicating with a source, and

storing sensitive information obtained thereof:

Beware of big names: Presume that large companies� encryption systems and possibly even big name

operating systems (proprietary software) have back doors that secret services in their country

of origin (at least in the US and the UK) can access.

Bruce Schneier, Security Expert, explains it here.

Always encrypt everything: Security experts use simple math to make their point: as you

raise the cost of decrypting your files (say, for intelligence agencies like the NSA), you

automatically increase the degree of effort expended on following you.

If you�re not Chelsea Manning, Julian Assange, or Edward Snowden and if you weren�t involved

in active surveillance around Trump Tower apartments, They may give up the effort even

if your encrypted communications were stored.

And should anyone decide to track you despite your efforts, it will be more of a headache

if you use strong encryption like AES (Advanced Encryption Standard) and tools like PGP or

openVPN, which are the strongest widely available encryption methods (VPN�s are used by the

US government itself).But if you want bullet-proof security, you will need more than the AES

encryption method.

P.S. if you want to discover the year your information landed at the NSA�s hands, just

have a peek here.

Perform full disk encryption: This is done just in case someone gets their hands on your

computer or phone.

Full disk encryption can be done using FileVault, VeraCryptor BitLocker.

Putting a computer to �Sleep� (instead of Shutdown or Hibernate) may allow an attacker

to bypass this defense.

Here, Mika Lee gives a complete guide for encrypting your laptop.

Avoid chatting with sources on the phone: All phone companies store data related to

the caller and the receiver�s numbers, as well as the location of the devices at the

time calls were made.

In the US and several other countries, they�re required by law to disclose information on

registered calls in their possession.What can be done?

You should use a secure call service, such as the one the Signal app � which was tested

repeatedly for security � possesses.

Although this may mean that both the source and the editor need to download the app as

well, the process takes just a few minutes.

Here is a guide on how to use it.

Just for the hang of it, check out how many of your non-journalist friends are hanging

out there.However you choose to communicate with your source, do not bring your mobile

phone to sensitive meetings.

Buy a disposable device and find a way to convey its number to the source in advance.

The source needs to have a disposable safe device too.

Authorities can track your movement through cellular network signals and it�s advised

to make it harder on them to locate you retroactively in the exact same cafe where the source was

sitting.

If you fail to follow this rule, all local authorities will be required to do is ask

(politely and legally) for the video filmed by the caf�s security camera at the time

of your meeting.

Choose secure messengers: your calls (cellular ones and via landlines) can be monitored by

law enforcement agencies and each SMS is like a postcard � all text is fully visible to

those who may intercept it.

Therefore, use Messengers that allow for secure end to end call: signal, which was already

mentioned above, and Telegram are considered to be the safest (although Telegram as well

as WhatsApp�s web apps were compromised once and then fixed).

According to some experts, you can also consider using SMSSecure, Threema and even Whatsapp.The

Signal Protocol has been actually implemented into WhatsApp, Facebook Messenger, and Google

Allo, making conversations using them encrypted.

However, unlike Signal and WhatsApp, Google Allo and Facebook Messenger do not encrypt

by default, nor notify users that conversations are unencrypted � but offer end-to-end encryption

in an optional mode.

You should also keep in mind that Facebook messenger and WhatsApp are both owned by Facebook.Adium

and Pidgin are the most popular Mac and Windows instant messaging clients that support the

OTR (Off the Record) encryption protocol and Tor � the web�s best encrypted browser,

which we will get to in detail later (See how to enable Tor in Adium here and in Pidgin

here).

Naturally, you could also use the Tor Messenger itself, which is probably the safest of them

all.Two final notes on texting: A cyber security expert I�ve discussed this with, says you

should also have a working hypothesis that text is encrypted but the fact that these

specific two individuals are talking, at this present time, might not go unnoticed.The second

note is you should also remember to delete the messages in your phone (although this

may not be enough to withstand a forensic check), just in case your device falls in

the wrong hands, to avoid exposing them.

Do not use organizational chats: Slack, Campfire, Skype and Google Hangouts should not be used

for private conversations.

They are easy to break in, and are exposed to disclosure requests for courts use, to

resolve legal issues at the workplace.

Therefore, it�s best to avoid them, not only when it comes to conversations with sources,

but also conversations between colleagues, editors, etc., when you need to pass information

received from your source, whose identity must be kept under cover.

Many popular VoIP services like Jitsi have built-in chat features, and several of them

are designed to offer most of Skype�s features, which make them a great replacement.

In extreme cases, consider using a Blackphone: This phone, which strives to provide perfect

protection for web surfing, calls, text messages and emails, is probably the best substitute

for a regular phone if you are about to topple your government or getting ready to publish

secret military files.

An anti-bullet vest may also come in handy.

Alternatively, try to do without a cell phone, Or opt for a cellular phone RFID signal-blocking

bag.

There�s always an option that even the Blackphone can be tracked using its IMEI (the mobile

phone�s ID).

Protecting Data on your computer: It�s very easy to break regular passwords, but it can

take years to break passphrases � i.e., random combinations of words.

We recommend trying secure password management tools like: LastPass and 1Password and KeePassX.

You�ll need to remember only one password, versus too many Passwords.

And still, when handling important services such as your email, do not rely on password

managers: Just make sure you remember the password.In an interview to Alastair Reid

in journalism.co.uk, Arjen Kamphuis, an information security expert, recommended that for encrypted

hard drives, secure email, and unlocking laptops, one should choose a password of over 20 characters.

Of course, the longer the password, the harder it is to crack � but the harder it is to

remember too.

That�s why he recommends the use of a passphrase.

�It can be anything, like a line of your favorite poetry,� Kamphuis says, �maybe

a line from something you wrote when you were nine that no one else will know about�.Reid

reports this thought provoking calculation, using the Gibson Research Corporation�s

password strength calculator: A password like �F53r2GZlYT97uWB0DDQGZn3j2e�, from a random

password generator, seems very strong, and indeed it is, taking 1.29 hundred billion

trillion centuries to exhaust all the combinations even when the software is making one hundred

trillion guesses per second.Screenshots from GRC.com, showing the difference in strength

between a password and a passphraseThe phrase: �I wandered lonely as a cloud�, he points

out, is so much easier to remember and is also more secure, taking the same software

1.24 hundred trillion centuries to exhaust all possibilities.

Well, passphrase it will be.

Two-factor authentication is also a very good idea.

In a regular two-stage authentication you sign in with your password and receive a second

code, often via a text message to your smartphone.

You can use Yubikey, as well as hardware tokens to further secure sensitive files on your

computer.

For more information, read the 7 golden rules for password security.

Assign a computer for inspecting suspicious files/attachments: The easiest way to distribute

malware and spyware is through installation via USB or through attachments and email links.

It is recommended therefore you use one air-gapped computer to examine these threats under quarantine.

With this computer, you can freely use a USB and download files from the Internet, but

do not transfer the files to your regular computer or re-use that USB.

How to buy your own secured computer: Security expert Arjen Kamphuis recommends purchasing

a pre-2009 IBM ThinkPad X60 or X61.

These are the only modern enough laptops with modern software systems, which enable replacing

low level software.

Another point to take into account is that you should not buy your computer online, as

it may be intercepted during delivery.

Kamphuis recommends buying it from a second-hand store for cash.

He also points out that you should abolish all connectivity: Remove all Ethernet, modem,

Wi-Fi or Bluetooth capabilities.

Personally, I know security experts who wouldn�t trust such a computer.

ThinkPad X60.

Don�t buy it online

Educating your Sources: It�s possible that by the time the original and valuable information

reaches you, it�s already too late.

Your source may have made every possible mistake, leaving behind a trail of evidence.

But beyond the need to secure the information once it�s in your hands, you should strive

to teach your sources how to hide the information: store it securely and communicate safely via

safe devices.

Most people have no clue how to handle sensitive information, and in general what they�re

up against the moment they get in touch with you.

Use a designated secure system for receiving documents: Replace Dropbox or Google Drive

and use something less popular but more secure.

For example, SecureDrop is a designated system allowing you to receive files from anonymous

sources and to safely scan and check them.

Edward Snowden described Dropbox as �hostile to privacy� and recommended Spideroak instead.

OnionShare is another free service that allows transferring files easily and anonymously.

Don�t keep notes: neither on a laptop, nor calendars or contact lists on your cellphone

or computer or in the cloud � do not keep record of your sources name, initials, phone

number, email or user name in messengers.

Just don�t.

Visual tracking: On the way to sensitive meetings, avoid using public transportation and guide

your source to do the same.

You should also avoid meeting places such as modern malls, where video cameras are spread

all over the place.

Evading social media: Some people prefer to opt for radical anonymity.

If for some reason, you need to vanish from the face of the earth without leaving a fully

blown profile behind on every social media, totally delete your accounts.

It�s different from �deactivating� them, a state in which all your info is stored and

can be re-activated.

Make friends among hackers: This will help you avoid big mistakes, save time and headaches

and keep you up to date on the technological arms race.

Payment method: Pay for everything in cash, consider using Bitcoins � buy them anonymously

(use this Business Insider guide for that purpose) � and, if you have somebody willing

to accept them at the other end of the transaction, use Dash.

A pre-paid credit card from an online store is also an option.

Scribble wisely: If you jotted down information on a piece of paper, what they used to call

a note in the Precambrian world, destroy it.

And don�t forget even that wrinkled one at the bottom of your pocket.

Yes, right next to that gum

3.

How to become anonymous online

Beyond securing the communications with your source, and protecting possible breaches of

the sensitive data you get hold of, you should also avoid being tracked while browsing.

Online habits can disclose or provide hints as to the story you�re working on, or worse,

hint or disclose the identity of your source.

Here are the golden rules for surfing the net safely and then, at the next chapter,

for securing your email account:

Private browsing mode: There are two basic ways to maintain anonymity while surfing the

web.

The first, most basic and popular, yet insufficient way is to browse the information in private

mode, an option that most browsers allow.

Your browsing history will not be saved, and basic tracking technologies, which advertisers

use, such as HTTP cookies, will be prevented from creating your detailed profile.

But this is more of a nice to have privacy: It basically hides your browsing history from

family members who can access your computer.

Your IP address can still be monitored and information regarding all the sites you visited

is still exposed to your ISP.

Use alternative browsers: browsers, such as Dooble, Comodo Dragon or SRWare Iron, which

focus on user privacy, are limited in capabilities.

You can achieve a similar degree of privacy offered by these browsers simply by deleting

cookies � bits of code which have been downloaded to your system by websites you visit, that

monitor your activity and sometimes even follow which content you consume; Another way to

remain anonymous is by neutralizing your browser�s location settings, and installing various

features aimed at achieving anonymity.

To check whether you disabled all cookies effectively, you can use the app CCleaner,

which also handles Flash cookies, but none of these browsers are fully encrypted.

The only standard browser that ensures total privacy is the Tor browser.

Tor is ugly and slow, but it will protect you and your sources.

The next section will give a more detailed account of it.

TOR: This �notorious� browser, which was developed by the US Navy, allows you to operate

in a hidden network, carry out private communications and set up web sites anonymously.

Tor�s browser, which can be downloaded at Torproject.org, makes it very difficult to

monitor your activities on the internet, or let governments or your ISP pinpoint your

location.

The only drawback is that it�s slow at times, a bit cumbersome � but that�s only because

Tor routes you through three encrypted random relays around the world, before landing you

at your destination site.

You should also bear in mind that your neighbors may be shady characters.

Another option related to Tor is to download Whonix, a secure operating system that is

focused on privacy.

It works as an access gate to Tor, and only allows connections with Tor sites and users.

But the most popular Tor OS is Tails (The Amnesiac Incognito Live System).

Tails can be booted from a USB stick or DVD, and it anonymizes all information.

Edward Snowden is considered a fan of this software.

Qubes is another OS that supports Whonix and is recommended by Snowden.

Alternative search engines: Google, the most popular search engine, saves your search history

in order to optimize the results.

To stop this personalization you should click on: Search Tools > All Results > Verbatim.

Or you sign into your Google account on www.google.com/history, find a list of your previous searches and

select the items you want to remove by clicking the �Remove Items� button.

DuckDuckGo.

A search engine that doesn�t store your info

But to avoid being monitored entirely, it�s preferable to use a search engine such asDuckDuckGo.

If you find it difficult to give up Google, download Searchlinkfix to at least keep away

URL Trackers.

Direct treatment of �short-term� computer memory: Another way to neutralize options

for monitoring your surfing is by deleting the DNS (domain name system) cache.

Deletion is done using simple commands in the operating system.

Rebooting the router � which sometimes has a DNS cache � or rebooting the computer

can also reboot both their respective DNS cache, if the router has one.

Try to avoid HTML Web Storage: Web Storage is built into HTML5, and unlike cookies, the

stored information is impossible to monitor or selectively remove.

Web storage is enabled by default, so if you�re using Internet Explorer or Firefox, simply

turn it off.

You can also use the add-on Better Privacy for Firefox to remove the stored information

automatically.

The Click and Clean extension will do the same job for Google Chrome.

Use a VPN: As I mentioned already, your ISP can monitor the sites you surf, and anyone

who wants to eavesdrop on you, can also intercept your communications.

To protect all incoming and outgoing communications, it�s important to make use of a VPN (For

a complete explanation, click here).

VPN encrypts all your communications, so that even the ISP or the secret services, or just

hackers hovering around your favorite coffee shop�s Wi-Fi, won�t be able to know who

you sent an email to, which service you used, etc.The use of a VPN is very common among

people who, for example, wish to see the complete Netflix movies catalog outside of the United

States, but not every VPN is suitable for journalists.

A VPN for journalists won�t necessarily be the fastest one or have the best support,

but it has to be trusted not to keep VPN logs � that is, it cannot determine who you are,

what sites you�ve visited and so on.A safe VPN is bound to be provided by a company who�s

not located at one of the �14 Eyes� countries, where intelligence networks are allowed to

collect and share information with one another; firstly and foremost, in the USA.

So VPN companies located in the territory of the former Soviet Union countries have

an advantage.

Their courts do not easily hand out orders to retrieve information collected by local

companies, be it regarding their citizens or foreign nationals.

Here you�ll find a list of 5 VPN services that stand out regarding privacy and all are

located outside the �14 Eyes� countries.wBy the way, even if governments are out on the

hunt for Traffic that is sheltered by a VPN, you can still use stealth VPNs like TorGuard,

to confront the challenge, whether it is active government censorship or just spying you�re

dealing with.

Tor and VPN�s give you the perfect protection when someone is trying to retrieve your browsing

history in order to profile you.

Repair DNS leaks: Using a VPN does not protect you completely, because that DNS Traffic may

hint at your identity.

DNSLeakTest.com will allow you to detect such leakage.

If the test shows that DNS is of your VPN, you can relax, but if it shows that the DNS

is of your ISP, you are not anonymized.

In this case you, check out what you can do here.

Virtual Machines: This nifty little trick is actually a second (virtual) computer, which

operates as an app in your operating system.

You can download files or open links in a similar way to the isolated computer I recommended

earlier, so that your computer is less exposed to malware or spyware of any kind.

Virtualization software, like VirtualBox should be opened using a secure operating system.

File downloading is done with the virtual machine Internet connection shut down; after

using the file, you�ll need to delete it � and depending on your adversary, perhaps

delete it along with the machine.

HideMyAss proxy server.

I�ll hide yours, if you�ll hide mine

Proxy server: As in the case of virtual machines, here too the activity moves to another �area�

and allows you to keep safe from spying and other attacks.

Actually, the proxy servers substitute your IP address with theirs, which can mislead

people into thinking you�re in a different country, for instance.

HideMyAss.com/proxy, Psiphon (open source) and JonDonym all provide a similar service.

Some experts say that these should be used with a VPN and/or Tor for higher levels of

security.

But then, some experts I�ve talked to claim that if you bother using Tor, you�re as

secured as one can be anyway.

Three more types of extensions that can increase your level of security: To verify that the

Internet protocol where you operate is https secure, you can install an extension called

HTTPS Everywhere , made by the Electronic Frontier Foundation�s (EFF), one of the

organizations that funds the Tor Project.

This extension is recommended by many cyber experts; it will ensure that websites you

visit use the secure protocol, which is definitely not an insurance policy against anything,

but better than the unencrypted protocol.The second type of extension controls the data

that javaScript is revealing to websites (in order to improve your browsing experience).

Two popular options here are ScriptSafe and NoScript.Another extension is the Ghostery

browser.

This extension will reveal who is following you among 2,000 companies, and will allow

you to block unwanted ones.

It�s sweet, but you probably won�t be blocking the NSA this way.

Privacy badger, a project by the EFF, also works similarly.

4.

Securing your email

How should you protect your e-mail?

The problem with maintaining the confidentiality of emails is even tougher: Google and Microsoft

will most likely just give out your emails to government agencies if and when required

to do so.

What should you do?

Safe extensions: The simplest option, assuming you use common Web mail services such as Yahoo

and Google, is to install the browser plugin Mailvelope, and make sure that the person

on the receiving end does too.

This extension simply encrypts (and decrypts) the e-mail.

A similar but limited extension to Gmail called SecureGmailwill perform a similar job.

Emails that go through this extension are encrypted, and can�t be decrypted by Google.

Another possibility is �Encrypted Communication�, which is a simple to use Firefox extension.

For that you will need a password that the recipient has access to � but remember to

never transmit the password by email.

Secure email providers: Hushmail is an example of an email service that provides better security

than the more common networks you use, but it may be forced to hand over emails to the

US government under a court order, and it does log IP addresses.

Another email service with similar features and security levels is Kolab Now, which prides

itself amongst other things with storing data exclusively in Switzerland.

Disposable Email Addresses (DEA�s): This is an email created ad hoc for a specific

purpose, which is completely anonymous and is deleted immediately after use.

This solution, commonly used when signing up for various services in order to avoid

spam, is also a great solution for maintaining anonymity.

However I wouldn�t advise journalists to communicate with their sources over it, because

security is not its strongest trait.

There are dozens of such temporary emails, but the British Guardian, for example, recommended

Guerrilla Mail and Mailinator.Using Guerrilla Mail in the Tor Browser ensures that not even

they can connect your IP with your email address.

Likewise, if you use email encryption software, such as GnuPG, on Tor, you�re all set and

secure.

So, let�s talk a bit about email encryption.

Encrypting your mail: Wired got this recommendation from Micah Lee, a privacy-focused technologist

who worked with the EFF and First Look Media (here is an interview Lee held with Edward

Snowden): Encrypting messages with webmail can be tough.

It often requires the user to copy and paste messages into text windows and then use PGP

to scramble and unscramble them (PGP � Pretty Good Privacy � is an encryption program

that provides cryptographic privacy and authentication for data communication).

That is why Lee suggests a different email setup, using a privacy-focused email host

like Riseup.net, the Mozilla email app Thunderbird, the encryption plugin Enigmail, and another

plugin called TorBirdy that routes its messages through Tor.As Reid pointed out in his interview

with Kamphuis on journalism.co.uk, Greenwald almost lost the NSA story because he initially

ignored Snowden�s instructions on email encryption.

In other words, if you want a story that will go down in history it makes sense to be secure.

Kamphuis agrees that PGP can be trusted.

As he and Reid explain, with PGP encryption, you have a public key, like your public phone

number, and a private key.

The public key can go on Twitter biographies, business cards, websites and wherever else

your work is publicized, but the private key must be stored securely, as with any other

sensitive information.

Then, when a source wants to send information, they will use your public key to encrypt their

email, that only your private key can unlock.Kamphuis recommended the GNU Privacy Guard, an open-source

version of PGP, that is simple to set up and has an active support community.

For encrypting files, data and hard drives, he suggested consulting his free eBook, �Information

security for journalists�, published with Silkie Carlo and released through the CIJ,

which fully explains the process.If you do choose to encrypt the message itself regardless

of your mail provider�s identity, using zip with a password is a good idea, and 7ZIP

is a recommended tool for accomplishing that.

Back to basics: Yes, I know that this is back to email security 101 � but please try to

avoid phishing.

Watch the �from� field in your email for little misspellings; someone else can pose

as somebody you know.And one last word on email encryption: One of the real problems

to bear in mind is that even after encrypting them, not everything is encrypted.

The email addresses of the sender and recipient, the subject line and the time and date when

the email was sent, are all out on the open.

Attachments and the message itself are the only data that is encrypted.

5.

Final words

These are perhaps the most radical pieces of advice I ran through, when preparing this

eBook.

As Micah Lee put it when interviewed on privacy on WIRED: �If your computer gets hacked,

the game is over.

Creating a virtual sandbox around your online communications is a good way to keep the rest

of your system protected.

Tor is awesome and can make you anonymous.

But if your endpoint gets compromised, your anonymity is compromised too.

If you really need to be anonymous, you also need to be really secure�.

And Journalist Tony Loci puts it in even harsher words in an article published in an eBookabout

the future of cross border investigative journalism for the Nieman foundation at Harvard: �Some

journalists, computer scientists and privacy advocates are so alarmed that they recommend

reporters go old school� and rely on in-person interviews

and snail mail�.

I hope I have helped people in the trade, and others, gather some information that will

clarify what needs and can be done to ensure your

and your source�s security in these hectic times.

For more infomation >> A Guide for the Savvy Journalist in a World of Ever Decreasing Privacy - Duration: 34:33.

-------------------------------------------

Ruben Neves nears Wolves move from Porto for £17.5m despite interest from Chelsea and Liverpool - Duration: 4:05.

Ruben Neves nears Wolves move from Porto for £17.5m despite interest from Chelsea and Liverpool

WOLVES have reportedly agreed an astonishing £17. 5million deal to sign Porto midfielder Ruben Neves. Chelsea and Liverpool have both shown an interest in the 20-year-old.

Ruben Nevest is set to sign for Wolves in an £17.

Neves struggled to play the games he wanted last season. But Portuguese newspaper O Jogo believe that Neves move to Wolves is all but done.

And it appears that Jorge Mendes ties with the clubs Chinese owners have helped swing the deal. Mendes client has captained Porto a number of times, but endured a fall from grace last season.

Neves – who has been dubbed the new Paul Scholes in his homeland – previously had a £35m price tag. But after playing just half of the Portuguese giants games last season, his price appears to have almost halved with it.

One high-profile meltdown last season encapsulated his frustrations.

Neves recently played for Portugal at the European Under-21 championships.

Midfielder Neves, 20, has won two caps for Portugal already. Neves appeared set to be brought on against Roma before being told to get back on the bench by boss Nuno Espirito Santo.

Twice-capped Neves then broke down in tears. And he now seems set for a move to the Championship to work under Espirito Santo again.

Born in Mozelos in the Aveiro District of Portugal, Neves was earmarked from a young age as a player with potential and joined Porto's youth set-up as an eight-year-old.

He was loaned to local club Padroense for the 2012/13 season and returned to the Dragons the following season, impressing for the Under-17 side.

Neves' star continued to rise as he played a key role for Portugal at the 2014 Under-17 European Championships in Malta. Neves struggled for game time last season.

Skipper of the side, Neves scored twice in seven appearances as Portugal were beaten in the semi-finals by eventual winners England with his performances earning a place in the Team of the Tournament.

Success on the international stage proved the start of a breakthrough campaign for the deep-lying midfielder. Neves was called up to Julen Lopeteguis first-team squad after injury to Mikel Agu and the sale of Fernando to Manchester City.

Nuno Espirito Santo could be in charge of Neves again at Wolves. And he impressed the current Spain boss enough to remain with the main group for the start of the campaign.

In fact, Neves did so well he was handed a start against Maritimo on the opening weekend of the season.

As if that wasn't memorable enough, he scored after just 11 minutes to become the youngest scorer in the club's history, aged 17 and five months, eclipsing Porto legend Fernando Gomes.

For more infomation >> Ruben Neves nears Wolves move from Porto for £17.5m despite interest from Chelsea and Liverpool - Duration: 4:05.

-------------------------------------------

Episode 6 - PAW Patrol - Laser Gun dropped from UFO (Cartoon for Kids) - Duration: 11:41.

SUBSCRIBE: don't miss new funny episodes!

For more infomation >> Episode 6 - PAW Patrol - Laser Gun dropped from UFO (Cartoon for Kids) - Duration: 11:41.

-------------------------------------------

TRENDS 2018 | PRE FALL CASUAL OUTFIT IDEAS FOR WOMEN - Duration: 2:31.

TRENDS 2018 | PRE FALL CASUAL OUTFIT IDEAS FOR WOMEN

TRENDS 2018 | PRE FALL CASUAL OUTFIT IDEAS FOR WOMEN

TRENDS 2018 | PRE FALL CASUAL OUTFIT IDEAS FOR WOMEN

For more infomation >> TRENDS 2018 | PRE FALL CASUAL OUTFIT IDEAS FOR WOMEN - Duration: 2:31.

-------------------------------------------

Prince Harry says technology can be 'force for good' at Queen's Young Leaders awards - Duration: 3:18.

prince Harry has urged people to use social media for good as he joined Australians and

others from around the Commonwealth to celebrate inspirational work by young people.

The Prince joked as he mingled with representatives of 36 Commonwealth countries who gathered

in Australia House in London at an event for the Queen's Young Leaders awards

At an earlier speech at a ceremony for the winners in Buckingham Palace, the 32 year

old Prince described himself as one of those "who can no longer hand on heart call ourselves

young".

But he praised those who embraced digital technology and social media to improve the

world instead of bullying or spreading hate.

"We are better connected than ever before this can make the world seem a faster, more

complex, and challenging place.

And too often it can make us all feel pessimistic about the future," Prince Harry said.

"But that's not what I see.

At home and abroad, I see people especially young people doing incredible things.

Young people are using this technology more than ever to be a force for good and positive

change in their communities."

The Prince made the comments at prize ceremony for young people to recognise inspirational

work ranging from tackling bullying in schools to preserving the environment.

The winners aged between 18 and 29 were handed awards by the Queen at a ceremony which was

broadcast on Facebook Live.

Prince Harry then travelled to Australia House, where he was welcomed by High Commissioner

Alexander Downer for a celebratory dinner.

He was also greeted by Australian comedian Adam Hills who told the assembled crowd he

had never been in one room with so many people he had made jokes about in the past.

Australian singer Lucy Mason performed her single Hunger at the dinner, where the Prince

and other guests dined on Australian kingfish and striploin beef and drank wines from Jansz

Tasmania and Yalumba.

Australians Abdullahi Alim, Madeleine Buchner and Jordan O'Reilly were among those to greet

the Prince to discuss their work on counter extremism, support for carers and helping

people with disabilities.

Ms Buchner who won her award after she set up a charity for young carers of family members

with a chronic illness, mental illness, disability or addiction sat next to the Prince throughout

the dinner and spoke to him at length.

The award was launched in 2014 by the Duke of Cambridge and Prince Harry to promote young

people's charitable work that changes their communities.

The final award will be given next year.

Sixty young people have been chosen as winners each time one to represent each year the Queen

served as Head of the Commonwealth at the time of her Diamond Jubilee.

tell us your thoughts in comments below.

thanks for watching.

please like,subscribe and share my videos.

For more infomation >> Prince Harry says technology can be 'force for good' at Queen's Young Leaders awards - Duration: 3:18.

-------------------------------------------

How to Draw Flowers, Rainbow Finger Family Song | Coloring Pages | Art Colors for Kids Owl King TV - Duration: 2:32.

How to Draw Flowers, Rainbow Finger Family Song | Coloring Pages | Art Colors for Kids Owl King TV

For more infomation >> How to Draw Flowers, Rainbow Finger Family Song | Coloring Pages | Art Colors for Kids Owl King TV - Duration: 2:32.

-------------------------------------------

Paul George trade grades average at best for the Indiana Pacers - Duration: 5:07.

Paul George trade grades average at best for the Indiana Pacers

We're still reeling from the bombshell news of Paul George being traded to the Oklahoma City Thunder, so we made Tony East write about it instead of us.

The Pacers have traded franchise icon Paul George to the Oklahoma City Thunder for Victor Oladipo and Domantas Sabonis.

Paul George, who can opt out of his contract at the end of this season, has made it clear to teams in the league he will be joining the Lakers when he is a free agent.

The Thunder do not care. They wanted to pair another superstar with Russell Westbrook, even if it is just for one year, and they did it.

The Thunder will now surely be one of the league's most exciting teams, and the Pacers will enter a rebuilding era. Let's grade the trade for both teams, starting with Paul Georges new teamOklahoma City Thunder: B+.

You might think this is a low grade for them, and I understand. The Thunder just got Paul freaking George! That is crazy and they deserve an A right?.

Well I grade trades based upon this question: How much did you improve the future of your franchise? The Thunder clearly improved their franchise, but by how much.The team will surely be better next year.

They have two All-Stars now and the former MVP. But looking past that year, things get bleak.

If Paul George sticks to his word and heads to the Lakers next summer, the third best Thunder player would likely be someone like Doug McDermott or Enes Kanter.

Oh, and theres a chance Russell Westrook could be a free agent at that time too. So they traded away two of their best young players, and next summer it could look really bad for them. But in a vacuum….

They look like clear winners.

They traded for Paul George, and all they gave up was a 21-year-old who wasn't super impressive his rookie year in Sabonis, and traded away a two guard who lost value throughout his only season with the Thunder in Oladipo.

So the Thunder get a B+ for making the most out of there assets, at the expense (possibly) of their future.

Can't spell OKC without the C. The Pacers are getting a C from me, using the same criteria that I used to grade the trade for the Thunder.

Did the Pacers front office do a bad job with the trade itself? Not at all. Oladipo just averaged 17 points per game as a 24-year-old, and Sabonis showed a lot of promise as a shooting big man his rookie season.

The two of them combined to start almost every game with the Thunder and both proved to be serviceable offensive players.

Pritchard said he wanted young starter for PG and he got just that. Nobody saw OKC as a team that could offer that, but the Pacers were able to get what they wanted out of the Thunder.

I give the Pacers a C for limiting their future by being impatient. Had the Pacers waited into free agency, the offers would have almost surely gone up. Boston could have gotten involved as well as more aggressive offers from Cleveland.

At worst, wait and see if the offers go up during free agency and make the trade later, I doubt the Thunder would have pulled their offer any time soon.

For more infomation >> Paul George trade grades average at best for the Indiana Pacers - Duration: 5:07.

-------------------------------------------

Coloring Watermellon with Paint for Children | Coloring Pages for Kids | Art Colors for Children - Duration: 1:31.

Hey kids. Let's do some drawing, coloring, and painting.

See you next time kids. And parents, you can get to our YouTube Channel directly by going to Sleepy Turtle Time. Thanks for watching.

For more infomation >> Coloring Watermellon with Paint for Children | Coloring Pages for Kids | Art Colors for Children - Duration: 1:31.

-------------------------------------------

The Brain - A Quick Review for General Psych Class by Dr Z - Duration: 8:06.

Hi gang.

We're going to do a quick review of the parts of the brain.

This is for gen psych class, so it's very much a survey of the brain as opposed to a

detailed review of the brain.

But if you know the basics, you're in good shape.

So let's start with the back of the brain, where it develops just above the spinal column.

It's called the hindbrain.

And the first thing that comes out of the spinal column is the medulla oblongata, which

is what you need to live.

So it does heartbeat and respiration.

The next thing in your brain is the cerebellum.

This is responsible for basic balance.

It keeps you standing up.

It keeps you from falling over.

If you've every known anyone with innate tremors where they stick out their hands and they

automatically shake, that's probably because there might be an issue in the cerebellum.

Because that cerebellum just keeps us balanced, so we can stand up, so we can move without

falling over.

And of course, the pons.

The pons is responsible for your circadian rhythm.

We all have that built in rhythm where we need to sleep and be awake, and we tend need

to be asleep when it's dark outside.

We tend to need to be awake when it's light outside.

This is not about feeling sleepy.

This is about the basic need of the body for sleep and awake.

But that's the hindbrain, the very basic part of the brain right at the back, just above

your spinal column.

Now the midbrain, which you can see from the picture over on the left, is hiding up underneath

the cerebral cortex and everything else.

It's not visible from the outside.

But it has one very, very important function, and that is to bring information from your

body, up through your hindbrain, and send it out into the forebrain to be processed

and interpreted.

And then for the information from the forebrain to be sent back out through the hindbrain

and into the rest of the body.

It only does one thing, but that one thing is incredibly vital because if you cannot

connect between your body and the information being processed in your brain, you're just

not going to be functioning.

Now the forebrain.

The first part of the forebrain, which basically sits atop the midbrain, is called the limbic

system.

It's also known as the reptilian brain, your animal brain.

It's where all your basic instincts take place.

So if you've heard of the amygdala, if you've heard of the hypocampus, if you've heard of

the hypothalamus - that's all in the limbic system.

Basic things, such as the amygdala.

The amygdala is responsible for the fight-or-flight response if you've ever heard of that.

When you are under stress and scared, what is your reaction?

Do you go into a fight mode, or do you flee the situation?

And does it vary based on the situation?

Now some of you may be wondering why is there a picture of a clothes rack.

That's because your limbic system is responsible for keeping all of your thoughts organized,

for keeping the information in your brain organized.

Otherwise, you can imagine with all the thinking that you do, all the knowing that you do,

if it wasn't organized in some way, shape, or form, it would be utter chaos and you wouldn't

be able to do anything at all.

It's also responsible, your limbic system, for basics - the emoji with the hungry face.

Hunger.

Thirst.

Sleepy, and I do mean sleepy.

Not your circadian rhythm, but the "Oh, I'm tired and I wanna go to sleep."

That's all in the limbic system.

Basic emotions, the three emojis on the bottom left there.

The three basic emojis you can see in your pets, if you have dogs or cats.

You can see when your dog or cat is happy.

You can see when your dog or cat is sad.

You can see when your dog or cat is angry, because those are the very basic emotions

that we have in our limbic system, in our animal brain, in our reptilian brain.

Now the other part of the forebrain is the cerebral cortex where we have four lobes.

And the first lobe here is the occipital lobe, which is right here at the back of your head.

All is does is vision.

That's it.

We have an entire lobe dedicated to nothing but interpreting vision.

So if you see the world in color, if you see the world in black and white, if you are color

blind - blame it on your occipital lobe.

Moving up next to your ears, we have the temporal lobe, where it does everything related to

auditory stimulation.

Now you can tell from the picture on the top left - it's responsible for words.

It's responsible for language.

It's responsible for communication.

But if you look at the bottom picture where there is a party and celebration, it's also

responsible for social things.

If you think about it, the words and communication - aren't they key to every good social even

that you go to, the interacting with other people?

The understanding what they're saying?

Having fun, laughing?

All of this is the temporal lobe right here by your ears.

Now the frontal lobe - three key things.

Personality.

Logic.

And complex emotions.

For teenagers, with the onset of puberty, the frontal lobe has a growth spurt, which

is why a lot of personality, logic, and complex emotions changes come at adolescence.

Because that person is trying to figure out what do I like to do?

The faces all the way on the top left that are the rainbow colors - who am I?

What do I like?

That's personality.

They're figuring it out because now they have new access to skills.

Logic, which is the gears in the brain.

Figuring out logic, making logical connections between things.

Being able to think hypothetically, abstractly.

Making those huge leaps.

And then all of those different complex emotions.

These are not the basics, but they can include the basics.

For example, a complex emotion - anticipation.

Anticipation - you'll have a little bit of happy in it.

You'll have maybe a little bit of fear in it.

Maybe a little bit of anxiety.

Maybe a little bit of joy.

It's a very complex emotion.

There's a lot of things happening.

And that's all the responsibility of our frontal lobe.

Now, the last lobe we're going to be covering is the parietal lobe right here on the top

of your head.

It deals with the other senses we haven't discussed, such as the chef who is smelling

a bunch of herbs there.

Sure he's going to use it in food, so there is going to be smelling and tasting involved

in the food there.

It also includes awareness of body parts, which if you look at the baby in the bottom

left who's staring at his feet like "Oh my god, are those my feet?"

Yes, being aware that those are your feet, these are my hands, these are my body parts

- I know where they are.

That is the responsibility of the parietal lobe because it's also responsible for complex

motor activity.

So being aware of the body parts.

Dancers.

If their parietal lobe is damaged, they can't dance anymore because their complex motor

activity capability have been destroyed.

So those are the basics of the brain, just for a quick overview for general psych.

So, thank you.

Bye bye.

For more infomation >> The Brain - A Quick Review for General Psych Class by Dr Z - Duration: 8:06.

-------------------------------------------

Starcraft 2 (ซับไทย) - Legacy of the Void Campaign P4 - For Aiur! (Brutal/All Achievements) - Duration: 17:48.

For more infomation >> Starcraft 2 (ซับไทย) - Legacy of the Void Campaign P4 - For Aiur! (Brutal/All Achievements) - Duration: 17:48.

-------------------------------------------

Osinbajo appoints 14 resident electoral commissioners for INEC - Duration: 2:40.

Osinbajo appoints 14 resident electoral commissioners for INEC

- The appointments by Acting President Yemi Osinbajo comes after the confirmation of the National Assembly. - While 13 of the newly appointed are in their first term, one is currently observing his second term.

Acting President Yemi Osinbajo has reportedly granted approval for the appointment of 14 new Resident Electoral Commissioners (RECs). The newly appointed would be joining their colleagues at the Independent National Electoral Commission (INEC).

A statement by Bolaji Adebiyi, the director of press, office of the Secretary to the Government of the Federation (OSGF) said 13 of the new appointees are in their first term.

The 14 appointees are to work as RECs for INEC. Hussaini Halilu Pai of the Federal Capital Territory (FCT) was re-appointed. The newly appointed are:. Professor Godwill Obioma (Abia).

James Lorliam Apam (Benue). Dr Nwachukwu Orji (Ebonyi). Dr Iloh Joseph Valentine Chuks (Enugu). Dr Nentawe Goshwe Yilwatda (Plateau).

Mr Emeka Ononamadu Joseph (Imo). Obo O Effanga (Cross River). Professor Francis Chuckwemeka Ezeounu (Anambra).

Agboke Mutiu Olaleke (Ogun). Alhaji Ahmad Makama (Bauchi). The statement added: "These appointees have been confirmed by the Senate of the Federal Republic of Nigeria and therefore the appointments are with immediate effect.

NAIJ. com had earlier reported that Acting President Yemi Osinbajo has approved the appointment of 14 chief medical directors and medical directors of different Federal Teaching Hospitals, Federal Medical Centres and Specialists Hospitals in Nigeria, Premium Times reports.

In an approval letter signed by the deputy chief of staff to the Acting President which was addressed to the minister of health Isaac Adewole, the five of the appointees will be serving their second and final terms.

Không có nhận xét nào:

Đăng nhận xét