#emanator of propagation!reader
Explore tagged Tumblr posts
walpu · 6 months ago
Note
Emanator of Propagation! Reader x Argenti, the knight sees beauty even though reader thinks they are too ugly to be looked at.
LET'S FUCKING GOOOO
34 notes · View notes
lookforsomeoneelse · 3 months ago
Text
mwehehehehe
ugggghhhhh SUMMER’S ALMOST OVER HOOOOOWWWWWWW
anyway i’m done procrastinating so like. uh. idk. wrote this mostly for me but if yall like it me can do part 2 or something
so you know how normally self aware au’s go something like this:
-reader gets game
-reader plays game
-characters think that reader is god
-player gets isekaied into game
-plot
or something?
well uh
imagine you aren’t the player.
SAHSRAU, but you watch your friend play the game (oh, did i mention you’re an eldritch horror? (not that you know it))
-you don’t exactly remember the date, but it roughly started when your friend started to freak out over Hoyoverse’s newest release: Honkai: Star Rail. they freaked out over the leaks, the beta, everything related to it.
-you, being the busy individual that you were, decided not to partake in these events, as you had your own responsibilities and interests. you couldn’t devote more of your precious time, unfortunately.
-out of consideration for your friend, however, you decided to ask them what the game was all about.
-your questioning starts a rant that lasts a little longer than you would like it to, where you get a brief summary of Honkai Impact 3rd before they tell you what they know about Star Rail.
-about a year has passed since that conversation, and a lot happened.
-most relevant to the story here, your friend has been diligent in their gameplay of… what was the game called, again? …ah- yes, Honkai: Star Rail!
-they’ve told you about the fun they’ve had and the challenges they’ve conquered; their greatest achievement being the completion of MoC 11, you think they called it?
-anyway, you’ve just noticed that you’ve been pinged a bunch by… your friend? kind of weird, but you open up discord and see what’s causing all the commotion.
-you find out that it has, in fact, been one year since the release of Honkai: Star Rail, and your friend wants to show you all the progress they’ve made over the year.
-they tell you to hop on a call so that they can share their screen. not long after the message is sent, you get a prompt and a little ring with your friend’s username next to it. it’s a call.
-eh, whatever. you’ve got time to kill, so you accept the call.
-they’re pleased to see your presence- they share their screen. and so they begin rambling about relics and 50/50s and their builds for their characters. the one they have on display currently is a woman named Ruan Mei.
-you barely have a grasp of what they’re talking about, so you do the equivalent of nodding your head and simply respond “mhmm” to everything they say.
-meanwhile, on the other end, Ruan Mei… to put it in very very very light terms-
-she is not in a good mood. -she’s normally apathetic even with her back turned to one of the most dangerous entities in the universe: an emanator of propagation, and even if it was a replica. it was dangerous. but to her, it didn’t feel like it was.
-that is not at all the case now.
-she feels an overwhelming presence all around her. she struggles to breathe or even blink, in terror of what the being that’s gazing upon her would do.
-her mind discards her research, her purpose- all in favor of thinking of a way to get this gaze off of her, because she doesn’t want it. she originally desired to become an aeon. she doesn’t want to anymore.
-no more.
-no more.
-she can hear whispers weaving themselves into her brain, clawing into her skull and scarring her being.
-and to top it all off, she can feel all of these sensations, akin to a flickering lightbulb ages old, going dark after the long years of shining in the darkness.
-meanwhile, on your end, you’re alt-tabbing to check on other sites, all while listening to your friend explain the game’s lore as best they can.
-what a day it is.
_________________________________________
A/N: ohhhh my goddddddd this toookkkk wwwwaaaaayyyyy tttttoooooo long because life is a bastard
anyway the TL;DR of the au is that you watch your friend play HSR, and while their account isn’t self aware on its own, it comes to life when you watch them. unfortunately, they see you as an eldritch god- H.P. Lovecraft type, and so they start a cult that revolves around you so that you don’t put them in a life of eternal suffering. which basically means that they cause the game to crash… occasionally.
why did i write this? because i’m a bastard, i guess. or maybe it’s because i spend too much time on the internet.
maybe it’s both. who knows?
you wanna use the idea? well, i don’t get paid for this and you probably don’t either. good luck with that.
anyways, this shitass is off to do god knows what yet again!
105 notes · View notes
sincerelyy-youres · 1 year ago
Text
Gaze Upon Me (Yandere Nanook × Aeon! Reader)
Sypnosis: The vast oceans of stars in the sky offers many great and terrifying encounters, one of which is when Aeons cross paths with one another. Others devour and others work together, but what if one falls madly in love with the other?
Tumblr media
TW: Obssesion, stalking and implied kidnapping. Read at your own risk
You were too stubborn to understand Akivili's warning.
It's not as if it wasn't important that you weren't giving it much thought, but it was the fact that you already convinced yourself that it won't happen. It was already a thousand centuries ago when you first defended the people of "Adlivun" from the raging war declared by their very own emperor. You were weak then, being born just a few years ago from the death of a star system that greatly cherishes perseverance, and as all aeons needs to get a job done, you did your first and very own.
You are the Aeon of Resistance, and people who is opressed and cornered deserves as much as justice that they need to have. You answer to their every call, to their every will to resist, and your greatest regrets is when your own resistance falters, letting the enemy win, letting the opposition lose.
Adlivun is your first and biggest regret.
Being the youngest Aeon back then, you underestimated the power of man. The Emperor's manpower and soldiers were much more than a small group of people that wanted to resist, relying solely on your grace. Before you can even think of a way to save your people, the power of the emperor advances, leaving you hopeless. You left Adlivun in shame that day, the image of mangled bodies of the people that once revered you still fresh in your mind, their dying eyes showing a shade of disappointment.
You ran away far, far away from the accusatory stares that you feel in your back until you bumped into Akivili, The Aeon of Trailblaze, who had just left Adlivun in disbelief. You didn't beg them to let you in, to ask what had become of Adlivun as you left, but nevertheless they took you in, and said you were free to stay with them until you learn to become your own.
It was the first ever recorded interaction in which two aeons traversed the stars together. Perhaps Fuli the Remembrance gazed at the moment, at the interaction, and deemed it worthy of a memory in the garden of recollection. As the two of you traveled together, Akivili told you of what happened to Adlivun, and the fate that might befall of you soon.
"When I arrived there, Adlivun was an absolute resorvoir of chaos. What remains of them were unlucky enough to be in the path of the Aeon of Propagation." They said, their voice expressing disappointment. Akivili had no physical form, and you only see them in a form of a warm light, like a companion in every cold weathered, or rather, in this cold universe's travels. Perhaps in the entirety of their journey, never had they come across to something as cold as the fate of Adlivun.
"I left Adlivun when the resistance fell... perhaps fate recognizes the wishes of the dead." You said, having mixed emotions of the situation. As the Aeon of Resistance, you of course value absolute persistence, but your people, the opposition of Adlivun had long perished. What victory is there to enjoy when the people are dead?
"I saw the Emperor and his people fight with all their might, but their physique is evidently tired with their previous war." You can almost see Akivili shake their head, "Eventually Tayzzyronth the Propagation defeated what was left of there, and their faction, the Swarm's March, led the final blow"
"I left before Tayzzyronth notices me, but in a distance as I jumped between universes, before I even bumped into you, I saw how Adlivun died...It exploded, then a gold glow emanated from all the debris."
Akivili was quiet after their statement and it made you think. A gold glow emenating from a fallen world means one thing: An Aeon is born. Considering what Adlivun's state is before it died, theres no question what kind of Aeon it was. Destructive, chaotic, always craving of absolute doom, reckless, and wrathful. It was--
"An Aeon is born" said Akivili, after that long silence of what seems of them pondering. "And a path along with them. The path of destruction. They are probably moving and causing chaos everywhere as we speak, and posing a threat, especially to you."
You frowned. "But what do they have to do with me? The emperor won against the resistance and I am not the one who destroyed their homeworld. It is not reasonable for them to come after me." No matter what angle you look at, the path of destruction should not be directed to you, and if by any means it does...
"Had you ever heard of history repeating itself?" Akivili suddenly said, cutting you off of your train of thoughts. "Destruction seeks resistance, not just of absolute infliction of doom. Think of it this way, where is the thrill when everyone just submitted to domination? Something had to resist, and the process of breaking that something into submission, is what true destruction is"
If the path of destruction is directed to you, then you are to resist. But, you still resist the fact that destruction persuing resistance is written in finality. If what destruction seeks is absolute submission, then why go through the long and tedious process of persuing resistance knowing that it won't give in? It is resistance for a reason. If true destruction is breaking something into submission, why not persue a path that manifests the values of submission so the job can be easily done?
You heard Akivili chuckle at you, they had probably noticed that you were so deep in though about their words. Just as you were about to spout a long rebuttal, Akivili spoke, not wanting to argue any longer.
"I see you still resist the possibility, but soon enough you'll understand. Just a warning, though, you may be the Aeon of Resistance, but you can't resist everything."
And with that, Akivili left you on your own. You sat there, pondering over the Aeon's words. How you wished you listened to them before they perished, back then. Their radiant light, how you wished you still see how beautiful it is before it was snatched from you by darkness, holding them at the palm of destruction's hands before ultimately blowing out what was left of their power.
If anything, you should have known better than to question your companion's thoughts. If only you just listened, if only you didn't resist their concise analysations, then you wouldn't have to deal with this abomination of man who chases you althroughout the universe as if you did something unexcusable to him. Then, you wouldn't have to jump to one universe after the other seeking temporary refuge when you lingered too long.
Resistance persevere because it fights for what it was worth fighting for. It was ironic, considering you choose to constantly flee from the oppression, but it was almost understandable. You fled when the resistance of Adlivun fell. So you also constanly fly away when Akivili was killed. Both of which was worth fighting for, and as much as the reality pains you, the truth is that resistance falters when the reason to resist dies.
After all, Akivili...you'd seen them die before your very own eyes. And in which, before the destruction constantly chases after you
This space you were currently in, was a temporary home you'd find yourself residing after barely getting from the Aeon of Destruction. If anything, you yourself doesn't know why he is constantly chasing after you, but you don't intend to find the reason why, and you don't want to satisfy him by giving yourself in.
Even though the will to resist is weak, it will still resist. Even as you felt the weight of his gaze, again, after barely getting away, you'll resist. That gaze that felt like it materializes into a physical form, it was all too familliar, following your every move as you panicked, as you desperately tried to find any hint of his arrival to counter his chase with flight.
He's here
Your focus shifted as you felt his gaze narrow, and along with it was the visions it brings. Your vision blurs, to what was once the stars that fills this desolate space, begins to open a portal of gold. Gold eyes, white braided hair and tanned skin. Deformed arms and gold corruption seeping in between the cracks in his skin, and the sharp, smothering, and somewhat possesive gaze as he looks down at you. He smiled, and it became a terrifying grin as his arms reaches out for you, seeking to trap you inside a make shift, sub-reality prison that only he knew the existence of.
It made you unsettled, but still quick witted enough to avoid his confrontation as he charges towards you. Just in time to get out of his inflicted delirium. You looked at him, and when he realized that he didn't caught you in his arms after all, he went again and charges towards you, and he looks so confident that he will succeed, making you flee towards the nearest possible exit in this space that you once found comfort into, where his prescence wasn't shown.
But your escape was short lived when the exit was apparently blocked by some kind of a Gold barrier, the light of the next space fading away like how a light in the end of the tunnel would be blocked if the tunnel collapsed. Despairingly, you turned around, only to see his face expressing a delirious satisfaction.
Akivili was right. History repeated itself. The emperor defeated the resistance of Adlivun centuries ago and now... you were being captured by the remains of that war. It was humiliating, knowing all you can do is to resist.
Slowly, Nanook's arms reaches out for you, and all you'd ever do was fight his possesive gaze with your wrathful glare. Your power was blocked by some kind of force, One that you cannot exactly root out it's origins, but all you can say is that it was slowly inviting you in a forced slumber, whispering incoherent lullabies and doom, And the last you'd ever seen was his satisfied smile.
Perhaps, the true reason of his unnatural and perplexing obssesion over you was already there, laid out for you, just in the naked eye. It was as simple as Akivili had said it, that Nanook wanted "true destruction". And in true destruction, there was you.
It was too late now, to understand Akivili's warning.
779 notes · View notes
weirdletter · 4 years ago
Photo
Tumblr media
Dark Magic: H.P. Lovecraft, Starry Wisdom and the Contagion of Fear (Law of Contagion Monograph Series), by Johnny Decker Miller, Three Hands Press, 2020. Cover art by Johnny Decker Miller, internal illustrations by Liv Rainey-Smith, info: threehandspress.com.
The writings of the celebrated American author of weird fiction H.P. Lovecraft are known for their groundbreaking innovation, particularly their treatment of ‘the other’ or otherness, incepting a palpable state of alienation in the reader. A recurring feature of his stories is an unseen or obscure entity emanating psychic malfeasance, precipitating fear, paranoia and ultimately a collapse of mental order. This emanative quality, though originating in the medium of fiction, is nonetheless transmissible from mind to mind and beyond. Dark Magic explores the contagious qualities of Lovecraft’s tales, with their embedded sense of dread and their dismantling of human reason, and how they have propagated in the near century after his death, influencing literature, art, pop culture and the occult revival. In perhaps the most immediate example, the infectious qualities of Lovecraft’s ideas are seen to parallel virology, mass infection, and the fraying state of the human psyche during times of pandemic.
19 notes · View notes
monkeyandelf · 5 years ago
Text
Nephilim: The Watchers of Humanity
Tumblr media
The prophet Enoch is considered one of the first contactees in history. He maintained communication and received instructions from some deities that showed incredible technological development, and his adventures were reflected in four books that even relate his interstellar journey in one of the ships of these "celestial entities". These Watchers acted as true custodians of humanity, manipulating our ancestors. However, some of them rebelled against their bosses, taking sides with human beings ... They took me to a place whose inhabitants are like burning fire, but when they wish, they appear as humans, ”we read in Book 1 of Enoch. Who hold what beings aliens they appeared before the human species under the mask of divinity, and in addition we delved into the line of descent of the first human specimens (which we now know as Adam and Eve), we find a key character in this plot of manipulation, which supposedly He is the author of one of the oldest and most revealing works in the world: The Book of Enoch. If we started from Adam, Enoch would be the fruit of the seventh generation and, therefore, father of Methuselah and great-grandfather of Noah. But who was Enoch? Why did God raise him to the status of a prophet? For what reason was he chosen as "the first learned man"? The Hebrew name of Enoch translates as "The Initiate", a role that he undoubtedly played, because he became a repository of profound knowledge. However, contrary to the mainstream of thought, that wisdom was far from bringing autonomy to the human species. Rather the complete opposite. From the study of the four sacred texts that describe the experiences of the prophet (Book of Enoch, Slavic Book of Enoch, Book of the Secrets of Enoch and Enoch Coptic), a surprising account emerges, revealing a master plan on the part of the God Yahweh to "instruct" the prophet in a series of blood rituals and, consequently, to propagate a monotheistic religion as a control system. ON BOARD AN INTERSTELLAR SHIP If we listen to the Bible, Enoch lived 12,000 years ago at the time when the Watchers or Custodians of the Lord descended to Earth to maintain lustful relationships with the daughters of men. "In the days of Yared, my father, (the angels) transgressed the word of the Lord. Behold, they sinned, transgressed the law of the Lord, changed it to go with women, and sin with them ... ”(Enoch 106: 13-16). In his texts, Enoch does not refer to God as Yahweh but as the Lord, and designates angels as his Keepers or Watchers. The prophet's description of his ascension into heaven constitutes one of the richest and most revealing accounts in the ancient world, as it offers interesting details about the nature of these "heavenly" entities. The Book of Enoch ended up being excluded from the biblical compilation, since the hierarchs of the Catholic Church sentenced that his book had not been revealed by God. Only the Abyssinian Church in Ethiopia included it in its Old Testament. The story brings together almost all the characteristic ingredients of a modern episode of alien abduction, providing absolutely amazing elements for any minimally seasoned reader. Enoch was sleeping in his bed when he was visited by two beings whom he described as "enormous men", who called him by name and asked him to accompany them to ascend to heaven. "Behold, two tremendously tall men appeared to me," we read in the Enoch's Book- So much so that I had never seen anything like it on Earth. Their faces shone like the Sun, their eyes were also like burning light, and fire came from their lips, emerging with the clothes and singing of various types in purple appearance; his wings shone brighter than gold, his hands whiter than snow. Enoch's description of these entities coincides with that found in the Bible when he details the characteristics of angels: bright and shining-eyed beings. They even say of themselves that they were born to a virgin mother. Were they the result of artificial insemination to create hybrids with extraterrestrial genetics? I am aware that many readers think I am going too far, but let's continue with the account of the facts. The angels commanded Enoch to leave a note addressed to his sons - Jerusalem, Regim, and Gaity - before they departed so that they would not seek him anywhere and patiently wait for the Lord to bring him back. Enoch narrates that two angels made him get into the spirit chariot, an experience that he describes as "being on board a palace capable of sailing through the heavens", and then said "chariot" transports him to another much more majestic place, to which the prophet called "Heaven of Heaven". My interpretation is that an aircraft displaced it to a larger one, inside which light emanated from everywhere. "He transferred my spirit into the Heaven of Heavens," writes Enoch, "and I saw that there was a building made of glass, and among those crystals, tongues of living fire. My spirit saw a circle that surrounded this building with fire and in its four corners there were sources of live fire ». Our protagonist makes it clear that a circle of fire surrounds the entire building. Are you referring to a powerful magnetic field enveloping the mothership? A JOURNEY THROUGH THE COSMOS When Enoch entered that glazed complex, he described a transparent floor that reflected stars and celestial bodies. The vastness of the cosmos moved under his feet, as the aircraft moved away from Earth. Our protagonist refers to "a first heaven, a second heaven, a third heaven ...", and so on. Precisely as an astronaut would describe the different ascending layers of the atmosphere until reaching space. "I saw a burning fire," continues Enoch recounting, "and beyond those mountains is a region where the great Earth ends, and there the heavens culminate. Then a deep chasm was shown to me between columns of celestial fire, and I saw in it columns of fire that descended to the bottom and whose height and depth were immeasurable; and beyond this abyss I saw a place over which the firmament did not extend, under which there were no foundations of the earth either; on which there was neither water nor birds, but it was a desert and terrible place. There I saw seven stars like great mountains, burning, and when I asked about this, the angel said to me: ‘This place is the end of heaven and Earth; it has become the prison of the stars and the powers of heaven. " Enoch entered rooms plagued by fruit trees and springs that gave honey, wine, milk, and oil, marveling at what his eyes beheld. But more surprising is that inside he saw about two hundred angels. One of them revealed to him that this place was reserved for the righteous and those who served the Lord. However, the prophet did not take long to go from joy to terror, since he ended up entering "infernal halls" where he observed angels subjected to cruel torture. This is how the scene describes the Enoch's Book: «From there I went to another place more terrible than the previous one and I saw something horrible: there was a great fire burning and flaming, and the place had cracks to the abyss, full of descending columns of fire, but I couldn't see its dimensions neither its magnitude nor would make conjectures ... ... Then I said: 'How dreadful and terrible it is to look at this place!'. Answering me, Uriel, the Watcher and the Saint, who was with me, said: 'Enoch, why are you so scared and scared?' I replied: "It is because of this terrible place and because of the spectacle of suffering." And he said to me: "This place is the prison of the angels and here they will be prisoners forever." SECRET KNOWLEDGE Enoch asked what they had done to deserve that punishment; the response was to disobey the Lord's orders for revealing secrets to man: "These are the Watchers who descended on Earth and revealed to humans what was secret and led them to sin." Later, the Watchers confess the names of some of those rebel angels: "The name of the room is Panamu'el; He showed the sons of men the bitter and the sweet and revealed to them all the secrets of his wisdom: he taught humans to write with ink and papyri and many have gone astray because of it, from the beginning until this day. Because men have not been brought into the world for the purpose of strengthening their belief in ink and paper »(1-Enoch: 8-10). In this passage we find an important revelation: contrary to general opinion, angels are not punished for mating with earthly women, but for revealing divine knowledge and secrets only accessible to the gods, which means that not all of these entities maintain the same attitude towards man. Now, it seems clear that some kind of superior deity had given the Watchers express orders not to transmit any kind of knowledge to the human being, in order to keep him enslaved under his tyranny. However, some of these angels ended up contravening this mandate, revealing to the Earthlings the "secret science". Enoch is unable to assimilate so many and such intense visions, and suffers a shockcollapsing exhausted. Then the archangel Gabriel appears, who helps him to get up and leads him into the presence of the Lord, with whom he maintains a long dialogue: "And the Lord summoned me and said to me: 'Enoch, sit on my right with Gabriel.' And I bowed down before the Lord, and the Lord said to me: 'Beloved Enoch, everything you see, all the things that stand, I tell you, even before the beginning, I have created everything from non-being , and the visible things of the invisible. Enoch listen to these my words, nor have I told my angels my secret, nor have I told them its origin, nor my infinite dimension, nor have they understood my creation, which I am telling you today ’» (2-Enoch 24: 1-3). The Lord forbids knowledge for human beings and punishes those of his who disclose it, yet he commissions his angels to instruct Enoch in scripture and the celestial sciences. Therefore, that God who does not want to transmit his wisdom to mortals, teaches Enoch those skills that interest him, driven by purposes that we could currently define as social engineering or control of the masses. TECHNOLOGY TO SEE THE FUTURE Enoch learns to write, and the Lord asks him to show the world what he has seen and what has been dictated to him: "And the Lord said: 'Come down to Earth and tell your children everything I have told you, and everything you have seen. Give them the manuscript books, and they will read them and know me as the creator of all things, and they will understand that there is no God but me. "2-Enoch 33: 2-9). At that instant, the Almighty tells Enoch that he is going to take him back to Earth. You will have 30 days to make God's message known through his writings. After that time, the Lord will again "rapture" the prophet to heaven, this time never to return. When Enoch returns to our world, he compiles everything he has learned and becomes a patriarch of knowledge: «This was the first of the humankind born on Earth who learned scripture, doctrine and wisdom, and wrote the signs in a book from heaven, according to the order of their months, so that men would know the seasons of the years, according to their order, by their months. He was the first to write a revelation and testify to mankind in the earthly race. Enoch even quotes the name of the angel who instructs him: «Because the signs, the times, the years and the days were shown to me by Uriel, the Watcher, whom the Lord of Glory has entrusted with all the lights of heaven and in the world , so that they reign on the face of the sky, they are seen from the Earth and they are the guides of the day and of the night, thus the Sun, the Moon, the stars and all the auxiliary creatures that travel their orbits in the chariots of the sky » (1-Enoch: 75: 3). «The vision of the Saint of heaven was revealed to me and I heard all the words of the Watchers and of the Saints –we read in the Enoch's Book- And because I listened to them, I have learned everything from them and I have understood that I will not speak for this generation, but for a distant one that is to come ». As the days passed, an angel instructed Enoch on how to transcribe all the information that flowed through a Celestial Tablet, a technological artifact with amazing power, as it was capable of calculating future events. Was it a quantum computer capable of forecasting time lines of future probabilities? WARS BETWEEN GODS Enoch wrote what the angel transmitted to him: "He said to me: 'Enoch looks at these heavenly tablets, read what is written there and point to each piece of information.' I looked at the heavenly tablets and read everything that was written and understood everything; I read the book of all the actions of humanity and of all the children of the flesh that are on Earth, even the remote generations »(1-Enoch 81: 1-2). The "chosen one from heaven" entrusted all the documents to his son Methuselah: "Preserve my son, Methuselah, the book from your father's hand and give it to the generations of the world. I have given you and your children wisdom so that they will give it to their children for generations, wisdom that is above their thoughts »(1-Enoch 82: 1). The Sumerian texts already describe these "magic tablets" as coveted objects of power, since those angels or gods who made them, would have the ability to rule the world. In a story called The Zu Myth we read as one of the subjects of the mighty Enlil, a Anunnaki –Sumerian and Akkadian deity– called Pazuzu or Zu, which means «He who Knows», manages to steal the Celestial Tablets and puts the entire Council in check Anunnaki, unleashing a war without truce. When Zu is done with the tablets, he believes himself with the ability to do anything: "I will take the Celestial Tablet of Destinations, I will rule the decrees of the gods, I will establish my throne, I will be the master of the heavenly decrees, I will command the Igigi - minor gods of the Sumerian tradition - in their space ». Through the Celestial Tablets, Enoch can experience visions of events that would occur hundreds and thousands of years in the future. In his texts, he even predicted the construction of the Tower of Babel, the prophet Elijah's ascent to heaven in a chariot of fire, and even the Great Universal Flood that would loom over the Earth 1,000 years later. When those thirty days had elapsed, Enoch prepared to leave and 2,000 individuals gathered to bid him farewell: "When Enoch had spoken to the people, the Lord sent darkness on the surface of the Earth, and there was darkness, and it covered those men who were standing next to Enoch, and they took Enoch and took him to Heaven, where the Lord is; and he received it and placed it before his face, and the darkness dissipated from the Earth, and the light returned »(2-Enoch 67: 1). REBEL ANGELS As a final cherry, and always following the instructions of the Lord, in the place where Enoch had been raptured to the top, various animal sacrifices were rendered: “Methuselah and his brothers, and all the sons of Enoch, hurried and erected an altar at the place called Achuzan, from where Enoch was taken up into the sky. And they sacrificed oxen and called all the people together, and shared the sacrifice before the face of the Lord »(2-Enoch 68: 6-7). Enoch's most revealing prophecy, that of a flood on Earth, would come after three more generations of his lineage. However, a latent problem within Yahweh's hierarchy was still raging: his angels descended to Earth to copulate with Earthlings, blinded by their beauty and desire to procreate. The secrets of the great deity were in danger day by day, as these Watchers revealed to the wives that they had taken prohibited knowledge that could elevate men to the category of gods. And that was something that Enlil-Yahweh could not allow. Only through a drastic solution would the conflict be resolved. A solution that would end the life of the human species on Earth ... At Enoch Book 1 we read that a total of 200 angels rebelled. Even the names of these Watchers who took the earthlings as wives are quoted: "Let us go and choose women from among the daughters of men and beget sons." But Shemihaza, who was their boss, told them: "I fear that you do not want to carry out this action and that I am the only one responsible for a great sin." They replied: "Let us all take an oath and let us all commit ourselves under an anathema not to go back on this project until we actually carry it out." Then the two hundred swore together under anathema, and all of them descended upon the top of a mount they called Hermon. "These are the names of their chiefs: Shemihaza, who was the chief, and in order in relation to him, Ar'taqof, Rama'el, Kokab'el, –'el, Ra'ma'el, Dani'el, Zeq'el, Baraq'el, 'Asa'el, Harmoni, Matra'el,' Anan'el, Sato'el, Shamsi'el, Sahari'el, Tumi'el, Turi'el, Yomi'el, and Yehadi 'the. These are the heads of ten » (1-Enoch 6: 1-8). From the union between these angels and women giants were born, the so-called Nephilim, which in Hebrew means "fallen" or "knocked down." In Greek translations it is given the meaning of giants, as in Aramaic. However, certain scholars defend that Nephilim comes from the Aramaic term NEPHILA, which means «Those who are from Orion», since in Aramaic Orion is Nephila. Did the Anunnaki come from the Orion Constellation as proposed by the researcher Robert Bauval, who defends the theory that the Egyptian pyramids are aligned following this constellation? WHEN THE NEPHILIM DOMINATED THE EARTH The fact is that in several excavations in the Middle East various large skeletons have been found, which means that these giants really existed, although they would not necessarily have to be the remains of the Nepfilim, but rather of human beings with genetic reminiscences of these beings. The Nepfilim and Anunnaki measured between three and six meters, so the discovery of a skeleton of these characteristics would mean a before and after in the way of conceiving human history. Returning to the story that concerns us, or that most angered Yahweh, the angels revealed secrets to their earthly wives: “Shemihaza taught incantations and cutting roots; Hermoni to break spells, witchcraft, magic and related skills; Baraq’el the signs of lightning; Kokab’el the omens of the stars; Zeq’el the lightning; –‘He taught the meanings; Ar’taqof taught the signs of the Earth; Shamsi’el the omens of the Sun; and Sahari’s the Moonmen, and they all began to reveal secrets to their wives » (1-Enoch 8: 3) The forbidden knowledge also included weapons to defend themselves, so we must assume that practically all the secrets of the smithy and the foundry were revealed by these beings, both to learn to use them in self-defense and for crafts and decoration: "And Asa ' He taught men how to make iron swords and copper breastplates and showed them how gold is mined and worked to completion, and as far as silver is concerned, to emboss it for bracelets and other ornaments. He taught women about antimony, eye makeup, gemstones, and tinctures. And then the wickedness grew a lot and they took the wrong paths and got corrupted in every way ». As the reader can appreciate, Enoch was dictated that any knowledge given to the human being is malicious, dark and sinful. Basically, the Lord condemns any technical or moral advance that humanity can develop on its own. ETERNAL PUNISHMENT FOR THE INSURRECTION Enoch is clearly a victim of "brainwashing," since he is not allowed to doubt in the least that the Law of the Lord is unquestionable. Any opposition to it means death. Only submission and fervent fidelity constitute the only way to salvation. This is how Enoch expresses the threatening tactic of his God towards sinful men and angels: «The eternal God will walk on Earth, on Mount Sinai he will appear with his great army and will arise in the force of his power from the top of the skies . And all the Watchers will tremble and be punished in secret places, and all the extremities of the Earth will be broken, and fear and a great tremor will take hold of them to the ends of the Earth. The high mountains will crumble and crumble, and the hills will crumble and melt like wax before the flame. And the Earth will divide and everything that is on Earth will perish and there will be a judgment on everyone. Without a doubt, an entire apology of terror and threat in the service of a false God who proclaims himself unique and almighty. To capture these two hundred rebel angels, Yahweh had seven lieutenants, among whom four stood out: Michael, Sariel, Raphael and Gabriel. The Lord instructed them to punish the fallen angels harshly, but especially interesting is the order that he transmitted to the archangel Michael: «And the Lord said to Michael: 'Go and announce to Shemihaza and all his accomplices that they united with women and they defiled them in their impurity, that their children will perish and they will see the destruction of their loved ones! Chain them for seventy generations in the valleys of the Earth until the great day of their judgment ’" (1-Enoch 10: 11-12). The same we read in 2 Peter: "God not only did not forgive the angels who sinned, but by throwing them into hell, he delivered them to prisons of darkness to be reserved for judgment." The angels of the Lord, after a skirmish against the rebels, capture them by locking them in a parallel world, a kind of "exile zone" where they remain in a latent state - dead in life, so to speak - while awaiting their sentence on the Day of the Final judgment. The word "Hell", present in Peter's paragraph quoted above, comes from the Greek term Tartaros, which translates as "The deepest abyss of Hades". Where exactly does the cited text refer to? Are we before an exaggeration fruit of the overflowing imagination of the authors? It is curious that even in the mythology Roman, Tartarus is the place where the enemies of the gods go. In his work The Aeneid, the Roman poet Virgil describes this Hell as a gigantic space at the deepest point of the Underworld, always enveloped by a river in flames that he designates as Phlegethon, and sealed by triple walls so that his captives cannot escape. UNMASKING THE GODS Taking into account that we know the reptilian aspect of these "celestial entities" thanks to the figures and representations of different cultures, we wonder why "good angels" are shown with the same aspect of a human being. The answer is simple. If you wanted to manipulate an ant colony to gain their trust and infiltrate their nest, would you appear before these little animals in human or ant form? All of these Anunnaki gods looked very similar: reptilian attributes, tall stature, and scaly skin. Thanks to their psyche they were able to deceive our ancestors, showing themselves under the appearance that they wanted according to their interests. If they wanted to instill fear, their appearance was grotesque and reptilian; but if they wished to seduce and deceive, they appeared as beautiful humans. This is how these entities, erroneously elevated to the category of gods, managed to get only the victors to write history. But what happened to the vanquished? Of those among your ranks who wanted to help get the human being out of the Holographic Matrix in which we live? As is to be expected, evil always ends up betraying itself, with its threats and ambitions. Perhaps we are still in time to rewrite history with the help of the vanquished, unmasking the victors ... Read the full article
0 notes
certainheartrunaway · 5 years ago
Text
Radio Amateur to Lose License as Part of Enforcement Case Settlement
A New Jersey radio amateur, David S. Larsen Sr., WS2L, of Highland Park, will surrender his Amateur Extra-class license and pay a $7,500 civil penalty as part of a Consent Decree with the FCC to settle an enforcement action. An FCC Enforcement Bureau Order released June 18 said Larsen violated the Communications Act of 1934 and Part 90 rules by operating on frequencies licensed to the Borough of Highland Park for public safety communication.
As part of the settlement, Larsen agrees that he will admit making the unauthorized transmissions, not engage in unauthorized use of a radio station, and surrender radios in his possession capable of transmitting on the town’s public safety frequencies. If the Commission finds that Larsen has made unauthorized radio transmissions or otherwise violates the terms of the Consent Decree, he’ll be subject to an additional $32,500 civil penalty. The agreement stipulates that Larsen may not apply for a new Amateur Radio license for 3 years.
The case stems from a May 2018 complaint of unauthorized transmissions on the Highland Park municipal radio system. FCC agents followed up with several visits to the town.
“Based on information provided by the complainant and direct observations by the Bureau’s agents, the unauthorized transmissions consisted of brief, pre-recorded sounds (such as the sad trombone sound),” the FCC said in the Consent Decree. The FCC said individuals the agents interviewed identified Larsen — a former rescue squad volunteer — as the person who was likely responsible.
Responding to an FCC Letter of Inquiry, Larsen subsequently contacted the Enforcement Bureau and related that the unauthorized transmissions had ceased. Last fall, Larsen, responded to the inquiry through counsel to deny making the unauthorized transmissions. A short time after that, the unauthorized transmissions resumed, and the FCC resumed its investigation, attempting to trace the source of the transmissions. Last March, agents used direction-finding equipment at a fixed location near the complainant’s residence, while other agents conducted mobile direction finding of Larsen’s vehicle in transit.
“The four agents observed Mr. Larsen pull over to the side of the road on the way to his home,” the Consent Decree recounts. “The four Bureau agents observed (a) that during the brief stop, Mr. Larsen remained in his vehicle, (b) while stopped, a brief transmission consisting of the sad trombone sound emanated from the direction of Mr. Larsen’s vehicle on a frequency licensed for use by the Highland Park Radio System, and (c) following the transmission of the sad trombone sound, Mr. Larsen resumed his drive to his residence.”
The FCC said agents returned in April to observe Larsen repeat the earlier behavior, including a similar transmission emanating from Mr. Larsen’s vehicle, according to the Decree.
Source: ARRL
(adsbygoogle = window.adsbygoogle || []).push({});
Equipment
Tumblr media
DISCOVERY TX-500 – HF / 50MHZ
June 12, 2019 No comments
VIDEO Source: http://ea1uro.com/radio/tx500/     Ver essa foto no Instagram   Discovery TX-500, Lab599 Uma publicação compartilhada por Labo... Read more
Tumblr media
ALPHA RF Systems – Hamvention
June 09, 2019 No comments
Read more
Tumblr media
New From TenTec The Omni 7 Plus [ Hamvention 2019 ]
May 29, 2019 No comments
Read more
Tumblr media
Walkie Talkie QRP QSO with XIEGU X5105
May 25, 2019 No comments
Features a built-in highly efficient automatic antenna tuner, split frequency XCVR function, RIT receive fine tuning, NB noise suppressor, NR digital... Read more
Tumblr media
Ampleon announces the industry’s most rugged 2KW RF power LDMOS transistor for ISM applications
May 22, 2019 No comments
Ampleon has released the first of a family of RF power devices based upon its Advanced Rugged Technology (ART) derivative of the proven 9th generation... Read more
Review
Tumblr media
ICOM IC-7610 Review and Full Walk Through
June 15, 2019 No comments
Read more
Tumblr media
How To Fix A Ham Radio AC Ground Loop
June 14, 2019 No comments
Read more
Tumblr media
Portable HF Operation Kit – Ham Radio Q&A
June 12, 2019 No comments
Read more
Tumblr media
Elecraft K4 Updates from Texas Hamcom 2019
June 12, 2019 No comments
Read more
Tumblr media
How Do You Know Your Antenna & Radio Are Setup And Working Correctly?
June 08, 2019 No comments
“A question you may have asked yourself, “Is my radio working? I don’t hear anyone!” Or worse, you can hear other stations, bu... Read more
(adsbygoogle = window.adsbygoogle || []).push({});
Software
Tumblr media
Log4OM 1.36.0 Released
June 15, 2019 No comments
Release notes Version 1.36.0 MAINTENANCE RELEASE Added support to QARTest direct QSO import in Log4OM Communicator (Inbound settings, default port is... Read more
Tumblr media
Ham Radio Deluxe Software from Hamcom 2019
June 14, 2019 No comments
“I was privileged to catch up with Mike, WA9PIE, from Ham Radio Deluxe at this year’s Texas Hamcom. He discusses some new features of his... Read more
Tumblr media
N6XI presentation to NCCC featuring the N1MM+ Spectrum Display
June 12, 2019 No comments
“N6XI made a presentation to NCCC featuring the N1MM+ Spectrum Display. It covers why you would want to use a spectrum display and why it is bet... Read more
Tumblr media
N1MM Logger+ Announces a New Website
June 10, 2019 No comments
Popular Amateur Radio contest logging software N1MM Logger+ has a new website. Changes include fewer pages, better search capability and bug/issue-tra... Read more
Tumblr media
SDRplay – SEAPAC presentation slides
June 08, 2019 No comments
Read more
App - Mobile
Tumblr media
New APP for digital QST
March 25, 2019 No comments
Apple has released a new app for digital QST (version 5.1) readers that use that platform. A long-standing problem involved the inability of some Appl... Read more
Tumblr media
6 Must Have Amateur Radio Apps!
December 24, 2018 No comments
Read more
Tumblr media
iWSPR TX – WSPR for iOS version 2.8 now available
October 16, 2018 No comments
WSPR WSPR implements a protocol designed for probing potential propagation paths with low-power transmissions.  Normal transmissions carry a station’s... Read more
Tumblr media
RUMlogNG2Go for iOS version 3.5.2 now available
August 19, 2018 No comments
Thomas Lindner, DL2RUM, is happy to announce the availability of version 3.5.2 of his RUMlogNG2Go logger for the iPhone and iPad.  RUMlogNG2Go can be ... Read more
Tumblr media
SmartSDR for iOS v2.6.2 Now Available
August 12, 2018 No comments
FlexRadio Systems announces the release of SmartSDR for iOS v2.6.2 is now available for download or update from the Apple App Store. This App requires... Read more
The post Radio Amateur to Lose License as Part of Enforcement Case Settlement appeared first on QRZ NOW - Amateur Radio News.
from DXER ham radio news http://bit.ly/31Hbe1j via IFTTT
0 notes
markacaserta · 6 years ago
Text
Has Huntington, WV’s only newspaper joined forces with the liberal media?
Tumblr media
  Mark Caserta:  Free State Patriot editor
8.5.2018
  Our nation’s number one threat may no longer emanate from a foreign entity, a rogue leader or even threat of war.
Our nation’s single, most urgent peril may stem from within – the liberal media.
I believe the liberal media has successfully propagated a vehement, political discourse that’s become nothing short of a debilitating disease, spreading its effect throughout every bone and sinew of our nation, crippling our Republic and dividing the American people.
And I’m very saddened to report, I firmly believe the Tri-State area has now been infected by this “journalistic disorder.”
For the past 14 years, I’ve been arguably, the primary, if not only, regular local, “conservative” contributor to the Herald-Dispatch (HD) in Huntington, WV.  I’ve never taken that responsibility lightly. I’ve been honored to be the voice of thousands of people who, otherwise, would not have their opinions shared in such a venue.
Together, my readers and I have had some successes.  In the 2016 presidential election, Donald Trump, the conservative candidate, won West Virginia with a whopping 68.5% of the vote per BallotPedia.  I happen to believe my readers and I, along with FreeStatePatriot.com, had some impact on the outcome of our state’s choice.
Following Hillary Clinton’s embarrassing loss to political outsider, Donald Trump, liberals simply lost their grasp of reality.  I believe they’ve proven they hate President Trump more than they love their country and I’ve endeavored to substantiate it with what I believe to be undeniable truths.  My columns have produced supportive evidence showing that no matter what “wins” President Trump has for the American people, liberals are more concerned with delegitimizing his presidency and his supporters than they are with fostering America’s peace and prosperity.
From the miraculous rebound of our economy, to record-low unemployment, increasing labor participation rate, more viable healthcare options, lower taxes, a stronger military and improved foreign relations, President Trump has amassed victories like nothing in my lifetime!  Yet, all the liberal media can do, including local columnists in the HD, is trash Trump based on his tweets, relationships and political incorrectness!
And as with President Trump, my readers have supported my writing through the years because I’ve always done my best to present the truth with integrity and the best interest of the people in mind.
Unfortunately, in my opinion, providing information in the “best interest of the people” is a diminishing aspiration for the HD.  In fact, HD leadership, for all intents and purposes, said just that.
In the interest of absolute clarity and transparency, here is the text from the actual email I received from the HD editorial page editor notifying me my columns would no longer be acceptable for publication in the newspaper.
“Hi Mark: I didn’t find pieces of your column submitted this week acceptable, in terms of your attacks on other columnists. Therefore, I am not publishing it.
 I have also decided that the H-D will no longer publish any more of your columns, partly due to this most recent submission, but also for a couple of other reasons. One is that you seldom write about any subject that is more local in nature; the other is that most of your columns repeat the same theme from week to week.”
Just so you’ll know that this isn’t about conservative vs. liberal, we are also discontinuing publication of Milt Hankins columns. He, too, veered off into a more direct response to your columns in a recent piece that I also chose not to publish, and also poses the same issues regarding local content and repetition.
 I appreciate the many columns you have contributed over the years, but I’m afraid this is no longer working in the newspaper’s best interests.”
I haven’t the words to share with my readers the shock I felt after receiving this, rather “matter of fact” email from my editor after 14 years of service.  Yes, I was paid for my columns, but I assure you, it was a gratuitous amount. I would have written for free.
If you’ve followed the Herald Dispatch for any length of time, you’ve noticed the guest column lineup throughout the week.  It’s not unusual to see back to back opinion pieces from the other liberal, local contributors lambasting Donald Trump and/or conservative values.
I was obviously the “token” conservative columnist!
On Fridays, which has been typically the day my column was published, many readers shared it was a “breath of fresh air” being able to read someone who truly represents who I believe are most readers in this area, with an opinion piece, usually written in support of a conservative agenda.
The “unacceptable” column to which the editor refers contained some direct call outs on local columnists for their hypocritical attacks on President Trump.  It’s available in its entirety on my blog’s website.  It’s “in your face” accuracy in identifying local hypocrisy, while not revealing columnist’s names, was apparently more than the HD leadership could fathom!
Let’s be clear.  Removing me as a local contributor to the newspaper had little to do with my final column.  The column was simply the “opportunity” for which the HD had been hoping, enabling them to rid themselves of this “rogue conservative” staining the editorial page and giving them headaches every Friday.
Allow me to offer these points in presenting my case that my dismissal was “politically expedient” for the HD.
Through the years, I’ve had a good working relationship with my editors. I’ve respected their position and learned from their experience. There have been a handful of instances where my editor refused to publish a column as it was originally submitted. Perhaps it was a bit “over-the-top” with regard to my conservative position, or the editor felt the column may have compromised my “credibility” as a writer.
However, in every single instance, the editor would reach out to me asking for a re-write, or at least give me an opportunity to write another piece. In the interest of being a paid, regular contributor, I would always comply.
This email arrived less than 24 hours prior to publication of what was to be my final column, hence no opportunity for a re-write.
Additionally, the HD editor felt the need to share that he was also discontinuing publication of another “liberal” columnist to show this had nothing to do with “liberal vs. conservative.”
How thoughtful.
While I strongly disagree with this liberal columnist’s dismissal, I believe he became an unfortunate casualty in an effort for the HD to save face.  Milt Hankins, the aforementioned columnist, in my opinion, had already lost credibility with readers by fostering outlandish liberal positions, I believe even local liberals stopped reading his material.  I believe the HD felt he wasn’t adding value and was simply expendable.
Regarding the “repetition” of my columns, I encourage readers to check out the exact same form of repetition from even the most “tenured” columnists still writing for the HD in their attacks on President Trump and his supporters.
The bottom-line, in this humble writer’s opinion, is the leadership and ownership of the Herald Dispatch had simply gotten tired of losing ground to this deplorable, right-wing, Trump supporter.  For no matter how many liberal columns the HD published – by Friday morning, they were rendered null and void.
As my friend Tom Roten, host of the popular, “Tom Roten Morning Show”, on 800 WVHU would say, “A lie is still a lie, no matter how many times you say it!”
My columns, for 14 years, offered truth and integrity.  While I sincerely appreciate the HD publishing my material, I did not write in the “interest of the newspaper.”  I wrote in the interest of the people.
And I shall continue to write!  Following my conversation with Tom on his morning show the day after my release from the HD, my blog, FreeStatePatriot.com, received a record number of hits, most likely more than the HD sold papers!  Tom also shared the podcast of the interview went “viral” in terms of normal site visits.  Praise God!
When liberals cannot substantiate their lies and animosity toward President Trump or any conservative, the only way they can “win” an argument is to quiet the voice of the opposition.
Unfortunately, for the HD, they haven’t quieted my voice, they’ve wakened a sleeping giant!  Doug Smith, co-editor of Free State Patriot, and I will continue our work “exposing the progressive movement” in our nation and in our area.
Part of that mission now includes exposing the Herald Dispatch for what I believe to be enabling the progressive movement in the Tri-State.
And folks, we should be taking that personally.  When a town’s local newspaper begins filtering the message being delivered to the reader, they’re negating the very amendment of the Constitution which provides them the opportunity.  That, my friend, is the epitome of hypocrisy.
I look forward to partnering with each of you in helping “Keep America Great” and making the Tri-State great again!
God bless America and God Bless the Tri-State!  May He continue to deliver us from progressives who would silence His Word!
Stay tuned and armed with knowledge by visiting Freestatepatriot.com and HuntingtonNews.net.
Thank you for your prayers and support.
            Mark Caserta: Nation’s political discourse impacts local columnist. Has Huntington, WV's only newspaper joined forces with the liberal media? Mark Caserta:  Free State Patriot editor…
0 notes
shaledirectory · 6 years ago
Text
Natural Gas NOW Picks of the Week – May 26, 2018
Tom Shepstone Shepstone Management Company, Inc.
Natural Gas NOW readers pass along a lot of stuff every week about natural gas, fractivist antics, emissions, renewables, and other news relating to energy. As usual, emphasis is added.
“Clean energy” isn’t clean by their standards, says the Pennsylvania Game Commission:
This month, the Pennsylvania Game Commission (PGC) voted unanimously to ban wind turbines on the 1.5 million acres it controls….
A 2017 comprehensive report by Saint Francis University identified nearly 180,000 acres of State Game Lands (SGLs) that could support utility-scale wind projects. The area represents 17 percent of the state’s entire developable wind acreage.
Since 2005, 19 Game Lands had been included in wind-development proposals — some multiple times. All were denied and found to have “a high probability of adversely impacting wildlife resources and the recreational uses associated with SGLs.” The PGC found the proposals “incompatible with its mandates under the Code to protect, propagate, manage and preserve the game and wildlife of the Commonwealth and promote recreational opportunities.”
Development of the Game Lands would have been a major contribution to meeting the state’s Alternative Energy Portfolio Standard, which requires that utilities generate at least 18 percent of their electricity from sources such as wind. So why did the Commission ban wind projects from state lands?
…The PGC’s mission includes “managing Pennsylvania’s wild birds” and protecting these species is a top priority for the agency. It is well documented that windmills kill migratory birds that utilize the high mountain ridges in their transit from south to north and back again every year. High on the list of the species is the endangered Indiana bat whose deaths may be compounded by changes in air pressure produced by swiftly moving blades. Dangers to the threatened Allegheny Wood Rat and Timber Rattler were additional reasons for previous permit denials.
Winter ice thrown from blades — not an uncommon event — poses danger to humans and wildlife alike, as do blades thrown in cases of more rare malfunctions. While windmills appear to move slowly, speeds can reach nearly 200 mph and throw objects long distances.
High voltage equipment and other infrastructure present significant risks to the public. With more than 40 various hunting seasons in the Keystone State, exclusionary boundaries around each turbine would severely limit the public’s access for one of the primary uses of the Game Lands.
Additional negative effects have been cited by the Commission in denying previous requests including 11 different negative impacts from just one proposal for Game Land no. 42.  Aesthetic concerns emanate from the despoiling of otherwise grand vistas and appear to have contributed to the Commission’s decision…
…In stark contrast to their opposition to wind energy, the Commission appears to have embraced natural gas development on their properties. There are currently nearly 3,000 oil and gas wells on the game lands, including five properties which are host to active drilling rigs targeting the prolific Marcellus Shale. Approval of drilling proposals likely is related to the relatively small footprint of operations owing to horizontal drilling techniques along with benefits of improvement of the habitat for wildlife.
Hmm…perhaps that Alternative Energy Portfolio Standard, which requires that utilities generate at least 18% of their electricity from sources such as wind isn’t such a good idea after all?
FANG Does Spoiled Child Protest of Big Money Investments in Energy
I’ve written about FANG before in this post, their trendy Proletarian shirt business, their retro Stalinist look and their spoiled brat behavior intended to garnish attention. They were at it again recently with an infantile protest of MorganStanley. Here’s how they describe their efforts:
People are at the Morgan Stanley building in Purchase, NY disrupting the bank’s annual shareholder meeting in solidarity with the L’eau Est La Vie Camp that’s fighting the Bayou Bridge Pipeline in Louisiana.
Currently, both entrances to the building where the shareholder meeting is about to take place are being blockaded.
Morgan Stanley is the eighth largest shareholder of Energy Transfer Partners, the company responsible for the Bayou Bridge Pipeline, the Dakota Access Pipeline (DAPL), the Rover pipeline, and the Mariner East 2 Pipeline.
Click image to play video
Morgan Stanley is also the largest shareholder of ETP’s parent company, Energy Transfer Equity (ETE). In total Morgan Stanley controls over $1.2 billion in shares in ETP and ETE. Morgan Stanley has loaned millions to both companies.
In addition, Morgan Stanley is the lead financier of Invenergy, the company trying to build a massive fossil fuel power plant in Burrillville RI – and is also funding a group of proposed of export facilities proposed for Nova Scotia.
So, we have a spoiled kid in a suit leading a block-in protest in New York over a pipeline in Louisiana. Yeah, that’ll do it. Such is the pitiful nature of the fractivism. What a cruel joke these people are on themselves.
Phil the Panderer Leads New Jersey Back Into the Wilderness
Phil the Panderer Murphy has galloped off on his high horse to lead New Jersey backward as fast he can take the Garden State, all the while pretending to be ahead of the curve:
Gov. Phil Murphy yesterday signed bills to dramatically overhaul New Jersey’s energy policies while ensuring nuclear power will remain a significant part of its energy mix — albeit with a hefty new subsidy from consumers.
In a ceremony at a solar farm in Monmouth Junction, the governor’s action marked a step toward achieving his ambitious clean-energy agenda, by requiring at least half of the state’s electricity to come from renewable energy by 2030. The plan also mandates utilities ramp up programs to reduce energy use.
“Today is a big leap forward,’’ Murphy told legislators, cabinet officials, and representatives of key environmental groups who gathered at the solar farm, which is still under construction. The governor also signed an executive order, directing the development of a new Energy Master Plan to have the state achieve 100 percent clean energy by 2050.
Whether the state can deliver on that agenda and at what cost to ratepayers will likely generate as much debate and argument over the next few years as occurred during the bruising fight to get the bills through the Legislature in the past six months.
No issue was more controversial than the measure (S-2313) to direct up to $300 million a year in ratepayer subsidies to keep three nuclear power plants from closing in South Jersey. Public Service Enterprise Group threatened to shutter them, arguing they are no longer economically competitive.
Further down in the article we learn that even fractivist Stephanie Brand has an issue with this much pandering:
Murphy tried to quash concerns about the bill’s impact on utility customers, saying Stefanie Brand, director of the Division of Rate Counsel, would be part of a proceeding to determine if the plants should be handed a subsidy. The bill appears to exclude Brand, who is supposed to represent ratepayers in utility cases.
The governor also said there are safeguards in both bills to protect ratepayers. In the clean-energy legislation, a cap on costs is aimed at holding down what utility customers end up paying for a more aggressive solar program in the state.
Still, Brand acknowledged the ratepayer is going to face significant increases. “There’s no question that the two bills, plus other things we are doing, are going to have a tremendous impact on rates,’’ she said. “Affordability has to be a top priority as we move go forward and work at all these things.’’
Yeah, that about sums it up, not to mention the solar farm where the signing took place is a 100-acre facility that will only produce enough electricity for 3,000 homes (serving all of New Jersey would demand 107,000 acres at that rate) and still require subsidized nuclear or unsubsidized natural gas backup and even this wasn’t enough pandering for professional protesters such as Jeff Titell who doesn’t want other special interests such as nuclear feeding at the same public trough as his renewables.
The post Natural Gas NOW Picks of the Week – May 26, 2018 appeared first on Natural Gas Now.
https://www.shaledirectories.com/blog/natural-gas-now-picks-of-the-week-may-26-2018/
0 notes
lawfultruth · 7 years ago
Text
Guest Post: Matching Business Models and Processes with Cybercrime Insurance Programs
In the current world, cyber security is critical for every organization. Cyber insurance is an important part of every organization’s cybersecurity program. In the following guest post, a Senior Associate in D’Amato & Lynch, LLP’s Fidelity Bond Practice Group, examines how business can best match their cyber insurance to their cyber security needs. I would like to thank David for his willingness to allow me to publish his article as a guest post. I welcome guest post submissions from responsible authors on topics of interest to this blog’s readers. Please contact me directly if you would like to submit a guest post. Here is David’s guest post.
  **********************************
Time and again, insureds seek payment for cybercrime claims only to be denied by their insurers and the courts that review the subsequent lawsuits that are inevitably filed by insureds.  As courts strictly interpret cybercrime policies, insureds need to ensure that their cybercrime policies provide adequate coverage for the known risks and perils of their businesses.  Such coverage can only be achieved through a diligent review of business models and processes to match them with a proper insurance program.  Recently, federal appellate and district courts denied insureds’ claims for cybercrime coverage where the insureds’ insurance program did not match their business models and processes.
In Taylor & Lieberman v. Federal Insurance Company, the Ninth Circuit held that losses resulting from wire transfers that emanated from fraudulent emails were not an unauthorized entry into a computer system or an introduction of instructions that propagated themselves through the computer system.[1]  Thus, the court held that coverage under the computer fraud coverage was unavailable.  Further, the court held that the funds transfer fraud coverage was not implicated because the insured directed separate emails to the financial institution to wire the funds that ultimately caused the loss.
The insured, Taylor & Lieberman, was an accounting firm that made certain payments on behalf of its clients.  With respect to the client at issue, the client executed a power of attorney in favor of the principal of the insured.  The insured’s employee received three emails purportedly from the client requesting that the insured issue certain wire transfers.  The first two emails were from the client’s email account and the third email was from a separate email account.  Upon receiving the third email, the insured’s employee called the client and discovered that the client’s email account was compromised and sought to recover the funds that were previously wire transferred.  While certain funds were recovered, the insured incurred a loss of approximately $99,433.92.  The insured submitted a claim under its Forefront Portfolio Policy that provided certain coverages including computer fraud and funds transfer fraud coverage.
The insurer denied coverage for the claim and the insured brought suit.  On the parties’ cross motions for summary judgment, the district court granted the insurer’s motion for summary judgment and the insured appealed.
In analyzing the competing arguments regarding the coverage, the Ninth Circuit noted that the emails, which contained the instructions to the insured to wire the client’s funds, “were not the type of instructions that the policy was designed to cover.”[2]  The email stood in contrast to the malicious computer code that the policy was intended to cover.  Ultimately, the court concluded that claim did not come within the computer fraud coverage.
With respect to the funds transfer fraud coverage, the court reviewed the insuring clause which provided:
Fund transfer fraud encompasses:
Fraudulent written . . . instructions issued to a financial institution directing such institution to transfer . . . Money from any account maintained by an Insured Organization at such Institution, without an Insured Organization’s knowledge or consent.
The court noted that the insured knew about its directions to its financial institution.  Specifically, the insured received the instructions in the emails and then sent an email to its financial institution to wire transfer the funds that were lost.  Thus, while the instructions the insured relied upon were fraudulent, the insured not only had knowledge of its own directions, but also consented to them because it directed such instructions to its financial institution.  Therefore, the court held that the claim was not within the insuring agreement.[3]
In InComm Holdings and Interactive Communications International, Inc. v. Great American Insurance Company, the United States District Court for the North District of Georgia held that losses related to fraudulently redeemed chits for loading value onto debit cards were not covered because (i) the fraudulently redeemed chits resulted from the use of a telephone and not a computer; and (ii) the losses did not result directly from the fraudulently redeemed chits, but from the payments after use of the debit cards.[4]
In InComm, the insured operated a debit card processing system for various issuing banks whereby debit card holders would purchase chits to from a retailer to add funds to the debit cards.  After purchasing the chits, the retailer sent the payment to InComm.  Additionally, the customer would call InComm’s system and enter certain codes from the chit and debit card.  Upon redemption of the chit, InComm would wire transfer funds to a bank account at issuing bank.  Such bank account was held by the issuing bank as a fiduciary for InComm for the benefit of the cardholder.  When the cardholder used the debit card to purchase merchandise, the issuing bank would deduct the funds from the account and the merchant would be paid.  If the cardholder made a purchase prior to InComm transferring the funds, the issuing bank would pay for the cardholder purchase and be reimbursed by InComm’s wire transfer.
From November 2013 to May 2014, a flaw in the system allowed for multiple credits using the same chit if the codes were entered from simultaneous telephone calls to InComm’s system.  The losses totaled $11,477,287 resulting from 25,553 unauthorized redemptions of 1,933 separate chits, or an average of 13 redemptions per chit.  On May 6, 2014, InComm began investigating the duplicate redemptions, discovered the system flaw in an hour and repaired the flaw in its system within a subsequent hour to prevent further unauthorized redemptions.
On May 23, 2014, InComm filed a claim with Great American Insurance Company under Computer Fraud Insurance Provision which provided:
[The insurer] will pay for loss of . . . money . . . resulting directly from the use of any computer to fraudulently cause a transfer for that property from inside the premises or banking premises:
        i. to a person(other than a messeger) outside those premises; or
ii. to a place outside those premises.[5]
On May 12, 2015, Great American denied InComm’s claim.  InComm filed a lawsuit against Great American on July 28, 2015.  Upon competing motions for summary judgment filed by the parties, the court reviewed the insuring agreement as applicable to the loss at issue.  In particular, the court looked at the process for redeeming chits and concluded that the claim was not covered because the chit redemption process involved a telephone.  In reaching its holding, the court noted that “[a] ‘telephone’ is not a ‘computer.’”[6]  Further, the court noted that “[t]here is no evidence that cardholders even realized their telephone calls resulted in interaction with a computer.”[7]
The court went on to analyze the relationship between the unauthorized redeemed chits to the losses claimed.  In particular, the court noted that InComm’s transfer of funds to the issuing bank did not result in the loss of funds because certain issuers still retained certain of the wired funds.  The court stated that the loss of funds only occurred when the cardholder used the card to pay for a transaction and the issuing bank paid the seller for the transaction.  Therefore, the loss occurred subsequent to InComm’s transfer of funds.
The court went on to note that even if the loss were to occur upon InComm’s transfer of funds to the issuing bank, the loss would still not be a direct result of the unauthorized redemption of chits.  Specifically, InComm wired the funds pursuant to its contract with the issuing bank without reconciling or verifying that the chits were legitimate.  In other words, InComm’s loss resulted from InComm deciding to wire the funds without properly investigating the duplicate chit redemptions.
In Taylor & Lieberman, the insured purchased insurance coverage from losses resulting from computer viruses, but not for the so-called “socially engineering” emails.  Taylor & Lieberman did not appear to match its payment processes which involved human intervention and the issuance of instructions to its bank to the insurance it purchased.
Similarly, in InComm, the insured purchased insurance coverage for losses resulting from computer fraud, but not instructions received by telephone.  InComm had a mismatch between its computer fraud coverage and its business model of receiving telephone enabled instructions for chit redemptions.  Additionally, InComm’s insurance program did not provide coverage for its indirect role in the payment of funds for the cardholder’s transactions.
As courts appear to be strictly interpreting insurance policies, insureds need to be diligent in reviewing their business models and processes for areas of potential vulnerabilities and losses.  Such reviews should form the basis of an insured’s request for insurance.  It is likely that such an insured’s request will result in an insurance program that provides adequate coverage against the perils that really exist for an insured.
  David Bergenfeld, Esq., is a Senior Associate in D’Amato & Lynch, LLP’s Fidelity Bond Practice Group.  He thanks to Neil R. Morrison, Esq., a Partner in D’Amato & Lynch, LLP’s Fidelity Bond Practice Group, for editorial support.
  [1] No. 15-56102, 2017 WL 929211 (9th Cir. Mar. 9, 2017).
[2] Id. at *2.
[3] The Ninth Circuit also held that the emails received from the perpetrator “did not trigger coverage because [the insured was] not a financial institution.”  Id.
[4] No. 1:15-cv-2671-WSD (N.D. Ga. Mar. 16, 2017).
[5] Id. at *3.
[6] Id. at *8.
[7] Id. at *9.
The post Guest Post: Matching Business Models and Processes with Cybercrime Insurance Programs appeared first on The D&O Diary.
Guest Post: Matching Business Models and Processes with Cybercrime Insurance Programs syndicated from http://ift.tt/2qyreAv
0 notes
simonconsultancypage · 7 years ago
Text
Guest Post: Matching Business Models and Processes with Cybercrime Insurance Programs
In the current world, cyber security is critical for every organization. Cyber insurance is an important part of every organization’s cybersecurity program. In the following guest post, a Senior Associate in D’Amato & Lynch, LLP’s Fidelity Bond Practice Group, examines how business can best match their cyber insurance to their cyber security needs. I would like to thank David for his willingness to allow me to publish his article as a guest post. I welcome guest post submissions from responsible authors on topics of interest to this blog’s readers. Please contact me directly if you would like to submit a guest post. Here is David’s guest post.
  **********************************
Time and again, insureds seek payment for cybercrime claims only to be denied by their insurers and the courts that review the subsequent lawsuits that are inevitably filed by insureds.  As courts strictly interpret cybercrime policies, insureds need to ensure that their cybercrime policies provide adequate coverage for the known risks and perils of their businesses.  Such coverage can only be achieved through a diligent review of business models and processes to match them with a proper insurance program.  Recently, federal appellate and district courts denied insureds’ claims for cybercrime coverage where the insureds’ insurance program did not match their business models and processes.
In Taylor & Lieberman v. Federal Insurance Company, the Ninth Circuit held that losses resulting from wire transfers that emanated from fraudulent emails were not an unauthorized entry into a computer system or an introduction of instructions that propagated themselves through the computer system.[1]  Thus, the court held that coverage under the computer fraud coverage was unavailable.  Further, the court held that the funds transfer fraud coverage was not implicated because the insured directed separate emails to the financial institution to wire the funds that ultimately caused the loss.
The insured, Taylor & Lieberman, was an accounting firm that made certain payments on behalf of its clients.  With respect to the client at issue, the client executed a power of attorney in favor of the principal of the insured.  The insured’s employee received three emails purportedly from the client requesting that the insured issue certain wire transfers.  The first two emails were from the client’s email account and the third email was from a separate email account.  Upon receiving the third email, the insured’s employee called the client and discovered that the client’s email account was compromised and sought to recover the funds that were previously wire transferred.  While certain funds were recovered, the insured incurred a loss of approximately $99,433.92.  The insured submitted a claim under its Forefront Portfolio Policy that provided certain coverages including computer fraud and funds transfer fraud coverage.
The insurer denied coverage for the claim and the insured brought suit.  On the parties’ cross motions for summary judgment, the district court granted the insurer’s motion for summary judgment and the insured appealed.
In analyzing the competing arguments regarding the coverage, the Ninth Circuit noted that the emails, which contained the instructions to the insured to wire the client’s funds, “were not the type of instructions that the policy was designed to cover.”[2]  The email stood in contrast to the malicious computer code that the policy was intended to cover.  Ultimately, the court concluded that claim did not come within the computer fraud coverage.
With respect to the funds transfer fraud coverage, the court reviewed the insuring clause which provided:
Fund transfer fraud encompasses:
Fraudulent written . . . instructions issued to a financial institution directing such institution to transfer . . . Money from any account maintained by an Insured Organization at such Institution, without an Insured Organization’s knowledge or consent.
The court noted that the insured knew about its directions to its financial institution.  Specifically, the insured received the instructions in the emails and then sent an email to its financial institution to wire transfer the funds that were lost.  Thus, while the instructions the insured relied upon were fraudulent, the insured not only had knowledge of its own directions, but also consented to them because it directed such instructions to its financial institution.  Therefore, the court held that the claim was not within the insuring agreement.[3]
In InComm Holdings and Interactive Communications International, Inc. v. Great American Insurance Company, the United States District Court for the North District of Georgia held that losses related to fraudulently redeemed chits for loading value onto debit cards were not covered because (i) the fraudulently redeemed chits resulted from the use of a telephone and not a computer; and (ii) the losses did not result directly from the fraudulently redeemed chits, but from the payments after use of the debit cards.[4]
In InComm, the insured operated a debit card processing system for various issuing banks whereby debit card holders would purchase chits to from a retailer to add funds to the debit cards.  After purchasing the chits, the retailer sent the payment to InComm.  Additionally, the customer would call InComm’s system and enter certain codes from the chit and debit card.  Upon redemption of the chit, InComm would wire transfer funds to a bank account at issuing bank.  Such bank account was held by the issuing bank as a fiduciary for InComm for the benefit of the cardholder.  When the cardholder used the debit card to purchase merchandise, the issuing bank would deduct the funds from the account and the merchant would be paid.  If the cardholder made a purchase prior to InComm transferring the funds, the issuing bank would pay for the cardholder purchase and be reimbursed by InComm’s wire transfer.
From November 2013 to May 2014, a flaw in the system allowed for multiple credits using the same chit if the codes were entered from simultaneous telephone calls to InComm’s system.  The losses totaled $11,477,287 resulting from 25,553 unauthorized redemptions of 1,933 separate chits, or an average of 13 redemptions per chit.  On May 6, 2014, InComm began investigating the duplicate redemptions, discovered the system flaw in an hour and repaired the flaw in its system within a subsequent hour to prevent further unauthorized redemptions.
On May 23, 2014, InComm filed a claim with Great American Insurance Company under Computer Fraud Insurance Provision which provided:
[The insurer] will pay for loss of . . . money . . . resulting directly from the use of any computer to fraudulently cause a transfer for that property from inside the premises or banking premises:
        i. to a person(other than a messeger) outside those premises; or
ii. to a place outside those premises.[5]
On May 12, 2015, Great American denied InComm’s claim.  InComm filed a lawsuit against Great American on July 28, 2015.  Upon competing motions for summary judgment filed by the parties, the court reviewed the insuring agreement as applicable to the loss at issue.  In particular, the court looked at the process for redeeming chits and concluded that the claim was not covered because the chit redemption process involved a telephone.  In reaching its holding, the court noted that “[a] ‘telephone’ is not a ‘computer.’”[6]  Further, the court noted that “[t]here is no evidence that cardholders even realized their telephone calls resulted in interaction with a computer.”[7]
The court went on to analyze the relationship between the unauthorized redeemed chits to the losses claimed.  In particular, the court noted that InComm’s transfer of funds to the issuing bank did not result in the loss of funds because certain issuers still retained certain of the wired funds.  The court stated that the loss of funds only occurred when the cardholder used the card to pay for a transaction and the issuing bank paid the seller for the transaction.  Therefore, the loss occurred subsequent to InComm’s transfer of funds.
The court went on to note that even if the loss were to occur upon InComm’s transfer of funds to the issuing bank, the loss would still not be a direct result of the unauthorized redemption of chits.  Specifically, InComm wired the funds pursuant to its contract with the issuing bank without reconciling or verifying that the chits were legitimate.  In other words, InComm’s loss resulted from InComm deciding to wire the funds without properly investigating the duplicate chit redemptions.
In Taylor & Lieberman, the insured purchased insurance coverage from losses resulting from computer viruses, but not for the so-called “socially engineering” emails.  Taylor & Lieberman did not appear to match its payment processes which involved human intervention and the issuance of instructions to its bank to the insurance it purchased.
Similarly, in InComm, the insured purchased insurance coverage for losses resulting from computer fraud, but not instructions received by telephone.  InComm had a mismatch between its computer fraud coverage and its business model of receiving telephone enabled instructions for chit redemptions.  Additionally, InComm’s insurance program did not provide coverage for its indirect role in the payment of funds for the cardholder’s transactions.
As courts appear to be strictly interpreting insurance policies, insureds need to be diligent in reviewing their business models and processes for areas of potential vulnerabilities and losses.  Such reviews should form the basis of an insured’s request for insurance.  It is likely that such an insured’s request will result in an insurance program that provides adequate coverage against the perils that really exist for an insured.
  David Bergenfeld, Esq., is a Senior Associate in D’Amato & Lynch, LLP’s Fidelity Bond Practice Group.  He thanks to Neil R. Morrison, Esq., a Partner in D’Amato & Lynch, LLP’s Fidelity Bond Practice Group, for editorial support.
  [1] No. 15-56102, 2017 WL 929211 (9th Cir. Mar. 9, 2017).
[2] Id. at *2.
[3] The Ninth Circuit also held that the emails received from the perpetrator “did not trigger coverage because [the insured was] not a financial institution.”  Id.
[4] No. 1:15-cv-2671-WSD (N.D. Ga. Mar. 16, 2017).
[5] Id. at *3.
[6] Id. at *8.
[7] Id. at *9.
The post Guest Post: Matching Business Models and Processes with Cybercrime Insurance Programs appeared first on The D&O Diary.
Guest Post: Matching Business Models and Processes with Cybercrime Insurance Programs published first on http://ift.tt/2kTPCwo
0 notes
golicit · 7 years ago
Text
Guest Post: Matching Business Models and Processes with Cybercrime Insurance Programs
In the current world, cyber security is critical for every organization. Cyber insurance is an important part of every organization’s cybersecurity program. In the following guest post, a Senior Associate in D’Amato & Lynch, LLP’s Fidelity Bond Practice Group, examines how business can best match their cyber insurance to their cyber security needs. I would like to thank David for his willingness to allow me to publish his article as a guest post. I welcome guest post submissions from responsible authors on topics of interest to this blog’s readers. Please contact me directly if you would like to submit a guest post. Here is David’s guest post.
  **********************************
Time and again, insureds seek payment for cybercrime claims only to be denied by their insurers and the courts that review the subsequent lawsuits that are inevitably filed by insureds.  As courts strictly interpret cybercrime policies, insureds need to ensure that their cybercrime policies provide adequate coverage for the known risks and perils of their businesses.  Such coverage can only be achieved through a diligent review of business models and processes to match them with a proper insurance program.  Recently, federal appellate and district courts denied insureds’ claims for cybercrime coverage where the insureds’ insurance program did not match their business models and processes.
In Taylor & Lieberman v. Federal Insurance Company, the Ninth Circuit held that losses resulting from wire transfers that emanated from fraudulent emails were not an unauthorized entry into a computer system or an introduction of instructions that propagated themselves through the computer system.[1]  Thus, the court held that coverage under the computer fraud coverage was unavailable.  Further, the court held that the funds transfer fraud coverage was not implicated because the insured directed separate emails to the financial institution to wire the funds that ultimately caused the loss.
The insured, Taylor & Lieberman, was an accounting firm that made certain payments on behalf of its clients.  With respect to the client at issue, the client executed a power of attorney in favor of the principal of the insured.  The insured’s employee received three emails purportedly from the client requesting that the insured issue certain wire transfers.  The first two emails were from the client’s email account and the third email was from a separate email account.  Upon receiving the third email, the insured’s employee called the client and discovered that the client’s email account was compromised and sought to recover the funds that were previously wire transferred.  While certain funds were recovered, the insured incurred a loss of approximately $99,433.92.  The insured submitted a claim under its Forefront Portfolio Policy that provided certain coverages including computer fraud and funds transfer fraud coverage.
The insurer denied coverage for the claim and the insured brought suit.  On the parties’ cross motions for summary judgment, the district court granted the insurer’s motion for summary judgment and the insured appealed.
In analyzing the competing arguments regarding the coverage, the Ninth Circuit noted that the emails, which contained the instructions to the insured to wire the client’s funds, “were not the type of instructions that the policy was designed to cover.”[2]  The email stood in contrast to the malicious computer code that the policy was intended to cover.  Ultimately, the court concluded that claim did not come within the computer fraud coverage.
With respect to the funds transfer fraud coverage, the court reviewed the insuring clause which provided:
Fund transfer fraud encompasses:
Fraudulent written . . . instructions issued to a financial institution directing such institution to transfer . . . Money from any account maintained by an Insured Organization at such Institution, without an Insured Organization’s knowledge or consent.
The court noted that the insured knew about its directions to its financial institution.  Specifically, the insured received the instructions in the emails and then sent an email to its financial institution to wire transfer the funds that were lost.  Thus, while the instructions the insured relied upon were fraudulent, the insured not only had knowledge of its own directions, but also consented to them because it directed such instructions to its financial institution.  Therefore, the court held that the claim was not within the insuring agreement.[3]
In InComm Holdings and Interactive Communications International, Inc. v. Great American Insurance Company, the United States District Court for the North District of Georgia held that losses related to fraudulently redeemed chits for loading value onto debit cards were not covered because (i) the fraudulently redeemed chits resulted from the use of a telephone and not a computer; and (ii) the losses did not result directly from the fraudulently redeemed chits, but from the payments after use of the debit cards.[4]
In InComm, the insured operated a debit card processing system for various issuing banks whereby debit card holders would purchase chits to from a retailer to add funds to the debit cards.  After purchasing the chits, the retailer sent the payment to InComm.  Additionally, the customer would call InComm’s system and enter certain codes from the chit and debit card.  Upon redemption of the chit, InComm would wire transfer funds to a bank account at issuing bank.  Such bank account was held by the issuing bank as a fiduciary for InComm for the benefit of the cardholder.  When the cardholder used the debit card to purchase merchandise, the issuing bank would deduct the funds from the account and the merchant would be paid.  If the cardholder made a purchase prior to InComm transferring the funds, the issuing bank would pay for the cardholder purchase and be reimbursed by InComm’s wire transfer.
From November 2013 to May 2014, a flaw in the system allowed for multiple credits using the same chit if the codes were entered from simultaneous telephone calls to InComm’s system.  The losses totaled $11,477,287 resulting from 25,553 unauthorized redemptions of 1,933 separate chits, or an average of 13 redemptions per chit.  On May 6, 2014, InComm began investigating the duplicate redemptions, discovered the system flaw in an hour and repaired the flaw in its system within a subsequent hour to prevent further unauthorized redemptions.
On May 23, 2014, InComm filed a claim with Great American Insurance Company under Computer Fraud Insurance Provision which provided:
[The insurer] will pay for loss of . . . money . . . resulting directly from the use of any computer to fraudulently cause a transfer for that property from inside the premises or banking premises:
        i. to a person(other than a messeger) outside those premises; or
ii. to a place outside those premises.[5]
On May 12, 2015, Great American denied InComm’s claim.  InComm filed a lawsuit against Great American on July 28, 2015.  Upon competing motions for summary judgment filed by the parties, the court reviewed the insuring agreement as applicable to the loss at issue.  In particular, the court looked at the process for redeeming chits and concluded that the claim was not covered because the chit redemption process involved a telephone.  In reaching its holding, the court noted that “[a] ‘telephone’ is not a ‘computer.’”[6]  Further, the court noted that “[t]here is no evidence that cardholders even realized their telephone calls resulted in interaction with a computer.”[7]
The court went on to analyze the relationship between the unauthorized redeemed chits to the losses claimed.  In particular, the court noted that InComm’s transfer of funds to the issuing bank did not result in the loss of funds because certain issuers still retained certain of the wired funds.  The court stated that the loss of funds only occurred when the cardholder used the card to pay for a transaction and the issuing bank paid the seller for the transaction.  Therefore, the loss occurred subsequent to InComm’s transfer of funds.
The court went on to note that even if the loss were to occur upon InComm’s transfer of funds to the issuing bank, the loss would still not be a direct result of the unauthorized redemption of chits.  Specifically, InComm wired the funds pursuant to its contract with the issuing bank without reconciling or verifying that the chits were legitimate.  In other words, InComm’s loss resulted from InComm deciding to wire the funds without properly investigating the duplicate chit redemptions.
In Taylor & Lieberman, the insured purchased insurance coverage from losses resulting from computer viruses, but not for the so-called “socially engineering” emails.  Taylor & Lieberman did not appear to match its payment processes which involved human intervention and the issuance of instructions to its bank to the insurance it purchased.
Similarly, in InComm, the insured purchased insurance coverage for losses resulting from computer fraud, but not instructions received by telephone.  InComm had a mismatch between its computer fraud coverage and its business model of receiving telephone enabled instructions for chit redemptions.  Additionally, InComm’s insurance program did not provide coverage for its indirect role in the payment of funds for the cardholder’s transactions.
As courts appear to be strictly interpreting insurance policies, insureds need to be diligent in reviewing their business models and processes for areas of potential vulnerabilities and losses.  Such reviews should form the basis of an insured’s request for insurance.  It is likely that such an insured’s request will result in an insurance program that provides adequate coverage against the perils that really exist for an insured.
  David Bergenfeld, Esq., is a Senior Associate in D’Amato & Lynch, LLP’s Fidelity Bond Practice Group.  He thanks to Neil R. Morrison, Esq., a Partner in D’Amato & Lynch, LLP’s Fidelity Bond Practice Group, for editorial support.
  [1] No. 15-56102, 2017 WL 929211 (9th Cir. Mar. 9, 2017).
[2] Id. at *2.
[3] The Ninth Circuit also held that the emails received from the perpetrator “did not trigger coverage because [the insured was] not a financial institution.”  Id.
[4] No. 1:15-cv-2671-WSD (N.D. Ga. Mar. 16, 2017).
[5] Id. at *3.
[6] Id. at *8.
[7] Id. at *9.
The post Guest Post: Matching Business Models and Processes with Cybercrime Insurance Programs appeared first on The D&O Diary.
Guest Post: Matching Business Models and Processes with Cybercrime Insurance Programs published first on
0 notes
certainheartrunaway · 5 years ago
Text
Over-the-Horizon Radars Continue to Plague Amateur Bands
The International Amateur Radio Union Region 1 Monitoring System (IARUMS) reports a “new kind” of over-the-horizon (OTH) radar on 20 meters. The intruding signal, which appears to be emanating from the Far East, was monitored during May on 14.140 – 14.150 MHz. Another Chinese wideband OTH radar has been showing up on 15 meters, with a signal 160 kHz wide. An Iranian radar has appeared on 10 meters, centered on 28.860 MHz, and is audible in Europe during sporadic-E conditions. The signal is about 46 kHz wide. The Russian OTH radar “Konteyner” OTH radar centered on 14.127 MHz continues to be observed, with a 12 kHz wide signal.
The so-called “Foghorn” OTH radar from China, first heard in 2017, and other OTH radars were spotted on several 20-meter frequencies. The Foghorn is a burst radar that has been heard on other bands, with the signal often jumping. The signal is frequency modulation on pulse (FMOP) with 66.66 sweeps-per-second bursts.
From the Commonwealth of Independent States (CIS) that emerged following the breakup of the Soviet Union, taxi traffic continues to appear on 10 meters, using FM. IARUMS said pirates in the Far East have been “abusing” 20 meters, transmitting on 14.000 MHz, using USB. IARUMS monitors also logged several fish net (driftnet) buoys between 28.000 and 28.500 MHz, transmitting a carrier followed by a CW identification. Codan selective callings (selcalls) believed to be in Oceania have been heard between 7.108 and 7.150 MHz
Source: ARRL
(adsbygoogle = window.adsbygoogle || []).push({});
App - Mobile
Tumblr media
New APP for digital QST
March 25, 2019 No comments
Apple has released a new app for digital QST (version 5.1) readers that use that platform. A long-standing problem involved the inability of some Appl... Read more
Tumblr media
6 Must Have Amateur Radio Apps!
December 24, 2018 No comments
Read more
Tumblr media
iWSPR TX – WSPR for iOS version 2.8 now available
October 16, 2018 No comments
WSPR WSPR implements a protocol designed for probing potential propagation paths with low-power transmissions.  Normal transmissions carry a station’s... Read more
Tumblr media
RUMlogNG2Go for iOS version 3.5.2 now available
August 19, 2018 No comments
Thomas Lindner, DL2RUM, is happy to announce the availability of version 3.5.2 of his RUMlogNG2Go logger for the iPhone and iPad.  RUMlogNG2Go can be ... Read more
Digital Modes
Tumblr media
LoTW Now Accepting FT4 Contact
May 23, 2019 No comments
The latest TQSL update (Config.xml version 11.8), released on May 22, includes FT4 as a submode of MFSK. It also adds AISAT-1 and PO-101 in the satell... Read more
Tumblr media
ADIF 3.1.0 was approved today
May 22, 2019 No comments
Dave Bernstein reported this on the DXLabs support group today: ————————————... Read more
Tumblr media
FT4 vs FT8 – A new mode, what’s the difference?
May 01, 2019 No comments
The FT4 Protocol for Digital Contesting by K1JT   Read more
Tumblr media
New FT4 Mode with more 20K spots in few your hours realese
April 29, 2019 No comments
    Source: LINK WSJTX 2.1.0RC5 Release! – The FT4 Protocol for Digital Contesting  The FT4 Protocol for Digital Contesting by K1J... Read more
(adsbygoogle = window.adsbygoogle || []).push({});
News
Tumblr media
Saturday, June 15, is Kids Day
June 14, 2019 No comments
Kids Day is Saturday, June 15 — an opportunity to get youngsters on the air to share in the joy and fun that Amateur Radio has to offer. Kids Day gets... Read more
Tumblr media
Over-the-Horizon Radars Continue to Plague Amateur Bands
June 14, 2019 No comments
The International Amateur Radio Union Region 1 Monitoring System (IARUMS) reports a “new kind” of over-the-horizon (OTH) radar on 20 meters. The intru... Read more
Tumblr media
ARRL Executive Committee Establishes Ad Hoc Committee on Communications
June 14, 2019 No comments
Meeting right after Dayton Hamvention® at the University of Dayton on May 20, the ARRL Board’s Executive Committee (EC) adopted a motion to establish... Read more
Tumblr media
WSJT-X Developer Posts Observations On Using FT8 In June VHF Contest
June 14, 2019 No comments
WSJT-X developer Joe Taylor, K1JT, has tentatively concluded that there are good reasons to use both FT4 and FT8 in ARRL VHF contests. The latest beta... Read more
Review
Tumblr media
ICOM IC-7610 Review and Full Walk Through
June 15, 2019 No comments
Read more
Tumblr media
How To Fix A Ham Radio AC Ground Loop
June 14, 2019 No comments
Read more
Tumblr media
Portable HF Operation Kit – Ham Radio Q&A
June 12, 2019 No comments
Read more
Tumblr media
Elecraft K4 Updates from Texas Hamcom 2019
June 12, 2019 No comments
Read more
The post Over-the-Horizon Radars Continue to Plague Amateur Bands appeared first on QRZ NOW - Amateur Radio News.
from DXER ham radio news http://bit.ly/2XLdSRB via IFTTT
0 notes
certainheartrunaway · 5 years ago
Text
Over-the-Horizon Radars Continue to Plague Amateur Bands
The International Amateur Radio Union Region 1 Monitoring System (IARUMS) reports a “new kind” of over-the-horizon (OTH) radar on 20 meters. The intruding signal, which appears to be emanating from the Far East, was monitored during May on 14.140 – 14.150 MHz. Another Chinese wideband OTH radar has been showing up on 15 meters, with a signal 160 kHz wide. An Iranian radar has appeared on 10 meters, centered on 28.860 MHz, and is audible in Europe during sporadic-E conditions. The signal is about 46 kHz wide. The Russian OTH radar “Konteyner” OTH radar centered on 14.127 MHz continues to be observed, with a 12 kHz wide signal.
The so-called “Foghorn” OTH radar from China, first heard in 2017, and other OTH radars were spotted on several 20-meter frequencies. The Foghorn is a burst radar that has been heard on other bands, with the signal often jumping. The signal is frequency modulation on pulse (FMOP) with 66.66 sweeps-per-second bursts.
From the Commonwealth of Independent States (CIS) that emerged following the breakup of the Soviet Union, taxi traffic continues to appear on 10 meters, using FM. IARUMS said pirates in the Far East have been “abusing” 20 meters, transmitting on 14.000 MHz, using USB. IARUMS monitors also logged several fish net (driftnet) buoys between 28.000 and 28.500 MHz, transmitting a carrier followed by a CW identification. Codan selective callings (selcalls) believed to be in Oceania have been heard between 7.108 and 7.150 MHz
Source: ARRL
(adsbygoogle = window.adsbygoogle || []).push({});
App - Mobile
Tumblr media
New APP for digital QST
March 25, 2019 No comments
Apple has released a new app for digital QST (version 5.1) readers that use that platform. A long-standing problem involved the inability of some Appl... Read more
Tumblr media
6 Must Have Amateur Radio Apps!
December 24, 2018 No comments
Read more
Tumblr media
iWSPR TX – WSPR for iOS version 2.8 now available
October 16, 2018 No comments
WSPR WSPR implements a protocol designed for probing potential propagation paths with low-power transmissions.  Normal transmissions carry a station’s... Read more
Tumblr media
RUMlogNG2Go for iOS version 3.5.2 now available
August 19, 2018 No comments
Thomas Lindner, DL2RUM, is happy to announce the availability of version 3.5.2 of his RUMlogNG2Go logger for the iPhone and iPad.  RUMlogNG2Go can be ... Read more
Digital Modes
Tumblr media
LoTW Now Accepting FT4 Contact
May 23, 2019 No comments
The latest TQSL update (Config.xml version 11.8), released on May 22, includes FT4 as a submode of MFSK. It also adds AISAT-1 and PO-101 in the satell... Read more
Tumblr media
ADIF 3.1.0 was approved today
May 22, 2019 No comments
Dave Bernstein reported this on the DXLabs support group today: ————————————... Read more
Tumblr media
FT4 vs FT8 – A new mode, what’s the difference?
May 01, 2019 No comments
The FT4 Protocol for Digital Contesting by K1JT   Read more
Tumblr media
New FT4 Mode with more 20K spots in few your hours realese
April 29, 2019 No comments
    Source: LINK WSJTX 2.1.0RC5 Release! – The FT4 Protocol for Digital Contesting  The FT4 Protocol for Digital Contesting by K1J... Read more
(adsbygoogle = window.adsbygoogle || []).push({});
News
Tumblr media
Saturday, June 15, is Kids Day
June 14, 2019 No comments
Kids Day is Saturday, June 15 — an opportunity to get youngsters on the air to share in the joy and fun that Amateur Radio has to offer. Kids Day gets... Read more
Tumblr media
Over-the-Horizon Radars Continue to Plague Amateur Bands
June 14, 2019 No comments
The International Amateur Radio Union Region 1 Monitoring System (IARUMS) reports a “new kind” of over-the-horizon (OTH) radar on 20 meters. The intru... Read more
Tumblr media
ARRL Executive Committee Establishes Ad Hoc Committee on Communications
June 14, 2019 No comments
Meeting right after Dayton Hamvention® at the University of Dayton on May 20, the ARRL Board’s Executive Committee (EC) adopted a motion to establish... Read more
Tumblr media
WSJT-X Developer Posts Observations On Using FT8 In June VHF Contest
June 14, 2019 No comments
WSJT-X developer Joe Taylor, K1JT, has tentatively concluded that there are good reasons to use both FT4 and FT8 in ARRL VHF contests. The latest beta... Read more
Review
Tumblr media
How To Fix A Ham Radio AC Ground Loop
June 14, 2019 No comments
Read more
Tumblr media
Portable HF Operation Kit – Ham Radio Q&A
June 12, 2019 No comments
Read more
Tumblr media
Elecraft K4 Updates from Texas Hamcom 2019
June 12, 2019 No comments
Read more
Tumblr media
How Do You Know Your Antenna & Radio Are Setup And Working Correctly?
June 08, 2019 No comments
“A question you may have asked yourself, “Is my radio working? I don’t hear anyone!” Or worse, you can hear other stations, bu... Read more
The post Over-the-Horizon Radars Continue to Plague Amateur Bands appeared first on QRZ NOW - Amateur Radio News.
from DXER ham radio news http://bit.ly/2XLdSRB via IFTTT
0 notes
certainheartrunaway · 5 years ago
Text
Over-the-Horizon Radars Continue to Plague Amateur Bands
The International Amateur Radio Union Region 1 Monitoring System (IARUMS) reports a “new kind” of over-the-horizon (OTH) radar on 20 meters. The intruding signal, which appears to be emanating from the Far East, was monitored during May on 14.140 – 14.150 MHz. Another Chinese wideband OTH radar has been showing up on 15 meters, with a signal 160 kHz wide. An Iranian radar has appeared on 10 meters, centered on 28.860 MHz, and is audible in Europe during sporadic-E conditions. The signal is about 46 kHz wide. The Russian OTH radar “Konteyner” OTH radar centered on 14.127 MHz continues to be observed, with a 12 kHz wide signal.
The so-called “Foghorn” OTH radar from China, first heard in 2017, and other OTH radars were spotted on several 20-meter frequencies. The Foghorn is a burst radar that has been heard on other bands, with the signal often jumping. The signal is frequency modulation on pulse (FMOP) with 66.66 sweeps-per-second bursts.
From the Commonwealth of Independent States (CIS) that emerged following the breakup of the Soviet Union, taxi traffic continues to appear on 10 meters, using FM. IARUMS said pirates in the Far East have been “abusing” 20 meters, transmitting on 14.000 MHz, using USB. IARUMS monitors also logged several fish net (driftnet) buoys between 28.000 and 28.500 MHz, transmitting a carrier followed by a CW identification. Codan selective callings (selcalls) believed to be in Oceania have been heard between 7.108 and 7.150 MHz
Source: ARRL
(adsbygoogle = window.adsbygoogle || []).push({});
App - Mobile
Tumblr media
New APP for digital QST
March 25, 2019 No comments
Apple has released a new app for digital QST (version 5.1) readers that use that platform. A long-standing problem involved the inability of some Appl... Read more
Tumblr media
6 Must Have Amateur Radio Apps!
December 24, 2018 No comments
Read more
Tumblr media
iWSPR TX – WSPR for iOS version 2.8 now available
October 16, 2018 No comments
WSPR WSPR implements a protocol designed for probing potential propagation paths with low-power transmissions.  Normal transmissions carry a station’s... Read more
Tumblr media
RUMlogNG2Go for iOS version 3.5.2 now available
August 19, 2018 No comments
Thomas Lindner, DL2RUM, is happy to announce the availability of version 3.5.2 of his RUMlogNG2Go logger for the iPhone and iPad.  RUMlogNG2Go can be ... Read more
Digital Modes
Tumblr media
LoTW Now Accepting FT4 Contact
May 23, 2019 No comments
The latest TQSL update (Config.xml version 11.8), released on May 22, includes FT4 as a submode of MFSK. It also adds AISAT-1 and PO-101 in the satell... Read more
Tumblr media
ADIF 3.1.0 was approved today
May 22, 2019 No comments
Dave Bernstein reported this on the DXLabs support group today: ————————————... Read more
Tumblr media
FT4 vs FT8 – A new mode, what’s the difference?
May 01, 2019 No comments
The FT4 Protocol for Digital Contesting by K1JT   Read more
Tumblr media
New FT4 Mode with more 20K spots in few your hours realese
April 29, 2019 No comments
    Source: LINK WSJTX 2.1.0RC5 Release! – The FT4 Protocol for Digital Contesting  The FT4 Protocol for Digital Contesting by K1J... Read more
(adsbygoogle = window.adsbygoogle || []).push({});
News
Tumblr media
Over-the-Horizon Radars Continue to Plague Amateur Bands
June 14, 2019 No comments
The International Amateur Radio Union Region 1 Monitoring System (IARUMS) reports a “new kind” of over-the-horizon (OTH) radar on 20 meters. The intru... Read more
Tumblr media
ARRL Executive Committee Establishes Ad Hoc Committee on Communications
June 14, 2019 No comments
Meeting right after Dayton Hamvention® at the University of Dayton on May 20, the ARRL Board’s Executive Committee (EC) adopted a motion to establish... Read more
Tumblr media
WSJT-X Developer Posts Observations On Using FT8 In June VHF Contest
June 14, 2019 No comments
WSJT-X developer Joe Taylor, K1JT, has tentatively concluded that there are good reasons to use both FT4 and FT8 in ARRL VHF contests. The latest beta... Read more
Tumblr media
Paul Bourque, N1SFE, Joins ARRL Headquarters Staff as Contest Program Manager
June 13, 2019 No comments
Paul Bourque, N1SFE, of Middletown, Connecticut, has joined the ARRL Headquarters staff as Contest Program Manager. He succeeds Bart Jahnke, W9JJ, who... Read more
Review
Tumblr media
How To Fix A Ham Radio AC Ground Loop
June 14, 2019 No comments
Read more
Tumblr media
Portable HF Operation Kit – Ham Radio Q&A
June 12, 2019 No comments
Read more
Tumblr media
Elecraft K4 Updates from Texas Hamcom 2019
June 12, 2019 No comments
Read more
Tumblr media
How Do You Know Your Antenna & Radio Are Setup And Working Correctly?
June 08, 2019 No comments
“A question you may have asked yourself, “Is my radio working? I don’t hear anyone!” Or worse, you can hear other stations, bu... Read more
The post Over-the-Horizon Radars Continue to Plague Amateur Bands appeared first on QRZ NOW - Amateur Radio News.
from DXER ham radio news http://bit.ly/2XLdSRB via IFTTT
0 notes