<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" >

<channel><title><![CDATA[WORLDWIDE NETWORK ENTERPRISES - BLOG]]></title><link><![CDATA[http://www.worldwidenetworkenterprises.com/blog]]></link><description><![CDATA[BLOG]]></description><pubDate>Mon, 02 Feb 2026 12:30:43 -0500</pubDate><generator>Weebly</generator><item><title><![CDATA[ISRAEL EXCLUSIVE: Stuxnet was out of control, we had to reveal it]]></title><link><![CDATA[http://www.worldwidenetworkenterprises.com/blog/israel-exclusive-stuxnet-was-out-of-control-we-had-to-reveal-it]]></link><comments><![CDATA[http://www.worldwidenetworkenterprises.com/blog/israel-exclusive-stuxnet-was-out-of-control-we-had-to-reveal-it#comments]]></comments><pubDate>Sun, 16 Jun 2013 19:15:10 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.worldwidenetworkenterprises.com/blog/israel-exclusive-stuxnet-was-out-of-control-we-had-to-reveal-it</guid><description><![CDATA[                 In an exclusive interview, Eugene Kaspersky, CEO of one of the largest digital security firms in the world, lifts the veil on a shadowy world of internet espionage and sabotage: and it's not a pretty sight • Get ready for Cyber Armageddon.  By&nbsp;Ilan Gattegno READ INTERVIEW   [...] ]]></description><content:encoded><![CDATA[<div> <div id="998164869302319930" align="left" style="width: 100%; overflow-y: hidden;" class="wcustomhtml"> <object id="flashObj" width="433" height="295" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=9,0,47,0"> <param name="movie" value="http://c.brightcove.com/services/viewer/federated_f9?isVid=1&amp;isUI=1"> <param name="bgcolor" value="#FFFFFF"> <param name="flashVars" value="videoId=2474790005001&amp;playerID=1852112022001&amp;playerKey=AQ~~,AAABk9JMLWE~,0pl3uFLFPXsNLzaJagAtptvvs-PtgYlp&amp;domain=embed&amp;dynamicStreaming=true"> <param name="base" value="http://admin.brightcove.com"> <param name="seamlesstabbing" value="false"> <param name="allowFullScreen" value="true"> <param name="swLiveConnect" value="true"> <param name="allowScriptAccess" value="always"> <embed src="http://c.brightcove.com/services/viewer/federated_f9?isVid=1&amp;isUI=1" bgcolor="#FFFFFF" flashvars="videoId=2474790005001&amp;playerID=1852112022001&amp;playerKey=AQ~~,AAABk9JMLWE~,0pl3uFLFPXsNLzaJagAtptvvs-PtgYlp&amp;domain=embed&amp;dynamicStreaming=true" base="http://admin.brightcove.com" name="flashObj" width="433" height="295" seamlesstabbing="false" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" swliveconnect="true" pluginspage="http://www.macromedia.com/shockwave/download/index.cgi?P1_Prod_Version=ShockwaveFlash"> </object> </div> </div>  <div class="paragraph" style="text-align:left;"> In an exclusive interview, Eugene Kaspersky, CEO of one of the largest digital security firms in the world, lifts the veil on a shadowy world of internet espionage and sabotage: and it's not a pretty sight &bull; Get ready for Cyber Armageddon.<br> <br> By&nbsp;<span style="line-height: 1.5;">Ilan Gattegno</span><br> <strong><a href="http://www.israelhayom.com/site/newsletter_article.php?id=9983" title=""><font size="4">READ INTERVIEW</font></a></strong> </div> ]]></content:encoded></item><item><title><![CDATA[Futurology: shining a bright, broad beam of light into the darkness]]></title><link><![CDATA[http://www.worldwidenetworkenterprises.com/blog/futurology-shining-a-bright-broad-beam-of-light-into-the-darkness]]></link><comments><![CDATA[http://www.worldwidenetworkenterprises.com/blog/futurology-shining-a-bright-broad-beam-of-light-into-the-darkness#comments]]></comments><pubDate>Fri, 10 May 2013 04:07:45 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.worldwidenetworkenterprises.com/blog/futurology-shining-a-bright-broad-beam-of-light-into-the-darkness</guid><description><![CDATA[ by Lydia NicholasPlanning for the future predicted by our  current data leaves us vulnerable to unexpected derailments. Embracing  uncertainty and preparing for the implausible gives us the chance to choose a  better worldPrediction can feel like shining a torch forward into the terrifying, dark  unknown. The narrower and more focused the beam, the brighter the light, and the  more detail can be perceived &ndash; but only along that one thin pathway. The light  may help you prepare for tricky p [...] ]]></description><content:encoded><![CDATA[<span class='imgPusher' style='float:left;height:0px'></span><span style='z-index:10;position:relative;float:left;;clear:left;margin-top:0px;*margin-top:0px'><a><img src="http://www.worldwidenetworkenterprises.com/uploads/1/8/2/6/18262213/5563669.jpg" style="margin-top: 5px; margin-bottom: 10px; margin-left: 0px; margin-right: 10px; border-width:1px;padding:3px;" alt="Picture" class="galleryImageBorder" /></a><span style="display: block; font-size: 90%; margin-top: -10px; margin-bottom: 10px; text-align: center;"></span></span> <div class="paragraph" style="text-align:left;display:block;">by Lydia Nicholas<br /><br />Planning for the future predicted by our  current data leaves us vulnerable to unexpected derailments. Embracing  uncertainty and preparing for the implausible gives us the chance to choose a  better world<br /><br />Prediction can feel like shining a torch forward into the terrifying, dark  unknown. The narrower and more focused the beam, the brighter the light, and the  more detail can be perceived &ndash; but only along that one thin pathway. The light  may help you prepare for tricky patches ahead, but it cannot reveal or protect  you from everything. Unforeseen obstacles or events may force you to take an  alternative route and encounter dangers in the surrounding dark. With an  unfocused wider torch beam, you'll see less detail about any particular area,  but will be able to see the dangers and advantages of a wider range of paths.  Perhaps you would even have the chance to make an informed choice about which  way to move forward?<br /><span style=""></span><br /><span style=""></span> The model is a useful way to explain the different ways we can approach the  future. The data and modelling tools we have available can paint a detailed  picture of one outcome, but it can't know everything. Also, control over your  dreams and fears is extremely lucrative &ndash; makers of gadgets, providers of  financial services, investors in the infrastructure of energy and health and  many others have a vested interest in narrowing down and directing our visions  of the future so that we can only imagine ourselves in a world which needs and  benefits them. Relevant facts can be hidden or denied or simply unknown so our  view of the future can be controlled or distorted. Resisting these pressures and  opening our eyes to other, strange-seeming possibilities takes effort, but is  hugely important. The most important use of prediction may be not to get an  increasingly detailed vision of one potential path forward, but to open our eyes  wider, accepting a wider field of less certain possibilities and think about  where we would prefer to go. Then we can set a course to get there. <br /><span style=""></span><br /><span style=""></span> It is a natural to want  to close down the future. We want a straight, simple, brightly lit way forward  so that we can prepare for it. Some of humanity's earliest technologies were  attempts to divine the future from the movements of the stars, the flights of  birds, the lines on our palms. Extispicy, the science of telling the future by  looking at the liver, lungs and intestines of slaughtered animals only really  told us the fate of the beast in question (and was probably a strong predictor  of the practitioner's future dinner options). It seems nonsensical now, but for  ancient communities who lived or died by their animals' health, perhaps there  was value in checking cattle guts for features which had preceded catastrophe in  the past. We have found that other attempts by our ancestors to store up  knowledge about the future, such as the saying "red sky at night, sailor's  delight" actually <a href="http://www.loc.gov/rr/scitech/mysteries/weather-sailor.html" style="" title="">have a degree  of truth in them</a>. This was despite the fact that their original creators  could not have known why these predictions were accurate. <br /><span style=""></span><br /><span style=""></span> These methods have been  supplanted by increasingly accurate weather forecasts which, crucially, allow us  to explain how we know what we know about the future. But they <a href="http://www.youtube.com/watch?v=uqs1YXfdtGE" style="" title="">can still be wrong</a>. Whilst  the five-day forecast for Hurricane Sandy was <a href="http://www.washingtonpost.com/blogs/capital-weather-gang/post/the-national-hurricane-centers-striking-forecast-for-superstorm-sandy/2012/11/01/e2633b5e-2427-11e2-ac85-e669876c6a24_blog.html" style="" title="">strikingly  accurate</a>, <a href="http://www.nature.com/nclimate/journal/v2/n6/abs/nclimate1389.html" style="" title="">a  longer-term study completed in early 2012</a> predicted that such a storm was <a href="http://www.climatecentral.org/news/hurricane-sandy-unprecedented-in-historical-record-study-says-15505" style="" title="">unlikely  to ever happen</a>: we were told we could expect a much smaller storm once in  every 500 years. Closing down from possible futures in which Sandy could happen  to focus more narrowly on probable futures in which it wouldn't happen meant  that the disaster went unforeseen. Even though the science of weather  forecasting is extremely sophisticated, when taking the longer view there is  still a need to look beyond the model.<br /><span style=""></span><br /><span style=""></span> As I have <a href="http://www.guardian.co.uk/science/political-science/2013/mar/28/science-policy" style="" title="">argued  previously</a>, imagining a technology in fiction helps lead it into reality.  Science fiction helps us articulate our fears and desires for possible worlds,  and there is a lot of profit to be gained by manipulating this. Corporate design  fiction is used to shine a light on the futures that companies want to see come  true. A glass company quite naturally wants us to imagine that in the future we  will need a lot more glass.<br /><span style=""></span></div> <hr style="width:100%;clear:both;visibility:hidden;"></hr>  <span class='imgPusher' style='float:left;height:0px'></span><span style='z-index:10;position:relative;float:left;;clear:left;margin-top:0px;*margin-top:0px'><a><img src="http://www.worldwidenetworkenterprises.com/uploads/1/8/2/6/18262213/2844390.jpg" style="margin-top: 5px; margin-bottom: 10px; margin-left: 0px; margin-right: 10px; none;" alt="Picture" class="galleryImageBorder" /></a><span style="display: block; font-size: 90%; margin-top: -10px; margin-bottom: 10px; text-align: center;"></span></span> <div class="paragraph" style="text-align:left;display:block;"><br />  If visions are to be useful and inclusive they have to take into account the  everyday needs and priorities of real people, not model consumers. Investors in  3D TV failed to realise that people move around and chat whilst watching TV, so  were unlikely to sit bolt upright and perfectly still with heavy glasses on. It  seems that smartphones as they are presented to us now are the perfect tool for  the future, but pirated designs in China add features such as dual sim cards to  take better advantage of different networks' deals, and removable batteries  which can be fixed and upgraded meaning that phones do not need to be replaced  so frequently. <br /><span style=""></span><br /><span style=""></span> These convenient, money-saving features do not appear in the futures desired  by the networks or handset-makers, so they never appear in shiny concept videos  or adverts. Instead vast amounts of money and power are employed to convince us  that we need ever more features and services, to light up this one hugely  profitable path. Our expectations of our phones' capabilities must be raised  faster than the prices of older features falls in order to maintain profit and  demand. Sure the occasional person may seek out alternatives- perhaps  modifiable, tough, sustainable models with a longer battery life and the option  of privacy, but most people do not have the energy or resources to go it  alone.<br /><span style=""></span><br /><span style=""></span> Often the closing down of our future happens without us noticing &ndash; we find  ourselves believing that the obvious way is the only way. Other possibilities  which are rarely mentioned or which fall outside our precious model seem so  weird that we cannot accept them. This can happen to individuals or industries  or entire societies. But embracing the strange, the uncomfortable and the  unlikely is the best way to be prepared and to conceive of other solutions to  problems which seem intractable. Opening our eyes to possible but less  powerfully lit-up paths will be vital if we are to make real choices about our  future. <br /><span style=""></span><br /><span style=""></span> <em style="">Nesta has published a short paper on  technology futures and foresight with three maxims for how to think about the  future. The final maxim relates to this post - it is about opening up debates  about the future to alternative perspectives. Read the full paper: <a href="http://www.nesta.org.uk/home1/assets/features/dont_stop_thinking_about_tomorrow_a_modest_defence_of_futurology" style="">Don't  stop thinking about tomorrow: a modest defence of  futurology</a></em><br /><span style=""></span><br /><span style=""></span></div> <hr style="width:100%;clear:both;visibility:hidden;"></hr>]]></content:encoded></item><item><title><![CDATA[Why Security Holes In  Critical Infrastructure Are So Darn Hard To Fix]]></title><link><![CDATA[http://www.worldwidenetworkenterprises.com/blog/why-security-holes-in-critical-infrastructure-are-so-darn-hard-to-fix]]></link><comments><![CDATA[http://www.worldwidenetworkenterprises.com/blog/why-security-holes-in-critical-infrastructure-are-so-darn-hard-to-fix#comments]]></comments><pubDate>Wed, 01 May 2013 01:15:38 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.worldwidenetworkenterprises.com/blog/why-security-holes-in-critical-infrastructure-are-so-darn-hard-to-fix</guid><description><![CDATA[ By&nbsp;Antone GonsalvesSecurity researchers recently found gaping vulnerabilities in&nbsp;a wide variety  of critical business and industrial equipment. It turns out that weak or absent  passwords made it easy to break into more than 100,000 terminal servers used to  provide their Internet connections. Fixing the problem is simple. Change the  credentials dramatically reduces the risk. But for many companies, actually  solving the problem is nearly impossible. Vulnerable, But Hidden The threat [...] ]]></description><content:encoded><![CDATA[<span class='imgPusher' style='float:left;height:0px'></span><span style='z-index:10;position:relative;float:left;;clear:left;margin-top:0px;*margin-top:0px'><a><img src="http://www.worldwidenetworkenterprises.com/uploads/1/8/2/6/18262213/2248087.jpg" style="margin-top: 5px; margin-bottom: 10px; margin-left: 0px; margin-right: 10px; border-width:1px;padding:3px;" alt="Picture" class="galleryImageBorder" /></a><div style="display: block; font-size: 90%; margin-top: -10px; margin-bottom: 10px; text-align: center;"></div></span> <div class="paragraph" style="text-align:left;display:block;">By&nbsp;Antone Gonsalves<br><div><br></div><div><br></div><div id="anonymous_element_13">Security researchers recently found gaping vulnerabilities in&nbsp;a wide variety  of critical business and industrial equipment. It turns out that weak or absent  passwords made it easy to break into more than 100,000 terminal servers used to  provide their Internet connections. Fixing the problem is simple. Change the  credentials dramatically reduces the risk. But for many companies, actually  solving the problem is nearly impossible.<br style=""><span style=""></span><br style=""><span style=""></span> Vulnerable, But Hidden The threats discovered by security firm <a href="http://www.rapid7.com/" target="_blank" style="">Rapid7</a> exemplify the difficulties organizations face in  plugging even known holes in critical gear. In this case, the affected systems  include industrial control equipment, traffic-signal monitors, fuel pumps,  retail point-of-sale terminals and building automation equipment such as alarms  and heating and ventilation (HVAC) systems.<br style=""><span style=""></span><br style=""><span style=""></span> <a href="https://community.rapid7.com/community/metasploit/blog/2013/04/23/serial-offenders-widespread-flaws-in-serial-port-servers" target="_self" style="">Rapid7 found</a>&nbsp;more than 114,000 unprotected terminal servers,  mostly from <a href="http://www.digi.com/" target="_blank" style="">Digi International  </a>or <a href="http://www.lantronix.com/" target="_blank" style="">Lantronix</a>, that a  hacker could use to take control of the underlying systems. Finding the serial  ports on the server requires the use of a scanning tool, such as <a href="http://nmap.org/" target="_self" style="">Nmap.</a>&nbsp;Once an active port is found, a  command-line program similar to what those used in 1980s vintage home computers  is all that's needed to access a control panel or menu or capture data.<br style=""><span style=""></span><br style=""><span style=""></span> Fortunately, while tech-savvy saboteurs or terrorists would have no  difficulty gaining access to the equipment, they most likely would not know who  owns it or where it is located. Without that information, the find would not be  very useful. "There's no telling who they are going to hurt, if they don't know  where the device is," explained HD Moore, chief research officer for Rapid7.<br style=""><span style=""></span><br style=""><span style=""></span> How Security Gets Missed Nevertheless, any hole that can provide access to critical equipment is worth  plugging, but it's not likely to happen in many of these cases. Often, companies  do not even know the terminal server exists, much less that it needs security  updates.<br style=""><span style=""></span><br style=""><span style=""></span> How is that possible? Well, picture a vendor working with the facilities crew  installing an HVAC system that uses a terminal server so the equipment can be  monitored from a remote location. No one knows the server exists, and no one  cares, as long as everything works. "A lot of times IT is not even aware of  these systems," said Matthew Neely, director of research at risk management  company <a href="http://www.securestate.com/Pages/default.aspx" target="_self" style="">SecureState</a>.<br style=""><span style=""></span><br style=""><span style=""></span> Vendor marketing can also exacerbate the problem. Equipment is often sold as  being "secured," when in fact it is only "capable of being secured." That means  the buyer still has to add the technology or turn on and configure the security  features.<br style=""><span style=""></span><br style=""><span style=""></span> This can get missed if the installers assume the equipment is "plug and  play," said Joe Weiss, a security consultant for <a href="http://realtimeacs.com/" target="_self" style="">Applied Control Solutions</a>.&nbsp;"It's  like getting a toy for Christmas and you pull it out of the box expecting it to  run, because the box doesn't tell you it needs two AA batteries," Weiss  added.<br style=""><span style=""></span><br style=""><span style=""></span> Terminal servers, also called serial port servers, often get missed by  electric utility companies because they are not covered under federal  cybersecurity requirements. So the devices never make it on the utility's  compliance checklist. "They don't even have to check these out to find out if  they are or not secure," Weiss said.<br style=""><span style=""></span><br style=""><span style=""></span> This bizarre situation demonstrates that ensuring the security of critical  equipment is never a matter of technology alone. True security requires people  to pay attention, not just sweep everything under the rug.<br style=""><span style=""></span><br style=""><span style=""></span></div></div> <hr style="width:100%;clear:both;visibility:hidden;"></hr>]]></content:encoded></item><item><title><![CDATA[Can an open events venue really be considered secure? ]]></title><link><![CDATA[http://www.worldwidenetworkenterprises.com/blog/can-an-open-events-venue-really-be-considered-secure]]></link><comments><![CDATA[http://www.worldwidenetworkenterprises.com/blog/can-an-open-events-venue-really-be-considered-secure#comments]]></comments><pubDate>Thu, 18 Apr 2013 07:58:16 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.worldwidenetworkenterprises.com/blog/can-an-open-events-venue-really-be-considered-secure</guid><description><![CDATA[ by Steve Lasky Created:  April 16, 2013By the very nature of the venue, protecting events such as the Boston  Marathon are nearly impossible. The bombings at Monday&rsquo;s race that killed three  and injured more than 140 spectators, highlights the frustration encountered by  both the private sector and law enforcement when attempting to secure such a  public, open event. The challenge is monumental: Secure an area that encompasses more than  26-miles of public roadway with no protected perime [...] ]]></description><content:encoded><![CDATA[<span class='imgPusher' style='float:left;height:0px'></span><span style='z-index:10;position:relative;float:left;;clear:left;margin-top:0px;*margin-top:0px'><a href='http://www.securityinfowatch.com/article/10921817/can-an-open-events-venue-really-be-considered-secure'><img src="http://www.worldwidenetworkenterprises.com/uploads/1/8/2/6/18262213/5054841.jpg?316" style="margin-top: 5px; margin-bottom: 10px; margin-left: 0px; margin-right: 10px; border-width:1px;padding:3px;" alt="Picture" class="galleryImageBorder" /></a><div style="display: block; font-size: 90%; margin-top: -10px; margin-bottom: 10px; text-align: center;"></div></span> <div class="paragraph" style="text-align:left;display:block;"><div id="anonymous_element_92">by <a title="" href="http://www.securityinfowatch.com/contact/10239704/steve-lasky" style="">Steve Lasky</a> <br style="">Created:  April 16, 2013<br></div><div id="anonymous_element_92"><br></div>By the very nature of the venue, protecting events such as the Boston  Marathon are nearly impossible. The bombings at Monday&rsquo;s race that killed three  and injured more than 140 spectators, highlights the frustration encountered by  both the private sector and law enforcement when attempting to secure such a  public, open event.<br><span style=""></span><br><span style=""></span> The challenge is monumental: Secure an area that encompasses more than  26-miles of public roadway with no protected perimeter or focused areas of  ingress or egress; along with spectators who line both sides of the street along  the course and are encouraged to bring their own coolers and backpacks as they  cheer on the thousands of runners.<br><span style=""></span><br><span style=""></span> In a little more than two months, Atlanta will be hosting one of the three  biggest marathons in country, the Peachtree Road Race. Tracey Russell, Executive  Director for the Atlanta Track Club, which organizes the AJC Peachtree Road  Race, released the following statement regarding Monday's bombings at the Boston  Marathon: &ldquo;We are deeply saddened to hear the news of today's events in Boston.  Safety at every Atlanta Track Club event is our top priority. As it relates to  security with any large-scale event in Atlanta, we work very closely with the  City's Police and Fire Departments and Emergency Medical Service units, as well  as the Federal Emergency Management Agency and additional government agencies.  Our hearts go out to the entire Boston community and the victims affected by  this tragedy."<br><span style=""></span><br><span style=""></span> Atlanta is no stranger to big events or the tragedies that sometimes  accompany them. The city just hosted the NCAA&rsquo;s Final Four college basketball  championships earlier this month without incident; however, the memories of the  Olympic Centennial Park bombings during the 1996 Olympic Games have colored  preparation for large events ever since.<br><span style=""></span><br><span style=""></span> According to David Wardell, vice president, operations and public safety for  the Central Atlanta Progress and Atlanta Downtown Improvement District,  preparation for the Final Four began more than five months ago and continued  right up until tip off. The City of Atlanta coordinated training exercises and  collaborated with federal, state and local law enforcement for joint security  and emergency preparedness drills and training. &ldquo;We have been involved with DHS  to train and prepare those involved from the FBI, Georgia World Congress Center  security staff and Atlanta Police Department,&rdquo; he says. &ldquo;This had been an entire  private sector/public safety effort, with coordination from police, fire, and  other first responders. Everything that was done was very comprehensive.  Preparation went far beyond just guns and badges.<br><span style=""></span><br><span style=""></span> &ldquo;Because of our experience with the Olympic bombings, we are extremely  cautious when it comes to open-venue events,&rdquo; Wardell continues. &ldquo;The public  expects a high level of security and they accept it. The Final Four was second  only to the Olympics in our level of security preparation.&rdquo;<div><br></div><div id="anonymous_element_94">Pointing out the national magnitude of the event and the sheer volume of  spectators the event brought to the downtown area, Wardell instituted  educational symposiums for his staff in security and emergency preparedness that  outlined basic response scenarios. &ldquo;Bottom line, in large open events like this,  is you need to understand who your partners are and what resources you have at  your disposal,&rdquo; Wardell says. &ldquo;It is key to create a unified communications  structure and command organization, and there has to be a real spirit of  cooperation to make it work.&rdquo;<br style=""><span style=""></span><br style=""><span style=""></span> Wardell believes the officials at the Boston Marathon did their due diligence  and provided the most secure environment possible for fans and runners. &ldquo;Unless  you close off the entire venue, they did all they could do,&rdquo; he says. &ldquo;Securing  a 26-mile course would be so manpower-intensive that it is just not feasible.  You would have to bring in the military for such tactics. Now that is done for a  Presidential move, but for an event like this, it would be overkill and much too  cost-prohibitive.&rdquo;<br style=""><span style=""></span><br> David Holley, a senior managing director for the Boston office of Kroll  echoes the sentiment that events such as the Boston Marathon present huge  security challenges. &ldquo;Another difficulty in protecting an event like a marathon  is the fact that there are no assigned seats and the spectator crowd is  generally mobile,&rdquo; he wrote&nbsp;<a href="http://www.nydailynews.com/sports/security-impossible-marathon-article-1.1317674" target="_blank" style="">in an article published&nbsp;<em style="">The New  York Daily News</em></a>. &ldquo;Moving from place to place to secure a better view,  watch friends go by, or work their way down to the finish, the crowd is  generally always in motion. Knapsacks and handbags are picked up and put down  countless times, and frequently forgotten at the last location, making it  difficult to determine whether an object has been abandoned or unintentionally  left behind."<br style=""><span style=""></span><br style=""><span style=""></span> Indeed, the mess of &ldquo;left behinds&rdquo; after an event like a marathon is a  daunting task to sift through and dispose of, he added. These things make it  difficult to monitor and secure open-venue events, but it is also what makes  them wonderful events to attend, he said.<br style=""><span style=""></span><br style=""><span style=""></span> Wardell agrees that having the ability to screen fans at specific ingress  points is the most important difference between his Final Four and the marathon.  &ldquo;For the Final Four, even though we had open venues, they all had defined  perimeters with access control &mdash; even if that access control was just staring at  you and doing bag checks,&rdquo; he says. &ldquo;Fans and vendors (at the Final Four) were  required to go through a gauntlet or checkpoint that allowed for screening. At  the marathon, you had people standing 50-feet deep, sitting at cafes along the  route. How do you prepare for that?<br style=""><span style=""></span><br style=""><span style=""></span><span style=""></span><div><br><span style=""></span><br><span style=""></span></div></div></div> <hr style="width:100%;clear:both;visibility:hidden;"></hr>]]></content:encoded></item><item><title><![CDATA[Officials: 144 injured, 3 dead, as two huge  blasts rock Boston Marathon finish line ]]></title><link><![CDATA[http://www.worldwidenetworkenterprises.com/blog/explosions-at-the-boston-marathon]]></link><comments><![CDATA[http://www.worldwidenetworkenterprises.com/blog/explosions-at-the-boston-marathon#comments]]></comments><pubDate>Tue, 16 Apr 2013 02:24:04 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.worldwidenetworkenterprises.com/blog/explosions-at-the-boston-marathon</guid><description><![CDATA[&nbsp; &nbsp;PLEASE SUBMIT BOSTON MARATHON EXPLOSION TIPS   [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;"><strong style=""><font size="4">&nbsp; &nbsp;<a href="http://www.weebly.com/weebly/main.php#" title="" style="">PLEASE SUBMIT BOSTON MARATHON EXPLOSION TIPS</a></font></strong><br /></div>  <div class="wsite-youtube" style="margin-top:15px;margin-bottom:15px;"><div style="text-align: center;"><object width="400" height="330"><param name="movie" value="http://www.youtube.com/v/046MuD1pYJg?version=3"></param><param name="wmode" value="transparent"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/046MuD1pYJg?version=3" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" wmode="transparent" width="400" height="330"></embed></object></div></div>]]></content:encoded></item><item><title><![CDATA[Philosophical discussion about  post-/trans-humanism, humanism, and Kurzweil's Singularity timeline]]></title><link><![CDATA[http://www.worldwidenetworkenterprises.com/blog/philosophical-discussion-about-post-trans-humanism-humanism-and-kurzweils-singularity-timeline]]></link><comments><![CDATA[http://www.worldwidenetworkenterprises.com/blog/philosophical-discussion-about-post-trans-humanism-humanism-and-kurzweils-singularity-timeline#comments]]></comments><pubDate>Thu, 11 Apr 2013 22:44:45 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.worldwidenetworkenterprises.com/blog/philosophical-discussion-about-post-trans-humanism-humanism-and-kurzweils-singularity-timeline</guid><description><![CDATA[ [...] ]]></description><content:encoded><![CDATA[<div class="wsite-youtube" style="margin-top:5px;margin-bottom:5px;"><div style="text-align: left;"><object width="300" height="247"><param name="movie" value="http://www.youtube.com/v/7Sr1kcogOoE?version=3"></param><param name="wmode" value="transparent"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/7Sr1kcogOoE?version=3" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" wmode="transparent" width="300" height="247"></embed></object></div></div>]]></content:encoded></item><item><title><![CDATA[RUSSIA'S GOAL FOR HUMANITY : THE TRANSFORMATION AND THE CONVERGENCE OF SOCIAL MEDIA NETWORKS AND HUMAN BEINGS  INTO AVATARS/ROBOTS OF A NEW ERA- NEOHUMANITY]]></title><link><![CDATA[http://www.worldwidenetworkenterprises.com/blog/russias-goal-for-humanity-a-social-media-network-of-avatars-called-the-neohumanity]]></link><comments><![CDATA[http://www.worldwidenetworkenterprises.com/blog/russias-goal-for-humanity-a-social-media-network-of-avatars-called-the-neohumanity#comments]]></comments><pubDate>Tue, 09 Apr 2013 08:08:57 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.worldwidenetworkenterprises.com/blog/russias-goal-for-humanity-a-social-media-network-of-avatars-called-the-neohumanity</guid><description><![CDATA[  Space War... Cold War...Now the dawn of a new era...Neuro WarProject Avatar, Android robotics,  Anthropomorphic telepresence, Neuroscience, Mind  theory, Neuroengineering, Brain-Computer Interfaces,  Neuroprosthetics, Neurotransplantation, Long-range forecasting,  Future evolution strategy, Evolutionary transhumanism,  Ethics, Bionic prostheses, Cybernetic  life-extension, Mid-century Singularity, Neo-humanity,  Meta-intelligence, Cybernetic immortality, Consciousness,  Spiritual development,  [...] ]]></description><content:encoded><![CDATA[<div class="wsite-youtube" style="margin-top:5px;margin-bottom:5px;"><div style="text-align: left;"><object width="300" height="247"><param name="movie" value="http://www.youtube.com/v/01hbkh4hXEk?version=3"></param><param name="wmode" value="transparent"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/01hbkh4hXEk?version=3" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" wmode="transparent" width="300" height="247"></embed></object></div></div>  <div class="paragraph" style="text-align:left;"><strong>Space War... Cold War...Now the dawn of a new era...Neuro War</strong><br /><br /><strong style="">Project Avatar</strong>, Android robotics,  <strong style="">Anthropomorphic telepresence</strong>, Neuroscience, <strong style="">Mind  theory</strong>, Neuroengineering, <strong style="">Brain-Computer Interfaces</strong>,  Neuroprosthetics, <strong style="">Neurotransplantation</strong>, Long-range forecasting,  <strong style="">Future evolution strategy</strong>, Evolutionary transhumanism,  <strong style="">Ethics</strong>, Bionic prostheses, <strong style="">Cybernetic  life-extension</strong>, Mid-century Singularity, <strong style="">Neo-humanity</strong>,  Meta-intelligence, <strong style="">Cybernetic immortality</strong>, Consciousness,  <strong style="">Spiritual development</strong>, Science and Spirituality.&nbsp;</div>]]></content:encoded></item><item><title><![CDATA[Vernor Vinge: How to Prepare for the Singularity]]></title><link><![CDATA[http://www.worldwidenetworkenterprises.com/blog/vernor-vinge-how-to-prepare-for-the-singularity]]></link><comments><![CDATA[http://www.worldwidenetworkenterprises.com/blog/vernor-vinge-how-to-prepare-for-the-singularity#comments]]></comments><pubDate>Mon, 08 Apr 2013 01:03:24 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.worldwidenetworkenterprises.com/blog/vernor-vinge-how-to-prepare-for-the-singularity</guid><description><![CDATA[ [...] ]]></description><content:encoded><![CDATA[<div class="wsite-youtube" style="margin-top:5px;margin-bottom:5px;"><div style="text-align: left;"><object width="300" height="247"><param name="movie" value="http://www.youtube.com/v/AHqNl44JWD8?version=3"></param><param name="wmode" value="transparent"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/AHqNl44JWD8?version=3" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" wmode="transparent" width="300" height="247"></embed></object></div></div>]]></content:encoded></item><item><title><![CDATA[A New Kind of Science - Stephen Wolfram - 1]]></title><link><![CDATA[http://www.worldwidenetworkenterprises.com/blog/a-new-kind-of-science-stephen-wolfram-1]]></link><comments><![CDATA[http://www.worldwidenetworkenterprises.com/blog/a-new-kind-of-science-stephen-wolfram-1#comments]]></comments><pubDate>Thu, 28 Mar 2013 21:09:45 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.worldwidenetworkenterprises.com/blog/a-new-kind-of-science-stephen-wolfram-1</guid><description><![CDATA[ [...] ]]></description><content:encoded><![CDATA[<div class="wsite-youtube" style="margin-top:10px;margin-bottom:10px;"><div style="text-align: left;"><object width="300" height="247"><param name="movie" value="http://www.youtube.com/v/pZtGt332M0c?version=3"></param><param name="wmode" value="transparent"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/pZtGt332M0c?version=3" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" wmode="transparent" width="300" height="247"></embed></object></div></div>]]></content:encoded></item><item><title><![CDATA[Stephen Wolfram on the Singularity]]></title><link><![CDATA[http://www.worldwidenetworkenterprises.com/blog/stephen-wolfram-on-the-singularity]]></link><comments><![CDATA[http://www.worldwidenetworkenterprises.com/blog/stephen-wolfram-on-the-singularity#comments]]></comments><pubDate>Thu, 28 Mar 2013 21:09:13 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">http://www.worldwidenetworkenterprises.com/blog/stephen-wolfram-on-the-singularity</guid><description><![CDATA[ [...] ]]></description><content:encoded><![CDATA[<div class="wsite-youtube" style="margin-top:10px;margin-bottom:10px;"><div style="text-align: left;"><object width="300" height="247"><param name="movie" value="http://www.youtube.com/v/SSPOf8kqAxk?version=3"></param><param name="wmode" value="transparent"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.youtube.com/v/SSPOf8kqAxk?version=3" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" wmode="transparent" width="300" height="247"></embed></object></div></div>]]></content:encoded></item></channel></rss>