Toyota to suspend sales of Lexus GX 460 over new safety fears

Filed under: Uncategorized — Admin @ 3:11 pm, September 7, 2022.

Wednesday, April 14, 2010

Japanese auto maker Toyota is to temporarily suspend sales of its luxury Lexus GX 460 SUV following an unfavorable verdict from Consumer Reports, which concluded “Don’t Buy: Safety Risk,” the first such warning in almost a decade.

After conducting its standard emergency handling tests on the 2010 version of the Lexus GX 460, Consumer Reports became concerned that the rear of the vehicle had a tendency to slide out, which in real life situations could lead to rollovers. However, the consumer organisation is also unaware of any such incidents with the 5000 GX 460s sold since its launch three months ago.

Already embattled with ongoing safety issues with its vehicles, Toyota has been quick to act, though it did claim that the car was safe to drive and that it had passed internal safety standards. According to Toyota, “Lexus’ extensive vehicle testing provides a good indication of how our vehicles perform and we are confident that the GX meets our high safety standards.”

Retrieved from “https://en.wikinews.org/w/index.php?title=Toyota_to_suspend_sales_of_Lexus_GX_460_over_new_safety_fears&oldid=1001884”

Red Hat to move focus away from CentOS in favour of Stream; CentOS team discuss implications with Wikinews

Filed under: Uncategorized — Admin @ 3:05 pm, September 6, 2022.

Monday, December 14, 2020

On Tuesday, US-based software company Red Hat announced their plans to shift their focus away from CentOS in favour of CentOS Stream.

In the blog post Chris Wright, the Chief Technological Officer of Red Hat said Red Hat had informed the CentOS governing board that Red Hat was “shifting our investment fully from CentOS Linux to CentOS Stream”. At least five of the nine CentOS Governing Board listed on the project are Red Hat employees.

Started in 2004, CentOS has been a free-of-cost free/libre open source software which provided binary-code compatibility with Red Hat Enterprise Linux (RHEL) — Red Hat’s GNU General Public Licensed paid operating system. CentOS was absorbed into Red Hat in 2014, with Red Hat gaining the trademark rights of “CentOS”.

Red Hat also sponsors the Fedora operating system. Red Hat even gives the software engineering interns laptops with Fedora on it. Till now, software development took place on Fedora, which was later adopted in RHEL, which the Red Hat maintained and provided support for, for those customers who had RHEL subscription. CentOS would then follow RHEL to provide the same features free of cost, but without the support.

Stream was announced in September 2019, just two months after Red Hat was acquired by IBM. CentOS Stream’s development cycle had new features added to it before the features became a part of RHEL. Stream receives more frequent updates, however, it does not follow RHEL’s release cycle.

With CentOS Stream, developments from the community and the Red Hat emplyees would take place beforehand on both Fedora, and Stream as a rolling release, before those features are absorbed into RHEL. CentOS followed the release cycle of RHEL and therefore it was a stable distribution. Features available in CentOS were tried and tested by Fedora, and then RHEL maintainers. Stream, on the other hand, has features added to it before those features become a part of RHEL. That implies Stream would be ahead of RHEL’s development, containing new features which are not yet tried and tested by RHEL developers, and not be binary code-compatible with RHEL.

Writing “The future of CentOS Linux is CentOS Stream”, Wright further wrote in the announcement, CentOS Stream “provides a platform for rapid innovation at the community level but with a stable enough base to understand production dynamics.” Wright also said, “CentOS Stream isn’t a replacement for CentOS Linux; rather, it’s a natural, inevitable next step intended to fulfill the project’s goal of furthering enterprise Linux innovation.”

Since the announcement was made, many people expressed their anger on Internet Relay Chat (IRC), Reddit and CentOS project’s mailing list. CentOS 8’s End of Life (EOL) has been moved up from May 2029 to December 31, 2021, while CentOS 7 is expected to receive maintenance updates through June 2024, outliving CentOS 8.

Gregory Kurtzer, who had started the CentOS project, announced a new operating system, Rocky Linux. Rocky Linux describes itself as “a community enterprise Operating System designed to be 100% bug-for-bug compatible with Enterprise Linux”. The project said “Rocky Linux aims to function as a downstream build as CentOS had done previously, building releases after they have been added to the upstream vendor, not before.” The project maintainers have not decided a date for when the operating system will be released.

Kurtzer explained the reason to call the OS as Rocky Linux: “Thinking back to early CentOS days… My cofounder was Rocky McGaugh. He is no longer with us, so as a H/T [hat tip] to him, who never got to see the success that CentOS came to be, I introduce to you…Rocky Linux”.

Wikinews reached out to the members of the CentOS project, Pablo Greco and Rich Bowen, to discuss this move, its implications as well as the future of CentOS. Greco is a maintainer of armhfp (32-bit processors) and is a part of the CentOS’ quality assurance team. Bowen — who unlike Greco, works for Red Hat — is the community manager of the CentOS project.

 This story has updates See Gregory Kurtzer discusses plans for Rocky Linux with Wikinews as Red Hat announces moving focus away from CentOS, December 18, 2020 

Retrieved from “https://en.wikinews.org/w/index.php?title=Red_Hat_to_move_focus_away_from_CentOS_in_favour_of_Stream;_CentOS_team_discuss_implications_with_Wikinews&oldid=4684506”

Interview with Vicky Dhillon, City Council candidate for Wards 9 & 10 in Brampton, Canada

Filed under: Uncategorized — Admin @ 4:28 pm, September 5, 2022.

Thursday, October 26, 2006

The upcoming 2006 Brampton municipal election, to be held November 13, features an array of candidates looking to represent their wards in city council or the council of the Peel Region.

Wikinews contributor Nick Moreau contacted many of the candidates, including Vicky Dhillon, asking them to answer common questions sent in an email. This ward’s incumbent is Garnett Manning; also challenging Manning is Stella Ambler, Mandeep Dhaliwal, Daljit Gill, and Nalem Malik.

Retrieved from “https://en.wikinews.org/w/index.php?title=Interview_with_Vicky_Dhillon,_City_Council_candidate_for_Wards_9_%26_10_in_Brampton,_Canada&oldid=438251”

300 209 Exam Dumps}

Filed under: Networkings Solutions — Admin @ 4:22 pm, .

300-209 Exam Dumps

by

Adila Masih

Question: 1

Which two are characteristics of GETVPN? (Choose two.)

A. The IP header of the encrypted packet is preserved

B. A key server is elected among all configured Group Members

C. Unique encryption keys are computed for each Group Member

D. The same key encryption and traffic encryption keys are distributed to all Group Members

Answer: A, D

Question: 2

A company has decided to migrate an existing IKEv1 VPN tunnel to IKEv2. Which two are valid configuration constructs on a Cisco IOS router? (Choose two.)

A. crypto ikev2 keyring keyring-name

peer peer1

address 209.165.201.1 255.255.255.255

pre-shared-key local key1

pre-shared-key remote key2

B. crypto ikev2 transform-set transform-set-name

esp-3des esp-md5-hmac

esp-aes esp-sha-hmac

C. crypto ikev2 map crypto-map-name

set crypto ikev2 tunnel-group tunnel-group-name

set crypto ikev2 transform-set transform-set-name

D. crypto ikev2 tunnel-group tunnel-group-name

match identity remote address 209.165.201.1

authentication local pre-share

authentication remote pre-share

E. crypto ikev2 profile profile-name

match identity remote address 209.165.201.1

authentication local pre-share

authentication remote pre-share

Answer: A, E

Question: 3

Which four activities does the Key Server perform in a GETVPN deployment? (Choose four.)

A. authenticates group members

B. manages security policy

C. creates group keys

D. distributes policy/keys

E. encrypts endpoint traffic

F. receives policy/keys

G. defines group members

Answer: A, B, C, D

Question: 4

Where is split-tunneling defined for remote access clients on an ASA?

A. Group-policy

B. Tunnel-group

C. Crypto-map

D. Web-VPN Portal

E. ISAKMP client

Answer: A

Question: 5

Which of the following could be used to configure remote access VPN Host-scan and pre-login policies?

A. ASDM

B. Connection-profile CLI command

C. Host-scan CLI command under the VPN group policy

D. Pre-login-check CLI command

Answer: A

Question: 6

In FlexVPN, what command can an administrator use to create a virtual template interface that can be configured and applied dynamically to create virtual access interfaces?

A. interface virtual-template number type template

B. interface virtual-template number type tunnel

C. interface template number type virtual

D. interface tunnel-template number

Answer: B

Here is a reference an explanation that can be included with this test.

http://www.cisco.com/en/US/docs/ios-xml/ios/sec_conn_ike2vpn/configuration/15-2mt/sec-flex-spoke.html#GUID-4A10927D-4C6A-4202-B01C-DA7E462F5D8A

Configuring the Virtual Tunnel Interface on FlexVPN Spoke

SUMMARY STEPS

1. enable

2. configure terminal

3. interface virtual-template number type tunnel

4. ip unnumbered tunnel number

5. ip nhrp network-id number

6. ip nhrp shortcut virtual-template-number

7. ip nhrp redirect [timeout seconds]

8. exit

Question: 7

In FlexVPN, what is the role of a NHRP resolution request?

A. It allows these entities to directly communicate without requiring traffic to use an intermediate hop

B. It dynamically assigns VPN users to a group

C. It blocks these entities from to directly communicating with each other

D. It makes sure that each VPN spoke directly communicates with the hub

Answer: A

Question: 8

What are three benefits of deploying a GET VPN? (Choose three.)

A. It provides highly scalable point-to-point topologies.

B. It allows replication of packets after encryption.

C. It is suited for enterprises running over a DMVPN network.

D. It preserves original source and destination IP address information.

E. It simplifies encryption management through use of group keying.

F. It supports non-IP protocols.

Answer: B, D, E

Question: 9

What is the default topology type for a GET VPN?

A. point-to-point

B. hub-and-spoke

C. full mesh

D. on-demand spoke-to-spoke

Answer: C

Question: 10

Which two GDOI encryption keys are used within a GET VPN network? (Choose two.)

A. key encryption key

B. group encryption key

C. user encryption key

D. traffic encryption key

Answer: A, D

Question: 11

What are the three primary components of a GET VPN network? (Choose three.)

A. Group Domain of Interpretation protocol

B. Simple Network Management Protocol

C. server load balancer

D. accounting server

E. group member

F. key server

Answer: A, E, F

Question: 12

Which two IKEv1 policy options must match on each peer when you configure an IPsec site-to-site VPN? (Choose two.)

A. priority number

B. hash algorithm

C. encryption algorithm

D. session lifetime

E. PRF algorithm

Answer: B, C

Question: 13

Which two parameters are configured within an IKEv2 proposal on an IOS router? (Choose two.)

A. authentication

B. encryption

C. integrity

D. lifetime

Answer: B, C

Question: 14

In a spoke-to-spoke DMVPN topology, which type of interface does a branch router require?

A. Virtual tunnel interface

B. Multipoint GRE interface

C. Point-to-point GRE interface

D. Loopback interface

Answer: B

Question: 15

Refer to the exhibit.

After the configuration is performed, which combination of devices can connect?

A. a device with an identity type of IPv4 address of 209.165.200.225 or 209.165.202.155 or a certificate with subject name of “cisco.com”

B. a device with an identity type of IPv4 address of both 209.165.200.225 and 209.165.202.155 or a certificate with subject name containing “cisco.com”

C. a device with an identity type of IPv4 address of both 209.165.200.225 and 209.165.202.155 and a certificate with subject name containing “cisco.com”

D. a device with an identity type of IPv4 address of 209.165.200.225 or 209.165.202.155 or a certificate with subject name containing “cisco.com”

Answer: D

Question: 16

Which three settings are required for crypto map configuration? (Choose three.)

A. match address

B. set peer

C. set transform-set

D. set security-association lifetime

E. set security-association level per-host

F. set pfs

Answer: A, B, C

Question: 17

A network is configured to allow clientless access to resources inside the network. Which feature must be enabled and configured to allow SSH applications to respond on the specified port 8889?

A. auto applet download

B. port forwarding

C. web-type ACL

D. HTTP proxy

Answer: B

Question: 18

Consider this scenario. When users attempt to connect via a Cisco AnyConnect VPN session, the certificate has changed and the connection fails.

What is a possible cause of the connection failure?

A. An invalid modulus was used to generate the initial key.

B. The VPN is using an expired certificate.

C. The Cisco ASA appliance was reloaded.

D. The Trusted Root Store is configured incorrectly.

Answer: C

Question: 19

In the Cisco ASDM interface, where do you enable the DTLS protocol setting?

A. Configuration > Remote Access VPN > Network (Client) Access > Group Policies > Add or Edit > Add or Edit Internal Group Policy

B. Configuration > Remote Access VPN > Network (Client) Access > AAA Setup > Local Users > Add or Edit

C. Device Management > Users/AAA > User Accounts > Add or Edit > Add or Edit User Account > VPN Policy > SSL VPN Client

D. Configuration > Remote Access VPN > Network (Client) Access > Group Policies > Add or Edit

Answer: C

Reference:

http://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect20/administrative/guide/admin/admin5.html

Shows where DTLS can be configured as:

Configuration > Remote Access VPN > Network (Client) Access > Group Policies > Add or Edit > Add or Edit Internal Group Policy > Advanced > SSL VPN Client

Configuration > Remote Access VPN > Network (Client) Access > AAA Setup > Local Users > Add or Edit > Add or Edit User Account > VPN Policy > SSL VPN Client

Device Management > Users/AAA > User Accounts > Add or Edit > Add or Edit User Account > VPN Policy > SSL VPN Client

Question: 20

What are two forms of SSL VPN? (Choose two.)

A. port forwarding

B. Full Tunnel Mode

C. Cisco IOS WebVPN

D. Cisco AnyConnect

Answer: CD

Test Information:Total Questions: 271Test Number: 300-209Vendor Name: CISCOCert Name: CISCO VPN SECURITY SPECIALISTTest Name: Implementing Cisco Secure Mobility Solutions (SIMOS)Official Site:http://www.directcertify.co.ukFor More Details: http://www.directcertify.co.uk/300-209.html

Article Source:

eArticlesOnline.com}

Mandela discharged from hospital

Filed under: Uncategorized — Admin @ 4:14 pm, .

Monday, September 2, 2013

Nelson Mandela has left hospital to return to his home in Johannesburg, in a critical condition, South African officials said on Sunday.

The 95-year-old anti-apartheid leader and former South African president has spent nearly three months in hospital for treatment of a recurring lung infection and has returned to his residence in Johannesburg where he will continue to recover.

A statement from the office of current South African president Jacob Zuma confirmed Mandela homecoming:

“His teams of doctors are convinced that he will receive the same level of intensive care at his Houghton home that he received in Pretoria.”

“His home has been reconfigured to allow him to receive intensive care there. The health care personal providing care at his home are the very same who provided care to him in hospital.”

Several ambulances and TV crews gathered outside Mandela’s home in the Houghton suburb of Johannesburg on Sunday, where well-wishers gathered to pray for his recovery.

Mandela’s last public appearance was at the 2010 football World Cup, held in South Africa.

Retrieved from “https://en.wikinews.org/w/index.php?title=Mandela_discharged_from_hospital&oldid=2542084”

British supermarket chain Tesco to sell its Polish branch to Salling Group A/S

Filed under: Uncategorized — Admin @ 4:32 pm, September 3, 2022.

Sunday, June 21, 2020

On Thursday, UK-based retailer Tesco and Denmark-based retailer Salling Group announced their agreement over selling a large portion of Tesco’s Polish operation to Salling Group. Tesco stated its intention to leave the Polish market altogether, Salling its intention to strengthen its Netto chain in Poland.

The deal covers 301 stores, two distribution centers and the head office. With the acquisition Salling said it seeks to improve its coverage in Southern Poland and, over 18 months at a cost of one billion z?otys, intends to merge these stores into its currently 386 strong Netto chain. Salling also takes over about 7000 employees from Tesco — Netto Poland currently has about 5000 employees. Tesco continues to run 19 stores, which were not included in this package.

The sale price, to be payed in cash, is 900 million z?otys (181 million pounds). In the 2019/20 fiscal year, Tesco said its Polish branch had a 24 million pounds operating loss with a 1368 million pounds turnover; to which the sold units contributed with a 947 million pounds turnover for a 107 million loss. At fiscal year-end, the sold units held a value of 681 million pounds in the books.

UOKiK, the Polish anti-monopoly agency, has to approve the deal. The parties said they expect a decision this year.

Tesco has suffered losses from its Polish operation for several years, as customer preference has shifted away from hypermarkets, Tesco’s preferred store size, to smaller discount stores like Biedronka and LIDL. The Sunday trade ban, introduced in 2018, also hurt sales. According to Notes from Poland (NFP), some discount stores resorted to offer postal services, a loophole which allows Sunday opening hours.

In 2015, Tesco centralized its management in the Central European region, comprising Czechia, Hungary, Poland, and Slovakia, but reverted the decision later on. At the time, the company invested in e-commerce and started home deliveries, but Gazeta Prawna reports only 0.5% of Polish grocery turnover comes from this segment, compared to 7% in the United Kingdom.

In the past few years, Tesco Polska has cut expenditures by streamlining its product range, halving its staff, shutting off home deliveries in parts of the country, and closing off stores, reportedly including last year its Poznan distribution center. Deutsche Welle (DW) reported in mid-2019, 62 Tesco outlets had closed within a year. Staff layoffs left meat, fish and delicatessen departments without designated shop assistants, and forced staff canteen closures and administration simplifications.

Tesco sold its roughly 2000 Thai and 74 Malaysian stores to Charoen Pokphand in March; announced leaving its joint venture with China Resources Holdings in February; and in 2015 sold its South Korean chain HomePlus. Speaking to Portfolio.hu, Matt Simister, Tesco’s CEO for Central Europe, explained that the company held a 4% share of the Polish retail market, compared to its 16% share in Hungary, and stated they want to stay in Hungary. In a DW report in March of last year, Dave Lewis, CEO of Tesco, stated they did not have intentions of leaving Thailand or Poland.

Tesco’s Polish operation, according to Gazeta Wyborcza in March, is too big for a single monolithic sale. The chain’s press release reported 22 sold units in the past year and a half, for around 200 million pounds. NFP named the Kaufland chain and property developer Echo Investment among the buyers.

Both Tesco and Salling entered the Polish market in 1995.

Retrieved from “https://en.wikinews.org/w/index.php?title=British_supermarket_chain_Tesco_to_sell_its_Polish_branch_to_Salling_Group_A/S&oldid=4577092”

Wikinews’ overview of the year 2007

Filed under: Uncategorized — Admin @ 4:29 pm, .

Monday, December 31, 2007

What would you tell your grandchildren about 2007 if they asked you about it in, let’s say, 20 year’s time? If the answer to a quiz question was 2007, what would the question be? The year that you first signed on to Facebook? The year Britney Spears and Amy Winehouse fell apart? The year author Kurt Vonnegut or mime Marcel Marceau died, both at 84?

Let’s take a look at some of the international stories of 2007. Links to the original Wikinews articles are in bold.

Retrieved from “https://en.wikinews.org/w/index.php?title=Wikinews%27_overview_of_the_year_2007&oldid=4678722”

Precaution Required In Cosmetic Surgery

Filed under: Plastic Surgery — Admin @ 4:13 pm, September 2, 2022.

Precaution Required in Cosmetic Surgery

by

Riki Clark

Cosmetic surgery or plastic surgery is a best way to improve your physique or appearance of your personality. If you are not satisfied with you personality then you can take help of cosmetic surgeon to improve your personality. It helps you to not to look beautiful, but also to feel better and also give you personal satisfaction also. There are also some disadvantages of this facility. So, before taking the help of cosmetic surgery we have to consider the following factors like,

[youtube]http://www.youtube.com/watch?v=tnkzrcOlcnc[/youtube]

– This facility gives you the improvement not the perfection. You don’t get perfect personality according to your expectation. – This surgery not able to cover most of the health insurance plans. So it is a risky matter. – Some times cosmetic surgery is not done according to the customer requirement. So, it creates dissatisfaction. – Surgical Complications are possible. – This Surgery needs times like need month, weeks, days for recovery. So, if you want to do cosmetic surgery abroad then you have to choose the best cosmetic surgeons. Choose the best one who is specializes in the procedure and in their specific area. Always beware of fake certified surgeons especially in those cases when you are going to do Eyelid surgery in Prague. It is always important to remember that not all referral are equal. Seek some recommendation from people you trust like your family elder persons, your family doctors, your friends. They always give you the right guidance. Always remember one thing that if you found best surgeon at affordable price then it is beneficial for you. Make sure that you are absolutely comfortable with your surgeon before proceeding to surgery. Cosmetic Surgery as a Mainstream Attraction The emphasis on safer, option-laden cosmetic procedures is attracting people from all walks of life. In the past, cosmetic surgery reached a white female elite demographic. The field is now experiencing a growing interest among minorities, men and patients from various age and economic backgrounds. Stigma from the past is now outdated. Comprehensive Cosmetic Procedures Another new trend in cosmetic surgery involves combination treatments. What with a developed understanding of the human body, cosmetic surgery practices are not only safer and more convenient, but can also be comprehensive. Gone are the days of lengthy surgical procedures and recovery periods. Granted, the field of cosmetic surgery still practices practicality. But it’s very common to combine many minimally invasive procedures. For example, a patient may elect to have Botox injections, hyaluronic fillers and laser hair removal in one setting. Other cosmetic surgical procedures that can typically be combined include face and neck lifts. Liposuction can also be performed with a tummy tuck or breast augmentation. In fact, liposuction can safely be merged with most cosmetic surgical procedure to enhance results. The Treatment Plan Many cosmetic surgeons are enlisting treatment plans for their patients to help the patient prioritize what they would like to change about appearance. Treatment plans can incorporate timeframes ranging from a few months to several years. The emerging trend of treatment plans in cosmetic surgery opens the doors of communication between doctor and patient.

Visit www.plasticcosmeticsurgeryindia.com for

Cosmetic Surgery India

and

Plastic Surgery India

.

Article Source:

ArticleRich.com

Seven bushfires near Perth, Western Australia

Filed under: Uncategorized — Admin @ 3:46 pm, August 31, 2022.

Sunday, February 4, 2007

Fourteen houses have been destroyed and another 3 damaged by a bush fire burning in Jarrah forests and farmland near the historical timber town of Dwellingup 70km south east of Perth, Western Australia.

The fire has also destroyed approximately 100 power poles, leading to a loss of telecommunication services to the town and affecting water supplies. Mobile generators have been installed for emergency power.

Steve Slavin, spokesman for Department of Environment and Conservation (DEC), said that 250 fire-fighters are containing the fire with crews concentrating on the southern front, which is now within 3 km of the town.

Mr Slavin said “Our concern is that winds this afternoon will be swinging around to the south and increasing in intensity.” “It’s making us nervous. The advice we’re giving to people in Dwellingup is if they’ve decided that they will leave, this would be a good time to do it”

In separate fires near North Yunderup, Greenfields and Parkland have affected transmission lines supplying power to approximately 56,000 properties.

Additional fires are burning near Toodyay 85km north east of Perth, Another fire is burning near Williams approximately 160 south east of Perth and 90Km east of Dwellingup. And in the southern rural suburb of Forrestdale. These fires are reported to be under control.

Western Australian Police Arson squad are investigating these fires as some appear to be deliberately lit. The Police are also investigating the death of a women in her mid 20’s who died on Saturday after her car rolled while fleeing the fire near Toodyay.

Retrieved from “https://en.wikinews.org/w/index.php?title=Seven_bushfires_near_Perth,_Western_Australia&oldid=2470840”

Market maker Bernard L. Madoff arrested in $50B ‘giant Ponzi scheme’

Filed under: Uncategorized — Admin @ 3:42 pm, .
 Correction — January 10, 2009 This article incorrectly states that Mr Madoff attended Hofstra University Law School. His education was actually with Hofstra College, which he graduated from in 1960. 

Friday, December 12, 2008

Top broker and Wall Street adviser Bernard L. Madoff, aged 70, was arrested and charged by the FBI on Thursday with a single count of securities fraud, also known as stock fraud and investment fraud. He allegedly told senior employees of his firm on Wednesday that his $50 billion business “is all just one big lie” and that it was “basically, a giant Ponzi scheme (since at least 2005).” Mr. Madoff faces up to 20 years imprisonment and a fine of up to $5 million. FBI agent Theodore Cacioppi said Mr. Madoff’s investment advisory business had “deceived investors by operating a securities business in which he traded and lost investor money, and then paid certain investors purported returns on investment with the principal received from other, different investors, which resulted in investors’ losses of approximately $50 billion dollars.”

The former chairman of the Nasdaq Stock Market is also the founder and primary owner of Bernard L. Madoff Investment Securities LLC, the closely-held market-making firm he launched in 1960. The firm is one of the top market maker firms on Wall Street. He founded his family firm with an initial investment of $5,000, after attending Hofstra University Law School. He saved the money earned from a job lifeguarding at Rockaway Beach in Queens and a part time job installing underground sprinkler systems.

A force in Wall Street trading for nearly 50 years, he has been active in the National Association of Securities Dealers (NASD), a self-regulatory organization for the U.S. securities industry. His firm was one of the five most active firms in the development of the NASDAQ, having been known for “paying for order flow,” in other word paying a broker to execute a customer’s order through Madoff. He argued that the payment to the broker did not alter the price that the customer received. He ran the investment advisory as a secretive business, however.

Dan Horwitz, counsel of Mr. Madoff, in an interview, said that “he is a longstanding leader in the financial-services industry with an unblemished record; he is a person of integrity; he intends to fight to get through this unfortunate event.” Mr. Madoff was released on his own recognizance on the same day of his arrest, after his 2 sons turned him in, and posting $10 million bail secured by his Manhattan apartment. Without entering any plea, the Court set the preliminary hearing for January 12.

Madoff’s hedge fund scheme may rank among the biggest fraud in history. When former energy trading giant Enron filed for bankruptcy in 2001, one of the largest at the time, it had $63.4 billion in assets. The scheme would dwarf past Ponzis, and it would further be nearly five times the telecommunication company WorldCom fraud and bankruptcy proceedings in 2002.

The Securities and Exchange Commission filed a separate civil suit on Thursday against Bernard L. Madoff Investment Securities and its eponymous founder Mr. Madoff. It was docketed as “U.S. v. Madoff,” 08-MAG-02735, by the U.S. District Court for the Southern District of New York (Manhattan). SEC, New York associate director of enforcement, Andrew M. Calamari, asked the judge to issue seizure orders on the firm and its assets, and appoint a receiver. The SEC pleads, among others, that “it was an ongoing $50 billion swindle; our complaint alleges a stunning fraud that appears to be of epic proportions.” It further accused the defendant of “paying returns to certain investors out of the principal received from other, different investors” for years. Madoff’s hedge fund business had previously claimed to have served between 11 and 25 clients and had $17.1 billion in assets under management. But virtually all of the assets were missing.

United States District Court for the Southern District of New York Louis L. Stanton on Thursday appointed Lee Richards, a Manhattan lawyer, as the firm’s receiver. A hearing is set for Friday, for a ruling on the SEC’s petition to grant plenary powers to the receiver over the entire firm, and an absolute asset sequestration.

Doug Kass, president of hedge fund Seabreeze Partners Management said that “this is a major blow to confidence that is already shattered — anyone on the fence will probably try to take their money out.”

Retrieved from “https://en.wikinews.org/w/index.php?title=Market_maker_Bernard_L._Madoff_arrested_in_$50B_%27giant_Ponzi_scheme%27&oldid=4561285”
« Previous PageNext Page »