• Home
  • Tag: 杭州妃子阁

Tottenham out after Juve’s Wembley comeback

first_imgEmbed from Getty ImagesTottenham 1 Juventus 2(Juventus won 4-3 on aggregate)A stunning comeback by Juventus at Wembley knocked Tottenham out of the Champions League.After a 2-2 draw in the first leg in Turin, Spurs knew their away goals meant a clean sheet would guarantee them a place in the quarter-finals.And they found themselves in an even stronger position by half-time of the second leg courtesy of Son Heung-min’s goal six minutes before the interval.Son’s scuffed effort following Kieran Trippier’s ball across the face of goal was enough to put Spurs ahead and was a just reward for their first-half dominance.Embed from Getty ImagesBut the Italian side hit back by scoring twice in the space of three minutes midway through the second half.Gonzalo Higuaín netted from close range and then set up Paulo Dybala, whose goal proved to be decisive.Harry Kane headed against the post in the 90th minute as Tottenham tried in vain to find an equaliser.Tottenham: Lloris, Trippier, Sanchez, Vertonghen, Davies, Dier (Lamela 74), Dembele, Eriksen, Alli (Llorenta 86), Son, Kane.Subs not used: Vorm, Rose, Wanyama, Lucas, Sissoko. Follow West London Sport on TwitterFind us on Facebookby Taboolaby TaboolaSponsored LinksSponsored LinksPromoted LinksPromoted LinksRecommended for youAspireAbove.comRemember Pauley Perrette? Try Not To Smile When You See Her NowAspireAbove.comUndoLifestly.com25 Celebs You Didn’t Realize Are Gay – No. 8 Will Surprise WomenLifestly.comUndoUsed Cars | Search AdsUsed Cars in Tuen Mun Might Be Cheaper Than You ThinkUsed Cars | Search AdsUndoTopCars15 Ugliest Cars Ever MadeTopCarsUndoezzin.com20 Breathtaking Places to See Before You Dieezzin.comUndoFood World Magazine15 Fruits that Burn Fat Like CrazyFood World MagazineUndoDrhealth35 Foods That Should Never Be Placed in the RefrigeratorDrhealthUndoHappyTricks.comHer House Always Smells Amazing – Try her Unique Trick!HappyTricks.comUndolast_img read more

Dover I.D. Trial Calls Star Witness

first_imgMichael “Irreducible Complexity” Behe, the Lehigh biochemist famous for flagella, mousetraps and black boxes, took the stand in the Dover, Pennsylvania trial Monday Oct. 17.  This was widely reported, such as in New Scientist, MSNBC News and the Washington Post.  For an ID-friendly report with more detail of the actual proceedings, see EvolutionNews.    Behe snowed some of the listeners with technical jargon, but otherwise maintained his position that evidence for intelligent design in biology is overwhelming, based on positive evidence, not admissions of ignorance.  He also took swipes at the ability of Darwinian mechanisms to explain molecular machines.    Other school boards are watching this trial with both interest and trepidation.  The Washington Post said,More school boards are considering mandating mention of intelligent design.  Randy Tomasacci, a school board member from Shickshinny, north of Harrisburg, said his board is debating whether to require teachers to spend a few days on intelligent design.  We’re thinking about it,” he said.  “But we don’t want to get sued out of existence.”For Behe’s part, he is safe.  Though Lehigh University, where he teaches, has repudiated intelligent design, Behe has tenure and (unlike some other ID supporters) cannot be terminated for his views.  Reporters and critics, meanwhile, seemed fixated on Behe’s Catholicism and on whether he believed the Designer is God.Can’t the reporters get fixated on the evidence instead?  Maybe they would learn something about science instead of the secret motivations of their caricatured foes.  At least anti-ID reporter Alan Boyle is working his way through Lee Strobel’s book The Case for a Creator among his stack of pro-evolution books and websites (see MSNBC), perhaps after being sufficiently hammered by emails from readers about his bias.  MSNBC also printed a story about a parent worried that his daughter might not be accepted by other students if she doesn’t agree with ID.  No worries.  Christians don’t believe in doing unto others as they did unto us.(Visited 9 times, 1 visits today)FacebookTwitterPinterestSave分享0last_img read more

African musicians mine a rich vein of history

first_imgAfrican rappers and pop stars are still sticking to the ancient traditions of the griot by using music to share knowledge, preserve history and inform the public of social issues. Pictured above is Gambian griot, Toumani Diabaté, performing at the Back2Black Festival in Rio de Janeiro in 2010. (Image: Domingos Guimaraens)Shamin ChibbaYoung Africans are turning to a familiar medium to air their views on issues that affect them and their communities: music, and particularly, the artistry of the griot.The griot, otherwise known as jali, is a caste of musicians from West Africa. Similar to bards, they are known mainly for relating history and social issues through music and poetry. British rapper and poet Akala said the griot was a “rhythmic, aural poet, singer, musician and custodian of the history and spiritual tradition of that [Malian] empire and culture”. Their music, he added, manifested in the United States as ragtime, blues, jazz, and hip hop.But griots also played greater roles: as storytellers, historians, diplomats, genealogists, teachers, warriors and even ambassadors. And modern day musicians from West Africa are keeping up the griot tradition by addressing societal issues, albeit with the latest technology and newer musical forms. For instance, Senegalese duo Xuman and Keyti have created an innovative form of using hip hop to tell the news. Le Journal Rappe, which is broadcast on You Tube, reports on current issues that are rapped to a looping beat.When he appeared on the online documentary series My Africa Is, Xuman said the programme reached out to a youth who did not read the news and did not dig deeper to find the absolute truth. “They stop at sensational headlines that are put together to recap the news. We said to ourselves, it wouldn’t be a bad idea to give our point of view to the everyday Senegalese person and say: ‘Listen, you have to learn to think differently.’ And all that led to Le Journal Rappe being created.”It came about as a reaction to the change to the constitution wrought by former Senegalese president Abdoulaye Wade, which would allow him to run for a third term in office. The youth were against this and took to the streets in protest. He eventually lost the election to the current president, Macky Sall. “Wade wasn’t a dictator,” said Keyti, the other half of the rap duo, “but he was trying to take away certain liberties [to which] the Senegalese were already accustomed.”The series has become popular among the youth in Senegal, where it has done its job of keeping them informed about current issues. Their model has been so successful that it has even been adopted by rappers in Vietnam, Jamaica and Uganda. The pair completed their second season in August, but there are no signs whether a third season will be produced. Xuman said it was difficult to find sponsors for the show as certain businesses were afraid to be associated with Le Journal Rappe. “Unfortunately it closes the door on us.”However, if there was a third season, Xuman assured it would continue to address issues in society, question the authorities and “make our opinions heard”. HeritagePrince Diabaté, a griot from Guinea, said that when a griot died, it was like a library burning. “We did not write the history on paper before, but the griot has all the history in his head. So when he passes away he is going with the history.”Diabate plays the kora, a 21-string lute-bridge-harp that typifies the griot. And like many griots, he comes from a long family line of griots.Gambian-Briton Sona Jobarteh is the first female kora player to come from a West African griot family, making her a pioneer in a male dominated tradition. She once told the BBC it is not normal for female griots to take up any instrument, yet it did not stop her from becoming a distinguished kora player.Speaking to Gambian newspaper, The Daily Observer, Jobarteh said she has had to respect the kora as a male instrument and she had to understand and embody the character of the kora before playing it. “If you are a female this may not come naturally. So it is a fine balance between your musicianship and your femininity.”Gambian-Briton Sona Jobarteh has broken tradition by becoming the first female kora player. She comes from a long line of griots. (Image: Official Sona Jobarteh website)Despite her situation, Jobarteh does not feel any pressure from being a kora player in a male dominated tradition. Instead, she believes her greatest challenge is living up to the reputation her family has built up over generations of being kora players. She comes from one of five principal West African griot families and they are renowned kora masters. Her grandfather, Amadou Bansang Jobarteh, and cousin, Toumani Diabaté, are known as a shapers in the Gambian musical and cultural landscape.She pays homage to her family in her 2011 album Fasiya. Meaning heritage, the album also addressed the balance between preserving tradition and innovating.Youssou N’Dour is also one of those musicians who has lived up to his family’s reputation as griots. Although he was not raised in the griot tradition of his maternal ancestors, he has certainly lived the life of one. As a musician he has belted out global hits such as 7 Seconds, featuring Nene Cherry, and Shakin’ the Tree with Peter Gabriel. But his music has made a bigger impact off the charts. In 1985, he organised a concert that called for Nelson Mandela’s release from prison. He also featured in Amnesty International’s Human Rights Now! Tour in 1988. He collaborated with Lou Reed on the cover of Gabriel’s Biko, which was included on Amnesty International’s benefit album, The Secret Policeman’s Third Ball.N’Dour is also involved in causes outside music. He started Project Joko with the United Nations and Unicef to open internet cafes in Africa as well as get Senegal connected to the rest of the world. He appeared in a joint Spain-Senegal advertising campaign to inform the African public about the consequences of illegal immigration. By 2012, he had entered politics, running for presidency in the Senegalese election. Though disqualified from the race over the legitimacy of signatures collected to endorse his campaign, he was appointed as minister of tourism and culture.Gabriel probably described N’Dour best when he told The Guardian: “He’s probably the top African artist in many ways. His music has reached a lot of people outside his culture. He’s also become something of a statesman with all the campaigns he’s taken on.” Aziza Brahim from Western Sahara uses traditional music to tell stories of the suffering her people, the Saharawi, after the country was occupied by Morocco. (Image: Werner Gensmantel) Modern day griotsIn a BBC article on modern day griots, DJ Rita Ray said pop stars emerging from Africa were more than commercial musicians. Peer underneath, she said, and you would find the ancient traditions of the griots. She referred to Ghanaian rapper Kwame Ametepee Tsikata, better known as M.anifest, South Africa’s Tumi Molekane and Nigeria’s Omawumi Megbele as commercial artists who carried the griot spirit.But it is Aziza Brahim, granddaughter of poet Al Kadra, who most closely resembles the griots of yesteryear. Hailing from Western Sahara, Brahim relates the strife and challenges suffered by her people, the Sahwari, at the hands of Moroccan occupiers. She infuses her vocals with the rhythmic beating of the tabal she plays, a traditional drum of her people. Ray said of Brahim: “She lifts her hauntingly beautiful voice to chronicle the history of the Sahrawi, the decades of war, civil uprisings and life as a refugee, whether in the camps of Algeria or in the Spanish city of Barcelona, where she now resides.”Griots like Brahim are the keepers of West African history and culture, revered so much that even a Mandingue proverb said: “May God move so griots never perish in war, on the battlefield, but every battlefield needs a griot, for without his presence the history of what happened would be forever lost.”last_img read more

Injured Praveen out, Sreesanth in

first_imgPacer Sreesanth was on Tuesday drafted into the Indian team, replacing injured Praveen Kumar, the International Cricket Council (ICC) and Indian board announced. The decision was taken just 11 days before India play Bangladesh in the tournament opener on February 19 in Dhaka.Praveen has an elbow injury and he returned midway from India’s recent tour of South Africa as a precautionary measure to recuperate at the National Cricket Academy (NCA) in Bangalore.In anticipation, the Board of Control for Cricket in India (BCCI) had asked Sreesanth to stand by and reach the NCA. “Praveen Kumar has been ruled out of the World Cup due to an elbow injury. The all- India senior selection committee has picked Sreesanth as Praveen Kumar’s replacement. The ICC has confirmed that Praveen can be replaced by Sreesanth,” BCCI secretary N Srinivasan said in a statement.The 28-year-old Kerala pacer, who bowls with passion, was naturally excited. “It is a great opportunity and a great challenge to be part of Indian team for the World Cup. I am lucky to be a part of it and am looking forward to giving my best in the tournament,” Sreesanth, who will be playing in his second World Cup, told reporters.”I am just looking forward to giving my best in the World Cup. I am absolutely fine with any role given to me. Whatever I would be asked to do, I will perform accordingly.” Sreesanth’s replacement was approved by the ICC’s event technical committee headed by David Richardson (ICC). It also includes Ratnakar Shetty (tournament director), Campbell Jamieson (IDI representative), Anil Kumble ( host nominee), David Lloyd (independent nomination) and Sanjay Manjrekar (independent nomination).advertisementIt would have been Praveen’s first World Cup. But his right elbow failed to respond in time and with the prospects looking bleak, the selectors had no choice but to quickly find a replacement.The Uttar Pradesh bowler from Meerut consulted Dr Andrew Wallace, a London- based surgeon who has treated many Indian players including Sachin Tendulkar, but it seems the injury is more serious than anticipated.It is a huge setback for Praveen, 24, an automatic starter in One- Day Internationals who usually bowls with pace spearhead Zaheer Khan. He has so far taken 57 wickets in 48 ODIs.Praveen Kumar checks out his elbow as Sachin Tendulkar looks on.Sreesanth, who joins Zaheer, Ashish Nehra and Munaf Patel – the other pacers in the 15- member squad – has captured 75 wickets in 51 ODIs.The pacer said he would try to better his economy rate, which he admitted was a concern. “I was worried about that aspect of my game, but in the last couple of years, whatever chances I have got I showed a lot of improvement.With age and experience you learn a lot. I am still learning and, hopefully, will do a good job,” he said.”There are no issues as far as subcontinent pitches are concerned.Zaheer, Ashish and Munaf have all played in World Cups before and have enough experience. We are ready to give our best. We are doing well and are number two in ODIs. Hopefully, by the end of the World Cup, we could be the number one team in the world.” Sreesanth, who composed a song to cheer the team in the World Cup, said: “I was looking forward to cheer the team, but now I am happy to be a part of it.”last_img read more

Adarsh scam probe: CBI submits progress report to HC

first_imgThe Central Bureau of Investigation (CBI) on Wednesday submitted progress report to the Bombay High Court on the probe of Adarsh Housing Society case, involving 14 accused, including former Maharashtra Chief Minister Ashok Chavan.Additional Solicitor General Darius Khambata handed the report, in a sealed cover, to the division bench of Justices Ranjana Desai and R V More. The bench asked CBI to file a further report after four weeks.The matter has now been posted for hearing on July 20. CBI had earlier informed the Court that it had registered case against 14 persons, following which the court had asked the petitioner, Simpreet Singh, to forward his complaint and whatever documents he had, to the agency.Singh, a social activist, had originally sought transfer of case from state Anti-Corruption Bureau (ACB) to the CBI.Later, on its own, the state government decided to hand the case over the central agency.On the last occasion, Singh’s lawyer had said that High Court must supervise the probe, alleging that even Union Minister Sushil Kumar Shinde was involved in the scam, but his name does not figure in CBI’s FIR.However, the court felt it was investigating agency’s prerogative as to whom to name in the FIR.CBI filed the FIR on January 29 under various sections of IPC, including criminal conspiracy, cheating, and forgery, besides sections under Prevention of Corruption Act.- With PTI inputsFor more News, click here.For more news on India, click here.For more news on Business, click here.For more news on Movies, click here.For more news on Sports, click here.advertisementlast_img read more

Indian wrestling lost a mentor in Dara Singh, says IOA chief

first_imgThe Indian Olympic Association (IOA) has mourned the death of wrestler-turned-actor Dara Singh, and said Indian wrestling has lost a guide and mentor.IOA acting president Vijay Kumar Malhotra, in a condolence message, said Dara Singh raised wrestling’s profile with his impeccable demeanour, both on and off the arena, and added glamour quotient to it.”Indian wrestling in ’50s and ’60s was synonymous with Dara Singh and he gave a new dimension and direction to the sport which then it was confined only to rural India,” said Malhotra.He said Dara Singh’s rise to the fame also attracted rural youths to the sport and gave them a sense of self-belief.Dara Singh, 83, died at his residence in Mumbai early Thursday morning after a brief illness.last_img read more

Taiwan tempting 7 mil visitors

first_imgTourists visiting Taiwan this year is estimated to reach seven million, exceeding last year’s figure of 6.08 million international visitors.According to the Tourism Bureau Statistics, a total of 4,776,022 international tourists visited the nation between January and August this year, registering year-on-year growth of 24.76 percent.The figures reached double digit growth each month so far this year with March and June experiencing a 30 percent increase.Visitors from China showed the highest increase, growing by 54 percent during the period, followed by the source markets Hong Kong, Macau and Japan.The bureau further noted that it has aimed to gradually raise the number of international visitors to 10 million each year by 2016, aiming to expand source markets in India, Indonesia, Thailand, Vietnam and the Philippines.The bureau also hopes to streamline the application procedures for entry permits for independent travellers and business travellers from China in aim to motivate more people to visit the country.Next year’s marketing strategy for Taiwan will focus on six major tourism themes including the nation’s cuisine, culture, healthy and sustainable lifestyles, eco-tourism and shopping.In addition, the bureau will look at publishing a Taiwan Tourism Calendar which will show the events and festivals held by either the central government or local governments. Source = e-Travel Blackboard: K.Wlast_img read more

August 30 2003 EC SECOND FLOOR A lot of work has

first_imgAugust 30, 2003EC SECOND FLOOR: A lot of work has been done on the second floor of the East Crescent. Construction crew member Michael Teslow installs heating coils on the floor of the light scoop appartment in Unit 10. [Photo & text: sa] Construction crew leader Anthony Oronzo works on the floor heating system in the main room in Unit 10. [Photo: Ania Gorka & text: sa] A gypsom based top coat of GYPCRETE is poured over the heating coils. [Photo: Ania Gorka & text: sa] Windows are installed. [Photo & text: sa] >>left>> Crew leader Eli Michael installs a door lock. >>right>> Crew leader Ray Shong fastens the doorjamb to the main room in Unit 9. [Photo & text: sa] Workshopper Nobuhiro Hirata and construction crew member Brad Bishop caulk between the concrete panels of the Unit 9 light scoop. Report will continue. [Photo & text: sa]last_img read more

Rep Leutheuser responds to governors proposed gas tax increase

first_img07Mar Rep. Leutheuser responds to governor’s proposed gas tax increase Categories: Leutheuser News State Rep. Eric Leutheuser, of Hillsdale, issued the following statement after Gov. Gretchen Whitmer announced her state budget proposal:“The governor’s budget proposal is just that – a proposal.  While giving the clearest indication to date of what the governor would like a final budget to look like, it mainly serves as the beginning point in the negotiation process with the Legislature.  As such, I have to say that I am disappointed that the governor’s proposal does not reflect the reality of how everyday Michigan families live and work.An increase of 45-cents per gallon in fuel taxes would give us the highest gas tax in the country on top of the highest car insurance rates in the country.  It’d be laughable if it weren’t being proposed by the governor of our state.  I’m also disappointed that she is proposing to raise taxes significantly on small businesses.  Small businesses are the ones that don’t qualify for state “incentives” but provide the economic backbone of our communities.  And, unlike the largest corporations, they don’t move to another state or country when we make it tough to do business in Michigan – they just go away.  I will vote against this proposal if presented in this form to the full House.  In the meantime, as the appropriating body, we must hold ourselves to high standards in this budgeting process, and work diligently and in good faith to fund road repairs, education, health services and the needs of our entire state.”###last_img read more

Streaming has changed the nature and extent of the

first_imgStreaming has changed the nature and extent of the revenue threat to video service providers posed by pirates. Stuart Thomson looks at the state of play.Piracy has always been a central hazard for the pay TV business, and finding reliable ways to secure the service has been a necessary investment for operators since the industry’s foundation.The threat posed by piracy was already significant when content was delivered exclusively via closed broadcast platforms. Then the arrival of IP-based delivery raised additional worries. However, the advent of internet streaming as a mainstream method of delivering and consuming all kinds of video, up to and including premium 4K UHD series and live premium sports, has over the last few years transformed both the nature and extent of the threat and the methods used by pay TV providers and content rightsholders to fight it.There is a broad consensus that streaming piracy has now overtaken all other forms of threat to the revenue of legitimate service providers that have paid for content rights. Content security provider Irdeto identified 5,100 illegal streams during last year’s Champions League knockout stages, including 2,093 distributed via social media channels such as Periscope, Facebook and Twitch.Irdeto’s Piracy Trends Report also cited data from the company’s web analytics partner that estimated there was an average of 74 million total global visits per month, and an average of 21 million unique visits per month, to the top 10 live streaming linking sites in Q1 last year. The US, UK and Germany were the top countries in terms of users of illegal site links.“The shift is huge,” says Petr Peterka, chief technology officer of content security specialist Verimatrix. “All of the technologies that we take advantage of to enable streaming and direct-to-consumer OTT services with a wide coverage of devices, and all the techniques to enable these creative new business models are being used to attack services.”Peterka points out that the economics of building pirate infrastructure for streaming have changed radically. Whereas formerly the cost of professional compression equipment and the lack of available means to deliver content to large numbers of concurrent users presented an insurmountable barrier to entry, “all of that has changed”, he says. “Pirates now have access to the same technology that owners are using to distribute their content, and that means a much larger attack vector.”Simon Trudelle, senior director of product marketing at content security provider and TV technology outfit Nagra, agrees that the switch to streaming is “the core thing that is changing the industry”, although he also notes that control word piracy and the sale of devices on the black market is “still an issue in markets where broadband is not ubiquitous”.Trudelle says that three in four pirate services now offer content in HD. He says that legitimate service providers are now experiencing significant levels of churn that can directly be attributed to the availability of pirate alternatives.“It is not just about a parallel market of casual consumers of pirate services. It is a business, where consumers are shifting and leaving traditional service providers to go with these services. They either don’t care or don’t know the difference or see better value. That over time will have an impact on legitimate distributors because sooner or later the price of assets and everything else will be impacted, as happened with the music industry,” he says.It is not only that the cost of delivering pirate services has fallen dramatically. Points of weakness in the delivery chain that are vulnerable to attack have proliferated. Whereas set-top boxes were relatively robust devices in terms of security, requiring those seeking to attack to hack the smartcards or the communications protocol of the box, pirates now have multiple ways to capture a stream: from badly secured low-end Android smartphones through to devices that capture streams from HDMI outputs that can purchased for under E1,000; and from stripping out encryption to camcording the screen of a UHD TV.Distribution meanwhile has been made easier by the availability of Kodi boxes and illicit apps or hosting content on the web via portals with professional-looking user interfaces that may be indistinguishable from that of a legitimate service.A further dimension of streaming piracy is that, unlike traditional forms of content theft, it is not limited to a specific geography.“Pirates are leveraging the web to distribute content illegally and they have a greater opportunity to monetise those illegitimate services. In the past they were limited to the satellite footprint of the operator but now they can steal content from one place and re-distribute it globally,” says Rinat Burdo, product manager, video security, Synamedia.Not only is there now the possibility to redistribute content globally, but premium rights to national sports competitions such as the English Premier League are sold internationally, including in countries where conditional access and DRM security may not be up to scratch, meaning that points of weakness in the distribution chain are multiplying.Ease of accessIf the supply of illicit streams and the global reach of pirates has added a new and threatening dimension to the scale of content theft, the ease by which consumers can now access illicit sources of content – and their evident willingness to do so – has also increased exponentially.“The main difference now is that the step you need to take to get access to illegal content is as small as a Google search,” says Chem Assayag, executive vice-president of sales and marketing at content security provider Viaccess-Orca. “Getting to a pirate offering and accessing a full range of services, maybe for a fee so that you might think it is a legal offering, is something that someone with no knowledge at all of piracy or the cloning of set-tops can do. The amount of people in a position to cheat has grown tremendously.”Nagra’s Trudelle makes the point that confusion between what is illegal and what is not is particularly problematic in markets where pay TV is still in its infancy.“In emerging markets, consumers are confused by the sleek marketing campaigns made by pirate operators,” he says. “The pirates’ level of sophistication has gone up and this creates a lot of confusion with consumers.”The threat in emerging markets is exacerbated to some extent by the rapidly growing use of mobile phones to consume content, enabling potential viewers to skip pay TV and opening up new opportunities for pirates.  While those who use such services may or may not be aware they are doing something illegal, the crucial point is that it does not ‘feel’ particularly illegal, unlike, say, acquiring an illicit smartcard on the black market.Pirates can use these sophisticated web portals to make money from their activities by profiting from advertising or even by selling ongoing subscriptions – in short, by deploying the full range of models adopted by legitimate providers with the added benefit of not paying for any content rights.Piracy increasingly presents a serious source of competition to legitimate providers, with pirate service providers setting up official-looking online storefronts and offering discounts that undercut operators who have to pay for content rights.“Many people can’t tell the difference between these and a legal distribution service. They can charge money for the service so people who sign up don’t think they are doing anything wrong,” says Verimatrix’s Peterka.Synamedia’s Burdo agrees that pirate operators now have a greater opportunity than before to make money from their activities. “In the past they distributed set-tops to decrypt broadcast signals. Now they might distribute devices with pre-loaded software too, but they also have apps and can monetise what they are doing through ads on their websites,” she says.Burdo points that people’s awareness of whether a site is legitimate or not may vary, but often they will give themselves the benefit of the doubt when the price is attractive. “Pirate websites look like legitimate services and people may not be aware that they are illegal. They have to dial a number and someone will ask for their subscriber ID. Because they pay, people assume it is legitimate. Some people will say everyone else does it, so why not me? It doesn’t feel like theft,” she says.Taking on the piratesIn taking on the fight against streaming piracy, legitimate pay TV operators face a range of challenges that surpass anything they experienced previously. Inevitably, they have to set priorities, focusing on the most serious threats rather than those that are minor. They also have to use a much broader arsenal of weapons than was previously the case to combat the threat.First, technologists are keen to make the point that old-style tools such as conditional access technology – now more likely without old-style smartcards – and DRM are far from redundant, even if traditional control word sharing is in decline. Pay TV providers are unable to secure content without protecting it to the satisfaction of those selling the rights, for one thing. Service providers have to show that they are taking all necessary measures to prevent theft, and that includes everything that has been put in place in the past.“DRM remains a hugely useful part of the toolkit,” says Pete Cossack, vice-president of services at content security specialist Irdeto. “If it is easy to steal, people will pirate content, so the more you put in place to stop them, the better. You need a full set of tools.”Cossack also reinforces the point that control-word sharing is not declining as streaming piracy grows. In emerging markets it is even increasing and is very much a credible threat, he says.Nagra’s Trudelle agrees that “there is still a need to protect content distribution over any network to any device”, adding that technologists “have to make it difficult to capture content in high quality” through the use of established techniques such as conditional access and DRM.Conditional access and DRM on their own are, however, no longer enough. Operators have to ensure that their own boxes are secure and personalised, and that all interfaces that could be used to steal content are blocked. Additional techniques such as ‘white box cryptography’ that involves obfuscating the keys through the introduction of random data can be used.Operators also want to be able to trace the source of leaks through the use of forensic watermarking, deployed alongside data analytics and machine learning technology to track illicit use of content over two-way networks. Systems can be put in place to search for anomalies in the distribution chain, such as boxes that are tuned in to HBO 24 hours a day, to name but one random example.WatermarkingForensic watermarking is key to all of this. Watermarking provides a technique to detect and identify multiple sources of attack. While pirates know if they succeed in hacking a conditional access system, they may try to remove watermarks but can never be sure whether they have succeeded.“Watermarking is truly important. It is not only a deterrent but gives you the ability to understand who is pirating what on what device. It gives you the leverage to take action,” says  Cossack. In the case of live content such as high-value sports matches whose value declines rapidly once the game is over, time is of the essence in taking down or disrupting the pirates’ game, with watermarking playing the key role.“It’s all about how quickly you can get content taken down,” says Cossack. “We have a robust system that can react quickly, integrated with cloud providers to make the process simple. You have to figure out where the pirate services are on the internet and get the information back to the operator. You have to be able to reach within minutes.”Nagra’s Trudelle agrees that watermarking is particularly useful and that robust watermarks can be used to close down points of leakage. “That is particularly important in the case of sports. If you can do it in the first few minutes of an event you can disrupt the whole pirate value chain and frustrate the consumers who use it and make them realise they are not accessing a reliable service,” he says.Trudelle adds that getting all players in the distribution value chain in line is crucial to the process – and by no means simple. “The enforcement of all this is another dimension. Dependng on the country you are dealing with and its legislation it can be more or less complex to take pirate sites down through a cloud vendor or ISP, by telling them these guys are illegal and they should not host them. In some countries it is possible to automate this, but in others you still need to go to court,” he says.No cure for piracyNo single measure will be sufficient on its own, and no set of measures constitutes a cure for piracy. “There is no such thing as unbreakable security. It is all about a cost-benefit analysis,” says Peterka. “You can set the bar high enough to eliminate casual piracy, adding cost and complexity to the pirate operation and narrowing it down to a few well-funded entities.”Some tools to combat piracy can also be used to deliver straight commercial benefits to operators. For example, service providers can use data analytics to identify both exceptional customers who consume a lot of content as much as suspicious customers who are up to no good. Identifying the former using the same data tools can provide an avenue for operators to market additional services to high-value subscribers as well as taking down malefactors.For the suppliers of content security technology, the shift away from traditional forms of content theft such as control word sharing to illicit streaming essentially means that they have to provide more. In addition to conditional access and DRM technology, they offer digital watermarking as a key security tool. However, they also have to support operators by developing data analytics capability, with algorithms that hunt for anomalies in the distribution map. Intelligent monitoring of the web for suspicious activity is now also an integral part of the struggle.Tracing the sources of piracy and shutting them down or providing ways for operators to take action completes the puzzle. “The threat is bigger and broader and you have to fight it on multiple fronts,” says Peterka. “Moreover, you have to deploy different techniques at different points in the chain. It is more complex and possibly more expensive.”Synamedia provides secure end-to-end video delivery solutionsSynamedia’s Burdo agrees that “a variety of tools” is necessary. “Pirates will try to circumvent. It is important to have an end-to-end solution,” she says, including intelligence-gathering alongside technology.For Viaccess-Orca’s Assayag, intelligence gathering is key. He points to his company’s Eye on Piracy anti-piracy service which monitors illegal servers on the web. This enables Viaccess-Orca to identify illegal streams and service providers. Service providers can issue take-down notices to hosting sites or get links removed from Google’s database. Finally, operators can also take the ultimate step of using the service to capture screenshots that can be used in evidence in legal cases.Assayag says that Viaccess-Orca also offers the ability to identify “weird patterns on the net”, for example showing an increase in the number of licences issued that does not match viewing numbers.For Assayag, data analytics is also a key tool in the battle against streaming piracy. “You can also transform the threat into an opportunity,” he says. “If you seal off the stream that someone is watching you can then offer them the opportunity to watch a value offering or even turn them into full-fledged subscribers with a monthly plan. You can bring people over to the right side of the fence.”The wider point here is that marketing is just as important a tool for service providers as anti-piracy disruption technology. This is especially true against the background of the ease with which people can now access illicit streams. If this has widened the reach of pirate services, it can also be inferred that many people caught up in this are less committed to wrongdoing than was the case when piracy was ‘difficult’.“Legal players need to think about what is happening and make the right offering for the right market segments,” says Assayag. “The music industry has gone through this and there has been a huge shift in terms of the way that industry works. I’m not saying TV needs to adopt a completely new business model but defining new price points and plans is one way to fight piracy.”Nagra’s Trudelle agrees that providing a compelling service is the best defence. “Service providers have to pick up the ball and attract consumers back with attractive services. It is not just about using a stick to disrupt services. Operators have to provide the means to consumers to access services, sign up and watch when and where they want and watch on the device of their choice. It is about using the carrot as well as the stick.”In focus: Ideal for sharing: the OTT TV dilemmaThe sharing of user passwords between more than one household represents a real source of revenue loss for TV operators, but it is one that raises questions about how far it makes sense to go to enforce their own rules.Just as consumers often view web piracy services they pay for as ‘legitimate’, many see nothing particularly wrong with the sharing of credentials between family and friends.  That is not to say that credential sharing takes only one form. Data theft is a source of piracy in its own right, and security providers point to organised criminals trading usernames and passwords on the dark web, as well as individual customers making money from their own user credentials by trading them on social media sites. Irdeto discovered 854 listings of OTT credentials across 42 different OTT services, available from 69 unique sellers in 15 dark web marketplaces in the month of April 2018 alone.While this is clearly illegal, casual sharing of passwords between people who know each other is more of a grey area, and this posits a dilemma for service providers.Those service providers have in many cases inadvertently enabled credential sharing by expanding the number of devices via which users can view their service, with limitations such as three devices being seen by some as a barrier that reduces consumer satisfaction. Some have subsequently sought to rein in abuse by limiting the number of concurrent streams that can be served at any one time.Content security technology providers are now addressing the issue. Verimatrix recently acquired technology from Akamai that enables it to see what devices are being used to access content and track multiple devices associated with particular user accounts, including identifying the location of the user. More broadly, the application of analytics can also help operators decide if they have mistakenly targeted a legitimate user who may be accessing his content on a business trip, or if there is something more suspicious going on.Orly Ansalem, product manager, video security at Synamedia, says that operators can apply machine learning and analytics to detect credential misuse, helping operators through the delicate task of eliminating ‘false positives’ and avoid confronting their subscribers with unwarranted allegations of bad behaviour.Operators then have the option of trying to use the information as a marketing tool or as evidence against their customers. “We can enable service providers to monetise credential sharing. We believe most users are honest and by approaching them in the right way, operators can sell a higher level of service,” she says.Ultimately, however, operators face hard choices in deciding how to tackle credential sharing. “Two-way networks give you the visibility to fight credential sharing if you want to. There is, however, a trade-off between user satisfaction and potential revenue loss from sharing across multiple households. Operators have to strike the right balance,” says Petr Peterka, chief technology officer at Verimatrix.last_img read more