Category Archives: Women In Global Perspective

EQUAL PAY FOR WOMEN In The U.S., DR by OLGA LAZIN

A decade ago the World Bank began a study to measure whether countries afforded men and women equal rights. Not the U.S.of A.

The goal was to “develop a better understanding of how women’s employment and entrepreneurship are affected by legal discrimination.” It highlighted “how women must navigate discriminatory laws and regulations at every point in their careers, limiting their equality of opportunity.” The study did not measure social and cultural factors, or how effectively laws were enforced. In Year One, the bank found that no country guaranteed a woman the same rights as a man.Fast forward 10 years. 
“Women, Business and the Law 2019” is the bank’s report on the progress countries have made to guarantee legal and economic equality between the sexes. Only six—Belgium, Denmark, France, Latvia, Luxembourg and Sweden—scored 100 percent. France saw the biggest improvement for implementing a domestic violence law, providing criminal penalties for workplace sexual harassment and introducing paid parental leave.

The USA is flagrantly violating women’s equal pay laws even in 2019.

Countries in the Middle East and Sub-Saharan Africa averaged a score of 47.37. Saudi Arabia’s overall score of 25.63 was the worst in the world, while Sudan, the UAE, Syria, Qatar and Iran all scored below 35.Top scorers were the UK (97.5), Germany (91.88), and Australia (96.88). The US scored 83.75, placing it outside the global top 50. Overall, the global average was 74.71, which was 4.5 percentage points higher than 10 years ago. Still, the score means that in the average nation, women receive just three-quarters of the legal rights that men do. At that rate of progress, women won’t achieve full equality in the areas studied by the World Bank until 2073, which does real economic disservice to the world’s bottom line. A 2015 report from the McKinsey Global Institute showed that closing the workforce gender gap could add $28 trillion to the global GDP — nearly the size of the US and Chinese
economies combined.

Data from : SALA, Statistical Abstract of latin America and U.S., Vol. 32, 2018

For every 1$ a man makes, Women are only paid 0.92 cents. Unfair and outrageous.

More About Dr Olga M Lazin And Globalization Of Women’s Issues

Here: http://www.olgalazin.com/books.html

Author’s Page: AUTHOR olga magdalena lazin on AMAZON.com

Today: The Politics Of Reproduction: Rape As An Instrument of War

According to The New York Times: I Am Outraged by the Attacks on Yazidis Women, Aren’t You? It Is Time to Help Empathy is not enough for me and other women brutalized by the Islamic State. We need the chance to revive our homeland. https://www.nytimes.com/2018/02/10/opinion/sunday/yazidis-islamic-state-rape-genocide.html

This is the spark that made me become a feminist.
Let us help these incredibly resilient women: the one mentioned in the article, she is indeed a national hero.

N Korean women are also having a global issue With Kim.

Bulgarian Journalist raped brutally and killed in Bulgaria. She was reporting on corruption in EU expenditures.

 

Do You Want To Work in the United States?

If so, Contact VisaPlace today. All our cases are handled by competent and experienced immigration professionals who are affiliated with VisaPlace. These professionals consist of lawyers, licensed paralegals, and consultants who work for Niren and Associates an award-winning immigration firm that adheres to the highest standards of client service.

Ready for the next step? Book your 1 on 1 consultation now or call us at 1-888-317-5770.

Have a Question related to your Immigration Needs?

Click here to fill out the FREE Immigration Assessment form below and get a response within 24 hours to see if you’re eligible.

The assessment form should take approximately 5-7 minutes to complete. We will get back to you within one business day to let you know if we are able to help.

NEWS ON THE WAR ZONE: USA VS CHINA’s DIRTY TRICKS:

SECRETS ON MAKING MILITARY JET ENGINES: China lured the chief of Interpol: CHINA may have locked up more than a million people. China is stealing data on special military equipment from the USA: http://www.thedrive.com/the-war-zone/24156/u-s-and-belgium-nab-chinese-spy-accused-of-stealing-ge-jet-engine-tech-and-more

 

book
book


Su Bin is facing five years in prison for his role as ringleader in one of the most elaborate and daring hacking operations uncovered in North America.

The 50-year-old Chinese citizen, who also held permanent residency in Canada, pled guilty this week after more than two years of legal proceedings. He copped to funneling information, with the cooperation of Chinese military officials, back to Beijing.

Su’s life in Canada did little to arouse suspicion. He had a wife and two kids. He ran his own business — Lode Technologies, based in Beijing, but with an office in Vancouver. Quietly, he was the center of an international hacking organization that stole highly sensitive information from some of the world’s most powerful defense companies.

“Su Bin admitted to playing an important role in a conspiracy, originating in China, to illegally access sensitive military data, including data relating to military aircraft that are indispensable in keeping our military personnel safe,” said Assistant Attorney General Carlin in a statement.

He was extradited from British Columbia last year, after unsuccessfully fighting his removal from Canada, and appeared in a California courtroom on Wednesday to enter his plea. His conviction could lead to his deportation back to China.

Su was the North American arm of a three-pronged organization. Two officers from the Chinese military looked after most of the technical aspects of the operation, while Su appeared to handle the business side of things. Neither of the two officers appear to be facing charges in their home country, and haven’t been named by the American Justice Department or the FBI.

A screenshot of the FBI’s indictment of Su.

The scheme worked like this: one of the military officers would send phishing emails to individuals at the target companies, usually purporting to be from a colleague or someone else in the industry. Once getting the employee to a website under their control, they can link their own system and begin installing malware, which gives them remote access to the directories containing the trade secrets, and allow them to worm into other sections of the company’s network.

Once they were in the systems, they would copy the file directories and send them to Su, who would direct the officers on which folders and files to grab, translate the files into Chinese, and produce reports about the technology and information stolen from the systems.

“The intelligence is always picked up and transferred to China in person.”

Su “engaged in this conduct for the purpose of commercial gain, and specifically sought to profit from selling the data,” his plea agreement reads. During the conspiracy, Su repeatedly sold this information to state-run Chinese companies for cash.

The FBI do not reveal just how much Su made, but some emails obtained from Su read that he was hoping for “big money” from the sales, but also contain emails between the three arguing about the sale of the data — “they are too stingy!” Su wrote to one of the officers of a major Chinese aircraft manufacturer.

One report reads that the “mission” had, over the course of a year, made “important contributions to our national defense scientific research development.” In other reports, they write that the stolen information on the F-22 fighter jet will let them “rapidly catch up with US levels” and “stand easily on the giant’s shoulders.”

The data being stolen was proprietary to the defense companies and was strictly forbidden from being exported.

A screenshot of the FBI’s indictment of Su.

More than just technical data, the triumvirate also honed in on individuals.

In one 2009 email, with the subject line “Target,” Su emailed one of the military officials the names, phone numbers, and positions of various American and European defense executives.

Other emails appear to contain technical data about aircraft, such as the Boeing’s C-17 strategic transport aircraft. Another contains details on a flight test for another American military aircraft.

The C-17 is currently in use in a half-dozen other militaries, including Canada, Australia, the United Kingdom, India, and NATO’s air force.

According to Su’s indictment, he managed to steal 630,000 files from Boeing’s system, totalling some 65 gigabytes of data, from 2010 onwards. A report prepared by the hackers reads that “experts inside China have a high opinion” about the data on the C-17, and that they “were the first ever seen in the country.”

He also managed to grab volumes of data relating to the F-22 and F-35 fighter jets, both of which are made by Lockheed Martin. The latter of the two is facing stiff criticism amid a struggling procurement process involving both America and Canada.

A screenshot of the FBI’s indictment of Su.

The hackers also targeted the Taiwanese military, obtaining “military maneuvers, warfare operation plans, strategic targets, espionage activities and so forth,” according to Su’s emails.

The hackers’ immodesty may have been part of their downfall. In 2011, one of the Chinese officers emailed the other, attaching a report running through the success of their operation. It serves as a virtual confession of the entire operation.

The report included a list of “past achievements,” bragging that they had obtained access to one company’s File Transfer Protocol (FTP) and stole 20 gigabytes of data from it.

It went on to say that their hack had “collected a large amount of information and mailboxes of that targeted relevant personnel,” regarding a development project for unmanned aerial vehicles, or drones. “We have also obtained the password for the customer management system of the supplier,” the email goes on. “And controlled the customer information of that company.”

The report boasts that the three had gained the ability to control the website of a company that made the “missile developed jointly by India and Russia” but, at the time of the email, had yet to do so.

The operation was complex, and expensive. The team said that they had servers set up in the United States, Korea, Singapore, and elsewhere to serve as “hop points,” which act as intermediaries to mask the attacking computer’s IP address. The hackers also had work stations in Hong Kong and Macao, in order to “avoid diplomatic and legal complications.

A screenshot of the FBI’s indictment of Su.

“The intelligence is always picked up and transferred to China in person,” the hackers wrote. It also added that they undertook increasingly-serious counter-reconnaissance work “to ensure the secure obtainment of intelligence.” The report extensively details the sort of activities the hackers took to avoid detection. They note that this was not cheap.

Su’s eventual indictment notes that he and his cohorts may have exaggerated the success of this effort to a degree, and even the FBI officers were skeptical that he had managed to steal as much information as he claimed. In his plea agreement, however, Su admits he did, in fact, obtain and sell secret data from those companies.

As part of the sentencing agreement, Su agreed to turn over all data he stole from the American contractors, and agreed to have the Canadian courts send all the information they had seized from Su to America.