Download The-FBI-Story-2014-Web.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Download The-FBI-Story-2014-Web.Pdf U.S. Department of Justice Federal Bureau of Investigation 2014 FBI Director James B. Comey speaks to Cyber Division employees at FBI Headquarters. CAPSTitle 20CAPSTitle14 Subtitle and Upper and Upper and Upper and Upper www.fbi.gov The National Cyber Investigative Joint Task Force is composed of nearly two dozen federal intelligence, military, and law enforcement agencies, along with local law enforcement and international and private industry partners. The task force serves as the government’s central hub for coordinating, integrating, and sharing information related to cyber threat investigations. 2014 The FBI Story I A Message from FBI Director James B. Comey It has been a busy and challenging year for the FBI and for our partners at home and around the world. Together, we confronted cyber attacks from sophisticated, state-sponsored actors, transnational criminal groups, and everyday hackers. We arrested white-collar criminals and corrupt public officials. We protected our communities from violent gangs and child predators. And we safeguarded Americans from an array of counterterrorism and counterintelligence threats. This latest edition of The FBI Story, our annual collection of news and feature articles from our public website, FBI.gov, chronicles our most successful 2014 investigations and operations. These include the disruption of botnet operators responsible for the theft of more than $100 million worldwide; nearly $9 billion in penalties levied against one of the largest financial institutions in the world for exploiting the American financial system; and a nationwide child exploitation sweep that recovered 168 victims of trafficking. This edition of The FBI Story also highlights some of our unique capabilities. You will find multi-part series on gangs and serial killers, as well as features on the biometric system known as Next Generation Identification (now fully operational) and the completion of a project to digitize FBI files, including 30 million records and 83 million fingerprint cards. You will also find historical pieces on Benson House, which played a crucial role in our counterintelligence operations during World War II, and the 50th anniversary of the investigation into the disappearance of three civil rights workers in Mississippi in 1964—a case widely known as Mississippi Burning. Our work to protect the United States and its citizens never stops. As these stories make clear, we don’t operate in isolation. We need our federal, state, local, tribal, and international law enforcement and intelligence partners—as well as our non-governmental and private sector allies—to succeed. We also need the trust and cooperation of the American people. Without your assistance, our mission would be far more difficult. I’ve been FBI Director for more than a year, and I believe—now, more than ever—that the FBI is an amazing organization. We have folks doing an astonishing array of things all over the world, and doing them well. But we can’t do those things without your support. On behalf of the entire FBI, I hope you enjoy this latest edition of The FBI Story. We look forward to working with you—and for you—in 2015. Director Comey discusses the impact of emerging technology on public safety in a speech at the Brookings Institution in Washington, D.C. II 2014 The FBI Story 2014 The FBI Story III January 2, 2014 Counterfeit Cosmetics, Fragrances Hazardous to Your Health You see what appears to be your favorite brand name eye shadow, eye liner, or fragrance for sale at a flea market or on an unfamiliar website. You notice the price is lower than what you normally pay at your favorite retail store or through an authorized online dealer. Before you hand over your hard-earned money, though, keep this in mind: It could be counterfeit, and—in addition to buying something that’s not the real deal— you are also risking your health by buying and using products that may contain substandard or even dangerous substances. The National Intellectual Property Rights (IPR) Center—of which the FBI is a partner—wants you often times, the illicit proceeds are used to fund other to know that the volume of all sorts of counterfeit types of crime. We’ve also seen people selling counterfeit cosmetics and fragrances coming into the U.S. is products through online auction sites and other websites definitely on the rise…that’s according to our industry just to make a little extra cash…some may not even partners as well as law enforcement. Why is this realize their merchandise is fake. happening? Because the Internet has given counterfeiters widespread access to customers, and because criminals Because of the dangers to the public, law enforcement is increasingly view dealing in counterfeit personal care mobilizing against counterfeit cosmetics and fragrances. products—as well as other knock-off consumer goods For example, the nearly two dozen U.S. and foreign as well—as a relatively low-risk crime since many of the agencies that make up the National IPR Center are perpetrators are located outside of the U.S. working on the matter—sharing intelligence with one another, coordinating with state and local law Government and industry studies and testing have enforcement, and developing relationships with industry discovered that some of the ingredients that make up representatives. counterfeit cosmetics and fragrances are downright dangerous: But we need the public’s help. ▪ Phony cosmetics often contain things such as arsenic, First, educate yourself about some of the common beryllium, and cadmium (all known carcinogens) indicators of counterfeit cosmetics and fragrances so that along with high levels of aluminum and dangerous you don’t become a victim. If you’re not sure about the levels of bacteria. Some of these products have authenticity of a product, don’t buy it. caused conditions like acne, psoriasis, rashes, and eye And second, if you think you or someone you know may infections. have purchased counterfeit cosmetics or fragrances—or if ▪ Counterfeit fragrances have been found to you suspect someone of selling counterfeit items—submit contain something called DEHP, classified by the a tip to the National IPR Center. The more information Environmental Protection Agency as a probable law enforcement has, the more effective we can be. human carcinogen. These phony perfumes and With the proliferation of counterfeit goods increasing at colognes, which sometimes contain urine as well, an alarming rate, the National IPR Center focuses on have been known to cause serious skin rashes. keeping these bogus and often unsafe products off U.S. streets while dismantling the criminal organizations There is no typical profile of the individuals or groups behind this activity. trafficking in these kinds of counterfeit products…and this might just be one of their many illegal activities— IV 2014 The FBI Story 2014 The FBI Story 1 January 7, 2014 January 10, 2014 Q: What types of FBI personnel are posted to Legat Nairobi? On the Ground in Kenya Brady: In addition to our administrative and support Part 2: Terror at the staff, we have a special agent bomb technician, a member of the FBI’s counterterrorism fly team, and a Hostage Westgate Mall Rescue Team operator embedded on a permanent Part 2 of an interview with Dennis Brady, the FBI’s legal rotating basis. So when something happens—a attaché in Nairobi, Kenya. kidnapping or an act of terror or piracy—we can respond immediately with a full range of Bureau expertise. Q: On September 21, 2013, al Shabaab gunmen attacked the Westgate shopping mall in Nairobi. Over a period of Q: Is that expertise also used to help train Kenyan law several days, they killed more than 70 people. What was enforcement? the FBI’s response? Brady: Absolutely. Training is one of our key functions, Brady: The attack started on a Saturday. I was called and it’s been going on for years. We train Kenyan to the embassy, and we immediately began securing law enforcement personnel in a variety of disciplines, resources to assist the Kenyans. Our people were on including crime scenes, IEDs, and tactics. We also the scene from the first day. The FBI’s role was—and provide instruction in areas such as fingerprinting, cyber continues to be—to facilitate, enable, and assist the investigations, evidence collection, intelligence analysis, Kenyan investigation and prosecution regarding a crime interview techniques, and major case management. In that occurred largely against Kenyan citizens on their soil. the past few years, the Bureau has conducted more than connected to the individuals who physically carried out On the Ground in Kenya 40 training sessions in Kenya and has trained more than Q: After the attack ended, what was the crime scene the attack. Nobody is under the impression that we have Part 1: A Conversation with Our 800 individuals. We also have 10 Kenyan graduates like? fully identified the entire network in this attack, however. of the FBI’s National Academy who are still active Brady: Very complicated. Westgate was a large mall, That’s why the investigation continues. Legal Attaché in Nairobi in law enforcement. The Kenyans are very receptive four stories, with underground parking and an attached Q: There have been conflicting reports about what to everything we offer and are enthusiastic, active parking structure. In the process of fighting the attackers, happened to the gunmen. Can you comment? The FBI’s legal attaché, or legat, program places Bureau participants in the process. What we provide supplements there were explosions and a fire. The area where the Brady: We believe, as do the Kenyan authorities, that the personnel in more than 60 countries around the world. their own training and significantly improves their attackers were had home furnishings that caught fire.
Recommended publications
  • FBI Academy Training Facility A&E Study………………………………
    Table of Contents Page No. I. Overview ………………………………………………………………….............. 1-1 II. Summary of Program Changes…………………………………………….. 2-1 III. Appropriations Language and Analysis of Appropriations Language….......... 3-1 IV. Decision Unit Justification…………………………………………………... 4-1 A. Intelligence………………………………………………………………… . 4-1 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes B. Counterterrorism/Counterintelligence ……………………………………… 4-14 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes C. Criminal Enterprises and Federal Crimes…………………………………… 4-36 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes D. Criminal Justice Services…………………………………………………….. 4-59 1. Program Description 2. Performance Tables 3. Performance, Resources, and Strategies a. Performance Plan and Report for Outcomes b. Strategies to Accomplish Outcomes V. Program Increases by Item………………………………………………… 5-1 Domain and Operations Increases Comprehensive National Cybersecurity Initiative………………………... 5-1 Intelligence Program………………………………………………….…... 5-6 National Security Field Investigations……….………………………….... 5-13 Mortgage Fraud and White Collar Crime………………………………… 5-15 WMD Response………………………………………………………..…. 5-19 Infrastructure Increases
    [Show full text]
  • Miranda, 5 | 2011, « South and Race / Staging Mobility in the United States » [En Ligne], Mis En Ligne Le 01 Décembre 2011, Consulté Le 16 Février 2021
    Miranda Revue pluridisciplinaire du monde anglophone / Multidisciplinary peer-reviewed journal on the English- speaking world 5 | 2011 South and Race / Staging Mobility in the United States Sud et race / Mise en scène et mobilité aux États-Unis Édition électronique URL : http://journals.openedition.org/miranda/83 DOI : 10.4000/miranda.83 ISSN : 2108-6559 Éditeur Université Toulouse - Jean Jaurès Référence électronique Miranda, 5 | 2011, « South and Race / Staging Mobility in the United States » [En ligne], mis en ligne le 01 décembre 2011, consulté le 16 février 2021. URL : http://journals.openedition.org/miranda/83 ; DOI : https://doi.org/10.4000/miranda.83 Ce document a été généré automatiquement le 16 février 2021. Miranda is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. 1 SOMMAIRE South and Race Introduction Anne Stefani Forgetting the South and the Southern Strategy Michelle Brattain Image, Discourse, Facts: Southern White Women in the Fight for Desegregation, 1954-1965 Anne Stefani Re-Writing Race in Early American New Orleans Nathalie Dessens Integrating the Narrative: Ellen Douglas's Can't Quit You Baby and the Sub-Genre of the Kitchen Drama Jacques Pothier Representing the Dark Other: Walker Percy's Shadowy Figure in Lancelot Gérald Preher Burning Mississippi: Race, Fatherhood and the South in A Time to Kill (1996) Hélène Charlery Laughing at the United States Eve Bantman-Masum Staging American Mobility Introduction Emeline Jouve Acte I. La Route de l'ouest : Politique(s) des représentations / Act I. The Way West: Representations and Politics The Road West, Revised Editions Audrey Goodman Le héros de la Frontière, un mythe de la fondation en mouvement Daniel Agacinski Acte II.
    [Show full text]
  • Chinabrief in a Fortnight
    ChinaBrief Volume XIV s Issue 21 s November 7, 2014 VOLUME XIV s ISSUE 21 s NOVEMBER 7, 2014 In This Issue: IN A FORTNIGHT By Nathan Beauchamp-Mustafaga 1 CHINA’S ESPIONAGE AGAINST TAIWAN (PART I): ANALYSIS OF RECENT OPERATIONS By Peter Mattis 4 Chinese and Indian troops conduct a joint counter- REGIONAL MANEUVERING PRECEDES OBAMA-XI MEETING AT APEC SUMMIT terrorism exercise in 2008. By Richard Weitz 8 (Credit: Xinhua) A FAMILY DIVIDED: THE CCP’S CENTRAL ETHNIC WORK CONFERENCE By James Leibold 12 China Brief is a bi-weekly jour- SINO-INDIAN JOINT MILITARY EXERCISES: OUT OF STEP nal of information and analysis covering Greater China in Eur- By Sudha Ramachandran 16 asia. China Brief is a publication of The Jamestown Foundation, a private non-profit organization In a Fortnight based in Washington D.C. and is edited by Nathan Beauchamp- CHINA CYNICAL OVER U.S. MIDTERM ELECTIONS, BUT EXPECTS Mustafaga. POLICY CONTINUITY The opinions expressed in By Nathan Beauchamp-Mustafaga China Brief are solely those of the authors, and do not n Tuesday, November 4, the United States held its 2014 midterm elections necessarily reflect the views of The Jamestown Foundation. Oand voted the Republican Party into the majority in the U.S. Senate, giving them control of both houses in Congress and, as Chinese analysts noted, a major political victory. The overall Chinese response was cynical about the lack of real democracy in the elections and dismissive of U.S. President Barack Obama’s influence in the last two years of his presidency. Despite some concerns for U.S.- China relations with a more hawkish Republican Congress, Chinese commentators remain optimistic about the future of the bilateral relationship and look forward For comments and questions about China Brief, please con- to President Obama’s visit to Beijing for the Asia-Pacific Economic Cooperation tact us at Summit (APEC) later this month (see “Regional Maneuvering” in this issue).
    [Show full text]
  • Developing a Recurrent Neural Network with High Accuracy for Binary Sentiment Analysis Kevin Cunanan
    Claremont Colleges Scholarship @ Claremont CMC Senior Theses CMC Student Scholarship 2018 Developing a Recurrent Neural Network with High Accuracy for Binary Sentiment Analysis Kevin Cunanan Recommended Citation Cunanan, Kevin, "Developing a Recurrent Neural Network with High Accuracy for Binary Sentiment Analysis" (2018). CMC Senior Theses. 1835. http://scholarship.claremont.edu/cmc_theses/1835 This Open Access Senior Thesis is brought to you by Scholarship@Claremont. It has been accepted for inclusion in this collection by an authorized administrator. For more information, please contact [email protected]. Pomona College Department of Computer Science Developing a Recurrent Neural Network with High Accuracy for Binary Sentiment Analysis Kevin Andrew Cunanan April 29', 2018 Submitted as part of the senior exercise for the degree of Bachelor of Arts in Computer Science Professor Mariam Salloum Copyright c 2018 Kevin Andrew Cunanan The author grants Pomona College the nonexclusive right to make this work available for noncommercial, educational purposes, pro- vided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the author. Abstract Sentiment analysis has taken on various machine learning ap- proaches in order to optimize accuracy, precision, and recall. However, Long Short-Term Memory (LSTM) Recurrent Neu- ral Networks (RNNs) account for the context of a sentence by using previous predictions as additional input for future sentence predictions. Our approach focused on developing an LSTM RNN that could perform binary sentiment analysis for positively and negatively labeled sentences. In collaboration with Mariam Salloum, I developed a collection of programs to classify individual sentences as either positive or negative.
    [Show full text]
  • Treading the Thin Blue Line: Military Special-Operations Trained Police SWAT Teams and the Constitution
    William & Mary Bill of Rights Journal Volume 9 (2000-2001) Issue 3 Article 7 April 2001 Treading the Thin Blue Line: Military Special-Operations Trained Police SWAT Teams and the Constitution Karan R. Singh Follow this and additional works at: https://scholarship.law.wm.edu/wmborj Part of the Law Enforcement and Corrections Commons Repository Citation Karan R. Singh, Treading the Thin Blue Line: Military Special-Operations Trained Police SWAT Teams and the Constitution, 9 Wm. & Mary Bill Rts. J. 673 (2001), https://scholarship.law.wm.edu/wmborj/vol9/iss3/7 Copyright c 2001 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/wmborj TREADING THE THIN BLUE LINE: MILITARY SPECIAL-OPERATIONS TRAINED POLICE SWAT TEAMS AND THE CONSTITUTION The increasing use of SWAT teams and paramilitaryforce by local law enforcement has been thefocus of a growingconcern regardingthe heavy-handed exercise of police power. Critics question the constitutionality ofjoint-training between the military and civilian police, as well as the Fourth Amendment considerationsraised by SWAT tactics. This Note examines the history, mission, and continuing needfor police SWAT teams, addressingthe constitutionalissues raisedconcerning training and tactics. It explains how SWATjoint-training with the military is authorized by federal law and concludes that SWAT tactics are constitutionallyacceptable in a majority of situations. Though these tactics are legal andconstitutionally authorized, this Note acknowledges the validfearscritics have regarding the abuse of such police authority, and the limitations of constitutionaltort jurisprudence in adequately redressingresulting injuries. INTRODUCTION Americans awoke on the morning of April 23,2000 to news images seemingly taken from popular counterterrorist adventure movies.
    [Show full text]
  • New Mexico State. Poucedepartl11ent .. . an N Nair
    If you have issues viewing or accessing this file contact us at NCJRS.gov. ,,' ~ '..' (- .... New Mexico State. PoUceDepartl11ent .. - .. ' . An nnaiR eport19J 6 . " .'~ \" , ' ';- '. , '. r.;. ' NEW MEXICO STATE POLICE DISTRICTS Captain Frank Lucero Captain C. P.Anaya ' CommlUlder ~ District 01 Commander - District 07 P. O. Box, 1628 P. O. DrawerD Santa Fe, N. M. 87501 Esp:mola, N.M. 87532 827-2551 753-4277 Captain J. D. Mae.s Captain M. A. Matteson Command!:r • District 02 Commander - District' 08 P. O. Box 497 P .. O. Box 716 La$ Vegas, N. M. 87701 Alamogordo,N. M. 88310 425-6771 437-1313 Captain FIoyd Miles Captain A. C. Jones Commander -' District 03 Commander • District 09 P. O. Box 760 812 West 6th Street Roswell, N. M. 88201 Clovi~, N. M. $8101 622-7200 763-3426 Captain W. J. Kruse Captain R. J. McCool Commande~ ~ District 04 Commander - District 10 3000 E, University P.D. Box 1049 Las Cruces, N. M. 88001 Farmington, N. M. 87401 522-2222 n5-7547 Captain MelVin West CaptaIn S. Doitchinoff Commander - District 05 Commander • District 11 2501 . Carlisle .BlVd., N~ E. P. a.Box. 1455 Albuquerque, N. M. 87110 Socorro,. N. M. 87801 842-3082 835-0741 Captain M. L. Cordova Captain Otis A •.. Haley Commander - District 06 Commander- District 12 P. O. BoX 490 P. O. Box 566 Gnllup, N. M. 87301 Hobbs, N. M.88240 863-9353 392-5588 JAN 0 111978 GOVERNOR JERRY APODACA NEW MEXICO STATE POllCr; NEW MEXICO STATE POLICE DEPARTMENT ORGANllA1'lONAL CHART 1976 ANNUAL REPORT NEW Mr;XICO STATE'POLICE BOARD TABLE OF CONTENTS PAGE Dr.
    [Show full text]
  • Suspect Until Proven Guilty, a Problematization of State Dossier Systems Via Two Case Studies: the United States and China
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations Fall 2009 Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Kenneth N. Farrall University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian Studies Commons, Communication Technology and New Media Commons, International and Intercultural Communication Commons, and the Social Influence and oliticalP Communication Commons Recommended Citation Farrall, Kenneth N., "Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China" (2009). Publicly Accessible Penn Dissertations. 51. https://repository.upenn.edu/edissertations/51 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/51 For more information, please contact [email protected]. Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Abstract This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS - comprising interconnecting subsystems of records and identification - damage individual autonomy and self-determination, impacting not only human rights, but also the viability of the social system. The research, a hybrid of case-study and cross-national comparison, was guided in part by a theoretical model of four primary SDS driving forces: technology, political economy, law and public sentiment. Data sources included government documents, academic texts, investigative journalism, NGO reports and industry white papers. The primary analytical instrument was the juxtaposition of two individual cases: the U.S.
    [Show full text]
  • Federal Bureau of Investigation Hearing
    FEDERAL BUREAU OF INVESTIGATION HEARING BEFORE THE COMMITTEE ON THE JUDICIARY HOUSE OF REPRESENTATIVES ONE HUNDRED TENTH CONGRESS FIRST SESSION JULY 26, 2007 Serial No. 110–86 Printed for the use of the Committee on the Judiciary ( Available via the World Wide Web: http://judiciary.house.gov U.S. GOVERNMENT PRINTING OFFICE 37–010 PDF WASHINGTON : 2007 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate 0ct 09 2002 11:11 Jul 09, 2008 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 H:\WORK\FULL\072607\37010.000 HJUD1 PsN: DOUGA COMMITTEE ON THE JUDICIARY JOHN CONYERS, JR., Michigan, Chairman HOWARD L. BERMAN, California LAMAR SMITH, Texas RICK BOUCHER, Virginia F. JAMES SENSENBRENNER, JR., JERROLD NADLER, New York Wisconsin ROBERT C. ‘‘BOBBY’’ SCOTT, Virginia HOWARD COBLE, North Carolina MELVIN L. WATT, North Carolina ELTON GALLEGLY, California ZOE LOFGREN, California BOB GOODLATTE, Virginia SHEILA JACKSON LEE, Texas STEVE CHABOT, Ohio MAXINE WATERS, California DANIEL E. LUNGREN, California WILLIAM D. DELAHUNT, Massachusetts CHRIS CANNON, Utah ROBERT WEXLER, Florida RIC KELLER, Florida LINDA T. SA´ NCHEZ, California DARRELL ISSA, California STEVE COHEN, Tennessee MIKE PENCE, Indiana HANK JOHNSON, Georgia J. RANDY FORBES, Virginia BETTY SUTTON, Ohio STEVE KING, Iowa LUIS V. GUTIERREZ, Illinois TOM FEENEY, Florida BRAD SHERMAN, California TRENT FRANKS, Arizona
    [Show full text]
  • Iacp New Members
    44 Canal Center Plaza, Suite 200 | Alexandria, VA 22314, USA | 703.836.6767 or 1.800.THEIACP | www.theIACP.org IACP NEW MEMBERS New member applications are published pursuant to the provisions of the IACP Constitution. If any active member in good standing objects to an applicant, written notice of the objection must be submitted to the Executive Director within 60 days of publication. The full membership listing can be found in the online member directory under the Participate tab of the IACP website. Associate members are indicated with an asterisk (*). All other listings are active members. Published July 1, 2021. Australia Australian Capital Territory Canberra *Sanders, Katrina, Chief Medical Officer, Australian Federal Police New South Wales Parramatta Walton, Mark S, Assistant Commissioner, New South Wales Police Force Victoria Melbourne *Harman, Brett, Inspector, Victoria Police Force Canada Alberta Edmonton *Cardinal, Jocelyn, Corporal Peer to Peer Coordinator, Royal Canadian Mounted Police *Formstone, Michelle, IT Manager/Business Technology Transformation, Edmonton Police Service *Hagen, Deanna, Constable, Royal Canadian Mounted Police *Seyler, Clair, Corporate Communications, Edmonton Police Service Lac La Biche *Young, Aaron, Law Enforcement Training Instructor, Lac La Biche Enforcement Services British Columbia Delta *Bentley, Steven, Constable, Delta Police Department Nelson Fisher, Donovan, Chief Constable, Nelson Police Department New Westminster *Wlodyka, Art, Constable, New Westminster Police Department Surrey *Cassidy,
    [Show full text]
  • PERSONALITY Personality Not Included
    Early Praise for Personality Not Included “Wow. I devoured Personality Not Included, frequently shouting ‘yes!’ as I followed Rohit’s spot-on analysis of a fundamental truth: being faceless doesn’t work anymore. Per- sonality in both people and companies is what customers get passionate about and drives seemingly unlimited success. This is one of those rare books to purchase by the case so you can give copies to employees and investors. But make sure to keep a few for yourself to read and reread so you don’t miss a thing. Bravo!” —David Meerman Scott, bestselling author of The New Rules of Marketing and PR “Personality Not Included breaks down the old barriers between marketing, advertis- ing, and PR and shows people how to nail the single objective of it all: creating pow- erful conversations with your customers and getting them to choose you over the rest.” —Timothy Ferriss, top blogger and #1 New York Times bestselling author of The 4-Hour Workweek “There are two types of small business owners—ones who know they are in the busi- ness of marketing and those who don’t. For either, Personality Not Included is an eye- opening look at what really matters when it comes to delighting your customers. If you want a guide to being more than ordinary, get this book.” —John Jantsch, award-winning blogger and author of Duct Tape Marketing “Just being pretty isn’t enough anymore, today a brand also needs a strong personal- ity to survive. In PNI, Rohit gives you the techniques and tools to help your brand go from wallflower to social butterfly.” —Laura Ries, bestselling author of 22 Immutable Laws of Branding, and cofounder of Ries & Ries “Finally.
    [Show full text]
  • P20-27 Layout 1
    Friday 25 Lifestyle | Features Friday, January 19, 2018 Thigh-high Ugg boots “When you look at the dog you don’t pay attention to his char- acter, and I wanted to have the same feeling here. If that guy on the top was a real person you would assume a lot of things about him,” he said. Real-life men rarely wear overly styled outfits, David said, but “bits of everything-things he has from the past, things he just got, sporty things” that are comfortable. So we shall see how many will be wearing thigh-high Ugg boots next winter. Lots if Y/Project designer Glenn Martens has his way. Like Baywatch star Pamela Anderson until she realized the boots were made from sheep, the Belgian is a big fan of the Aus- tralian sheepskin boots. “They are so comfortable it is like putting your feet into warm butter,” he told AFP. “So I thought why not put the whole leg in there.” “I’m very sorry for the animals, but we are very comfortable,” said the hip creator, who used fake leather in the rest of his over-sized collection which turned on two-in-one jackets and coats. “You have two coats and two jack- ets in one. It’s like merging two bodies together, a bit like love- making,” he said of their construction. Like Y/Project and a growing number of men’s collections, Japanese label Facetasm went for a co-ed show with male and female models, some of whom even smiled. It was dominated by a joyous oversized thrift shop look of crumpled denim, baseball jackets, Medusa hairdos and lots of lay- ering.
    [Show full text]
  • MELT © Heidi Wicks (Thesis)
    MELT © Heidi Wicks (Thesis) submitted to the School of Graduate Studies in partial fulfillment of the requirements for the degree of Master of Arts (Creative Writing) Faculty of Humanities and Social Sciences Memorial University of Newfoundland May 2019 St. John’s Newfoundland and Labrador MELT A novel by Heidi Wicks 1 Melt shifts between two girls who come of age together during two economically turbulent times - the late ‘90s and present-day - in St. John's, Newfoundland. The women navigate break-ups, tanning beds, spray tans, drifting desires, at least one kid with a raisin up his nose, drunken dancing, infidelity, death, sex in Middle Cove, job loss at the CBC and love loss at the Avalon Mall. Through the pockets of their maddening but beloved city, their friendships and relationships are tested, but their brazen humour and deep- rooted friendship helps them ice-pick through the winter sludge and spring muck and get them through until it’s summer once more. 2 Chapter One “About here?” Cait slices her index finger across the middle of her right thigh, softly. A knife etching a line in butter. “Your father’s not lettin’ you get away with a slit that high.” Tilley Brophy plucks the cigarette from her lips and releases a poof of smoke that curls into the shape of an anchor. She jabs the butt into a heavy crystal ashtray and coughs like her freakin’ lungs are about to vault from her body and splat against her half-brown-carpet, half-brown- wood-panel wall in her house by the Village Mall.
    [Show full text]