AIG reports steeper 3Q net loss (AP)

DES MOINES, Iowa ? Insurer AIG on Thursday posted a steeper third-quarter loss, undercut by declining interest rates and weak stock markets that reduced the value of its holdings while it paid out storm losses. It also took a big one-time charge for a fleet of older less fuel-efficient aircraft.

New York-based American International Group Inc. reported a loss of $4.1 billion, or $2.16 per share, compared with a loss of $2.52 billion, or $18.53 per share a year ago.

The operating loss was $3.04 billion, or $1.60 per share, up from a loss of $114 million, or 84 cents a year ago.

Analysts surveyed by FactSet expected a loss of 22 cents per share.

The company has been paying back the billions of dollars the U.S. government provided in the 2008 bailout and now owes roughly $68 billion.

At AIG's Chartis Insurance unit, net premiums written rose less than 1 percent to $8.66 billion from $8.59 billion while claims expenses rose nearly 12 percent to $6.84 billion. Underwriting expenses climbed 15 percent to $2.89 billion. That left the company with an underwriting loss of $582 million, compared with a profit of $65 million a year ago. Its combined ratio was 106.4 compared with 99.3 a year ago.

Combined ratio is the sum of an insurance company's loss ratio and expense ratio and is used as an indicator of profitability. A ratio above 100 means that for every premium dollar taken in, more than a dollar went for losses, expenses, and commissions. A figure below 100 indicates an underwriting profit.

The business posted catastrophe losses of $574 million up from $72 million of losses taken a year ago. Much of the current quarter's loss was from Hurricane Irene, which struck the East Coast in August.

"Despite the difficult external environment, we are encouraged by the progress we've made and the underlying strength of our core insurance businesses," CEO Robert H. Benmosche said in a statement.

In the SunAmerican Financial business, revenue fell 10 percent to $3.54 billion on lower premiums and investment income. Expenses rose 7 percent.

The company also took a $1.5 billion non-cash charge for aircraft in its International Lease Finance Corp. fleet. The charge is for older-generation planes that would be sold prior to the end of their previously estimated life.

The company said a declining stock market contributed to a loss of $2.3 billion in the valuation of its holding of AIA Group Ltd. shares.

Reduced interest rates and widening credit spreads cut the fair value of other holdings by more than $974 million.

AIG also paid the U.S. Treasury $2.2 billion in August, using proceeds from its sale of Nan Shan Life Insurance Co.

On Monday, AIG made an additional payment of approximately $972 million, primarily from the release of funds held in escrow related to the American Life Insurance Co.

The latest repayment brings the insurance giant's outstanding balance from the 2008 taxpayer-funded bailout down to roughly $68 billion.

The government provided AIG with $182 billion at the height of the 2008 financial crisis.

The government still owns 77 percent of AIG's common stock. While the government made an initial sale of AIG stock last May, the expectation is that those stock sales will not resume until the value of AIG shares increase in value. AIG stock has lost nearly half of its value this year.

Shares rose 44 cents, or 1.8 percent, to close at $24.63 before the company posted results. That is below the $28.72 price where the Treasury would be able to recoup all of its investment in AIG.

Shares fell another 18 cents in after-market trading. They are trading at nearly half their value at the beginning of the year. They've traded as high as $52.67 in the past 52 weeks.

AIG also said its board authorized the repurchase stock valued at up to $1 billion. The timing of purchases will depend on market conditions, AIG's financial condition, results of operations, liquidity and other factors.

Source: http://us.rd.yahoo.com/dailynews/rss/earnings/*http%3A//news.yahoo.com/s/ap/20111103/ap_on_bi_ge/us_earns_aig

amanda knox latest news leann rimes brass monkey x factor auditions x factor auditions flds flds

APNewsBreak: UN has new Iranian nuke arms claims (AP)

VIENNA ? The U.N. atomic agency plans to reveal intelligence next week suggesting Iran made computer models of a nuclear warhead and other previously undisclosed details on alleged secret work by Tehran on nuclear arms, diplomats told The Associated Press on Friday.

Other new confidential information the International Atomic Energy Agency plans to share with its 35 board members will include satellite imagery of what the IAEA believes is a large steel container used for nuclear arms-related high explosives tests, the diplomats said.

The agency has previously listed activities it says indicate possible secret nuclear weapons work by Iran, which has been under IAEA perusal for nearly a decade over suspicions that it might be interested in develop such arms.

But the newest compilation of suspected weapons-related work is significant in substance and scope. The diplomats say they will reveal suspicions that have not been previously made public and greatly expand on alleged weapons-related experiments that have been published in previous reports on Iran's nuclear activities.

It also comes as the drumbeat of reports about possible military action against Iran's nuclear facilities intensifies.

Israeli President Shimon Peres said Friday that international community is closer to pursuing a military solution to the standoff over Iran's nuclear program than a diplomatic one. The comments, from a known dove, assumed added significance because they followed unsubstantiated reports that Prime Minister Benjamin Netanyahu was seeking his government's support for a strike against Tehran.

British media have separately cited unnamed British officials as saying London was prepared to offer military support to any U.S. strike on Iran's nuclear facilities.

In Vienna, the diplomats ? from IAEA member nations ? asked for anonymity because their information was privileged. One of them said the material drawn up by IAEA chief Yukiya Amano will be in an annex running around 12 pages and attached to the latest of a regular series of agency reports on Iran's nuclear enrichment program and other activities that could be used to arm nuclear missiles.

Previously undisclosed information contained in the annex, said the diplomats, will include:

? Intelligence from unnamed member states that a bus-sized steel container, located at the Iranian military base of Parchin is likely being used for nuclear-related high explosives testing of the kind needed to release an atomic blast. The agency has satellite imagery of the container.

? Expanded evidence that Iranian engineers worked on computer models of nuclear payloads for missiles.

Significantly, said the diplomats, these alleged experiments took place after 2003 ? the year that Iran was believed to have stopped secret work on nuclear weapons, according to a 2007 U.S. intelligence assessment. But diplomats have told the AP that Tehran continued arms-related experiments in a less concentrated way after that date, a view reflected by recent IAEA reports that have detailed suspicions that such work may be continuing up to the present.

The annex will also say that more than 10 nations have supplied intelligence suggesting Iran is secretly developing components of a nuclear arms program ? among them an implosion-type warhead that it wants to mount on a ballistic missile.

It says that two foreign "sources" ? apparently countries or nongovernment groups within countries ? have helped Iran develop a weapons design, without naming them. And it details how Iran bought "dual use" ? peaceful or military ? nuclear technology from the black market network of renegade Pakistani scientist A. Q. Khan, as well as alleged preparations for a nuclear weapons test.

The upcoming report is meant to ratchet up pressure on the Islamic republic to stop four years of stonewalling of IAEA experts seeking to follow up intelligence of such secret weapons-related experiments.

Iran denies such activities, asserting that they are based on intelligence fabricated by Washington. It also denies that its uranium enrichment program ? under U.N. Security Council sanctions because it could manufacture fissile warhead material ? is meant for anything else but making nuclear fuel.

In his previous report in September, Amano said he was "increasingly concerned" about a stream of intelligence suggesting that Iran continues to work secretly on developing a nuclear payload for a missile and other components of a nuclear weapons program.

He said "many member states" are providing evidence for that assessment, describing the information the agency is receiving as credible, "extensive and comprehensive."

That report warned of the "possible existence in Iran of past or current undisclosed nuclear related activities" linked to weapons work. In particular, said the report, the agency continues to receive new information about "activities related to the development of a nuclear payload for a missile."

Acquired from "many" member states, the information possessed by the IAEA is "extensive and comprehensive ... (and) broadly consistent and credible," said the report.

The U.S. and its Western allies on the Security Council hope the upcoming report will be strong enough to persuade the IAEA board at its mid-November meeting to report it anew to the council. It was the board that first referred Iran to the Security Council in 2006 ? a move that led to a series of sanctions punishing Tehran for its nuclear defiance.

If that fails, they would like a board resolution setting a deadline of only a few months for Iran to start cooperating with the agency's probe ? or face the prospect of renewed Security Council referral at the next board meeting in March.

One of the diplomats said that Iran was given a copy of the annex earlier this week, giving a chance for comment that would be included when the report is shared with board members. Iran initially refused to accept a copy of the report, he said, reflecting its rejection of the allegations.

A call requesting comment left on the cell phone of Ali Asghar Soltanieh, Iran's chief delegate to the IAEA, was not immediately returned.

___

George Jahn can be reached at http://twitter.com/GeorgeJahn

Source: http://us.rd.yahoo.com/dailynews/rss/europe/*http%3A//news.yahoo.com/s/ap/20111104/ap_on_re_eu/iran_nuclear

byu football demi moore and ashton kutcher demi moore and ashton kutcher delonte west bank of america black eyed peas central park occupy wallstreet

Donald Trump the Orange Supremacist calls Jon Stewart Racist; Has a Pot-Kettle Problem (Balloon Juice)

BBM Music now rocking BlackBerry App World (video)

RIM's BBM Music is now ready for public consumption. The simply titled mobile app is hitting the company's App World today for users in the US, Canada and Australia -- with more areas coming soon, naturally. BBM Music lets BlackBerry owners add 50 songs from a choice of millions and harnesses the social networking capabilities of BBM, giving Premium users access to music from their friends' music profiles. Check out video of the app in action, after the break.

Continue reading BBM Music now rocking BlackBerry App World (video)

BBM Music now rocking BlackBerry App World (video) originally appeared on Engadget on Wed, 02 Nov 2011 09:41:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceBlackBerry Blog  | Email this | Comments

Source: http://www.engadget.com/2011/11/02/bbm-music-now-rocking-blackberry-app-world-video/

joost new hampshire debate how to get ios 5 how to get ios 5 eric holder eric holder avengers trailer

Stuxnet Raises 'Blowback' Risk In Cyberwar

Instructor Mark Fabro leads an exercise at the Department of Homeland Security's cyberdefense facility at the Idaho National Laboratory in September. Training at the lab is intended to help protect the nation's power, water and chemical plants, electrical grid and other facilities from computer viruses such as Stuxnet. Mark J. Terrill/AP

Instructor Mark Fabro leads an exercise at the Department of Homeland Security's cyberdefense facility at the Idaho National Laboratory in September. Training at the lab is intended to help protect the nation's power, water and chemical plants, electrical grid and other facilities from computer viruses such as Stuxnet.

The Stuxnet computer worm, arguably the first and only cybersuperweapon ever deployed, continues to rattle security experts around the world, one year after its existence was made public.

Apparently meant to damage centrifuges at a uranium enrichment facility in Iran, Stuxnet now illustrates the potential complexities and dangers of cyberwar.

It's just a matter of time. Stuxnet taught the world what's possible, and honestly it's a blueprint.

Secretly launched in 2009 and uncovered in 2010, it was designed to destroy its target much as a bomb would. Based on the cyberworm's sophistication, the expert consensus is that some government created it.

"Nothing like this had occurred before," says Joseph Weiss, an expert on the industrial control systems widely used in power plants, refineries and nuclear facilities like the one in Iran. "Stuxnet was the first case where there was a nation-state activity to physically destroy infrastructure [via a cyberattack]."

Reactions to the use of Stuxnet in Iran generally fall into two categories. For those focused on the danger of Iran developing a nuclear weapon, Stuxnet was something to celebrate, because it set back Iran's nuclear program, perhaps by years.

But for people who worry about the security of critical U.S. facilities, Stuxnet represented a nightmare: a dangerous computer worm that in some modified form could be used to attack an electric or telecommunications grid, an oil refinery or a water treatment facility in the United States.

Cybersecurity analysts look at a diagram that shows their computer network, which is coming under attack, during a mock exercise at the Idaho National Laboratory in September. Enlarge Mark J. Terrill/AP

Cybersecurity analysts look at a diagram that shows their computer network, which is coming under attack, during a mock exercise at the Idaho National Laboratory in September.

Mark J. Terrill/AP

Cybersecurity analysts look at a diagram that shows their computer network, which is coming under attack, during a mock exercise at the Idaho National Laboratory in September.

"It's just a matter of time," says Michael Assante, formerly the chief security officer for the North American Electric Reliability Corporation. "Stuxnet taught the world what's possible, and honestly it's a blueprint."

Further complicating the Stuxnet story is the widely held suspicion that the U.S. government, possibly in partnership with Israel, had a hand in the creation of this lethal cyberweapon, notwithstanding the likelihood that in some form it could now pose a threat to the U.S. homeland.

Training To Face A Catastrophe

The prospect of a cyberattack on U.S. infrastructure assets has prompted the Department of Homeland Security to arrange a new training program for the people who are supposed to protect the electric grid, manufacturing plants, refineries, water treatment centers and other critical facilities.

The top concern is the industrial control systems (ICS) that oversee the operation of key equipment at those facilities, from the valves to the breaker switches.

"Stuxnet" is a computer worm designed to attack large-scale industrial facilities like power plants, dams, refineries or water treatment centers. It targets the computer systems used to monitor and control specific operations in those facilities, and most famously was used to destroy centrifuges in a uranium enrichment facility in Natanz, Iran.

In that case, the Stuxnet worm rewrote the code in a component that controlled the rotor speeds of the centrifuges. The code alteration resulted in slight variations in the rotor speeds, subtle enough not to cause attention but significant enough to cause physical damage to the centrifuges. The name "Stuxnet" comes from a combination of key file names hidden in the code.

Several features of the Stuxnet worm distinguished it as highly advanced. No previous computer virus had been used to physically sabotage industrial machinery. It is also unique in its ability to remain undetected for a long period of time, largely by sending fake messages that suggest processes are running normally. It has the ability to search for particular components, leaving others undisturbed. At least two U.S. computer systems in the United States were found to be "infected" by Stuxnet, but they were not "affected," according to Department of Homeland Security officials, because they did not match the Stuxnet requirements.

The sophistication and complexity of the Stuxnet worm has led researchers to believe that only a well-resourced nation-state could have developed it.

By hacking into the computer networks behind the industrial control systems, an adversary could reprogram an ICS so that it commands the equipment to operate at unsafe speeds or the valves to open when they should remain closed. This is roughly the way Stuxnet was able to damage the centrifuges in Iran.

Participants in the training program, based at the Idaho National Laboratory in Idaho Falls, are taken step by step through a simulated cyber-intrusion, so they can experience firsthand how a Stuxnet-like attack on their facilities might unfold.

During an Idaho National Laboratory exercise that was staged for visiting reporters in late September, instructor Mark Fabro installs his "red" team on the second floor of the training center, with the mission of penetrating the computer network of an unsuspecting industrial company, set up on the floor below.

The trainees on the "blue" team downstairs sit in a mock control room, monitoring their computer screens for any sign of trouble.

At first, everything appears normal. The attackers have managed to take control of the computer network without the defenders even realizing it. But gradually, problems develop in the control room.

"It's running really slow," says one operator. "My network is down."

Sitting at their monitors upstairs, the attacking team is preparing to direct the computer system to issue commands to the industrial equipment.

"Take this one out," says Fabro, pointing to a configuration that identifies the power supply to the control room. "Trip it. It should be dark very soon."

Within 30 seconds, the mock control room downstairs is dark.

"This is not good," says Jeff Hahn, a cybersecurity trainer who this day is playing the role of the CEO of the industrial company under attack. The blue team is under his direction.

"Our screens are black and the lights are out. We're flying blind," Hahn says.

During the exercise, the critical industrial facility under attack is a pumping station, such as might be found in a chemical plant or water treatment center. As the operators sit helpless at their terminals, the pumps suddenly start running, commanded by some unseen hand. Before long, water is gushing into a catch basin.

Marty Edwards, director of the DHS Industrial Control Systems Cyber Emergency Response Team (shown here at the Idaho National Laboratory in September) says the U.S. government's cybersecurity lab had no role in the development of Stuxnet. Enlarge Mark J. Terrill/AP

Marty Edwards, director of the DHS Industrial Control Systems Cyber Emergency Response Team (shown here at the Idaho National Laboratory in September) says the U.S. government's cybersecurity lab had no role in the development of Stuxnet.

Mark J. Terrill/AP

Marty Edwards, director of the DHS Industrial Control Systems Cyber Emergency Response Team (shown here at the Idaho National Laboratory in September) says the U.S. government's cybersecurity lab had no role in the development of Stuxnet.

"There's nothing we can do," one of the operators tells the CEO. "We can only sit here and watch it happen."

If this mock facility were an actual chemical plant, hazardous liquids could be spilling. If it were an electric utility, the turbines could be spinning out of control.

If it were a refinery, the tanks could be bursting or pipelines could be blowing up, all because the cyberattackers have been able to take over the computer network that controls the key operations.

The cyberattack scenario is all the more worrisome, because it is not clear that such attacks can be effectively stopped.

"Some of these [systems] can't be protected," says Weiss, the industrial control systems security expert. "We're going to have to figure out how to recover from events that we simply can't protect these systems from."

[Iran developing a nuclear weapon] is probably one of the largest national security challenges I can envision. In that context, you can make a pretty strong argument that the benefit of using a cyberweapon to slow down or delay or to achieve a specific objective might absolutely outweigh the risk.

A U.S. Role In Stuxnet?

The challenge of managing a Stuxnet-like attack is compounded by the possibility that the U.S. government itself had a role in creating the cyberweapon.

U.S. officials were certainly aware of the ICS vulnerabilities that the Stuxnet worm ultimately exploited. An Idaho National Laboratory experiment in 2007, dubbed "Project Aurora," first demonstrated how cybercommands alone could destroy industrial equipment. Idaho lab researchers, who at the time included Michael Assante, rewrote the ICS computer code for the generator, directing the generator to destroy itself.

"When we started to conduct the test, that really robust machine couldn't take it," Assante recalls. "The coupling broke ... and you saw black smoke belching out of it."

In 2008, Idaho National Laboratory researchers performed a demonstration expanding on the Aurora experiment and their further analysis of ICS vulnerabilities. The PowerPoint briefing was prepared specifically for Siemens, the company whose equipment the Stuxnet attack targeted. One year later, the worm was introduced into Siemens ICS equipment used at a uranium enrichment facility in Natanz, Iran.

Ralph Langner, a German cybersecurity researcher who was among the first to analyze the Stuxnet code, came away convinced that it was a U.S. creation.

"To us, it was pretty clear that the development of this particular malware required resources that we only see in the United States," Langner says.

Marty Edwards, director of the Department of Homeland Security Industrial Control Systems Cyber Emergency Response Team, based at the Idaho lab, denies any Idaho National Laboratory role in the creation of Stuxnet, and says the ICS traits the worm exploited were relatively well-known by the time it was created.

"I think it was only a matter of time before those common weaknesses or vulnerabilities were leveraged in an event such as Stuxnet," Edwards says. He would not comment on any role that other U.S. government agencies might have played in the development of the Stuxnet weapon.

That the United States has an offensive capability in the cyberwar domain is a matter of official record. Activities in that area are highly classified, but officials privately acknowledge that U.S. agencies have developed cyberweapons for offensive use.

The Stuxnet computer worm reportedly affected several laptops belonging to employees of the Bushehr nuclear power plant (shown here in a photo from August 2010 and released by the International Iran Photo Agency) in Iran, as well as centrifuges at Natanz, the country's most important uranium enrichment facility. Enlarge Ebrahim Norouzi/AP

The Stuxnet computer worm reportedly affected several laptops belonging to employees of the Bushehr nuclear power plant (shown here in a photo from August 2010 and released by the International Iran Photo Agency) in Iran, as well as centrifuges at Natanz, the country's most important uranium enrichment facility.

Ebrahim Norouzi/AP

The Stuxnet computer worm reportedly affected several laptops belonging to employees of the Bushehr nuclear power plant (shown here in a photo from August 2010 and released by the International Iran Photo Agency) in Iran, as well as centrifuges at Natanz, the country's most important uranium enrichment facility.

It has also been reported that the United States has engaged previously in the sabotage of Iranian nuclear facilities. The use of Stuxnet would fit squarely within such a category.

Joel Brenner, the former inspector general at the National Security Agency, writes in his new book, America the Vulnerable, that the use of Stuxnet "would ... have been consistent with U.S. policy but not with previous U.S. methods, which avoided computer operations likely to damage others besides its intended targets."

Some observers have argued that the risk of a weapon like Stuxnet being turned against U.S. assets was so great that no U.S. government agency could logically have supported its development. But others aren't so sure.

Among them is Assante, who was among the first cybersecurity experts to warn that Stuxnet could provide a blueprint for attacks on U.S. infrastructure.

Now the president of the National Board of Information Security Examiners, Assante argues that concerns about Iran developing a nuclear weapon could have justified Stuxnet's creation.

"That is probably one of the largest national security challenges I can envision," Assante said in a recent meeting with reporters at the Idaho lab. "In that context, you can make a pretty strong argument that the benefit of using a cyberweapon to slow down or delay [a nuclear weapon program] or to achieve a specific objective might absolutely outweigh the risk."

Questions Of Information-Sharing

Given the secrecy around the U.S. offensive cyberwar capability, however, that cost-benefit analysis could only be carried out at the highest levels of the U.S. government. Moreover, it is unclear whether agencies responsible for defending the U.S. infrastructure would even be part of the deliberation.

"[The development of a cyberweapon] would probably be so highly classified that the people at DHS wouldn't even know about it," says one former intelligence official.

Such a strict compartmentalization of policymaking would raise the question of whether there is sufficient communication between the offensive and defensive teams in the cyberwar domain.

If Stuxnet was developed by U.S. cyberweapon specialists, the DHS personnel who spent a year analyzing the computer code were presumably engaged in a major duplication of effort.

But Greg Schaffer, assistant secretary of homeland security for cybersecurity and communications, says DHS officials have no complaint over coordination with U.S. agencies responsible for offensive cyber-activities.

"DHS is focused on network defense," Schaffer says. "We do get assistance from the organizations that work on the offensive mission. Whether they bring their work [to us] is something they have to decide. That is not something that we worry about."

A growing awareness of the cyberthreat to critical U.S. infrastructure assets, however, may well deepen concerns about the "blowback" risk to the U.S. homeland from the development of a potent cyberweapon designed to be used elsewhere.

The appropriate level of information-sharing between the offensive and defensive teams within the U.S. cybercommunity is likely to be the focus of intense interagency discussion.

"My sense is that there are lots of people talking about it," says Herbert Lin, chief scientist at the National Academy of Sciences and a co-editor of a book on policy, law and ethics in cyberwar. "But almost all of the discussion is going on behind closed doors."

Eventually, this could change. Whether and when the United States should use nuclear weapons or chemical weapons or land mines has been vigorously debated in public for years, and it may be only a matter of time until the use of cyberweapons gets similar attention.

Source: http://www.npr.org/2011/11/02/141908180/stuxnet-raises-blowback-risk-in-cyberwar?ft=1&f=1007

adam savage adam savage mos def jack o lantern jack o lantern dave thomas selena

Arch Enemy : We Will Rise [Video]

I swear, nothing takes the edge off a long day at the grindstone than a little Swedish Death-Metal. That's especially true when you've got some Arch Enemy on tap with stone-cold fox Angela Gossow growling out vocals. Oh, did I mention I'm a sucker for female leads? More »


Source: http://feeds.gawker.com/~r/gizmodo/full/~3/QZKaZMW5xeE/arch-enemy--we-will-rise

santonio holmes john edward psychic john edward psychic brandon marshall headless horseman headless horseman brandon lloyd

China sends outspoken artist $2.4 million tax bill (AP)

BEIJING ? Outspoken artist Ai Weiwei said Tuesday that Chinese authorities are demanding he pay $2.4 million in back taxes and fines in a new show of government pressure on the dissident detained for nearly three months earlier this year.

The Beijing Local Taxation Bureau gave the artist notice Tuesday that he owed more than 15 million yuan ($2.36 million), after serving a similar notice in June for a smaller amount, Ai said in a phone interview.

The new notice gave him around 10 days to make the payment, without saying what might happen if he failed, he said.

Ai said he would not pay until police returned account books confiscated from his Beijing Fake Cultural Development Ltd. design company and allowed him to meet with his former office manager and accountant.

"We can pay this money, but we need to know why we have to," he said. "We cannot just unwittingly hand over a sum of money. This would be irresponsible toward the country."

Authorities have not commented on the issue, and calls to the local tax bureau rang unanswered while Beijing's Public Security Bureau did not respond to a faxed list of questions.

Ai was detained secretly without charges for 81 days this year, sparking an international outcry among artists, politicians, activists and Western leaders who called it a sign of China's deteriorating human rights situation. Police also raided his studio and confiscated account books.

His family and supporters have said he is being punished for speaking out against the country's Communist leadership and social problems. Activists have called the government's tax evasion claims a false pretense for Ai's detention.

"Accounts for tax purposes should be investigated by the tax bureau, not the police," Ai said Tuesday. "Police should not be taking me away to a place that no one knows for 81 days to investigate taxes."

After his release in June, the tax bureau served a notice seeking about 12 million yuan ($1.85 million) from him. But his design firm challenged the bill and were told by Chinese authorities that the company had not paid corporate taxes for a decade.

Ai, who has shown his art in London, New York and Berlin and earned huge sums from sales, said he was most concerned that authorities were misusing the law in going after him.

"If you want to hurt one person, to hurt me, that's all right," he said. But "when you hurt the law, it hurts the country and everybody in it."

___

Follow Gillian Wong on Twitter at http://twitter.com/gillianwong

Source: http://us.rd.yahoo.com/dailynews/rss/entertainment/*http%3A//news.yahoo.com/s/ap/20111101/ap_en_ot/as_china_ai_weiwei

eric holder avengers trailer the avengers trailer the avengers trailer tori spelling minka kelly gop debate

HTC Rezound Appears On Video And Signage Ahead Of Launch

rezoundstoreBy now it's no secret that HTC's Verizon-bound Rezound will debut shortly, but the stars seem to have aligned recently, because we're absolutely swimming in Rezound-related news. Most notably, a video demoing the Rezound in action has begun to make the rounds, and it gives us our best glimpse yet Verizon's next holiday heavyweight.

Source: http://feedproxy.google.com/~r/Techcrunch/~3/z-0ZhbXaWcs/

freetown freetown nicole scherzinger modern family troy davis troy davis cough