Tuesday, January 31, 2012

How To Be Hack the Wireless Network

Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.linktowhy.blogspot.com
The step by step procerdure in wireless hacking can be explained with help of different topics as follows:-
linktowhy.blogspot.com
1) Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.
An access point (AP) is a station that provides frame distribution service to stations associated with it.
The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage.
linktowhy.blogspot.com
2) Channels :- The stations communicate with each other using radio frequencies between 2.4 GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using neighboring channels may interfere with each other.

3) Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm.

4) Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is a program that intercepts and decodes network traffic broadcast through a medium. It is easier to sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections.

5 ) Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the devices. A passive network scanner instructs the wireless card to listen to each channel for a few messages. This does not reveal the presence of the scanner. An attacker can passively scan without transmitting at all.

6) Detection of SSID :- The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled.linktowhy.blogspot.com
When the above methods fail, SSID discovery is done by active scanning

7) Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use later in constructing spoofed frames. The source and destination MAC addresses are always in the clear in all the frames.linktowhy.blogspot.com

8) Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking tool is AirSnort ( http://airsnort.shmoo.com ).

9) Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio-silent, through network security measures is virtually impossible. Once the attacker begins probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can be detected.

10) Wireless Spoofing :- There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing.

11) MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified.

12) IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks.

13) Frame Spoofing :- The attacker will inject frames that are valid but whose content is carefully spoofed.

14) Wireless Network Probing :-
The attacker then sends artificially constructed packets to a target that trigger useful responses. This activity is known as probing or active scanning.
linktowhy.blogspot.com
15) AP Weaknesses :- APs have weaknesses that are both due to design mistakes and user interfaces
linktowhy.blogspot.com
16) Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal from it than what it receives from a legitimate APlinktowhy.blogspot.com.

17) Denial of Service :- A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion by unauthorized clients. In wireless networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the victim and its clients may not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station enables session hijacking.

18) Jamming the Air Waves :- A number of consumer appliances such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops so low, that the wireless LAN ceases to function.

19) War Driving :- Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers.
Regardless of the protocols, wireless networks will remain potentially insecure because an attacker can listen in without gaining physical access.


Tips for Wireless Home Network Security

1) Change Default Administrator Passwords (and Usernames)
2) Turn on (Compatible) WPA / WEP Encryption
3) Change the Default SSIDlinktowhy.blogspot.com
4) Disable SSID Broadcast linktowhy.blogspot.com
5) Assign Static IP Addresses to Devices
6) Enable MAC Address Filtering
7) Turn Off the Network During Extended Periods of Non-Use
8) Position the Router or Access Point Safely

How to Creating The Button In HTML Coding Quickly


If you want to Creating HTML push button link
So, Here the solution...........linktowhy.blogspot.com

Solutionlinktowhy.blogspot.com

Using the below source will allow you to create a push button link. If you wanted the link to not go to Computer Hope change the URL http://www.linktowhy.blogspot.com/ to the web page you wish to open.
 linktowhy.blogspot.com
<FORM>
<INPUTTYPE="BUTTON"VALUE="HomePage" ONCLICK="window.location.href='http://www.linktowhy.blogspot.com'">
</FORM>
linktowhy.blogspot.com
Example

How to Easily Crack Window XP Password


Cryptanalisys :- Basically, Cryptanalisys means Operations performed in converting encrypted messages to plain text without initial knowledge of the crypto-algorithm and/or key employed in the encryption.
This is the fastest technique of password cracking possible due to "Rainbow Tables".
A rainbow table is a file that is used to lookup an unknown plaintext from a known hash for an algorithm that does not usually permit this operation. linktowhy.blogspot.com
Steps 1 to 4 i.e upto importing hashes from local system, are similar to previous technique (i.e brute-force). The steps coming after that are as follows-
linktowhy.blogspot.com
5) Here, select "cryptanalisys attack" then "NTLM hashes" and then select "via rainbow tables". Here we can choose either OphCrack or RainbowCrack formats of tables. The rainbow tables are available free to download on internet.
Due to large file size of rainbow tables (350MB - 3GB); instead of downloading we can also create at own just by downloading rainbow table generator (winrtgen.zip of 181KB) free download at "http://www.oxid.it/downloads/winrtgen.zip" linktowhy.blogspot.com



6) Click on "Add Table"linktowhy.blogspot.com


7) Browse for the location of rainbow table on your system, select proper table and click "open".


8) Select the loaded table and then click on "Start" button.linktowhy.blogspot.com


9) On completetion it will show the exact password.linktowhy.blogspot.com




                     

How to Hack Window XP Password Easily


Here we use the tool "Cain and Abel" for cracking passwords of any local user/administrator.
First download cain and abel from "http://www.oxid.it/cain.html" and install it on your system.
linktowhy.blogspot.com
Make sure that you have disabled the antivirus/firewall running on your system before installing and throughout this process.
linktowhy.blogspot.com
Two most effective techniques used here are "Brute-Force" and "Cryptanalysis".

Brute-Force:- As this techniques takes more time to complete, the attacker prefer this technique only when there is a hope that the password contain same type of characters or may be two. i.e only loweralpha, only alpha, only numeric or may be loweralpha-numeric, also it should contain less than 7 characters. Otherwise it takes more time to crack password, which may be the mixture of all types of characters along with special symbols.
The step-by-step explaination for this technique is given below-
linktowhy.blogspot.com
1) Open the tool "Cain and Abel"  



2) Go into the category "Cracker"     it displays all sub-categories under "Cracker" in left panel.linktowhy.blogspot.com


3) Select "LM & NTLM Hashes" from left panel and then click on     symbol, you will be greeted by a window as shown.linktowhy.blogspot.com


4) Check "import hashes from local system" and then click "Next". This shows all the active accounts on local system like administrator, guest, etc. along with LM and NT hashed values of their respective passwords, as shown below.


5) Right clicking on any username shows all available options using which we can crack it's password.


6) Here we select "Brute-Force Attack" and then "NTLM Hashes", since windows uses NTLM hashes to store local users' passwords.linktowhy.blogspot.com

7) You will be greeted by a window where you can modify properties for brute-force attack such as password length, character set, etc.


8) Click on "Start" button.

9) On completion it will reveal the exact password.

linktowhy.blogspot.com




How to be Done in Network Hacking


Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.linktowhy.blogspot.com
It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools.
linktowhy.blogspot.com
Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)-- linktowhy.blogspot.com
c:/>ping hostname.com

example:- c:/>ping www.google.comlinktowhy.blogspot.com


Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.
linktowhy.blogspot.com

Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc. linktowhy.blogspot.com
It's syntax is (at command prompt)--
c:/>netstat -n



Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--
c:/>telnet hostname.com
linktowhy.blogspot.com
By default telnet connects to port 23 of remote computer.
So, the complete syntax is-linktowhy.blogspot.com
c:/>telnet www.hostname.com port

example:- c:/>telnet www.yahoo.com 21 or c:/>telnet 192.168.0.5 21


Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination. linktowhy.blogspot.com
It's syntax is (at command prompt)--
c:/>tracert www.hostname.com
example:- c:/>tracert www.insecure.in
linktowhy.blogspot.com
linktowhy.blogspot.com

Here "*    *    *    Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.

various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.linktowhy.blogspot.com

The information obtained by using tracert command can be further used to find out exact operating system running on target systemlinktowhy.blogspot.com


Easily Install Sun Java on Ubuntu 10.04 in Single Step


Sun Java packages have been dropped from Ubuntu 10.04 LTS from the Multiverse section of Ubuntu archive. Ubuntu team is encouraging users to use OpenJDK instead of Sun JDK/JRE but still if you want to install Sun JDK on your Ubuntu then here is the solution for the same.linktowhy.blogspot.com

OpenJDK Appearing – No Sun Java in Synapticlinktowhy.blogspot.com


As per the release note of Ubuntu 10.04 LTS, Ubuntu users can have Sun Java by executing the following piece of code on the command line.
sudo add-apt-repository "deb http://archive.canonical.com/ lucid partner"
sudo apt-get update
sudo apt-get install sun-java6-jre sun-java6-plugin
sudo update-alternatives --config java
This will install sun-java6 packages from Canonical Partner Repository. Enjoy Sun Java on Ubunu 10.04 Lucid.linktowhy.blogspot.com
The information is provided in the Ubuntu 10.04 LTS Lucid release note. You can read the details about Sun Java installation in Ubuntu and other details as well.

Why to Change the Virtual Machine Boot Device in Virtual Computer



banner3
If you’re trying to install an OS or are testing out boot disks, you might be wondering how to change the boot device. Here’s the quick and easy technique to change it.linktowhy.blogspot.com
What we’re going to do is go into the virtual machine’s BIOS and tweak it there.

Tweaking the Boot Devicelinktowhy.blogspot.com

First, click on the Ctl+Alt+Del button in your virtual machine so it can reboot.linktowhy.blogspot.com

When the POS comes up (as shown in the image below), you should press the Esc key until you bet into the BIOS menu.linktowhy.blogspot.com

Once in the BIOS menu, navigate using your left and right arrow keys until you get to the Boot menu.

Press Enter on Boot Device Priority and you will see a menu to select your primary booting device.

Use your + and – keys to select your primary boot device. Assuming you will use a CD, DVD or ISO file, you should select your CDROM device as 1st Boot Device.linktowhy.blogspot.com
Then press F10 to save and exit and you will see a screen like this:linktowhy.blogspot.com

After you confirm your changes, your virtual machine will boot and you will be able to begin your installation.linktowhy.blogspot.com

Getting Inspiration from a Junk Sister and a vintage tin




Our girl Cassie did such a beautiful job re-vamping her craft room...
(Seriously!! scroll down if you haven't seen it!)
She carved out a great space for herself,
she did it her way!
...and we all know that there will be lots of

cottage-y, funky, fabulous-ness coming out of there in no time!
BRAVO.

It got me to open my eyes & take a good look at my creative space...
(and, at this stage, I use the term "creative" very loosely)
My space is the one I tend to shut the door on...OFTEN.

Life as a junk girl is not always pretty!!
But, I am going to follow Cassie's lead..and bare. my. soul.

I am cringing! Welcome to the "armpit" of my house:




It has no windows, and it's kind of dark.
The green was picked out by a little girl I used to know
(she is 17 now)...and I am just not lovin it.

I wonder why I feel claustrophobic in there!?!
Between the twin bed, all my junk/stuff/treasures,
and the hodge-podge of furniture
trying to corral them,
the walls just start to close in on a girl.



It is a very UN-INSPIRING 9' x 14' junky mess. UGH.
Such a waste of a room.

There is no doubt that I need to re-think the way I am trying to store things:
One wall of floor to ceiling storage would probably make more sense
than this old dresser with a door on top.

Look at all of that wasted storage space on the upper part of the wall.


...and I don't even want to talk about this corner. Lots of purging to be done here.
Look at that crazy mix of furniture
..old desk, wire cubby, handmade wall unit, ...it's just not working for me,
actually, i think it is working against me!!
It's hard to stay focused in there, there is just too much going on.


Cassie...thanks for opening my eyes!
Your room has lots of room to breathe and think ...and create.

...and I want one too!


I've been thinking about what I need and what I want my room to be.
I need it to be functional with lots of easy to manage storage.
I want it to be fun & graphic....with a touch of junky goodness,
a sprinkling of industrial flavor...and a vibe that draws. me. in.

I found this old tin at a Flea Market



I L.O.V.E. the color story of this old tin.
(I am not fond of "gold" in my home furnishings, so
I'm going to call it a golden "caramel" with robins egg blue.)
To me, these are fresh & happy colors.
I love how they pop against the white flowers.
I love the unexpected masculine lion head, ...but overall, it's still pretty.
The tin is metal & industrial but the flowers soften it up...
I love the contrast.
I think this will be my inspiration for the room.


Time to roll up my sleeves & get busy.
First on the list: purging!
Second: a large rug to hide the yucky checkerboard floor of despair!

I'm just not feeling it like I was 20 years ago :l

A rug will make it cozier anyway.


Fresh White/off white walls will brighten it up..
Touches of robins egg blue...
Touches of caramel...

Some industrial junk to bring in a little masculine vibe
and some fabrics to add some girly comfort.

I have an idea for a large shelving unit
To get this accomplished, I want to "use what i got".
Well, what I got is a LOT of old doors...and I mean A LOT OF OLD DOORS!
If I mix them with some plumbing pipe, I may just be able to
get it done "on time & under budget" ;)

And a work table is in order, that is for sure.

I may add a touch of these, just for fun:
I love peacock feathers.


and a pinch of this:

cause I want to bring in only things I LOVE.
(....so that I will LOVE going in there!)

So, wish me luck.... I have a box of empty trash bags and I'm going in!
You will be the first to know when it is finished!

UNSHACKLE US! SB 1184: Rights for pregnant prisoners.


----------Legislative ALERT From the ACLU of Arizona------------


Every woman deserves safe and humane conditions in which to deliver her child.
And every child deserves safe delivery conditions that don’t risk his or her entry into this world.

But pregnant inmates—and their children—don’t always get those conditions. Pregnant inmates are sometimes shackled at the wrists and/or ankles while they give birth.  This practice is extremely dangerous to both mother and baby and can cause major problems during delivery. This practice is almost always unnecessary. This practice has been opposed by the American Medical Association, the American College of Obstetricians and Gynecologists, the American Correctional Association, the Federal Bureau of Prisons, and the U.S. Marshals Service. This practice has already been banned by a handful of other states.

Tomorrow morning at 9 AM, an Arizona Senate health committee will try to do something about the practice of shackling pregnant inmates. SB 1184 (prohibited restraints; pregnant prisoners) prohibits the use of restraints on pregnant inmates while they are being transported to a medical facility to deliver their baby, during labor and delivery, and during postpartum recovery. The bill is sensible and reasonable, and even includes a safety exception to allow for the limited use of restraints if it is absolutely necessary for the safety of medical and corrections personnel. The bill also has significant bipartisan support. Most importantly, SB 1184 goes a long way to ensuring safe conditions for mother and baby in a population that is all too often overlooked.

Tell Arizona’s legislators that you support the safety and well-being of all children and their mothers. Tell Arizona’s legislators that they can do the same by voting “YES” on SB 1184. There are two ways to do so.

If you have an account with the Legislature's request-to-speak system, log in and register your support. You can reach the log-in page by following this link: http://alistrack.azleg.gov/rts/login.asp

Contact the members of the Senate Public Safety and Human Services Committee and ask them to vote “YES” on SB 1184. Here is the contact information for members of the committee:

Linda Gray (**committee chair and sponsor of the bill**)—email: lgray@azleg.gov; phone: 602-926-3376
Adam Driggs (vice-chair)—email: adriggs@azleg.gov; phone: 602-926-3016
Nancy Barto—email: nbarto@azleg.gov; phone: 602-926-5766
Rich Crandall—email: rcrandall@azleg.gov; phone: 602-926-3020
Leah Landrum Taylor—email: llandrum@azleg.gov; phone: 602-926-3830
Linda Lopez—email: llopez@azleg.gov; phone: 602-926-4089

In liberty,

Anjali Abraham
Public Policy Director

Flipper takes Florida.

It looks like Flipper is laying a smack down on Newt as I write this post. He is up by over twenty points. Congrats Flipper, I guess practice makes perfect. This could get ugly. Whatever happened to all those Tea Party folks? Flipper and his people out spent Newt big time. I can't wait for Newt's concession speech to his troops.

Flipper went negative on Newt and has vowed to crush him. (92 percent of the ads have been negative!) It seemed like only yesterday that Newt was saying that the negative stuff in the republican primary was all the media's fault and he was running a positive campaign. Well Newt, that ain't the media slamming you with all those negative ads in Gator country. You might want to check your fellow republicans to see where the heat is coming from.

Still, the truth of the matter is this, none these candidates are very appealing to their base. (Sarah, where are you?)

“That’s the great mystery of 2012,” a senior Republican journalist told me while watching the brouhaha in Florida. “We have the weakest incumbent president in 32 years, running on the weakest record in 32 years… and who’s taking the stage in South Carolina and Florida? It has to be the weakest field I can remember. Each of these candidates has in his character, in his history, in his idea set—never mind disqualifying—a guarantee for self-destruction. If Newt is the candidate, he’ll lose badly. If Mitt is the candidate, he’ll lose slightly less badly … So what you have is an almost complete guarantee that if these are the candidates, Barack Obama will be reelected.” [Source] 

Relax Mr. GOP; it's still going to be a very close election this November. No matter who represents the republican gang, the members of the gang will still vote for the person with the R by their name. You just have to hope that they come out. Besides, a little fighting among yourselves is good. It will get your guy battle tested for the war that's sure to come in November. Hillary and O beat up on each other pretty good, and O was a better candidate in the general because of it. Although this Flipper guy....I don't know.

"I think Romney will be the nominee,” a veteran Democratic campaign observer told me about the feud with Gingrich. “But he has unplumbed weaknesses. He’s such a terrible candidate. When’s he’s competent, he’s memorizing the talking points and delivering them with a mechanical energy. There’s no mind at work, no evidence that he understands how to do this. You don’t see a brain working, do you?”

Yes, but who needs a brain when you have money?

ASPC-Florence Death in Custody: Karot Phothong, 37.

Condolences to this man's family. Please contact the ACLU of Arizona about your loved one's death; they are filing a class action suit against the state for medical and psychiatric neglect of prisoners. One big concern has been the doubling of the suicide rate under the current administration. Violence has skyrocketed as well. 

Feel free to contact me anytime if you wish to organize with other families who have had similar experiences with the Arizona Department of Corrections, or if you wish to share more of Karot's story. 

Finally, suicide can be a devastating thing to survive, whatever the circumstances surrounding it. You might want to check out Survivors of Suicide, Tucson  for support coping with your loss. For more information about them, contact the executive director, Tyler Woods at 520-861-663.

Take care,

Peggy Plews 
(arizonaprisonwatch@gmail.com / 480-580-6807).


Karot Phothong 

 -----------------------------
ARIZONA DEPARTMENT OF CORRECTIONS
1601 W. JEFFERSON 
PHOENIX, ARIZONA 85007 
(602) 542-3133
www.azcorrections.gov

JANICE K. BREWER, GOVERNOR                  CHARLES L. RYAN, DIRECTOR
 
NEWS RELEASE 

For more information contact: Bill Lamoreaux
blamorea@azcorrections.gov

January 31, 2012

Inmate Death Notification

Florence, Az. – Inmate Karot Phothong, 37, ADC #98842, was found unresponsive in his housing unit Saturday. He was pronounced dead from a possible suicide after medical responders attempted life saving measures.

Phothong, sentenced out of Pima County, was serving 12 years for aggravated assault. He came to ADC Sept. 9, 2005 and was held at the Central Unit, ASPC-Florence.

The death is under investigation by the department.


-----------------


Stolen Art Watch, Latin Pink Panthers, Diamonds Are Forever...Being Targeted Worldwide



Underworld jewel thieves behind one of largest heists in Palm Beach County last year

http://www.tcpalm.com/news/2012/jan/30/underworld-jewel-thieves-behind-one-of-largest/

A quiet Saturday night. A dark sports utility vehicle eases into the parking lot of a Jupiter private school. The crew goes to work, unscrewing the bulbs of the motion-sensor floodlights and cutting a hole in the school's chain-link fence. They slice the phone and cable lines on a nearby pole.

The target is on the other side: Provident Jewelry store. Whether the crew knows it or not, they are about to pull off one of the largest jewel heists in South Florida history.

They pry open the rear door of an empty suite two doors down from the store. They bust through the drywall to get to the middle suite. Then they force their way into the attic, cutting alarm wires and breaking through the jewelry store's ceiling.

Awaiting them is a Class 2 vault, at least 10 inches of reinforced concrete that even under laboratory conditions takes at least an hour to bust through with high-tech tools and torches.

The crew has time. When store employees come to work Monday, there's a hole in the vault. Roughly 1,600 pieces of jewelry and watches are missing. Retail value: $15 million.

In the concrete rubble, there's a nearly empty bottle of cheap wine.

The burglars may have been celebrating early.

Theft groups target jewelers

Jewel heists are a staple of cinema — intricately planned crimes performed with panache by debonair types like Cary Grant and George Clooney. That glamorized world of gentlemen thieves doesn't exist, but organized jewel-theft rings in South Florida are a reality.

State authorities believe that one group of Cuban immigrants pulled off more than 20 jewelry store and pawn shop burglaries in 18 months. They specialized in rooftop jobs, busting through the ceiling.

Then there are Colombian gangs that rob traveling jewelry salesmen, sometimes spending days shadowing their targets. Other brazen groups use distraction techniques, with up to 10 people at once going into the store during business hours.

When it comes to unloading stolen jewelry, Miami is one of the most popular cities in the country to fence the hot goods, according to the multi-agency South American Theft Group Task Force, based out of the FBI's South Florida office.

Within a matter of hours after jewels are stolen, the thieves often meet with fences, according to task force members. Diamonds can be untraceable once they are popped out of their settings. Gold can be melted.

The recovery of stolen jewelry is extremely unlikely. Steve Wexler, the president of Wexler Insurance Agency, one of the largest jewelers' insurance agencies in the country, said it has been his experience that the recovery rate is less than 1 percent.

Hot diamonds end up in the stream of commerce and can even find their way back to retail stores, Wexler said. It is estimated fences typically pay thieves about 25 percent of the wholesale price of the stolen jewelry, he said.

"Where the money is going depends on the individual involved," said Dave Carrazana, an Aventura police officer part of the task force. "Some look into the future and some live for today. A lot will spend their money foolishly. Others have sent money back to Colombia and established businesses in Colombia to realize legalized profits."Carrazana said he believes there are more than 1,000 members of such organized theft groups operating in the United States. Members often learn the crime trade from their family members, starting off with shoplifting before graduating into stealing jewels, he said.

Tip leads to "El Loco"

The thieves who broke into Provident Jewelry on the weekend of Jan. 22, 2011, were pros. They used a combination of a jackhammer-style tool and a high-temperature cutting torch to penetrate the vault.

They disabled all 16 cameras as well as the surveillance system's digital video recorders. The two main circuit boards for the alarm system were found in a garbage bag.

Jupiter police got their first break in the case about three weeks later when one of the missing 100 loose stones ended up at the Gemological Institute of America in New York City to be examined. That led investigators to a Miami pawn shop where the loose diamonds were being sold.

Then came a tip from someone described in court records as simply "a confidential street source." The source said Pedro Luis Enriquez, aka "El Loco," played a role in the burglary. Enriquez, 40, had been languishing in theMiami-Dade CountyJail since Jan. 27, 2011, on outstanding warrants unrelated to the heist.

Jupiter police learned the Hialeah man had at least 25 prior arrests, including a handful for burglary and theft.

Investigators went to theMiami-Dade CountyJail to look at the property on Enriquez when he was arrested. They found a solid piece of evidence — a $8,000 bracelet from Provident, court records show.

A review of Enriquez's phone calls from the jail revealed that he had talked about winning the lottery and having people take care of watches and diamonds. Court records show his cellphone records also were pulled for the weekend of the heist.

At 2:38 a.m. that Sunday, Enriquez sent a text message to a friend: BINGO.

A day later, he sent another text message: SUPER BINGOOOOO.

Active investigation

Jupiter police Detective Eric Frank believes at least three people participated in the heist, but only Enriquez has been charged in the case. Enriquez is now in the Palm Beach County Jail on $600,000 bond, awaiting trial after pleading not guilty to grand theft and smash-and-grab burglary charges.

"It's still very much an active investigation and we're still hunting for the other players," Frank said. Enriquez did not come up as a primary player in known theft groups, he said.

State authorities announced in June they had busted up a high-end burglary ring responsible for breaking into 20 jewelry stores and pawn shops, netting more than $6 million in merchandise. The group, composed of at least nine Cuban immigrants, lived in Broward and Miami-Dade counties, but would travel as far as Connecticut to pull off burglaries from December 2008 to July 2010, court records show.

The group operated in crews of four to seven people, typically entering through the roof, disabling security systems and burning holes through safes, according to investigators. While they took jewelry and watches, they would not steal guns.

While they were sophisticated enough to make off with about $1 million in merchandise from jewelry stores in Davie and Greensboro, N.C., there were miscues, according to court documents. In the Greensboro burglary, one of the crew members left his cellphone behind, leading authorities to track the phone's path as well as who he called.

Eight of the alleged ring members are in custody, awaiting trial in Clay County for the burglaries. A ninth is a fugitive.Crews younger, more violent

Robert Taylor, founder of the nonprofit South American Theft Group Intelligence Network, said he firmly believes that theft crews are on the rise. Using multiple passports, group members can slide across the borders easily, said Taylor, whose groups acts as a clearinghouse for law enforcement.

Most of the crews are from Colombia with some from Peru or Ecuador, said Lou Mitchell, the FBI supervisory special agent overseeing the South American Theft Group Task Force formed nine years ago. Task force members talked to the Sun Sentinel in general about the groups, but declined to discuss specific cases.

"They commit crimes all over the country," Mitchell said. "When they first started in the United States, there was more of an art on how take property. A lot of times the victims wouldn't know [their jewels were missing] until they went back to their hotel room or left a restaurant. Crews now are younger, more impatient and willing to use violence."

The groups are sophisticated: they deploy lookouts, counter surveillance and multiple cars on a job. They will follow a traveling salesman across state lines on a stakeout, waiting for the moment to pounce.

"They are willing to surveil people for days and watch how police officers patrol a plaza and what kind of unmarked vehicles they may be driving," said Carrazana, the Aventura officer who is part of the task force.

In less than two months in the spring of 2008, there were three robberies targeting jewelry salesmen in Broward County. One thief chased a dealer with a knife at a Miramar gas station. In a Pembroke Pines parking lot, men with guns smashed out a New York diamond dealer's car windows and took $500,000 in jewels.

No fixed dollar amounts have been placed on how much in jewelry is stolen by such organized groups every year, but it is likely to be in the tens of millions, Taylor said.

Pursuit for stolen jewels continues

Rob Samuels, president of Provident Jewelry, said that one year later, the store at 828 W. Indiantown Road has recovered nicely. Gross sales in 2011 actually were up 20 percent despite the store being closed for six weeks, he said.

While insurance covered the losses, employees still monitor the Internet to see if stolen items crop up. Two watches being sold by a South Florida business were recovered and an employee recently found a third one being advertised.

"We're still looking and every time we find something we are hopeful that the trail goes backward and gets more perpetrators and leads to more recovery," he said.

Enriquez isn't talking. After his April arrest, investigators tried to question him about the burglary, according to court records.

He smiled slightly when he was told about the evidence against him. He then said he wanted to talk to his lawyer.

Spiderwebs in Pakistani trees after 2010 floods





An unexpected side-effect of the flooding in parts of Pakistan has been that millions of spiders climbed up into the trees to escape the rising flood waters.



Live Blogging/Discussion: Exit Polls And Results For GOP Florida Primary 1/31/12

By Susan Duclos

(Starting the morning of 1/31/12, this post will be bumped to the top for the full day)Updates throughout the day will be added to the bottom of the post.

[Update- RACE CALLED] Romney, Gingrich, Santorum and Paul, respectively. More on the exact totals tomorrow.

Once again we will be joining with Right Pundits, with live blogging and discussion as we watch entrance and exit polls and keep track of the results of the Tuesday, January 31, 2012 GOP Florida primaries. The polls in Florida open at 7am ET and close at 7pm EST.

Join us!



Eligibility: Only registered Republicans may participate in the Florida primary. Florida has 99 delegates but the Republican party has previous announced only half will count, as was the case in South Carolina, due to the states moving up their primary schedule and holding them before February 2012.

[Update- 1/31/12] Heading into the morning of the Florida primary, between submitted absentee ballots and early voting, over 600,000 votes have already been cast and Mitt Romney holds the lead over Newt Gingrich by 51% to 33%, according to CNN.

[Update- 1/31/12] While polling, except outliers, has Romney ahead of Gingrich, the Florida Tea Party Patriots conducted a straw poll which put Newt Gingrich and Rick Santorum way ahead of Mitt Romney and Ron Paul.

Question: If the election were held today, who would you vote for?

Newt Gingrich 35%

Rick Santorum 31%

Mitt Romney 18%

Ron Paul 11%

Undecided/None of the Above 5%

(Results are rounded to nearest percentage point.)

When asked about enthusiasm, both Gingrich and Santorum received 35% saying they would be extremely enthusiastic about a Gingrich or Santorum nomination. Romney came in at 21% and Paul at 11%. (H/T DC)

[Update- 1/31/12] Via ABC News, Jonathan Karl asked Newt Gingrich how much longer he thought the battle for the Republican nomination would go on and Gingrich said six to eight more months "unless Romney drops out earlier."

More:

When I asked what he says to those who say the race will effectively be over if he loses big in Florida, Gingrich said, “You mean those who said I was dead in June? Those who said I was dead in December? They are about as accurate as they were the last two times they were wrong.”


[Update- 1/13/12] Analysis from Campaign Media Analysis Group shows that the Florida primary has seen "the most negative campaign ever," with 92% of the ads airing in Florida over the past week listed as negative.

Newt Gingrich's campaign ran 1,012 spots, 95% were negative. Mitt Romney's campaign ran 3,276 ads and 99% were negative.

[Update- 1/31/12] CBS News reports on early exit poll data show 2/3 said the debates mattered and 37 percent said Mitt Romney said Mitt Romney ran the most unfair campaign with 34 percent pointing to Newt Gingrich.

27 percent said they decided on which candidate to vote for in the last few days and 42 percent said they decided before that.

Half the early voters backed Romeny. The economy was cited by 62 percent as the most important issue. Federal budget deficit was cited by 24 percent.

57 percent were happy with the candidates on the ballot and 39 percent were not.

NEXT state the candidates will be heading to will be February 4, 2012, the Nevada caucuses.

Full GOP primary/caucus schedule HERE.

.

Catholic Churches And Bishop of Marquette Punch Back At Obama's War On Religion

By Susan Duclos

Just another reason why Barack Obama must be defeated in 2012.

Below is an example of a letter that Catholics across the country were read in Church, written by the Bishop of Marquette, via Business Insider:

Dear Brothers and Sisters in Christ:

I write to you concerning an alarming and serious matter that negatively impacts the Church in the United States directly, and that strikes at the fundamental right to religious liberty for all citizens of any faith. The federal government, which claims to be "of, by, and for the people," has just been dealt a heavy blow to almost a quarter of those people -- the Catholic population -- and to the millions more who are served by the Catholic faithful.

The U.S. Department of Health and Human Services announced last week that almost all employers, including Catholic employers, will be forced to offer their employees' health coverage that includes sterilization, abortion-inducing drugs, and contraception. Almost all health insurers will be forced to include those "services" in the health policies they write. And almost all individuals will be forced to buy that coverage as a part of their policies.

In so ruling, the Obama Administration has cast aside the First Amendment to the Constitution of the United States, denying to Catholics our Nation's first and most fundamental freedom, that of religious liberty. And as a result, unless the rule is overturned, we Catholics will be compelled to either violate our consciences, or to drop health coverage for our employees (and suffer the penalties for doing so). The Obama Administration's sole concession was to give our institutions one year to comply.

We cannot--we will not--comply with this unjust law. People of faith cannot be made second class citizens. We are already joined by our brothers and sisters of all faiths and many others of good will in this important effort to regain our religious freedom. Our parents and grandparents did not come to these shores to help build America's cities and towns, its infrastructure and institutions, its enterprise and culture, only to have their posterity stripped of their God given rights. In generations past, the Church has always been able to count on the faithful to stand up and protect her sacred rights and duties. I hope and trust she can count on this generation of Catholics to do the same. Our children and grandchildren deserve nothing less.

And therefore, I would ask of you two things. First, as a community of faith we must commit ourselves to prayer and fasting that wisdom and justice may prevail, and religious liberty may be restored. Without God, we can do nothing; with God, nothing is impossible. Second, I would also recommend visiting www.usccb.org/conscience, to learn more about this severe assault on religious liberty, and how to contact Congress in support of legislation that would reverse the Obama Administration's decision.

Sincerely yours in Christ,

+Alexander K. Sample
Most Reverend Alexander K. Sample
Bishop of Marquette



Professor Bainbridge gets right to the heart of the issue:

The Catholic Church believes--as an article of faith--that both the Church as an institution and its members as individuals have a religious duty to tend to everyone, not just fellow Catholics. Indeed, the whole point of the Parable of the Good Samaritan is that there is a moral obligation to help those in need without regard to who they are. In response to this teaching, Catholics have run social services like hospitals since the earliest days of the Church's history:

Another characteristic of Christian charity was the obligation and practice of hospitality (Romans 12:13; Hebrews 13:2; 1 Peter 4:9; 3 John). The bishop in particular must be "given to hospitality" (1 Timothy 3:2). The Christian, therefore, in going from place to place, was welcomed in the houses of the brethren; but like hospitality was extended to the pagan visitoras well. Clement of Rome praises the Corinthians for their hospitality (Ep. ad. Cor., c. i) and Dionysius of Corinth for the same reason gives credit to the Romans (Eusebius, Church History IV.23). The bishop's house above all others was open to the traveller who not only found food and shelter there but was provided in case of need with the means to continue his journey. In some cases the bishop was also a physician so that medical attention was provided for those of his guests who needed it (Harnack, "Medicinisches aus d. ältestenKirchengesch." in "Texte u. Untersuchungen" VIII, Leipzig, 1892). The sick were also cared for in the valetudinaria of the wealthier Christians who in the spirit of charity extended hospitality to those who could not be accommodated in the bishop's house. There was thus from the earliest times a well organized system of providing for the various forms of suffering; but it was necessarily limited and dependent on private endeavour so long as the Christians were under the ban of a hostile State. Until persecution ceased, an institution of a public character such as our modern hospital was out of the question. it is certain that after the conversion of Constantine, the Christians profited by their larger liberty to provide for the sick by means of hospitals. But various motives and causes have been assigned to explain the development from private care of the sick to the institutional work of the hospital (Uhlhorn, I, 317 sq.). It was not, at any rate, due to a slackening of charity as has been asserted (Moreau-Christophe, "Du problème de la misère", II, 236; III, 527), but rather to the rapid increase in the number of Christians and to the spread of poverty under new economic conditions. To meet these demands, a different kind of organization was required, and this, in conformity with the prevalent tendency to give all work for the common weal an institutional character, led to the organization and founding of hospitals.

To force Catholics to differentiate between "a hospital or a school or an adoption agency" and "a church" is thus to deny us the right to practice our religion as we see fit.



Liberals complain they want religion out of politics but politicians like Barack Obama and his administration continue this war on religion and it is time the Church fought back.

LifeNews reports that at least three Catholic bishops have refused to comply with the Obama administration's mandate and 86 bishops who have spoken out against the Obama/HHS mandate publicly.

More on that:

.......According to Thomas Peters of CatholicVote.org here are some of the bishops have are opposed to the mandate and have urged their parishoners to contact Congress and the Obama administration to oppose it.

Also, an expected lawsuit against the mandate could find itself moving all the way up to the Supreme Court which, as the Los Angeles Times notes, “recently affirmed — in a 9-0 ruling — that the 1st Amendment gives special leeway to religious employers.”



This is a direct, full frontal assault on religion and I repeat... Barack Obama must be defeated in November 2012.

.

Nevada Caucus Alert For Newt Supporters

By Susan Duclos

While Florida primary voters are going to the polls today and will over 600,000 early votes and absentee votes already submitted, the Gingrich campaign is keeping in mind that the Nevada caucuses are this coming Saturday, February 4, 2012 and have sent out a Caucus Action Alert.

(Join us for live blogging/discussion on exit polls and results from the Florida primary with all day updates, HERE.)

They are offering a link for anyone interested in attending the caucus in support of Newt Gingrich at http://www.newt.org/nevada-caucus and additional information:

•Arrive half an hour before the Caucus begins.

•Bring Photo ID with you to register.

•If in Clark County, you may pre-register here: https://2012nvgopcaucus.com and take your pre-registration form with you to the Caucus. (You will still need photo ID at the Caucus site)

•Mingle and talk with people beforehand and talk about your support for Newt and ask them to vote for him.

•Identify the Caucus Site Manager and introduce yourself as a designated speaker on Newt Gingrich’s behalf.

•Use the speech provided at the caucus

•Anyone who would like to is allowed to monitor the vote count. Please do so to make sure that all votes are correctly counted and reported.

More HERE.

Full GOP primary/caucus schedule HERE.

.

Gingrich Takes The Tea Party Patriots Florida Straw Poll

By Susan Duclos

Following a tele-conference call with 6,000 nearly Tea Party activists participating, 600 of them also participated in the Florida Tea Party Patriots straw poll.

Question: If the election were held today, who would you vote for?

Newt Gingrich 35%

Rick Santorum 31%

Mitt Romney 18%

Ron Paul 11%

Undecided/None of the Above 5%

(Results are rounded to nearest percentage point.)

When asked about enthusiasm, both Gingrich and Santorum received 35% saying they would be extremely enthusiastic about a Gingrich or Santorum nomination. Romney came in at 21% and Paul at 11%. (H/T DC)

Note- This and other Florida primary day news is also being added to the live blogging/discussion of the Florida primary exit polls and results, as updates.

With Romney having outspent Gingrich and the other candidates by over 5 to 1 in Florida, mostly on negative television ads, and over 600,000 early votes and absentee votes submitted where Romney holds a large lead, this straw poll is simply another factor added in to the Florida primary day news.

.

Church Potluck Recipe: Dove Love Cookies






Valentine’s Day is fast approaching and anyone would appreciate these sweet little cookies.




“Dove” Love Cookies


Ingredients:

1 cup unsalted butter
1 cup brown sugar
1/2 cup granulated sugar
2 eggs
1 tsp. vanilla
1 cup natural peanut butter
2 tsp baking soda
1/2 tsp. salt
1 cup flour
1 1/2 cup pastry wheat flour
1/2 cup ground golden flax seed
1 package Dove heart shaped chocolate pieces


Directions:

Step 1: Pre-heat oven to 350 degrees. Cream softened butter and sugars together. Add eggs and vanilla, mix well.

Step 2: Add peanut butter to butter mixture and mix well.

Step 3: Add pastry wheat flour, flax and all purpose flour, salt and baking soda and slowly mix until all combined.

Step 4: Using a cookie scoop put cookie dough 2 inches a part or 12 balls to a cookie sheet. Pat the center of each ball down with the back of the scooper, sprinkle with sugar if you’d like and bake for about 11 min. at 350 degrees.

Step 5: While cookies are baking un-wrap the chocolate. When the cookies are done immediately put chocolate hearts in the middle of each cookie and gently press down. Cool on cookie sheet 5-10 min. then transfer to a cooling rack. Be careful to let the chocolate hearts harden before storing cookies otherwise the chocolate will get smeared.





WATCHER OF THE SKIES: Red kites, wildlife crime, spring is coming

As regular CFZ-watchers will know, for some time, Corinna has been doing a column for Animals & Men and a regular segment on On The Track... about out of place birds, rare vagrants, and basically all things feathery and fortean.

Because we live in strange times, there are more and more bird stories that come her way, so she has now moved onto the main CFZ bloggo with a new column with the same name as her aforementioned ones...


Irish red kite report for 2011
Red kites are once again a familiar sight in the skies along parts of the east coast of Ireland, thanks to the Irish Red Kite Reintroduction Project, which has brought these birds back after an absence of 200 years. Some 120 red kite chicks were collected from nests in Wales to be reared and released in County Wicklow between 2007 and 2011 by the Golden Eagle Trust, National Parks and Wildlife Services, and the Welsh Kite Trust. Damian Clarke, NPWS ranger, recorded the first ‘Irish born’ kites in Wicklow in 2010, since when there were 14 breeding pairs in the county, producing a minimum of 17 young.

In 2011 39 were released and later in the year 8 were dead kites were recovered, of which four contained the second generation rat poison, brodifacoum. Dietary analysis of the kites, both in Wicklow and Dublin, has shown that they are hunting and scavenging rats, which puts them at risk from secondary poisoning from rodenticides. Dr. Ruddock further said, "We recognise the requirement for rodent control in terms of human health and food safety, but urge amateur and professional users alike to ensure that rodent control is carefully planned to reduce the risk to non-target wildlife".

John Lusby, Raptor Conservation Officer with BirdWatch Ireland, noted "the efforts of the Golden Eagle Trust to restore our Red Kite population have been phenomenal. These deaths however highlight an area of serious concern; recent research has also shown that other species such as Barn owls, Kestrels and Long-eared owls are at significant risk".

"The problem occurs when these raptors capture live rodents which have ingested poison. The compounds used in certain Rat poisons nowadays are extremely toxic and accumulate within a bird which has fed on a poisoned rodent. There are some clear steps we can take to try and reduce the threat of secondary poisoning to our raptor populations, such as amending current regulations in Ireland and increasing awareness of best practise rodent control, and we hope to work alongside the Trust and relevant Government bodies in 2012 to attempt to address these issues".

In addition to the problems posed to Red Kites and other wildlife through the legal use of Rat poisons, two other (untagged) Red Kites were confirmed to have been illegally poisoned by Alphachloralose in Wicklow last autumn. Dr. Ruddock continued, "It remains clear there are still serious issues which require further attention and action to protect our Irish raptors".
http://www.wildlifeextra.com/go/news/ireland-kites011.html#cr

Unseasonal mild weather lures birdlife away from towns and cities
Bird spotters in the suburbs have been concerned to notice the absence of familiar birds such as blue tits, greenfinches, chaffinches and house sparrows from their town and city gardens. They have inundated the RSPB by letter and email of their concerns.











Nik Shelton, an RSPB official, said: "We have been inundated with letters over the past few weeks from homeowners who have got used to seeing house birds in their gardens over our recent harsh winters but who are perplexed by their absence this year."

He added: "House birds like the blue tit or the chaffinch eat seeds or insects, which are easy to find in the countryside when the weather is mild, as it has been for this winter so far. When the conditions get tough, when the ground becomes hard and frosty, it is difficult to get at insects or pick up seeds. Food becomes scarce, so the birds head into towns and cities in search of sustenance. That is what happened last year and the year before when we had very hard winters. But not this year. Our blue tits and chaffinches are perfectly happy in the countryside at the moment."

Find out more about how the mild weather conditions have confused our native birds: http://www.guardian.co.uk/environment/2012/jan/22/birds-gardens-rspb-winter

Isle of Wight – protected bird shot – man charged
John Winn Roberts (43) of Strabane in Northern Ireland was due to appear in court after allegedly shooting a buzzard in Newport on the Isle of Wight, on 26th November last year. Police arrested him on the same day and are grateful for the support and assistance of the RSPCA's Isle of Wight Inspector Mark Buggie, and the management of aggregates / construction material supply business Bardon Vectis, which runs the quarry where the alleged offence took place.

The buzzard is fully protected under the Wildlife and Countryside Act 1981, which makes it an offence to kill, injure or take a buzzard, or to take, damage or destroy an active nest or its contents.

More at: http://www.iwradio.co.uk/news/iw-radio-news/man-charged-with-shooting-protected-bird-3362/

Spring is coming – help birds find their ideal home
Small, one bedroomed apartment. Available immediately. Lovely views. In need of some improvements. North/east facing. No immediate neighbours. Quiet area.
To a bird searching out its nesting requirements the above could well be a sought after commodity. It is the time of year that birds are beginning to do some early checking on prospective nesting sites to put their claim on a patch. If they like what they see, they will tap around the holes and inside the nest box as a visual and audible sign to others that the box is taken. They are then most likely to disappear to prepare themselves for the coming breeding season, although their disappearance to us humans may lead some of us to assume it is because the entrance may be too small, or some such thing. The RSPB says many birds will be organising themselves into a spot of spring cleaning by tidying up last year’s boxes and getting rid of debris left from the previous occupation.

It is time for anyone who has a nesting box to put it up while the birds are “still browsing”. “It is important to site them correctly, though; a nest box in the wrong place could mean birds suffer harshly in the heat,” explained Val Osborne, RSPB wildlife adviser.

“Unless there are trees or buildings which shade the box during the day, they need to be facing between north and east to protect them from overheating in strong summer sunshine. It will also shelter them from wetter south westerly winds.”

Find out more by visiting: www.rspb.org.uk/advice
http://www.southportvisiter.co.uk/southport-news/southport-southport-news/2012/01/19/help-birds-to-find-a-nest-box-in-time-for-spring-101022-30148482/

Wildfowlers up in arms about ban on shooting
Bagging a bird for the cooking pot is an old country tradition followed by many a wildfowl shooter in Scotland, but after acquiring land on the Solway Firth coast, the RSPB Scotland has plans to ban such ‘sport’. In 2010 it bought a large area of saltmarsh and floodplain at the Crook of Baldoon on Wigtown Bay and are urging the local council to introduce bylaws to ban shooting along 75% of the coastline.

However, it is claimed by wildfowlers that “because a £200,000 grant from Scottish Natural Heritage went towards the cost of buying and developing the land, the charity is using “public money to take away public rights”.”

Events and training officer for the British Association for Shooting and Conservation (BASC) Scotland, Donald Muir, said: “We are working with wildfowling clubs around Wigtown Bay to ensure that one of the best wildfowling areas continues to be available to local and visiting shooters.

“When the RSPB bought the land with a £200,000 grant from SNH, they knew that wildfowling took place on the adjacent foreshore, that this was a public right and that it was an important source of income to local hotels and bed and breakfast businesses during the winter months.”
However it would appear that the local council, Dumfries and Galloway, is moving away from regulated wildfowling in favour of the RSPB’s “no shooting” option.

An RSPB spokesperson said the foreshore at Crook of Baldoon is a very small part of Wigtown Bay and there were already “extensive” shooting rights for wildfowlers elsewhere. The charity expected their plan would increase wildfowl numbers in the area.

The spokesperson added: “Whilst it is correct that the development of the nature reserve has been supported in part by SNH funding, we expect the significant financial investment in the proposed nature reserve at Crook of Baldoon to contribute over time to the local Galloway economy, as part of a wider network of wildlife attractions, which are already a major tourism draw to the area. The wildfowlers on Wigtown Bay have also created an area of wildlife habitat for which they received similar SNH grant aid.

“We take no issue with this use of public funding, which we accept as improving habitat conditions for local wildfowl populations, as we are also seeking to do at Crook of Baldoon.”
http://www.scotsman.com/lifestyle/heritage/people/shooters_up_in_arms_as_rspb_impose_ban_on_wildfowling_1_2070855