Sunday, 31 May 2009

If you didn't visit Clothes Show London on Friday you missed Katie Price's catwalk debut, Fearne Cotton on stage receiving the Best Dressed Woman Of The Year award at the first ever Clothes Show Style Awards and the opportunity to do LOADS of shopping.

Katie price [Jordan ] was also there

Nicky Hambleton-Jones was at the show all day and her video diary below gives you just a small taste of what's going on at the show. So come along to Clothes Show London at ExCeL this weekend - book in advance or simply buy your tickets when you arrive. For a full list of all the outfits from the catwalk visit the Fashion Theatre page.

Photos: Ayoub mzee


Date: Friday 5 JUNE2009Time: 7:00 pm – 1:00 amENTRANCE FEE: £20.00
Come enjoy African food,Fashion show, live music by theGALAXY band & much more!
call: Winnie – 07881 603 053Julie – 07939 599 754Irene – 07810 428 064


FOREIGN PRESS CENTER BRIEFING WITH Shawn Henry, Assistant Director, Cyber Division, FBI

TOPIC: Cybercrime: International Partnerships to Combat Threats


TUESDAY, MAY 26, 2009, 3:00 P.M. EDT

MODERATOR: Good afternoon and welcome to the Washington Foreign Press Center. This afternoon we have Shawn Henry. He’s the Assistant Director of the Cyber Division at the FBI, and he will discuss cybercrime and international partnerships to combat threats. He’ll take – he’ll make some – discuss it a little bit and then he’ll take questions. And at that time, I ask that you wait for the microphone and state your name and media organization. Thank you.

MR. HENRY: Good afternoon, glad to be here today. I’d like to talk to you about cyber threats, some of the things that we’re seeing here in the States, particularly from the FBI’s perspective, and then discuss some of the mitigation strategies that we’re currently engaged in both here in the U.S. as well as outside the United States with our foreign partners. I’d be happy to just start with some kind of brief discussion points and then take some questions that you’d like to provide.

Essentially, what we currently see is threats across all networks, both here in the United States and information that we get from our partners, is that it’s widespread around the world. From within the United States, there is – or against the United States, there are many attacks on a regular basis against many of our networks, a lot of attacks on our financial services sector. And we’ve identified groups operating from around the world that are engaged in targeting the financial sector for personal gain. We’ve seen attacks against – or attempts by groups that are sympathetic to the jihadi cause that are interested in having some type of an impact on our networks here similar to the type of impact they’d expect from a kinetic attack, so there are groups that are interested in looking to obtain the skill set necessary to allow them to infiltrate networks, to breach networks, and to take all that intelligence that’s contained within.

The networks are a target because of all of the information that they withhold on a regular basis. So information related to research and development, information related to commerce, information related to corporate strategies, political strategies, et cetera, make all the networks a viable target for these groups.

One of the things that we’ve seen a great increase in recently is attacks by organized groups that have met together online in a virtual environment. So these are groups of people that may never have met each other physically, but they gather collectively online. Many of them, oftentimes from different countries, each having a specific area of expertise. So if you were to consider in the physical world a group that was attacking jewelry stores, for example. You’ve got somebody who’s an expert on identifying where the best products are, the highest value products. You’ve got somebody who’s an expert in the alarm system. You’ve got somebody who understands how to defeat the safe. You’ve got somebody who might be the getaway driver. And you’ve got somebody, who once they steal the jewels, are able to sell them and collect the cash.

We see that same type of strategy being used by organized groups that are attacking our financial sector. So we’ve got people who are very good at crafting malware. You’ve got other members of the group that can distribute the malware around the network. You’ve got people who are collecting the personally identifiable information once the malware compromises a computer. And you’ve got others who are taking that personally identifiable information and being able to use it through different fraud schemes to convert that money to cash or that information to cash. And then you’ve got others who are taking the cash and redistributing the money back to the members of the group.

The attacks that we’ve seen, as they continue to increase, are becoming more sophisticated and more widespread. And some of the strategies that we’ve used to try to mitigate them are quite varied.

Primarily, we’ve got to prioritize on the attacks that we focus on. Because of how many there are, we’ve got to really prioritize on the most critical and just work collaboratively with our partners throughout the U.S. and abroad. We work very, very closely with the private sector. It’s critical that the private sector in the United States owns 85 percent of the infrastructure, and it’s really important for us to work in a situation where we can share information with them back and forth about the attacks that they see, the emerging threats, and that we can provide them with information about the new attack vectors that we’re identifying so that they can better protect themselves.

We have a tremendous effort abroad with foreign partners. We’re working with many, many nations in this effort. Probably four or five years ago, we had a very limited exchange of information with foreign partners. But the attacks that we see are global in nature. The internet has no geographic boundary. The impact is on all commerce, worldwide commerce, not necessarily just on the U.S., but on other financial institutions around the world, other economies around the world, retail sector around the world. And our partners are working very closely with us to help us to try and defeat some of these adversaries. So I mentioned that a lot of these groups are getting together online virtually, and oftentimes they’re in five or six different countries. So without that cooperative effort, our ability to try and mitigate that threat is somewhat limited.

One of the other things that we’re doing is really working proactively. So we’ve used undercover operations. We’ve used judicially authorized surveillance of the adversary to try to identify across these groups, both vertically and horizontally within these groups to try to identify the full breadth of the adversary. And that’s provided us with a good insight into some of these people are and allowed us to successfully arrest or apprehend, identify many of these subjects. So that’s been very, very valuable.

In the U.S., we have started the Comprehensive National Cybersecurity Initiative, which is a strategy that this current Administration has embraced. Just in terms of the recognition of the cyber threat and the need to actively engage against the cyber threat, there’s been a 60-day review that’s been ongoing over – looking at what the prior administration had done and looking to determine which parts of the CNCI, the Comprehensive National Cybersecurity Initiative, will go forward. That report will probably be made available publicly over the next few weeks. But the President is, or is going to be evaluating that report, and looking forward.

So the CNCI generally just looked at a number of different areas across the infrastructure where we could better shore up our defenses and how we could leverage capabilities across different agencies to better protect ourselves against the cyber adversary. So it’s quite a large strategic look at how to defend networks and to respond to these types of attacks and threats. And you’ll be hearing more of that coming out of the Administration, I would imagine sometime in the next few weeks.

So those are just a couple quick points. I’d be interested in any comments or questions that you might have that relate to the FBI cyber strategy or the cyber threat.

MODERATOR: We can take your questions now. Right here.

QUESTION: Thank you very much, sir. Ahu Ozyurt from CNN Turk and Milliyet. Can you give a little bit more detail about your partnerships abroad? And there are some criticisms in some countries that the tools you make available for your partners are used by some of the law enforcement agencies there against the oppositions by certain, you know, monitoring their emails, following their sort of chat forums and things like that. Can you elaborate what the limitations are and what you make available for your partners outside of the U.S.? Thank you.

MR. HENRY: Sure. So I’ll talk about one particular country, because there are certain countries that we have actually done a lot of work with and have had a very productive partnership. And because of ongoing operations, we’re not able to discuss all of the partnerships.

But one that’s been highly publicized over the last two years, which I will mention and use that as kind of an example for some of the things we’re doing elsewhere, is the work we’re doing in Romania. I visited Bucharest back in 2003 and met with a number of cabinet-level officials, ministers across the government, just to talk about the threat and the impact that I saw on the Romanian economy, the Romanian commerce, because many companies in the United States were shutting down contact with Romania because of all the attacks that they saw. So they were actually black holing, or preventing any communication with Romania, certain retailers were because of the attacks that they saw. The Romanian Government recognized the significance of the attacks and the need to partner. And we actually sent an agent over to work physically in the Romanian National Police headquarters, agents and analysts, to work fulltime, side-by-side, in Romanian National police space.

When our agents are deployed overseas to work with our partners, we’re there really as liaison officers. We don’t have law enforcement authority in those nations, so we work in coordination with the – with the host government’s law enforcement, and they use their authorities, but with – oftentimes with information that we provide to them about who a particular attacker is or where we see an attack coming from.

In terms of sharing tools, certainly anything -- technology that we would share with any foreign government, I would imagine that the host government law enforcement would use those tools under – under authorization of their local laws, their native laws. So we wouldn’t have – I mean, I certainly would not go in and interpret how somebody was using tools, but I would imagine that local law enforcement would use those tools. Likewise, if we were to get tools from another government, a partner agency, we would only be able to use it in accordance with all our laws or strategies.

MODERATOR: Next question right here.

QUESTION: This is Jennifer Lee from the China Press. I have a problem. Recently, many media said there are some more and more internet attacks on China. And could you please introduce some in details, such as what kinds of organization or individual come originally from China? And do we have some connection with China to deal with this problem together? Thank you.

MR. HENRY: So I think that certainly all governments should have an interest in protecting the internet – protecting computer networks. It’s the way we all communicate. That’s the way we do business. The business of the world is done on the internet, so I think all governments should have an interest in protecting the infrastructure.

Regarding attacks, I don’t know that it’s necessarily prudent to talk about specific countries and attacks, because the fact of the matter is we see attacks emanating from all over the world, including from right here in the United States. So many of the cases that we work start here in the United States, where somebody is launching an attack from here or using a computer that’s compromised here in the U.S.

When I talk to businesses, I always explain to them that what’s most important is to work on the network security, because it doesn’t really matter if it’s a particular country or if it’s an organized group or if it’s somebody associated with a terrorist organization. The fact of the matter is you’ve got to protect the property, the technology, the information that’s contained on that network. And it’s critical, because once it’s gone it doesn’t really matter who took it. The fact of the matter is anybody can actually get their hands on it once it’s left the network. So I think it’s really important to focus on the protection of the network rather than who a particular adversary might be.

MODERATOR: Next question in the front.

QUESTION: Hi. Alex Spillius, Daily Telegraph. Can I just clarify, is the FBI mainly concerned with protecting corporate and private financial world, rather than the U.S. Government? Which – how is – then how is the labor divided between you and the Pentagon? And also, could you describe any attacks on either private or government sections that have actually got close or worked or –

MR. HENRY: I’m sorry, the first part of your question?

QUESTION: Well, is – are you mainly working with – you said attacks on financial centers in your opening remarks. I mean, is that the government’s – the U.S. Government is under threat, or Wall Street firms?

MR. HENRY: Okay. So, there are attacks that we see on .gov, .mil, .com, covering the full spectrum. And we work with domestic partners and foreign partners in those areas to try to identify the source of the attack, and how do we respond to the attack.

The actual day-to-day security of networks is really the responsibility of the owner of the network. So – you ask about Wall Street. A company on Wall Street is responsible for defending themselves. Once they’ve been breached, we’ll work with them to help to identify. Just like everybody is responsible for securing their house, lock the doors at night, turn on the alarm, make sure your outside lights are on; if somebody breaks into your house, there will be a police response.

So the other part that I mentioned was that 85 percent of the infrastructure is owned in the United States by the private sector. So they’ve got a great responsibility for defense.

The Department of Homeland Security is also a big player in this. The Department of Homeland Security is responsible for consequence management. They’re responsible for identifying – we work very closely with them in identifying where threats are and how to respond to those types of threats. But our – our focus would be in threat mitigation, how do we identify who an adversary might be, and how do we – how do we link back to that particular adversary.

QUESTION: Have any attacks come very close to hitting their target or have done so recently? Are there any examples you can give?

MR. HENRY: Yes, there are. And no, I won’t.

There are attacks all the time. I mean, we see attacks all the time where there have been breaches. One of the things we try not to do is to identify victims, because we want to protect their – themselves, protect them from the impact that it might have if it’s known that they were breached, and it’s not always necessary for us. Periodically, we’ll discuss some of those attacks publicly, but not generally.

MODERATOR: Right over here.

QUESTION: I’m Elvira Palomo with EFE News Services. This is a general problem. I’d like to know if you have something, a special relationship with Spain and which kind of case are related from Spain and also in generally with Europe with partnerships.

MR. HENRY: So I had said that I really didn’t want to talk about individual countries because of some of the ongoing operations. And there are some countries that are – I’m sorry?

QUESTION: (Off-mike.)

MR. HENRY: So we worked – we’ve worked on every continent except probably Antarctica. We’ve worked on every continent with law enforcement agencies, on every continent except Antarctica, and we worked very, very closely. And the breadth of those relationships have only grown in the last couple of years. We actually have 60 countries that we have FBI agents deployed in right now around the world, 60 countries where they work full time as liaison officers with our partners. And those agents are responsible for responding to leads in ongoing investigations.

So for example, we do have a liaison officer, its public knowledge, in Spain, in Madrid, I believe. And we have our agents here who are working and responding to cyber investigations. If there is a connection to a Spanish case, we’ll contact our officers in Madrid who will work with the Spanish authorities to help us identify. I have agents who we’ve also deployed who were full-time cyber agents, working cyber who we’ve deployed overseas, and that’s all that they’re doing is working cyber matters. Those are the ones I don’t want to talk about because of some of the pending investigations that we have. But --

QUESTION: How many agents (inaudible)?

MR. HENRY: We’ve got probably about 700.

QUESTION: Are there enough?

MR. HENRY: We actually have increased and we’ll continue to increase going forward.

MODERATOR: Next question.

QUESTION: If you can, go ahead with the cyber terrorism. Say something more about the cyber terrorists, how do you – how many --

MR. HENRY: So we’ve seen groups that have interest in a couple of different areas. One area would be looking to – through fraud on the internet, looking to steal money to raise funds for their cause. And we’ve also seen groups that have an interest in trying to attack networks of infrastructure, computer networks that are part of the infrastructure to see that they can have the same type of impact on the economy, on society, as they might if they were to use a traditional kinetic attack.

So there are ongoing operations now. I can’t give you the number, but we’ve got ongoing operations now, several of which are, again, involved with foreign law enforcement around the world, looking at how do we mitigate those. We’ve identified certain subjects. How do we actually mitigate and stop those attacks before they occur; preventive, rather than reactive.

MODERATOR: Next question.

QUESTION: This might just be a follow-up, and I don’t know if you would like to answer it. But you mentioned that there are some organized groups that meet online that do not physically see each other, but get organized. Is there a specific or general geographic clusterization of these groups? Can you give out locations or, you know, I mean –

MR. HENRY: There are actually – we’ve seen groups with members operating from six or seven different countries. So --

QUESTION: Can you name some of those countries (inaudible)?

MR. HENRY: No, I’d rather not, just because we actually have ongoing operations right now, where we’ve identified certain people. And some of the partners that we’re working with are – would rather us not discuss it just because of some of the operations that they have. So for the safety of people that are involved and for the ongoing operation, we wouldn’t talk about that specifically.

But again, there’s no geographic boundary. Anybody with a laptop and a wireless connection anywhere in the world can attack some of these networks. So in the physical sense, in the real life world, if you owned a business, you had to worry about people who would walk by and come into your business and steal money potentially, right, physically.

But with online commerce, the number of potential subjects is anybody with connection to the network, because a lot of the tools are available online. You don’t need a great deal of sophistication. A lot of the tools are – you can download and – click on, download and deploy and use them to try and attack certain networks. So really, everybody with a laptop and the intent is a potential threat.

And that’s why we see groups that are collaborating online across multiple countries because they’re not restricted by boundaries. And when they’re looking for the best spammer, if they’re looking for somebody who controls a large botnet that can distribute their malware, they’re looking for the best. And they can search the world. They don’t have to worry about, you know, I’m going to find somebody who’s within commuting distance, because those boundaries don’t exist. So it really is quite a large pool of potential subjects and they are from all walks of the globe.

MODERATOR: Yes, right here.

QUESTION: To follow up on that, how do they find each other? I mean, are there forums or websites where people --

MR. HENRY: There are. There are forums and websites. We actually had an operation just within the last year, I think in the fall of last year that we took down, where we had infiltrated one of these forums that had several thousand people that were trading information that had been stolen from networks, from companies around the world. They were trading skills, they were trading malware. We were able – using an undercover agent, able to infiltrated and dismantle that particular operation.

But there are many others that operate out there – some that are somewhat known, others that are password protected and well controlled by the adversary so that they’ve got a secure communication channel. Again, similar to the physical world, where you’ve got people who communicate covertly to avoid detection from law enforcement, same issues that we have to deal with on the internet side. But there are places where they will congregate and meet just like, you know, a dark alley in a major city.

MODERATOR: Right here.

QUESTION: Hi, I’m Scott Stewart with the Sankei Shimbun of Japan. Frequently, when there are media reports about attacks on U.S. Government networks, it’s reported that the people believe the attacks originated in China, but they – usually, U.S. Government officials are reluctant to say definitively that they are because it can be made to look as though something originates in a certain place. Is there a way to definitively know? I mean, can you know or is it – or is it impossible to know where attacks really originate from?

MR. HENRY: So the first – the whole first part of your question, the preamble to your question is very accurate, that people can disguise where they’re attacking from, and it’s often difficult to identify.

I think, without going into details here, there are certain investigative techniques that we can utilize to try and identify with some specificity where the attack is emanating from, and more importantly, whose fingers are on the keyboard. Because you can identify a particular computer, but if I have a computer in this room, you know, there might be 20 potential people who actually did it. So that’s a whole other part of it.

But there are certain investigative techniques. Again, I can’t go into great detail here. I’ve talked about some of them thus far, talking about some of the techniques that we use.

MODERATOR: Did you have a follow-up?

QUESTION: I just wanted to know if you can explain how they hide themselves in the internet, because I suppose that those websites are not available for everybody. And although you cannot specify, almost in general, how many cases you work per year? You have your --

MR. HENRY: So – I’m sorry, the first part of your question, how they --

QUESTION: Yes, how they – the people who meet in internet to commit cybercrimes, how do they get those websites or how are they available or are they secret? Or how --

MR. HENRY: They are. And so, I mean, it’s – again, I try to equate much of what we see in the virtual world to what we see in the physical world. So there’s – there are groups of people who are inclined to participate in activity, in criminal activity, and they associate with people who participate in criminal activity.

And these are – these things just kind of get around. I mean, people know somebody’s looking for something. They know that they’re looking for a particular piece of malware, or they know they’re looking for somebody who owns a botnet, and they’re referred to these people because they’re online talking to other people and it just kind of happens. It all kind of comes together.

When you go online and you’re there for a couple weeks or a month or so, you really get to know – get a feel for where the people you want to do business with are congregating. And that happens. Its how, in some of the operations that we’ve been involved in, we’ve been able to identify some of these people, because we’ve associated in the same groups.

QUESTION: And how many cases have you been (inaudible) more or less, per year?

MR. HENRY: A lot. I can’t --

QUESTION: Not the concrete, but more or less?

MR. HENRY: More than a thousand.


MODERATOR: Any other questions? Yes, in the back.

QUESTION: Yeah, but what is the difference of approach between this Administration --

MODERATOR: Could you identify your --

QUESTION: ANSA of Italy. What is the difference of approach between this Administration and the previous one in fighting cybercrimes?

MR. HENRY: This Administration has made it very well known that this is going to be a top priority in the Administration. And many of the people who worked in government that are career government employees traverse the administrations, so a lot of the people like myself who worked in the prior administration, work in this Administration. So a lot of the expertise and many of the methodologies continue over.

I think that we’ll see. I mean, this current Administration is relatively new, and the President has said that he would – has certainly identified this as a threat, and after the 60-day review comes out in the next couple of weeks, we’ll get some specific direction or a more specific direction. But I think it’s very positive.

MODERATOR: Any other questions? Okay. Well, with that, I want to thank the Assistant Director for coming today.

MR. HENRY: Thank you very much.

Friday, 29 May 2009

Meet the south Africa High commissioner in the UK , H.E Lindiwe Mabuza[above]
Find below details of the 3rd Enterprise Trade Mission & Exhibition 2009.
Contact Paceworking or Compass-Consultants by return email if you are interested in participating and wish to receive further information.

Seye Aina

Dear Business Owner,

We are delighted to introduce to you the above event, which is the 3rd in a series of annual Trade Mission and Exhibitions held in Nigeria, which is designed to connect UK businesses with the “emerging “ business market in Nigeria, and potentially other parts of Africa.

The Event is organised by Compass Consulting UK in partnership with the UK Trade and Investment, Greater London Enterprise OneLondon, the European Regional Development Fund, Federal Ministry for Commerce and Industry, the Bank of Industry – Nigeria, Lagos State Government, the British High Commission (Embassy), and a host of other organisations within the Organised Private sector.

If you are interested in participating and require further details an event brochure, floorplan for the event, booking and registration form for your business will be sent and you can also be considered for the ERDF Bursary worth £730, both forms will need to be filled in and returned by email to

On the receipt of your completed forms, a member of Compass-consultants will be in touch to discuss your booking and any other requirements with you; to speak to a member of the Team, please ring +44 207 873 2262

Background information to the event
The Enterprise Exhibition is the first event of its kind to bring UK Businesses and Entrepreneurs from the African Diaspora to Nigeria on a trade mission/exhibition. A core objective is to promote the international trade, exchange of learning and good practice and global partnerships through bringing business communities together across continents.The focus of this year’s exhibition will be to bring the international business communities in touch with the vibrant and diverse Nigerian business communities.

Through partnership with Bilateral Chambers of Commerce located in the identified regions, the event aims to provide a framework that will support and fast-track the integration of businesses into the Global business community. As a testimony of the viability of this initiative, we are increasingly attracting the support of new partners; this year, we will be receiving the support of the European Regional Development Fund (ERDF). This support will assist eligible businesses to receive Financial Support for Travel and Participation costs .

Road Shows in Abuja and Lagos
The 3rd Enterprise Exhibition and Trade Mission will provide a platform for UK businesses that are desirous of engaging in International Trade in Nigeria/ the African Continent through Networking/ exploring partnership opportunities and in establishing trade relations with members of the Nigerian business community.
The 2009 event will take the form of a road show in two cities - Abuja and Lagos; the plan is to hold a two-day Exhibition in Abuja, to showcase to the international business communities, goods and services from the Northern regions of Nigeria and the surrounding environs. This will be followed by a Three-day event in Lagos comprising of a two-day Exhibition and a one-day Conference and Awards/Networking Dinner.

We hope that you will choose the Enterprise Trade Mission and Exhibition as the vehicle to take your Business to that next level.

Tokunbo Chiedu (Mrs.)
Compass Consulting UK Ltd.
Tel: +44 207 873 2262
Fax: +44 208 854 1702
Mob: 07950 896950
Nigeria: +234 806 338 0226
+234 1 662 3592
"Strategically Relevant"

Double bedroom in Wood Street/Walthamstow Central available for rent.

This is a fantastic opportunity to rent a double sized room for £450 incl bills exc council tax. The room is based in a beautifully modern 2 bed flat in Wood street, sharing with a tidy but fun female professional. The house has excellent transport links, wood street station is 2 minutes away with trains every 15 minutes to Chingford or Liverpool street which is 20 mins away. Walthamstow central is also 2 mins allowing for links to the Victoria line. Buses are also frequent and there are a parade of shops including a cash point and pubs 5 minutes away from the house.

The house itself is fully furnished with a washing machine, a beautiful bath with a shower and a spacious kitchen and lounge area. The room is part furnished with a double bed and desk and a large loft is also available for extra storage.

As this flat is situated in new developments, the area is very clean and reasonably quite. Parking is also available on the compound.

If interested please contact Betty Barnes by telephone or email


Thursday, 28 May 2009

Fulbright Reflections Series with Jessica Lee: Ndiyo, Viziwi Wanaweza: Deaf Lives in Tanzania

The U.S. Embassy’s Office of Public Affairs is pleased to invite you to a Fulbright Reflections Series presentation by Ms. Jessica Lee titled “Ndiyo, Viziwi Wanaweza: Deaf Lives in Tanzania” on Tuesday, June 2, 2009 from 2:00 – 4:00 p.m. at the U.S. Embassy in Dar es Salaam.

This presentation is a discussion of preliminary research findings by anthropologist Jessica Lee. Deaf people in Tanzania face oppression from institutions, communities, and families. After spending nearly a year collecting life histories and experiences of deaf people, Ms. Lee discusses the severe marginalization of people who are deaf and their incredible ability to not only survive but thrive in Tanzania. From remote villages to downtown Dar es Salaam deaf people are facing the challenges of being a citizen in a developing country, a person with a disability, and a member of a burgeoning cultural community.

Jessica Lee is currently a Fulbright Fellow and doctoral student at the University of Colorado at Boulder. After learning sign language in the Unites States and then graduating as the first hearing person from the Deaf Studies M.A. program at Gallaudet University in Washington DC, Lee has turned her sites on the Deaf communities of Tanzania. In the US she works as a nationally certified interpreter for the deaf, college instructor and street performer. As part of her responsibility as a cultural ambassador for the US to Tanzania she spread peace, Pez, and bluegrass in the Southern Highlands of Tanzania.

As we have limited seating, to attend this presentation, registration is required by June 1, providing full names of participants by emailing (please use subject “register for Fulbright presentation by Jessica Lee”) or by calling 022 2668001 ext. 4186 or 4181.

Please note that large bags, briefcases, cell phones, cameras, liquids, weapons, lighters and electronic items like car alarm key chains are among items not permitted into the Embassy. Please also note that you may not take photographs near the Embassy. As it takes about ten minutes to clear security procedures, please arrive at the Embassy a few minutes before 2:00 p.m.

The Fulbright Program is a U.S. Government funded graduate exchange fellowship. For more information, please contact the Fulbright Coordinator at or visit our website at

With best wishes,
The Fulbright Program

Educational Exchange Programs
Office of Public Affairs, American Embassy
686 Old Bagamoyo Rd., Msasani
Box 9123, Dar es Salaam, Tanzania
Voice: +255 22 2668001
Fax: +255 22 2668251
Fellowship Programs:

9pm-3am Every Saturday @ The Elbow Room, Chapel Market, London N1 (Angel Tube)
DJs INCLUDE: Excalibah, Spin Doctor, DJ Lok, Bruce Wayne, Rhodri, Big Twist, GETO & more...
WIN A POOL TABLE & BOTTLE OF CHAMPAGNE FOR YOU AND YOUR MATESFor your chance to win mail your full name and the date you would like to attend the club to
For Table bookings etc please contact The Elbow Room


Dear members and friends of Uganda

Networking with UBPA is easy and productive and ensures positive partnerships with like-minded people"

You are invited to join many other business owners and professionals for a


At The New and Luxury
Bell Lane, Off Dock Road
Canning Town London E16 2AB
From West Silvertown DLR, turn left and then take the left into
North Woolwich Road, leading into Dock Road.

Manager Mobile: 07733880074
Sunday 31st May 2009
Time - 6.30 to 8.30pm
- Ticket prices: Free

"Great Networking evening.
Bring your business cards


We look forward to seeing you soon,
Edward Katende - 07966 297 149 Willy Mutenza - 07790 647 089

Wednesday, 27 May 2009


President Isaias' speech on the occasion of the 18th anniversary of Independence Day
May 24, 2009

Dear Compatriots inside Eritrea as well as abroadDistinguished Participants and Guests

Allow me to extend my warmest congratulations to the entire people of Eritrea on this auspicious day. Let me also express my profound gratitude to all those who contributed to the exuberant festivities that have been going on throughout the week and that have amplified the boundless joy and pride we all feel on this special day.

Ladies and Gentlemen,

You may recall the observations I made on a number of issues of paramount importance in my speech during the celebrations of our independence anniversary last year. One of those issues was the question of "virtual demarcation" and the impediments and misinformation perpetrated at the time by the outgoing US Administration. All those ploys have failed and are almost forgotten now. What remains, and which does not perturb us much, is the simple matter of ascertaining our inviolable rights to the liberation of our sovereign territories that are still occupied.

In my speech last year, I also elaborated on the observations I had made previously during our independence anniversary in 2005 in regard to the prevalent international developments. As I stressed last year, the reckless policies pursued by a "special interest" group in the United States who believed that they were entrusted with a "providential mission" to shape "their own world order" had given rise to the eruption of violent conflagrations in various parts of the world. This had, in turn, entailed immense destruction, spiralling economic crises and an overall bleak trend that was fraught with dangerous consequences.

The Eritrea ambassador in the UK
Fortunately, the dangerous trend set in motion by the "special interest group" aroused a heightened concern and sensitization of international public opinion to bolster their strong reaction and to engender a revolution of a new kind. It is against this backdrop that the American people, who were invariably affected by these reckless policies, elected Barack Obama to the White House in a testimony of their rejection of arrogance and to bring about change.

Although the broad contours of the change have been indicated, and the prevailing good will pronounced, its specific contents have not yet been clarified. The most critical questions are: how will change be effected? And, will it be at all possible?

The "special interest" groups are frantically employing the clout and influence they had, and still possess, to prevent change from occurring; to obstruct and roll back change; and above all, to mislead the new Administration and influence it to advance their interests. To this end, they have unleashed a new war by deploying all the weapons and ammunitions in their arsenal and by altering their colours, methodologies and "lobbies". Whether the goodwill of the new Administration will succeed or not will indeed be determined by the outcome of the struggle. One of the factors that will compound the challenge is the enormity of the global crisis and the formidable hurdles it poses. The theatre where this confrontation is waged is not also situated in the United States alone but in vast areas in the world as well as in several fields. These additional dimensions of the problem only accentuate the depth of its severity.

If we scrutinize the acts of the "special interest" groups in our region, they have unleashed an intensive smear campaign by peddling lies through their multiple media outlets and lobbyists. They have been very active throughout spring to stifle the policy "changes" that may be embarked by the new US Administration and in order to mislead it and derail any possible positive action. They are misconstruing the "threat of terrorism" that they deliberately fanned in the first place, as a convenient pretext and instrument of intimidation, in order to divert attention from, and prevent the resolution of, the main problems. They had refined this tool as an internalized habit for decades and the old trick is being resuscitated vigorously these days. The various acts and campaigns that they are instigating outside our region hour by hour are not different either, in substance, from the pattern described above.

Ladies and Gentlemen,

On propitious occasions of our independence anniversary, it is appropriate for us to examine in depth critical international developments that may impact on our domestic and regional realities. The purpose of the exercise is to take stock of these trends and formulate policies and plans that shore up our endeavours. Trying to gauge today whether present international realities correspond with our profound desire for change is thus rooted in this perspective and practice. Our hope is that the change promised on a global scale, and especially in the United States, is genuine indeed. This is also a universally shared hope.

Hopes and aspirations are however subjective dispositions and cannot be assumed as realized unless and until they are accompanied by tangible and quantifiable changes on the ground. To give hasty and emotional judgment on the grounds of promises and trends and to raise high expectations on a process which is barely starting will also be imprudent and unrealistic. We shall not thus expect miracles or solutions on a silver platter in an unrealistic fashion. We shall follow developments with the necessary patience and caution.

To follow developments with patience and caution does not mean that we shall remain in a passive mode as bystanders with folded hands. The policy of "constructive engagement" that we have publicly announced indeed means an active, constructive, engagement. This active initiative will be direct. It will not be conducted through intermediaries and lobbyists. Furthermore, we must be wary that our sincere disposition for constructive engagement is not misconstrued and taken for granted to lead to "blackmail," or used as a bargaining chip for imposing pre-emptive conditionalities.

We shall thus continue to undertake relentless action without undue haste, and, by refining our objective reading of the developments that unfold. This approach is vital as we do not also harbour any hidden agenda or have issues that we are particularly worried about.

Ladies and Gentlemen,

I shall not dwell on burning regional issues. Indeed, I know that you have been closely following recent developments whose details have also been described extensively in the media in the past days.

Ladies and Gentlemen,

To closely follow and assess international developments will only help us to gauge the impact of external factors. It will not otherwise relegate the domestic situation to the back burner. Our primary task remains the identification of our domestic priorities and tasks and the carrying out of our homework.

In spite of the harvest shortfall that occurred in 2008, we shall continue to pursue the priority task of food security that we have embarked on. In this regard, we shall continue to pursue this year the policies of price subsidy as well as prudent patterns of consumption to ensure better outreach and equitable distribution. But beyond the issues of supply and distribution, and without ignoring the adequacy of rainfall which is not under our control, we shall redouble our efforts for agricultural development by subsidizing and rationalizing the supply of fuel. The new and extensive agricultural projects we had sought to develop this year in the Northern and Southern Red Sea Administrative Zones have been shelved due to input constraints and the re-arrangement of priorities. Nonetheless, we intend to undertake the necessary preparations this year in order to ensure the full implementation of these projects in 2010.

The development of our marine resources is another task that must be pursued in parallel with our agricultural development projects. We shall consequently improve the modest achievements of last year aimed at increasing supply of fish to the domestic market, and undertake the necessary preparations in order to increase the annual harvest as well as expand the marketing outlets towards the end of this year.

The development of our marine resources is another task that must be pursued in parallel with our agricultural development projects. We shall consequently improve the modest achievements of last year aimed at increasing supply of fish to the domestic market, and undertake the necessary preparations in order to increase the annual harvest as well as expand the marketing outlets towards the end of this year.

In conjunction with the planned and ongoing agricultural development projects for the promotion of food security, we intend to install supply of electricity in most areas of the Gash Barka, Southern Red Sea and Northern Red Sea Administrative Zones. These grids will start in the most important centres and expand and become interconnected with time. The supply of potable water will go in tandem with these projects. All these projects, important as they are, mainly depend on thermal energy with its attendant, rather high, cost implications. The new approach is thus mainly hinged on the phased introduction and expansion of solar and wind sources of energy.

.There are evidently other important sectors that have not been put on the first category in terms of time-bound prioritization. Our educational programmes aimed at producing skilled and productive manpower and that will have tangible contributions in the effective implementation of all the projects described above, as well as, our health programmmes that have been rendering relatively excellent services, shall be expanded both in quantitative and qualitative terms as priorities that cannot be shelved.

Ladies and Gentlemen,

Allow me to thank the Eritrean Armed Forces who have made memorable contributions to the achievements we have gleaned in the past 18 years of independence in all sectors and fronts, the Eritrean people inside the country as well as those who reside abroad, all the Ministries and Administrative Zones, the social associations, various companies as well as our friends and partners. At the present time, the challenges we face are less than the opportunities available. We must therefore increase our efforts and pace to a forward march.

May we be blessed with a good rainy season!

Glory to our Martyrs!
Victory to the Masses!
Happy birth day Abu and Babu

Ayoub mzee in our studios preparing to go on air

shock, sorrow greet Tajudeen’s death

Monitor Team


A wave of shock and grief tore through Africa – and the world - yesterday following the death in a car crash of Dr Tajudeen Abdul-Raheem, the secretary general of the Pan-African Movement, one of the continent’s most illustrious sons.

“It is with deep sadness that we announce the passing on of Dr Tajudeen in a road accident on Mombasa road en-route to Jomo Kenyatta International Airport in Nairobi, Kenya,” Ms Sylvia Mwichuli, the communications coordinator for Africa Millennium Campaign, said in a press statement.

Fondly called by associates/friends as Taju, the Nigerian political scientist was the UN’s Millennium Campaign deputy director, working to “inspire Africans to become more proactive in engaging their leaders to the delivery of the Millennium Development Goals”.

Witnesses say Dr Tajudeen, 53, who was rushing to JKIA to catch a flight, lost control of his car at around 1am on Sunday night and then smashed

into the General Motors - Enterprise Road intersection. He died about an hour later on the way to hospital. In a cruel twist of fate that none of the continent’s best storytellers could have woven, Dr Tajudeen died on Africa Liberation Day which commemorates the date – May 25, 1963 – when leaders of 32 independent African states met to form the Organisation of African Unity, now renamed the African Union.

In Kampala, admirers led by President Museveni expressed sadness that Dr Tajudeen, a renowned Rhodes/Oxford University scholar in the early 1980s, passed away before realisation of a single African unity government.

“I extend my deepest condolences to the family of late Dr Tajudeen and the Pan African Movement,” the President said in a statement delivered by his Press Secretary Tamale Mirundi.

He added: “I enjoyed his skillful writings and never had any problems with him; his was an intellectual debate and criticism.”
Mr Museveni’s comments were apparently aimed to calm nerves amid reports that, although initially a comrade, he fell out with Dr Tajudeen over his strong criticism of the 2005 lifting of the constitutional term limits, enabling the Ugandan leader keep in power as long as he stands and is voted or rigs the polls.

Taju’s bond with Uganda was apparently deepened in 1994, when officials from Kampala in a Hollywood movie-style operation, rescued Dr Tajudeen from certain death in the hands of Gen. Sani Abacha’s henchmen.

Uganda’s current Trade Minister, Maj. Gen. Kahinda Otafiire and chairman of the Pan African Movement, who headed the daring mission, said they smuggled Dr Tajudeen from a Lagos jail and got him out of the country on a falsified identity “because those fascists ruling Nigeria then wanted to kill him.”


RIP: Mourners at Tajudeen’s home in Kansanga, Kampala, yesterday.

Gen. Otafiire said: “Taju’s death is a very big blow to the Pan African Movement of which he was the secretary general. He was an all-rounder; concerned about the welfare of all Africans and an unrelenting critic of bad governance on the continent.”

Indeed in his syndicated TAJUDEEN’s POSTCARD’ column for this week, (published on Page 10), he wrote, “the majority of Africans continue to survive not because of government but in spite of governments.”

“They eke out a living to keep body and soul together, provide for
their families, doing all kinds of dirty work with little pay or selling anything that is buyable hawking all kinds of household wares, fruits, vegetables and myriad of consumer items.”

On the fateful trip, he was heading to Rwanda to launch a campaign to promote maternal health, one of the eight Millennium Development Goals, and later meet President Paul Kagame.

In his condolence message, UN Millennium Campaign Director Salil Shetty said: “Taju was amongst Africa’s foremost voices for pan Africanism and social justice, both inside and outside the continent.”

He added: “His towering intellect, moral fibre and courage of conviction allowed him to speak truth to the powerful like nobody could. It is ironical that on Africa Day [25 May], Africa has lost one of its greatest voices and our most credible advocate.”

Mr Michael Khauka-Mafabi, the Uganda country director of the Pan African Development Education and Advocacy Programme, an organisation dedicated to the promotion of refugee rights and co-founded by Dr Tajudeen, said such intellect of Dr Tajudeen charmed critics and leaders as he worked to support the less fortunate and provide hope that “Africans were capable of solving their own problems.”

“He was focused that whatever the circumstances, all set goals must be achieved and he had the ability to find infectious humour in almost everything - that he provided positive attitude to life and made working with him less formal and more binding,” said Mr Khauka-Mafabi.
There was scheduled to be a vigil for him at his ‘exile’ home in Kabalagala, a Kampala city surburb, where friends and associates had begun assembling by last evening.

Among the mourners was Ms Fatoumata Toure, a strong Pan Africanist, who has worked closely with Dr Tajudeen in the last 16 years. “He worked with great dedication and passion to ensure that the dream of a united Africa is achieved; he didn’t keep grudges and was very clever.”

By press time, the body of Dr Tajudeen, was due to be flown to Lagos from where it would be transported for burial to Funtua town in his native Katsina State. He is survived by a wife and two daughters.[source : monitor]

Tuesday, 26 May 2009

Surveillance States
31 May 2009
A discussion by experts from the UK and US on mass surveillance, its implications, and challenges to government policy and practice.
Sunday 31 May 2009, 5-6.30pm
Garden Court Chambers, 57- 60 Lincoln's Inn Fields, London WC2A 3LS
Speakers include:
Carla Ferstman - director of REDRESS
Jameel Jaffer - director of the American Civil Liberties Union (ACLU)'s National Security Project
Patrick Radden Keefe - fellow at the Century Foundation
Ben Hayes - associate director of Statewatch
Larry Siems - director of PEN American Center's Freedom to Write program
Meeting organised by the American Civil Liberties Union, PEN American Center and Statewatch.
Events listing is provided for information only. Inclusion in this listing should not be taken to imply that the Institute of Race Relations supports an event or is involved in organising it.