Showing posts with label NEWS. Show all posts
Showing posts with label NEWS. Show all posts

Provocative New Music Video

The Caribbean ladies make for a sizzling combination in the hot video, for the first single from the ‘Why Wait’ singer’s tenth album, ‘Shakira


Lyrically, it’s about how easy it is to forget how bad someone is for you when you still love them. Musically, Shakira has reverted back to the guitar-tinged new wave pop of her last English-language album, ‘She Wolf’.


Shakira is back with a brand new steamy music video - and this time Rihanna has also come along for the ride.


The Colombian stunner has teamed up with the Bajan beauty for the provocative "Can't Remember To Forget You" clip.


The video has already racked up around four million views.

In 2007, Gillette determined that Rihanna's legs were the most goddess-like of them all. She also scored $1 million worth of coverage for her sexy pins.

Insurance: $1 million

"I work with a trainer," Rihanna told People. "We work on the arms. I don't want manly, muscular arms. We work out my but# because I love my but#. [But] my legs are my main focus. I'm obsessed."
Elsewhere, One Direction’s ‘Midnight Memories’ album continues to smash records after it achieved the biggest pre-order in iTunes history, and sold 237,000 copies in its first seven days on sale. The band are the first ever to have their first three albums debut at No.1 in the US Billboard chart.

One Direction are nominated for Best British Group and Best British Single at the 2014 Brit Awards and will be touring the UK and Ireland in May and June.

He dubbed the 37-year-old Colombian singer, who appears in various provocative positions with Rihanna, a reference point for a society in moral decay.

Mr Ramirez, a self-styled ‘defender of morals and principles’ said the pair should be ashamed with the song he claims also promotes tobacco use, stealing and killing.

Rihanna then shows up, and it's not long before the pair get up close and personal - gyrating against a wall, cavorting on a duvet and sensuously smoking cigars.

Shakira dished the dirt on what it was like working with RiRi, 25, in February's edition of Glamour magazine.

"Working with her was utopia," said the 36-year-old mom-of-one, who gave birth to Barcelona soccer star Gerard Pique's son Milan in Barcelona, Spain, last January.

CELEBRITIES BODY PART INSURANCE

Although most commonly associated with celebrities, body part insurance can offer crucial financial cover, and protect your livelihood if you rely on a specific part of your body to earn a living. Although uncommon, body part insurance is more popular than you might assume; performers (including musicians, singers and actors) as well as artists, surgeons, athletes and other sports people all commonly require this type of insurance. Body part insurance pays out financial compensation for any accidental damage or disfigurement caused to the insured body part, if the damage results in a loss of work.


From the most ‘normal’ types of body part insurance, such as cover for a model’s limbs, to the more bizarre kinds, including insurance for a sommelier’s taste buds, almost any body part can be insured if it can be proved that loss of use of this body part would lead to significant loss of work and income.

Body part insurance is usually relatively expensive; it is often bought by experts in their field, or celebrities: some of whom even use it as a promotional gimmick. However, it is not only celebrities who may need protection in case of disability or loss of use of a vital limb. Models for example, have a career based almost entirely on appearance, and could lose out on significant income if disability prevented them from winning future contracts. As a result, a model might insure several parts of their body, for example their legs and even their smile. Body part insurance is not designed to insure your whole body: it is intended to cover only select body parts. If you wish to insure your whole body it may be more suitable for you to take out a comprehensive life insurance policy instead.

The 10 biggest insurance policies stars have taken out on their body parts

10. David Lee Roth’s $1million (£670K) sperm

The Van Halen frontman would have surprised no-one if he’d spent money protecting his vocal chords.

But he turned heads in his band’s 80s heyday when he took out a $1million policy on his sperm.

Roth splashed out on his little swimmers to cover himself in the event he impregnated a groupie and, as a result, was hit with an expensive paternity suit.

And, if reports are to be believed, he went on to take full advantage of his cunning scheme – without fear of split condoms…

9. Keith Richards’ $1.6million (£1.1m) hands

In fairness, the Rolling Stones guitarist would definitely be out of a job if he lost his hands.

So it was a shrewd move on his part to protect his chord-playing appendages in the event of a hedge-trimming or tree-felling catastrophe.

The insurance package covers both hands and, when asked about the policy, he waved his arms and said: “These are my business.”

After all, he wouldn’t get much Satisfaction playing a guitar with no hands…

8. Heidi Klum’s $2.2million (£1.5m) legs

It makes sense that the German supermodel would insure the two things that enable her to walk up and down catwalks the world over.

Oddly, one of her pins is insured for $200,000 less than the other due to a scar on her knee.

She told The Sun: “They are different values because I have this little scar.

“I had to be examined in London. A guy came and inspected my leg.”

7. Dolly Parton’s $3.8million (£2.5m) boobs

Without doubt, country queen Parton has become as known for her gargantuan lady mountains as she has her singing voice.

Therefore, it made total sense when she took out a policy on her 40DD assets – realising she wouldn’t be who she is without them.

They were initially insured for $300,000 each but inflation (no pun intended) has caused their value to swell (again, no pun intended).

As well as enriching the pockets of her insurers, her bountiful boobs have helped to make Parton minted…

6. Rod Stewart’s $6million (£4m) voice

The ageing rocker wouldn’t be able to wake up Maggie or say anything to her if he lost his voice.

More importantly, his career as a singer would be over.

He was alerted to the merits of insurance after fearing his voice had been irreparably damaged following throat surgery in 2000.

Stewart is now protected to the cool tune of $6million in case his much-loved raspy vocals do a disappearing act.

5. Tom Jones’s $7million (£4.7m) chest hair

Granted, it’s not unusual to be loved by anyone.

But it’s downright bizarre to put a price tag on one’s bodily follicle growth.

That said, Welsh legend Tom thought his success was as much down to the forest spilling out of his open shirt as it was his warbling tones.

So he paid out on a $7million policy to cover losses of earnings if his chest hair spontaneously combusts…

4. Jennifer Lopez’s $27million (£18.1m) buttocks

J-Lo has made a name for herself as a star of both film and music – but she’s also much-admired for her bulging backside.

Fearing she’ll hit rock bottom if her peachy buttocks abandon her through injury or the merciless perils of nature, the singer/actress made financial arrangements to guarantee she wouldn’t be too down in the dumps if her worst nightmare came true.

Losing one’s bum cheeks isn’t a chief concern of many, but J-Lo clearly values her booty highly.

Well, $27million to be precise.

And the actress admitted she’s contemplating taking out an insurance policy on her famous assets.

While most ordinary folk limit their insurance expenditure to their homes, cars, travel and pets, it’s not uncommon for celebrities to splash out on their body parts.

Swathes of stars protect what they perceive to be the money-making features that, should they ever lose them, will put a huge dent in their earnings.

Hence why the likes of Rihanna and Jamie Lee Curtis took out policies worth $1million (£670,000) and $2.8million (£1.9m), respectively, to safeguard their legs.

The craze was kicked off by Hollywood star Betty Grable, who insured her pins in the 1940s for $1million.

Here’s a top ten rundown of the limbs, appendages, hair and bodily fluids that stars have forked out on – in reverse monetary order.

3. Michael Flatley’s $40million (£26.9m) feet


Irish super-hoofer Flatley would have faced a much greater challenge becoming the Lord Of The Dance without feet.

The 54-year-old has made a career out of his speedy trotters and spent big to ensure he’d live comfortably – financially, at least – should his feet either fall off or stop working.

He’s not the kind of fella hapless female dancers would want to boogie with at a party.

One accidental misstep could cost the dancer his day job and push the perpetrator into bankruptcy…

2. David Beckham’s $70million (£47m) legs

Let’s face it, David Beckham wouldn’t have captained England or won countless accolades with no legs.

The Paris Saint-Germain midfielder took out what is thought to be the largest personal insurance policy in sports history in 2006.

It’s claimed Becks will receive the mammoth pay-out in the event of an injury to his legs, feet or toes that would force him into retirement.

The fact he’s a fan of riding motorbikes must send his premium soaring..

1. Mariah Carey’s $1billion (£670m) legs

The singer stumped up for her stumps after she was awarded Gillette’s Legs Of A Goddess prize.

Winning the award apparently awakened the pop diva to the popularity of her pins, and subsequently insured them for a bonkers $1billion.

Adding to the absurdity, Gillette commemorated Carey’s limbs victory by having a statue of her legs made.

Naturally, she sparked widespread bafflement with her financial arrangement – on the basis she could still shatter glass with her vocals without legs.

Revealed: how US and UK spy agencies defeat internet privacy andsecurity

US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden.

view

The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees thatinternet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments.


The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – "the use of ubiquitous encryption across the internet".

Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves.

Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software.

The files, from both the NSA and GCHQ, were obtained by the Guardian, and the details are being published today in partnership with the New York Times and ProPublica. They reveal:

• A 10-year NSA program against encryption technologies made a breakthrough in 2010 which made "vast amounts" of data collected through internet cable taps newly "exploitable".

• The NSA spends $250m a year on a program which, among other goals, works with technology companies to "covertly influence" their product designs.

• The secrecy of their capabilities against encryption is closely guarded, with analysts warned: "Do not ask about or speculate on sources or methods."

• The NSA describes strong decryption programs as the "price of admission for the US to maintain unrestricted access to and use of cyberspace".

• A GCHQ team has been working to develop ways into encrypted traffic on the "big four" service providers, named as Hotmail, Google, Yahoo and Facebook.

The agencies insist that the ability to defeat encryption is vital to their core missions of counter-terrorism and foreign intelligence gathering.

But security experts accused them of attacking the internet itself and the privacy of all users. "Cryptography forms the basis for trust online," said Bruce Schneier, an encryption specialist and fellow at Harvard's Berkman Center for Internet and Society. "By deliberately undermining online security in a short-sighted effort to eavesdrop, the NSA is undermining the very fabric of the internet." Classified briefings between the agencies celebrate their success at "defeating network security and privacy".

"For the past decade, NSA has lead [sic] an aggressive, multi-pronged effort to break widely used internet encryption technologies," stated a 2010 GCHQ document. "Vast amounts of encrypted internet data which have up till now been discarded are now exploitable."

An internal agency memo noted that among British analysts shown a presentation on the NSA's progress: "Those not already briefed were gobsmacked!"

The breakthrough, which was not described in detail in the documents, meant the intelligence agencies were able to monitor "large amounts" of data flowing through the world's fibre-optic cables and break its encryption, despite assurances from internet company executives that this data was beyond the reach of government.

The key component of the NSA's battle against encryption, its collaboration with technology companies, is detailed in the US intelligence community's top-secret 2013 budget request under the heading "Sigint [signals intelligence] enabling".

Funding for the program – $254.9m for this year – dwarfs that of thePrism program, which operates at a cost of $20m a year, according to previous NSA documents. Since 2011, the total spending on Sigintenabling has topped $800m. The program "actively engages US and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs", the document states. None of the companies involved in such partnerships are named; these details are guarded by still higher levels of classification.

Among other things, the program is designed to "insert vulnerabilities into commercial encryption systems". These would be known to the NSA, but to no one else, including ordinary customers, who are tellingly referred to in the document as "adversaries".

"These design changes make the systems in question exploitable through Sigint collection … with foreknowledge of the modification. To the consumer and other adversaries, however, the systems' security remains intact."

The document sets out in clear terms the program's broad aims, including making commercial encryption software "more tractable" to NSAattacks by "shaping" the worldwide marketplace and continuing efforts to break into the encryption used by the next generation of 4G phones.

Among the specific accomplishments for 2013, the NSA expects the program to obtain access to "data flowing through a hub for a major communications provider" and to a "major internet peer-to-peer voice and text communications system".
Technology companies maintain that they work with the intelligence agencies only when legally compelled to do so. The Guardian has previously reported that Microsoft co-operated with the NSA to circumvent encryption on the Outlook.com email and chat services. The company insisted that it was obliged to comply with "existing or future lawful demands" when designing its products.

The documents show that the agency has already achieved another of the goals laid out in the budget request: to influence the international standards upon which encryption systems rely.

Independent security experts have long suspected that the NSA has been introducing weaknesses into security standards, a fact confirmed for the first time by another secret document. It shows the agency worked covertly to get its own version of a draft security standard issued by the US National Institute of Standards and Technology approved for worldwide use in 2006.
"Eventually, NSA became the sole editor," the document states.

The NSA's codeword for its decryption program, Bullrun, is taken from a major battle of the American civil war. Its British counterpart, Edgehill, is named after the first major engagement of the English civil war, more than 200 years earlier.

A classification guide for NSA employees and contractors on Bullrunoutlines in broad terms its goals.

"Project Bullrun deals with NSA's abilities to defeat the encryption used in specific network communication technologies. Bullrun involves multiple sources, all of which are extremely sensitive." The document reveals that the agency has capabilities against widely used online protocols, such as HTTPS, voice-over-IP and Secure Sockets Layer (SSL), used to protect online shopping and banking.

The document also shows that the NSA's Commercial Solutions Center, ostensibly the body through which technology companies can have their security products assessed and presented to prospective government buyers, has another, more clandestine role.
It is used by the NSA to "to leverage sensitive, co-operative relationships with specific industry partners" to insert vulnerabilities into security products. Operatives were warned that this information must be kept top secret "at a minimum".

A more general NSA classification guide reveals more detail on the agency's deep partnerships with industry, and its ability to modify products. It cautions analysts that two facts must remain top secret: that NSA makes modifications to commercial encryption software and devices "to make them exploitable", and that NSA "obtains cryptographic details of commercial cryptographic information security systems through industry relationships".

The agencies have not yet cracked all encryption technologies, however, the documents suggest. Snowden appeared to confirm this during a live Q&A with Guardian readers in June. "Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on," he said before warning that NSA can frequently find ways around it as a result of weak security on the computers at either end of the communication.
The documents are scattered with warnings over the importance of maintaining absolute secrecy around decryption capabilities.

Strict guidelines were laid down at the GCHQ complex in Cheltenham, Gloucestershire, on how to discuss projects relating to decryption. Analysts were instructed: "Do not ask about or speculate on sources or methods underpinning Bullrun." This informaton was so closely guarded, according to one document, that even those with access to aspects of the program were warned: "There will be no 'need to know'."

The agencies were supposed to be "selective in which contractors are given exposure to this information", but it was ultimately seen by Snowden, one of 850,000 people in the US with top-secret clearance.A 2009 GCHQ document spells out the significant potential consequences of any leaks, including "damage to industry relationships".

"Loss of confidence in our ability to adhere to confidentiality agreements would lead to loss of access to proprietary information that can save time when developing new capability," intelligence workers were told. Somewhat less important to GCHQ was the public's trust which was marked as a moderate risk, the document stated.
"Some exploitable products are used by the general public; some exploitable weaknesses are well known eg possibility of recovering poorly chosen passwords," it said. "Knowledge that GCHQ exploits these products and the scale of our capability would raise public awareness generating unwelcome publicity for us and our political masters."

The decryption effort is particularly important to GCHQ. Its strategic advantage from its Tempora program – direct taps on transatlantic fibre-optic cables of major telecommunications corporations – was in danger of eroding as more and more big internet companies encrypted their traffic, responding to customer demands for guaranteed privacy.

Without attention, the 2010 GCHQ document warned, the UK's "Sigintutility will degrade as information flows changes, new applications are developed (and deployed) at pace and widespread encryption becomes more commonplace." Documents show that Edgehill's initial aim was to decode the encrypted traffic certified by three major (unnamed) internet companies and 30 types of Virtual Private Network (VPN) – used by businesses to provide secure remote access to their systems. By 2015, GCHQ hoped to have cracked the codes used by 15 major internet companies, and 300 VPNs.

Another program, codenamed Cheesy Name, was aimed at singling out encryption keys, known as 'certificates', that might be vulnerable to being cracked by GCHQ supercomputers.
Analysts on the Edgehill project were working on ways into the networks of major webmail providers as part of the decryption project. A quarterly update from 2012 notes the project's team "continue to work on understanding" the big four communication providers, named in the document as Hotmail, Google, Yahoo and Facebook, adding "work has predominantly been focused this quarter on Google due to new access opportunities being developed".

To help secure an insider advantage, GCHQ also established a HumintOperations Team (HOT). Humint, short for "human intelligence" refers to information gleaned directly from sources or undercover agents.

This GCHQ team was, according to an internal document, "responsible for identifying, recruiting and running covert agents in the global telecommunications industry."

"This enables GCHQ to tackle some of its most challenging targets," the report said. The efforts made by the NSA and GCHQ against encryption technologies may have negative consequences for all internet users, experts warn.

"Backdoors are fundamentally in conflict with good security," said Christopher Soghoian, principal technologist and senior policy analyst at the American Civil Liberties Union. "Backdoors expose all users of a backdoored system, not just intelligence agency targets, to heightened risk of data compromise." This is because the insertion of backdoors in a software product, particularly those that can be used to obtain unencrypted user communications or data, significantly increases the difficulty of designing a secure product."

This was a view echoed in a recent paper by Stephanie Pell, a former prosecutor at the US Department of Justice and non-resident fellow at the Center for Internet and Security at Stanford Law School.

"[An] encrypted communications system with a lawful interception back door is far more likely to result in the catastrophic loss of communications confidentiality than a system that never has access to the unencrypted communications of its users," she states.

Intelligence officials asked the Guardian, New York Times and ProPublica not to publish this article, saying that it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read.

The three organisations removed some specific facts but decided to publish the story because of the value of a public debate about government actions that weaken the most powerful tools for protecting the privacy of internet users in the US and worldwide.

Source : The Guardian

Mexico to Texas on convicted cop killer: Don't execute our citizen

Mexico's government is trying to block the execution of a convicted cop killer in Texas this week, arguing that it would violate international law.

view

The case of Mexican citizen Edgar Tamayo Arias is the latest battle in a dispute over the rights of the foreign-born on American death rows. And U.S. Secretary of State John Kerry has said it could put Americans abroad at risk.


Tamayo, 46, was convicted in the 1994 murder of a Houston police officer, whom he shot three times in the back of the head, according to the Texas Department of Criminal Justice.

Mexico's Foreign Ministry said Sunday that going ahead with Arias' execution by lethal injection, scheduled for Wednesday, would violate international law because Tamayo wasn't advised of his right to receive consular assistance.

This isn't the first time Mexico has stepped in to try to stop the execution of one of its citizens.

Mexican officials made similar arguments -- unsuccessfully -- before executions in 2008 and 2011.

"The Mexican government is opposed to the death penalty and has decided to use the necessary resources to protect its citizens who are in danger of receiving this sentence," the ministry said in a statement.

Kerry has also weighed in on Tamayo's case, arguing that setting an execution date is "extremely detrimental to the interests of the United States."

"I want to be clear: I have no reason to doubt the facts of Mr. Tamayo's conviction, and as a former prosecutor, I have no sympathy for anyone who would murder a police officer," Kerry wrote. "This is a process issue I am raising because it could impact the way American citizens are treated in other countries."

In a response to Kerry, Texas Deputy Attorney General Don Clemmer said he'd meet with representatives from the Justice Department and the State Department over the matter.

The International Court of Justice ruled in 2004 that the United States had violated the Vienna Convention on Consular Relations, the treaty that lays out rights of people detained in other nations, in the cases of dozens of Mexican nationals. The judges ordered the United States to provide "review and reconsideration" of the sentences and convictions of those Mexican prisoners as a result.

Mexico's Foreign Ministry argues that hasn't happened in Tamayo's case.

It's a case Tamayo's lawyer had made as well in attempts to stay his execution.

"Mr. Tamayo was never informed of his treaty rights at the time of his arrest, and no court has agreed to review that treaty violation and the consequences that it had for his conviction and sentence," attorney Sandra Babcock told CNN affiliate KTRK.

Prosecutors have disputed that argument.

"Since 1994, this case has gone to all the courts that it can possibly go to -- the state courts, the federal courts," Roe Wilson, assistant district attorney in Harris County, Texas, told KTRK. "It has been reviewed."

How to Get a Free Car Insurance Quote

How to Get a Free Car Insurance Quote in 15 Minutes or Less


Maybe you've heard something about saving 15% or more on your car insurance. Maybe you're charmed with an eloquent little CAR. No matter how you found us, you're in the right place to get a fast, free, and accurate auto insurance quote online.
Just answer some simple questions about:

  • Yourself

  • Other drivers

  • Your car

We will then ask you questions about possible auto insurance discounts you may qualify for that would reduce your insurance costs. In 15 minutes or less you'll have a personalized car insurance quote.

add-person-to-car-insurance
If you like what you see, you can purchase immediately and start enjoying CAR's top-notch coverage.


Need help choosing the right car insurance?


That's where we come in. Car insurance isn't the simplest thing to understand. Between legal requirements, optional coverage, deductible choices, and different coverage levels, it's not always easy to figure out how to choose the best auto insurance policy.


Do you need full coverage or liability only? What does this mean?


If your car is new, leased or purchased with a loan, you'll probably need "full coverage." In case of an accident, these coverages will help protect your car and the other driver up to the limits shown on your policy.

At a minimum, full coverage includes:



  • The standard liability protection

  • Both collision and comprehensive coverage

Unless a third party requires full coverage (standard in many loans and leases), you can choose to carry "liability only," which typically only protects the other driver and their vehicle in case you are found at-fault for an accident. It's a good idea to make sure you could afford to replace your car out-of-pocket when considering this option.

Take a look at all of the auto insurance coverage options available from CAR and how each one protects you.


Still deciding on what car insurance you need?


We understand that you want the best deal and the most accurate car insurance rates. That's why CAR will store your quote for 90 days so you won't have to start over. At CAR, we're confident that you'll receive excellent service and affordable car insurance prices.

CAR agents are always available to help you find the right protection and give you peace of mind. Take note of your auto insurance quote reference number that will appear on the top right when you save your quote then connect with a real person.

CAR's teams of professionally trained agents are available 24 hours a day online.

Once you purchase your auto insurance policy, you can sign up for instant, round-the-clock access to your policy.

Are you ready to save on your auto insurance? Go ahead, get a car insurance quote. You've got nothing to lose, and a lot to save!

5 Smart Financial Resolutions to Make in 2014

The New Year is only days away, and with the close of the year coming, the question on everyone’s mind is what to choose for their New Year’s Resolution. Fidelity Investments, a diversified financial services firm, has been studying the resolution patterns of Americans nationwide.



Their most recent study found that 54 percent of Americans typically consider finances when making their resolutions. In addition, 49 percent of Americans felt the economy’s ups and downs of the past year and realized its impact of how well they were able to keep their resolutions.


Here is a table showing their findings of the most highlighted resolutions:



Financial Resolutions























Save More MoneyPay Off DebtSpend Less MoneyDevelop a Long-Term Goal PlanMake/Stick to a BudgetPay Down Credit Card Debt
54%24%19%13%12%8%

As the year comes to a close, think about how you can make small changes in your financial life to make 2014 a less stressful year.



1. Reevaluate your needs.


If you’re feeling down in the dumps about your financial situation, there are ways to pare back your lifestyle in order to save money. Consider downsizing, or, to embark on a sure-fire effective method of scaling back, consider going on an extreme money fast, in which you make a list solely of your essential necessities and dedicate yourself to only buying what you need for a set period of time. The results are sure to be worth it!


340923138_b1b57d8382_z



2. Second income


Tap into your natural skills and talents to figure out how to make extra money on the side. There are plenty of side gigs that can help you make extra cash, and there are even ways to squeeze more money out of your paycheck. Even if you simply do a spring cleaning of your closet, you can make an extra buck on items you no longer need.



3. Hold yourself accountable.


Think of the things you wish you’d done differently in 2013. You might feel remorse about the material objects you bought that only gave you momentary happiness and drained your finances. Or maybe you didn’t contribute to your retirement fund as much as you should have, because you didn’t take the time to plan your finances and stick to a budget. Take the time to reflect on mistakes you made this year and create a strategy to avoid these same financial pitfalls in 2014.



4. Reward yourself periodically.


If you’re the average American, putting money towards a savings goal is probably on your agenda for the New Year. While saving, it’s important to reward yourself along the way.  Create a fund specifically for fulfilling activities that you know will rejuvenate you you when you’re feeling burnt out. One interesting idea is to dedicate 1 percent of your paycheck on a passion to further your individual development.



5. Research what you don’t know.


You may be fuzzy on how to grow your money through investing, or what the steps are to setting up a decent retirement fund. Tap into available resources and get into the habit of doing a quick Google search and set aside time to do your research.


Take steps to move your life in the direction you want, and commitment is the key to achieving great results. Give your goals a real chance to reach fruition, stay motivated, and cheers to a great start to 2014!

£2m: average pay award for JP Morgan's top staff in 2012 revealed

Fresh evidence of the pay deals on offer in the City has emerged, with the biggest US bank, JPMorgan Chase & Co, revealing it gave more than 100 of its top staff in London an average of £2m each in 2012.



The disclosure comes after Goldman Sachs said its high flyers received£2.7m on average – up 50% on the year before – adding to anger about bankers' bonuses.


The banks are required to provide the information about their operations in the UK to comply with an EU rule introduced after the 2008 banking crisis. Banks must give details of the pay of "code staff", those deemed to be taking and managing risk for their organisations.


JP Morgan

The details of the pay awards come as new rules from Brussels come into force to restrict top bankers' bonuses to one times their salary – or twice, with the approval of shareholders. Sharon Bowles, the MEP who chairs the European parliament's economic and monetary affairs committee, said the move was intended to change the culture of banking.


"The bankers' bonus cap is part of building a much-needed culture change, putting an end to the sort of short-termism and excessive risk-taking that led to the financial crisis," she said.



Royal Bank of Scotland also gave its new chief executive, Ross McEwan, £1.5m in shares on New Year's Eve as part of a prearranged deal to hire him 18 months ago from Commonwealth Bank of Australia. The move ensures the bailed-out bank's pay policies will receive fresh scrutiny in 2014.


The latest information from JP Morgan – filed just as 2013 was ending, to meet the deadline – shows it had 126 code staff in 2012 who received £41m in "fixed remuneration", such as salaries, and another £222m in "variable remuneration", such as bonuses, half of which was paid in shares that have to be held for two years.


The payments were down on the £2.2m average from 2011 . They were made after the bank reported record net income of $21bn for 2012, despite the losses caused by the so-called London Whale trading scandal, for which the bank has faced action from regulators on both sides of the Atlantic. It has paid fines totalling $920m (£555m) to regulators in the US and the Financial Conduct Authority in the UK as a result of the affair, which the bank's boss, Jamie Dimon, originally dismissed as a tempest in a teapot.


The chancellor, George Osborne, and City regulators are opposing the bonus cap, which came into force on New Year's Day. They argue it will force up the fixed costs of banks because they will raise salaries or pay additional allowances to staff to keep up pay levels – as Barclays has said it plans to do.


The disclosures by JP Morgan about its split between fixed and variable pay - £41m compared with £222m - illustrate the way bonuses are given relative to salaries.


While pay experts expect absolute levels of pay for most bankers will not fall after the bonus cap, they argue it could reduce pay deals for those on boards or on executive committees, one rung below the boardroom, because shareholders will refuse to sanction bigger pay deals for them.


The archbishop of Canterbury this week waded into the debate over pay,telling BBC Radio 4's Today programme on Tuesday: "I don't want to name names but I came across some people recently – senior members of the City from foreign organisations – who were very clearly still absolutely in denial about what happened in 2008."


One outcome of the financial crisis has been demands for more information about bonuses to be published. The European Banking Authority published data in November that showed 2,714 bankers in the UK classified as code staff received more than €1m (£830,000) each in 2012.

 
Copyright © uVevo