Friday 13 December 2013

Since we managed to confirm an interview, we came up with six questions that we wished to discuss with a victim of cyber-bullying. Three personal questions and three that could be applied universally. 
  1. Your Experience 


  • How old were you when the cyber bullying started?
  • How did the comments make you feel?
  • How did you over come this experience?
     2.  General

  • In your opinion, what are the most common sites on which cyber bullying is popular?
  • What advice do you have for other people who are going through this experience?
  • What do you think can OR should be done, to put an end to cyber-bullying?
   
Release Form – Interviewee Agreement

This Agreement is made as of the date indicated below between Filmmaker (defined below) and Performer
(defined below), as follows;

1. Interviewee agrees to render services as an on-camera performer in connection with the production of the
Video (defined below).
2. The term is in perpetuity, and the territory of the footage is worldwide.
3. Interviewee hereby grants to Filmmaker, its successors and assigns the right to use and display
Interviewee's likeness and performance as contained within the Video for any and all purposes and in any
and all media channels, now known or hereafter devised.
4. I hereby release Filmmaker, its successors and assigns from any and all claims, demands and liabilities of
any kind or nature whatsoever arising out of the aforementioned materials and the use thereof.
5. Filmmaker, its successors and assigns shall be the absolute owners of any and all photographs, film,
Video and other materials (and all rights therein, including the copyright) produced pursuant to this
release. Interviewee further agrees, subject to the provisions above, that Filmmaker may use Interviewee's
photograph, and/or likeness in any manner and with whatever copy they choose. Interviewee understands
that Filmmaker is not obligated to use Performer’s image.
6. Interviewee represents that by signing this Agreement and Release, Interviewee fully intends to be legally
bound to the terms stated within or, if Interviewee is under the age of 18 years, this Agreement and
Release is being signed by Interviewee's parent or legal guardian who represents his/her agreement to the
terms stated within and that Performer will be legally bound to such terms.
7. Interviewee's acknowledges that the production is non-union and holds the Filmmaker harmless for any
claims relating to hiring the Interviewee on that basis.


Date: ___13/12/13________________________________


Signature of Performer/Guardian ___________________________________

Print Name of Performer/Guardian ___________________________________

Character/Role __Sam Johnson_- Interviewee________________________________

Performer’s Email & Physical Address ___________________________________

Payment Amount (if applicable) ___________________________________


Signature of Filmmaker ___________________________________

Print Name of Filmmaker _____TRC News Media______________________________

Title of Video _TRC News Package__________________________________
Thursday 12 December 2013
TRC News Intro - 15 seconds

Presenter outlines and gives information about cyber bullying - David outside of school with children walking into school in the background. Finishing with some establishing shots of the school.

Facebook conversation of cyber bullying taking place with voice over-  Visual Facebook conversation with a live cyber bullying conversation taking place.

Statistics about cyber bullying-  Picture freezes and then shows several facts about cyber bullying.

Interview with victim of cyber bullying- Questions about their experiences and feelings when they were being bullied through the internet.

Live scene presenter briefly talking about the hacking incident which took place- introduces the hacking story, talks briefly about it outside the scene of the crime.

Footage of Akshays room with the hackers work area- Quick short shots of the areas the work spaces the hacker used.

Finish with presenter talking about punishments and wraps up the new story.



In order to ensure our news package fulfils our potential and is up to a very high standard, we are going to need the following things:

Props:
  • Crime tape for the second story to place around the house.
  • Computer, Keyboard and Mouse for both stories.
  • Microphone for both presenters of each stories.

Equipment:
  • High quality camera to ensure that the footage we film is to a high standard.
  • Tripod which helps keep the camera steady and gives a good finish to shots.
  • Microphone for both presenters in each story to ensure that what is being said can be heard clearly.

Costumes:
  • Each presenter preferable would wear black trousers/jeans, black shoes, white shirt and a black blazer/jacket.
  • Dark clothing for the interviewee to match the dark and dimmed background to hide their identity.
I produced this call sheet for us to ensure we have a clear plan and idea of exactly how our news package is going to be carried out. The call sheet enables us to clearly see specifically for each who is going to be needed, the equipment needed to allow us to film the scene exactly how we wish to and final the location of which each scene is going to be filmed.


Wednesday 11 December 2013
Yesterday as a group we discussed and evaluated progress over a Skype call. Working out of the classroom has helped us to increase organisation regarding our project. We have these things to complete as of the 11/12/13.

1. Script or overview of the layout of your package

2. Storyboard – (Drafted on paper then digitally made we will provide you with a program to do this

3. Interview Questions

4. Contact with interview subjects

5. Shooting Schedule

6. List of props, equipment, costumes

7. Call sheets

8. Release form for your interview subjects
Thursday 5 December 2013
I researched several types of Risk Assessment forms in order to gather an idea of what I needed to include when producing my own risk assessment form, and also find out what information is vital and needs to be placed/questioned on the form. I found some very useful examples and templates when searching for different types of risk assessment forms.

One example that I found very useful was from the website: http://webcache.googleusercontent.com/search?q=cache:WAW9xsfo410J:www.essexinsurancebrokers.com/content/Film%2520Production%2520Risk%2520Assessment%2520Form.doc+risk+assessment+form+filming&cd=1&hl=en&ct=clnk&gl=uk


This risk assessment template was very helpful as it  shows a clear table of how the risk assessment form should be set up, and the important pieces of information than needed to be included and by looking at this it enabled me to create a my own template for our risk assessment form. Here is what my form looks like:

Our risk assessment contains several columns which identify hazards, identifying the people that may be effected by the hazard, ways in which we can ensure that these hazards are prevented and how significant of a risk the following factors are and which will help us to take extra care when filming our footage.

When research different types of risk assessment forms I came across something very interesting called a risk assessment checklist which helps to ensure that our risk assessment form actually does its job, and identifies all of the possible hazards/problems we may encounter. The checklist gives a list of information that our risk assessment form must contain in order to cover all areas necessary. I found this checklist when browsing through the risk assessment forms and information of the Westminster website. 






Our survey has been successfully posted and now I'm going to analyse some of the results.

50% of people who took this survey were female. This shows that our News package could be suitable and relatable to both genders.
100% of people who took this survey are between the ages of 17-19 years old, this doesn't decrease our target audience but makes us more aware of what age group are most interested.

 Feedback shows us there are many different ways people receive their news. Using this information we can extend our posts to more social networking sites. This would also help us to achieve a bigger networking surface area to gain a bigger audience.


3 out of 4 people use the internet every hour daily, this means people can frequently visit our website and/or blog page, so the use of the internet to provide for our audience is very ideal. 
                                                      
Feedback shows us people would be interested in seeing stories to do with hacking and cyber bullying with the exception of fraud and stolen identity aswell. Using this information we can direct our attention to what our audience really want to see. 

 Cyber bullying is something 75% of our feedback have never experienced. We could help to bring awareness to the 3/4 who have not by, posting relevant stories about cyber bullying. It is a major occurrence on the internet and based on our feedback people would be interested in these stories.
 


Wednesday 4 December 2013
Location/Owner - Akshay's house

Available hours - 1pm - 9pm

Location Fee - None

Power - n/a

Windows - Big windows in small room, can be covered by blinds

Security - Secure alarm system

Access - Give people directions via MapQuest, plus email them directions of where to go once they drive through town.

Police/Hospital - Approximately within 3 kilometres

Transportation - Participants can reach location public transport via 113, 186, 288


Friday 29 November 2013
Today as a group we discussed many different aspects of graphics and planned what kind of graphics we could use for our news package. For inspiration we looked at a complexed very "well done" graphics piece from channel news.

Then after we watched this we discussed what ideas we could take from this and how we could implement it, in a unique style for our news package.


What did we learn from this?
When looking at this professional graphics news piece from Channel 4 News we learnt and found many different creative aspects which we would like to implement in our piece, however in our own different style. Some of these were:

-Effective Title Transitions

- Typography Text Effects

- 3D Animation

- Animation of Still Images.

- Transitions which link to the clip theme. (For example an explosion occurs, have an explosion vfx come in).
Thursday 28 November 2013
Today we were practising shooting a potential part of our news package. This increaded our skills in terms of when we need to interview someone. This was due to the shots we used, editing the clips with ambient sound and the timing of different clips.

Our task was to copy this 8 Shot Short News Package:


And here is what we produced as a group, i felt after some feedback we really looked closely at the original and tried to imitate it as closely as we can.

Today as a group we discussed on how to plan producing a news package, we watched a very useful video by the BBC explaining how to professionally create a news package and all the steps which go with it. We learnt that producing a television news package means working quickly and accurately and juggling multiple tasks often under intense pressure. Magnus McGrandle is a senior producer on the News at Six and Ten bulletins on BBC One.
In today lesson we showed our peers and other students our News channel intro and whilst watching it we asked the students too fill out a feedback report with several questions which enables us to read the feedback and make adjustments if need be and it is useful for us to know what when down well and what aspects were good about our intro. Whilst most of the comments were all positive and people really seemed to enjoy the graphics and music of the opening scene, it was thought that the two went really well together and clearly indicate what type of news channel was being watched. However as well as receiving vast amounts of positive feedback we were given suggestions of how to make our intro even better. One suggestion was that we should try to include some footage within our intro, this was interesting as when we were producing the intro the concept of footage was something that was constantly talked about and whether it should be included or not. We decided to not include footage because our topic does not actually include any footage as it is all computer based work although within our news package we will have footage of interviews there wouldn't be ant footage of actual crimes taking place therefore the footage was irrelevant and it would contradict our project.
Wednesday 20 November 2013
This blog is designed to show you the progression of the music i have produced for the past couple of weeks for our opening scene. It was essential that the music went well with the footage and made it clear that we were a news channel.

Initially i started off using Garage Band to create loops and a sequence of sounds provided by the library found in Garage Band. After putting several pieces together the music didn't seem complete therefore i decided to try and add different sounds to see whether there would be a difference but there wasn't and after that i felt that there wasn't much more i could so i thought id transfer the music i had so far into audacity and see whether i could change anything for the better.


I finished off the music by using a program called audacity. Audacity enables you to really get to grips with the music sample, i was able to cut and paste specific parts of the sample in order to move beats around to fit our opening scene. You can create more than one layer to the music which is also good as i found that on Garage Band when trying to do so the sounds would clash all too often.
News Package Part 2.0

1. Impersonation. Does the social networking account (e.g., Twitter Account) belong to the actual person or company it is representing? For example, if you look at the Twitter account @johnsileo, you will see that the name is used to send business to a gentleman who is also an identity theft speaker. The actual account is @john_sileo. Whether this is considered social networking squatting or social networking identity theft,  it’s impersonation.

2. Ownership. Who owns the data on the social networking sites’ servers? Do you own what you post on Facebook, what you email through Google Mail or the financials you backup off-site on someone else’s servers? The fact that you don’t know should trouble you as much as it does me. People could be extracting information about you posted on the internet, and using for it for bad intentions.






Monday 18 November 2013
For our Blog, I felt that TRC News as a group wanted a more creative and elegant Blog design rather than the standard ones by "Blogger". I created a brand new Blog Design from scratch using a program called Artisteer.

You will be reading this post on our Blog, so you can see and make your own opinion about our new design, however here is a screenshot of the new design as a single picture.


As a group we discussed possible stories and elements that we are going to have in our news package, therefore I created a spider diagram to scatter ideas and thoughts in order to help enable us to experiment and test out different stories and to see roughly whether all the elements suggested so far can be related and incorporated within each other. Here is my prezi on our spider diagram:
http://prezi.com/9hsjpjxyaksr/technological/
Saturday 16 November 2013

This is an article from the BBC, written by Rory Cellan-Jones, Technology Correspondent.
Leading search engine companies By  Google and Microsoft have agreed measures to make it harder to find child abuse images online.

As many as 100,000 search terms will now return no results that find illegal material, and will trigger warnings that child abuse imagery is illegal.

PM David Cameron has welcomed the move but said it must be delivered or he would bring forward new legislation.

Child protection experts have warned most images are on hidden networks.

In July, Mr Cameron called on Google and Microsoft's Bing - which together account for 95% of search traffic - to do more to prevent people getting access to illegal images.

He said that they needed to ensure that searches which were unambiguously aimed at finding illegal images should return no results.

New software

Now both companies have introduced new algorithms [software instructions] that will prevent searches for child abuse imagery delivering results that could lead to such material.

Writing in the Daily Mail, Google executive chairman Eric Schmidt says: "These changes have cleaned up the results for over 100,000 queries that might be related to the sexual abuse of kids."

"As important, we will soon roll out these changes in more than 150 languages, so the impact will be truly global."

The restrictions will be launched in the UK first, before being expanded to 158 other languages in the next six months.

Mr Schmidt goes on to describe work in the area of deterrence. "We're now showing warnings - from both Google and charities - at the top of our search results for more than 13,000 queries."

Alert warning
Warnings like this will appear on screen if users type in search terms related to child abuse
"These alerts make clear that child sexual abuse is illegal and offer advice on where to get help."

Microsoft, which in a rare display of unity is working closely with Google on this issue, says its Bing search engine will also produce clean results.

The company said it had always had a zero tolerance attitude to child sexual abuse content and had been putting in place stronger processes to prevent access since the summer.

Later on Monday, the two companies will join other internet firms at Downing Street for an Internet Safety Summit.

The prime minister said significant progress has been made since his speech in July calling for action, but warned that new legislation could be introduced if the companies failed to deliver.

At the time, he said that Google and Microsoft had said that blocking search results couldn't be done but he did not accept that.

Tory MP Claire Perry, Mr Cameron's adviser on the sexualisation and commercialisation of childhood, told BBC Radio 4's Today programme the new measures were a "great step forward".

"We're not declaring victory but this is a massive step in the right direction," she said.

'Missed opportunity'

But Jim Gamble, former head of the Child Exploitation and Online Protection Centre (Ceop) told BBC Breakfast he did not think the measures would make any difference with regard to protecting children from paedophiles.

"They don't go on to Google to search for images. They go on to the dark corners of the internet on peer-to-peer websites," he said.

He said search engines had already been blocking inappropriate content and the latest move was just an enhancement of what was already happening.

A better solution would be to spend £1.5m on hiring 12 child protection experts and 12 co-ordinators in each of the police regions to hunt down online predators, he added.

NSPCC chief executive officer Peter Wanless said "a concerted and sustained effort from all quarters" was needed to stay one step ahead of sex offenders that were getting ever more technologically advanced.

"This is the key child protection issue of a generation - we cannot fail," he said.

A June report by the Ceop highlighted how the "hidden internet" helped distributors of child abuse images to evade detection by using encrypted networks and other secure methods.

Google and Microsoft have agreed to work with the UK's National Crime Agency and the Internet Watch Foundation to try to tackle networks which host child abuse images.

The two companies are also using their technological expertise to help in the identification of abuse images.

Microsoft's PhotoDNA already allows a photo to be given a unique "fingerprint" which means it can be tracked as it is shared across the internet. Now Google has developed VideoID which does the same job with videos.

Both firms will provide this technology to the National Crime Agency and other organisations to help in the work of finding and detecting those behind the creating and sharing of child abuse images.

But critics have accused the government of underfunding online child protection.

Ceop, which is now part of the National Crime Agency, has been accused of missing a recent opportunity to identify hundreds of people downloading illegal images.

Police in Toronto revealed that in 2012 they had shared hundreds of names of British people with Ceop who were alleged to be customers of a Canadian firm that sold videos of young children.

The operation to close down the business saw hundreds of people arrested in Canada and around the world - but none in Britain.

On Friday, the National Crime Agency said Ceop had examined the material but it had been classified as being on a low level of seriousness. However, the agency has now ordered a review of Ceop's handling of the case.

http://www.bbc.co.uk/news/uk-24980765

This shows the editing process I took with screenshots of how I created our TRC News Opening Sequence. It also shows the types of "advanced" effects I used and how it linked into the Technology theme.

1 - Background
The first step of creating the opening sequence was to create a simple but sleek background
which fit in with the theme of technology. I used a Light Blue to Dark Blue radial gradient theme.

2 - Creating HUD Effect
The second step was to create the first graphic which was the HUD Shapes, these shapes represented a holographic motion effect.

3 - Applying HUD Effect
The third step was to simply Pre-Compose the HUD Effect intro a separate composition, then apply it onto the main composition over the background.

4 - Matrix Hacking Effect
 I then added one of the most stand out features of the opening sequence which was the Matrix Hacking Effect. I downloaded this footage which was initially designed on After Effects already. However I simply edited the colour of the clip to a Light-Dark Blue and then set the blend mode of the Matrix layer to "Hard Light" which allowed it to fully blend in the background while adding a sleek glow.


5 - World Map Texture
For the next part of the creation of the opening sequence I applied a flat map of the world texture in front of the BG Layer. I the changed the colour of the map from Black - Light Blue which would help it blend in more. 

6 - Animating Coloured Stripes 
In this I created these animated blue stripes, I firstly used the "Fractal Noise" effect to create the lines and then key-framed the evolution of them to have an animating and appearing at different times. I then applied the "Colorama" effects which allow the animating stripes be a overall Blue colour, however also with a black tint.

7 - Background Grid Texture
In the image below you can slightly see a grid texture blended with the Background, I firstly created a black solid, I then applied a white grid effect onto the solid white made the solid a white transparent grid, I then finally applied a CC Cylinder effect to the grid which allowed it to have a slight 3D bend look to it.

8 - 3D Grid Globe
For the 8th step I firstly needed to create a 3D Grid Sphere, so i imported a image of a grid into After Effects and then added the CC Sphere effect which allowed the flat 2D Grid to become a fully 3D Sphere. I then added a gradient ramp and changed the colour to Light-Dark Blue. I then finally added a Glow which have the globe a attractive glowing visual look.

9 - 3D Globe
For the 9th step I firstly needed to create a 3D Globe, so i imported a image of a flat map into After Effects and then added the CC Sphere effect which allowed the flat 2D Grid to become a fully 3D Sphere. I then added a gradient ramp and changed the colour to Light-Dark Blue. I next finally added a Glow which have the globe a attractive glowing visual look. Once I had done this I created the 3 stripes which circled the globe by drawing out 3 quadrilateral shapes and applying the same effects to them as I did for the globe.
I then applies 3D Rotational Keyframes to the 3 stripes which allowed them to circular hover around the globe.

10 - Animating 3D Globe's 
Once I had Pre-Composed the two globe's together they fitted nicely inside one another giving the globe a really visually pleasing look. So then I applied a 3D Rotational Positional Keyframe  to the globe which would animate it from off the screen to on the screen while also animating the rotation of the globe as if it was spinning on its axis while moving position.

11 - Creating Text
Here you can see that I was in the process of creating the text for the opening sequence. However firstly I drew 3 Quadrilateral shapes, the bigger one to hold the text and the other 2 for display. Once I had created the text and the shapes, I added two Optical Flares and key-framed them to slide across the big shape on the left.

12 - Animating Text
The final step of the creation process of the whole opening sequence was to Animate the text. So what i did here was firstly Pre-Compose the text and 3 shapes, i then applied a 3D Rotational Positional Keyframe  to the text which would animate it from off the screen to on the screen while also animating the rotation of the whole text pre-composition.

By Andy, Via Torrent Freak.
cityoflondonpoliceCity of London Police inform TorrentFreak that they have begun targeting sites that provide access to unauthorized content for “criminal gain.” The initiative is part of a collaboration with Hollywood studios represented by FACT and the major recording labels of the BPI. In letters being sent out now, police accuse site operators of committing offenses under the Serious Crime Act. The National Fraud Intelligence Bureau further warns that the crimes carry a jail sentence of 10 years.
Authorities and entertainment industry companies in the UK are working together on a new initiative which targets sites said to be offering copyrighted material without permission, TorrentFreak has learned.
The first signs came last week when a major torrent site received a letter from the National Fraud Intelligence Bureau (NFIB), a unit set up following the Government’s National Fraud Review. The unit has a mission to identify serial offenders and organized crime gangs in order to disrupt their activities.
The letter (copy below), sent to “The owners and/or operators of the website known as ‘XXXXX’,” states that the NFIB has become particularly concerned by websites causing harm to the UK’s creative economy.
“We are therefore currently working on an initiative with Government and industry bodies to help prevent, deter and disrupt the criminal activity linked to websites involved in online copyright infringement. In that regard, we have reasonable grounds to suspect that through your ownership and/or operation of the website known as ‘XXXXX’, you are involved in online copyright infringement,” NFIB explain.
So far TorrentFreak is aware that at least two torrent sites have already received letters from the NFIB. Their operations are detailed as follows:
“XXXXX is a BitTorrent website that – without the permission of the copyright holder – actively provides UK internet users with a bespoke directory and search engine for torrent files. This enables users to find and download copyright content which would otherwise be time consuming or impossible to locate,” the letter notes.
NFIBbig
Even though neither site is located in the UK, police believe that sites’ operators are committing crimes there.
“We have grounds to suspect that as owners and/or operators of the XXXXX website, you are committing the offense of communication to the public under s.107(2A) of the Copyright, Designs & Patents Act 1988 (“CDPA”). Section 107(2A) is an indictable offence punishable by up to two years’ imprisonment,” NFIB state.
But while allegations of copyright-related offenses are nothing out of the ordinary, in their letter the National Fraud Intelligence Bureau elevate the seriousness of file-sharing offenses to unprecedented levels.
“Further, we have grounds to suspect that as owners and/or operators of the XXXXX website, you are committing offenses under the Serious Crime Act 2007 by doing acts capable of encouraging and assisting communication to the public (under s.107(2A) of the CDPA); and/or distribution (under s.107(1)(e) of the CDPA) of copyright content seeded by others – intending or believing that those offenses will be encouraged or assisted.
“Such activity is an indictable offense under the Serious Crime Act 2007 and is punishable by up to ten years’ imprisonment (two years for encouraging/assisting communication to the public; and ten years for encouraging/assisting distribution),” the NFIB warn.
The letters conclude with advice for site operators to contact the NFIB immediately in order to “prevent the further commission of offenses.”
“If no contact is made before 14th June 2013 then you and/or the XXXXX website may face police action,” the letter concludes.
TorrentFreak contacted NFIB who confirmed that an initiative is indeed underway.
“City of London Police has begun an initiative to target websites that attract visitors by providing unauthorised access to copyrighted content for criminal gain. These websites are able to operate and profit from advertising on their sites without having licenses or paying the creators and owners of the films, TV programmes, music and publications,” a spokesman said in a statement.
bpi“Intellectual property crime is a serious offense that is costing the UK economy hundreds of millions of pounds each year. Working with the UK advertising industry, City of London Police and rights holder groups FACT (Federation Against Copyright Theft), BPI (British Recorded Music Industry) and The PA (The Publishers Association) are committed to tackling this problem.”
The BPI say that an NFIB officer was previously embedded with their anti-piracy unit.
“This appointment is the first secondment by NFIB into private industry, enabling City of London Police to develop a greater understanding of the illegal distribution and sale of music online by organised crime gangs,” the music group reveals.
The NFIB add that their initiative also seeks to protect UK consumers from “malware and other harmful programs that may be downloaded unwittingly from sites that provide illegally offered content.”
Any site or service in receipt of the NFIB letter can contact us in confidence at the usual address.

The letter
uk-police
Thursday 7 November 2013
Draft Idea
Surveys about Cyber Bullying:
 http://www.ditchthelabel.org/annual-cyber-bullying-survey-cyber-bullying-statistics/
            

Pedophiliac: http://www.channel4.com/news/should-you-let-your-child-play-in-habbo-hotel

Adults log onto teenage social networking sites Like Habbo Hotel etc and inappropriately  speak to underage persons. The link above shows an article about this topic specifically on Channel 4.

Hacking: A 26-year-old journalist has been charged with allegedly conspiring with members of the hacker group Anonymous to hack into the Tribune Co. TRBAA -0.51% system and alter a news story on the Los Angeles Times website, the Justice Department.

Situations like this are considered Technology related crime.
As i was progressing on in making our opening sequence, i wanted to create a technological themed texture for part of the sequence.

The first picture was more of like a journey and futuristic look due to the colours and also the actual animation of the texture.
The second screenshot was essentially a comparison using extremely similar effects. This gave me a clearer insight on what texture looked cleaner and sleeker, while also being link as much as possible to the technology theme.

In today's lesson we discussed with our teacher and as a group how we should proceed in making our opening sequence and also thought about what our actual news package would consist of.

We came up with a conclusion that instead of having real "outside public" pieces of footage, we should have online screenshots and speedclips of social network's and spying agencies such as MI6, SIS and finally found inspiration for two video clips called "AngelDust thriller" and "GeekNews".

MI6 - <a href="https://www.sis.gov.uk/"></a>

SIS - <a href="http://goo.gl/AlrVUB"></a>

Angel Dust - <a href="http://goo.gl/7nzIiQ"></a>

Geek News - <a href="http://goo.gl/AR0gDY"></a>
We are currently discussing what to use for our news package based on our target audience. This is going to be an important part of our news presentation because we have a variety of sub genres to produce under Tech-related Crime. We decided primarily to use online/on-screen footage instead of actual people. We will use 10 percent of footage from already live sites online but the 90 percent will be 100 percent of our work. This lesson Antonio completed our Padlet and Akshay researched brilliant opening scenes which we used as inspiration for our News Package.
Wednesday 6 November 2013
This post is regarding the planning of our logo, below you can see the first hand drawn draft, this just shows the outer and inner STROKE which is going to be the base of the logo. 



The second hand drawn design below shows the outer bevel of the logo filled in a faint turquoise colours with a tough of a darker shading near the bottom and top corners of the logo. Then i added a small inner metallic blue to glow the outer circle to help give the logo a aesthetically pleasing look. After in the middle of the logo the text "TRC" has been drawn and centred inside the inner circle. The text is filled with a light to dark blue gradient with a slight inner bevel.


The final step of the planning hand drawn design of the logo was to fill in the middle of the logo, i went for a dark shade if blue so when actually creating the logo on Photoshop, it would allow for the text "TRC" to stand out more.







Tuesday 29 October 2013
This is my key frame of an animated football that i created using Adobe Premiere Elements 11. We carried out this task in lesson, in order to get an idea of ways in which we could use our logo within our new productions. The task enabled us to learn new ways of creating animations as well as the fact that is gave us the chance to use Adobe premiere with ease, so that when it comes to turning our logo into an animation we are comfortable and confident in using Adobe in order to get exactly what we want.

Saturday 19 October 2013
In todays lesson as a group we came together and recorded a video of ourselves introducing each member within the group discussing what individually we were all going to bring to the group, identifying our strengths and areas that we will all be focusing on. This enabled our viewers to get an idea of us a group and see who is behind all the work being produced as well as giving them the chance to see who is linked and produces certain aspects and features found in our news channel. 

Akshay - is mainly responsible for the editing and graphics side of the news channel. He had a large part in coming u with our logo and the animations that go along side it. Jay - is responsible for the vast amount of research that goes on about news related to TRC and analyses this information in order for us to take some good aspects and include it in our work. Antonio - myself i am heavily involved with creating the music for our work. i will be creating two different pieces of music, one being for our 15 seconds intro, introducing our news brand and channel. 

The second piece will last around 2 minutes which will be played in the background along side our news footage/report. David - is our main actor, who will be taking the leading/main role in our news channel footage. As well as being our most recoginised actor he will also be blogging information that works alongside Jay's work.

Wednesday 9 October 2013
 Hey guys, this video is just a short introduction video on who i am in relational to TRC News, what i will be providing to TRC and how much skills will help TRC News a better and more professional news group. 
(LINK IF VIDEO ISN'T WORKING) - http://www.youtube.com/watch?v=Sir29binRQs&safe=active
BY JAMES WOOD, CALGARY HERALD
As police grapple with the growing problem of cyberbullying, they are “overwhelmed” by the quantity and complexity of computer-related crime, says the head of the Alberta Association of Chiefs of Police.
Edmonton police Chief Rod Knecht said law enforcement agencies need more resources from government to deal with crimes that relate to the Internet — everything from cyberbullying and online child exploitation to the use of the Internet to facilitate theft and assault.
“We are overwhelmed,” he said in an interview Friday. “You just see the crime that is facilitated through technology and the Internet is exploding for us and we need to catch up.”
The issue of cyberbullying has sparked a national debate after a series of high-profile cases, including the suicide of B.C. teen Amanda Todd last fall after years of online harassment.
Just this week, Nova Scotia put into force its new Cyber Safety Act and child pornography charges were laid against two males in relation to the case of Rehtaeh Parsons, who killed herself earlier this year after what her family says were months of cyberbullying following a sexual assault.
Knecht said he’s interested in the Nova Scotia law — which allows individuals bullied online to sue or seek a protection order against those responsible — but acknowledges that cracking down on the problem puts a strain on resources.
“We have to go online and we have to retrieve all the emails and maybe the Facebook page, and we need a warrant to do that,” he said.


Four men have been arrested in the UK over their role in illegal online marketplace Silk Road.
Three men in their early 20s were arrested in Manchester while a fourth man, in his 50s, was detained in Devon. The men were initially arrested on suspicion of drug offences. More arrests are expected in the coming weeks. Such sites would be a "key priority" for the UK's National Crime Agency (NCA), its director general said. The Silk Road, one of the world's largest websites selling illegal drugs, has now been closed down. Ross Ulbricht, the alleged operator of the site was arrested in San Francisco by the FBI at the beginning of October. Last week 40-year-old Steven Lloyd Sadler was arrested in Seattle. He is alleged to be one of the most prolific sellers on the Silk Road.

What was the Silk Road?


Silk Road took its name from the historic trade routes spanning Europe, Asia and parts of Africa.
News reports and other internet chatter helped it become notorious. However, most users would not have been able to stumble upon the site as the service could only be accessed through a service called Tor - a facility that routes traffic through many separate encrypted layers of the net to hide data identifiers.
Tor was invented by the US Naval Research Laboratory and has subsequently been used by journalists and free speech campaigners, among others, to safeguard people's anonymity.

But it has also been used as a means to hide illegal activities, leading it to be dubbed "the dark web".
Payments for goods on Silk Road were made with the virtual currency Bitcoin, which can be hard to monitor.

Court documents from the FBI said the site had just under a million registered users, but investigators said they did not know how many were active. Earlier this year Carnegie Mellon University estimated that over $1.22m (£786,000) worth of trading took place on the Silk Road every month. The site operated on Tor, a so-called "dark web" service that anonymises users, making it much more difficult for authorities to track locations. Such areas of the internet are not covered by standard search engines. The site sold a range of items, but was most famous for offering a host of illegal drugs, paid for using virtual currency Bitcoin.
Keith Bristow, the NCA's director general, warned that users who think they can hide their identity on the internet need to think again.

"These arrests send a clear message to criminals; the hidden internet isn't hidden and your anonymous activity isn't anonymous. We know where you are, what you are doing and we will catch you."
"It is impossible for criminals to completely erase their digital footprint. No matter how technology-savvy the offender, they will always make mistakes." Exeter-based officers worked closely with American law enforcement officers to identify significant UK users of the Silk Road.

It is hoped that the investigation will give them insights into how criminals use the dark net.
"These criminal areas of the internet aren't just selling drugs; it's where fraud takes place, where the trafficking of people and goods is discussed, where child abuse images are exchanged and firearms are traded," said Andy Archibald, head of the NCA's national cybercrime unit.
The Silk Road may now be defunct but it seems that users are planning to resurrect the service.
Technology news site TechCrunch reports that Silk Road version 2 could be "ready to launch".


Total Pageviews

Blog Archive

Powered by Blogger.