<html><body><div style="color:#000; background-color:#fff; font-family:HelveticaNeue-Light, Helvetica Neue Light, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;font-size:16px"><div id="yui_3_16_0_1_1419661062940_29022" dir="ltr">Happy Holidays folks.</div><div id="yui_3_16_0_1_1419661062940_29022" dir="ltr">...</div><div id="yui_3_16_0_1_1419661062940_29022" dir="ltr"><br></div><div id="yui_3_16_0_1_1419661062940_29022" dir="ltr">In case you missed it.</div><div id="yui_3_16_0_1_1419661062940_29022" dir="ltr"><br></div><h1 style="font-size: 1.7em; margin-top: 0px; margin-bottom: 2px; line-height: 1.35em; color: rgb(34, 34, 34); font-stretch: normal; font-family: Arial, Helvetica, sans-serif; border-bottom-style: none !important; background-color: rgb(183, 183, 183);" class="" id="yui_3_16_0_1_1419661062940_29202"><a href="http://www.inforisktoday.com/obama-signs-5-cybersecurity-bills-a-7697" id="yui_3_16_0_1_1419661062940_29380">Obama Signs 5 Cybersecurity Bills</a><br></h1><div style="width:450px; font-family: 'Georgia', 'Times', 'Times New Roman', 'serif';margin-top:5px; margin-bottom: 5px; background-color: #ffffff;" contenteditable="false" id="enhancrCard_0" class="link-enhancr-attachment link-enhancr-element"><table class="link-enhancr-element" cellspacing="0" cellpadding="0" border="0" style="width:450px; height:170px; position: relative; display: block;" id="yui_3_16_0_1_1419661062940_29407"><tbody id="yui_3_16_0_1_1419661062940_29406"><tr class="link-enhancr-element" id="yui_3_16_0_1_1419661062940_29716"><td class="link-enhancr-element" colspan="8" style="height: 1px; background-color: #e5e5e5; font-size: 1px; border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_29715"><div class="link-enhancr-element" style="height: 1px; background-color: #e5e5e5; font-size: 1px; line-height:0px;" id="yui_3_16_0_1_1419661062940_29714"> </div></td></tr><tr class="link-enhancr-element" id="yui_3_16_0_1_1419661062940_29421"><td rowspan="5" class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt; border-collapse: collapse;"><div class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt;"> </div></td><td class="link-enhancr-element" rowspan="5" style="vertical-align: middle; width: 168px; height: 168px; background-color: #000000;border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_29422"><div class="link-enhancr-element" style="width: 168px;" align="center"><a href="http://www.inforisktoday.com/obama-signs-5-cybersecurity-bills-a-7697" class="link-enhancr-card-urlWrapper link-enhancr-element" style="text-decoration: none !important; color: #000000 !important;"><img alt="image" src="http://ef67fc04ce9b132c2b32-8aedd782b7d22cfe0d1146da69a52436.r14.cf1.rackcdn.com/obama-signs-5-cybersecurity-bills-showcase_image-3-a-7697.jpg" class="link-enhancr-thumbnail-image link-enhancr-element" width="168" height="102" style="display: block; margin: auto;" data-id="299135b1-7aa8-20a0-ded3-fc0bcb4b1ab1"></a></div></td><td rowspan="5" class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 0pt; border-collapse: collapse;"><div class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt;"> </div></td><td rowspan="5" class="link-enhancr-element" style="width: 14px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_29420"><div class="link-enhancr-element" style="width: 14px; background-color: #ffffff; font-size: 14pt;"> </div></td><td colspan="2" class="link-enhancr-element" style="height: 6px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_29515"><div class="link-enhancr-element" style="height: 6px; background-color: #ffffff; font-size: 6pt;" id="yui_3_16_0_1_1419661062940_29514"> </div></td><td rowspan="5" class="link-enhancr-element" style="width: 20px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_29428"><div class="link-enhancr-element" style="width: 20px; background-color: #ffffff; font-size: 20pt;"> </div></td><td class="link-enhancr-element" rowspan="5" width="1" style="width: 1px; background-color: #e5e5e5; font-size: 1pt; border-collapse: collapse;"><div class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt;"> </div></td></tr><tr id="yui_3_16_0_1_1419661062940_29405"><td class="link-enhancr-element" colspan="2" style="width: 100%; vertical-align: middle; font-family: 'Georgia', 'Times', 'Times New Roman', 'serif';" id="yui_3_16_0_1_1419661062940_29404"><div class="link-enhancr-text-part link-enhancr-element" style="line-height:16.5px; background-color: #ffffff; height: 135px; width: 245px;" id="yui_3_16_0_1_1419661062940_29403"><div class="link-enhancr-element" style="word-wrap: break-word; word-break: break-all;" id="yui_3_16_0_1_1419661062940_29402"><span class="link-enhancr-element icon icon-shrink link-enhancr-toggle"></span><span class="link-enhancr-element icon icon-close link-enhancr-delete"></span><a href="http://www.inforisktoday.com/obama-signs-5-cybersecurity-bills-a-7697" class="link-enhancr-card-urlWrapper link-enhancr-element" style="text-decoration: none !important; color: #000000 !important; line-height: 100%; font-size: 18px; display: block;" id="yui_3_16_0_1_1419661062940_29401"><span class="link-enhancr-element link-enhancr-card-title" style="margin: 0; font-weight: normal;margin-bottom: 3px; font-size: 18px; line-height: 21px; max-height: 43px; color: #000000; overflow: hidden !important; display: inline-block;" id="yui_3_16_0_1_1419661062940_29400">Obama Signs 5 Cybersecurity Bills</span></a><div style="font-size: 13px; line-height: 20px; color: #999999; max-height: 81px; font-family: 'Georgia', 'Times', 'Times New Roman', 'serif';overflow: hidden;" class="link-enhancr-card-description link-enhancr-element" id="yui_3_16_0_1_1419661062940_29427">Without ceremony, President Obama has signed five cybersecurity-related bills, including legislation to update the Federal Information Security Management Act, the</div></div></div></td></tr><tr id="yui_3_16_0_1_1419661062940_29410"><td colspan="2" class="link-enhancr-element" style="height: 4px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_29409"><div class="link-enhancr-element" style="height: 4px; background-color: #ffffff; font-size: 4pt;" id="yui_3_16_0_1_1419661062940_29408"></div></td></tr><tr id="yui_3_16_0_1_1419661062940_29416"><td class="link-enhancr-element" style="vertical-align: middle; font-family: 'Arial', 'Helvetica Neue', 'Helvetica', 'sans-serif';" id="yui_3_16_0_1_1419661062940_29415"><div class="link-enhancr-element" style="font-size: 0pt;" id="yui_3_16_0_1_1419661062940_29414"><a href="http://www.inforisktoday.com/obama-signs-5-cybersecurity-bills-a-7697" class="link-enhancr-card-url link-enhancr-element" style="color: black; text-decoration: none !important;cursor:pointer !important;" target="_blank" id="yui_3_16_0_1_1419661062940_29413"><span class="link-enhancr-element link-enhancr-view-on" style="display: inline-block; line-height: 11px; max-width: 145px; min-width: 85px; overflow: hidden; max-height: 13px; word-break: break-all;" id="yui_3_16_0_1_1419661062940_29396"><span class="link-enhancr-element link-enhancr-mobile-no-resize" style="vertical-align:middle; font-size: 9px; line-height: 11px; color: #999999; -moz-text-size-adjust: none; -ms-text-size-adjust: none; -webkit-text-size-adjust:none; text-size-adjust:none;" id="yui_3_16_0_1_1419661062940_29412">View on <span style="font-weight: bold" class="link-enhancr-view-on-domain" id="yui_3_16_0_1_1419661062940_29411">www.inforisktoday.com</span></span></span></a></div></td><td class="link-enhancr-element" style="vertical-align: middle; width: 100px; font-family: 'Arial', 'Helvetica Neue', 'Helvetica', 'sans-serif';" id="yui_3_16_0_1_1419661062940_30576"><div class="link-enhancr-element link-enhancr-preview-wrapper" style="max-width: 100px; min-width: 80px; overflow: hidden; text-align: right; line-height: 11px; max-height: 13px; font-size: 0pt;" id="yui_3_16_0_1_1419661062940_30575"><span class="link-enhancr-element link-enhancr-preview-by link-enhancr-mobile-no-resize" style="vertical-align:middle; font-size: 9px; line-height: 11px; color: #999999; -moz-text-size-adjust: none; -ms-text-size-adjust: none; -webkit-text-size-adjust:none; text-size-adjust:none;">Preview by Yahoo</span></div></td></tr><tr id="yui_3_16_0_1_1419661062940_29419"><td colspan="2" class="link-enhancr-element" style="height: 9px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_29418"><div class="link-enhancr-element" style="height: 9px; background-color: #ffffff; font-size: 9pt;" id="yui_3_16_0_1_1419661062940_29417"></div></td></tr><tr class="link-enhancr-element" id="yui_3_16_0_1_1419661062940_29523"><td class="link-enhancr-element" colspan="8" style="height: 1px; background-color: #e5e5e5; font-size: 1px; border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_29522"><div class="link-enhancr-element" style="height: 1px; background-color: #e5e5e5; font-size: 1px; line-height:0px" id="yui_3_16_0_1_1419661062940_29521"> </div></td></tr></tbody></table></div><div id="yui_3_16_0_1_1419661062940_29022" dir="ltr"><br></div><div></div><div id="yui_3_16_0_1_1419661062940_29021" dir="ltr"> One of these is the <i id="yui_3_16_0_1_1419661062940_29725">"<b class="" id="yui_3_16_0_1_1419661062940_29525" style="color: rgb(51, 51, 51); font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20.3999996185303px; background-color: rgb(183, 183, 183);"><a href="http://www.gpo.gov/fdsys/pkg/BILLS-113hr2952enr/pdf/BILLS-113hr2952enr.pdf" target="_blank" style="text-decoration: none; color: rgb(0, 88, 168);" class="" id="yui_3_16_0_1_1419661062940_29524">Cybersecurity Workforce Assessment Act</a></b><span style="color: rgb(51, 51, 51); font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20.3999996185303px; background-color: rgb(183, 183, 183);" id="yui_3_16_0_1_1419661062940_29717">, which requires the DHS to assess its cybersecurity workforce and develop a comprehensive strategy to enhance the readiness, capacity, training, recruitment and retention of its cybersecurity workforce."</span></i></div><div id="yui_3_16_0_1_1419661062940_29021" dir="ltr"><i><span style="color: rgb(51, 51, 51); font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20.3999996185303px; background-color: rgb(183, 183, 183);"><br></span></i></div><div class="signature" id="yui_3_16_0_1_1419661062940_29012"><div id="yui_3_16_0_1_1419661062940_29011" dir="ltr"><font face="times new roman, new york, times, serif" id="yui_3_16_0_1_1419661062940_30093" size="3">With the recent SONY hack (suspected to be related to the movie "The Interview" and North Korea) cyber warfare appears to be the next front-line for nations. Every nation (if it has to survive) needs to build up cyber-warrior capabilities, like happens with present conventional warfare armies.</font></div><div style="width:450px; font-family: 'Georgia', 'Times', 'Times New Roman', 'serif';margin-top:5px; margin-bottom: 5px; background-color: #ffffff;" contenteditable="false" id="enhancrCard_1" class="link-enhancr-attachment link-enhancr-element"><table class="link-enhancr-element" cellspacing="0" cellpadding="0" border="0" style="width:450px; height:170px; position: relative; display: block;" id="yui_3_16_0_1_1419661062940_30708"><tbody id="yui_3_16_0_1_1419661062940_30707"><tr class="link-enhancr-element" id="yui_3_16_0_1_1419661062940_30719"><td class="link-enhancr-element" colspan="8" style="height: 1px; background-color: #e5e5e5; font-size: 1px; border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_30718"><div class="link-enhancr-element" style="height: 1px; background-color: #e5e5e5; font-size: 1px; line-height:0px;" id="yui_3_16_0_1_1419661062940_30717"> </div></td></tr><tr class="link-enhancr-element" id="yui_3_16_0_1_1419661062940_30706"><td rowspan="5" class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt; border-collapse: collapse;"><div class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt;"> </div></td><td class="link-enhancr-element" rowspan="5" style="vertical-align: middle; width: 168px; height: 168px; background-color: #000000;border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_31582"><div class="link-enhancr-element" style="width: 168px;" align="center" id="yui_3_16_0_1_1419661062940_31581"><a href="http://www.breitbart.com/big-government/2014/12/24/first-cyber-war-was-the-sony-hack-a-warm-up-for-bigger-things-to-come/" class="link-enhancr-card-urlWrapper link-enhancr-element" style="text-decoration: none !important; color: #000000 !important;" id="yui_3_16_0_1_1419661062940_31580"><img alt="image" src="http://media.breitbart.com/media/2014/12/cyberwarfare-computer-Reuters.jpg" class="link-enhancr-thumbnail-image link-enhancr-element" width="168" height="126" style="display: block; margin: auto;" data-id="88f38442-9131-bf71-094c-cf2dfda4d0e7" id="yui_3_16_0_1_1419661062940_31579"></a></div></td><td rowspan="5" class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 0pt; border-collapse: collapse;"><div class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt;"> </div></td><td rowspan="5" class="link-enhancr-element" style="width: 14px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_31583"><div class="link-enhancr-element" style="width: 14px; background-color: #ffffff; font-size: 14pt;"> </div></td><td colspan="2" class="link-enhancr-element" style="height: 6px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_30716"><div class="link-enhancr-element" style="height: 6px; background-color: #ffffff; font-size: 6pt;" id="yui_3_16_0_1_1419661062940_30715"> </div></td><td rowspan="5" class="link-enhancr-element" style="width: 20px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_30705"><div class="link-enhancr-element" style="width: 20px; background-color: #ffffff; font-size: 20pt;" id="yui_3_16_0_1_1419661062940_31142"> </div></td><td class="link-enhancr-element" rowspan="5" width="1" style="width: 1px; background-color: #e5e5e5; font-size: 1pt; border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_31138"><div class="link-enhancr-element" style="width: 1px; background-color: #e5e5e5; font-size: 1pt;"> </div></td></tr><tr id="yui_3_16_0_1_1419661062940_30710"><td class="link-enhancr-element" colspan="2" style="width: 100%; vertical-align: middle; font-family: 'Georgia', 'Times', 'Times New Roman', 'serif';" id="yui_3_16_0_1_1419661062940_30709"><div class="link-enhancr-text-part link-enhancr-element" style="line-height:16.5px; background-color: #ffffff; height: 135px; width: 245px;" id="yui_3_16_0_1_1419661062940_30714"><div class="link-enhancr-element" style="word-wrap: break-word; word-break: break-all;" id="yui_3_16_0_1_1419661062940_30713"><span class="link-enhancr-element icon icon-shrink link-enhancr-toggle" id="yui_3_16_0_1_1419661062940_31140"></span><span class="link-enhancr-element icon icon-close link-enhancr-delete" id="yui_3_16_0_1_1419661062940_31139"></span><a href="http://www.breitbart.com/big-government/2014/12/24/first-cyber-war-was-the-sony-hack-a-warm-up-for-bigger-things-to-come/" class="link-enhancr-card-urlWrapper link-enhancr-element" style="text-decoration: none !important; color: #000000 !important; line-height: 100%; font-size: 18px; display: block;" id="yui_3_16_0_1_1419661062940_30712"><span class="link-enhancr-element link-enhancr-card-title" style="margin: 0; font-weight: normal;margin-bottom: 3px; font-size: 18px; line-height: 21px; max-height: 43px; color: #000000; overflow: hidden !important; display: inline-block;" id="yui_3_16_0_1_1419661062940_30711">First Cyber War: Was the Sony Hack a Warm-Up for Bigger ...</span></a><div style="font-size: 13px; line-height: 20px; color: #999999; max-height: 81px; font-family: 'Georgia', 'Times', 'Times New Roman', 'serif';overflow: hidden;" class="link-enhancr-card-description link-enhancr-element" id="yui_3_16_0_1_1419661062940_31141">Sony Pictures decided to authorize a limited release of "The Interview" after criticism for caving in to the demands a hacker group.</div></div></div></td></tr><tr id="yui_3_16_0_1_1419661062940_31586"><td colspan="2" class="link-enhancr-element" style="height: 4px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_31585"><div class="link-enhancr-element" style="height: 4px; background-color: #ffffff; font-size: 4pt;" id="yui_3_16_0_1_1419661062940_31584"></div></td></tr><tr id="yui_3_16_0_1_1419661062940_31589"><td class="link-enhancr-element" style="vertical-align: middle; font-family: 'Arial', 'Helvetica Neue', 'Helvetica', 'sans-serif';"><div class="link-enhancr-element" style="font-size: 0pt;"><a href="http://www.breitbart.com/big-government/2014/12/24/first-cyber-war-was-the-sony-hack-a-warm-up-for-bigger-things-to-come/" class="link-enhancr-card-url link-enhancr-element" style="color: black; text-decoration: none !important;cursor:pointer !important;" target="_blank"><span class="link-enhancr-element link-enhancr-view-on" style="display: inline-block; line-height: 11px; max-width: 145px; min-width: 85px; overflow: hidden; max-height: 13px; word-break: break-all;" id="yui_3_16_0_1_1419661062940_30703"><span class="link-enhancr-element link-enhancr-mobile-no-resize" style="vertical-align:middle; font-size: 9px; line-height: 11px; color: #999999; -moz-text-size-adjust: none; -ms-text-size-adjust: none; -webkit-text-size-adjust:none; text-size-adjust:none;">View on <span style="font-weight: bold" class="link-enhancr-view-on-domain">www.breitbart.com</span></span></span></a></div></td><td class="link-enhancr-element" style="vertical-align: middle; width: 100px; font-family: 'Arial', 'Helvetica Neue', 'Helvetica', 'sans-serif';" id="yui_3_16_0_1_1419661062940_31588"><div class="link-enhancr-element link-enhancr-preview-wrapper" style="max-width: 100px; min-width: 80px; overflow: hidden; text-align: right; line-height: 11px; max-height: 13px; font-size: 0pt;" id="yui_3_16_0_1_1419661062940_31587"><span class="link-enhancr-element link-enhancr-preview-by link-enhancr-mobile-no-resize" style="vertical-align:middle; font-size: 9px; line-height: 11px; color: #999999; -moz-text-size-adjust: none; -ms-text-size-adjust: none; -webkit-text-size-adjust:none; text-size-adjust:none;" id="yui_3_16_0_1_1419661062940_31590">Preview by Yahoo</span></div></td></tr><tr id="yui_3_16_0_1_1419661062940_31593"><td colspan="2" class="link-enhancr-element" style="height: 9px; background-color: #ffffff; font-size: 0pt; border-collapse: collapse;" id="yui_3_16_0_1_1419661062940_31592"><div class="link-enhancr-element" style="height: 9px; background-color: #ffffff; font-size: 9pt;" id="yui_3_16_0_1_1419661062940_31591"></div></td></tr><tr class="link-enhancr-element"><td class="link-enhancr-element" colspan="8" style="height: 1px; background-color: #e5e5e5; font-size: 1px; border-collapse: collapse;"><div class="link-enhancr-element" style="height: 1px; background-color: #e5e5e5; font-size: 1px; line-height:0px"> </div></td></tr></tbody></table></div><div id="yui_3_16_0_1_1419661062940_29011"> </div><div id="yui_3_16_0_1_1419661062940_29011" dir="ltr"><font face="times new roman, new york, times, serif" size="3"><br></font></div><div id="yui_3_16_0_1_1419661062940_29011" dir="ltr"><br></div><div id="yui_3_16_0_1_1419661062940_29011"><font size="2" id="yui_3_16_0_1_1419661062940_29020"><span style="font-family:times, serif;" id="yui_3_16_0_1_1419661062940_29019">----------------------------------------------------------------------------------------------</span><br style="font-family:times, serif;"></font><font size="2" id="yui_3_16_0_1_1419661062940_29016"><span style="font-family:times, serif;" id="yui_3_16_0_1_1419661062940_29018">Matunda Nyanchama, PhD, CISSP; mnyanchama@aganoconsulting.com</span><br style="font-family:times, serif;"><span style="font-family:times, serif;" id="yui_3_16_0_1_1419661062940_29191">Agano Consulting Inc.; </span><a rel="nofollow" style="font-family:times, serif;" target="_blank" href="http://www.aganoconsulting.com/" id="yui_3_16_0_1_1419661062940_29017">www.aganoconsulting.com</a>; </font><font class="Apple-style-span" size="2" id="yui_3_16_0_1_1419661062940_29015">Twitter: <a rel="nofollow" target="_blank" href="http://twitter.com/#%21/nmatunda" id="yui_3_16_0_1_1419661062940_29014"><span class="yshortcuts" id="lw_1298476732_5" style="color:rgb(54, 99, 136);">nmatunda; </span></a></font><font class="Apple-style-span" size="2" id="yui_3_16_0_1_1419661062940_29013"><span style="text-decoration:underline;"></span>Skype: okiambe</font><font size="2" id="yui_3_16_0_1_1419661062940_29168"><br style="font-family:times, serif;"><span style="font-family:times, serif;" id="yui_3_16_0_1_1419661062940_29167">----------------------------------------------------------------------------------------------</span></font></div><div style="font-family:times, serif;" id="yui_3_16_0_1_1419661062940_29166"><font size="2" id="yui_3_16_0_1_1419661062940_29192">Manage your ICT risks</font><span style="line-height:1.22;font-size:10pt;" id="yui_3_16_0_1_1419661062940_29265">! We are the experts you need! The trusted partners you deserve!</span></div><div id="yui_3_16_0_1_1419661062940_29194"><span style="font-family:times, serif;" id="yui_3_16_0_1_1419661062940_29193"><span style="font-size:10pt;" id="yui_3_16_0_1_1419661062940_29196">Call: <span style="font-weight:bold;" id="yui_3_16_0_1_1419661062940_29195">+1-888-587-1150 (Canada) +254-20-267-0743 (Kenya) </span>or <a rel="nofollow" id="yui_3_16_0_1_1419661062940_29720" href=""><span style="font-weight:bold;" id="yui_3_16_0_1_1419661062940_29719">info@aganoconsulting.com</span></a></span></span></div><div style="color:rgb(0, 0, 255);font-family:times, serif;" id="yui_3_16_0_1_1419661062940_29198"><span style="line-height:16px;font-weight:bold;" id="yui_3_16_0_1_1419661062940_29197"><var id="yui-ie-cursor"></var>Licensed by Communications Authority of Kenya (CA)</span></div><div style="color:rgb(0, 0, 255);font-family:times, serif;font-style:italic;" id="yui_3_16_0_1_1419661062940_31594"><span style="font-size:10pt;"> </span>----------------------------------------------------------------------------------------------<span lang="EN-CA"></span></div><div><span style="font-family:times, serif;"><div class="MsoPlainText">"The best revenge is massive success" - Frank Sinatra<span style="font-style:italic;"></span></div></span><span style="font-family:times, serif;">-----------------------------------------------------------------------------------------------</span><br style="font-family:times, serif;"><font size="1" style="font-family:times, serif;">This e-mail, including attachments, may be privileged and may contain confidential or proprietary information intended only for the addressee(s). Any other distribution, copying, use, or disclosure is unauthorized and strictly prohibited. If you have received this message in error, please notify the sender immediately by reply e-mail and permanently delete the message, including any attachments, without making a copy. Thank you.</font><br></div></div></div></body></html>