Showing posts with label tied. Show all posts
Showing posts with label tied. Show all posts

Thursday, March 6, 2014

NYC Sees Rash of Rare Infections Tied to Seafood

NYC Sees Rash of Rare Infections Tied to Seafood
http://pixel.quantserve.com/pixel/p-89EKCgBk8MZdE.gif


(Newser) – Two things you never want to see linked: “outbreak” and “rare skin infection.” Unfortunately, that’s apparently the case in New York City, where some 30 people who bought seafood in Chinatown markets over the last six months have found themselves battling “Mycobacterium marinum.” The city’s Health Department made the announcement yesterday, and painted a picture of the bacteria and how it operates: It enters the body via open wounds (so wearing gloves at home while prepping dinner is apparently a good preventative measure, notes the DOH) and causes bumps to appear under the skin; that morphs into a wound that won’t heal.


Symptoms can take weeks to show, and while the infection can turn serious and even require surgery, it’s easily fixable with a course of antibiotics. A not-so-appetizing assurance from the DOH: Any seafood that may be behind the infection is safe to eat. The New York Times reports the outbreak came to light after a Chinatown hand surgeon last week contacted the health department after seeing 15 patients with the infection, compared to a previous tally of about one patient a year; he believes most were infected after puncturing their skin with a fish bone. The city’s deputy commissioner for disease control noted that the bacterium is most commonly seen in fish and aquariums, not humans.




Health from Newser




Read more about NYC Sees Rash of Rare Infections Tied to Seafood and other interesting subjects concerning Health and Lifestyle at TheDailyNewsReport.com

Saturday, January 18, 2014

Mayor: Christie aides tied Sandy funds to project







FILE – In this Saturday, Aug. 8, 2009 file photograph, Hoboken Mayor, Dawn Zimmer speaks to the media as she stands near the Hudson River in Hoboken, N.J. Zimmer, mayor of a New Jersey city that sustained severe flooding from Hurricane Sandy claims the Christie administration withheld millions of dollars in recovery grants because she refused to sign off on a politically connected development. MSNBC first reported her comments Saturday. (AP Photo/Mel Evans,file)





FILE – In this Saturday, Aug. 8, 2009 file photograph, Hoboken Mayor, Dawn Zimmer speaks to the media as she stands near the Hudson River in Hoboken, N.J. Zimmer, mayor of a New Jersey city that sustained severe flooding from Hurricane Sandy claims the Christie administration withheld millions of dollars in recovery grants because she refused to sign off on a politically connected development. MSNBC first reported her comments Saturday. (AP Photo/Mel Evans,file)













Buy AP Photo Reprints







(AP) — The mayor of a New Jersey city that sustained severe flooding from Hurricane Sandy claims the Christie administration withheld millions of dollars in recovery grants because she refused to sign off on a politically connected development.


Hoboken Mayor Dawn Zimmer tells The Associated Press that Gov. Chris Christie’s lieutenant governor and a top community development official said recovery funds would flow to her city if the commercial development went forward. MSNBC first reported her comments Saturday.


Zimmer says Lt. Gov. Kim Guadagno (gwah-DON-yo) pulled her aside at a May event and told her unless the project is approved “we are not going to be able to help you.”


Christie is embroiled in another scandal involving traffic jams apparently manufactured to settle a political score.


Christie’s office did not return messages from the AP. Spokesman Michael Drewniak called Zimmer’s claims “outlandishly false” in a statement to MSNBC.


Associated Press




Politics Headlines



Mayor: Christie aides tied Sandy funds to project

Friday, December 20, 2013

Report: $10 million NSA contract tied influential security company RSA


By End the Lie


RSA products (Image credit: Travis Goodspeed/Flickr)

RSA products (Image credit: Travis Goodspeed/Flickr)



A $ 10 million National Security Agency (NSA) contract was arranged with computer security giant RSA with the goal of creating a back door into widely used encryption products, according to an exclusive Reuters report.

This comes after the Obama administration’s advisory panel criticized the NSA’s practice of undermining encryption. Previously, it was reported that the NSA and British GCHQ crack encryption and “covertly influence” companies and that encryption standards were weakened under NSA influence.


It was already revealed that the NSA created and distributed a random number generation formula that was intentionally flawed in order to create a back door into common encryption products.


Reuters also previously reported that RSA was the key distributor of the formula by placing it in “Bsafe,” a tool used to enhance computer security.


Yet the latest Reuters report published Friday reveals that “RSA received $ 10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract.”


Even before it was reported that RSA received millions in exchange for rolling out the flawed NSA formula, Reuters notes that some security experts were shocked.


RSA “had a long history of championing privacy and security, and it played a leading role in blocking a 1990s effort by the NSA to require a special chip to enable spying on a wide range of computer and communications products,” Reuters reports.


This, however, didn’t stop them from accepting what made up over one third of the yearly revenue at the relevant division of RSA in exchange for helping the NSA.


Unsurprisingly, RSA and their parent company EMC Corp, did not answer questions for the story. When the earlier reports were published, both companies urged customers to stop using the NSA formulas.


However, RSA issued a statement, saying the company “always acts in the best interest of its customers and under no circumstances does RSA design or enable any back doors in our products. Decisions about the features and functionality of RSA products are our own.”


Most of the dozen current and former employees of RSA interviewed by Reuters said the company made a mistake in agreeing to the NSA contract.


Many reportedly cited RSA’s shift away from pure cryptography products as one of the reasons it happened, though several said the company was misled by government officials.


“They did not show their true hand,” one anonymous individual briefed on the NSA-RSA deal said, referring to the NSA. The individual said that NSA officials did not say they knew how to break the encryption.


Just how accurate that is remains unknown. The NSA declined to comment for the Reuters report.


I’d love to hear your opinion, take a look at your story tips and even your original writing if you would like to get it published. I am also available for interviews on radio, television or any other format. Please email me at [email protected]


Please support alternative news and help us start paying contributors by donating, doing your shopping through our Amazon link or check out some must-have products at our store.





End the Lie – Independent News



Report: $10 million NSA contract tied influential security company RSA

Exclusive: Secret contract tied NSA and security industry pioneer




SAN FRANCISCO Fri Dec 20, 2013 7:17pm EST



A National Security Agency (NSA) data gathering facility is seen in Bluffdale, about 25 miles (40 km) south of Salt Lake City, Utah, December 16, 2013. Jim Urquhart/REUTERS

A National Security Agency (NSA) data gathering facility is seen in Bluffdale, about 25 miles (40 km) south of Salt Lake City, Utah, December 16, 2013. Jim Urquhart/


Credit: Reuters




SAN FRANCISCO (Reuters) – As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $ 10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned.


Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a “back door” in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.


Undisclosed until now was that RSA received $ 10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.


The earlier disclosures of RSA’s entanglement with the NSA already had shocked some in the close-knit world of computer security experts. The company had a long history of championing privacy and security, and it played a leading role in blocking a 1990s effort by the NSA to require a special chip to enable spying on a wide range of computer and communications products.


RSA, now a subsidiary of computer storage giant EMC Corp, urged customers to stop using the NSA formula after the Snowden disclosures revealed its weakness.


RSA and EMC declined to answer questions for this story, but RSA said in a statement: “RSA always acts in the best interest of its customers and under no circumstances does RSA design or enable any back doors in our products. Decisions about the features and functionality of RSA products are our own.”


The NSA declined to comment.


The RSA deal shows one way the NSA carried out what Snowden’s documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using “commercial relationships” to advance that goal, but did not name any security companies as collaborators.


The NSA came under attack this week in a landmark report from a White House panel appointed to review U.S. surveillance policy. The panel noted that “encryption is an essential basis for trust on the Internet,” and called for a halt to any NSA efforts to undermine it.


Most of the dozen current and former RSA employees interviewed said that the company erred in agreeing to such a contract, and many cited RSA’s corporate evolution away from pure cryptography products as one of the reasons it occurred.


But several said that RSA also was misled by government officials, who portrayed the formula as a secure technological advance.


“They did not show their true hand,” one person briefed on the deal said of the NSA, asserting that government officials did not let on that they knew how to break the encryption.


STORIED HISTORY


Started by MIT professors in the 1970s and led for years by ex-Marine Jim Bidzos, RSA and its core algorithm were both named for the last initials of the three founders, who revolutionized cryptography. Little known to the public, RSA’s encryption tools have been licensed by most large technology companies, which in turn use them to protect computers used by hundreds of millions of people.


At the core of RSA’s products was a technology known as public key cryptography. Instead of using the same key for encoding and then decoding a message, there are two keys related to each other mathematically. The first, publicly available key is used to encode a message for someone, who then uses a second, private key to reveal it.


From RSA’s earliest days, the U.S. intelligence establishment worried it would not be able to crack well-engineered public key cryptography. Martin Hellman, a former Stanford researcher who led the team that first invented the technique, said NSA experts tried to talk him and others into believing that the keys did not have to be as large as they planned.


The stakes rose when more technology companies adopted RSA’s methods and Internet use began to soar. The Clinton administration embraced the Clipper Chip, envisioned as a mandatory component in phones and computers to enable officials to overcome encryption with a warrant.


RSA led a fierce public campaign against the effort, distributing posters with a foundering sailing ship and the words “Sink Clipper!”


A key argument against the chip was that overseas buyers would shun U.S. technology products if they were ready-made for spying. Some companies say that is just what has happened in the wake of the Snowden disclosures.


The White House abandoned the Clipper Chip and instead relied on export controls to prevent the best cryptography from crossing U.S. borders. RSA once again rallied the industry, and it set up an Australian division that could ship what it wanted.


“We became the tip of the spear, so to speak, in this fight against government efforts,” Bidzos recalled in an oral history.


RSA EVOLVES


RSA and others claimed victory when export restrictions relaxed.


But the NSA was determined to read what it wanted, and the quest gained urgency after the September 11, 2001 attacks.


RSA, meanwhile, was changing. Bidzos stepped down as CEO in 1999 to concentrate on VeriSign, a security certificate company that had been spun out of RSA. The elite lab Bidzos had founded in Silicon Valley moved east to Massachusetts, and many top engineers left the company, several former employees said.


And the BSafe toolkit was becoming a much smaller part of the company. By 2005, BSafe and other tools for developers brought in just $ 27.5 million of RSA’s revenue, less than 9% of the $ 310 million total.


“When I joined there were 10 people in the labs, and we were fighting the NSA,” said Victor Chan, who rose to lead engineering and the Australian operation before he left in 2005. “It became a very different company later on.”


By the first half of 2006, RSA was among the many technology companies seeing the U.S. government as a partner against overseas hackers.


New RSA Chief Executive Art Coviello and his team still wanted to be seen as part of the technological vanguard, former employees say, and the NSA had just the right pitch. Coviello declined an interview request.


An algorithm called Dual Elliptic Curve, developed inside the agency, was on the road to approval by the National Institutes of Standards and Technology as one of four acceptable methods for generating random numbers. NIST’s blessing is required for many products sold to the government and often sets a broader de facto standard.


RSA adopted the algorithm even before NIST approved it. The NSA then cited the early use of Dual Elliptic Curve inside the government to argue successfully for NIST approval, according to an official familiar with the proceedings.


RSA’s contract made Dual Elliptic Curve the default option for producing random numbers in the RSA toolkit. No alarms were raised, former employees said, because the deal was handled by business leaders rather than pure technologists.


“The labs group had played a very intricate role at BSafe, and they were basically gone,” said labs veteran Michael Wenocur, who left in 1999.


Within a year, major questions were raised about Dual Elliptic Curve. Cryptography authority Bruce Schneier wrote that the weaknesses in the formula “can only be described as a back door.”


After reports of the back door in September, RSA urged its customers to stop using the Dual Elliptic Curve number generator.


But unlike the Clipper Chip fight two decades ago, the company is saying little in public, and it declined to discuss how the NSA entanglements have affected its relationships with customers.


The White House, meanwhile, says it will consider this week’s panel recommendation that any efforts to subvert cryptography be abandoned.


(Reporting by Joseph Menn; Editing by Jonathan Weber and Grant McCool)





Reuters: Top News



Exclusive: Secret contract tied NSA and security industry pioneer

Exclusive: Secret contract tied NSA and security industry pioneer




SAN FRANCISCO Fri Dec 20, 2013 7:48pm EST



A National Security Agency (NSA) data gathering facility is seen in Bluffdale, about 25 miles (40 km) south of Salt Lake City, Utah, December 16, 2013. Jim Urquhart/REUTERS

A National Security Agency (NSA) data gathering facility is seen in Bluffdale, about 25 miles (40 km) south of Salt Lake City, Utah, December 16, 2013. Jim Urquhart/


Credit: Reuters




SAN FRANCISCO (Reuters) – As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $ 10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned.


Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a “back door” in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.


Undisclosed until now was that RSA received $ 10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.


The earlier disclosures of RSA’s entanglement with the NSA already had shocked some in the close-knit world of computer security experts. The company had a long history of championing privacy and security, and it played a leading role in blocking a 1990s effort by the NSA to require a special chip to enable spying on a wide range of computer and communications products.


RSA, now a subsidiary of computer storage giant EMC Corp, urged customers to stop using the NSA formula after the Snowden disclosures revealed its weakness.


RSA and EMC declined to answer questions for this story, but RSA said in a statement: “RSA always acts in the best interest of its customers and under no circumstances does RSA design or enable any back doors in our products. Decisions about the features and functionality of RSA products are our own.”


The NSA declined to comment.


The RSA deal shows one way the NSA carried out what Snowden’s documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using “commercial relationships” to advance that goal, but did not name any security companies as collaborators.


The NSA came under attack this week in a landmark report from a White House panel appointed to review U.S. surveillance policy. The panel noted that “encryption is an essential basis for trust on the Internet,” and called for a halt to any NSA efforts to undermine it.


Most of the dozen current and former RSA employees interviewed said that the company erred in agreeing to such a contract, and many cited RSA’s corporate evolution away from pure cryptography products as one of the reasons it occurred.


But several said that RSA also was misled by government officials, who portrayed the formula as a secure technological advance.


“They did not show their true hand,” one person briefed on the deal said of the NSA, asserting that government officials did not let on that they knew how to break the encryption.


STORIED HISTORY


Started by MIT professors in the 1970s and led for years by ex-Marine Jim Bidzos, RSA and its core algorithm were both named for the last initials of the three founders, who revolutionized cryptography. Little known to the public, RSA’s encryption tools have been licensed by most large technology companies, which in turn use them to protect computers used by hundreds of millions of people.


At the core of RSA’s products was a technology known as public key cryptography. Instead of using the same key for encoding and then decoding a message, there are two keys related to each other mathematically. The first, publicly available key is used to encode a message for someone, who then uses a second, private key to reveal it.


From RSA’s earliest days, the U.S. intelligence establishment worried it would not be able to crack well-engineered public key cryptography. Martin Hellman, a former Stanford researcher who led the team that first invented the technique, said NSA experts tried to talk him and others into believing that the keys did not have to be as large as they planned.


The stakes rose when more technology companies adopted RSA’s methods and Internet use began to soar. The Clinton administration embraced the Clipper Chip, envisioned as a mandatory component in phones and computers to enable officials to overcome encryption with a warrant.


RSA led a fierce public campaign against the effort, distributing posters with a foundering sailing ship and the words “Sink Clipper!”


A key argument against the chip was that overseas buyers would shun U.S. technology products if they were ready-made for spying. Some companies say that is just what has happened in the wake of the Snowden disclosures.


The White House abandoned the Clipper Chip and instead relied on export controls to prevent the best cryptography from crossing U.S. borders. RSA once again rallied the industry, and it set up an Australian division that could ship what it wanted.


“We became the tip of the spear, so to speak, in this fight against government efforts,” Bidzos recalled in an oral history.


RSA EVOLVES


RSA and others claimed victory when export restrictions relaxed.


But the NSA was determined to read what it wanted, and the quest gained urgency after the September 11, 2001 attacks.


RSA, meanwhile, was changing. Bidzos stepped down as CEO in 1999 to concentrate on VeriSign, a security certificate company that had been spun out of RSA. The elite lab Bidzos had founded in Silicon Valley moved east to Massachusetts, and many top engineers left the company, several former employees said.


And the BSafe toolkit was becoming a much smaller part of the company. By 2005, BSafe and other tools for developers brought in just $ 27.5 million of RSA’s revenue, less than 9% of the $ 310 million total.


“When I joined there were 10 people in the labs, and we were fighting the NSA,” said Victor Chan, who rose to lead engineering and the Australian operation before he left in 2005. “It became a very different company later on.”


By the first half of 2006, RSA was among the many technology companies seeing the U.S. government as a partner against overseas hackers.


New RSA Chief Executive Art Coviello and his team still wanted to be seen as part of the technological vanguard, former employees say, and the NSA had just the right pitch. Coviello declined an interview request.


An algorithm called Dual Elliptic Curve, developed inside the agency, was on the road to approval by the National Institutes of Standards and Technology as one of four acceptable methods for generating random numbers. NIST’s blessing is required for many products sold to the government and often sets a broader de facto standard.


RSA adopted the algorithm even before NIST approved it. The NSA then cited the early use of Dual Elliptic Curve inside the government to argue successfully for NIST approval, according to an official familiar with the proceedings.


RSA’s contract made Dual Elliptic Curve the default option for producing random numbers in the RSA toolkit. No alarms were raised, former employees said, because the deal was handled by business leaders rather than pure technologists.


“The labs group had played a very intricate role at BSafe, and they were basically gone,” said labs veteran Michael Wenocur, who left in 1999.


Within a year, major questions were raised about Dual Elliptic Curve. Cryptography authority Bruce Schneier wrote that the weaknesses in the formula “can only be described as a back door.”


After reports of the back door in September, RSA urged its customers to stop using the Dual Elliptic Curve number generator.


But unlike the Clipper Chip fight two decades ago, the company is saying little in public, and it declined to discuss how the NSA entanglements have affected its relationships with customers.


The White House, meanwhile, says it will consider this week’s panel recommendation that any efforts to subvert cryptography be abandoned.


(Reporting by Joseph Menn; Editing by Jonathan Weber and Grant McCool)






Reuters: Politics



Exclusive: Secret contract tied NSA and security industry pioneer

Wednesday, October 23, 2013

Docs: Dead marathon suspect tied to 2011 killings



(AP) — Slain Boston Marathon bombing suspect Tamerlan Tsarnaev was named as a participant in an earlier triple homicide by a man who was subsequently shot to death while being questioned by authorities, according to a filing made by federal prosecutors in the case against his brother, surviving bombing suspect Dzhokhar Tsarnaev.


According to the filing made Monday, Ibragim Todashev told investigators Tamerlan Tsarnaev participated in a triple slaying in Waltham on Sept. 11, 2011.


In that case, three men were found in an apartment with their necks slit and their bodies reportedly covered with marijuana. One of the victims was a boxer and friend of Tamerlan Tsarnaev.


Todashev, a 27-year-old mixed martial arts fighter, was fatally shot at his Orlando home during a meeting with an FBI agent and two Massachusetts state troopers in May, authorities said. He had turned violent while being question, according to authorities.


The filing is prosecutors’ attempt to block Dzhokhar Tsarnaev from getting certain information from authorities, including investigative documents associated with the Waltham slayings.


“The government has already disclosed to Tsarnaev that, according to Todashev, Tamerlan Tsarnaev participated in the Waltham triple homicide,” prosecutors wrote.


According to prosecutors, the ongoing investigation into the 2011 slayings is reason not to allow Dzhokhar Tsarnaev access to the documents he’s seeking.


“Any benefit to Tsarnaev of knowing more about the precise ‘nature and extent’ of his brother’s involvement does not outweigh the potential harm of exposing details of an ongoing investigation into an extremely serious crime, especially at this stage of the proceeding,” prosecutors wrote.


Prosecutors also said Dzhokhar Tsarnaev is not entitled to the information because his brother’s criminal history will be relevant, if at all, only at a possible future sentencing hearing.


A phone message left for a spokeswoman for the U.S. Attorney’s Office was not immediately returned Tuesday night. A message left for Dzhokhar Tsarnaev’s federal public defender was also not immediately returned.


Authorities allege that Dzhokhar Tsarnaev, 20, and 26-year-old Tamerlan Tsarnaev, ethnic Chechens from Russia, planned and carried out the twin bombings near the finish of the marathon on April 15. Three people were killed and more than 260 were injured.


Dzhokhar Tsarnaev faces 30 federal charges, including using a weapon of mass destruction and 16 other charges that carry the possibility of the death penalty.


Tamerlan Tsarnaev died in a gunbattle with police as authorities closed in on the brothers several days after the bombings.


Associated Press




Top Headlines



Docs: Dead marathon suspect tied to 2011 killings

Thursday, July 11, 2013

ECB hasn"t tied its hands with guidance, says Weidman


Germany

Germany’s federal reserve Bundesbank President Jens Weidmann poses in front of the Bundesbank headquarters during a photo shoot with Reuters in Frankfurt May 17, 2013.


Credit: Reuters/Kai Pfaffenbach





MUNICH | Thu Jul 11, 2013 5:28am EDT



MUNICH (Reuters) – The European Central Bank has not “tied itself to the mast” with its use of forward guidance on low interest rates, and could raise them if inflationary pressures emerge in the future, ECB policymaker Jens Weidmann said on Thursday.


Abandoning its traditional policy of never pre-committing on future rates, the ECB said a week ago it would keep its interest rates at present or lower levels for an “extended period” – its first use of so-called forward guidance.


Markets are trying to assess how long this period could be.


The ECB offered some clarity in its monthly bulletin, also released on Thursday, saying forward guidance was consistent with, but not directly linked to, its decision in May to extend the full allotment liquidity policy until July 2014.


“The extended period of time over which the Governing Council currently expects the key ECB interest rates to remain at present or lower levels is a flexible horizon which does not pre-specify an end-date but is conditional on the Governing Council’s assessment of the economic fundamentals that determine underlying inflation,” it added in the bulletin.


In a speech in Munich Weidmann, a staunch defender of the ECB’s mandate to contain inflation, also stressed that the ECB’s monetary policy stance was conditional on economic developments.


He said the ECB’s expectation that interest rates would remain at record lows for an extended period was justified by a subdued inflation outlook and a weak economic environment.


But he added that the ECB’s policy move last week “is not a historic change in monetary policy communication” but simply an effort to give more guidance in a time of high uncertainty.


“It is not an absolute advanced commitment of the interest rate path,” he said in the text of his speech. “The ECB Council has not, like Odysseus, simply tied itself to the mast.”


Another ECB policymaker, Joerg Asmussen, said on Tuesday the “extended period” of forward guidance meant “… not six months, it’s not 12, it goes beyond.”


The ECB later on Tuesday issued a statement saying Asmussen had not intended to give any guidance on the exact length of time for which it expects to keep rates at record lows.


Weidmann said low rates “are not without side effects”.


“Even if these are justified for monetary policy, we may not close our eyes to them: they can lead to reforms and necessary structural changes being deferred. Financial stability risks can grow,” he said. “These side effects increase with time in the low interest rate phase.”


The ECB took the unprecedented step of using forward guidance last week in response to market volatility, which set in after the U.S. Federal Reserve last month set out a plan to begin slowing its stimulus.


In the monthly bulletin, the ECB also said that the scope for interest rate cuts had not been exhausted.


“The key ECB interest rates can be reduced further if warranted by the evolving outlook for price stability,” the central bank said.


Expressing satisfaction at the market reaction to its guidance move, the ECB said in its monthly bulletin that “after the Governing Council’s communication on 4 July the forward rates based on overnight index swaps have declined appreciably”.


(Reporting by Irene Preisinger, writing by Paul Carrel; Editing by Toby Chopra)





Reuters: Business News



ECB hasn"t tied its hands with guidance, says Weidman