Florida Fraud SIGTARP Troubled Asset Relief Program 2015-01-23 Brian Honea Demand Propels Home Prices Upward 2 days ago January 23, 2015 1,053 Views Governmental Measures Target Expanded Access to Affordable Housing 2 days ago Demand Propels Home Prices Upward 2 days ago Related Articles Governmental Measures Target Expanded Access to Affordable Housing 2 days ago Share Save Print This Post Florida Man Receives 21-Month Prison Sentence for Fraud A Florida man has been sentenced to 21 months in federal prison for a fraud scheme perpetrated against businesses and individuals seeking lines of credit, according to an announcement on Friday from Christy Romero, the Special Inspector General for the Troubled Asset Relief Program (SIGTARP).The sentence was handed down by U.S. District Judge Edward Chen to Michael Pitamber Ramdat, 30, of Palm Bay, Florida, on Wednesday, January 21, according to the announcement from SIGTARP and Melinda Haag, U.S. Attorney for the Northern District of California, and David J. Johnson, Special Agent in Charge of the FBI San Francisco Field Office. Ramdat was indicted on November 21, 2013, on five counts of wire fraud and one count of conspiracy. He pleaded guilty to all counts on June 11, 2014.Court documents stated that Ramdat and his business partner, Leigh Farrington Fiske, of Tampa, Florida, operated a business called Corporate Funding solutions, the purported purpose of which was to obtain lines of credit for customers who paid a fee. Fiske solicited customers for the business via the Internet and word of mouth, but the two men never intended to offer any services for the fees collected. Ramdat served as a “customer service” representative, where his job was to vouch for the legitimacy of the business with victims recruited by Fiske and to provide excuses to victims of the fraud.The two men collected about $433,000 from approximately 30 victims without obtaining lines of credit for them or providing any services at all. Ramdat admitted that he kept more than $200,000 of the money. The two men funneled monies they received from the scam through banks that received funding through TARP, according to the plea agreement.Last month, Fiske was sentenced by Judge Chen to 37 months in prison, which he will begin serving on March 31. In addition to the prison sentence, Ramdat was sentenced to three years of supervised release and ordered to pay restitution. He will begin serving his prison sentence immediately. Brian Honea’s writing and editing career spans nearly two decades across many forms of media. He served as sports editor for two suburban newspaper chains in the DFW area and has freelanced for such publications as the Yahoo! Contributor Network, Dallas Home Improvement magazine, and the Dallas Morning News. He has written four non-fiction sports books, the latest of which, The Life of Coach Chuck Curtis, was published by the TCU Press in December 2014. A lifelong Texan, Brian received his master’s degree from Amberton University in Garland. Servicers Navigate the Post-Pandemic World 2 days ago The Week Ahead: Nearing the Forbearance Exit 2 days ago Servicers Navigate the Post-Pandemic World 2 days ago The Best Markets For Residential Property Investors 2 days ago The Best Markets For Residential Property Investors 2 days ago Home / Daily Dose / Florida Man Receives 21-Month Prison Sentence for Fraud Data Provider Black Knight to Acquire Top of Mind 2 days ago in Daily Dose, Featured, Government, News Tagged with: Florida Fraud SIGTARP Troubled Asset Relief Program Data Provider Black Knight to Acquire Top of Mind 2 days ago Previous: Report: Investors Move Toward Potential Ocwen Lawsuit Next: DS News Webcast: Monday 1/26/2015 Subscribe About Author: Brian Honea Sign up for DS News Daily
By By: U.S. Army Major Jay H. Anson July 21, 2016 “The single biggest problem in communication is the illusionthat it has taken place.” – George Bernard Shaw Coalition building is a decades-old strategic challenge.Finding the right mix of interdependence, collaboration and cooperation amongallies is extremely complex. Writing from his Manila headquarters in September1940, General Douglas MacArthur likewise admonished national leaders regardingthe inherent dangers of coalition failure. The future dual-hatted SupremeCommander for the Allied Powers and Commander of United Nations Command inKorea wrote, ”The history of failure in war can be summed up in two words: TOOLATE; … too late in uniting all possible forces for resistance; too late instanding with one’s own friends.” Although commonly associated in militarywriting and research with the timeliness of logistics operations, GeneralMacArthur’s quote firmly applies to interoperability between informationsharing systems. The MacArthur Archives contain hundreds more similar messagessent between General MacArthur and the Joint Chiefs throughout World War II andthe Korean War stressing the importance of interoperability between coalitionforces. General Dwight D. Eisenhower made similar observations inhis own account of World War II, citing that allied effectiveness hinged on thedevelopment and employment of joint control capabilities. General Eisenhowerprovided as an information sharing example the timely distribution of AirReconnaissance photos across all Allied Forces headquarters within hours ofdevelopment. He stated that, “The key to the matter is a readiness, on highestlevels, to adjust all nationalistic differences that affect the strategicemployment of combined resources…” Twopremier U.S. strategists validated information sharing as paramount tocoalition victory. Over several decades, brilliant military minds continuouslytackled the complex joint issue of interoperability and cooperation amongallies. Dominating cyberspace to securely share information with U.S. allies isboth possible and vital to reestablishing American legitimacy as a genuinecoalition leader and international partner. Lessons Learned from a Decade of War The joint staff has well-documented the decline in coalitioninteroperability. U.S. innovation yielded incredible collaboration technologyin the seventy years since Eisenhower and MacArthur. Despite theseadvancements, outside access to actionable intelligence, fires coordination,target packages, and common operational pictures is currently limited in contrastwith the level of cooperation with World War II allies. DuringJoint-Interagency-Interdepartmental-Multinational (JIIM) operations,interoperability shortfalls breed divisiveness, add to the friction of war, andoften lead to catastrophe. Interoperability is a JIIM challenge highlighted inthe Defense Department’s Joint Professional Military Education (JPME) policiesas a key area for leader development. Research conducted by the Chairman of theJoint Chiefs of Staff Directorate for Joint Force Development (J7) revealssignificant interoperability shortfalls and data distribution challenges.Particularly, the Joint Center for Operational Analysis’ (JCOA) Decade of Warcompilation confirms DOD’s deficiencies. Of the eleven strategic themesdepicted in Figure 1, three directly apply to coalition information sharing: Narrative.The U.S. communicates goals and desired end states with coalition partners,inconsistently. Allies often feel part of a coalition in name only with noviable system for interoperability and information sharing. U.S. lead-nationstatus in a coalition is synonymous with “only nation” status and iscounterproductive.Adaptation.Mission command across a multinational coalition requires information sharingtechnology supporting a variety of doctrine, cultures, languages, and budgets.Findings revealed weaknesses in fratricide prevention, deployment planning andexecution, and coalition information sharing.CoalitionOperations. DoD contributions to the whole of government approach requiresrefinement. Unity of effort requires policies and processes that supportinteroperability during JIIM operations. The Decade of War study identifies interoperability as keyto achieving strategic wartime objectives in a JIIM operational environment.The DoD recently gained momentum in adapting data networking technology andposturing the military service to support the whole of government approach. Theongoing efforts towards interservice collaboration are equally applicable tomultinational coalitions. Unity of effort requires an information sharingnetwork that supports all coalition partners. The Cyber Security Paradigm Cyberspace and cyber security is fundamentally misunderstoodby the vast majority of DoD and U.S. government leaders. Misguided efforts toprotect the network often obscure the difference between controlling access andthe preventing proliferation by state or non-state adversaries. Many advocate avirtual “Cyberspace Curtain” around the Department of Defense InformationNetwork (DoDIN) is the best way to enforce network security policies. Manyleaders remain anchored to these solutions sets based on cyber securityconcerns. The U.S. only recently added cyberspace to the nationalnarrative. In January of 2012, President Barack Obama and Secretary of DefenseLeon Panetta refined strategic guidance directing the joint force “recalibrateits capabilities and make selective additional investments to succeed,” asstated in The Committee on National Security Systems (CNSS) Library. After athorough cyberspace threat analysis the following year, the U.S. NationalIntelligence Director designated cyberattack the number one strategic threat tothe country, surpassing terrorism, according to Joint Publication 2-0,Intelligence. The national security narrative classified the cyberspace domainas a national vulnerability under constant threat of catastrophic attack;prioritized protection, resiliency and survivability; and fostered a climate ofextreme cautiousness to excessive access, limited information sharing and evencomplete avoidance. The manner in which unclassified and classified networksare interconnected at multiple points throughout the internet makes DoDINinteraction with the global information grid problematic. The cyberspace domain is essentially based on the science ofmoving digital images between manmade devices via electromagnetic waves. Intoday’s connected world, state and non-state actors seek out vulnerabilities indata systems to exploit and attack. The enemy’s goal is to destroy, disrupt,deny, degrade and or steal data for economic, military or political gain. Thesecurity measures inherent with operating between the DoDIN and the globalinformation grid makes cyberspace operations extremely challenging. Deterrenceand other strategies successful in air, land and sea domains require patienceand experience during implementation, along with a basic knowledge of theenemy’s capabilities and technology required. It took DoD the entire span ofAmerican history and meticulous development of technology over time to dominatethe four original domains. In contrast, the universal nature of cyberspacefosters an unrealistic expectation of immediate domination despite the absenceof resident expertise or intelligence on enemy capabilities. The anxiety createdwith each reported cyberspace incident and exacerbated by overexposure in themedia results in a corresponding escalation of security concerns and calls forincreased defensive posture. The cyberspace domain is commonly portrayed as adangerous and non-permissive operational environment (Figure 2). With littlemention in mainstream media of defensive strategies implemented, one can assumethat a strategy either doesn’t exist or is not possible. In dealing with somany unknowns, national security experts advocate a virtual “cyberspacecurtain” to close off the DoDIN almost completely. Defense-oriented mindsetsresist adapting new technology in favor of hardening known system architectureagainst adversaries and often exclude allies in the process. A virtual cyberspacecurtain would increase the number of network devices, essentially addingpotential points of vulnerability enemies can target. Mitigating risk byadapting new technology is a sustainable strategy in other domains andabsolutely pertinent to cyberspace. U.S. Navy vessels enter the uncertainty ofinternational waters, contending with risks and vulnerabilities daily toprotect national interests. The Navy adapts technology and overcomes the seadomain’s host of threats to keep sailing and dominating international waters.The concept is similar to DoD users leaving the segregated, monitored, anddefended DoDIN to venture out into the global information grid. The majordifference is that cyberspace is based on precise mathematics compared tounpredictable oceanic and atmospheric conditions. DoDIN architects and leadersmust stay engaged, embracing new technology to outmaneuver adversaries anddominate the cyberspace domain. Adapt, Improvise, and Overcome Interoperability deteriorates when coalition leadersestablish barriers and elect not to innovate. DoD adaptation already underwayis critical to cyberspace domain dominance. Adjusting strategy, forcestructure, and infrastructure for cyberspace operations required revisitingDoD’s defensive focus. According to DISA, the Cyber Mission Force (CMF) emergedas America’s first responder for cyber defense. The CMF found initial cyberdefense measures markedly inadequate and Internet security an afterthought. Forgreater force structure, DoD tasked the director of the Defense InformationSystems Agency (DISA) with creating Joint force Headquarters (JFHQ) DoDIN todirect defensive cyberspace operations as a component of United States CyberCommand. The agency, according to DISA, provides DoDIN connectivity and enterpriseservices globally “to joint warfighters, national-level leaders, and othermission and coalition partners.” In short, DISA is responsible for networkcommunications during JIIM operations. The reorganization of DISA into a CMF and JFHQ supports theprocess of consolidating and collapsing the DoDIN into a shared enterpriseservice infrastructure called Joint Information Environment (JIE). The JIE goalis a single security structure using global network architecture easier tomonitor and defend (see Figure 3). The JIE framework protects informationsystems and enhances the capability to detect and react to security breaches,according to DoD. Adaptation started in 2011 includes networked operationscenters, cloud-based applications and services, and consolidated data centers.Nested with U.S. policy on cyberspace interoperability, DISA policy authorizescoalition partners to authenticate, collaborate and maneuver within the cloud. DoD Instruction 8520.03, “Identity Authentication forInformation Systems,” requires public key infrastructure (PKI) for bothauthentication and network encryption management. The sole requirement forDoDIN eligibility is, “…the trustworthiness or suitability determinationrequired for an individual to be granted a DoD network account should be inline with the background investigation requirement for conducting computeractivities.” By design, the policy focuses on credibility and appropriate levelof responsibility and not nationality. The language is clearly meant to facilitateaccess and not restrict it. DISA supports the whole of government approach by delivering connectivity and enterprise services to coalition partners, intergovernmental organizations, agencies, and industry. The strategic goal is to collapse today’s multiple networks (NIPRNET, SIPRNET, Coalition, etc.) into a single, interoperable network. Avoiding new technology and restricting access does not support the strategy. A more defensible DoDIN includes adapting PKI and cloud computing technology. DISA policy on interoperability aligns with DoD Chief Information Officer (CIO) guidance on the acquisition and use of commercial cloud computing. DISA and DoD policies drive the development of interoperable networking technologies to improve coalition performance, reliability, adaptability, and security. Recommendations Coalition partners accessing the DoDIN is not unprecedented. National Defense University (NDU) policy authorizes enrollment of international military students into the JPME program. JPME is one of the few areas of the international defense community where the U.S. interoperability narrative is so fully supported. Appendix D-A-1 of the NDU policy addresses administrative issues to include technology support whereby the provisions of DoD’s previously mentioned instructions on “Identity Authentication for Information Systems” apply. Each year hundreds of international students receive a first class education involving tactical, operational, and strategic levels of war. Each one is granted access to the DoDIN and use the same technology and resources as U.S. students. Existing information sharing systems require very little adaptation of technology. PKI adequately controls security and access to the areas of the DoDIN for U.S. and international students alike. NDU appears to organize its databases in a way similar to the mission threads used in Afghanistan. International military students fully access all information required to successfully operate as part of an academic coalition under the Seminar Group construct show in Figure 4 and undergo the same application process for DoDIN accounts. NDU’s structure provides a viable example for others to emulate. The JIE design fully supports interoperability and answersthe question regarding DoD response to cyberspace threats. Adaptation in land,air, and sea domains means building better tanks, planes, and ships. JIE doesthe same for the cyberspace domain. It is the future model for partnershipsbetween not only the four military services, but interagency, multinational,and beyond. Of JIE’s three lines of operation: governance, operations, andtechnical synchronization, the latter requires the most adaptation. Securingthe cyberspace infrastructure while cutting costs and preparing futuretechnology is challenging; the change required goes beyond implementingnext-generation capability. Joint leaders, must move past network-centricinformation sharing to a data-centric sharing strategy where the informationrequired is immediately available at the point of need, as stated in the report“ DoD Joint Information Enterprise report by David D. Vries, Deputy ChiefInformation Officer for DoD. As JIE continues to take shape, efficiencies andcost savings from the consolidation of redundant capabilities is the greatestbenefit. Hardware-based solutions require separate suites of expensiveequipment to separate traffic specific to each network. From a coalitioninteroperability standpoint, building separate paths to reach the sameinformation is counterproductive in a data-centric information environment. Conclusion The U.S. must improve its credibility as a world leader incoalition building. Sharing information with allies increases efficiency acrossdomains and geographic boundaries in today’s constrained fiscal environment.Empowering coalition partners through better interoperability is possible. Aslead nation in a number of ongoing coalitions, U.S. policy correctly remainsfocused on applying, aligning and communicating goals and desired end stateswith its allies. JIE’s construct is a way to put policy into practice. Emergingtechnology such as cloud computing and data-centric networks can satisfymultinational interoperability requirements.
The status of Silver & Networking Partner of the conference is held by the Croatian national carrier Croatia Airlines, which this year marks the 30th anniversary of its founding and which with its flights contributes to the positive trends in tourist traffic in Croatia. “Zagreb and all Croatian cities to which our planes fly are exceptional tourist destinations and places with a rich tradition of health tourism. The entire network of Croatia Airlines flights during the tourist season, as well as in the off-season in which there is significant potential for further growth, are an excellent basis for the development of health tourism and the national airline will continue to provide strong support in this area., said Slaven Zabo, commercial director of Croatia Airlines, adding that the airline directly connects Brussels with Zagreb with two flights a day, providing connecting flights to Dubrovnik, Pula, Split and Zadar. The importance of the Belgian market for Croatian tourism is also confirmed by Ivan Novak, director of the CNTB Representation for the Benelux area. “One of our main goals is to position Croatia as a quality year-round destination with a rich and diverse offer, but also as a recognizable health and tourist destination. A quality role is played by quality promotion and acquaintance of the market with the offer of health tourism in Croatia. That is why at the beginning of December we are organizing two study trips for journalists and travel agents specializing in the wellness and health segment. On that occasion, the most famous and most representative Croatian spas will be visited, such as Tuheljske and Krapinske toplice, Terme Jezerčica, and Terme Sveti Martin na Muri “, Novak pointed out. “We are extremely pleased to participate in the EHTI Summit this year as well, which was held in Croatia in two editions. On that occasion, we gathered more than 300 participants from all over the world, and we confirm our presence and importance in the segment of health tourism with the status of a partner country of this year’s edition of the Summit. I believe that this year, through the opening of the discussion, we will find common solutions and mechanisms in order to preserve the competitiveness of European health tourism. Through professional international gatherings such as this, we contribute to the further positioning of Croatia as a renowned destination for health tourism, which ultimately contributes to the further sustainable development of Croatian tourism as a whole.”, said the director of the Croatian Tourist Board Kristjan Staničić. The main topics of lectures and round tables of this year’s EHTI Summit are “Health tourism: an opportunity for growth”, “The future of sustainable health tourism in Europe – where are we today?” te “Health Tourism and Society 5.0 – What’s Next?” within which the Croatian national tourist information system will be presented eVisitor, whose quality is recognized in the world, which is confirmed by the award of the World Tourism Organization (UNWTO), which in 2018 declared eVisitor the third best tourism innovation in the world. It is the leading European conference on health tourism, which brings together about a hundred national and international experts and top lecturers and panelists. The Croatian National Tourist Board is the main partner of the ninth edition of the prestigious European Health Tourism Industry Summit (EHTI), which takes place this year on 20 and 21 November in Brussels. Source: CNTB
“It would be surreal for a sports minister to demonise football,” he said.“The majority of Italians do not welcome the resumption of the championship.“But I’m not looking at polls at the moment. Football is an important world in this country, I know it well compared to those who want to give a different message.“I hope to start again, but the government will decide. We will rely on scientific elements, which are not available today.“There is no opposition of mine, but the desire to evaluate the restart only if the health of the people within the team group is safeguarded.“If the government is forced, I hope not, to establish that there are no conditions (to resume), my effort will be twofold — limit the financial damage to clubs and support the whole world of sport.“Between ordinary and extraordinary resources, we will invest about one billion euros for the sector as a whole.”Share on: WhatsApp Aaron RamseyMilan, Italy | AFP | Welsh international Aaron Ramsey was the first Juventus player to return to individual training at the team’s sports centre in Turin on Tuesday as Cristiano Ronaldo began two weeks’ quarantine after returning to Italy.Ronaldo flew back to northern Italy by private jet on Monday night after almost two months in coronavirus lockdown in his native Portugal.Midfielder Ramsey joined Juventus this season after 11 years with Arsenal, and scored his fourth goal in their last game against Inter Milan behind closed doors before the championship was suspended on March 10.Champions Juventus are leading Serie A, one point ahead of Lazio, as they target a ninth consecutive Scudetto.Captain Giorgio Chiellini followed shortly after Ramsey, with fellow Italy defender Leonardo Bonucci, wearing a black face mask, arriving later in the afternoon.Italy’s interior ministry has given the go-ahead for players to return to club training facilities two weeks ahead of schedule, offering a glimmer of hope that the 2019-20 season might yet be saved.But sports minister Vincenzo Spadafora warned that training in groups must wait until May 18, and it remains uncertain whether matches can restart as the country battles a pandemic which has killed over 29,000.“A realistic prediction can be made in mid-May,” Spadafora said in an interview with Corriere della Sera on Tuesday, denying that he wanted to call a halt to the season.
Tesla founder and technology entrepreneur Elon Musk just received an intriguing offer from a municipality along our coast.He has been in disagreement with county officials in California over reopening his car factory there following the coronavirus pandemic.Last Monday, Musk announced he plans to restart production at his Tesla plant against the rules in Alameda County, Calif.Musk had also tweeted last weekend that he would move Tesla’s headquarters to Texas or Nevada immediately.Frankly, this is the final straw. Tesla will now move its HQ and future programs to Texas/Nevada immediately. If we even retain Fremont manufacturing activity at all, it will be dependen on how Tesla is treated in the future. Tesla is the last carmaker left in CA.— Elon Musk (@elonmusk) May 9, 2020 The mayor also asks Musk to call him and hopes he will have “an opportunity to make our pitch.”It is not known whether Musk has seen the letter or if he is even considering our state for business. The city of Port St. Lucie is offering to help end the dispute, by inviting Musk to bring his business to the Treasure Coast.In a formal letter tweeted by the city on Thursday, Mayor Gregory Oravec explained that Port St. Lucie would make a great location for the company, given its proximity to Musk’s SpaceX launch center.The letter promotes Port St. Lucie’s manufacturing space, as well as Florida’s generous tax structure.“I think you will find us eager to cut red tape and willing to foster true collaboration in good times and in bad,” Oravec says in the letter.Hi @elonmusk, please find the following letter from our mayor. Check out @CityPortStLucie! pic.twitter.com/X1OUmshMQy— Port St. Lucie (@CityPortStLucie) May 14, 2020
By Matt Lobosco |MIDDLETOWN – After years of fighting to recover from Super Storm Sandy, the Leonardo boating community took a huge step in its recovery from the storm.On Saturday, June 10, officials from the Department of Environmental Protection (DEP) joined boaters, local officials and summer visitors to celebrate National Marina Day by unveiling the marina’s new office building. The day-long event began with a ribbon-cutting ceremony for the building and included kayak tours, and craft and food vendors.Open since 1963, Leonardo State Marina is one of New Jersey’s six state marinas. The 17-acre facility along the shores of Sandy Hook Bay provides 176 berths for boaters as well as numerous educational programs for young people during the summer. However, several structures which provided services crucial to the operation of the marina were completely destroyed by Sandy, including its garage, its office, and its public restrooms.Now the marina has a brand new building to provide virtually all the services lost from the storm. Along with restoring office space for the marina staff, the building provides new showers, bathrooms, a lobby area and a multipurpose room including a kitchenette, tables and chairs.The one-story structure stands across from the marina on the other side of Concord Avenue, which runs the length of the harbor.(Left to right) Robert DeCotiis of Master Consulting Engineers, Ed Mulvane of the Department of Property Management and Construction, Ron Sebring of Ronald A. Sebring Associates, LLC, Monmouth County Freeholder Serena DiMaso, DEP Assistant Commissioner Rich Boornazian and Superintendent of Parks and Forestry Maggie Mitchell gather to cut the ribbon to signify the official opening of the new office building.“This marina has been here for years. If you took a ride up the coast here, the boats all got lifted up and corralled and a lot of them were out of the water. This place was devastated,” said Richard Boornazian, DEP assistant commissioner. “We think this is a vibrant community. So it’s not only a service, it’s an amenity to have this marina here. This is a great boating community and we want to keep it here.”Boornazian said he was at the marina two days after the storm and could not believe the devastation. He emphasized his excitement over the hard work of the staff and the enthusiasm of the community for getting the office built. For as destructive as Sandy was, the staff and the town saw this as an opportunity to make the marina even better.Maggie Mitchell, superintendent of the parks and forestry division of the DEP, shared Boornazian’s outlook. “Opening this building and getting this open benefits everyone in the community,” she said.Ronald Sebring, owner of Ronald A. Sebring Associates, LLC and creator of the blueprint for architecture of the office building, echoed the feelings of the marina staff about the opportunity brought on by this project. He said he believed the facilities that existed prior to Sandy had many issues that were essentially being covered with Band-Aids. Sebring said the facilities “in my mind needed updating” and Sandy brought an opportunity to fix those issues.Perhaps the new building can serve as a small silver lining in what has been a difficult recovery from Sandy. After five years of looking for a source of stimulation and excitement, the Leonardo community appears galvanized by the construction of the marina’s new office building.“This is a great community. I love the way things turned out. This building will last for a very long time,” Boornazian said.This article was first published in the June 15-June 22, 2017 print edition of The Two River Times.
The goal for the summer is to have a good portion of the skiable terrain in the Backside area developed, creating a combination of 8 selectively logged and gladed runs which will offer great fall line skiing and an overall unique mountain experience. “We have our license to develop the ski runs and have selected Juggernaut Development Inc. to do the work” says Outdoor Operations Manager Kirk Jensen. “This summer we will focus mechanical harvesting on the area to the skiers left of the chair with further gladed advanced /expert tree skiing developed to the skier’s right of the lift line. We plan to start on the lift line first to allow the lift installation crew access and then proceed with the remainder over the summer.”The harvesting of the Backside area will be spread over two years and, once complete, the Glory Ridge Chairlift will service a total of 303 hectares consisting of 18 gladed, treed and groomed runs of primarily intermediate and advanced / expert terrain. The expansion will effectively double the developed ski terrain at Whitewater with an increase of total vertical drop to 2,042 feet. This summer, Whitewater Ski Resort plans to install its new Glory Ridge Chair. The chair was formerly identified as the BS1 lift in the Master Plan, and will service the terrain currently referred to as the Backside. “The mountain crew, in cooperation with mother nature, hope to have the lift ready to load as conditions permit this coming season” says General Manager Brian Cusack.The Dopplemayr triple chair has been purchased from Vail Resort in Colorado and is on route to Nelson. The British Columbia based Summit Lift Company, headed by Randy Gliege, a 25 year veteran in the ski lift business, has been contracted to do the lift installation. His crew will consist of a mix between local and out of area, experienced ski industry workers.
Despite being only in Grade 10, Kyra Makortoff is no stranger to the big stage, having played at the 2012 B.C. Summer Games in Surrey.And that confidence has allowed 5’6” Makortoff has fit right in with the older players.“Among other contributions to our team, Kyra’s back row play and serve have been a source of personal pride throughout her volleyball career,” said the Senior Girl’s Player profile guide.Like many of her teammates, Makortoff is excited to be the host school for the event. While realizing it’s a big undertaking to play host to 15 other teams and more than 200 athletes and coaches, life is good when you don’t need to hop a bus or pack a suitcase. “It’s going to be pretty exciting to play in front of the home crowd and, at the same time, we get to sleep in our own beds,” the country music fan said.Despite getting into volleyball late by South Slocan standards — in Grade 7 — the sport Makortoff quickly became part of the culture at Mount Sentinel.So playing for the Cats was just another stepping stone in her net career.“I really like the sport because it allows me to focus on something that I enjoy doing while as the same time takes my mind off (other) things,” the 15-year-old Makortoff explained.That enjoyment allows Makortoff to have no problem attending two to three practices per week during the season as well as participate in the club season.The tournament begins Wednesday with round robin play at both LVR and Selkirk College gymnasiums.The momentum and excitement continues to build, and next week, the pressure promises to increase for the Wildcats as the tournament nears.“Ya there’s pressure on us,” Makortoff admits. “Our school is known for winning volleyball championships more than once.”Despite that pressure, Makortoff has a different focus entering the final tournament of the season.“Obviously, everyone’s goal on our team is to win because winning is big but mainly (my goal) is to play my best and enjoy the last year with the Grade 12s on the team.” In less than a week the Mount Sentinel Wildcats will host the B.C. High School A Girl’s Volleyball Championships (November 28-December 1) at the Selkirk College and L.V. Rogers gymnasiums.Hosting the provincial event is nothing new to the South Slocan-based school as Mount Sentinel has been the feature site of the provincial tournament eight times since 1991 and has won four titles since 1997, the last coming in 2007.Mount Sentinel, currently ranked third in the province at the Single-A Girl’s Division, has not experienced that much success on the big stage of late.However, the players are hopeful home court advantage will power the squad to the top of the heap when the prestigious Blue Banner is awarded to the winning team on the evening of December 1.Before the first serve is taken, The Nelson Daily Sports Editor Bruce Fuhr is getting readers into the provincial spirit with a series of profiles on the 2012 Mount Sentinel Wildcats.Today we feature Grade 10 right side Kyra Makortoff.