<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="3.10.0">Jekyll</generator><link href="https://goldmanmalka.com/https://goldmanmalka.com/feed.xml" rel="self" type="application/atom+xml" /><link href="https://goldmanmalka.com/https://goldmanmalka.com/" rel="alternate" type="text/html" /><updated>2026-03-11T09:00:37+00:00</updated><id>https://goldmanmalka.com/https://goldmanmalka.com/feed.xml</id><title type="html">Goldmanmalka.com</title><subtitle>An online notepad</subtitle><author><name>Eran Goldman-Malka</name></author><entry><title type="html">AI Layoffs Are Often a Strategy Shortcut, Not a Strategy</title><link href="https://goldmanmalka.com/https://goldmanmalka.com/ai-layoffs-are-a-strategy-shortcut/" rel="alternate" type="text/html" title="AI Layoffs Are Often a Strategy Shortcut, Not a Strategy" /><published>2026-03-10T09:00:00+00:00</published><updated>2026-03-10T09:00:00+00:00</updated><id>https://goldmanmalka.com/https://goldmanmalka.com/ai-layoffs-are-a-strategy-shortcut</id><content type="html" xml:base="https://goldmanmalka.com/https://goldmanmalka.com/ai-layoffs-are-a-strategy-shortcut/"><![CDATA[<p>The current layoff wave framed as “AI transformation” looks less like disciplined redesign and more like strategic impatience. Harvard’s January 2026 executive survey is revealing: only a small minority of AI-cited layoffs were linked to measured performance gaps, while most were justified by future AI potential <a href="https://hbr.org/2026/01/companies-are-laying-off-workers-because-of-ais-potential-not-its-performance">HBR, Jan 2026</a>. 
In plain terms, many firms are cutting now based on a story about tomorrow.</p>

<p>That story is seductive because it is simple. Fewer people, more tools, higher margin. But real operating models are not simple. Every workforce reduction removes tacit knowledge, social coordination, and informal quality control that never appears in KPI dashboards. AI can automate tasks, it does not automatically replace accountability systems that keep customer outcomes stable.</p>

<p>The core error is sequencing. Leaders are treating headcount cuts as a starting move instead of a late-stage optimization after process redesign, capability mapping, and retraining. That reverses the logic of transformation and creates execution debt.</p>

<p>The pattern is visible in public markets: major firms can announce AI-linked cuts and still gain investor applause in the same cycle <a href="https://finance.yahoo.com/news/blocks-layoffs-illustrate-market-conundrum-152507108.html">Yahoo Finance, Feb 2026</a>, <a href="https://www.forbes.com/sites/ronshevlin/2026/02/27/block-lays-off-40-of-staff-and-blames-it-on-ai-dont-buy-the-excuse/">Forbes, Feb 2026</a>. If your AI strategy begins with cuts, you may be optimizing optics rather than capability.</p>

<p>A year from now, the real question is: will your system still perform?</p>]]></content><author><name>Eran Goldman-Malka</name></author><category term="AI" /><category term="Leadership" /><category term="AI layoffs" /><category term="workforce strategy" /><category term="productivity" /><category term="leadership" /><category term="transformation" /><summary type="html"><![CDATA[The current layoff wave framed as “AI transformation” looks less like disciplined redesign and more like strategic impatience. Harvard’s January 2026 executive survey is revealing: only a small minority of AI-cited layoffs were linked to measured performance gaps, while most were justified by future AI potential HBR, Jan 2026. In plain terms, many firms are cutting now based on a story about tomorrow.]]></summary></entry><entry><title type="html">Red Alert Spyware Campaign: Precision Social Engineering Under National Stress</title><link href="https://goldmanmalka.com/https://goldmanmalka.com/shadow-alerts-weaponized-trust-on-android/" rel="alternate" type="text/html" title="Red Alert Spyware Campaign: Precision Social Engineering Under National Stress" /><published>2026-03-09T09:00:00+00:00</published><updated>2026-03-09T09:00:00+00:00</updated><id>https://goldmanmalka.com/https://goldmanmalka.com/shadow-alerts-weaponized-trust-on-android</id><content type="html" xml:base="https://goldmanmalka.com/https://goldmanmalka.com/shadow-alerts-weaponized-trust-on-android/"><![CDATA[<h3 id="red-alert-spyware-campaign-precision-social-engineering-under-national-stress">“Red Alert” Spyware Campaign: Precision Social Engineering Under National Stress</h3>

<p>The latest “Red Alert” Android spyware campaign illustrates a familiar trend: <strong>malware impact is increasingly driven by operational psychology, not code sophistication.</strong></p>

<p>Attackers launched a coordinated SMS distribution targeting Israeli users during a period of active regional escalation, redirecting victims to a trojanized Android package (<code class="language-plaintext highlighter-rouge">com.red.alertx</code>) masquerading as the legitimate <em>Tzeva Adom</em> missile warning application. The operation combined <strong>geopolitical timing, behavioral conditioning, and interface realism</strong> to exploit user trust at scale.</p>

<h4 id="technical-and-ux-fidelity">Technical and UX Fidelity</h4>
<p>This was not a crude copy. The cloned app implemented realistic municipality-level alert flows, map overlays, and reused authentic siren and notification assets. It supported <strong>both Hebrew and Arabic right-to-left layouts</strong> and reproduced the visual hierarchy and behavioral sequence of the genuine civil warning tool. From a UX perspective, it achieved high-fidelity deception — sufficient to bypass intuitive detection even by experienced users.</p>

<h4 id="psychological-exploitation-window">Psychological Exploitation Window</h4>
<p>The attack leveraged a well-documented <strong>“affective urgency” state</strong>—a cognitive narrowing effect triggered under perceived threat. Users under situational stress deprioritize verification and permission auditing in favor of immediate action. By aligning distribution with ongoing alerts and real siren activity, attackers maximized this behavioral vulnerability.</p>

<h4 id="persistence-and-access-strategy">Persistence and Access Strategy</h4>
<p>Post-installation, the app maintained the appearance of normal operation while requesting <strong>broad access privileges</strong> including notifications, location services, and device administration. Telemetry evidence indicates the implant established persistence and data exfiltration channels consistent with standard spyware operations. The minimal anomaly footprint delayed detection by both EDR and user reporting channels.</p>

<h4 id="operational-takeaways">Operational Takeaways</h4>
<ul>
  <li><strong>Emotional-state targeting</strong> now rivals technical exploit vectors in effectiveness.</li>
  <li><strong>Malware UX design</strong> is a deliberate discipline; adversaries prototype interface logic to reduce suspicion.</li>
  <li><strong>Timing synchronization</strong> with real-world emergencies increases infection success by orders of magnitude.</li>
  <li><strong>Incident response frameworks</strong> that treat mobile phishing as a low-tier awareness issue are obsolete.</li>
</ul>

<p>Defenders need to expand detection and simulation frameworks to include <strong>behavioral deception campaigns</strong> that fuse authentic assets, contextual timing, and high-fidelity impersonation. The question is no longer whether users can recognize fake apps. It’s whether organizations can intercept and analyze them <strong>before</strong> the first permission grant.</p>]]></content><author><name>Eran Goldman-Malka</name></author><category term="Threat Intelligence" /><category term="Mobile Security" /><category term="Android spyware" /><category term="social engineering" /><category term="Arid Viper" /><category term="Iran" /><category term="phishing" /><category term="Red Alert" /><summary type="html"><![CDATA[“Red Alert” Spyware Campaign: Precision Social Engineering Under National Stress]]></summary></entry><entry><title type="html">From Legal Shock to Real Resilience: An Invitation</title><link href="https://goldmanmalka.com/https://goldmanmalka.com/conclusion-and-invitation-to-work-together/" rel="alternate" type="text/html" title="From Legal Shock to Real Resilience: An Invitation" /><published>2026-03-05T09:00:00+00:00</published><updated>2026-03-05T09:00:00+00:00</updated><id>https://goldmanmalka.com/https://goldmanmalka.com/conclusion-and-invitation-to-work-together</id><content type="html" xml:base="https://goldmanmalka.com/https://goldmanmalka.com/conclusion-and-invitation-to-work-together/"><![CDATA[<p>Across this series we have walked through an uncomfortable reality for EU financial institutions. The EU–US legal landscape remains volatile, Schrems II is not ancient history, and concentration on a handful of US hyperscalers has turned legal nuance into operational risk. At the same time, the CSSF has steadily raised its expectations on governance, ICT risk, and business continuity, moving from “have a plan” to “prove it works”.</p>

<p>Most institutions already have fragments: policies, backups, DR sites, contracts, open‑source experiments. What is often missing is an integrated, tested, and audit‑ready continuity strategy that explicitly covers third‑country data transfers, concentration risk on providers like Microsoft, and credible exit paths—including open‑source or EU‑sovereign landing zones—before a crisis forces your hand.</p>

<p>If you are a Luxembourg or EU financial institution and you are unsure how you would perform in a CSSF review on business continuity, third‑country data transfers, and hyperscaler dependency, this is exactly what I help with. I design and test BCPs, exit strategies (including open‑source alternatives), and documentation that stands up in both audits and Board discussions, tailored to your risk profile and regulatory context.</p>

<p>If you want an honest pre‑mortem before the regulator or your Board does it for you, let’s talk. Would you rather rehearse your next crisis now—or improvise it live, in front of your customers and supervisors?</p>]]></content><author><name>Eran Goldman-Malka</name></author><category term="Operational Resilience" /><category term="Advisory" /><category term="CSSF" /><category term="Schrems II" /><category term="business continuity" /><category term="exit strategy" /><category term="open source" /><summary type="html"><![CDATA[Across this series we have walked through an uncomfortable reality for EU financial institutions. The EU–US legal landscape remains volatile, Schrems II is not ancient history, and concentration on a handful of US hyperscalers has turned legal nuance into operational risk. At the same time, the CSSF has steadily raised its expectations on governance, ICT risk, and business continuity, moving from “have a plan” to “prove it works”.]]></summary></entry><entry><title type="html">Self-Assessment for CISOs: Are You Really Ready?</title><link href="https://goldmanmalka.com/https://goldmanmalka.com/self-assessment-are-you-really-ready/" rel="alternate" type="text/html" title="Self-Assessment for CISOs: Are You Really Ready?" /><published>2026-03-03T09:00:00+00:00</published><updated>2026-03-03T09:00:00+00:00</updated><id>https://goldmanmalka.com/https://goldmanmalka.com/self-assessment-are-you-really-ready</id><content type="html" xml:base="https://goldmanmalka.com/https://goldmanmalka.com/self-assessment-are-you-really-ready/"><![CDATA[<p>If you want a quick, honest view of your resilience posture, skip the maturity models and answer a few hard yes/no questions.</p>

<p>We have a documented, CSSF‑aligned BCM and BCP framework, formally approved by the Board and reviewed at least annually, with clear ownership across IT, business, and support functions. We have a credible exit and migration strategy from our major US technology providers, including at least one open‑source‑based or EU‑sovereign alternative for critical workloads, and we have tested part of that strategy in practice. We can evidence at least one realistic cross‑border legal/IT disruption scenario test in the last 12 months, with documented lessons learned and remediation actions.</p>

<p>If you hesitate on any of these bullets, you do not just have a documentation gap; you have an exposure that will surface under pressure—through an incident, a regulator, or your own Board. The choice is whether you discover it on your terms or someone else’s.</p>

<p>If you ran this self‑assessment in your next ExCo or Risk Committee, how many green lights would you get—and how much appetite would there be to turn ambers and reds into funded, time‑bound actions instead of “to‑do later” notes?</p>]]></content><author><name>Eran Goldman-Malka</name></author><category term="Operational Resilience" /><category term="Self-Assessment" /><category term="BCM" /><category term="BCP" /><category term="Schrems II" /><category term="exit strategy" /><category term="testing" /><summary type="html"><![CDATA[If you want a quick, honest view of your resilience posture, skip the maturity models and answer a few hard yes/no questions.]]></summary></entry><entry><title type="html">CSSF Audit Lens: Questions You Should Be Ready For</title><link href="https://goldmanmalka.com/https://goldmanmalka.com/cssf-audit-lens-questions-to-expect/" rel="alternate" type="text/html" title="CSSF Audit Lens: Questions You Should Be Ready For" /><published>2026-02-26T09:00:00+00:00</published><updated>2026-02-26T09:00:00+00:00</updated><id>https://goldmanmalka.com/https://goldmanmalka.com/cssf-audit-lens-questions-to-expect</id><content type="html" xml:base="https://goldmanmalka.com/https://goldmanmalka.com/cssf-audit-lens-questions-to-expect/"><![CDATA[<p>If you want to stress‑test your continuity posture, look at your institution through an auditor’s eyes. A CSSF team will not start with your favourite architecture diagram; they will start with blunt questions that cut across governance, IT, and business lines.</p>

<p>“Show us your latest Business Impact Analysis and explain how it feeds into your Business Continuity Plan, including ICT and critical third‑party dependencies.” That is not a paperwork request; it is a test of whether your resilience model is coherent from risk identification to practical response.</p>

<p>“Explain how you ensure continuity of critical services if your main cloud or SaaS provider fails or becomes non‑compliant.” Here, they are probing both technical options and decision‑making: who decides to trigger exit, based on which criteria, and how quickly can you execute?</p>

<p>“Provide evidence of your last BCP test and how Board decisions followed.” Minutes, action logs, remediation tracking—this is where many institutions start to improvise.</p>

<p>Would you be comfortable answering those questions, in English or French, with the CSSF in the room and your Board listening? Or would you find yourself promising to “come back with the documents” that, in reality, do not yet exist?</p>]]></content><author><name>Eran Goldman-Malka</name></author><category term="Audit" /><category term="Operational Resilience" /><category term="CSSF" /><category term="audit" /><category term="BIA" /><category term="BCP" /><category term="third-party risk" /><summary type="html"><![CDATA[If you want to stress‑test your continuity posture, look at your institution through an auditor’s eyes. A CSSF team will not start with your favourite architecture diagram; they will start with blunt questions that cut across governance, IT, and business lines.]]></summary></entry><entry><title type="html">Open Source, Digital Autonomy, and the CSSF</title><link href="https://goldmanmalka.com/https://goldmanmalka.com/open-source-and-digital-autonomy-in-a-regulated-environment/" rel="alternate" type="text/html" title="Open Source, Digital Autonomy, and the CSSF" /><published>2026-02-24T09:00:00+00:00</published><updated>2026-02-24T09:00:00+00:00</updated><id>https://goldmanmalka.com/https://goldmanmalka.com/open-source-and-digital-autonomy-in-a-regulated-environment</id><content type="html" xml:base="https://goldmanmalka.com/https://goldmanmalka.com/open-source-and-digital-autonomy-in-a-regulated-environment/"><![CDATA[<p>In some boardrooms, “open source” still triggers an ideological debate. In a regulated financial institution, that is the wrong lens. The real question is how you diversify risk, avoid excessive lock‑in, and retain control over where your data lives and how it is protected.</p>

<p>An open‑source‑friendly architecture—Linux, open collaboration tools, self‑hosted or EU‑based services—can reduce your exposure to single vendors and give you more flexibility on encryption, key management, and data residency. It does not mean doing everything yourself, but it does mean you are not entirely dependent on a handful of US hyperscalers for critical functions.</p>

<p>From a CSSF perspective, the badge on the software matters far less than the quality of your governance and controls. They expect you to identify risks, document mitigations, and demonstrate resilience, whether your solution is proprietary or open source. Weak patching, unclear responsibilities, or missing documentation will be criticised regardless of licence model.</p>

<p>Do you have a documented strategy for where open‑source components make sense in your stack and how they are governed? Or are “open” tools only appearing as tactical exceptions when a team cannot get a licence for the proprietary option of the month?</p>]]></content><author><name>Eran Goldman-Malka</name></author><category term="Open Source" /><category term="Strategy" /><category term="open source" /><category term="digital sovereignty" /><category term="CSSF" /><category term="vendor lock-in" /><category term="risk management" /><summary type="html"><![CDATA[In some boardrooms, “open source” still triggers an ideological debate. In a regulated financial institution, that is the wrong lens. The real question is how you diversify risk, avoid excessive lock‑in, and retain control over where your data lives and how it is protected.]]></summary></entry><entry><title type="html">What If You Had to Migrate Off Microsoft?</title><link href="https://goldmanmalka.com/https://goldmanmalka.com/what-if-we-must-migrate-off-microsoft/" rel="alternate" type="text/html" title="What If You Had to Migrate Off Microsoft?" /><published>2026-02-19T09:00:00+00:00</published><updated>2026-02-19T09:00:00+00:00</updated><id>https://goldmanmalka.com/https://goldmanmalka.com/what-if-we-must-migrate-off-microsoft</id><content type="html" xml:base="https://goldmanmalka.com/https://goldmanmalka.com/what-if-we-must-migrate-off-microsoft/"><![CDATA[<p>For many institutions, “Microsoft” is not a vendor; it is oxygen. Identity, mail, collaboration, document management, endpoint management, even parts of core banking integration all flow through that ecosystem. Which is precisely why you should run the scenario nobody wants to think about: what if you had to exit, partially or fully?</p>

<p>The trigger does not have to be dramatic. It could be a regulatory development on third‑country transfers, a contractual dispute, a major incident that changes your risk appetite, or a strategic move toward more digital autonomy. Whatever the cause, an unplanned scramble away from Microsoft would quickly expose undocumented dependencies and brittle workarounds.</p>

<p>A serious continuity posture means you know which services are truly Microsoft‑dependent, what your exit SLAs look like, and how data can be exported and migrated at scale without losing integrity or creating new compliance issues. That requires a tested playbook, not just a line in a policy.</p>

<p>Have you identified and documented credible landing zones—commercial or open‑source. For your most critical Microsoft‑backed services? And has anyone actually rehearsed a constrained migration, or are you relying on hopeful assumptions and marketing slides?</p>]]></content><author><name>Eran Goldman-Malka</name></author><category term="Cloud" /><category term="Exit Strategy" /><category term="Microsoft 365" /><category term="Azure" /><category term="exit strategy" /><category term="migration" /><category term="open source" /><summary type="html"><![CDATA[For many institutions, “Microsoft” is not a vendor; it is oxygen. Identity, mail, collaboration, document management, endpoint management, even parts of core banking integration all flow through that ecosystem. Which is precisely why you should run the scenario nobody wants to think about: what if you had to exit, partially or fully?]]></summary></entry><entry><title type="html">Hard Questions Your Business Continuity Plan Should Answer</title><link href="https://goldmanmalka.com/https://goldmanmalka.com/hard-questions-for-your-bcp/" rel="alternate" type="text/html" title="Hard Questions Your Business Continuity Plan Should Answer" /><published>2026-02-17T09:00:00+00:00</published><updated>2026-02-17T09:00:00+00:00</updated><id>https://goldmanmalka.com/https://goldmanmalka.com/hard-questions-for-your-bcp</id><content type="html" xml:base="https://goldmanmalka.com/https://goldmanmalka.com/hard-questions-for-your-bcp/"><![CDATA[<p>Most Business Continuity Plans look reassuring—until you start asking uncomfortable questions that require evidence rather than good intentions. If you are responsible for resilience in a regulated institution, try this short interrogation.</p>

<p>When was your last end‑to‑end BCP exercise that involved IT, business lines, Legal/Compliance, and key third‑party providers in the same scenario? Not a tabletop for one department, but a realistic drill with cross‑functional decisions, communication, and recovery steps.</p>

<p>Have you ever simulated the sudden loss of a strategic US technology provider—not just for technical outage, but because of sanctions, data‑transfer rulings, or a change in your own risk appetite? What did you learn about data location, contracts, and your actual ability to pivot?</p>

<p>Is the Board regularly reviewing BCP outcomes, documented weaknesses, and remediation progress, or do they only see a static policy once a year? Can you show minutes and follow‑up actions?</p>

<p>If you cannot answer these with clear, up‑to‑date evidence, your real risk is not that the CSSF might ask these questions. It is that they will ask them before you have done so yourself. Are you comfortable waiting for that moment?</p>]]></content><author><name>Eran Goldman-Malka</name></author><category term="Operational Resilience" /><category term="Audit" /><category term="BCP" /><category term="testing" /><category term="board oversight" /><category term="third-party risk" /><category term="legal risk" /><summary type="html"><![CDATA[Most Business Continuity Plans look reassuring—until you start asking uncomfortable questions that require evidence rather than good intentions. If you are responsible for resilience in a regulated institution, try this short interrogation.]]></summary></entry><entry><title type="html">Over-Dependent on Microsoft? The Hidden Concentration Risk</title><link href="https://goldmanmalka.com/https://goldmanmalka.com/concentration-risk-us-hyperscalers-microsoft/" rel="alternate" type="text/html" title="Over-Dependent on Microsoft? The Hidden Concentration Risk" /><published>2026-02-12T09:00:00+00:00</published><updated>2026-02-12T09:00:00+00:00</updated><id>https://goldmanmalka.com/https://goldmanmalka.com/concentration-risk-us-hyperscalers-microsoft</id><content type="html" xml:base="https://goldmanmalka.com/https://goldmanmalka.com/concentration-risk-us-hyperscalers-microsoft/"><![CDATA[<p>Walk through any Luxembourg bank and you will see the same logos again and again: Microsoft 365, Teams, Azure‑hosted services, US‑based ticketing and CRM platforms. Individually, each choice was rational. Collectively, they form a concentration risk that is both operational and legal.</p>

<p>From an operational angle, a single vendor outage can disrupt identity, email, collaboration, document management, even customer‑facing workflows. From a legal angle, Schrems II reminds you that using a US hyperscaler is not just a contract question; you are required to assess third‑country laws and stop transfers if adequate protection cannot be ensured. Those are not edge cases—they are board‑level risks.</p>

<p>The problem is not “Microsoft is bad”. The problem is having no credible alternative path if the legal landscape or your own risk appetite changes. Most continuity plans assume “Microsoft is there, just degraded”. Very few simulate “Microsoft is there, but legally unusable for certain data or workloads”.</p>

<p>If your main SaaS vendor became non‑compliant under EU law next quarter, what would you actually do in week one? How long would it take before customer‑facing services, internal approvals, or regulatory reporting start to grind?</p>]]></content><author><name>Eran Goldman-Malka</name></author><category term="Cloud" /><category term="Third-Party Risk" /><category term="Microsoft 365" /><category term="Azure" /><category term="concentration risk" /><category term="Schrems II" /><category term="data transfers" /><summary type="html"><![CDATA[Walk through any Luxembourg bank and you will see the same logos again and again: Microsoft 365, Teams, Azure‑hosted services, US‑based ticketing and CRM platforms. Individually, each choice was rational. Collectively, they form a concentration risk that is both operational and legal.]]></summary></entry><entry><title type="html">BCP Without Illusions: What the CSSF Really Expects</title><link href="https://goldmanmalka.com/https://goldmanmalka.com/what-cssf-expects-from-bcp/" rel="alternate" type="text/html" title="BCP Without Illusions: What the CSSF Really Expects" /><published>2026-02-10T09:00:00+00:00</published><updated>2026-02-10T09:00:00+00:00</updated><id>https://goldmanmalka.com/https://goldmanmalka.com/what-cssf-expects-from-bcp</id><content type="html" xml:base="https://goldmanmalka.com/https://goldmanmalka.com/what-cssf-expects-from-bcp/"><![CDATA[<p>If you strip away the legal phrasing, CSSF expectations on business continuity are brutally simple. They want to see that you understand what really matters, how quickly it must be restored, and how you will do it in practice. Especially when ICT and third‑party services are in trouble.</p>

<p>That starts with a serious Business Impact Analysis, not a spreadsheet inherited from 2017. Critical processes, dependencies, RTO/RPO, and tolerances must be clearly defined and revisited when your architecture or providers change. On top of that, the Board is expected to approve and periodically review a documented BCP that reflects those realities, including digital channels, cloud services, and outsourced functions.</p>

<p>During an inspection, the CSSF will not be impressed by glossy PDFs. They will look for evidence that you can maintain key operations, protect customers, and communicate transparently under stress. That means up‑to‑date plans, tested failover options, and clear decision rights. Not just IT procedures sitting on SharePoint.</p>

<p>If the CSSF walked in tomorrow, could you demonstrate that your BCP is a living practice woven into operations, not just a compliance artefact? Who, by name, would be able to walk them through your last test and the remediation actions that followed?</p>]]></content><author><name>Eran Goldman-Malka</name></author><category term="Operational Resilience" /><category term="Governance" /><category term="BCP" /><category term="BCM" /><category term="CSSF" /><category term="ICT risk" /><category term="board oversight" /><summary type="html"><![CDATA[If you strip away the legal phrasing, CSSF expectations on business continuity are brutally simple. They want to see that you understand what really matters, how quickly it must be restored, and how you will do it in practice. Especially when ICT and third‑party services are in trouble.]]></summary></entry></feed>