Google’s ‘Project Nightingale’ Gathers Personal Health Data on Millions of Americans

Google’s ‘Project Nightingale’ Gathers Personal Health Data on Millions of Americans

Maybe Keith Enright Legal Director of Privacy @GOOGLE @ALPHABET isn’t as bad as Hitler but Keith was the next one in line (under Sergi and Brin)  who agreed to do the dirty work of making sure none of us would ever have our Data protected from the companies that sell our data. Who is going to get insurance now when they know everything that happens to us personally and to everyone in our family for all the next generations into the abyss. We are all Fucked !!!!!

Google launched the effort last year with Ascension, the country’s second-largest health system.

It’s all about buying and selling the electronic records they have on all of us!

STAY AWAY FROM THE “CRISTIAN” ORGANIZATION ASCENSION

a Catholic health care system based in St. Louis that operates across 21 states and the District of Columbia.

Eduardo Conrado was Ascension’s chief strategy and innovations officer, a role that ‘starts and ends with people’. September, Ascension named Eduardo Conrado to the system’s newly created position of executive vice president and chief digital officer. In July 2019, he was promoted to executive vice president and chief strategy and innovations officer.

Jacqueline Carberry Baratian joins Ascension as Chief Compliance Officer reporting to Christine Kocot McCoy, JD, Executive Vice President and General Counsel. Jackie has a thorough understanding of compliance and governmental requirements within the rapidly evolving healthcare environment. Currently a Partner at Alston & Bird, LLP, in Washington, D.C., she serves as outside counsel to healthcare industry clients on compliance plan development, implementation and audits, and performs compliance program assessments for hospitals, health systems and post-acute care providers.  She is a member of the American Health Lawyers Association. Before joining the firm in 2016, Jackie served as Vice President & Chief Medicaid Compliance Officer with Aetna in Bethesda, Maryland, where she oversaw Aetna’s Medicaid Compliance Program nationwide

Google’s Cloud servers. The idea was that by using the system, Ascension health providers could use a tool called Patient Search to pull up individual patient pages. According to Forbes, which says it viewed a presentation on the topic, “The page includes complete patient information as well as notes about patient medical issues, test results and medications, including information from scanned documents.”

BRING A CLASS ACTION AGAINST GOOGLE NOW

BRING A CIVIL SUIT AGAINST KEITH ENRIGHT

BRING A CLASS ACTION SUIT AGAINST ASCENSION NOW

BRING ELIZABETH WARREN TO DISMANTLE GOOGLE NOW.

Keith EnrightLegal Director of Privacy @GOOGLE @ALPHABET

Keith Enright joined Google in March 2011 as Senior Privacy Counsel.

Keith Enright has data. Keith’s data isn’t in the database.

Project Nightingale: Google accesses trove of US patient data

Search giant is amassing health records from Ascension facilities in 21 states; patients not yet informed.
https://www.bbc.com/news/technology-50388464

 

Tech giants like Amazon and Apple are expanding their businesses to include electronic health records — which contain data on diagnoses, prescriptions and other medical information. That’s creating both opportunities and spurring privacy concerns.
https://www.wsj.com/articles/google-s-secret-project-nightingale-gathers-personal-health-data-on-millions-of-americans-11573496790

WHAT ABOUT HIPPA ??

THIS IS TOTALLY UNETHICAL AND ILLEGAL

Google, University of Chicago named in suit charging misuse of patient data

The class action complaint alleges that, despite being deidentified, Google’s expertise in data mining and AI makes it “uniquely able to determine the identity” of the medical records shared with it by the university.

A lawsuit has been filed by a former patient of UChicago Medicine who claims his medical records – and those of hundreds of thousands of other patients – have been shared with Google without authorization.
UChicago Medicine, UChicago Medical Center, and Google have been named in the lawsuit. The suit claims patient information was shared with Google as part of study aimed to advance the use of artificial intelligence, but patient authorization was not obtained in advance and data were not properly deidentified.
https://www.hipaajournal.com/uchicago-accused-of-illegally-sharing-patient-data-with-google/

Google’s secret cache of medical data includes names and full details of millions – whistleblower

https://www.theguardian.com/technology/2019/nov/12/google-medical-data-project-nightingale-secret-transfer-us-health-information

Google gets green light to access five years of NHS patient data

The extent to which patient data has been shared between an NHS trust in England and AI company

2019 Google is taking over DeepMind’s NHS contracts – should we be worried?

DeepMind was first revealed by New Scientist in 2016 and later ruled that it failed to comply with the law by the data watchdog for failures over informing patients.

A New Scientist investigation raises questions about the basis under which an NHS Trust is sharing patient data with Google’s AI firm

Did Google’s NHS patient data deal need ethical approval?

A New Scientist investigation raises questions about the basis under which an NHS Trust is sharing patient data with Google’s AI firm

https://www.newscientist.com/article/2088056-did-googles-nhs-patient-data-deal-need-ethical-approval/

THIS ISN’T ABOUT HELPING MEDICINE BUT ABOUT MAKING MONEY AND IT IS OUR NIGHTMARE

https://www.wired.com/story/ai-could-reinvent-medicineor-become-a-patients-nightmare/

GOOGLE BUYS FITBIT AS A DATA GRAB!!!

https://www.nytimes.com/2019/11/01/technology/google-fitbit.html

The ambition of Google’s parent company Alphabet is to develop new AI tools that can help predict health patterns and improve treatment. Google recently announced plans to buy Fitbit for $2.1bn, aiming to enter the wearables market and invest in digital health.

ETHICS ETHICS ETHICS ETHICS

Google and Ascension have released statements in the wake of the disclosure of Project Nightingale, insisting it conforms with HIPAA and all federal health laws. They said that patient data was protected.

Google Cloud told the Wall Street Journal that the aim was “ultimately improving outcomes, reducing costs, and saving lives”.

BULLSHIT BULLSHIT BULLSHIT

In a statement, Ascension said: “All work related to Ascension’s engagement with Google is HIPAA compliant and underpinned by a robust data security and protection effort and adherence to Ascension’s strict requirements for data handling.”

In the video, the whistleblower begs to disagree. In annotations that run over the leaked documents, they suggest that in future Google might be able to sell or share the data with third parties, or create patient profiles against which they can advertise healthcare products.

“Patients haven’t been told how Ascension is using their data and have not consented to their data being transferred to the cloud or being used by Google. At the very least patients should be told and be able to opt in or opt out,” the whistleblower writes.

How and why should security be tied to HIPAA?

The requirement to comply with one standard or the next does provide a few benefits to your organization. Certain standards leave significant room for interpretation, giving you the ability to tie security measures that should be implemented to a portion of that same standard. When compliance is involved there are now social, political, and legal components added that can be leveraged to implement security controls and process changes that may not have been possible otherwise. It also may present the opportunity to piggyback off another department that has excess budget for a project.
The Health Insurance Portability & Accountability Act (HIPAA) was enacted in 1996 as law and establishes national standards for electronic healthcare records. It includes any organization that stores or processes ePHI (Electronic Protected Health Information) healthcare providers, health plans, and clearinghouses. There are fifty “implementation specifications,” divided into administrative, physical, and technical safeguards. Most specifications listed involve having policies and procedures in place. Addressable specifications involve performing a “risk assessment” and then taking steps to mitigate the risks in a way that’s appropriate for your organization. One of the largest HIPAA penalties against a small organization was levied not because an event occurred, but because the organization failed to address the possibility. Loss of ePHI can cause significant harm to not only the patients whose data has been compromised, but also the provider and individuals at fault as they are required to report violations to the US Department of Health and Human Services (HHS), the Federal Trade Commission (FTC), and are susceptible to extremely large fines and jail time. The HHS provides a breakdown of each portion of the security rule portion of HIPAA and assistance with the implementation of the security standards.
https://infosystir.blogspot.com/2018/01/hipaa-vs-security-building-security.html

 

Stanford prof who changed America with one study was also a liar

Stanford psychology and law professor David Rosenhan could transfix an audience in a crowded lecture hall with just a few words.

https://nypost.com/2019/11/02/stanford-professor-who-changed-america-with-just-one-study-was-also-a-liar/

It was the era of Ken Kesey’s “One Flew Over the Cuckoo’s Nest” and movies like “Shock Corridor” and “The Snake Pit.” Rosenhan — who was both an insider who studied abnormal psychology, and an outsider who was a psychologist rather than a psychiatrist — was the perfect person to pull back the curtain on psychiatry’s secrets.

His research work was also groundbreaking. In 1973, Rosenhan published the paper “On Being Sane in Insane Places” in the prestigious journal Science, and it was a sensation. The study, in which eight healthy volunteers went undercover as “pseudopatients” in 12 psychiatric hospitals across the country, discovered harrowing conditions that led to national outrage. His findings helped expedite the widespread closure of psychiatric institutions across the country, changing mental health care in the US forever.

Rosenhan distinguished himself at Stanford with his 1973 paper “On Being Sane in Insane Places” in the prestigious journal Science, research that helped spur the closure of mental hospitals nationwide.

“On Being Sane in Insane Places,” Rosenhan never again published any studies on psychiatric hospitalization, even though this subject made him an international success.

Rosenhan, I began to realize, may have been the ultimate unreliable narrator. It’s possible some pseudopatients he mentioned in his study never existed at all.  – Susannah Cahalan, author of “The Great Pretender,” on famed psychology professor David Rosenhan

https://en.wikipedia.org/wiki/David_Rosenhan

Rosenhan’s medical record during his undercover stay at Haverford found that he had not, as he had written in his published paper, only exhibited one symptom of “thud, empty, hollow.” Instead, he had told doctors that he put a “copper pot” up to his ears to drown out the noises and that he had been suicidal. This was a far more severe — and legitimately concerning — description of his illness than he had portrayed in his paper.

Rosenhan’s eight healthy pseudopatients allegedly each followed the same script to gain admittance to psychiatric hospitals around the country.

“It all started out as a dare,” Rosenhan told a local newspaper. “I was teaching psychology at Swarthmore College, and my students were saying that the course was too conceptual and abstract. So I said, ‘OK, if you really want to know what mental patients are like, become mental patients.’ ”

Soon after that, Rosenhan went undercover for nine days at Haverford State Hospital in Haverford, Pa., in February 1969. His diary and book describe a host of indignities: soiled bathrooms without doors, inedible food, sheer boredom and ennui, rank disregard by the staff and doctors. Rosenhan even witnessed an attendant sexually assault one of the more disturbed patients. The only time Rosenhan was truly “seen” as a human by the staff was when an attendant mistook him for a doctor.

The experience was harrowing. After nine days, he pushed for a release and made sure that his undergraduate students — who were planning to follow him as undercover patients into the hospital — would not be allowed to go. Colleagues described a shaken, changed man after his experience.

The only other participant I discovered, Harry Lando, had a vastly different take. Lando had summed up his 19-day hospitalization at the US Public Health Service Hospital in San Francisco in one word: “positive.”

https://nypost.com/2019/11/02/stanford-professor-who-changed-america-with-just-one-study-was-also-a-liar

Algorythms are examples of code that fits our biases also. They expose the problems of society, coded by fallible bros who decide what to code in and choose what leave out. CRAP ALL CRAP.

 

The first pseudopatient — “David Lurie” in his notes — was very clearly Rosenhan himself.

“It all started out as a dare,” Rosenhan told a local newspaper. “I was teaching psychology at Swarthmore College, and my students were saying that the course was too conceptual and abstract. So I said, ‘OK, if you really want to know what mental patients are like, become mental patients.’ ”

https://en.wikipedia.org/wiki/David_Rosenhan

Soon after that, Rosenhan went undercover for nine days at Haverford State Hospital in Haverford, Pa., in February 1969. His diary and book describe a host of indignities: soiled bathrooms without doors, inedible food, sheer boredom and ennui, rank disregard by the staff and doctors. Rosenhan even witnessed an attendant sexually assault one of the more disturbed patients. The only time Rosenhan was truly “seen” as a human by the staff was when an attendant mistook him for a doctor.

Pennsylvania closed Haverford State Hospital

NOW

Trump administration let nearly $11 million in student aid go to unaccredited for-profit colleges

Trump administration let nearly $11 million in student aid go to unaccredited for-profit colleges

https://edlabor.house.gov/imo/media/doc/Chairman%20Scott%20Threatens%20to%20Subpoena%20Secretary%20DeVos.pdf

 

or

 

https://web.archive.org/web/20191111175557/https://edlabor.house.gov/imo/media/doc/Chairman%20Scott%20Threatens%20to%20Subpoena%20Secretary%20DeVos.pdf

Educational CyberPlayGround: NetHappenings News Letter 11-7-19

EDUCATIONAL CYBERPLAYGROUND
Reference Directory of K-12 public, private, and charter schools in all 50 states. Find Teaching Resources for Teachers, Music, Literacy, Internet, Technology, Arts and Linguistics for students, teachers, parents, and policy makers.

K12PlayGround.com
IT IS ALL ABOUT THE PROCESS
working together, problem solving, team building, imagination, creativity and failure, which carries into art, math, writing, science, reading, social studies, and all other parts of the curricula. Help students gain enduring skills and knowledge for current and future challenges.

NEWS

Credibility, not information, is the real currency!
Newspapers are still considered by most as credible. American Newspapers still decide what is a real story by covering it, which is makes it important and real.
“On the Internet, nobody knows you’re a dog.” is an adage and meme about Internet anonymity which began as a cartoon caption written by Peter Steiner and published by The New Yorker on July 5, 1993.
The Internet democratized access to the production and dissemination of information and simultaneously destroyed the economics of high-quality journalism while leaving in place the culture and custom of credibility and truth.

Boeing’s poor information security posture threatens passenger safety, national security, researcher says
Boeing test development networks are publicly exposed to the internet, Kubecka said, and at least one of Boeing’s email servers is infected with multiple strains of malware. Kubecka believes that the infected email servers are being used to exfiltrate sensitive intellectual property including code used in both civilian passenger aircraft as well as aircraft Boeing sells to the US military.
Kubecka, a well-respected security researcher, critical infrastructure expert, and Air Force veteran, tells CSO she has struggled to report what she calls blatant, easily fixable security issues for more than six months. She also alleges that Boeing, through back channels at DEF CON, threatened her with legal action and a public relations smear campaign to prevent her from going public. Kubecka declined to identify who made the threats, when and where they were made, or how they might be associated with Boeing.
“If I saw a broken door on an aircraft, I would not get in trouble for reporting to the FAA that the plane flew,” Kubecka tells CSO. “But as a security researcher, it’s legally fraught to report security vulnerabilities.”
https://www.csoonline.com/article/3451585/boeings-poor-information-security-posture-threatens-passenger-safety-national-security-researcher-s.html

Former Twitter employees charged with spying for Saudi Arabia by digging into the accounts of kingdom critics.  The arrest of one of the former Twitter employees, Ahmad Abouammo, a U.S. citizen who is alleged to have spied on the accounts of three users — including one whose posts discussed the inner workings of the Saudi leadership — on behalf of the government in Riyadh.
The Justice Department has charged two former Twitter employees with spying for Saudi Arabia by accessing the company’s information on dissidents who use the platform, marking the first time federal prosecutors have publicly accused the kingdom of running agents in the United States. One of those implicated in the scheme, according to court papers, is an associate of Saudi Crown Prince Mohammad bin Salman, who the CIA has concluded likely ordered the assassination of journalist Jamal Khashoggi in Istanbul last year.

In Trump’s Twitter Feed: Conspiracy-Mongers, Racists and Spies
“…The New York Times examined Mr. Trump’s interactions with Twitter since he took office, reviewing each of his more than 11,000 tweets and the hundreds of accounts he has retweeted, tracking the ways he is exposed to information and replicating what he is likely to see on the platform. The result, including new data analysis and previously unreported details, offers the most comprehensive view yet of a virtual world in which the president spends significant time mingling with extremists, impostors and spies.
https://www.nytimes.com/interactive/2019/11/02/us/politics/trump-twitter-disinformation.html

Dark Web: 8chan returns with new name 8kun
8kun  warning says ‘Any content that violates the laws of the United States of America will be deleted and the poster will be banned.’” Launched in 2013 by Fredrick Brennan as an alternative to 4chan, 8chan had been linked to harassment campaigns, racism, misogyny, neo-Nazism, pedophilia and mass shootings. It was also a hub for believers of far-right conspiracy theory QAnon, which claims that a secret cabal of “Satan-worshiping pedophiles” rules the world and that only Donald Trump can stop them.
https://mashable.com/article/8chan-8kun-rebrand-return

https://www.vice.com/en_us/article/a359dz/8chan-is-back-with-a-new-name-and-qanon-is-already-posting

Putin’s Top Spy: We’re Teaming Up With D.C. on Cybersecurity
By Amy Knight The Daily Beast 11.04.19
Behind-the-scenes cooperation with U.S. agencies, particularly on cybercrime and terrorism, is a theme the Kremlin likes to push onto center stage. Trump likes it, too.
https://www.thedailybeast.com/putins-top-spy-russian-fsb-chief-alexander-bortnikov-were-teaming-up-with-dc-on-cybersecurity

The Pentagon is under assault every hour of the day
Microsoft’s $10 billion contract win over cloud rival Amazon for the ultra-lucrative military contact means that an intelligence-gathering apparatus among the most important in the world is based in the woods outside Seattle. These kinds of national security responsibilities once sat almost exclusively in Washington, DC. Now in this corner of Washington state, dozens of engineers and intelligence analysts are dedicated to watching and stopping the government-sponsored hackers proliferating around the world.
https://www.technologyreview.com/s/614646/inside-the-microsoft-team-tracking-the-worlds-most-dangerous-hackers/

Following a recent conference of foreign security and law enforcement agencies, the head of Russia’s State Security Service, the FSB, made the surprising announcement that Russia and the United States have resumed cooperation on cybersecurity.
“We are maintaining working contacts by our experts and special unit heads with the Central Intelligence Agency, the Federal Bureau of Investigation and the Drug Enforcement Agency,” said Gen. Alexander Bortnikov, noting that such contacts should always occur, regardless of the foreign policy situation.
Behind-the-scenes cooperation with the Trump administration, particularly when it comes to cybercrime and terrorism, is a theme the Kremlin likes to push onto center stage every so often. And according to our sources there is indeed some consultation at a practical level, but for Washington’s intelligence professionals it’s a very delicate, very dangerous game, complicated enormously by the inclinations and prejudices of President Donald J. Trump.
In response to queries about Bortnikov’s statement, spokespersons for both the CIA and the DEA told The Daily Beast that they had no comment, and the FBI has not responded at all. […]

Cyber memo warns of new risks to White House network

An internal memo on cybersecurity, obtained by Axios, warns that “the White House is posturing itself to be electronically compromised once again.”
The state of play: That’s after at least a dozen top- or high-level officials have resigned or been pushed out of a cybersecurity mission that was established under Barack Obama to protect the White House from Russian hacking and other threats, according to conversations with several current and former officials.

KGB Manuals Notes on Exposure of the Enemy’s Set-Ups
Top Secret: Exposure of the Enemy’s Set-ups [Dangles] in the Process of Development of Persons of Interest to Intelligence 1971
http://www.interpretermag.com/notes-on-exposure-of-the-enemys-set-ups/

Facebook will allow UK election candidates to run false ads. “A controversial policy allowing politicians to run false ads on Facebook will extend to the United Kingdom as the country prepares to vote in a historic December election, Facebook confirmed to CNN Business.”
https://www.cnn.com/2019/11/01/tech/facebook-false-ads-uk/index.html

Why Facebook Should Sit Out The 2020 Election.
American democracy is in deep trouble, social media companies have violated our trust too many times to count and, at least in the US, there’s no way to regulate digital election ads — or to even ask the Federal Elections Commission, which has been effectively shut down under Republican control, to offer guidance. Without oversight, there’s no civically responsible way to allow digital ad buys. From my experience as a political strategist for Democratic candidates and advocacy groups, I believe Facebook should adopt the same policy.
https://www.buzzfeednews.com/article/melissaryan1/facebook-political-ads-2020-election-dorsey-zuckerberg

The US government is looking into the popular social media app TikTok for possible security risks. TikTok, which is owned by Chinese company ByteDance, has become incredibly popular with teenagers in the US and around the world for its short-form videos.
https://www.cnet.com/news/us-launches-a-national-security-review-of-tiktok-report/#ftag=CAD590a51e

Why worry about the KGB when ISPs do a fantastic job lying to Congress
ISPs lied to Congress to spread confusion about encrypted DNS, Mozilla says. “Mozilla is urging Congress to reject the broadband industry’s lobbying campaign against encrypted DNS in Firefox and Chrome. The Internet providers’ fight against this privacy feature raises questions about how they use broadband customers’ Web-browsing data, Mozilla wrote in a letter sent [yesterday] to the chairs and ranking members of three House of Representatives committees.”
https://arstechnica.com/tech-policy/2019/11/isps-lied-to-congress-to-spread-confusion-about-encrypted-dns-mozilla-says/

0-Day Alert! #Google is warning Windows, Mac, #Linux users to update their #Chrome browser (to 78.0.3904.87) immediately due to a security vulnerability.

#Google is trying to kill web URLs and this has nothing to do with security
a chrome extension tries to restore the URLs to searches
https://chrome.google.com/webstore/detail/remove-breadcrumbs/banhponphmmpnpogmfaahcgkgbgkcoka?hl=en

PRIVACY

NordVPN users’ passwords exposed in mass credential-stuffing attacks
https://arstechnica.com/information-technology/2019/11/nordvpn-users-passwords-exposed-in-mass-credential-stuffing-attacks/

BRAVE Browser
Chrome, Firefox, DuckDuckGo, and Opera’s “private” browsing mode is not truly private. Brave was created with a built-in ad-blocker to give you the fastest internet browsing experience, while providing the deepest level of privacy and security protection. Brave also lets you control who profits from your data with blockchain-based tokens. Faster, Safer, Ad-Free Browsing.

 

This Is How the U.S. Military’s Massive Facial Recognition System Works
The presentation also sheds light on how military, state, and local law enforcement biometrics systems are linked. According to Krizay’s presentation, ABIS is connected to the FBI’s biometric database, which is in turn connected to databases used by state and local law enforcement. Ultimately, that means that the U.S. military can readily search against biometric data of U.S. citizens and cataloged non-citizens. The DFBA is also currently working to connect its data to the Department of Homeland Security’s biometric database. The network will ultimately amount to a global surveillance system. In his notes, Krizay outlines a potential scenario in which data from a suspect in Detroit would be run against data collected from “some mountaintop in Asia.”
The documents, which are embedded in full below, were obtained through a Freedom of Information Act request. These documents were presented earlier this year at a closed-door defense biometrics conference known as the Identity Management Symposium…
https://onezero.medium.com/exclusive-this-is-how-the-u-s-militarys-massive-facial-recognition-system-works-bb764291b96d

“After more than half a year of work, check out our latest paper Light Commands: Laser-Based Audio Injection on Voice-Controllable Systems.
https://twitter.com/sara_rampazzi/status/1191415126630354944

GDPR matchup: The California Consumer Privacy Act 2018
https://iapp.org/news/a/gdpr-matchup-california-consumer-privacy-act/

Road to Adequacy: Can California Apply Under the GDPR?
https://www.lawfareblog.com/road-adequacy-can-california-apply-under-gdpr

FTC Brings First Case Against Developers of “Stalking” Apps
https://www.ftc.gov/news-events/press-releases/2019/10/ftc-brings-first-case-against-developers-stalking-apps

Instagram is shutting down a creepy app that lets you stalk loved ones. A new app is looking to revive one of the creepiest Instagram features and encouraging people to spy on their significant others through social media. Critics said the apps offerings make it resemble stalkerware.
https://www.cnet.com/news/instagram-is-shutting-down-a-creepy-app-that-lets-you-stalk-loved-ones/

Amazon, Apple, And Google Are Distributing Products From Companies Building China’s Surveillance State
https://www.buzzfeednews.com/article/rosalindadams/apple-amazon-google-apps-blacklist-china-xinjiang

WHERE ARE THE ETHICS AT THESE COMPANIES????

The Smart Girl’s Guide to Privacy: Practical Tips for Staying Safe Online: Violet Blue: 9781593276485: Amazon.com: Books

Chapter 2 https://nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf

Former Trend Micro employee enabled scam calls by stealing customers’ personal data
https://www.cyberscoop.com/trend-micro-customer-data-stolen-scam/

Spanish companies’ networks shut down as result of ransomware
https://arstechnica.com/information-technology/2019/11/spanish-companies-networks-shut-down-as-result-of-ransomware/

Paradise Ransomware Decryptor Gets Your Files Back for Free
Emsisoft has released a decryptor for the Paradise Ransomware that allows victims going back as far as 2017 to decrypt their files without paying a ransom.
https://www.bleepingcomputer.com/news/security/paradise-ransomware-decryptor-gets-your-files-back-for-free/

Once you have an encrypted and unencrypted file pair, download Emsisoft’s Paradise Ransomware decryptor and execute it.
https://www.emsisoft.com/ransomware-decryption-tools/paradise

HEALTH

Healthcare data breaches will cost industry $4 billion by year’s end, and 2020 is poised to be worse
https://www.healthcarefinancenews.com/news/healthcare-data-breaches-will-cost-industry-4-billion-years-end-and-2020-poised-be-worse

‘Volume Control’ Author David Owen Says Ambient Noise Threatens Our Hearing
https://www.npr.org/sections/health-shots/2019/11/05/776242285/from-lawn-mowers-to-rock-concerts-our-deafening-world-is-hurting-our-ears

BANKSTERS

ETHICS BE DAMNED

2/25/19 Commerce Secretary Ross Flouts Government Ethics Rules.

Fake Billionaire Wilbur Ross Ignores the Law and Lies About His Stock Holdings

Kremlin connections to investments in Facebook and Twitter are the results of a capitalist “free market” fetish.

Paradise Papers reveal Companies controlled by the Russian government quietly invested in several major Silicon Valley startups, including Facebook.

11/5/17 Paradise Papers reveals a vast financial network—beyond the reach of most governments—maintained by the world’s wealthiest people. They include commerce secretary Wilbur Ross, Queen Elizabeth of the UK, and a close advisor to Canadian prime minister Justin Trudeau. Here’s a guide to the major revelations in the Paradise Papers
https://qz.com/1120731/paradise-papers-a-guide-to-the-major-revelations/

Wilbur Ross’s business ties to Putin’s inner circle
US commerce secretary Wilbur Ross maintains a stake in a shipping company that is closely linked to the family of Russian president Vladimir Putin. According to the Paradise Papers, Ross owns between $2 million and $10 million in shipping company Navigator. The second-biggest client of Navigator is Russian gas company Sibur. Kirill Shamalov, who is Putin’s son-in-law, has been deputy chairman of Sibur’s board and until April owned more than a fifth of the company. (He has since reduced his ownership share.) @SecretaryRoss conceals business dealings with Vladimir Putin’s son-in-law. 

“The Paradise Papers showed Ross failed to disclose financial interest in Navigator Gas, a shipping company that transports petrochemicals for Russian gas and petrochemicals company Sibur. Sibur is subject to sanctions for its close ties to Putin’s son-in-law Kirill Shamalov.” https://qz.com/1120731/paradise-papers-a-guide-to-the-major-revelations/

Ross shorted Russian-linked shipping company ahead of Paradise Papers
https://www.icij.org/investigations/paradise-papers/ross-shorted-russian-linked-shipping-company-ahead-paradise-papers/

also …. Former Co-Chair of (Russian Laundromat) Bank of Cyprus
REMINDER- Paul Manafort & Rick Gates allegedly laundered money through bank accounts in Cyprus. @SecretaryRoss & @DeutscheBank former chairman Josef Ackermann served on the board of Bank of Cyprus.

Donald Trump’s commerce secretary, Wilbur Ross, is doing business with Vladimir Putin’s son-in-law through a shipping venture in Russia.

Leaked documents and public filings show Ross holds a stake in a shipping company, Navigator, through a chain of offshore investments. Navigator operates a lucrative partnership with Sibur, a Russian gas company part-owned by Kirill Shamalov, the husband of Putin’s daughter Katerina Tikhonova.
https://www.theguardian.com/news/2017/nov/05/trump-commerce-secretary-wilbur-ross-business-links-putin-family-paradise-papers

2017

WALL STREET

Wall Street’s Liquidity Crisis: It’s Not Getting Better
https://wallstreetonparade.com/2019/11/wall-streets-liquidity-crisis-its-not-getting-better/
By Pam Martens and Russ Martens: November 7, 2019 ~
Deutsche Bank Headquarters in Frankfurt, Germany
This morning, Wall Street’s money spigot arm of the Federal Reserve, the New York Fed, paid out $35 billion in 14-day term loans to Wall Street’s trading houses. The problem was, this morning the banks wanted $41.15 billion or $6.15 billion or $6.15 billion more than the Fed was offering. That’s a very clear sign that liquidity remains tight on Wall Street and we have yet to enter the pivotal year-end period when banks try to dress up their books by dumping or parking their most toxic positions. Between the term loan and the overnight loan, the New York Fed paid out $115 billion this morning to unnamed securities firms on Wall Street. (The Fed won’t say who is doing all of this borrowing and Congress can’t summon the willpower to hold a hearing.) 
https://wallstreetonparade.com/2019/11/wall-streets-liquidity-crisis-its-not-getting-better/

Dangerous Liaisons: New York Fed and JPMorgan’s Incestuous Relationship By Pam Martens and Russ Martens
The Federal Reserve Bank of New York (New York Fed) is just one of the 12 regional Federal Reserve banks around the country. But it has amassed enormous powers for itself since the Federal Reserve was created in 1913. Three of those powers dwarf all others: the ability to create money electronically at the push of a button; the accepted right to meddle in the markets; and the supervision of some of the largest bank holding companies in America.
After Wall Street blew itself up under the indulging and incompetent supervision of the New York Fed in 2008 and it was exposed that the Fed had secretly created $29 trillion in electronic money to bail out zombie banks – most of that funneled out by the New York Fed – most rational folks would have assumed that Congress would have stripped it of supervisory and money-printing powers for bailouts. Insanely, that did not happen and here we are today with the same deeply-conflicted New York Fed creating its own money to dole out $690 billion a week in super-cheap loans to unnamed securities firms while buying up $60 billion a month in the debt of the United States. (The Fed doesn’t want you to call the $60 billion a month QE4 because that would strongly suggest that this is just Stage II of the continuing 2008 bailout of Wall Street and that QE-Infinity is coming.)
https://wallstreetonparade.com/2019/11/dangerous-liaisons-new-york-fed-and-jpmorgans-incestuous-relationship/

 

LOOKING FORWARD TO THANKSGIVING EVERYONE!

Inland Northwest’s thriving turkey population is an invasive nuisance or a conservation success – or both

Thanksgiving Turkey Recipe from the First Nation American Indians and every state.
The 1621 feast between the Pilgrims and the Indians was not the first official Thanksgiving.

POTLATCH – The Tradition of Giving / Sharing a Meal

Roasted Pumpkin Soup with Fresh Tarragon and the best Brined Turkey

                   .--.
    {\             / q {\
    { `\           \ (-(~`
   { '.{`\          \ \ )
   {'-{ ' \  '-. \ \
   {._{'.' \/       '.) \
   {_.{.   {`            |
   {._{ ' {   ;'-=-.     |
    {-.{.' {  ';-=-.`    /
     {._.{.;    '-=-   .'
      {_.-' `'.__  _,-'
            |||`
              .='==,

The public is invited to submit comments on the Department’s proposed changes to the Civil Rights Data Collection by November 18.

The public is invited to submit comments on the Department’s proposed changes to the Civil Rights Data Collection by November 18.

Performance of schools in your state

Find out about the Performance of schools in your state

http://K12PlayGround.com

Opportunities and Responsibilities for State and Local Report Cards, is aimed at assisting educators with both the design and implementation of report cards, as required by the Every Student Succeeds Act (ESSA).  It follows the release of a special Parent Guide to State and Local Report Cards by the Department late last year.

 

“State and local report cards should be a rich source of information for parents to understand exactly how their child’s school is performing, how much is being spent on their child, and how it compares to other schools in their community,” the Secretary said.  “But, if report cards are hard to understand or obfuscate, they will not serve their intended purpose, which is to empower families with relevant, accurate, and actionable data.  The information released today is meant to help state and local leaders make sure that the report cards they are developing, as required by law, achieve ESSA’s intended goal.”

 

Department’s Office of Special Education and Rehabilitative Services (OSERS)

Department’s Office of Special Education and Rehabilitative Services (OSERS)

National Disability Employment Awareness Month (NDEAM) 2019: The Right Talent, Right Now.”  This year’s theme celebrates contributions of workers with disabilities and spotlights the value of a workforce inclusive of their skills and talents.

Why WhatsApp is pushing back on NSO Group hacking

Why WhatsApp is pushing back on NSO Group hacking
By Will Cathcart
Oct. 29, 2019 at 2:34 p.m. EDT

https://www.washingtonpost.com/opinions/2019/10/29/why-whatsapp-is-pushing-back-nso-group-hacking/

Will Cathcart is head of WhatsApp, which is owned by Facebook.

In May, WhatsApp announced that we had detected and blocked a new kind of cyberattack involving a vulnerability in our video-calling feature. A user would receive what appeared to be a video call, but this was not a normal call. After the phone rang, the attacker secretly transmitted malicious code in an effort to infect the victim’s phone with spyware. The person did not even have to answer the call.

Now, after months of investigation, we can say who was behind this attack. Today, we have filed a complaint in federal court that explains what happened and attributes the intrusion to an international technology company called NSO Group.

How can we say this with confidence? As we gathered the information that we lay out in our complaint, we learned that the attackers used servers and Internet-hosting services that were previously associated with NSO. In addition, as our complaint notes, we have tied certain WhatsApp accounts used during the attacks back to NSO. While their attack was highly sophisticated, their attempts to cover their tracks were not entirely successful.

Read the WhatsApp complaint against NSO Group

There was another disturbing pattern to the attack, as our lawsuit explains. It targeted at least 100 human-rights defenders, journalists and other members of civil society across the world. This should serve as a wake-up call for technology companies, governments and all Internet users. Tools that enable surveillance into our private lives are being abused, and the proliferation of this technology into the hands of irresponsible companies and governments puts us all at risk.

NSO has previously denied any involvement in the attack, stating that “under no circumstances would NSO be involved in the operating … of its technology.” But our investigation found otherwise. Now, we are seeking to hold NSO accountable under U.S. state and federal laws, including the U.S. Computer Fraud and Abuse Act.

At WhatsApp, we believe people have a fundamental right to privacy and that no one else should have access to your private conversations, not even us. Mobile phones provide us with great utility, but turned against us they can reveal our locations and our private messages, and record sensitive conversations we have with others.

For years, we have worked to stay ahead of those who seek to violate users’ privacy and security. Just as we have physical locks on our doors at home, WhatsApp builds digital locks to protect our private conversations. The primary security system we use is called end-to-end encryption, which works automatically in such a way that only you and the people you are communicating with have the “keys” to your messages and calls.

At the same time, however, surveillance companies are hunting for work-arounds – by implanting spyware directly onto devices. The attack we saw provides several urgent lessons.

First, it reinforces why technology companies should never be required to intentionally weaken their security systems. “Backdoors” or other security openings simply present too high a danger.

Democracies depend on strong independent journalism and civil society, and intentionally weakening security puts these institutions at risk. And we all want to protect our personal information and private conversations. That’s why we will continue to oppose calls from governments to weaken end-to-end encryption.

Second, technology companies must deepen our cooperation to protect and promote human rights. App developers, device manufacturers and those who maintain the security of operating-systems providers need to share information to build safer systems. Just as users expect our products to work seamlessly, so too they expect we will work to guard against common threats and to hold attackers accountable.

This includes publicly explaining significant attacks to increase resilience and working with security researchers who can play a crucial role in that. We’re grateful to experts at the Citizen Lab at the University of Toronto for their work in this regard. They volunteered to help us understand who was affected by the attack and engaged with journalists and human rights defenders to help them better protect themselves in the face of these threats.

Third, companies simply should not launch cyberattacks against other companies. Responsible actors report vulnerabilities when they are found; they do not use their technology to exploit those vulnerabilities. Likewise, companies should not sell services to others engaged in such attacks.

Lastly, far more needs to be done to define what amounts to proper oversight of cyber weapons. NSO said in September that “human rights protections are embedded throughout all aspects of our work.” Yet it maintains that it has no insight into the targets of its spyware. Both cannot be true. At a minimum, leaders of tech firms should join U.N. Special Rapporteur David Kaye’s call for an immediate moratorium on the sale, transfer and use of dangerous spyware.

The mobile phone is the primary computer for billions of people around the world. It is how we have our most private conversations and where we store our most sensitive information. Governments and companies need to do more to protect vulnerable groups and individuals from these attacks. WhatsApp will continue to do everything we can within our code, and within the courts of law, to help protect the privacy and security of our users everywhere.

Trump to Sign Executive Order Reining in ‘Rogue Agencies’ Rules

Impeachment Now! by Jonathan A. Weiss

Thanks to Jonathan A. Weiss for sending

Trump undermines all of our agencies !!!!

Trump to Sign Executive Order Reining in ‘Rogue Agencies’ Rules

https://www.bnnbloomberg.ca/trump-to-sign-executive-order-reining-in-rogue-agencies-rules-1.1328642

President Donald Trump is expected to sign a pair of executive orders on Wednesday that would limit the use of memos, letters, and other guidance that federal agencies use to help individuals and companies comply with regulations, a person briefed on the plans said.

Conservatives and business groups have long complained that the agencies use the process to establish “stealth regulation” that circumvents Congress and avoids public scrutiny. Unlike formal government rules the interpretations are issued without the typical notice and comment period required by law.

“Americans deserve to have their side of the story properly considered by the government and not punished by rogue agencies who use fear and costly court cases to force Americans into following their directives,” the White House said in talking points on the executive orders distributed to supporters on Tuesday.

Under the Obama administration, agencies broadened existing laws and regulations through interpretations that were then issued in blogs, letters memos and brochures.

Trump has made deregulation a cornerstone of his presidency, and the executive orders are intended to protect small businesses from agencies who use it as an “off-the-book way around the regular rule-making process,” the White House said in the talking points.

According to the talking points, one executive order would require agencies to seek public input on certain guidance while a second executive order seeks to prohibit “secret or unlawful bureaucratic interpretations of rules” as well as “unfair or unexpected penalties from agencies.”

White House cybersecurity chief quits, says leadership is inviting an attack
https://thenextweb.com/politics/2019/10/25/white-house-cybersecurity-chief-quits-says-leadership-is-inviting-an-attack/

White House computer security Chief Dimitrios Vistakis gave the White House one helluva resignation notice earlier this week when he quit over practices he dubbed “absurd” including the systemic purging of cybersecurity staff.

Russian hackers modify Chrome and Firefox to track secure web traffic
The perpetrators may have Russian government support
Many hackers won’t touch web browsers beyond exploiting their vulnerabilities, but one group is taking things one step further. Kaspersky has detailed attempts by a Russian group, Turla, to fingerprint TLS-encrypted web traffic by modifying Chrome and Firefox. The team first infects systems with a remote access trojan and uses that to modify the browsers, starting with installing their own certificates (to intercept TLS traffic from the host) and then patching the pseudo-random number generation that negotiates TLS connections. That lets them add a fingerprint to every TLS action and passively track encrypted traffic.
Just why the intruders would need to do that isn’t entirely clear. If you’ve infected a system with a remote control trojan, you don’t need to patch the browser to spy on traffic. ZDNet suggested it might be a failsafe that let intruders spy on traffic for people who remove the trojan, but aren’t cautious enough to reinstall their browsers.

The perpetrators appear to be easier to identify, and that might reveal their motives. Turla is believed to work under the protection of the Russian government, and initial targets were located in Russia and Belarus. The group is sophisticated enough to have compromised Eastern European internet providers in the past to infect otherwise clean downloads. This may be an attempt to snoop on dissidents and other political targets using a method that’s difficult to thwart.
https://www.engadget.com/2019/10/06/russian-hackers-modify-chrome-firefox/

Scoop: Cyber memo warns of new risks to White House network
https://www.axios.com/scoop-cyber-memo-warns-of-new-risks-to-white-house-network-9aa19c6c-77a3-485b-919b-1dd9bd691514.html

‘It’s going to be painful’: Pentagon official urges contractors to improve cybersecurity
https://www.cyberscoop.com/katie-arrington-pentagon-contracting/

Scoop: Cyber memo warns of new risks to White House network
https://www.axios.com/scoop-cyber-memo-warns-of-new-risks-to-white-house-network-9aa19c6c-77a3-485b-919b-1dd9bd691514.html

An internal memo on cybersecurity, obtained by Axios, warns that “the White House is posturing itself to be electronically compromised once again.”
The state of play: That’s after at least a dozen top- or high-level officials have resigned or been pushed out of a cybersecurity mission that was established under Barack Obama to protect the White House from Russian hacking and other threats, according to conversations with several current and former officials.
Why it matters: Warnings by officials from the former Office of the Chief Information Security Officer (OCISO) — which in July was folded into the Office of the Chief Information Officer (OCIO) — suggest new intelligence vulnerabilities. One White House official familiar with the developments said the consolidations could lead to a “Wild West” atmosphere.

Former Trump economic adviser Gary Cohn’s next move: investing in a phone secure enough for the president
https://www.vox.com/recode/2019/10/24/20930668/gary-cohn-trump-economic-adviser-goldman-hoyos-secure-phone

Wall Street On Parade Financial Literacy

Wall street on Parade

Selective Inflation Increases Financial Gap by Jonathan A Weiss Esq.

2018 Financial Secrecy Score

Federal Reserve Spokesman Explains How It Creates Money Out of Thin Air to Pump Out to Wall Street
https://wallstreetonparade.com/2019/10/federal-reserve-spokesman-explains-how-it-creates-money-out-of-thin-air-to-pump-out-to-wall-street/

The Fed Fears an Explosion on Wall Street: Here’s How JPMorgan Lit the Fuse
https://wallstreetonparade.com/2019/10/the-fed-fears-an-explosion-on-wall-street-heres-how-jpmorgan-lit-the-fuse/

By Pam Martens and Russ Martens: October 28, 2019 ~
JPMorgan Chase is the largest bank in the United States with $1.6 trillion in
deposits from more than 5,000 retail bank branches spread across the country.
When it withdraws liquidity from the U.S. financial system, that has a
reverberating impact.
According to the filings that JPMorgan Chase […]

Remembering Mark Pittman, the One Journalist Who Would Have Been All Over the Fed’s Latest Wall Street Bailouts
https://wallstreetonparade.com/2019/10/remembering-mark-pittman-the-one-journalist-who-would-have-been-all-over-the-feds-latest-wall-street-bailouts/

https://youtu.be/GZkLXCZRBKY
By Pam Martens and Russ Martens: October 25, 2019 ~
Today would have been Mark Pittman’s 62nd birthday. Pittman died of a heart attack at age 52 on November 25, 2009 in the midst of a pitched court battle with the Federal Reserve to obtain data on its secret loans to Wall Street.

Quietly, U.S. and Foreign Banks Have Increased their Borrowings from U.S.
Money Market Funds
https://wallstreetonparade.com/2019/10/quietly-u-s-and-foreign-banks-have-increased-their-borrowings-from-u-s-money-market-funds/

Barclays (Green), UBS (Red), Deutsche Bank (Blue) and Credit Suisse (Orange)
— Stock Price Over the Past Decade
By Pam Martens and Russ Martens: October 25, 2019 ~
Memories are apparently very short at the Securities and Exchange Commission (SEC). The SEC seems to have forgotten that a run on money market funds holding bank commercial […]

What Are They Smoking at CNBC?
https://wallstreetonparade.com/2019/10/what-are-they-smoking-at-cnbc/

Headline at CNBC, Thursday, October 24, 2019
WSOP Staff: October 25, 2019 ~
Yesterday, the headline above appeared at CNBC. The headline writers there
must be living in an alternative reality.
Let us remind CNBC viewers what 2019 is actually shaping up to be: it’s the
year that the highest priced stock in the price-weighted Dow […]