Educational CyberPlayGround Inc. NetHappenings Newsletter 6.4.19

Educational CyberPlayGround Inc.

NetHappenings© Newsletter 6.4.19

Get Nethappenings© email RSS Feed

Warning: please don’t choke <gulp> This post is a fire hose,  so be ready to chunk the info below into manageable amounts over the next several days or weeks.

Orientation:  #IOT | #DATA BREACH | #CYBER – Surveillance – Security | #Delete Facebook | #Crypto | #College  

*Remember people are trying to develop tomorrows tech on today’s platforms using yesterday’s ideologies.

42 years may not seem a long time, but in terms of the internet it is like a geological age.
1972: Jon Postel published RFC 318, which presented his understanding of the ad hoc Telnet protocol. It became an official protocol 13 months later when RFC 495 was published.



“Thought of the day: As we end up connecting *every* electronic device to the internet, we will soon hit a point of saturation where we cannot connect more stuff. This means “peak cyber risk” may actually be on the horizon”.

Here’s how Internet of Things malware is undermining privacy

Do renters have the right to reject smart home technology?


Data-leaking flaw in WPA3 Wi-Fi authentication



The Crisis of Election Security
As the midterms approach, America’s electronic voting systems are more vulnerable than ever. Why isn’t anyone trying to fix them?

DARPA Is Building a $10 Million, Open Source, Secure Voting System

 WannaCry? Hundreds of US schools still haven’t patched servers. “If you’re wondering why ransomware continues to be such a problem for state and local governments and other public institutions, all you have to do to get an answer is poke around the Internet a little. Publicly accessible security-scan data shows that many public organizations have failed to do more than put a bandage over long-standing system vulnerabilities that, if successfully exploited, could bring their operations to a standstill

Petya cyber industry loss passes $3bn driven by Merck & silent cyber
In projecting the way the Petya / NotPetya cyber loss will break down by industry, PCS believes that at least 54% will be driven by the pharmaceutical sector, 20% by manufacturing and the rest of consumer businesses, professional services and other miscellaneous industries.

Data Breach Report

Elizabeth Warren unveils bill that could hold tech execs responsible for data breaches

Wyden Unveils New Plan to Protect Private Data, Restore ‘Do Not Track,’ and Jail Reckless CEOs

Quest Data Breach
12 million SSN now for sale on the Dark Web.

Did you get pawned?

Identity Theft Recovery Steps

Death by a Thousand Clicks: Where Electronic Health Records Went Wrong

Who owns the © to my medical x-rays?

By tracing bitcoin transactions, ProPublica identifies multiple InfoSec firms that promise customers high-tech ransomware solutions, but instead just pay the BlackHat’s ransom & charge back the cost (plus billable hours/services).

Health Insurance Hustle
You Snooze, You Lose: Insurers Make The Old Adage Literally True
Millions of sleep apnea patients rely on CPAP breathing machines to get a good night’s rest. Health insurers use a variety of tactics, including surveillance, to make patients bear the costs. Experts say it’s part of the insurance industry playbook.

Competition for Meat Eaters


CYBER – Surveillance – Security – Spy Craft – State Craft

The Spycraft Revolution

The Psychology Behind Unethical Behavior

The Retroscope At Play Here’s a simple test for how you can decide if an app has encryption that doesn’t have backdoors for the local cops: if it’s allowed, it does.

US Universities And Retirees Are Funding The Technology Behind China’s Surveillance State. Millions of dollars from US university endowments, foundations, and retirement plans have helped fund two billion-dollar Chinese facial recognition startups: SenseTime and Megvii. The Chinese government is using their technologies to surveil and profile its own citizens.

Cyber War | World Economic Forum

Vulnerabilities in industrial control systems surface lack of basic security hygiene

How Silicon Valley Became a Den of Spies
The West Coast is a growing target of foreign espionage. And it’s not ready to fight back.

How did Iran find CIA spies?  They Googled it

Vault 7: CIA Hacking Tools Revealed

How Bellingcat outfoxes the world’s spy agencies
The inside story of how it got the Skripal scoop

How the Original Hacking Supergroup Might Just Save the World

Department Of Homeland Security Compiling Database Of Journalists And ‘Media Influencers’

Free Cyber Security Training and Career Development

NetBSD Problem Report

New York City is launching public cybersecurity tools to keep residents from getting hacked

Blackwater founder Erik Prince’s new company is building training center in Xinjiang. Prince, the brother of Education Secretary Betsy DeVos, is a former Navy SEAL who founded Blackwater, a military contractor that was controversial for its actions in the wars in Iraq and Afghanistan.
This a new low for former Navy Seal Erik Prince. The founder of Blackwater is part owner of a security training company opening in Xinjiang, China. Training China to oppress its Muslim population.

Ex-Coca-Cola engineer charged with stealing secrets for Chinese firm

The Chinese Communist Party Is Setting Up Cells at Universities Across America – Foreign Policy

Clues in Marriott hack implicate China

Fri, 3 May 2019 Executive Order on America’s Cybersecurity Workforce

MSFT’s net earnings are around $16 billion. The US “Black Budget” is reportedly $56 billion. The NSA’s budget was $10 billion back in 2013 probably more now.

Why businesses will have to audit algorithms, AI and account for risk

Department Of Homeland Security Compiling Database Of Journalists And ‘Media Influencers’

Debunking the cybersecurity thought that humans are the weakest link
“From a social engineering standpoint, it has never been easier to trick employees,” Payton added. “Business email compromise is one of the largest unreported crimes after ransomware.”
What’s more, there’s a 25 percent probability that any given healthcare organization will be hacked in the next 2.5 years, said Salwa Rafee, worldwide security leader for healthcare and life sciences at IBM.

Fort Bliss soldier under investigation for suspected ties to neo-Nazi terrorist group – U.S. – Stripes

Free security

Free Wolfram Engine for Developers

Technology has begun to test the boundaries of traditional First Amendment doctrine. Defense Distributed won their case.

France says Russia tried to intercept satellite communications in 2017
Russia attempted to intercept transmissions from a Franco-Italian satellite used by both nations’ armies for secure communications, French Defence Minister Florence Parly said on Friday, describing the move as an “act of espionage”.


2006 This post from Facebook’s Director of Engineering in 2006 (2 days after they launched the Newsfeed) did not age well.

‘The goal is to automate us’: welcome to the age of surveillance capitalism

Well, These New Zuckerberg IMs Won’t Help Facebook’s Privacy Problems. In case you weren’t aware, Zuckerberg famously did a Ratner and called facebook users “dumb fucks”;
This Business Insider article was originally published May 13, 2010
Facebook CEO Mark Zuckerberg and his company are suddenly facing a big new round of scrutiny and criticism about their cavalier attitude toward user privacy.
An early instant messenger exchange Mark had with a college friend won’t help put these concerns to rest.
According to SAI sources, the following exchange is between a 19-year-old Mark Zuckerberg and a friend shortly after Mark launched The Facebook in his dorm room:

Zuck: Yeah so if you ever need info about anyone at HarvardZuck: Just ask

Zuck: I have over 4,000 emails, pictures, addresses, SNS

[Redacted Friend’s Name]: What? How’d you manage that one?

Zuck: People just submitted it.

Zuck: I don’t know why.

Zuck: They “trust me”

Zuck: Dumb fucks

U.S. users are leaving Facebook by the millions, Edison Research says

How Koch Brothers and Mercer use LEOSA Law Enforcement Officers Safety Act to carry a concealed weapon in all 50 states. Anyone can get a badge to carry a concealed weapon cause there are no state or fed standards that determines what “qualified” means.
Mercer owned Cambridge Analytics was able to reproduce the data mining that Facebook was already doing in a more effective way than the DNC. Mercer’s hedge fund is Renaissance Technologies. Mercer owns Cambridge Analytica. Cambridge Analytica is at the center of a tech and political firestorm after revelations that it improperly harvested the personal data of 50 million Facebook users without their knowledge.

The moment Mark Zuckerberg tries to make a joke about privacy and nobody laughs:

Zuckerberg defends Facebook users’ right to be wrong – even Holocaust deniers. CEO explains decision not to censor conspiracy theories but says the platform will try to ‘reduce distribution of content’

Facebook’s security team tracks posts, location for ‘BOLO’ threat list

Facebook’s Data Deals Are Under Criminal Investigation

Facebook: Old posts by Mark Zuckerberg have disappeared

Facebook Has a ‘Sauron Alert’ to Protect Employees’ Privacy—But Not Yours

DELETE FB Selenium script to delete all of your Facebook wall posts

Facebook says employees had access to millions of Instagram passwords

Ime Archibong, Facebook vice president of product partnerships.

Facebook exec Andrew ‘Boz’ Bosworth broke rule on using real name

Facebook and Cambridge Analytica: Everybody’s learning nothing from this


Facebook moderators are in revolt over ‘Big Brother’-style working conditions

Two American Pension Funds Invest in Crypto

Pretty much universal except for the Silicon Valley fanbois: cryptographers @ #RSAC19 now agree, FacebookCoin is a sick joke
How to download a copy of everything Apple knows about you
Emails show RBS bankers joked about destroying the US housing market before 2008
The kings of capitalism are finally worried about the growing gap between rich and poor



Want to help struggling college students? Support the low-paid staff who teach them

High-Paying Trade Jobs Sit Empty, While High School Grads Line Up For University

(ISC)² Cybersecurity Exams Approved for College Credits by American Council on Education

1.5 Trillion in College Debt Trump Wants to Make It Legal for Debt Collectors to Text You “Where’s the Money, A$$hole?”
New rules would allow debt collectors to send customers unlimited texts and e-mails.

“A few months ago I was interviewing a college admissions coach who told me the following about how big of a donation it takes to get a child into an Ivy no questions asked: “There’s a certain magic number. It’s way higher than people think: $10 million.””

Elite College Admissions Are a Zero-Sum Game

How Admissions Works at Williams
Williams admissions work the same as admissions at most other elite colleges. If you understand the process at Swarthmore or Princeton, then you understand 99% of what happens at Williams.

Does It Matter Where You Go To College? Some Context For The Admissions Scandal –

Is a perfect ACT score rare? Not so much anymore, thanks to expensive test prep.
“It’s kind of encouraged to get good at test taking.” That’s an understatement: The number of perfect ACT scores is 6 times higher than 8 years ago.

How Americans have come to see college as a requirement

Does your income make you middle class where you live? Use this calculator to see where your income falls compared to other households in your county or the U.S. as a whole.

How much money do you make? — Ask a Manager

Why Poverty Is Like a Disease
Emerging science is putting the lie to American meritocracy.
By Christian H. Cooper Photography by Nathan Cooper April 20, 2017

What a $1,000 Per Month Universal Basic Income Would Look Like

Scientists think a new fault line might turn Nevada into a coast
Move aside, San Andreas. A new fault is shaking up the tech industry’s latest frontier in the West—and only a small group of scientists is paying attention. On a recent trip to Nevada’s Pyramid Lake, geologist James Faulds explores what he believes may become the future continental edge of North America. U.S. ROUTE 395 is a geologic master class disguised as a road. It runs north from the arid outskirts of Los Angeles, carrying travelers up to Reno along the eastern flank of the Sierra Nevada.

Kennedy vs. Nixon – 1st 1960 Debate

Really wonderful Video of NY 1911

How Do I Look? Dimitri From Paris – Une Very Stylish Fille


Leave a Reply

Your email address will not be published. Required fields are marked *