Educational CyberPlayGround, Inc. NetHappenings and K12Newsletters 6.19.19

NetHappenings //  K12Newsletters 6.19.19

Follow @NetHappenings

Follow @K12Newsletters
Discover the right school for your child.
Internet Pioneer Gleason Sackmann’s 1996  “Hot List” text file of  the first K12 School websites into the first public public project in the world launched online July 9, 1998. The public is still invited to submit their school information and website data . Once you’ve located your school, update the information about the school such as the amenities, features or programs that make this school special. Compare K12 Schools and School Districts in the USA. Join Interdisciplinary #STEAM #STEM K12 School Projects. Link to your video project from your school information page and promote your work.


Trump administration quietly makes it legal to bring elephant parts to the U.S. as trophies WP

Africa’s proverb of the day  BBC
You think of water when the well is empty. Sent by Agata Kassa, Addis Ababa, Ethiopia.

There Should Be an Age Limit for Presidents
Tyranny of the 70-Somethings The Democratic Party’s gerontocracy is holding back the political causes it claims to want to advance.

Can Elizabeth Warren Win It All    New Yorker

Hypersonic Missiles Are Unstoppable. And They’re Starting a New Global Arms Race. NYT
Reuters Around the world, the proportion paying for any online news has increased only slightly, with this growth being limited to a few Nordic countries. Even in countries where people pay in higher numbers, most only do so for one title.
Social communication is becoming more private with people continuing to turn away from Facebook. WhatsApp is becoming the primary social communication tool for news in many countries in the Global South including Brazil (53% usage for news), Malaysia (50%) and South Africa (49%).
Concern around misinformation is high in many countries despite efforts by platforms and publishers to build public confidence.
Trust in news in general is down by 2 percentage points to 42%, and less than half (49%) trust the news that they themselves use.

Low-tech DRM….
Genius hid a Morse code message in song lyrics to prove Google was copying them “Over the last two years, we’ve shown Google irrefutable evidence again and again that they are displaying lyrics copied from Genius,” Gross said. To catch Google, Genius watermarked lyrics with the help of apostrophes, alternating between straight and curly single-quote marks in exactly the same sequence for every song. When turned into dots and dashes, the apostrophes spell the words Red Handed, which is a smart trick.

This week, U.S. Customs and Border Protection announced that hackers compromised traveler images and license plate photos from one of the agency’s contractors.

Hong Kong ‘Police given secret access to hospital database’ The police were able to find and arrest people injured in last Wednesday’s extradition bill protests because officers have been given secret backdoor access to the Hospital Authority’s patient database, medical sector lawmaker Pierre Chan said on Monday.

Google Made $4.7 Billion From the News Industry in 2018, Study Says NYT

Google and PayPal explored OCC’s fintech charter, then walked away

“HK protesters have developed “Protest Sign Language”: Hand signals to request helmet, eye goggle, face mask

vice.comthe artist who created the Zuckerberg deepfake from earlier this week made another one, to protest suppression of his art. Facebook is now tasked with the hard job of defining what is art, what is satire, and reading two billion minds:

Top AI researchers race to detect ‘deepfake’ videos: ‘We are outgunned’ By Drew Harwell June 12  WP

Canary in the Coal Mine Bitcoin has rightfully earned the dubious title of “Canary in the Coal Mine” because numerous financial analysts expect that the first target of a quantum computer criminal will be mining the entire lode of Bitcoin; it’s a big, juicy target.

How To Secure Your Network: Five Modern Alternatives to VPN

Hackers Remotely Kill a Jeep on the Highway—With Me in It

Samsung’s Smart TV Malware Scan Reminder Met by User Criticism
Back in 2017, WikiLeaks revealed information on malware dubbed Weeping Angel, developed by the CIA in collaboration with Britain’s MI5/BTSS department and capable of infecting Samsung F800 TVs. According to the info leaked by WikiLeaks, Weeping Angel can record ambient sound using the built-in microphone, collect browser and WiFi credentials, block updates, and much more. Samsung customers who want to detect and get rid of the odd malware that escaped through the fingers of their Smart TV’s security solution can manually scan for viruses which might have crept in undetected by going into their device’s Options > General > System Manager > Smart Security menu and then hit “Scan.”

Industrial methane emissions are 100 times higher than reported, researchers say

F-35 Hit With Cluster Bomb Of Damning Reports As Pentagon Eyes Full Rate Production Less than 48 hours after Lockheed Martin and the Pentagon reached a handshake agreement on the purchase of a whopping 480 F-35 Joint Strike Fighters, an absolute cluster bomb of stories has dropped detailing significant technical issues with the jets. The revelations cover ongoing problems for all three F-35 variants, including performance limitations, troubles when operating in very hot or very cold weather, dangerous cockpit pressure incidents, faults in the helmet-mounted display, serious safety concerns in the event of a blown tire, and much more. The new details underscore the Joint Strike Fighter’s ongoing troubles as the Pentagon’s central Joint Program Office, or JPO, seeks to move the aircraft out of its developmental phase for good, as well as highlighting a worrying, but long-standing lack of transparency about the state of the program.  thedrive

The treachery of Julian Assange
It is hard to believe now, but honest people once worked for WikiLeaks for all the right reasons. Like me, they saw the site as a haven; a protected space where writers could publish stories that authoritarian censors and libel lawyers would otherwise have suppressed.

Reuters Top U.S. universities took funds from Chinese firm tied to Xinjiang security The Massachusetts Institute of Technology and at least one other university have research partnerships with a Chinese artificial intelligence company that has business ties with police in China’s Xinjiang region, where a sweeping crackdown on Uighurs has drawn international condemnation. Reuters found no evidence that any of the universities were directly involved in creating technology for iFlytek, or that their work was intended for use in Xinjiang, where Uighurs, a Muslim minority group, are kept under tight surveillance, including in “reeducation camps.” MIT last year announced a five-year agreement under which iFlytek would help underwrite three research projects at the university’s renowned Computer Science and Artificial Intelligence Laboratory (CSAIL).

Scientists Are Aiding Apartheid in China
The Chinese government has effectively created a system of apartheid in its resource-rich and strategically important northwestern Xinjiang region. It is targeting Uyghurs and other Turkic minorities based on their racial identity with its use of internment camps, mass surveillance, repression of political and cultural expression, and other forms of discrimination.
As part of these efforts, the Chinese government has genetically profiled much of the population of Xinjiang — everyone between 12 and 65 — as part of the most comprehensive and intrusive system of biometric surveillance ever implemented.
On the face of it, trying to use forensic genetic technologies to distinguish one group of people from another may not seem too problematic if it helps police or national security investigations. But when you consider the history of using science for the purpose of oppression, the ongoing genetic research is a serious potential threat to human and legal rights.
Following the horrors of Nazi medical experimentation and the attendant decline of eugenics, the use of racial categories in science lost much of its credibility and legitimacy. However, in the aftermath of 9/11, by using euphemisms like biogeographic ancestry and phenotypical appearance, the international forensic genetic community resurrected once discredited notions of race, arguing that these categories can potentially assist police investigations and national security. But scholars, like Troy Duster of University of California, Berkeley, and Duana Fullwiley of Stanford University, have argued that this normalization of racial categories in forensic genetic research could make these technologies of oppression against marginalized peoples. In Xinjiang, we see the realization of the draconian potential of this resurrection of race.

#Privacy, #Facebook Coin, Uber, PayPal, Visa to Back Facebook’s GlobalCoin Cryptocurrency

#Privacy, #Facebook Coin, Uber, PayPal, Visa to Back #Facebook’s GlobalCoin Cryptocurrency

Starting with Facebook can’t get into China and 2015 Facebook Announces a Payments Feature for Its Messenger App

2019 #WeChat has become the centerpiece of digital life in China

where people use it to order movie tickets, subway passes, food delivery and rides. If Facebook succeeds in turning its own messaging services into a platform for everything, it could ultimately threaten established services such as Snapchat, Yelp, Venmo, eBay and even Apple and Amazon.



  1. Cambridge Analytica and Facebook: The Scandal and the Fallout So Far Revelations that digital consultants to the Trump campaign misused the data of millions of Facebook users set off a furor on both sides of the Atlantic.
  2. Are you ready? Here is all the #data Facebook and Google have on you
  3. #Trump linked firm Cambridge Analytica collected personal information from 50 million Facebook users without permission
  4. Comparing #Obama Cambridge Analytica

Facebook can’t get into China and wants to be WhatsApp China’s top app.

#Tencent-owned WeChat is China’s most popular messaging app and has a mobile payments feature known as #WeChat Pay. #Facebook Coin, which would be pegged to the U.S. dollar and allow users to transfer money through Facebook-owned messaging application WhatsApp, according to Bloomberg.

Facebook wants to be America’s version of China’s WeChat

and started developing its own digital currency to make it easier for users to send money to their messaging contacts. Facebook didn’t offer many details on its digital currency endeavors but said a “new small team” was looking for ways to make use of the type of technology powering bitcoins and other cryptocurrencies.

Facebook has reportedly lined up Uber, PayPal, Visa and others to invest $10 million each in the consortium governing its secretive crypto project.

Tencent, is more than just a messaging app. It’s what some analysts dub a “super-app” because it offers everything from mobile payments to the ability to book flights and even play games — all without leaving the app. ‘WeChat of the West’

The reason why FB wants these partners. To turn every single account holder into a new banking account. Personal and business at the same time. Very centralized indeed. Multiple privacy concerns and contracts. Personal data is at risk.
Facts: 1. Facebook is issuing its own ‘cryptocurrency’
2. Evan Cheng is Facebooks’s Director of Blockchain engineering

One of Facebook’s most senior engineers just became Director of Engineering, Blockchain

3. Evan Cheng is advisor of #chainlink
4. Facebook will need an oracle for the purpose they’re looking for.

Facebook Gave Data Access to Chinese Firm Flagged by U.S. Intelligence


Sarah Jamie Lewis ‏@SarahJamieLewis
Can’t wait for a cryptocurrency with the ethics of Uber, the censorship resistance of Paypal, and the centralization of Visa, all tied together under the proven privacy of Facebook. I’ve always said the thing that cryptocurrency was missing was consortiums of corporations fully invested in the existing financial sector. Who, seriously, looked around the room and said, “shit, we really need to invite PayPal”
Do you trust 2/3 of paypal, visa, uber and facebook <insert other corps here> not to collude to publish contradictory checkpoints? What does byzantine consensus even mean in that scenario? “Facebook won’t control the coin” it will just develop the coin and then assemble the initial members of the consortium after which point the power will be distributed to the consortium members, that Facebook picked, and who are all large corporations.

See, decentralized. “Facebook won’t directly control the coin, nor will the individual members of the consortium — known as the Libra Association. Some of the members could serve as “nodes” along the system that verify transactions and maintain records of them, creating a brand-new payments network, according to people familiar with the setup.”
In the future, Paypal will verify your transaction behind the scenes as you pay for your Uber seamlessly using your phone, just top up your Facebook Libre account with Visa or Mastercard. So much innovation.

Roxana Nasoi @roxanasoi

Ever wondered how PayPal shares your Data? And to who?
Let’s go with the major funnels:
1. PayPal shares your data with Auditors. Internal and external, due to its nature.
2. PayPal shares your data with Customer Services. In the process of handling claims, customer services need access to your account history – so basically they need your historical data information. In case of disputes, they can access the last 30 to 90 days. Maybe even more?
3. PayPal shares your data with Fraud agencies and AML services. You will discover that after $1k to $2k, you need to KYC in order to continue using your account. If you use PayPal for business purposes, but your account is a personal one, you can end up with funds frozen.
4. Next is Financial Products. All those business and personal finance tools you see inside your PayPal dashboard can’t be used without your financial data. To add more, new products are created based on user data patterns. Unknown the extent of external financial products.
5. Don’t forget about your data being shared with Commercial Partnerships. Don’t worry, banks do the same. Apps do the same. Nothing new here.
6. PayPal uses your data for Marketing and PR. Need another example? Try Facebook, Google (Gmail) etc. Data sells, and we can’t really talk about performance and customer experience without backing claims with data reports.
7. PayPal (along with 95% of systems) shares your data with Operational Services.
8. Group Enterprises also have access to your data. Blame it on group dynamics if you want to or on contracts you’ll never have a say in.
9. Commercial Partners (to no surprise) can access your data, as well through a service called PayPal for Partners (Merchants use it).
10. Legal. From disputes to payment protection to lawsuits, to internal or partner legal firms – yes, they can access the data. Or have access to it in some form.
11. Other services and agencies. At some point they argued that government agencies cannot claim access to a user’s data. However, this is an overstatement. Under the premise of fraud, Gov agencies can and will get access. Based on historical examples, we know it’s possible.
This is probably the main reason why we do need crypto. A coded architecture that makes it incorruptible.
“Code is Law”.
Bitcoin has managed to provide a clear first example of incorruptibility, where growth and maturity of one system does not change the core.

The switch from caucuses to primaries to ranked choice voting

The switch from caucuses to primaries to ranked choice voting.
Ranked-choice voting is coming to the presidential election is the process for selecting the Democratic nominee.
Democrats are changing the rules to empower more of the party faithful in the 2020 presidential nominating process. As a result, at least 10 states are dropping their caucuses and going to primaries. And at least five will select at least some delegates using a controversial process known as ranked-choice voting.


Educational CyberPlayGround, Inc. NetHappenings and K12Newsletters 6.2.19

Educational CyberPlayGround, Inc. NetHappenings and K12Newsletters 6.2.19


  • Find a School – Discover the right school for your child.

  • The history of sign language

  • The contemporary Icelandic belief in elves explained

  • Anatomy of a Perfect Album: On Joni Mitchell’s Blue

  • Joel Bernstein lifetime achievement award for photography

  • Virality Is Dead

  • David Epstein on the Genius of the Self-Taught Musician

  • Personas of a Rock ‘N’ Roll Icon

  • 737 MAX Disaster fatal consequences

  • US Customs Facial Recognition Photos Data Breach

  • Why airport face scans are a privacy trap

  • GPS Degraded Across Much of US

  • Online Spreadsheet Discloses Museum Workers’ Salaries

Find a School – Discover the right school for your child.
Find and compare K12 Schools and School Districts in the USA and Territories.


The history of sign language

Anatomy of a Perfect Album: On Joni Mitchell’s Blue
Mitchell starts the record right off with wanderlust, her first words: I am on a lonely road and I am traveling, traveling, traveling, traveling, amplifying the feeling later: I am on a lonely road and I am traveling / Looking for the key to set me free. By boat, plane, foot, and ice skate, her whims and fancies take her to a Greek island, Paris (she doesn’t like it there), Spain, Las Vegas, maybe Amsterdam and Rome, and return home to her Ithaca, which is California. You hear Mitchell’s original Canadian-ness when she lands on the word “sorrow” as “soe-row” on “Little Green,” a poignant 1967 song, revived for this recording, from the perspective of a young single mother, also in the reverent way she intones the Canadian national anthem, “O Canada,” in the middle of “A Case of You.”

Friend  JOEL BERNSTEIN Musician / Photographer / Writer / Archivist  Compilation of Photographs – all the album covers you know
2018 IPHF FEATURES PROFILE ON JOEL FOR HIS LIFETIME ACHIEVEMENT AWARD [ friend during junior high / high school times ]

Images of rock legends from Laurel Canyon

Virality Is Dead
I’m an independent concert promoter going on 40 years now. My clients are now only a few, and I work them nationwide. Without question, Facebook “boosted posts” are quietly putting radio and print out of business in terms of how to get the word out on a cost-effective basis. And you don’t really need virality anymore in order to promote an artist or event.
I’m not talking Facebook “ads,” but “boosted posts.” Users see these posts from the artist’s page in their newsfeeds and can share them organically, unlike “ads,” which cannot be shared. I used to spend thousands of dollars breaking a show with print ads and radio. I won’t mention the act or the market, but recently I spent $1000 on a print ad in a major metropolitan market and… in a literal example of the old saying… “Did 10 tickets.” That’s right. I sold exactly 10 tickets, not even covering the cost of the ad. I spent a fraction of that amount on boosted Facebook posts and did 500 tickets. And you wonder how the Russians spent only $100k on Facebook and turned an entire election in 2016? ~ Brian Martin”

David Epstein on the Genius of the Self-Taught Musician

What David Bowie Borrowed From William Burroughs On the Shifting Personas of a Rock ‘N’ Roll Icon

Online Spreadsheet Discloses Museum Workers’ Salaries
In another sign of increasing demand for transparency at art institutions across the world, museum workers have begun making public their salary rates via a Google Spreadsheet document that began circulating on Friday morning. Titled Art/Museum Salary Transparency 2019, the document allows users to add information about the terms of their employment and their rates of pay at some of the biggest museums in the world.

Folklore: The contemporary Icelandic belief in elves explained

Overview of the ArtPlace/DAISA initiative (download a copy of the report) here:
The report argues that “integrating artistic and cultural practices with food and agriculture enables a creative and inclusive process and ensures community members see their identities, histories, and interests reflected in the work.” ~ Clifford Murphy – Folk & Traditional Arts Director | Multidisciplinary Arts National Endowment for the Arts


Don’t smile for surveillance: Why airport face scans are a privacy trap

How Boeing’s Bean-Counters Courted the 737 MAX Disaster Just when the smallest jet should have been replaced with a new model, the company fell into tight-fisted hands—with fatal consequences.

US Customs And Border Protection’s Database Of Traveler Facial Recognition Photos Was Stolen In A Data Breach
“CBP learned that a subcontractor … transferred copies of license plate images and traveler images collected by CBP to the subcontractor’s company network. The subcontractor’s network was subsequently compromised by a malicious cyber-attack.”

GPS Degraded Across Much of US
Blog Editor’s Note: Even as a Presidential Advisory Board was discussing GPS as “the Gold Standard” for satellite-based navigation last week, the system may have been operating in a degraded mode.
On Sunday the Federal Aviation Administration held a teleconference to discuss the issue that seems to have persisted for several days.  While not “failing,” GPS signal quality seems to have degraded and this is impacting some equipment and services. Specifically, the aviation safety Automatic Dependent Surveillance Broadcast system has been impacted across much of the United States. FAA has posted the following map depicting the areas impacted:
These problems have delayed and cancelled flights, possibly by the thousands. The FAA seems to have addressed some of this problem by issuing waivers for some aircraft to fly without operable ADS-B safety systems, as long as they stay on pre-planned routes and below 28,000 ft altitude.
Speculation on some on-line forums point to specific manufactures’ equipment and aircraft that are primarily effected. Previous degradation in GPS signal quality, such as the SVN-23 caused problem in January 2016, have shown that equipment from different vendors react differently to the problem. Some are unaffected, some go offline, and some just perform poorly.
The January 2016 SVN-23 degradation caused much of the nation’s ADS-B system to be unavailable for much of the day. Other receivers and systems were impacted also. Cellular networks, first responder systems, digital broadcast, and numerous other systems were impacted.
Watchstanders at the US Coast Guard Navigation Center seemed unaware of the problem early Monday morning, but promised to investigate and respond.


Ethics: Government and Science

Ethics: Government and Science

Gerrymandering Census, Ransomeware, seafood traceability, Pfizer Enbrel Alzheimer, Music linked to suicide

GOP Paid Millions to Gerrymandering Expert Behind Census Citizenship Question

This isn’t getting enough attention: The GOP paid millions to the gerrymandering expert behind the census citizenship question

Tom Hofeller wasn’t just an outsider who happened to push a narrative identical to the Trump administration’s.

Last week brought a bombshell revelation in the fight over a controversial question about citizenship status on the 2020 census: Despite the Trump administration’s insistence that it wants to add the question for better voting rights enforcement rather than political gain, key wording in its legal rationale matches memos written by Tom Hofeller, a Republican gerrymandering expert. Hofeller, who died last summer, wrote that if the 2020 census asked about the citizenship status of respondents, it “would clearly be a disadvantage to the Democrats” and “advantageous to Republicans and Non-Hispanic Whites.”

Republican Party financial filings with federal regulators add a twist to this backstory: The party’s main political apparatus paid Hofeller more than $2 million for his work. That suggests that Hofeller’s memos weren’t simply independent advocacy for a pet issue, but that he and his work were deeply embedded in the heart of the GOP’s strategic operations.

According to Republican National Committee filings with the Federal Election Commission, from June 2009 until just weeks before his death last August, the GOP’s main political apparatus paid Hofeller just over $2 million for “legal and compliance” work. In fact, from Trump’s inauguration until July 2018, Hofeller was paid $422,000, in what appear to be regular monthly payments of $22,247.

Pennsylvania Senate Democrats paid $700,000 to recover from ransomware attack

Steven Aftergood: Pentagon Cancels Contract for JASON Advisory Panel

Petya cyber industry loss passes $3bn driven by Merck & silent cyber: PCS – Reinsurance News

ETHICS? ? ? cause they won’t be making any money off of it
Pfizer MADE $2.1 billion in 2018, FROM rheumatoid arthritis therapy Enbrel now faces generic competition. A clinical trial on thousands of patients, which they estimated would cost a measly $80 million but because going off patent so they laid off 300 employees.  Now pushing Xeljanz patent expires in 2025 in the United States and 2028 in Europe. “

ETHICS ??  Pfizer also should at least have published its data, making the findings broadly available to researchers. “Of course they should. Why not?’’ said Rudolph E. Tanzi, (617) 726-6845 a leading Alzheimer’s researcher and professor at Harvard Medical School and Massachusetts General Hospital. “It would benefit the scientific community to have that data out there,’’ said Keenan Walker, Ph.D. an assistant professor of medicine at Johns Hopkins who is studying how inflammation contributes to Alzheimer’s. “Whether it was positive data or negative data, it gives us more information to make better informed decisions.’’ Find his research here


2018 MUSIC  Young heavy metal fans five times more likely to self-harm or attempt suicide  but we all knew this in 1997 !! !! !! !! !!

Brain never stops growing, scientists find, as elderly shown to have same number of new neurons as teens

Ben Sheppard, Head of Partnerships at Streamr, is at Sea Web Seafood Summit  discussing how to turn a flood of supply chain data into reliable information for seafood traceability.

#no-soap “The M.I.T.-trained chemical engineer who invented AO+ has not showered for the past 12 years.”


Fixing Tech Troubles Jaron Lanier: How we need to remake the internet

Jaron Lanier on fixing our tech troubles and remake the internet

Jaron Zepel Lanier is an American computer philosophy writer, computer scientist, visual artist, and composer of classical music. Considered a founding father of the field of virtual reality, Lanier and Thomas G. Zimmerman left Atari in 1985 to found VPL Research, Inc., the first company to sell VR goggles and gloves.

Ten Arguments for Deleting Your Social Media Accounts Right Now
No, Jaron does not have a Twitter account. No Reddit account. No Facebook account. They’re all fake fake FAKE!

Facebook and Google will be hated by most people.

Father of virtual reality: Facebook and Google are ‘behavior modification empires’ resulting from a tragic mistake.

The dangers of the concentration of data to democracy puts facebook and google at the center of Algorithmic enforcers of “cultural Marxism”

Jaron Lanier: How we need to remake the internet | TED Talk

Jaron Lanier: Who Owns the Future?

From media to manufacturing to medicine, technology is reshaping the face of more and more industries, marching them lock-step into an information economy. However, as author Jaron Lanier asks, if …

Facebook behavior modification

“The Facebook business model is mass behavior modification for pay. And for those who are not giving Facebook money, the only … reward they can get or positive feedback is just getting attention.”

Jaron Lanier interview on how social media ruins your life …
In this interview Jaron Lanier talks about Facebook, YouTube, Google and how the tech and social media giants are using algorithms to record data about their users – and how internet algorithms …

Jaron Lanier’s ideas for the future of profiting from your own data

In the early days of digital culture, Jaron Lanier helped craft a vision for the internet as public commons where humanity could share its knowledge — but even then, this vision was haunted by the dark side of how it could turn out: with personal devices that control our lives, monitor our data and feed us stimuli.

Antitrust Law – They have to much power over people with this “it’s all free” model. Father of virtual reality: Facebook and Google are ‘behavior modification empires’ resulting from a tragic mistake #TED2018

Also: ‘s explosive new book “The Age of Surveillance Capitalism” argues that big tech platforms like Facebook and Google are building “a global architecture of behavior modification” with dire consequences for democracy. 8-9AM ET:

Shoshana Zuboff’s Surveillance Capitalism.

Behavior modification through surveillance
“we write the music and they [the users] dance to it.”
Anybody can be manipulated. It’s quite easy. And it’s the whole endgame of surveillance capitalism.

Tech companies know so much about us that they can predict our behavior. It’s especially easy for them because they can manipulate behavior. So “behavioral futures markets” are a way for these companies to place bets on our future behavior.

Educational CyberPlayGround Inc. NetHappenings Newsletter 6.4.19

Educational CyberPlayGround Inc.

NetHappenings© Newsletter 6.4.19

Get Nethappenings© email RSS Feed

Warning: please don’t choke <gulp> This post is a fire hose,  so be ready to chunk the info below into manageable amounts over the next several days or weeks.

Orientation:  #IOT | #DATA BREACH | #CYBER – Surveillance – Security | #Delete Facebook | #Crypto | #College  

*Remember people are trying to develop tomorrows tech on today’s platforms using yesterday’s ideologies.

42 years may not seem a long time, but in terms of the internet it is like a geological age.
1972: Jon Postel published RFC 318, which presented his understanding of the ad hoc Telnet protocol. It became an official protocol 13 months later when RFC 495 was published.



“Thought of the day: As we end up connecting *every* electronic device to the internet, we will soon hit a point of saturation where we cannot connect more stuff. This means “peak cyber risk” may actually be on the horizon”.

Here’s how Internet of Things malware is undermining privacy

Do renters have the right to reject smart home technology?


Data-leaking flaw in WPA3 Wi-Fi authentication



The Crisis of Election Security
As the midterms approach, America’s electronic voting systems are more vulnerable than ever. Why isn’t anyone trying to fix them?

DARPA Is Building a $10 Million, Open Source, Secure Voting System

 WannaCry? Hundreds of US schools still haven’t patched servers. “If you’re wondering why ransomware continues to be such a problem for state and local governments and other public institutions, all you have to do to get an answer is poke around the Internet a little. Publicly accessible security-scan data shows that many public organizations have failed to do more than put a bandage over long-standing system vulnerabilities that, if successfully exploited, could bring their operations to a standstill

Petya cyber industry loss passes $3bn driven by Merck & silent cyber
In projecting the way the Petya / NotPetya cyber loss will break down by industry, PCS believes that at least 54% will be driven by the pharmaceutical sector, 20% by manufacturing and the rest of consumer businesses, professional services and other miscellaneous industries.

Data Breach Report

Elizabeth Warren unveils bill that could hold tech execs responsible for data breaches

Wyden Unveils New Plan to Protect Private Data, Restore ‘Do Not Track,’ and Jail Reckless CEOs

Quest Data Breach
12 million SSN now for sale on the Dark Web.

Did you get pawned?

Identity Theft Recovery Steps

Death by a Thousand Clicks: Where Electronic Health Records Went Wrong

Who owns the © to my medical x-rays?

By tracing bitcoin transactions, ProPublica identifies multiple InfoSec firms that promise customers high-tech ransomware solutions, but instead just pay the BlackHat’s ransom & charge back the cost (plus billable hours/services).

Health Insurance Hustle
You Snooze, You Lose: Insurers Make The Old Adage Literally True
Millions of sleep apnea patients rely on CPAP breathing machines to get a good night’s rest. Health insurers use a variety of tactics, including surveillance, to make patients bear the costs. Experts say it’s part of the insurance industry playbook.

Competition for Meat Eaters


CYBER – Surveillance – Security – Spy Craft – State Craft

The Spycraft Revolution

The Psychology Behind Unethical Behavior

The Retroscope At Play Here’s a simple test for how you can decide if an app has encryption that doesn’t have backdoors for the local cops: if it’s allowed, it does.

US Universities And Retirees Are Funding The Technology Behind China’s Surveillance State. Millions of dollars from US university endowments, foundations, and retirement plans have helped fund two billion-dollar Chinese facial recognition startups: SenseTime and Megvii. The Chinese government is using their technologies to surveil and profile its own citizens.

Cyber War | World Economic Forum

Vulnerabilities in industrial control systems surface lack of basic security hygiene

How Silicon Valley Became a Den of Spies
The West Coast is a growing target of foreign espionage. And it’s not ready to fight back.

How did Iran find CIA spies?  They Googled it

Vault 7: CIA Hacking Tools Revealed

How Bellingcat outfoxes the world’s spy agencies
The inside story of how it got the Skripal scoop

How the Original Hacking Supergroup Might Just Save the World

Department Of Homeland Security Compiling Database Of Journalists And ‘Media Influencers’

Free Cyber Security Training and Career Development

NetBSD Problem Report

New York City is launching public cybersecurity tools to keep residents from getting hacked

Blackwater founder Erik Prince’s new company is building training center in Xinjiang. Prince, the brother of Education Secretary Betsy DeVos, is a former Navy SEAL who founded Blackwater, a military contractor that was controversial for its actions in the wars in Iraq and Afghanistan.
This a new low for former Navy Seal Erik Prince. The founder of Blackwater is part owner of a security training company opening in Xinjiang, China. Training China to oppress its Muslim population.

Ex-Coca-Cola engineer charged with stealing secrets for Chinese firm

The Chinese Communist Party Is Setting Up Cells at Universities Across America – Foreign Policy

Clues in Marriott hack implicate China

Fri, 3 May 2019 Executive Order on America’s Cybersecurity Workforce

MSFT’s net earnings are around $16 billion. The US “Black Budget” is reportedly $56 billion. The NSA’s budget was $10 billion back in 2013 probably more now.

Why businesses will have to audit algorithms, AI and account for risk

Department Of Homeland Security Compiling Database Of Journalists And ‘Media Influencers’

Debunking the cybersecurity thought that humans are the weakest link
“From a social engineering standpoint, it has never been easier to trick employees,” Payton added. “Business email compromise is one of the largest unreported crimes after ransomware.”
What’s more, there’s a 25 percent probability that any given healthcare organization will be hacked in the next 2.5 years, said Salwa Rafee, worldwide security leader for healthcare and life sciences at IBM.

Fort Bliss soldier under investigation for suspected ties to neo-Nazi terrorist group – U.S. – Stripes

Free security

Free Wolfram Engine for Developers

Technology has begun to test the boundaries of traditional First Amendment doctrine. Defense Distributed won their case.

France says Russia tried to intercept satellite communications in 2017
Russia attempted to intercept transmissions from a Franco-Italian satellite used by both nations’ armies for secure communications, French Defence Minister Florence Parly said on Friday, describing the move as an “act of espionage”.


2006 This post from Facebook’s Director of Engineering in 2006 (2 days after they launched the Newsfeed) did not age well.

‘The goal is to automate us’: welcome to the age of surveillance capitalism

Well, These New Zuckerberg IMs Won’t Help Facebook’s Privacy Problems. In case you weren’t aware, Zuckerberg famously did a Ratner and called facebook users “dumb fucks”;
This Business Insider article was originally published May 13, 2010
Facebook CEO Mark Zuckerberg and his company are suddenly facing a big new round of scrutiny and criticism about their cavalier attitude toward user privacy.
An early instant messenger exchange Mark had with a college friend won’t help put these concerns to rest.
According to SAI sources, the following exchange is between a 19-year-old Mark Zuckerberg and a friend shortly after Mark launched The Facebook in his dorm room:

Zuck: Yeah so if you ever need info about anyone at HarvardZuck: Just ask

Zuck: I have over 4,000 emails, pictures, addresses, SNS

[Redacted Friend’s Name]: What? How’d you manage that one?

Zuck: People just submitted it.

Zuck: I don’t know why.

Zuck: They “trust me”

Zuck: Dumb fucks

U.S. users are leaving Facebook by the millions, Edison Research says

How Koch Brothers and Mercer use LEOSA Law Enforcement Officers Safety Act to carry a concealed weapon in all 50 states. Anyone can get a badge to carry a concealed weapon cause there are no state or fed standards that determines what “qualified” means.
Mercer owned Cambridge Analytics was able to reproduce the data mining that Facebook was already doing in a more effective way than the DNC. Mercer’s hedge fund is Renaissance Technologies. Mercer owns Cambridge Analytica. Cambridge Analytica is at the center of a tech and political firestorm after revelations that it improperly harvested the personal data of 50 million Facebook users without their knowledge.

The moment Mark Zuckerberg tries to make a joke about privacy and nobody laughs:

Zuckerberg defends Facebook users’ right to be wrong – even Holocaust deniers. CEO explains decision not to censor conspiracy theories but says the platform will try to ‘reduce distribution of content’

Facebook’s security team tracks posts, location for ‘BOLO’ threat list

Facebook’s Data Deals Are Under Criminal Investigation

Facebook: Old posts by Mark Zuckerberg have disappeared

Facebook Has a ‘Sauron Alert’ to Protect Employees’ Privacy—But Not Yours

DELETE FB Selenium script to delete all of your Facebook wall posts

Facebook says employees had access to millions of Instagram passwords

Ime Archibong, Facebook vice president of product partnerships.

Facebook exec Andrew ‘Boz’ Bosworth broke rule on using real name

Facebook and Cambridge Analytica: Everybody’s learning nothing from this


Facebook moderators are in revolt over ‘Big Brother’-style working conditions

Two American Pension Funds Invest in Crypto

Pretty much universal except for the Silicon Valley fanbois: cryptographers @ #RSAC19 now agree, FacebookCoin is a sick joke
How to download a copy of everything Apple knows about you
Emails show RBS bankers joked about destroying the US housing market before 2008
The kings of capitalism are finally worried about the growing gap between rich and poor



Want to help struggling college students? Support the low-paid staff who teach them

High-Paying Trade Jobs Sit Empty, While High School Grads Line Up For University

(ISC)² Cybersecurity Exams Approved for College Credits by American Council on Education

1.5 Trillion in College Debt Trump Wants to Make It Legal for Debt Collectors to Text You “Where’s the Money, A$$hole?”
New rules would allow debt collectors to send customers unlimited texts and e-mails.

“A few months ago I was interviewing a college admissions coach who told me the following about how big of a donation it takes to get a child into an Ivy no questions asked: “There’s a certain magic number. It’s way higher than people think: $10 million.””

Elite College Admissions Are a Zero-Sum Game

How Admissions Works at Williams
Williams admissions work the same as admissions at most other elite colleges. If you understand the process at Swarthmore or Princeton, then you understand 99% of what happens at Williams.

Does It Matter Where You Go To College? Some Context For The Admissions Scandal –

Is a perfect ACT score rare? Not so much anymore, thanks to expensive test prep.
“It’s kind of encouraged to get good at test taking.” That’s an understatement: The number of perfect ACT scores is 6 times higher than 8 years ago.

How Americans have come to see college as a requirement

Does your income make you middle class where you live? Use this calculator to see where your income falls compared to other households in your county or the U.S. as a whole.

How much money do you make? — Ask a Manager

Why Poverty Is Like a Disease
Emerging science is putting the lie to American meritocracy.
By Christian H. Cooper Photography by Nathan Cooper April 20, 2017

What a $1,000 Per Month Universal Basic Income Would Look Like

Scientists think a new fault line might turn Nevada into a coast
Move aside, San Andreas. A new fault is shaking up the tech industry’s latest frontier in the West—and only a small group of scientists is paying attention. On a recent trip to Nevada’s Pyramid Lake, geologist James Faulds explores what he believes may become the future continental edge of North America. U.S. ROUTE 395 is a geologic master class disguised as a road. It runs north from the arid outskirts of Los Angeles, carrying travelers up to Reno along the eastern flank of the Sierra Nevada.

Kennedy vs. Nixon – 1st 1960 Debate

Really wonderful Video of NY 1911

How Do I Look? Dimitri From Paris – Une Very Stylish Fille


Update on American Medical Collection Agency breach: Almost 12 million Quest Diagnostic patients impacted

Update on American Medical Collection Agency breach: Almost 12 million Quest Diagnostic patients impacted

On May 10, broke the story of a medical collection agency breach involving American Medical Collection Agency.  The breach had been discovered by Gemini Advisory, who informed this site that they had found approximately 200,000 patients’ payment card info for sale on a well-known marketplace. The cards had apparently been compromised between September, 2018 and the beginning of March, 2019.

When AMCA did not respond to Gemini’s notification attempt, Gemini Advisory reported their findings to law enforcement, who then contacted AMCA.

AMCA did not subsequently respond to’s questions about the incident, although by May 10, it was clear that AMCA knew and had been addressing the problem (as screenshots this site published suggested).

Today, ABC news reports that AMCA has reportedly informed Quest Diagnostics that 11.9 million of their patients may be impacted — and that’s just one company. ABC reports:

AMCA believes this information includes personal information, including certain financial data, Social Security numbers, and medical information, but not laboratory test results.

Quest reports that AMCA has not yet provided them or Optum360 detailed or complete information about the AMCA data security incident, including which information of which individuals may have been affected.

American Medical Collection Agency breach impacted 200,000 patients – Gemini Advisory

Main Office: pay your bill

Forbidden You don’t have permission to access /webpay on this server.

MORALS & ETHICS: We are compliant with all Federal and State Laws and are members of ACA International. We provide our services adhering to the ethical guidelines expected from a National Accounts Receivable Management firm.

Address: 4 Westchester Plaza
Suite 110
Elmsford, NY 10523

Phone: (800) 666-8097
Fax: (914) 992-8935

Customer Service: (844) 505-DEBT
Client Service: (800) 666-8097, Option 1
Sales: (800) 666-8097, Option 2

On February 28, 2019, Gemini Advisory identified a large number of compromised payment cards while monitoring dark web marketplaces. Almost 15% of these records included additional personally identifiable information (PII), such as dates of birth (DOBs), Social Security numbers (SSNs), and physical addresses. A thorough analysis indicated that the information was likely stolen from the online portal of the American Medical Collection Agency (AMCA), one of the largest recovery agencies for patient collections. Several financial institutions also collaboratively confirmed the connection between the compromised payment card data and the breach at AMCA.

Understanding When Business Associates Are Directly Liable Under HIPAA

New guidance issued by the U.S. Department of Health & Human Services (HHS) Office for Civil Rights (OCR) reaffirms that business associates must have proper HIPAA compliance practices, safeguards and documentation in place in order to avoid costly penalties.

OCR recently released a Fact Sheet summarizing the instances in which a business associate is directly liable for HIPAA violations. While nothing in the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (HIPAA Rules) has changed at this time, the Fact Sheet, released on May 24, 2019, aims to make it easier for regulated entities to understand and comply with their obligations under the law.


Direct Liability of Business Associates In 2009, Congress enacted the Health Information Technology for Economic and Clinical Health (HITECH) Act,1 making business associates of covered entities directly liable for compliance with certain requirements of the HIPAA Rules.  Consistent with the HITECH Act, the HHS Office for Civil Rights (OCR) issued a final rule in 2013 to modify the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules.2  Among other things, the final rule identifies provisions of the HIPAA Rules that apply directly to business associates and for which business associates are directly liable

Cyber Command appoints new No. 2 amid growing battle with foreign hackers

Cyber Command appoints new No. 2 amid growing battle with foreign hackers

By Martin Matishak

The head of U.S. Cyber Command has tapped the organization’s chief of staff to be his new deputy, filling a critical vacancy as the command looks to bolster operations to defend the 2020 election from foreign interference.

Army Gen. Paul Nakasone, who also helms the National Security Agency, promoted Navy Rear Adm. Ross Myers to the rank of vice admiral on Memorial Day, according to Cyber Command.

Myers became chief of staff at Cyber Command headquarters in May 2018, the same month Nakasone took the reins. He fills the slot left open by Marine Corps Lt. Gen. Vincent Stewart, whose retirement was first reported by POLITICO in March. He left the command after a 40-year career in the U.S. military.

The Senate confirmed Myers last week. The Defense Department previously announced in March that Army Maj. Gen. John Morrison, the commander of Fort Gordon, Ga., and the Army’s Cyber Center of Excellence, would replace him as Cyber Command chief of staff.