Security forces picked up the Pfizer Data and hand delivered it to the U.S. Food and Drug Administration yesterday 11/21/2020. Once granted an authorization, Pfizer plans to begin shipping doses “within hours” of the notice.
FDA official Peter Marks, M.D., Ph.D., said Americans can expect a “very open process” when it comes to COVID-19 vaccine reviews. (FDA) Americans should expect reviews to take weeks rather than days, Peter Marks, M.D., Ph.D., head of the FDA’s Center for Biologics Evaluation and Research, told Business Insider. While the dire COVID-19 pandemic naturally creates urgency, Marks and his team “have to take the amount of time that we need to take,” he said. The FDA is said to be discussing potential committee meetings for December 8 to 10, CNBC’s Meg Tirrell reports.
THE WEEK OF NOVEMBER 23 2020 the FDA intends to issue a Federal Register notice with details of the meeting, which will include information about a public docket for comments. At that time, public comments can be submitted. These comments will be reviewed by the FDA.The FDA intends to livestream the VRBPAC meeting on the agency’s YouTube, Facebook and Twitter channels; the meeting will also be webcast from the FDA website. https://twitter.com/US_FDA
DECEMBER 8 2020 is the deadline for states to resolve disputes concerning the appointment of their electors
DECEMBER 10 2020 The U.S. Food and Drug Administration has scheduled a meeting of its Vaccines and Related Biological Products Advisory Committee (VRBPAC) on to discuss the request for emergency use authorization (EUA) of a COVID-19 vaccine from Pfizer, Inc. in partnership with BioNTech Manufacturing GmbH.
HURT THE FEELINGS! Trump is insane, he is also demented remember Trump wanted to nuke a hurricane, and shoot a virus.
SAY HER NAME Emily Murphy @GSAEmily Administrator of @USGSA is breaking the law and shoud be jailed. Do Not Hire this woman ever! The law says “apparent” winner. Biden is the apparent winner.
@GSAEmily needs to be BLACKLISTED for future employment.
Get GSA Sdmin Emily Murphy Blacklisted
GSA Admin Emily Murphy just got a Congressional demand letter to brief House leaders “immediately” on why she has not started the transition.
Republicans publicly acknowledge Joe Biden is the next president and tell Trump administration to begin sharing intelligence and other transitions to allow for a smooth transfer of power. As soon as people start thinking Republican resistance is hurting rethuglicans in Georgia, that’s when you’ll see rethuglicans say something.
35 years ago, on November 20th 1985, Microsoft released first version of Windows.
Mudge is the new head of security at Twitter. “Mudge” Zatko head of security. Priors at DARPA, Google, L0pht and Cult of the Dead Cow. about cDc. I mentioned 8lgm and TESO as examples of hacking groups best understood as hacking groups, unlike cDc. Someone said: “never heard of them”. Twitter also announced Tuesday that it’s planning voice-only chat rooms called Spaces where you talk instead of type.
1963: The earliest known use of the word “hacker” in connection with computers was in an article in The Tech, MIT’s student paper. “Many telephone services have been curtailed because of so-called hackers.” Oh no – those pesky “so-called” hackers according to Prof. Carlton Tucker, administrator of the Institute phone system. […] The hackers have accomplished such things as tying up all the tie-lines between Harvard and MIT, or making long-distance calls by charging them to a local radar installation. One method involved connecting the PDP-1 computer to the phone system to search the lines until a dial tone, indicating an outside line, was found. […] Because of the “hacking,” the majority of the MIT phones are “trapped.” https://www.wordorigins.org/big-list-entries/hacker?rq=hacker https://twitter.com/todayininfosec/status/1329977518645010432/photo/1
Biden’s team is Frozen out of the government network, the transition team is relying on a standard, paid Google Workspace network, according to people familiar with the matter and a review of publicly available internet registration records associated with the team’s email domain.
The Biden team also is using a set of enhanced protection features on all of its accounts, people familiar with the matter said. It requires that staff use Titan Security Keys, a physical device needed to log into their accounts, and it has limited access to internal information on a need-to-know basis in a series of restricted shared drives, the people said.
Current and former U.S. officials and security experts said the transition team’s reliance on its own cyber defenses could make it more vulnerable to attack. Conscious of the hacking threat, the transition team has briefed staff on information-security procedures for both their personal and professional accounts, one official said. https://www.wsj.com/articles/biden-team-lacks-full-u-s-cybersecurity-support-in-transition-fracas-11605891470
[ESPECIALLY HORRIBLE]US can kill its own citizens without review when state secrets are involved, DOJ lawyer argues
By Debra Cassens Weiss November 18, 2020
A U.S. Department of Justice lawyer argued Monday that the United States can kill its own citizens without judicial review when litigation would reveal state secrets. The argument drew alarm among judges on the U.S. Court of Appeals for the District of Columbia Circuit, Courthouse News Service reports. Judge Patricia Millett characterized the DOJ’s argument as giving the government the ability to “unilaterally decide to kill U.S. citizens,” according to coverage of the argument by Courthouse News Service. “Do you appreciate how extraordinary that proposition is?” “Whether that’s in a parking lot in the United States or abroad in Syria, the government has claimed—for the first time ever in this case—that it has unfettered and unreviewable discretion to kill US citizens at will,” Plochocki said. https://www.abajournal.com/news/article/doj-lawyer-argues-us-can-kill-its-own-citizens-without-review-when-state-secrets-are-involved
The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies
The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.
In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA. https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies
The Central Intelligence Agency has awarded its long-awaited Commercial Cloud Enterprise, or C2E, contract to five companies—Amazon Web Services, Microsoft, Google, Oracle and IBM. Under the C2E contract vehicle, the companies will compete for specific task orders issued by the CIA on behalf of itself and the 16 other agencies that comprise the intelligence community. The CIA did not disclose the expected value of the contract to Nextgov, but procurement documents issued by the agency in 2019 indicated it could be worth “tens of billions” of dollars over the next decade and a half. https://www.defenseone.com/technology/2020/11/nato-experiments-deceptive-tactics-lure-russian-hackers/170248/
Some Pennsylvania Republicans led by Rep. @MikeKellyPA are asking a state court to declare that the state’s entire vote-by-mail system, violates the state constitution and that millions of votes cast this year must now be invalidated. https://twitter.com/bradheath/status/1330223667251441672
When a new tax collector elected himself in a Pa. town, chaos ensued 2018
Shows exactly what can happen in this country. Cutler was elected tax collector in 2013 in East Lampeter Township, Lancaster County, with one vote — his own write-in vote. Though East Lampeter had not had a tax collector in decades — the county did the job — Cutler insisted he was now an elected official under the law, and began to work as township tax collector. Cutler’s case triggered the introduction of a bill to allow towns to eliminate the “antiquated” tax collector’s position, prompting pushback from the Pennsylvania State Tax Collectors Association, which regards the proposal as an existential threat to an independent elected office. https://www.inquirer.com/business/tax-collector-jeffrey-cutler-east-lampeter-pa-lancaster-county-20181211.html
NATO Experiments With Deceptive Tactics to Lure Russian Hackers https://www.defenseone.com/technology/2020/11/nato-experiments-deceptive-tactics-lure-russian-hackers/170248/
Latest cyber wargame shows new uses for honeypots, which have worked against the Russians in the past.
Imagine you’re a young cyber officer in the Russian military looking to break into the defended network of a NATO government. You identify a target, a person whose credentials you could steal to gain access to the network and then perhaps move from node to node, looking for sensitive information to exfiltrate. You send your target a phishing email. The target clicks the link. You’re in! But later on, you learn that the information you stole was meaningless and you may have exposed your own techniques or tools. Your adversary wanted you to succeed in the hack — to get information on you. This is the value of honeypots, a deceptive cybersecurity practice that NATO used as part of its most recent exercise, NATO Cyber Coalition, which took place in Estonia and other locations from Nov. 16 to 20.
Privilege: “I’ll protect my rights, my choice is more important than your health, I won’t wear a mask”.
Jesus: “love thy neighbor, serve others, give your life for your friends, die to yourself, bless your enemies, be a peacemaker, care for the sick”.
#DELETE FUCKING FACEBOOK NOW
Facebook Is Going After Its Critics in the Name of Privacy
The company wants to shut down an academic study of political ad targeting, just as it prepares to reinstate targeted political ads. If the team doesn’t fully dismantle its public-interest research project and delete its data by November 30, Facebook says, it “may be subject to additional enforcement action.” Why? Because the $775 billion company wants to protect our privacy. https://www.wired.com/story/facebook-is-going-after-its-critics-in-the-name-of-privacy/
Potential new target to combat inflammatory diseases https://www.sciencedaily.com/releases/2020/11/201119103044.htm
Researchers have uncovered a drug-like compound that blocks a crucial inflammatory pathway, potentially paving the way for a new treatment for a host of diseases — including COVID-19. The team discovered the compound could prevent up-regulation of CD14, a key inflammatory protein.
“I thought of going somewhere else, or doing something else,” Karikó said. “I also thought maybe I’m not good enough, not smart enough. I tried to imagine: Everything is here, and I just have to do better experiments.”
Katalin Kariko spent the 1990s collecting rejections.
Katalin Karikó leads the mRNA-based protein replacement program for BioNTech RNA Pharmaceuticals. She has more than 30 years of experience working with RNA. Prior to joining BioNTech RNA Pharmaceuticals, Dr. Karikó was on the faculty at the University of Pennsylvania Medical School for 25 years. It is a story that began three decades ago, with a little-known scientist who refused to quit. Katalin Karikó spent the 1990s collecting rejections. Her work, attempting to harness the power of mRNA to fight disease, was too far-fetched for government grants, corporate funding, and even support from her own colleagues. Katalin Karikó, a senior vice president at BioNTech overseeing its mRNA work, in her home office in Rydal, Pennsylvania. After a decade of trial and error, Karikó and her longtime collaborator at Penn — Drew Weissman, an immunologist with a medical degree and Ph.D. from Boston University — discovered a remedy for mRNA’s Achilles’ heel.
“Stop depending on the rule of law. We’re in an endless loop. The left keeps depending on the system, and the right rigs the system and then the left is positively STUNNED when things don’t work out its way.”
“No matter what you do, we will be attacked by the establishment…We are living in a nation with massive income and wealth inequality…What Congress has got to do immediately with a COVID-19 package is start protecting working families.” –@BernieSanders
@SenWarrenStudent loan debt is holding back a whole generation from buying homes, starting small businesses, and saving for retirement – all things we rely on to grow our economy. Executive action to #CancelStudentDebt would be a huge economic stimulus during and after this crisis.
come Jan 21st is when the @GOP will also start caring about budget deficits again. #GOPHypocrisy at it’s finest.
Remember when conservatives and the GOP were so upset abt Obama expenses It has been estimated that Trump and his klan are averaging over a $105 million per year. Obama’s expenses were $98 million for his entire 8 years.
Why no @GOP outrage now? I wish I could get an answer!
ANSWER: The GOP feels that they’re the ruling class. Whatever they want to do is fine. In their mind it’s their world and the rest of us are just servants in it. No one likes an uppity servant.
William F. Buckley and Argentina’s Dirty War
[ . . . American marketing and PR firm Burson-Marsteller, which kept a list of potentially sympathetic journalists for the use of the junta. On the list, next to Buckley’s name, someone from the firm had written, “could be convinced to make the trip to Argentina after the US elections.” And now, here he was.
By cross-referencing contracts and other documents from the PR campaign with episodes of Firing Line, diplomatic cables released by Wikileaks in 2010, and the NSA Archive Project, it is possible to gain a fuller picture of the role Buckley, and international media in general, played in helping to paper over the atrocities of the Argentine government.
Zoom lied to users about end-to-end encryption for years, FTC says Ars Technica: Video calling giant Zoom has agreed to settle with the Federal Trade Commission, which accused the company of lying to its users by claiming for years that it offered end-to-end encryption. Zoom’s usage rocketed from 10 million to 300 million meeting users during the pandemic while everyone was working from home, and the company’s claims caught the attention of reporters — and later regulators. Zoom is now required to have a “robust information security program” as part of the settlement, and must roll out multi-factor authentication. Zoom can face heavy fines if it violates the terms of the order. More:Cyberscoop | TechCrunch
Why Can’t You Download Videos on YouTube? How a 20-Year-Old Law Stops you. We’re in a world where it might be illegal to modify the software on your own rice cooker that you bought with legal tender money. If that sounds absurd, that’s because it is.”
AI is wrestling with a replication crisis (MIT Tech Review)
Tech giants dominate research but the line between real breakthrough and product showcase can be fuzzy. Some scientists have had enough.
Last month Nature published a damning response written by 31 scientists to a study from Google Health that had appeared in the journal earlier this year. Google was describing successful trials of an AI that looked for signs of breast cancer in medical images. But according to its critics, the Google team provided so little information about its code and how it was tested that the study amounted to nothing more than a promotion of proprietary tech.
“We couldn’t take it anymore,” says Benjamin Haibe-Kains, the lead author of the response, who studies computational genomics at the University of Toronto. “It’s not about this study in particular—it’s a trend we’ve been witnessing for multiple years now that has started to really bother us.”
Haibe-Kains and his colleagues are among a growing number of scientists pushing back against a perceived lack of transparency in AI research.“When we saw that paper from Google, we realized that it was yet another example of a very high-profile journal publishing a very exciting study that has nothing to do with science,” he says. “It’s more an advertisement for cool technology. We can’t really do anything with it.”
Science is built on a bedrock of trust, which typically involves sharing enough details about how research is carried out to enable others to replicate it, verifying results for themselves. This is how science self-corrects and weeds out results that don’t stand up. Replication also allows others to build on those results, helping to advance the field. Science that can’t be replicated falls by the wayside.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.