We need to develop nationwide policies and security protocols that would govern how voting machines are secured.

We need to develop nationwide policies and security protocols that would govern how #voting machines are secured.

https://www.edu-cyberpg.com/Technology/vote.html

The fact that information is stored unencrypted on hard drives simply makes no sense in the current threat environment. That they can be left on devices, unencrypted, that are then sold on the open market is malpractice.

Since these machines are for sale online, individuals, precincts, or adversaries could buy them, modify them, and put them back online for sale. Envision a scenario in which foreign actors purchased these voting machines. By reverse engineering the machine like I did to exploit its weaknesses, they could compromise a small number of ballot boxes in a particular precinct. That’s the greatest fear of election security researchers: not wholesale flipping of millions of votes, which would be easy to detect, but a small, public breach of security that would sow massive distrust throughout the entire election ecosystem.

I BOUGHT USED VOTING MACHINES ON EBAY FOR $100 APIECE. WHAT I FOUND WAS ALARMING

AUTHOR: BRIAN VARNERBRIAN

IN 2016, I bought two voting machines online for less than $100 apiece. I didn’t even have to search the dark web. I found them on eBay. Surely, I thought, these machines would have strict guidelines for lifecycle control like other sensitive equipment, like medical devices. I was wrong. I was able to purchase a pair of direct-recording electronic voting machines and have them delivered to my home in just a few days. I did this again just a few months ago. Alarmingly, they are still available to buy online.
reverse-engineered the machines to understand how they could be manipulated. After removing the internal hard drive, I was able to access the file structure and operating system. Since the machines were not wiped after they were used in the 2012 presidential election, I got a great deal of insight into how the machines store the votes that were cast on them. Within hours, I was able to change the candidates’ names to be that of anyone I wanted. When the machine printed out the official record for the votes that were cast, it showed that the candidate’s name I invented had received the most votes on that particular machine.
This year, I bought two more machines to see if security had improved. To my dismay, I discovered that the newer model machines—those that were used in the 2016 election—are running Windows CE and have USB ports, along with other components, that make them even easier to exploit than the older ones. Our voting machines, billed as “next generation,” and still in use today, are worse than they were before—dispersed, disorganized, and susceptible to manipulation.

A recent in-depth report on voting machine vulnerabilities concluded that a perpetrator would need physical access to the voting machine to exploit it. I concur with that assessment. When I reverse-engineered voting machines in 2016, I noticed that they were using a smart card as a means of authenticating a user and allowing them to vote. There are many documented liabilities in certain types of smart cards that are used, from Satellite receiver cards to bank chip cards. By using a $15 palm-sized device, my team was able to exploit a smart chip card, allowing us to vote multiple times.

Karl Auerbach
Date: March 18, 2019
Well more than a decade ago, but after the disastrous Gore vs Bush election the Open Voting Consortium bought a used Diebold DRE (touchscreen) voting machine that had become unclaimed freight. An interesting aspect is that the laws regarding unclaimed freight can potentially extinguish or diminish things like license limitations – or non-disclosures – that might have applied to those taking the items in a normal chain of transfers.

The machine was as heavy as a Diebold vault, but that’s where the security ended.  It had a cheap lock that could, and was, picked in just a few seconds.  It ran MS Windows CE off of a compact flash.  It even still had the votes from the last election in which it was used (in Ohio.)

Subsequently I was part of a team on a project to build a reference implementation of voting systems for the state of California (and anyone else) – from precinct and canvassing (counting) center hardware to vote capture machines to vote counting machines to all of the surrounding procedures.  We had buy in for all of the various parts – UCLA and UC Berkeley law on procedures, UC Merced on hardware, UC Santa Cruz on software, etc.

We did not find “open source” to be necessary.  Rather we felt that the public would be best served by systems that could be inspected by anyone (including inspection of code), full testing by any interested party (of all components), and open publication of test results.  We did not feel that it was necessary to take the step to require free distribution (or re-distribution) of parts: we wanted to encourage private vendors to produce this stuff and we had to leave them some incentive to do so.

The key element was that all of the devices would be totally open for inspection and testing – and that at the precinct all inter-machine APIs would be in the form of paper that could be reliably read by both humans (with normal eyesight) and machines.

Some precinct machines would gather voter intent – with different machines for different kinds of human frailties ranging from bad eyesight to inability to accurately use a finger on a touch screen.  All would produce that paper ballot.  Separate machines would record those ballots.

Most people have tended to forget that often the easiest place to steal an election is in the transfer of ballots/tallies from precincts to the counting/canvassing center or at the counting center itself, especially as we move towards instant runoff style ballots.  So we designed all of that stuff, and procedures, as well.

One surprising obstacle was from county clerks:  they are tasked with the very difficult jobs of delivering a believable election on a small budget.  They have to deal with all of the practical things like warehousing voting machines and training precinct workers.  They have a real concern about the costs of storing paper ballots; they are not equipped to become local versions of Iron Mountain.

In addition various states have old laws that have to be rewritten.  For example, California has very strict limits on how long voting materials – such as cast ballots – can be retained after an election.

Unfortunately the project died before it was launched due to a sex (I think) scandal involving the California Secretary of State that broke on the day he was to sign the papers to launch the project.)

I think that it is a project that deserves to be resurrected.

THEY ALREADY KNOW WHO YOU ARE WHEN YOU #VOTE

Exactis, as the source of a leak of the personal records of nearly everyone in the United States.

Exactis, as the source of a leak of the personal records of nearly everyone in the United States.

The result is a cautionary tale about the liability that a massive dataset can create for a tiny company like Exactis. It also hints at just how easy it’s become for small firms to wield massive, leak-prone databases of personal information—without necessarily having the resources or know-how to secure them.

https://www.wired.com/story/exactis-data-leak-fallout/

WIRED had revealed that Exactis exposed a database of 340 million records on the open internet, as first spotted by an independent security researcher named Vinny Troia.

Using the scanning tool Shodan, Troia identified a misconfigured Amazon ElasticSearch server that contained the database, and then downloaded it. There he found 230 million personal records and another 110 million related to businesses—more than two terabytes of information in total. Those files didn’t include credit card information, passwords, or Social Security numbers. But each one enumerated hundreds of details on individuals, ranging from the value of people’s mortgages to the age of their children, as well as other personal information like email addresses, home addresses, and phone numbers.

Exactis licensed that information to marketing and sales customers, so that they could integrate it with their existing databases to build more comprehensive profiles. But privacy advocates have warned that those same details, left open to the public, could just as easily allow spammers or scammers to profile targets.

the most painful breaches, like the Office of Personnel Management or Anthem health insurance incidents that involved stolen Social Security numbers and other hard-to-change personal data, are naturally the most valuable targets for attackers. Don’t forget the massive credit reporting agency Equifax to that list.

[ECP] NetHappeinings 3/12/19 #K12 #CPO

#NetHappenings @Nethappenings

3/12/19 #Web30 The World Wide Web turns 30 today!

Do you remember what life was like 30 years ago, pre-www,  when cyber-utopians heralded the new era of human collaboration and communication to  the underworld of social media posts called  ‘e-bile’?

Who Invented the Internet?
Who Controls The Internet?
Seven people control the system at the heart of the web: the domain name system, or DNS.

NetHappenings Where Internet Pioneer Gleason Sackmann got things started.

► @NetHappenings 

► K12PlayGround TM 
1st and oldest online K12 School directory in the World ©1993 History:
Be a part of Internet History!
Find, Edit, and Submit your K12 school information.
Join a #STEAM Project link to video project  find with #hashtags
@K12PlayGround

EduTech of ND @EduTechND History: Where Internet Pioneer Gleason Sackmann got things started.
EduTech provides information technology services and education technology professional development to K-12 educators in ND.

https://twitter.com/edutechnd

Girls Go CyberStart. The 2019 Girls Go CyberStart program is a series of online challenges that allow students to act as cyber protection agents to solve cybersecurity-related puzzles and explore related topics such as cryptography and digital forensics.
+++++++++++++++++++++++++++++++++++++++

NetBSD is a free, fast, secure, and highly portable Unix-like Open Source operating system. It is available for a wide range of platforms, from large-scale servers and powerful desktop systems to handheld and embedded devices.

Marcus J. Ranum, #Computer and #NetworkSecurity Researcher is now discussing our assumptions about #ComputerSecurity at #govsatcom 2019 #CyberSecurity #Luxembourg

2011 “The Internet will remain as insecure as it is possible to be and still function. ” -Marcus Ranum

► Amnesty Demands Israel Revoke NSO’s License After Haaretz Report on Firm’s Negotiations With Saudis Israeli Firm’s Spyware Was Used to Track Khashoggi

► Coinbase’s Newest Team Members Helped Authoritarians Worldwide Monitor Journalists and Dissidents H — king team
https://foreignpolicy.com/2016/04/26/fear-this-man-cyber-warfare-hacking-team-david-vincenzetti/

Never underestimate power, never underestimate fame. And our nation is run on loyalty, whether it be in Congress or your own little home, we’re positively tribal. Being rich and famous does not entitle you to break society’s rules. From time immemorial the wealthy have paid for silence, look at banks and offshore tax accounts.

+++++++++++++++++++++++++++++++++++++++

How much less California spends on each public school student than other states.
$25.4k per student in NYC, $16.7k in PA and $10.4k here in California.
How do young families keep moving  to CA?

Rankings of the States 2017 and Estimates of School Statistics 2018

California is 41st in the nation in per pupil K-12 spending

California is “No. 1 in per prisoner” spending.

Mostly True: You are shocked because the stats are bunk. Look at how much California teachers make (2nd highest in US) and then ask how overall spending could rank 41st? Answer: the 41st stat, like the $10.4k per student stat, has been helpfully “adjusted” to eliminate salary differences.

FALL ENROLLMENT 49,800,148 children
Average Daily Attendance 46,457,525 children

2017 High School Graduates 3,238,440 page 18

AVERAGE SALARY OF INSTRUCTIONAL STAFF 60,206 page 25
AVERAGE SALARY OF TEACHERS  58,479 page 26

How Much Federal Money follows the child out of the public school system into for profit charter follows no rules companies.

PUBLIC SCHOOL REVENUE PER STUDENT IN FALL ENROLLMENT page 29
PERCENTAGE OF COMBINED STATE & LOCAL REVENUE 49.8 page 34

The exceptions start on page 83
example: Enrollment figures only include students attending public schools and do not include those students attending private schools at public expense.

WHAT ABOUT ALL THE MONEY FROM THE LOTTERY?

Is The Lottery Shortchanging Schools?

Powerball Windfall? Schools Don’t Always Benefit From Lottery Sales

“Revenues generated from lottery have very little or no impact on overall education spending,” said Lucy Dadayan, a senior policy analyst at the Nelson A. Rockefeller Institute of Government, an Albany, New York, think tank. The reason: State legislatures often use the millions of dollars that come in from the lottery as an opportunity to reallocate other funds intended for schools from the state’s general revenue, making the overall education budget barely higher than it was before lottery money was added. “The state legislators added the funding in to the budget, and then they take it out,” said John O’Neil, communications director for the Virginia Education Association, an organization of more than 50,000 teachers and school professionals.

►Public school districts large systems that serve close to or more than 100,000 students have No Chief Privacy Officers.

Who is senior-level official who is responsible for the organization’s privacy policies and data governance in your school district?

Big Education Ape: Oakland, CA: Billionaires Will Convene to Discuss New Plans for Privatizing Public Schools | Diane Ravitch’s blog

Stats already show that Charter Schools do not graduate their students from high school.

Billionaires want all the K12 Department of Education money meant for the common good, the commons, our common wealth for their own pocket. These billionaires want the tax payers money for their own private  gain just to enrich themselves.

This has NOTHING to do with the quality of K12 Education.

The big business of selling student information and they do not protect their rights to privacy.

This is the art of the Steal.

https://www.newschools.org/about-us/team/donors/

Buying and selling the Data!

Anonymous at the top of the list
Chan Zuckerberg Foundation
Charles & Helen Schwab Foundation
The Walton Family Foundation
W.K. Kellogg Foundation
Perkins Hunter Foundation (Perkins family wealth started by opium drug running pirates)
The College Board
Michael & Susan Dell Foundation
John & Ann Doerr
Omidyar Network

► THERE ARE NO CHIEF PRIVACY OFFICERS IN K-12 EDUCATION

Children’s Rights K12 School Rights vs. Students Online privacy rights.

#StudentPrivacyRights

#ChiefPrivacyOfficer #CPO #K12CPO

STUDENT RIGHTS TO PRIVACY AND K12 SCHOOL RIGHTS VS. STUDENTS ONLINE PRIVACY RIGHTS.
and

DO YOU KNOW WHAT YOUR STATE IS COLLECTING ABOUT YOUR CHILD?There isn’t a single school district with a K-12 CPO. In fact, it is still extremely rare for districts to hire even one full-time employee dedicated to privacy.

Student Privacy Bill Protection : No Parental Consent Needed for Data Mining

Anyone who tells you they don’t need privacy because they “have nothing to hide” is a sheep that will enable a total surveillance state. Just don’t do it. Privacies protect our basic human rights.

► This story on IBM hoovering up millions of Flickr photos to power its facial recognition machine learning is fascinating and a nightmare

Facebook Is Giving Advertisers Access to Your Shadow Contact Information

: “Screen-grabbed from Facebook: a teacher had her students turn their phone volume up and create a collective record

Alex Stamos on Twitter: “This explains how Facebook plans to monetize a unified, 2 billion user end-to-end encrypted messaging service. I can’t think of a tech project with a more important privacy/safety balancing act than this one. I hope my friends working on it start public discussions on that.

Bob Lefsetz Zuckerberg’s Blog Post
A Privacy-Focused Vision for Social Networking
This isn’t about privacy, this is about MONOPOLY!

 

+++++++++++++++++++++++++++++++++++++++

COLLEGE ADMISSIONS IS BRIBED

A few months ago I was interviewing a college admissions coach who told me the following about how big of a donation it takes to get a child into an Ivy no questions asked: “There’s a certain magic number. It’s way higher than people think: $10 million.”

“what it takes to break into the 1% in various countries

$25 million nationwide college admissions cheating scam

“This case is about the widening corruption of elite college admissions through the steady application of wealth combined with fraud,” Andrew Lelling, the U.S. attorney for the District of Massachusetts, said at a news conference. According to Lelling, the ringleader of the scam is William Singer, owner of a college counseling service called Key Worldwide Foundation, who accepted bribes totaling $25 million from parents between 2011 and 2018 “to guarantee their children’s admission to elite schools.”
“The parents are a catalog of wealth and privilege,” Lelling said. “They include, for example, the CEOs of private and public companies, successful securities and real estate investors, two well-known actresses, a famous fashion designer and the co-chairman of a global law firm.”
Also named as defendants in the indictment are Robert Zangrillo, founder and CEO of the private investment firm Dragon Global; Bill Glashan, a businessman and international private equity investor; and Gordon Caplan, a New York attorney.

► Former PIMCO CEO Doug Hodge Named In Fraud Complaint Alongside Aunt Becky From “Full House”
Imagine surviving years of working with Bill Gross only to be taken down by bribing your kid into college. Um, Doug? You do have to talk in code. You’re doing a fraud.
JFC, you’d think a guy who spent that much time with Bill Gross would know how to bullshit properly.

How a Bicoin Evangelist Made Himself Vanish, in 15 (Not So Easy) Steps
#10 Buy a decoy house to fool the D.M.V.
Dozens of companies leaked sensitive data thanks to misconfigured Box accounts
Hospitals have ‘holy grail of personal data, ‘ yet their spending lags on 
digital security
Car alarms with security flaws put 3 million vehicles at risk of hijack
Drop Huawei or See Intelligence Sharing Pared Back, U.S. Tells Germany
Defense tech founded by Trump’s most prominent Silicon Valley supporters wins secretive military AI contract
Dreamers and Dropouts: Stories From Stanford, Cradle of Unicorns: The Good and the Bad of Stanford’s Massively Successful Startup Scene
Yes: a flying, jet-powered motorcycle As spec’ed out, the commercial speeder will weigh 231 lbs and be powered by four jet engines fueled with kerosene, diesel or Jet-A fuel. An ultralight version of the speeder will fly 60mph and won’t require a pilot’s license; alternatively, an experimental version of the craft will be able to fly over 150mph, but will require a formal license to fly. That aircraft should also have 30 minutes of flight time with 1200lbs of max thrust and a flight ceiling of 15,000 feet, though JetPack fully admits that most of its customers won’t need that…
Cyberization means it’s not your daddy’s war anymore: Kurdish rebels are exploiting an app to befriend and get information from Turkish soldiers. Reminiscent of the dating apps used by Hamas recently to spy on Israeli soldiers.

 NYC Media Lab newletter – https://nycmedialab.org/data/
How AI Will Rewire Us
Nicholas A. Christakis, Sterling Professor of Social and Natural Science at Yale and author of Blueprint: The Evolutionary Origins of a Good Society, believes AI is the only general purpose technology (GPT) that will fundamentally change our relations towards each other. If you look at any other GPT – the steam engine, electricity, the internet – these have changed everything around us except our “love, friendship, cooperation, and teaching” – what Christakis calls our evolutionary social suite. In this Atlantic piece, he explores how AI will be the first GPT to affect our social suite. Christakis noticed some peculiar things at his Yale lab. For one, when you include a cheerful bot who admits to occasional mistakes in a group assignment, the humans in the group work better together, vs. groups with bland robots. This holds true in larger experiments, with thousands of participants: “groups with mistake-prone bots consistently outperformed groups containing bots that did not make mistakes”. ~ Joly MacFie

John Gilmore  **Copyright seizure approaching** SpaCCS 2019 CFP (10+SIs): The 12th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage

Don’t submit your paper to this conference!  When researchers refuse to
supply their papers to the publishers who extort monopoly fees from
academic librarians, they have found the easiest way to tear down these
monopolies.

If you submit any paper to this conference, you will be forced
to assign your entire copyright in the paper to “Springer Nature
Switzerland AG”, now and forever, for their profit and your loss
and the public’s loss (see below).

Jun Feng is a program chair.  He should know to warn authors that
the whole conference is a scam on academic authors, which steals their
copyrights in order to extract large fees from academic libraries.  But
perhaps he did not mention this because he’s helping to run the scam.

I recommend publishing your work in Open Access conferences and journals in which (1) you are free to retain your copyright and control your
rights, and (2) the public is free to read your paper without paying
exhorbitant fees to a walled-garden publisher that prevents public
access to your scholarship.  See
https://en.wikipedia.org/wiki/Open_access

For example, the USENIX
Association runs many respected conferences and does Open Access
publication of their proceedings (https://www.usenix.org/).  The Public
Library of Science journals are also Open Access
(https://www.plos.org/).  Open access publishing increases your impact,
because all potential readers can actually read your paper.  Many
funders and academic institutions *require* that your work be published
with open access, because they have seen how the academic publishing
monopoly has damaged academic libraries (and science in general).

For general info about the highly profitable scams around academic
publishing, see:
https://en.wikipedia.org/wiki/Academic_publishing#Publishers_and_business_aspects

Jun Feng <junfeng989@gmail.com> wrote:

Papers must be clearly presented in English, must not exceed 14 pages (or
up to 20 pages with the pages over length charge) in Springer LNCS format (
https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines),

WHERE IS THE ANTITRUST LAW IMMUNE RESPONSE TO PARTRIMONAL CAPITALISM?

It’s so out of control

THE MONOPLY
Trends in governing have eroded the beliefs, norms and processes by which we learn to be accommodating citizens in a pluralistic, deliberative democracy. By manufacturing rights that limit democratic decision-making, centralizing power in Washington far from citizens’ lives, and empowering unelected bureaucrats in federal regulatory agencies, we’ve obstructed Americans’ practice of self-government.

WHERE IS THE ANTITRUST LAW IMMUNE RESPONSE TO PARTRIMONAL CAPITALISM?
Is law in the hands of the consumer or big business or the presidents colleagues?

Jerry Nadler is demanding information on Trump’s business and ties to Russia as well as the administration’s activities.
Representative Adam Schiff, the chairman of the House Permanent Select Committee on Intelligence, has hired Daniel Goldman, who served as an Assistant United States Attorney in the Southern District of New York from 2007 to 2017, as the committee’s senior adviser and director of investigations. He is a  veteran prosecutor with experience fighting Russian organized crime to lead his investigation of the Trump Administration.

Predatory Monoply Control
What the 1% Knows and you don’t
Capital in the 21st Century by Thomas Piketty
Moyers & Company
Economist Paul Krugman explains how the United States is becoming an oligarchy – the very system our founders revolted against.
Patrimonial Capitalism Oligarchy Wealth – inherited wealth
https://www.youtube.com/watch?v=QzQYA9Qjsi0

!!!!!! Documenting all the places personal data goes.
https://thedatamap.org/

►Top MultiState Buyers of Personal Health Information
https://thedatamap.org/map2013/statebuyers.php

HIBP Have I Been Pawned?
https://pastebin.com/search?q=%40aol.com

►Rich Uncle Penny Bags trolls Equifax Hearing
https://cyberplayground.org/2019/03/03/monoply-mr-moneybags-russia-graphic/

► The words “common” and “predominate” spell out the problem with 50-state cybersecurity class actions
A Congresswoman gave Equifax data breach lawsuits a gift
https://finance.yahoo.com/news/a-congresswoman-gave-equifax-data-breach-plaintiffs-a-gift-190737413.html

► The 50-State Cybersecurity Class Action Is Here to Stay. How to Defend Against It!
https://finance.yahoo.com/news/50-state-cybersecurity-class-action-033054371.html

Amazon CEO Jeff Bezos hates when he is spied on but loves to spy on everyone else.

How the National Enquirer obtained the intimate photos exchanged between Bezos and his mistress. Jeff Bezos new girlfriend, says she ‘loved being on camera’ sending Lauren Sanchez text messages.
https://www.aclu.org/blog/privacy-technology/surveillance-technologies/amazon-google-and-microsoft-are-odds-dangers-face

The world’s richest billionaire and a notorious labor abuser, Amazon CEO Jeff Bezos Builds a Sprawling Surveillance State for Everyone Else but doesn’t like it when his girlfriends phone gets hacked showing his sexting sexy texts of the adulterous affair via sms. It’s easy to trick cellular providers into essentially giving them access to the person’s phone number. Hackers just call up.

  • Verizon, impersonate you, and convince the company to redirect his text messages to a different SIM card, intercepting your one-time login codes.
  • Comcast set Xfinity mobile phone set pins to “0000,” for all it’s customers and no way for them to change it — helping attackers steal phone numbers Xfinity Mobile deploys fix after weak PIN system fueled number-porting attacks. Comcast help page was edited this week 3/1/19 to remove any references to the account PIN. xfinity Mobile does not allow adding a PIN to your number and the PIN is 0000 for all numbers.
  • Kanye West’s iPhone X password was 000000
  • Zuckerberg’s password across multiple accounts dadada

SO HEY YOU SHOULD STOP USING TEXTS FOR TWO-FACTOR AUTHENTICATION
sexting / text messages are easily hacked / sms insecure
SMS text messages are often the weakest link in two-step logins

Hack Someone’s Phone to View Text Messages
Reddit Hacked, Despite SMS Two-Factor Authentication The hacker gained access to Reddit’s internal systems by circumventing SMS-based two-factor authentication on employee accounts. “We learned that SMS-based authentication is not nearly as secure as we would hope,” a website engineer said.
https://www.pcmag.com/news/362871/reddit-hacked-despite-sms-two-factor-authentication

Push is an application level service, sitting on the top of existing WAP stack. The server does not simply send push content to the phone, the user would surely not accept, for instance, interrupting of a voice call.

SMS services are content services initiated by SMS message to certain (usually short) phone number, which then answers with requested content, if available. It can also be used to send regular text as well as advanced content like operator logos, ringing tones, business cards and phone configurations. Lastly… SMS, short messaging service, is a way to send short (160 character) messages from one GSM phone to another. Push over GPRS can only simplify matters. BUT QUITE SIMPLY, PHONES CURRENTLY OPERATE THIS WAY. Using two bearers seems to be an unnecessary complication. Because Push Proxy Gateway tokenizes SI and SL documents, it may fit one SMS message (if not, it is segmented for transfer). The push content is sent to the phones over SMS, but the content is fetched by the phone over IP bearer, for instance CSD or GPRS. Then the user can decide does he accept push or not. It contains an URL specifying the service and a text for user describing the content. These inform the user about the content become available, and it is displayed only when it is not interrupting anything. Instead it sends a specific XML document, either Service Indication or Service Loading. It defines three kind of XML documents, one for the push data itself and another for protocol purposes (these are called pap document or push control documents). OTA is a lightweight protocol speaking with WAP stack (to be more specific, with WSP), PAP speaks with the push initiator. It defines two protocols, OTA and PAP. For this purpose WAP Forum defined WAP Push. There is, however, situations when the server (called in this context a push initiator) should be the initiator, for instance, when it must send a mail notification or a stock quote. ^ explains pull mode of operation: the phone initiates the transaction. Therefore, Kannel (Twitter) functions simultaneously as both a WAP and an SMS gateway. Although WAP is the hot and technically superior technology, SMS phones exist in huge numbers and SMS services are thus quite useful.
https://en.m.wikipedia.org/wiki/Push_Proxy_Gateway

Turn on the service Text “on” to 40404
Turn off mobile updates but keeep an active account on the web you can test “off” to 40404 or visit Twitter.com and trun off phone alerts. To delete your account text “delete me” to 40404 or visit your settings page and click “Delete your account.”

ALL THIS SPYING ON YOU !!!! is just fine with Jeff he just doesn’t like it when it happens to him.

2017, Amazon’s Rekognition AI face-recognition software used by governments and police forces around the world to spy on crowds.

Amazon is vying for a $10 billion contract with the Department of Defense to consolidate and host its data on the cloud.
Google is no longer competing for the $10 billion contract, and it decided not to renew an AI contract with the Pentagon after employees signed a petition.

Jeff Bezos says his companies will continue to do business with the US Department of Defense, despite internal and external criticism.
“If big tech companies are going to turn their back on the DoD, this country is going to be in trouble,” said Bezos on stage at the Wired25 conference in San Francisco on Monday.
The billionaire has faced backlash from Amazon (AMZN) employees over its business deals with government agencies.

Amazon CEO Jeff Bezos acknowledged his company’s Amazon’s AI Rekognition face-recognition software might be put to “bad uses,” buh he said the solution was to wait for society’s eventual “immune response” to take care of the problems.

REPEAT THIS TO YOUR FRIENDS

► ► “When they substitute their knowledge for ours, we grow angry because they have robbed us of our agency.”

Trends in governing have eroded the beliefs, norms and processes by which we learn to be accommodating citizens in a pluralistic, deliberative democracy. By manufacturing rights that limit democratic decision-making, centralizing power in Washington far from citizens’ lives, and empowering unelected bureaucrats in federal regulatory agencies, we’ve obstructed Americans’ practice of self-government.
https://cyberplayground.org/2018/12/04/when-they-substitute-their-knowledge-for-ours-we-grow-angry-because-they-have-robbed-us-of-our-agency/

► Google employees walked out for the right to sue their bosses.
“This is just the beginning of a movement for more employee control of what gets built and for whom.”
https://cyberplayground.org/2019/03/01/google-employees-walked-out-for-the-right-to-sue-their-bosses/

► Amazon worker pushes Bezos to stop selling facial recognition tech to law enforcement
https://thehill.com/policy/technology/411622-amazon-workers-push-bezos-to-stop-selling-facial-recognition-tech-to-law

I’m an Amazon Employee. My Company Shouldn’t Sell Facial Recognition Tech to Police.
Amazon’s ‘Rekognition’ program shouldn’t be used as a tool for mass surveillance
https://medium.com/s/powertrip/im-an-amazon-employee-my-company-shouldn-t-sell-facial-recognition-tech-to-police-36b5fde934ac

A couple weeks ago, my co-workers delivered a letter to this effect, signed by over 450 employees, to Jeff Bezos and other executives. The letter also contained demands to kick Palantir, the software firm that powers much of ICE’s deportation and tracking program, off Amazon Web Services and to institute employee oversight for ethical decisions.
https://medium.com/s/oversight/shock-anger-disappointment-an-amazon-employee-speaks-out-88d927792950

►ACLU, “Rekognition can identify, track, and analyze people in real time and recognize up to 100 people in a single image.
It can quickly scan information it collects against databases featuring tens of millions of faces.” “Amazon’s Rekognition raises profound civil liberties and civil rights concerns.” “Amazon’s Rekognition raises profound civil liberties and civil rights concerns.”
https://www.aclu.org/blog/privacy-technology/surveillance-technologies/amazon-google-and-microsoft-are-odds-dangers-face

► Kent Walker, google’s general counsel and senior vice president of global affairs, made it clear that Google — unlike Amazon and Microsoft — will not sell a face recognition product until the technology’s potential for abuse is addressed.

Amazon encourages governments to use its technology to track “persons of interest” and monitor public spaces, comparing everyone to databases with tens of millions of faces.
Amazon even suggested pairing face recognition with police body cameras, a move that would transform devices meant for police accountability into roving mass-surveillance devices.

► Amazon’s Rekognition falsely matched 28 members of Congress against a mugshot database. Tellingly, congressional members of color were disproportionately misidentified, including civil rights leader Rep. John Lewis, D-Ga. And that test wasn’t based on a hypothetical: Law enforcement has already been using Rekognition to match pictures against arrest-photo databases.

► We’re All Spies, Now—And Not Even Trump Can Hide From Our Prying Eyes
“Loose tweets destroy fleets,” the U.S. Air Force advised in 2015.
Amateur plane-spotters tracked Air Force One as it secretly made its way to Iraq, demonstrating the power of readily-available tools to reveal covert military operations. Taking advantage of plane- and ship-tracking websites, commercial satellite imagery, internet forums for aviation photographers and other social media, these amateurs have become a new kind of hybrid journalist and spy. They call their practice “open-source intelligence,” or OSINT and claim they’re keeping people informed and holding government accountable.
https://www.thedailybeast.com/were-all-spies-nowand-not-even-trump-can-hide-from-our-prying-eyes
► Compromised supply chain attacks are a well-established, if underappreciated, method of surveillance — and much work remains to be done to secure computing devices from this type of compromise.
https://theintercept.com/2019/01/24/computer-supply-chain-attacks/
https://theintercept.com/document/2019/01/23/dod-2011-strategy-for-operating-in-cyberspace-supply-chain-excerpts/

►Federal lobbying law:
If the Saudis or any other foreign government did direct or pay any company to produce such a magazine, that company would be required to register with the government under the Foreign Agent Registration Act.

These revelations give rise to serious concerns about abuse.
“It’s important to remember that the NSA’s surveillance activities are anything but narrowly focused — the agency is collecting massive amounts of sensitive information about virtually everyone.” “A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are.” ~Jameel Jaffer, deputy legal director of the American Civil Liberties Union

The Associated Press show that a Pro Saudi digital copy of the magazine, produced by American Media Inc., was quietly shared with officials at the Saudi Embassy in Washington almost three weeks before its publication. Trump administration has aggressively courted the Saudis and found a willing partner on a range of issues, including Iran, counterterrorism and Middle East peace, in the kingdom’s royal family.

►Metadata embedded in the PDF file, obtained by the AP from two different individuals, show it was produced by an AMI production employee at 8:41 p.m. on Feb. 19. By the next day — Feb. 20 — Saudi officials had started forwarding it to Washington foreign policy contacts, giving them an early look.
► Pecker dined at the White House with Trump and a French businessman with close business ties to the Saudis, and later traveled to Riyadh to pitch Saudi investors on helping AMI acquire Time magazine, The New York Times reported.
► Kushner’s family real estate firm, The Kushner Cos., once sought money from a Saudi investor to buy out its partner in a Manhattan skyscraper that had been losing money for years.
► “Catch and Kill” AMI paid $30,000 8 months earlier to a former doorman at a Trump building requiring him to sign a contract that  prevented him from going public. AMI said it paid the doorman not for his silence, but for exclusive rights to the story
https://www.apnews.com/d293d282a9ec4d0c83fe0a25ff5f285c
►The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target’s credibility, reputation and authority.
https://theintercept.com/2019/02/08/jeff-bezos-protests-the-invasion-of-his-privacy-as-amazon-builds-a-sprawling-surveillance-state-for-everyone-else/
►Wherever you are, the NSA’s databases store information about your political views, your medical history, your intimate relationships and your activities online,” he added. “The NSA says this personal information won’t be abused, but these documents show that the NSA probably defines ‘abuse’ very narrowly.
►The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act.
► James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals
<https://www.huffpostbrasil.com/2013/11/26/nsa-porn-muslims_n_4346128.html?ec_carp=8743119989930048067>
► Trump Ordered Officials to Give Jared Kushner a Security Clearance
https://www.nytimes.com/2019/02/28/us/politics/jared-kushner-security-clearance.html