Missouri Rep Demands Public ID of Anyone Suing Over Separation of Church and State

Missouri Rep Demands Public ID of Anyone Suing Over Separation of Church and State

Missouri Representative Hardy Billington (R-Poplar Bluff) is on a mission from God. Unfortunately, it’s not the type of mission that requires driving to Chicago at night while wearing sunglasses, but rather one to make the separation of church and state just a bit less separate. In a House committee hearing Tuesday, Billington presented a bill that would force plaintiffs advocating for the separation of church and state — those suing to stop the public display of crosses on government property, or seeking to block prayer in public schools — to disclose their real names. No more Jane Doe or Jane Roe. In these cases, and only these cases, Billington would require the legal system to out the person suing.

The foundation has been busy in Missouri. In 2016, its complaint and threat of a lawsuit forced the Tipton school district to prohibit staff from leading prayers in school. In 2017, the nonprofit targeted a 60-foot long cross in a public park in Neosho — the city opted to sell a chunk of the park to a private entity rather than remove the enormous religious symbol.

NetHappenings: K12PlayGround.com Deadly Tech

K12PlayGround.com FIND YOUR K12 SCHOOL AND SUBMIT /EDIT YOUR K12 SCHOOL INFORMATION

FOLLOW https://twitter.com/K12PlayGround.com bookmark and read it without subscribing to twitter.

Deadly Tech

Ethical hackers can earn 16 times a software engineers’ salary, report

The US firm behind the deadly tech, Francisco Partners, wouldn’t answer questions. It’s backed by money from Goldman Sachs & Blackstone.
New details of how deadly Israeli technology—used to spy on Khashogi associates & other dissidents—made its way to Saudi. Note: the US firm behind the tech, Francisco Partners, wouldn’t answer questions.

Hacking Team Used a U.S. Partner To Sell Spyware to the UAE

SPECIAL REPORT: Inside UAE’s unit of ex-US spies

How to Find Hidden Cameras and Spy Bugs (The Professional Way)

A decade after Russia hacked the Pentagon, Trump unshackles Cyber Command

Paul Mozur China is in the midst of one of the nastiest social media crackdowns I can recall. Over the past few months 100s – maybe 1000s – have been called in by police for the crime of being on Twitter and expressing opinions about China.

Gerry Shih Fascinating look inside the “Tiger’s Cage” where China’s elite prisoners are held. Wang Lijun the police chief who fled to the US consulate in the BXL scandal now “spends his time studying English.” BXL walks around in a business suit instead of uniform

Australia’s Defence department was badly exposed to China’s hackers

After a Hiatus, China Accelerates Cyberspying Efforts to Obtain U.S. Technology

►  VTzilla: Mozilla Firefox Browser Extension
VTzilla is a Mozilla Firefox browser plugin that simplifies the process of scanning Internet resources with VirusTotal. It allows you to download files directly with VirusTotal’s web application prior to storing them in your PC. Moreover, it will not only scan files, but also URLs.

K12PlayGround.com COPYLEFT / OPEN SOURCE

K12PlayGround.com FIND YOUR K12 SCHOOL AND SUBMIT /EDIT YOUR K12 SCHOOL INFORMATION

FOLLOW
https://twitter.com/K12PlayGround.com bookmark and read it without subscribing to twitter.

COPYLEFT / OPEN SOURCE

Nicholas C. Zakas on Twitter:
“Mom: Dad said you invented a thing? ESLint?
Me: Yes.
Mom: What is it?
Me: It finds and fixes problems in JavaScript.
Mom: Huh. Do people use it?
Me: Basically everyone writing JS.
Mom: How much did you make on it?
Me: Nothing.
Mom: I don’t understand your industry.
Me: Me either.”

► Open Collective @opencollect
Organizing the Internet generation, one community at a time.

Elsevier journal editors resign, start rival open-access journal

Bryce Weiner “The true financial power of cryptocurrencies aren’t in the limited supplies which drive market volatility, but in the ability to mint your own money. That’s what “being your own bank” really means.”

Hacker Fantastic “2,982 bitcoin miners exposed to the Internet, have factory default credentials of “root/root” and an insecure unsigned firmware update process… this is going to end in tears

Wikipedia’s Larry Sanger Joins Blockchain Startup to Disrupt His Own Creation

World War II’s Best Codebreaker Was a Woman Elizebeth Smith Friedman

Shodan is the world’s first search engine for Internet-connected device  Antminer

►  Tim Bray · Google Memory Loss is ongoing – google isn’t coughing it up anymore / they don’t waste their effort going back to get what you are looking for – this has become the worst search engine to use.

[ECP] NetHappenings: email remains vulnerable, responsible for 94 percent of all attacks

Today’s Read

On what grounds can the FBI investigate the President
https://www.lawfareblog.com/what-grounds-can-fbi-investigate-president-counterintelligence-threat

A transnational crime syndicate backed by Russian oligarchs is pushing the UK off a cliff. You cannot, like Jeremy Corbyn, stand up against corruption at home but not stand up against it abroad.”
https://www.patreon.com/posts/24843802

Elections Commission Chief Uses the “Nuclear Option” to Rescue the Agency From Gridlock
The agency’s chair says she won’t allow its lawyers to defend it when it’s sued.
https://www.motherjones.com/politics/2019/02/elections-commission-chief-uses-the-nuclear-option-to-rescue-the-agency-from-gridlock/

Zuckerberg didn’t “sell” data he sold “access” !!!

cyberplayground

COLUMBUS DAY TEACH HISTORY THROUGH SONG
In fourteen hundred ninety-two Columbus sailed the ocean blue.

Maurice Abravanel was a descendant of Don Isaac Abravanel, born in 1438, who, as finance minister to Queen Esabella of Spain, arranged funding for the first voyage of Christopher Columbus.

Repeat: “U can’t march off 2 war in 3/4” ~ Karen Ellis
MUSIC OF WAR RESOURCES, PATRIOTISM, PROPOGANDA AND PROTEST
First Nation Songs, Civil War, WW1, WW2, Military War music Patriotic, Protest and Union Songs
“President’s Day Activities! Learn the President’s song 
Classroom Music, The State Song: Educational CyberPlayGround
classroom music, teach your state song. Find all 50 state songs

 
 

Carnegie Career College due to FRAUD

December 8, 2014 by Nick DeSantis
Carnegie Career College closed due to FRAUD
1292 Waterloo Rd, Suffield, OH

Defunct Career College’s Founders Plead Guilty to Fraud Charges

The founders of a defunct career college in Ohio have pleaded guilty to fraud charges in connection with allegations that they used the institution to steal $2.3-million in federal student-aid money, according to the Canton Repository.
John Richard Ceroni, 65, and Adale M. Ceroni, 63, pleaded guilty in federal court in Cleveland to charges related to mail fraud and money laundering. They had been accused of acquiring fake high-school diplomas for students they had recruited and using the documents to apply for financial aid on the students’ behalf.
The institution they operated, known as Carnegie Career College, closed after it was raided by FBI agents.
 
IT STILL SHOWS UP ON
TOTALLY USELESS
BBB http://www.bbb.org/canton/business-reviews/schools-academic-colleges-and-universities/carnegie-career-college-in-mogadore-oh-20003593/
matchcollege.com
colleges.findthebest.com
collegeview.com
communitycollegereview.com
cappex.com
studentsreview.com

Girls change the world and can do anything

Educational CyberPlayGround: Websites for Girls and Young Women who want to be involved with Technology
WEBSITES FOR GIRLS AND YOUNG WOMEN
How to help girls get into technology.
Real women engineers and other role models for girls.
Changing Girls’ Attitudes About Computers

“Don’t worry your pretty little head over it.”
Special Edition
Computer Wonder Women
National Women’s History Month
GIRLS WHO CODE: GIRLS CAN DO ANYTHING – GIRLS CAN CHANGE THE WORD
https://www.youtube.com/watch?v=dr6b4nwo-5k

XRay, first step in understanding how personal data is being used on web services

New tool makes online personal data more transparent

8/18/14 Columbia Engineering researchers develop XRay, first step in understanding how personal data is being used on web services like Google, Amazon, and YouTube

New York, NY—August 18, 2014—The web can be an opaque black box: it leverages our personal information without our knowledge or control. When, for instance, a user sees an ad about depression online, she may not realize that she is seeing it because she recently sent an email about being sad. Roxana Geambasu and Augustin Chaintreau, both assistant professors of computer science at Columbia Engineering, are seeking to change that, and in doing so bring more transparency to the web. Along with their PhD student, Mathias Lecuyer, the researchers have developed XRay, a new tool that reveals which data in a web account, such as emails, searches, or viewed products, are being used to target which outputs, such as ads, recommended products, or prices. They will be presenting the prototype, which is designed to make the online use of personal data more transparent, at USENIX Security on August 20. The researchers have posted the open source system, as well as their findings, online for other researchers interested in studying how web services use personal data to leverage and extend.
“Today we have a problem: the web is not transparent. We see XRay as an important first step in exposing how websites are using your personal data,” says Geambasu, who is also a member of Columbia’s Institute for Data Sciences and Engineering’s Cybersecurity Center.
We live in a “big data” world, where staggering amounts of personal data—our locations, search histories, emails, posts, photos, and more—are constantly being collected and analyzed by Google, Amazon, Facebook, and many other web services. While harnessing big data can certainly improve our daily lives (Amazon offerings, Netflix suggestions, emergency response Tweets, etc.), these beneficial uses have also generated a big data frenzy, with web services aggressively pursuing new ways to acquire and commercialize the information.
“It’s critical, now more than ever, to reconcile our privacy needs with the exponential progress in leveraging this big data,” says Chaintreau, a member of the Institute for Data Sciences and Engineering’s New Media Center. Geambasu adds, “If we leave it unchecked, big data’s exciting potential could become a breeding ground for data abuses, privacy vulnerabilities, and unfair or deceptive business practices.”
Determined to provide checks and balances on data abuse, XRay is designed to be the first fine-grained, scalable personal data tracking system for the web. For example, one can use the XRay prototype to study why a user might be shown a specific ad in Gmail. Geambasu and Chaintreau found, for example, that a Gmail user who sees ads about various forms of spiritualism might have received them because he or she sent an email message about depression.
Developing XRay was challenging, say the researchers. “The science of understanding the use of personal web data at a fine grain—looking at individual emails, photos, posts, etc.—is largely non-existent,” Geambasu notes. “There really isn’t anything out there that can accurately pinpoint which specific input—which search query, visited site, or viewed product—or combination of inputs explains which output. It was clear that we needed to come up with a new, robust auditing tool, one that can be applied effectively to many different services.”
How it Works
“We knew from the start that our biggest challenge in achieving transparency would be scale—how do we continue to track more data while using minimum resources?” Chaintreau says. “The theoretical results were encouraging, but seemed too good to be true. So we tested XRay in actual situations, learning from experiments we ran on Gmail, Amazon, and YouTube, and refining the design multiple times. The final design surprised us: XRay succeeded in all the experiments we ran, and it matched our theoretical predictions in increasingly complex cases. That is when we finally thought that achieving web transparency at large is not a dream in a distant future but something we can start building toward now.”
The current XRay system works with Gmail, Amazon, and YouTube. However, XRay’s core functions are service-agnostic and easy to instantiate for new services, and they can track data within and across services. The key idea in XRay is to use black-box correlation of data inputs and outputs to detect data use.
To assess XRay’s practical value, the researchers created an XRay-based demo service that continuously collects and diagnoses Gmail ads related to a set of topics, including various diseases, pregnancy, race, sexual orientation, divorce, debt, etc. They created emails that included keywords closely related to one topic and then launched XRay’s Gmail ad collection and examined the targeting associations. XRay’s data is now available online to anyone interested in sensitive-topic ad targeting in Gmail.
“We’ve just started to peek into XRay’s targeting data and even at this early stage, we’ve seen a lot of interesting behaviors,” Geambasu says. “We know that we need larger-scale experience to formalize and quantify our conclusions, but we can already make several interesting observations.”
The researchers note that (1) It is definitely possible to target sensitive topics in users’ inboxes, including cancer, depression, or pregnancy. (2) For many ads, targeting was extremely obscure and non-obvious to end-users, which opens them up to abuses. (3) The researchers have already seen signs of such abuses, for instance, a number of subprime loan ads for used cars targeting debt in users’ inboxes. Examples of ads and their targeted topics can be found on the XRay website.
The tool can be used to increase user awareness about how their data is being used, as well as provide much needed tools for auditors, such as researchers, journalists, and investigators, to keep that use under scrutiny. Geambasu and Chaintreau, who recently won a Magic Grant from the Brown institute for Media Innovation to build better transparency tools, have made the XRay prototype available for auditors at http://xray.cs.columbia.edu.
“Our work calls for and promotes the best practice of voluntary transparency,” says Chaintreau, “while at the same time empowering investigators and watchdogs with a significant new tool for increased vigilance, something we need more of every day.”

#
Big Data, Internet Surveillance, and 4th Amendment.
Who watches the watchers? Big Data goes unchecked Washington


Educational CyberPlayGround: Surveillance Technology in the Work Place .
networking would presumably be the domain of PRISM. How Much Big


Parents fight Big Data Collection and Surveillance
Education Surveillance and Big Data Big Data If you’re OK with


Privacy Concerns over selling K-12 Student Datainformation is a common practice.
Department has been a major proponent of big data . It has used


Educational CyberPlayGround: Knowledge Management
Crunch your way through big data on your iPad? Lucky Sort , is


Learn how to protect your privacy when you are online.
The ethics of data and power. BIG DATA The data all of these


Educational CyberPlayGround: State Associations of School Administrators Alabama ,…
Who watches the watchers? Big Data goes unchecked Washington
Educational CyberPlayGround: Future Trends in Computing.
makezine.com/ 2012 BIG DATA When scientists publish their


Federal K12 Department of Education in America FAIL.
Education Surveillance and Big Data Is your company product or


Predictive Technology – Darpa develops cognitive fingerprint.
Big Data And You: How Your ‘Likes’ Reveal Sexuality, Race, Drug

 

Facebook emotion study examined by Canadian privacy commissioner

Facebook emotion study examined by Canadian privacy commissioner

http://www.cbc.ca/news/business/facebook-emotion-study-examined-by-privacy-commissioner-1.2695145
“… European regulators are probing the matter, with the U.K.’s Information Commissioner’s Office working with counterparts in France and Ireland (where Facebook’s European operations are located) to get more details on the study.”

PROBLEMS WITH FACEBOOK
How to report a problem AND get an underage kid off facebook.