Congressman Blumenauer holds Arts Competition for high school students

For the third year in a row, Congressman Blumenauer will hold his own OR-03 Arts Competition for high school students in his congressional district in lieu of participating in the traditional Congressional Art competition. The winning entry will hang in Congressman Blumenauer’s Washington, DC office.

Republican members of the House of Representatives actually removed a students art from the wall. The decision to censor a student artist who had depicted the conflict between the African-American community and the police surrounding the death of Michael Brown in Ferguson, Missouri, led Congressman Blumenauer to make this decision.

“Artistic expression is critical to a healthy and vibrant democracy. In good conscience, I cannot be part of a contest that restricts the expression of young artists and their first amendment rights,” said Blumenauer. “We must defend the arts – which I believe are now under attack by the President as he seeks to slash cherished programs like the National Endowment of the Arts. We can’t let artists lose their voices. The minute we let censorship take hold, the closer we get to an authoritarian regime.”

Background

The traditional Congressional Art Competition allows high school students to submit artwork to their Congressional representative, and one submission from each district is selected as the winner. The artwork is then featured in the Capitol, alongside pieces from Congressional districts across the nation, to be enjoyed by members of Congress, staff, and visitors alike.

The competition sparked controversy <https://blumenauerforms.house.gov/components/redirect/r.aspx?ID=1647-211538> in 2017 when some Republican members of the House removed a painting from display. In Congressman Blumenauer’s opinion, this act inherently silenced the student artist from Missouri. The painting portrayed conflict between the African American community and law enforcement in Ferguson after the death of Michael Brown, an unarmed black teen. Republican leadership repeatedly called for the painting’s removal, and as a result, it was permanently removed—deemed a violation of a rule that artwork in the Capitol cannot “depict contemporary political controversy, or of a sensationalistic or gruesome nature.” Following this incident, Congressman Blumenauer instituted his own OR-03 Arts Competition.

Student submissions and are due in our office, located at 911 NE 11th Ave. Suite 200, Portland, Oregon by Wednesday, May 1st at 5:00pm.

Please note that this is a secure building and you will need to call 503-231-2300 to have someone come down to receive your art.

For more information, contact Stone Hudson at 503-231-2300 or st**********@ma**.gov <mailto:st**********@ma**.gov" data-original-string="GYffcVgV8/coo7GJLSQQSS6pVzvD9YYrYcGpB3GZik8=" title="This contact has been encoded by Anti-Spam by CleanTalk. Click to decode. To finish the decoding make sure that JavaScript is enabled in your browser.>.

UFO Theyyyyyyeeeeerrrrrrr Heeeeeerrrrrrrreeeee

2004 THIS IS A REAL UFO SIGHTING

“60 Minutes” in May, Mr. Bigelow said he was “absolutely convinced” that aliens exist and that U.F.O.s have visited Earth.

STUPID AMERICANS HELD BACK BY THEIR UFO JUVENILE TABOO TALK.

SCIENCE FICTION IS NOW FACT
SO GET OVER YOUR IGNORANT SELVES

The program collected video and audio recordings of reported U.F.O. incidents, including footage from a Navy F/A-18 Super Hornet showing an aircraft surrounded by some kind of glowing aura traveling at high speed and rotating as it moves. The Navy pilots can be heard trying to understand what they are seeing. “There’s a whole fleet of them,” one exclaims. Defense officials declined to release the location and date of the incident.

Luis Elizondo, who led the Pentagon effort to investigate U.F.O.s until October. He resigned to protest what he characterized as excessive secrecy and internal opposition to the program.
Mr. Bigelow, Bigelow Aerospace, Mr. Reid, Mr. John Glenn, Mr. Elizondo,  Mr. Stevens and Mr. Inouye, used to work with the Navy, C.I.A.  Pentagon, Defense Secretary Jim Mattis, Harold E. Puthoff, William Lynn III
Robert Bigelow, a billionaire entrepreneur and longtime friend of Mr. Reid, received most of the money allocated for the Pentagon program. On CBS’s “60 Minutes” in May, Mr. Bigelow said he was “absolutely convinced” that aliens exist and that U.F.O.s have visited Earth.

The sightings were reported to the Pentagon’s shadowy, little-known Advanced Aerospace Threat Identification Program
$600 billion annual Defense Department budgets, the $22 million spent on the Advanced Aerospace Threat Identification Program was almost impossible to find. Which was how the Pentagon wanted it.
https://www.nytimes.com/2017/12/16/us/politics/pentagon-program-ufo-harry-reid.html

How to report what the military calls unexplained aerial phenomena, or unidentified flying objects.

Videos filmed by Navy pilots show two encounters with flying objects.

One was captured by a plane’s camera off the coast of Jacksonville, Fla., on Jan. 20, 2015. That footage, published previously but with little context, shows an object tilting like a spinning top moving against the wind. A pilot refers to a fleet of objects, but no imagery of a fleet was released. The second video was taken a few weeks later.

#UFO Videos filmed by Navy pilots #UFOVideosfilmedbyNavyPilots

Resizeable pull the bottom right corner to the right

PAY SCALE Vice President-Members of Congress – Judicial Salaries

2019 PAY SCALE
Vice President,
Members of Congress,
Judicial Salaries

EXECUTIVE ORDER 13866
ADJUSTMENTS OF CERTAIN RATES OF PAY

SCHEDULE 5 — EXECUTIVE SCHEDULE

Bush nominated Chief Justice John Roberts observant Catholic to take Sandra Day O’Connor’s place. Roberts is now both chief justice and the court’s swing justice — which means that, increasingly, the law is likely to be what he says it is. Roberts joined Ronald Reagan’s Justice Department when it was on a campaign to drive American law to the right. It is the arm of the Rethuglican Party. Roberts and his wife hate feminists, the equal pay for equal work, a women’s right to have an abortion, and gays. He opposes the rights of blacks, gay people, the poor and other relatively powerless groups. Roberts helped take away health care from millions of the nation’s poorest people.

Roberts swept away campaign finance regulations, most notoriously in Citizens United v. Federal Election Commission, which invalidated a well-established ban on corporations spending money to elect candidates.

Brett Kavanaugh ANOTHER conservative

https://www.opm.gov/policy-data-oversight/pay-leave/salaries-wages/retroactive-pay-executive-order-2019-adjustments-of-certain-rates-of-pay.pdf

Judicial Salaries #JudicialSalaries

The Federal Employees Health Benefits (FEHB) Program

https://www.opm.gov/healthcare-insurance/healthcare/reference-materials/hitreport.pdf

http://www.healthit.gov/providers-professionals/ehr-incentives-certification

long term care https://www.ltcfeds.com/ 

1-800-582-3337  TTY 1-800-843-3557

The Federal Long Term Care Insurance Program (FLTCIP) provides long term care insurance for its enrollees, who are Federal and U.S. Postal Service employees and annuitants, active and retired members of the uniformed services, and their qualified relatives.

HOW MUCH LONG TERM HEALTH CARE DO YOUR NEED

The three most common care options are home health care, assisted living, and nursing home care. To find the average costs in your area for each of these care options, select your state and nearest city below. Then, click the “Find the Cost of Care” button. All costs are based on the John Hancock 2016 Cost of Care Survey.

https://www.ltcfeds.com/ltcWeb/do/assessing_your_needs/costofcare

https://www.opm.gov/healthcare-insurance/flyers/long-term-care-overview.pdf

forms https://www.ltcfeds.com/documents/index.html#forms

Individuals’ Access and Use of their Online Medical Record Nationwide
https://www.healthit.gov/sites/default/files/consumeraccessdatabrief_9_10_14.pdf

Your City, Your State, Your K12 Public School all attacked using NSA weapon.

Your City, Your State, Your K12 Public School all attacked using NSA weapon.

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc
By Nicole Perlroth and Scott Shane
May 25, 2019

In Pennsylvania School Districts Stockpiling Huge budget surplus accounts, while still raising property taxes every year

WannaCry? Hundreds of US schools still haven’t patched servers
A dive into vulnerability data shows even big districts’ servers still offering up SMB v. 1.

I think patching your software and making backups will protect you better than blaming the Gov’t
or
… than blaming the government who weaponized an unknown flaw in software and made sure not to tell the software vendor, in order to prevent a patch which customers could install, you mean?
or
Microsoft was warned, and the patch came out a month before Shadow Brokers dumped it.

If you’re wondering why ransomware continues to be such a problem for state and local governments and other public institutions, all you have to do to get an answer is poke around the Internet a little. Publicly accessible security-scan data shows that many public organizations have failed to do more than put a bandage over long-standing system vulnerabilities that, if successfully exploited, could bring their operations to a standstill.

While the method by which RobbinHood ransomware infected the network of Baltimore City two weeks ago is still unknown, insiders within city government have pointed to the incomplete efforts by the Office of Information Technology to get a handle on the city’s tangle of software, aging servers, and wide-flung network infrastructure. Baltimore isn’t even the only city to have been hit by ransomware in the last month—Lynn, Massachusetts, and Cartersville, Georgia, both had electronic payment systems taken offline by ransomware this month. Greenville, North Carolina, was struck by the same RobbinHood ransomware affecting Baltimore in April.

But cities aren’t the only highly vulnerable targets to be found by would-be attackers. There are hundreds of thousands of Internet-connected Windows systems in the United States that still appear to be vulnerable to an exploit of Microsoft Windows’ Server Message Block version 1 (SMB v. 1) file sharing protocol, despite repeated public warnings to patch systems following the worldwide outbreak of the WannaCry cryptographic malware two years ago. And based on data from the Shodan search engine and other public sources, hundreds of them—if not thousands—are servers in use at US public school systems. Even in cases where Microsoft’s patch of SMB v. 1 has been applied, the protocol remains a potential security problem—one that some organizations can’t completely close because some vendors still require the protocol for applications such as networked copiers and scanners.

While conducting research as a follow-up to our coverage of Baltimore City’s ongoing ransomware attack, Ars discovered that neighboring Baltimore County’s public school system had eight publicly accessible servers that still were running in configurations that indicated they were vulnerable to EternalBlue, the Equation Group exploit exposed by Shadow Brokers in April 2017 and then used as part of the WannaCry malware a month later. The exploit is now packaged as part of multiple malware kits, according to security researchers.

https://arstechnica.com/information-technology/2019/05/two-years-after-wannacry-us-schools-still-vulnerable-to-eternalblue/

SEE

Where are the State AG’s in protecting the citizens from malware that “gets away” from the NSA? The weaponized software created by the NSA…. when employees who have been taught everything by the NSA leave their jobs and take what they know with them then form companies and sell their “knowledge /skills / know how” learned on the job by working for America to enemies.

https://krebsonsecurity.com/2017/12/former-nsa-employee-pleads-guilty-to-taking-classified-data/


02
Dec 17

Former NSA Employee Pleads Guilty to Taking Classified Data

A former employee for the National Security Agency pleaded guilty on Friday to taking classified data to his home computer in Maryland. According to published reports, U.S. intelligence officials believe the data was then stolen from his computer by hackers working for the Russian government.

Nghia Hoang Pho, 67, of Ellicott City, Maryland, pleaded guilty today to “willful retention of national defense information.” The U.S. Justice Department says that beginning in April 2006 Pho was employed as a developer for the NSA’s Tailored Access Operations (TAO) unit, which develops specialized hacking tools to gather intelligence data from foreign targets and information systems.

According to Pho’s plea agreement, between 2010 and March 2015 he removed and retained highly sensitive classified “documents and writings that contained national defense information, including information classified as Top Secret.”

Pho is the third NSA worker to be charged in the past two years with mishandling classified data. His plea is the latest — and perhaps final — chapter in the NSA’s hunt for those responsible for leaking NSA hacking tools that have been published online over the past year by a shadowy group calling itself The Shadow Brokers.

https://thehill.com/policy/national-security/436950-former-cia-nsa-employees-sue-agencies-over-alleged-censorship

Ex-NSA employees criticize Mike Rogers’ role with Israeli venture firm

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc By Nicole Perlroth and Scott Shane May 25, 2019

For nearly three weeks, Baltimore has struggled with a cyberattack by digital extortionists that has frozen thousands of computers, shut down email and disrupted real estate sales, water bills, health alerts and many other services.

But here is what frustrated city employees and residents do not know: A key component of the malware that cybercriminals used in the attack was developed at taxpayer expense a short drive down the Baltimore-Washington Parkway at the National Security Agency, according to security experts briefed on the case.

Since 2017, when the N.S.A. lost control of the tool, EternalBlue, it has been picked up by state hackers in North Korea, Russia and, more recently, China, to cut a path of destruction around the world, leaving billions of dollars in damage. But over the past year, the cyberweapon has boomeranged back and is now showing up in the N.S.A.’s own backyard.

It is not just in Baltimore. Security experts say EternalBlue attacks have reached a high, and cybercriminals are zeroing in on vulnerable American towns and cities, from Pennsylvania to Texas, paralyzing local governments and driving up costs.

The N.S.A. connection to the attacks on American cities has not been previously reported, in part because the agency has refused to discuss or even acknowledge the loss of its cyberweapon, dumped online in April 2017 by a still-unidentified group calling itself the Shadow Brokers. Years later, the agency and the Federal Bureau of Investigation still do not know whether the Shadow Brokers are foreign spies or disgruntled insiders.

< – >

WHERE ARE THE CLASS ACTION SUITS?

WHY DOESN’T THE STATE HOLD THE DEFENSE DEPARTMENT ACCOUNTABLE FOR THE DAMAGE DONE TO THEIR CITIZENS?

Breaking news. Patch yourself for the CVEs exploited by NSA tools on the loose. This includes major cities!

ETERNALBLUE was initially nicknamed EternalBluescreen —NSA never seriously considered alerting Microsoft about discovering the vulnerability (before Shadow Brokers happened), and —“held on it” (“used it,” presumably) for more than five years
https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html


NEW: Baltimore was hit with an NSA hacking tool that is being used to hijack U.S. cities. ⁦⁩ and I spent months looking into the origins of EternalBlue, a stolen NSA weapon that is popping up in more and more attacks across the country.

The NSA spent more than a year searching for the flaw in Microsoft’s software and writing the code to exploit it.

NSA TAO operators jokingly referred to it as “EternalBluescreen” because it often crashed computer systems, a risk they might tip off targets. It took months to hone. Once it became a reliable espionage tool, it netted some of the NSA’s best counter-terrorism intelligence, and there was never any serious consideration that NSA would turn over the underlying flaw to Microsoft for patching.

The NSA kept it for 5+ years until unidentified hackers threatened to publish it.

In April 2017, the group, which calls itself the ShadowBrokers, dumped it online, where it has been picked up by North Korea, Russia, Iran and, just this week, China in attacks that have cut a path of destruction around the globe. But in the last year, it has boomeranged back to the NSA’s own backyard, hitting Baltimore, Allentown, San Antonio and countless other cities in attacks that have paralyzed municipal operations and alarmed government officials, who privately say the NSA needs to account. The NSA refuses to discuss the incidents or even acknowledge that the dumped tools were part of its cyber arsenal, but in an unusually candid interview, NSA former director Mike Rogers, who oversaw the agency during the leak, deflected blame. “If Toyota makes pickup trucks and someone takes a pickup truck, welds an explosive device onto the front, crashes it through a perimeter and into a crowd of people, is that Toyota’s responsibility?

“The N.S.A. wrote an exploit that was never designed to do what was done.”

Microsoft rejects that analogy: “These exploits are developed and kept secret by governments for the express purpose of using them as weapons or espionage tools. They’re inherently dangerous. When someone takes that, they’re not strapping a bomb to it. It’s already a bomb.”

EternalBlue is being packaged as part of many malware attacks as one possible lateral movement tool. Making a bomb is very much responsibility of the creator.

NSA toyota analogy was not correct. Exploit is like a bomb its a different matter who detonate it and where. NSA is very much responsible for their malicious espionage tools.

https://twitter.com/waveslide/status/1132442317372219392

EternalBlue was leaked 2 years ago. MS patched BEFORE it hit the wild. Some industry gossip the NSA knew they’d lost control and gave MS a heads-up. THIS PATCH HAS BEEN OUT FOR TWO YEARS! If it hits your network now, you deserve it. Usually, it’s a component of a malware package.

China has also been able to intercept an NSA tool as it attacked their networks. They stopped it, copied it, modified it, and sent it back to us and all of our allies.


‏ @bitsdigits
No, it wasn’t the NSA hacking tool that did this. It was basic exemptions to the #Baltimore #CIO policies that didn’t address patch management deficiencies that did this. Has anyone looked at what .gov requirements are
https://home.dotgov.gov/registration/requirements/

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc

https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html

For nearly three weeks, Baltimore has struggled with a cyberattack by digital extortionists that has frozen thousands of computers, shut down email and disrupted real estate sales, water bills, health alerts and many other services.

But here is what frustrated city employees and residents do not know: A key component of the malware that cybercriminals used in the attack was developed at taxpayer expense a short drive down the Baltimore-Washington Parkway at the National Security Agency, according to security experts briefed on the case.

Since 2017, when the N.S.A. lost control of the tool, EternalBlue, it has been picked up by state hackers in North Korea, Russia and, more recently, China, to cut a path of destruction around the world, leaving billions of dollars in damage. But over the past year, the cyberweapon has boomeranged back and is now showing up in the N.S.A.’s own backyard.

It is not just in Baltimore. Security experts say EternalBlue attacks have reached a high, and cybercriminals are zeroing in on vulnerable American towns and cities, from Pennsylvania to Texas, paralyzing local governments and driving up costs.

The N.S.A. connection to the attacks on American cities has not been previously reported, in part because the agency has refused to discuss or even acknowledge the loss of its cyberweapon, dumped online in April 2017 by a still-unidentified group calling itself the Shadow Brokers. Years later, the agency and the Federal Bureau of Investigation still do not know whether the Shadow Brokers are foreign spies or disgruntled insiders.

< – >

https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html

In Pennsylvania School Districts Stockpiling Huge budget surplus accounts, while still raising property taxes every year