#Privacy, #Facebook Coin, Uber, PayPal, Visa to Back Facebook’s GlobalCoin Cryptocurrency

#Privacy, #Facebook Coin, Uber, PayPal, Visa to Back #Facebook’s GlobalCoin Cryptocurrency

Starting with Facebook can’t get into China and 2015 Facebook Announces a Payments Feature for Its Messenger App

2019 #WeChat has become the centerpiece of digital life in China

where people use it to order movie tickets, subway passes, food delivery and rides. If Facebook succeeds in turning its own messaging services into a platform for everything, it could ultimately threaten established services such as Snapchat, Yelp, Venmo, eBay and even Apple and Amazon.

IN CHINA THERE IS NO PRIVACY!

IN AMERICA THERE IS NONE! THANKS TO THE DEMOCRAT$ AND THE REPUBLICAN$

  1. Cambridge Analytica and Facebook: The Scandal and the Fallout So Far Revelations that digital consultants to the Trump campaign misused the data of millions of Facebook users set off a furor on both sides of the Atlantic. https://www.businessinsider.com/cambridge-analytica-trump-firm-facebook-data-50-million-users-2018-3/
  2. Are you ready? Here is all the #data Facebook and Google have on you
    https://www.theguardian.com/commentisfree/2018/mar/28/all-the-data-facebook-google-has-on-you-privacy
  3. #Trump linked firm Cambridge Analytica collected personal information from 50 million Facebook users without permission https://www.businessinsider.com/cambridge-analytica-trump-firm-facebook-data-50-million-users-2018-3/
  4. Comparing #Obama Cambridge Analytica https://www.politifact.com/truth-o-meter/statements/2018/mar/22/meghan-mccain/comparing-facebook-data-use-obama-cambridge-analyt/

Facebook can’t get into China and wants to be WhatsApp China’s top app.

#Tencent-owned WeChat is China’s most popular messaging app and has a mobile payments feature known as #WeChat Pay. #Facebook Coin, which would be pegged to the U.S. dollar and allow users to transfer money through Facebook-owned messaging application WhatsApp, according to Bloomberg.

Facebook wants to be America’s version of China’s WeChat

and started developing its own digital currency to make it easier for users to send money to their messaging contacts. Facebook didn’t offer many details on its digital currency endeavors but said a “new small team” was looking for ways to make use of the type of technology powering bitcoins and other cryptocurrencies.

Facebook has reportedly lined up Uber, PayPal, Visa and others to invest $10 million each in the consortium governing its secretive crypto project.
https://www.coindesk.com/report-uber-paypal-visa-to-back-facebooks-globalcoin-cryptocurrency

Tencent, is more than just a messaging app. It’s what some analysts dub a “super-app” because it offers everything from mobile payments to the ability to book flights and even play games — all without leaving the app. ‘WeChat of the West’
https://www.cnbc.com/2019/03/13/facebook-wants-to-copy-wechat-pay-with-facebook-coin-payments.html

The reason why FB wants these partners. To turn every single account holder into a new banking account. Personal and business at the same time. Very centralized indeed. Multiple privacy concerns and contracts. Personal data is at risk.
Facts: 1. Facebook is issuing its own ‘cryptocurrency’
2. Evan Cheng is Facebooks’s Director of Blockchain engineering

One of Facebook’s most senior engineers just became Director of Engineering, Blockchain


3. Evan Cheng is advisor of #chainlink
4. Facebook will need an oracle for the purpose they’re looking for.

Facebook Gave Data Access to Chinese Firm Flagged by U.S. Intelligence

“https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html

Sarah Jamie Lewis ‏@SarahJamieLewis
Can’t wait for a cryptocurrency with the ethics of Uber, the censorship resistance of Paypal, and the centralization of Visa, all tied together under the proven privacy of Facebook. I’ve always said the thing that cryptocurrency was missing was consortiums of corporations fully invested in the existing financial sector. Who, seriously, looked around the room and said, “shit, we really need to invite PayPal”
Do you trust 2/3 of paypal, visa, uber and facebook <insert other corps here> not to collude to publish contradictory checkpoints? What does byzantine consensus even mean in that scenario? “Facebook won’t control the coin” it will just develop the coin and then assemble the initial members of the consortium after which point the power will be distributed to the consortium members, that Facebook picked, and who are all large corporations.

See, decentralized. “Facebook won’t directly control the coin, nor will the individual members of the consortium — known as the Libra Association. Some of the members could serve as “nodes” along the system that verify transactions and maintain records of them, creating a brand-new payments network, according to people familiar with the setup.”
In the future, Paypal will verify your transaction behind the scenes as you pay for your Uber seamlessly using your phone, just top up your Facebook Libre account with Visa or Mastercard. So much innovation.

Roxana Nasoi @roxanasoi

Ever wondered how PayPal shares your Data? And to who?
Let’s go with the major funnels:
1. PayPal shares your data with Auditors. Internal and external, due to its nature.
2. PayPal shares your data with Customer Services. In the process of handling claims, customer services need access to your account history – so basically they need your historical data information. In case of disputes, they can access the last 30 to 90 days. Maybe even more?
3. PayPal shares your data with Fraud agencies and AML services. You will discover that after $1k to $2k, you need to KYC in order to continue using your account. If you use PayPal for business purposes, but your account is a personal one, you can end up with funds frozen.
4. Next is Financial Products. All those business and personal finance tools you see inside your PayPal dashboard can’t be used without your financial data. To add more, new products are created based on user data patterns. Unknown the extent of external financial products.
5. Don’t forget about your data being shared with Commercial Partnerships. Don’t worry, banks do the same. Apps do the same. Nothing new here.
6. PayPal uses your data for Marketing and PR. Need another example? Try Facebook, Google (Gmail) etc. Data sells, and we can’t really talk about performance and customer experience without backing claims with data reports.
7. PayPal (along with 95% of systems) shares your data with Operational Services.
8. Group Enterprises also have access to your data. Blame it on group dynamics if you want to or on contracts you’ll never have a say in.
9. Commercial Partners (to no surprise) can access your data, as well through a service called PayPal for Partners (Merchants use it).
10. Legal. From disputes to payment protection to lawsuits, to internal or partner legal firms – yes, they can access the data. Or have access to it in some form.
11. Other services and agencies. At some point they argued that government agencies cannot claim access to a user’s data. However, this is an overstatement. Under the premise of fraud, Gov agencies can and will get access. Based on historical examples, we know it’s possible.
This is probably the main reason why we do need crypto. A coded architecture that makes it incorruptible.
“Code is Law”.
Bitcoin has managed to provide a clear first example of incorruptibility, where growth and maturity of one system does not change the core.

Your City, Your State, Your K12 Public School all attacked using NSA weapon.

Your City, Your State, Your K12 Public School all attacked using NSA weapon.

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc
By Nicole Perlroth and Scott Shane
May 25, 2019

In Pennsylvania School Districts Stockpiling Huge budget surplus accounts, while still raising property taxes every year

WannaCry? Hundreds of US schools still haven’t patched servers
A dive into vulnerability data shows even big districts’ servers still offering up SMB v. 1.

I think patching your software and making backups will protect you better than blaming the Gov’t
or
… than blaming the government who weaponized an unknown flaw in software and made sure not to tell the software vendor, in order to prevent a patch which customers could install, you mean?
or
Microsoft was warned, and the patch came out a month before Shadow Brokers dumped it.

If you’re wondering why ransomware continues to be such a problem for state and local governments and other public institutions, all you have to do to get an answer is poke around the Internet a little. Publicly accessible security-scan data shows that many public organizations have failed to do more than put a bandage over long-standing system vulnerabilities that, if successfully exploited, could bring their operations to a standstill.

While the method by which RobbinHood ransomware infected the network of Baltimore City two weeks ago is still unknown, insiders within city government have pointed to the incomplete efforts by the Office of Information Technology to get a handle on the city’s tangle of software, aging servers, and wide-flung network infrastructure. Baltimore isn’t even the only city to have been hit by ransomware in the last month—Lynn, Massachusetts, and Cartersville, Georgia, both had electronic payment systems taken offline by ransomware this month. Greenville, North Carolina, was struck by the same RobbinHood ransomware affecting Baltimore in April.

But cities aren’t the only highly vulnerable targets to be found by would-be attackers. There are hundreds of thousands of Internet-connected Windows systems in the United States that still appear to be vulnerable to an exploit of Microsoft Windows’ Server Message Block version 1 (SMB v. 1) file sharing protocol, despite repeated public warnings to patch systems following the worldwide outbreak of the WannaCry cryptographic malware two years ago. And based on data from the Shodan search engine and other public sources, hundreds of them—if not thousands—are servers in use at US public school systems. Even in cases where Microsoft’s patch of SMB v. 1 has been applied, the protocol remains a potential security problem—one that some organizations can’t completely close because some vendors still require the protocol for applications such as networked copiers and scanners.

While conducting research as a follow-up to our coverage of Baltimore City’s ongoing ransomware attack, Ars discovered that neighboring Baltimore County’s public school system had eight publicly accessible servers that still were running in configurations that indicated they were vulnerable to EternalBlue, the Equation Group exploit exposed by Shadow Brokers in April 2017 and then used as part of the WannaCry malware a month later. The exploit is now packaged as part of multiple malware kits, according to security researchers.

https://arstechnica.com/information-technology/2019/05/two-years-after-wannacry-us-schools-still-vulnerable-to-eternalblue/

SEE

Where are the State AG’s in protecting the citizens from malware that “gets away” from the NSA? The weaponized software created by the NSA…. when employees who have been taught everything by the NSA leave their jobs and take what they know with them then form companies and sell their “knowledge /skills / know how” learned on the job by working for America to enemies.

https://krebsonsecurity.com/2017/12/former-nsa-employee-pleads-guilty-to-taking-classified-data/


02
Dec 17

Former NSA Employee Pleads Guilty to Taking Classified Data

A former employee for the National Security Agency pleaded guilty on Friday to taking classified data to his home computer in Maryland. According to published reports, U.S. intelligence officials believe the data was then stolen from his computer by hackers working for the Russian government.

Nghia Hoang Pho, 67, of Ellicott City, Maryland, pleaded guilty today to “willful retention of national defense information.” The U.S. Justice Department says that beginning in April 2006 Pho was employed as a developer for the NSA’s Tailored Access Operations (TAO) unit, which develops specialized hacking tools to gather intelligence data from foreign targets and information systems.

According to Pho’s plea agreement, between 2010 and March 2015 he removed and retained highly sensitive classified “documents and writings that contained national defense information, including information classified as Top Secret.”

Pho is the third NSA worker to be charged in the past two years with mishandling classified data. His plea is the latest — and perhaps final — chapter in the NSA’s hunt for those responsible for leaking NSA hacking tools that have been published online over the past year by a shadowy group calling itself The Shadow Brokers.

https://thehill.com/policy/national-security/436950-former-cia-nsa-employees-sue-agencies-over-alleged-censorship

Ex-NSA employees criticize Mike Rogers’ role with Israeli venture firm

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc By Nicole Perlroth and Scott Shane May 25, 2019

For nearly three weeks, Baltimore has struggled with a cyberattack by digital extortionists that has frozen thousands of computers, shut down email and disrupted real estate sales, water bills, health alerts and many other services.

But here is what frustrated city employees and residents do not know: A key component of the malware that cybercriminals used in the attack was developed at taxpayer expense a short drive down the Baltimore-Washington Parkway at the National Security Agency, according to security experts briefed on the case.

Since 2017, when the N.S.A. lost control of the tool, EternalBlue, it has been picked up by state hackers in North Korea, Russia and, more recently, China, to cut a path of destruction around the world, leaving billions of dollars in damage. But over the past year, the cyberweapon has boomeranged back and is now showing up in the N.S.A.’s own backyard.

It is not just in Baltimore. Security experts say EternalBlue attacks have reached a high, and cybercriminals are zeroing in on vulnerable American towns and cities, from Pennsylvania to Texas, paralyzing local governments and driving up costs.

The N.S.A. connection to the attacks on American cities has not been previously reported, in part because the agency has refused to discuss or even acknowledge the loss of its cyberweapon, dumped online in April 2017 by a still-unidentified group calling itself the Shadow Brokers. Years later, the agency and the Federal Bureau of Investigation still do not know whether the Shadow Brokers are foreign spies or disgruntled insiders.

< – >

WHERE ARE THE CLASS ACTION SUITS?

WHY DOESN’T THE STATE HOLD THE DEFENSE DEPARTMENT ACCOUNTABLE FOR THE DAMAGE DONE TO THEIR CITIZENS?

Breaking news. Patch yourself for the CVEs exploited by NSA tools on the loose. This includes major cities!

ETERNALBLUE was initially nicknamed EternalBluescreen —NSA never seriously considered alerting Microsoft about discovering the vulnerability (before Shadow Brokers happened), and —“held on it” (“used it,” presumably) for more than five years
https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html


NEW: Baltimore was hit with an NSA hacking tool that is being used to hijack U.S. cities. ⁦⁩ and I spent months looking into the origins of EternalBlue, a stolen NSA weapon that is popping up in more and more attacks across the country.

The NSA spent more than a year searching for the flaw in Microsoft’s software and writing the code to exploit it.

NSA TAO operators jokingly referred to it as “EternalBluescreen” because it often crashed computer systems, a risk they might tip off targets. It took months to hone. Once it became a reliable espionage tool, it netted some of the NSA’s best counter-terrorism intelligence, and there was never any serious consideration that NSA would turn over the underlying flaw to Microsoft for patching.

The NSA kept it for 5+ years until unidentified hackers threatened to publish it.

In April 2017, the group, which calls itself the ShadowBrokers, dumped it online, where it has been picked up by North Korea, Russia, Iran and, just this week, China in attacks that have cut a path of destruction around the globe. But in the last year, it has boomeranged back to the NSA’s own backyard, hitting Baltimore, Allentown, San Antonio and countless other cities in attacks that have paralyzed municipal operations and alarmed government officials, who privately say the NSA needs to account. The NSA refuses to discuss the incidents or even acknowledge that the dumped tools were part of its cyber arsenal, but in an unusually candid interview, NSA former director Mike Rogers, who oversaw the agency during the leak, deflected blame. “If Toyota makes pickup trucks and someone takes a pickup truck, welds an explosive device onto the front, crashes it through a perimeter and into a crowd of people, is that Toyota’s responsibility?

“The N.S.A. wrote an exploit that was never designed to do what was done.”

Microsoft rejects that analogy: “These exploits are developed and kept secret by governments for the express purpose of using them as weapons or espionage tools. They’re inherently dangerous. When someone takes that, they’re not strapping a bomb to it. It’s already a bomb.”

EternalBlue is being packaged as part of many malware attacks as one possible lateral movement tool. Making a bomb is very much responsibility of the creator.

NSA toyota analogy was not correct. Exploit is like a bomb its a different matter who detonate it and where. NSA is very much responsible for their malicious espionage tools.

https://twitter.com/waveslide/status/1132442317372219392

EternalBlue was leaked 2 years ago. MS patched BEFORE it hit the wild. Some industry gossip the NSA knew they’d lost control and gave MS a heads-up. THIS PATCH HAS BEEN OUT FOR TWO YEARS! If it hits your network now, you deserve it. Usually, it’s a component of a malware package.

China has also been able to intercept an NSA tool as it attacked their networks. They stopped it, copied it, modified it, and sent it back to us and all of our allies.


‏ @bitsdigits
No, it wasn’t the NSA hacking tool that did this. It was basic exemptions to the #Baltimore #CIO policies that didn’t address patch management deficiencies that did this. Has anyone looked at what .gov requirements are
https://home.dotgov.gov/registration/requirements/

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc

https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html

For nearly three weeks, Baltimore has struggled with a cyberattack by digital extortionists that has frozen thousands of computers, shut down email and disrupted real estate sales, water bills, health alerts and many other services.

But here is what frustrated city employees and residents do not know: A key component of the malware that cybercriminals used in the attack was developed at taxpayer expense a short drive down the Baltimore-Washington Parkway at the National Security Agency, according to security experts briefed on the case.

Since 2017, when the N.S.A. lost control of the tool, EternalBlue, it has been picked up by state hackers in North Korea, Russia and, more recently, China, to cut a path of destruction around the world, leaving billions of dollars in damage. But over the past year, the cyberweapon has boomeranged back and is now showing up in the N.S.A.’s own backyard.

It is not just in Baltimore. Security experts say EternalBlue attacks have reached a high, and cybercriminals are zeroing in on vulnerable American towns and cities, from Pennsylvania to Texas, paralyzing local governments and driving up costs.

The N.S.A. connection to the attacks on American cities has not been previously reported, in part because the agency has refused to discuss or even acknowledge the loss of its cyberweapon, dumped online in April 2017 by a still-unidentified group calling itself the Shadow Brokers. Years later, the agency and the Federal Bureau of Investigation still do not know whether the Shadow Brokers are foreign spies or disgruntled insiders.

< – >

https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html

In Pennsylvania School Districts Stockpiling Huge budget surplus accounts, while still raising property taxes every year

3 Facebook “companies” with 17 open GDPR investigations.

Quite something. Commissioner Dixon written testimony cites 3 Facebook “companies” represent half of the large tech platforms with a whopping 17 open GDPR investigations.

#deletefacebook now

 

Hitler became Chancellor and Trump President with a minority of the vote.

Hitler became Chancellor and Trump President with a minority of the vote.

by Jonathan A. Weiss Esq.

Trump’s electoral college victory, with a loss of about 3 millions votes, occurred because of a disastrous “perfect storm.”

  1. The Electoral College itself
    In two presidential elections since 2000, including the most recent one in which Hillary Clinton won 2.8 million more votes than her opponent, the winner of the popular vote did not win the election because of the distorting effect of the outdated Electoral College.
  2. Voter suppression with suspected miscounting and Jill Stein’s run (with echoes of Nader effect in Florida – Clinton lost by approximately the same number of votes in Wisconsin that Stein received.)
  3. Russian meddling with the internet and possibly with election boards. (4) Comey’s inexcusable unprecedented announcement “reopening Clinton investigation” a few days before the election
  4. Misogyny with some failures in Clinton campaign such as not visiting “battleground” States.

Trump himself is a malignant narcissist paranoid pathological liar racist misogynist insecure bully/coward reactive ignorant idiot. Hitler did not possess all these defects. He was a madman. So is Trump.

Trump has also surrounded himself with incompetent corrupt people (who are opposed to the objectives of their departments’ goals) and nepotism.

The deep connections between his business enterprises and governments is unique.

His foreign policy antagonizes allies and embraces autocrats
(as Hitler did but only with Stalin, Mussolini, and Japan) rejecting direct territorial expansions. Hitler’s henchmen, unlike Trump’s, although saturated with evil, were mainly quite able and effective in their execution of projects. So, it would be wrong to analogize one to the other for these and possibly other reasons. On the other hand, the difference in their actions is often one of degree not nature, primarily because of the resistance of longstanding institutions, now tattered and being undermined. A few selected illustrations follow.

(1) The Creation of a “Crisis” for a Campaign and Reign.
Hitler used the Reichstag fire, which most historians think, the Nazis set to galvanize support. Trump rants and raves (from the beginning of his announcement of his run) about the “crisis” of immigrants with “caravans” of violent criminals, drug dealers, and bad people “invading” our country requiring a massive wall, expulsions without any due process hearings, widespread arrests, etc, the constant subject of slogans, chants, and “tweets”.

(2) Concentration Camps
Hitler diverted resources from his military as the war ended just to execute and incarcerate Jews, gypsies, homosexuals, etc., particularly noted, the Jews as an obsession. Trump has erected many concentration camps (many run for profit by private prison companies) on the border to keep those classified as “illegal aliens” separating babies from families. He happily continues Guantanamo. These concentration camps than those disgracefully established for the Japanese in World War II.

(3) Racism and Religious Bigotry
Hitler had his Jews. Trump, as referenced above, started his campaigns by railing against “Mexicans” and now continues against Latinos from Guatemala, Ecuador, and Nicaragua. Consider (and compare with mainland American natural disasters) his treatment of Americans in hurricane ravaged Puerto Rico.

Hitler hated Jews as a race. Undoubtedly, he would have wanted those who identify with the religion or culture to disappear in the Final Solution.

Trump has the one billion or so Muslims. He tried to ban any Muslim immigration and mainly succeeded when the retrograde Supreme Court (after granting a Christian baker the right to discriminate against homosexual’s ordering a wedding cake) allowed a ban which did not mention the adherents of Islam by name although clearly directed at them. (A 19th Century case struck down a law designed against Chinese laundries.) In a debate, among his other lies, he claimed he saw a multitude in New Jersey celebrating the toppling of the World Trade Towers. He continues unabated to demonize them.

(4) Free press and journalism
Hitler destroyed it while creating a propaganda machine. (Compare the interepenetration of Fox News and the White House). To the shame of the press corps, they allowed themselves to be separated by fences from the rest of the audience during his rallies. He ceaselessly attacks news coverage as “fake news”, advocates for defamation suits against the media, and even government action against the major network NBC because of a Saturday Night Live rerun, etc. (while the press still features his unhinged “tweets” as news rather than confining the reporting to official public acts and pronouncements).

(5) Antisemitism
It is necessary to distinguish the government of Israel and Israel; Israel and Jews. One can oppose the government and support Israel. One can oppose how Israel is constituted, attitudes, and some actions while still being a Jew. Trump embraces Netanayu as a far right leader while in his ghosted books he disparages them as beanie wearing bookkeepers. Some worry Jews might be blamed because of his inclusion of Miller and Kuchner (and converted wife) in his inner circle – though no more have been added – but the former is such a raving racist reactionary he can not be connected to any sane version of Judaism and the Kuchner’s represent just nepotism.

(6) Military Buildup
Hitler used great sums of money to build an army and, ironically Keynsian, the economy. In Trump’s budget he proposes to cut domestic programs radically while expanding the military (and continuing its presence in Yemen…and almost 70 other areas, Afganistan, Iraq, and Syria.)

(7) Demagoging and Violence
The “big lie”. best repeated often, played, and plays, a central role in both of their rhetorical appeals to audiences. Hitler, many believe, was a mesmerizing orator, His speeches were more inflammatory than his sometimes ally Mussolini. Trump leads rallies with chants, slogans (e.g. “Lock her up!”) designed to engineer mass consent from his devoted followers, inflammatory claims, and well documented many dangerous lies, etc.. It appears that the tone he has set (including the failure to condemn right wing violence) has created an atmosphere where deranged individuals (and even mobs) feel entitled to commit acts against schools, assemblies (including 0religious and public), and individuals while vigilante groups “patrol” the border. Both offer racist tropes to which Trump adds Misogyny.

(8) The Judiciary
Hitler destroyed his. With McConnel’s aiding and abetting, Trumps has done his utmost to stuff the Federal Judiciary (thus far his only main restraint) with rigid reactionaries from the Federalist Society pipeline.

Other illustrations are available ( e.g. permitting – facilitating in Trump’s case – the destruction of countryside and cities) But, sufficient unto this article is the evil therein.

Abraham Lincoln famously said: “You can fool some the people all of the time. You can fool some of the people some of the time. But you can not fool all the people all of the time.”

The question for our time is
whether you can fool enough.

“You should never underestimate human stupidity.” Yuval Noah Harari

——————————————————–

FURTHER RESOURCES

Changes in technology, politics, and business are all transforming espionage. Intelligence agencies must adapt—or risk irrelevance.
https://foreignpolicy.com/2019/04/27/the-spycraft-revolution-espionage-technology/

TED TALKS

Why fascism is so tempting — and how your data could power it Yuval Noah Harari

Handmaidens to Authoritarism
#Mercer, #Zuckerberg, #Sandberg, #Page, #Brinn, #Dorsey

In an unmissable talk, journalist Carole Cadwalladr digs into one of the most perplexing events in recent times: the UK’s super-close 2016 vote to leave the European Union. Tracking the result to a barrage of misleading Facebook ads targeted at vulnerable Brexit swing voters — and linking the same players and tactics to the 2016 US presidential election — Cadwalladr calls out the “gods of Silicon Valley” for being on the wrong side of history and asks: Are free and fair elections a thing of the past?

MORE:

A CURRENT ACCEPTABLE PREJUDICE by Jonathan A. Weiss Esq.

9/11 CRIMINALS by Jonathan A. Weiss Esq. 

REPEAL AND REPLACE THE WAR ON DRUGS by Jonathan A. Weiss Esq.

REPARATIONS by Jonathan A. Weiss Esq.

WOMEN ENJOY MAKING LOVE by Jonathan A. Weiss Esq.

#JonathanWeiss #Hitler #Trump #Facism #PropagandaMachine #fakeNews #foxNews #whitehouse #electoral College

The Perfect Storm For All the Internet

In 1994 the Internet was allowed to become commercialized. From the perfect ivory tower of and Hippie Culture of love, honesty, and making the world a better place they powers allowed commercial activity for the first time.

Ooops the grandfathers of the internet, who along with others knew full well what “Smart thinkers” were capable of  ie: the bomb…… they let the little thing called security get away from them… so yeah the net will N E V E R be secure PERIOD!

AND since the same people don’t think regulation is of much use because (any excuse you want)  …. you know they’ve only NOW come to say out loud that those liars and thieves who were supposed to “do no evil” and would be sure to “police themselves” might in fact act like the criminals  celebrated by wall street

Imagine all those original fathers of the internet with all their IQ points,  educations, national experience and  those awards!

WHAT did they actually do to all of us? Please remind me. . . . .

2019 THE PERFECT STORM

 

Lost faith in Facebook and Instagram after data leakages, breaches and too much noise? Here’s a guide to breaking up with the social network and its photo-sharing app for good.

N.Y. Attorney General to Probe Facebook’s Collection of User Email Addresses: NYT

https://www.thedailybeast.com/new-york-attorney-general-to-probe-facebook-collection-of-users-email-contacts-nyt

 

 

K12 PlayGround Find a School Discover the right school for your child.

K12Playground.com Find a School Discover the right school for your child.

Submit or Update Your School or Organization.

Once you’ve located your school, update the information about the school such as the amenities, features or programs that make this school special.

Find and compare K12 Schools and School Districts in the USA and Territories.

FIND A #JOB: Cybersecurity talent gaps exist across the country.

Resources for High School Students Interested in Cyber Security

Summer Camps are a great introduction to cyber security.
Online Courses are the next step to growing knowledge and experience, while at the same time learn more about a potential career path.

Hackathons are the playground for testing how far you’ve come.

Many internship programs available to exact academic paths/interest. Generally speaking, cyber security degree seeking students may pursue positions at the CIA in STEM, Clandestine, Analysis, or Enterprise and Support Roles.

Must apply senior year in high school. Rigorous application process includes polygraph, mental health evaluation, financial need, background checks, high academic marks, abstinence from drugs, and more. Successful applicants will be provided a salary as well as have tuition covered up to a certain price. Successful applicants will work at the CIA in summers and continue to work for the CIA after graduation.

Meet the Terabytches: Fergus students prep for cyber security competition
‘We’re like the biggest collective knowledge in a girls’ team,’ Emily Younghans says

MOST Inexpensive Colleges With the Highest Graduation Rate

NEED A #JOB: https://www.cyberseek.org/heatmap.html

TOP CYBERSECURITY JOB TITLES
  • Cyber Security Engineer
  • Cyber Security Analyst
  • Network Engineer / Architect
  • Cyber Security Manager / Administrator
  • Systems Engineer
  • Software Developer / Engineer
  • Systems Administrator
  • Vulnerability Analyst / Penetration Tester
  • Cyber Security Consultant

11 federal agencies help start Cybersecurity Talent Initiative

11 federal agencies help start Cybersecurity Talent Initiative

EU Tells Internet Archive That Much Of Its Site Is ‘Terrorist Content’

We’ve been trying to explain for the past few months just how absolutely insane the new EU Terrorist Content Regulation will be for the internet.

Among many other bad provisions, the big one is that it would require content removal within one hour as long as any “competent authority” within the EU sends a notice of content being designated as “terrorist” content. The law is set for a vote in the EU Parliament just next week.

And as if they were attempting to show just how absolutely insane the law would be for the internet, multiple European agencies (we can debate if they’re “competent”) decided to send over 500 totally bogus takedown demands to the Internet Archive last week, claiming it was hosting terrorist propaganda content.

< – >

https://www.techdirt.com/articles/20190410/14580641973/eu-tells-internet-archive-that-much-site-is-terrorist-content.shtml

Why Mar-a-Lago is a counterintelligence nightmare

Imagine that the White House, instead of a fortress, were an opulent country club.

If you pony up a US$200,000 nonrefundable initiation fee, you can have the run of the place.

Wander the halls. Drop in any time on the West Wing, the Oval Office, the Situation Room.

Chat freely with the US President’s family and advisers, listen in on national security conversations with foreign leaders, even snap a selfie with POTUS himself.

Take it all in – actually, feel free to record it if you like.

Welcome to the Mar-a-Lago club, known in US President Donald Trump’s circles as the winter White House, in Palm Beach, Florida.

https://www.nzherald.co.nz/world/news/article.cfm?c_id=2&objectid=12221320

WikiLeaks founder Julian Assange arrested by British police after being evicted from Ecuador’s embassy in London

Ecuador handed Julian Assange over to British authorities Thursday, ending a standoff that left the controversial WikiLeaks founder holed up in the Ecuadoran embassy in London for nearly seven years.

https://www.msn.com/en-us/news/world/wikileaks-founder-julian-assange-arrested-by-british-police-after-being-evicted-from-ecuadors-embassy-in-london/ar-BBVPL3U

About the WikiLeaks Defence Fund

The WikiLeaks Defence Fund promotes media and public activities to defend Julian Assange and other WikiLeaks journalists.

The Fund supports a dedicated campaign team which works across global media to build support for WikiLeaks and the public’s right to know.

The Courage Foundation and the Defence Fund

The Defence Fund is run by the Courage Foundation – a trust audited by accountants Sterling Partners in the UK for the purpose of providing legal defence and campaign aid to whistleblowers and journalistic sources.

The Courage Foundation is an international organisation that supports those who risk life or liberty to make significant contributions to the historical record.

It also campaigns for the protection of truthtellers and the public’s right to know.

https://defend.wikileaks.org/donate/