K12 PlayGround Find a School Discover the right school for your child.

K12Playground.com Find a School Discover the right school for your child.

Submit or Update Your School or Organization.

Once you’ve located your school, update the information about the school such as the amenities, features or programs that make this school special.

Find and compare K12 Schools and School Districts in the USA and Territories.

FIND A #JOB: Cybersecurity talent gaps exist across the country.

Resources for High School Students Interested in Cyber Security

Summer Camps are a great introduction to cyber security.
Online Courses are the next step to growing knowledge and experience, while at the same time learn more about a potential career path.

Hackathons are the playground for testing how far you’ve come.

Many internship programs available to exact academic paths/interest. Generally speaking, cyber security degree seeking students may pursue positions at the CIA in STEM, Clandestine, Analysis, or Enterprise and Support Roles.

Must apply senior year in high school. Rigorous application process includes polygraph, mental health evaluation, financial need, background checks, high academic marks, abstinence from drugs, and more. Successful applicants will be provided a salary as well as have tuition covered up to a certain price. Successful applicants will work at the CIA in summers and continue to work for the CIA after graduation.

Meet the Terabytches: Fergus students prep for cyber security competition
‘We’re like the biggest collective knowledge in a girls’ team,’ Emily Younghans says

MOST Inexpensive Colleges With the Highest Graduation Rate

NEED A #JOB: https://www.cyberseek.org/heatmap.html

TOP CYBERSECURITY JOB TITLES
  • Cyber Security Engineer
  • Cyber Security Analyst
  • Network Engineer / Architect
  • Cyber Security Manager / Administrator
  • Systems Engineer
  • Software Developer / Engineer
  • Systems Administrator
  • Vulnerability Analyst / Penetration Tester
  • Cyber Security Consultant

11 federal agencies help start Cybersecurity Talent Initiative

11 federal agencies help start Cybersecurity Talent Initiative

EU Tells Internet Archive That Much Of Its Site Is ‘Terrorist Content’

We’ve been trying to explain for the past few months just how absolutely insane the new EU Terrorist Content Regulation will be for the internet.

Among many other bad provisions, the big one is that it would require content removal within one hour as long as any “competent authority” within the EU sends a notice of content being designated as “terrorist” content. The law is set for a vote in the EU Parliament just next week.

And as if they were attempting to show just how absolutely insane the law would be for the internet, multiple European agencies (we can debate if they’re “competent”) decided to send over 500 totally bogus takedown demands to the Internet Archive last week, claiming it was hosting terrorist propaganda content.

< – >

https://www.techdirt.com/articles/20190410/14580641973/eu-tells-internet-archive-that-much-site-is-terrorist-content.shtml

Why Mar-a-Lago is a counterintelligence nightmare

Imagine that the White House, instead of a fortress, were an opulent country club.

If you pony up a US$200,000 nonrefundable initiation fee, you can have the run of the place.

Wander the halls. Drop in any time on the West Wing, the Oval Office, the Situation Room.

Chat freely with the US President’s family and advisers, listen in on national security conversations with foreign leaders, even snap a selfie with POTUS himself.

Take it all in – actually, feel free to record it if you like.

Welcome to the Mar-a-Lago club, known in US President Donald Trump’s circles as the winter White House, in Palm Beach, Florida.

https://www.nzherald.co.nz/world/news/article.cfm?c_id=2&objectid=12221320

WikiLeaks founder Julian Assange arrested by British police after being evicted from Ecuador’s embassy in London

Ecuador handed Julian Assange over to British authorities Thursday, ending a standoff that left the controversial WikiLeaks founder holed up in the Ecuadoran embassy in London for nearly seven years.

https://www.msn.com/en-us/news/world/wikileaks-founder-julian-assange-arrested-by-british-police-after-being-evicted-from-ecuadors-embassy-in-london/ar-BBVPL3U

About the WikiLeaks Defence Fund

The WikiLeaks Defence Fund promotes media and public activities to defend Julian Assange and other WikiLeaks journalists.

The Fund supports a dedicated campaign team which works across global media to build support for WikiLeaks and the public’s right to know.

The Courage Foundation and the Defence Fund

The Defence Fund is run by the Courage Foundation – a trust audited by accountants Sterling Partners in the UK for the purpose of providing legal defence and campaign aid to whistleblowers and journalistic sources.

The Courage Foundation is an international organisation that supports those who risk life or liberty to make significant contributions to the historical record.

It also campaigns for the protection of truthtellers and the public’s right to know.

https://defend.wikileaks.org/donate/

A CURRENT ACCEPTABLE PREJUDICE by Jonathan Weiss Esq.

“Old white men.” The words separate are sometimes used pejoratively. All together they are considered by many “liberals” and many in the media as a crucial criticism. “Old” creates the most disdain. Rather than being considered an achievement implying future contribution, the years accumulated is considered negative.

Reactionaries often attack “political correctness” as a cover for the attitude and practice of racism, xenophobia, nativism, misogyny, wealth against poor, and disparagement of different gender and sexual practices – in their array of intolerant and discriminatory practices. But beyond all the despicable perspectives, with associated practices, glimmers a point.

Well out of population proportion, Blacks are now omnipresent in most ads, plays, and movies. Obligatory Blacks, generally cast as superior or educated, are featured in almost every dramatic or commercial presentation.. While it is true, there are many aspiring and unemployed actors available, to give preference on the basis on melanin amount should not be a functioning criterion. All actors should be allowed to play different parts. Forrest Whitaker portrays an excellent “Hughie”; Glenda Jackson a riveting “King Lear”, But the converse? – a white performer in “A Raison in the Sun”, Sam Rea as Lady Macbeth? (Shakespeare’s plays, historians say, were only performed by men). A few years back the bourgeoise identity advocate Spike Lee caused a furor to make sure that he, not a white man, direct “Malcolm X” failing to do justice to the charismatic, inspiring, and politically profound leader – who should have continued through old age. (Can you imagine Gershwin writing an opera, called ”Porgy and Bess” about a poor Black community (“Catfish Row”? Who would present it, if written now?)

This color preference, with a sprinkling of Asiatics, neglects Latinos and American Indians. (Indeed, the opposite is true when one watches an Atlanta Braves home game crowd do a publicly guided “tomahawk” while “nock- a-homer” displays an Indian character dancing around a wigwam.) This constant presence has created a backlash, to excite those with conscious or unconscious race resentment, while it satisfies only a select elite with a hope it improves markets or escapes criticism. It is hard to see it justified as “reparations” or “affirmative action” – concepts themselves subject to serious challenge.

The commendable Seth Meyers features a Black, a Puerto Rican Lesbian, and an Asian as writers on his late night show. The Black and Lesbian tell jokes labeled as “Jokes Seth Can Not Tell” with apparent lesbian and Black punchlines. On the other hand, he constantly jokes about “old men.” Most of the media stars including the talented Trevor Noah (bi-racial identifying as Black) do constantly: how they have lost their wits, are politically reactionary, look disgusting in a gym, particularly naked, lost their sexuality and attractiveness, can not do many tasks. Trevor Noah started his interview with Bernie Sanders “Are you too old?” to receive the appropriate reply: “Are you a bigot?” Let us note that his message seems to resonate with the younger voters in current polls putting him first in the current carnival of Democratic candidates.

The “old white men” accusation is frequently leveled at Congress with age complaints about Judges. (Where would the Supreme Court be without Ruth Bader Ginsberg in her mid 80s?). Seniority, in the Republican Party, is a problem endemic to the Rules. But, if we remove “white” from the triad, we all should celebrate the principled leadership from Elijah Cummings and John Lewis in the Congress. We should be delighted with Alexandra Ocasia Cortez for all she says and does, as well as thrilled that she replaced a 9 term Congressman, not because of his age, but because he was a retrograde party hack. An “old white man” has a long history to evaluate while he should have learned and grown politically, practically, and philosophically. Wisdom acquired constitutes a virtue.

Making “old white men” an acceptable criticism anywhere is wrong. Individuals are to be judged on their merits and potentialities. To accept “old white me” automatically as a negative cliche is discrimination wherever it occurs. Accepting the deplorable degradation and/or inequality practiced against “people of color”, women, and the poor, emphasizing the continued damage done to Native Americans, Latinos (now particularly Puerto Rican and Mexicans) and those with “different” sexual preferences requires real action rather than an elitist attack on another group.

The general social conditions are deplorable with poverty, racism, and exclusion of the oppressed from satisfying their needs and fulfilling their potentialities. Such a horror is not reduced by selected public featuring of anointed “people of color”, gender and age, but rather creates an anger for those so stigmatized and an excuse for those who are prejudiced. Occasional fawning obeisance to a “legend” exaggerates rather than minimizes a general “ageist” culture, particularly prominent in the media. Mandatory retirement, particularly in an era with pensions (promises for future payment to forgo present payments) and public benefits destroyed, creates poverty and wastes resources for the work place. The spectacle of the “elderly” serving at fast food places is not ennobling vision.

Nothing is inherently wrong for a human being to be “white”, “old”, or “man” The first, of course, has varied in definition (once including some Italians and Jews), the second an ascription dependent on societal longevity generalities, the third a biological classification. Together the words offer only an irrelevant characterization. Not redeemed by reverse preference, it perpetuates bigotry, pure and simple. Instead of a condemned, as an irrelevant, perspective, this pernicious prejudice is prevalent and reinforced by mass media for a “balance” based a fraudulent fad of “diversity”.

Old white men.” Honor the best of them. Respect all of them.

A proposed “sovereign internet” law currently working its way through Russia’s government.

Russia wants to cut itself off from the global internet. Here’s what that really means.

The plan is going to be tricky to pull off, both technically and politically, but the Kremlin has set its sights on self-sufficiency.
By Charlotte Jee
Mar 21 2019
<https://www.technologyreview.com/s/613138/russia-wants-to-cut-itself-off-from-the-global-internet-heres-what-that-really-means/>

In the next two weeks, Russia is planning to attempt something no other country has tried before. It’s going to test whether it can disconnect from the rest of the world electronically while keeping the internet running for its citizens. This means it will have to reroute all its data internally, rather than relying on servers abroad.

The test is key to a proposed “sovereign internet” law currently working its way through Russia’s government. It looks likely to be eventually voted through and signed into law by President Vladimir Putin, though it has stalled in parliament for now.

Pulling an iron curtain down over the internet is a simple idea, but don’t be fooled: it’s a fiendishly difficult technical challenge to get right. It is also going to be very expensive. The project’s initial cost has been set at $38 million by Russia’s financial watchdog, but it’s likely to require far more funding than that. One of the authors of the plan has said it’ll be more like $304 million, Bloomberg reports, but even that figure, industry experts say, won’t be enough to get the system up and running, let alone maintain it.

Not only that, but it has already proved deeply unpopular with the general public. An estimated 15,000 people took to the streets in Moscow earlier this month to protest the law, one of the biggest demonstrations in years.

Operation disconnect

So how will Russia actually disconnect itself from the global internet? “It is unclear what the ‘disconnect test’ might entail,” says Andrew Sullivan, president and CEO of the Internet Society. All we know is that if it passes, the new law will require the nation’s internet service providers (ISPs) to use only exchange points inside the country that are approved by Russia’s telecoms regulator, Roskomnadzor.

Operating hours Mon-Thu 8:30-17:30 Fri 8:30-16:15

+7 (495) 987-68-00

These exchange points are where internet service providers connect with each other. It’s where their cabling meets at physical locations to exchange traffic. These locations are overseen by organizations known as internet exchange providers (IXPs). Russia’s largest IXP is in Moscow, connecting cities in Russia’s east but also Riga in neighboring Latvia.

MSK-IX, as this exchange point is known, is one of the world’s largest. It connects over 500 different ISPs and handles over 140 gigabits of throughput during peak hours on weekdays. There are six other internet exchange points in Russia, spanning most of its 11 time zones. Many ISPs also use exchanges that are physically located in neighboring countries or that are owned by foreign companies. These would now be off limits. Once this stage is completed, it would provide Russia with a literal, physical “on/off switch” to decide whether its internet is shielded from the outside world or kept open.

What’s in a name?

As well as rerouting its ISPs, Russia will also have to unplug from the global domain name system (DNS) so traffic cannot be rerouted through any exchange points that are not inside Russia.

The DNS is basically a phone book for the internet: when you type, for example, “google.com” into your browser, your computer uses the DNS to translate this domain name into an IP address, which identifies the correct server on the internet to send the request. If one server won’t respond to a request, another will step in. Traffic behaves rather like water—it will seek any gap it can to flow through.

“The creators of the DNS wanted to create a system able to work even when bits of it stopped working, regardless of whether the decision to break parts of it was deliberate or accidental,” says Brad Karp, a computer scientist at University College London. This in-built resilience in the underlying structure of the internet will make Russia’s plan even harder to carry out.

The actual mechanics of the DNS are operated by a wide variety of organizations, but a majority of the “root servers,” which are its foundational layer, are run by groups in the US. Russia sees this as a strategic weakness and wants to create its own alternative, setting up an entire new network of its own root servers.

“An alternate DNS can be used to create an alternate reality for the majority of Russian internet users,” says Ameet Naik, an expert on internet monitoring for the software company ThousandEyes. “Whoever controls this directory controls the internet.” Thus, if Russia can create its own DNS, it will have at least a semblance of control over the internet within its borders.

This won’t be easy, says Sullivan. It will involve configuring tens of thousands of systems, and it will be difficult, if not impossible, to identify all the different access points citizens use to get online (their laptops, smartphones, iPads, and so on). Some of them will be using servers abroad, such as Google’s Public DNS, which Russia simply won’t be able to replicate—so the connection will fail when a Russian user tries to access them.

[snip]

Could someone really destroy the whole Internet?  YES

The Internet is more than just a technology. It is a domain similar to the domains of land, air, sea and space, but with its own distinct challenges.

WHO CONTROLS THE INTERNET?

The whole internet is controlled by seven actual, physical keys. – The key issue with internet governance is always trust, which is ridiculous.

WHO MANAGES THE INTERNET’S ADDRESS BOOK?
BY VINT CERF Vint Cerf summarizes the transition of ICANN.

THE NET IS A WORLD OF ENDS. The Internet is a “network of networks” of computers. It was born on Oct. 29, 1969, when a UCLA student programmer sent a message from his computer to one at Stanford.

Social media, infowar, cyber and human security and ethics

google

 

 

 

 

From last year’s , but still cogent. With , and .

How hackers pulled off a $20 million bank heist

https://arstechnica.com/information-technology/2019/03/how-hackers-pulled-of-a-20-million-bank-heist/

By Lily Hay Newman
Wired.com
3/17/2019

In January 2018 a group of hackers, now thought to be working for the North Korean state-sponsored group Lazarus, attempted to steal $110 million from the Mexican commercial bank Bancomext. That effort failed. But just a few months later, a smaller yet still elaborate series of attacks allowed hackers to siphon off 300 to 400 million pesos, or roughly $15 to $20 million from Mexican banks. Here’s how they did it.

At the RSA security conference in San Francisco last Friday, penetration tester and security advisor Josu Loza, who was an incident responder in the wake of the April attacks, presented findings on how hackers executed the heists both digitally and on the ground around Mexico. The hackers’ affiliation remains publicly unknown. Loza emphasizes that while the attacks likely required extensive expertise and planning over months, or even years, they were enabled by sloppy and insecure network architecture within the Mexican financial system, and security oversights in SPEI, Mexico’s domestic money transfer platform run by central bank Banco de México, also known as Banxico.

[ECP] NetHappenings 3/18/19

YOUR HEALTH INFORMATION PRIVACY RIGHTS

HIPPA  

Office for Civil Rights Headquarters
U.S. Department of Health & Human Services
200 Independence Avenue, S.W.
Washington, D.C. 20201
Toll Free Call Center: 1-800-368-1019
TTD Number: 1-800-537-7697

HHS Releases Voluntary Cybersecurity Practices for Health Industry

GDPR, California’s Consumer Privacy Act, and next-generation ransomware and denial of service attacks, a firm’s ability to provide security is also becoming a matter of survival. Put it all together, and many CISOs today exist in environments where they are not understood by business executives and thus are not being included in business initiatives until it is too late and security vulnerabilities expose the enterprise to cyberattacks and compliance violations.

WHO OWNS YOUR MEDICAL RECORDS?

In 2016, more than 100 million Americans have had their electronic medical records hacked from health systems. For example, this June, Banner Health in Phoenix had a breach of 3.7 million electronic medical records.
Many hospitals throughout the country have been held hostage for their health information system by hackers and have had to pay ransom to regain control of their patients’ medical data.

2016 more than 100 million Americans have had their electronic medical records hacked. Each one can be sold for $50.
The Health Insurance Portability and Accountability Act was written 20 years ago, when medical records were kept on paper, and is not applicable to the contemporary digital era.

Moreover, the pervasive selling of our medical data is unchecked, with no legal protection. The massive hacking of health system data has not resulted in any new legislation to date or enforcement via established laws.

Informed Patient Institute
We rate the websites that help you find the right doctor, hospital, and nursing homes and we provide tips about quality concerns. also see

https://www.philly.com/philly/health/what-is-philly-health-costs-and-how-can-it-help-me-20180220.html

ProPublica analyzed nearly 17,000 surgeons and found wide variations in complication rates for some of the most routine elective procedures. Explore our database to know more about a surgeon before your operation.
https://www.propublica.org/article/surgeon-level-risk-quotes

2016 Consumer Reports Medical Board Ratings

Medicare Provider Utilization and Payment Data: Physician and Other Supplier

Digital business has become a key driver to business strategy across industries.
CIOs have digital transformation at the center of their corporate
strategy.  #Cybersecurity, amazingly, is often not a top-tier priority in enterprise risk management. The #CISO, is only noticed when things go wrong. This is why CISOs are almost always fired or “resign” after major data breaches. The CISO is usually the most qualified person to manage post breach forensics, cleanup, and compliance audits.
https://venturebeat.com/2019/03/16/cisos-you-need-to-manage-by-walking-around/

Think a strong information security posture means you’re complying with HIPAA? Without proper documentation for government regulators, infosec protocols might safeguard data without meeting federal criteria.

Staff lapses and IT system vulnerabilities are key reasons behind SingHealth cyberattack, according to COI Report

ClassAction.org is a group of online professionals who are committed to exposing corporate wrongdoing and giving consumers the tools they need to fight back. We’ve been reporting on the legal space for nearly a decade and have built relationships with class action and mass tort attorneys across the country.

Prescription Hope
Prescription Hope offers over 1,500 brand-name medications all for the
set price of $50 per month for each medication. This covers 100% of the medication cost, no matter the retail price.

Market Share Matters: Evidence Of Insurer And Provider Bargaining Over Prices
Health-care providers and insurers have to agree on how much doctors will be reimbursed before doctors begin treating insurers’ clients. Those fees, which depend on the two parties’ relative clout. Abstract

A survey of the numbers, published this week in Health Affairs, shows that small-time doctor’s offices and insurance companies are getting squeezed by their larger competitors.
https://www.washingtonpost.com/news/wonk/wp/2017/01/09/its-hard-to-be-a-small-time-family-doctor-these-days-new-data-show/

Finally, U.S. hospitals will have to post their prices online.

Hospitals must post ‘chargemaster’ prices online.
Patient Estimate team call  484.337.1970
FAQ Requirements for Hospitals To Make Public a List of Their Standard Charges via the Internet
https://www.cms.gov/Medicare/Medicare-Fee-for-Service-Payment/AcuteInpatientPPS/Downloads/FAQs-Req-Hospital-Public-List-Standard-Charges.pdf
The chargemaster is not a useful tool for consumers who are comparison shopping between hospitals or health systems.
The chargemaster amounts are billed to an insurance company, Medicare, or Medicaid, and those insurers then apply their contracted rates to the services that are billed. In situations where a patient does not have insurance, our hospital has financial assistance policies that apply discounts to the amounts charged.
https://www.mainlinehealth.org/patient-services/patient-billing/standard-charges

A huge trove of medical records and prescriptions found exposed Thousands of health records and doctor’s notes were exposed daily
By Zack Whittaker TechCrunch.com March 17, 2019 A health tech company was leaking thousands of doctor’s notes, medical records, and prescriptions daily after a security lapse left a server without a password. The little-known software company, California-based Meditab, bills itself as one of the leading electronic medical records software makers for hospitals, doctor’s offices, and pharmacies. The company, among other things, processes electronic faxes for healthcare providers, still a primary method for sharing patient files to other providers and pharmacies. But that fax server wasn’t properly secured, according to the security company that discovered the data. SpiderSilk, a Dubai-based cybersecurity firm, told TechCrunch of the exposed server. The exposed fax server was running a Elasticsearch database with over six million records since its creation in March 2018. The faxes also included personal data and health information on children. None of the data was encrypted. […] Board of Directors responsible

MOUNTAIN VIEW, CA

800 West El Camino Real, Suite 350
Mountain View, California 94040
General +1 650 458 2620
Sales +1 650 458 2625
info@elastic.co
sales@elastic.co

The server was hosted on an subdomain of MedPharm Services, a Puerto Rico-based affiliate of Meditab, both founded by Kalpesh Patel.

NY Governor Cuomo Calls For Investigation on Facebook Health Data Collection

American Travelers Seek Cheaper Prescription Drugs In Mexico And Beyond
In Utah last year, the Public Employee Health Plan took this idea to a new level with its voluntary Pharmacy Tourism Program. For certain PEHP members who use any of 13 costly prescription medications — including the popular arthritis drug Humira — the insurer will foot the bill to fly the patient and a companion to San Diego, then drive them to a hospital in Tijuana, Mexico, to pick up a 90-day supply of medicine.

TechCrunch: Screen time inhibits toddler development, study finds. “In news that will surprise few but still alarm many, a study has found that kids 2-5 years old who engage in more screen time received worse scores in developmental screening tests. The apparent explanation is simple: when a kid is in front of a screen, they’re not talking, walking or playing, the activities during which basic skills are cultivated

Researchers Create Algorithm to Protect Kids from Disturbing YouTube Videos

Computer program that could bypass patents to produce synthetic drugs Software that can bypass current intellectual property and design medication with the same function as top drugs could help pharma companies…

“Massachusetts Attorney General Maura Healey alleges eight Sackler family members and nine Purdue board members or executives played key roles in the nation’s deadly opioid epidemic.