Your City, Your State, Your K12 Public School all attacked using NSA weapon.

Your City, Your State, Your K12 Public School all attacked using NSA weapon.

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc
By Nicole Perlroth and Scott Shane
May 25, 2019

In Pennsylvania School Districts Stockpiling Huge budget surplus accounts, while still raising property taxes every year

WannaCry? Hundreds of US schools still haven’t patched servers
A dive into vulnerability data shows even big districts’ servers still offering up SMB v. 1.

I think patching your software and making backups will protect you better than blaming the Gov’t
or
… than blaming the government who weaponized an unknown flaw in software and made sure not to tell the software vendor, in order to prevent a patch which customers could install, you mean?
or
Microsoft was warned, and the patch came out a month before Shadow Brokers dumped it.

If you’re wondering why ransomware continues to be such a problem for state and local governments and other public institutions, all you have to do to get an answer is poke around the Internet a little. Publicly accessible security-scan data shows that many public organizations have failed to do more than put a bandage over long-standing system vulnerabilities that, if successfully exploited, could bring their operations to a standstill.

While the method by which RobbinHood ransomware infected the network of Baltimore City two weeks ago is still unknown, insiders within city government have pointed to the incomplete efforts by the Office of Information Technology to get a handle on the city’s tangle of software, aging servers, and wide-flung network infrastructure. Baltimore isn’t even the only city to have been hit by ransomware in the last month—Lynn, Massachusetts, and Cartersville, Georgia, both had electronic payment systems taken offline by ransomware this month. Greenville, North Carolina, was struck by the same RobbinHood ransomware affecting Baltimore in April.

But cities aren’t the only highly vulnerable targets to be found by would-be attackers. There are hundreds of thousands of Internet-connected Windows systems in the United States that still appear to be vulnerable to an exploit of Microsoft Windows’ Server Message Block version 1 (SMB v. 1) file sharing protocol, despite repeated public warnings to patch systems following the worldwide outbreak of the WannaCry cryptographic malware two years ago. And based on data from the Shodan search engine and other public sources, hundreds of them—if not thousands—are servers in use at US public school systems. Even in cases where Microsoft’s patch of SMB v. 1 has been applied, the protocol remains a potential security problem—one that some organizations can’t completely close because some vendors still require the protocol for applications such as networked copiers and scanners.

While conducting research as a follow-up to our coverage of Baltimore City’s ongoing ransomware attack, Ars discovered that neighboring Baltimore County’s public school system had eight publicly accessible servers that still were running in configurations that indicated they were vulnerable to EternalBlue, the Equation Group exploit exposed by Shadow Brokers in April 2017 and then used as part of the WannaCry malware a month later. The exploit is now packaged as part of multiple malware kits, according to security researchers.

https://arstechnica.com/information-technology/2019/05/two-years-after-wannacry-us-schools-still-vulnerable-to-eternalblue/

SEE

Where are the State AG’s in protecting the citizens from malware that “gets away” from the NSA? The weaponized software created by the NSA…. when employees who have been taught everything by the NSA leave their jobs and take what they know with them then form companies and sell their “knowledge /skills / know how” learned on the job by working for America to enemies.

https://krebsonsecurity.com/2017/12/former-nsa-employee-pleads-guilty-to-taking-classified-data/


02
Dec 17

Former NSA Employee Pleads Guilty to Taking Classified Data

A former employee for the National Security Agency pleaded guilty on Friday to taking classified data to his home computer in Maryland. According to published reports, U.S. intelligence officials believe the data was then stolen from his computer by hackers working for the Russian government.

Nghia Hoang Pho, 67, of Ellicott City, Maryland, pleaded guilty today to “willful retention of national defense information.” The U.S. Justice Department says that beginning in April 2006 Pho was employed as a developer for the NSA’s Tailored Access Operations (TAO) unit, which develops specialized hacking tools to gather intelligence data from foreign targets and information systems.

According to Pho’s plea agreement, between 2010 and March 2015 he removed and retained highly sensitive classified “documents and writings that contained national defense information, including information classified as Top Secret.”

Pho is the third NSA worker to be charged in the past two years with mishandling classified data. His plea is the latest — and perhaps final — chapter in the NSA’s hunt for those responsible for leaking NSA hacking tools that have been published online over the past year by a shadowy group calling itself The Shadow Brokers.

https://thehill.com/policy/national-security/436950-former-cia-nsa-employees-sue-agencies-over-alleged-censorship

Ex-NSA employees criticize Mike Rogers’ role with Israeli venture firm

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc By Nicole Perlroth and Scott Shane May 25, 2019

For nearly three weeks, Baltimore has struggled with a cyberattack by digital extortionists that has frozen thousands of computers, shut down email and disrupted real estate sales, water bills, health alerts and many other services.

But here is what frustrated city employees and residents do not know: A key component of the malware that cybercriminals used in the attack was developed at taxpayer expense a short drive down the Baltimore-Washington Parkway at the National Security Agency, according to security experts briefed on the case.

Since 2017, when the N.S.A. lost control of the tool, EternalBlue, it has been picked up by state hackers in North Korea, Russia and, more recently, China, to cut a path of destruction around the world, leaving billions of dollars in damage. But over the past year, the cyberweapon has boomeranged back and is now showing up in the N.S.A.’s own backyard.

It is not just in Baltimore. Security experts say EternalBlue attacks have reached a high, and cybercriminals are zeroing in on vulnerable American towns and cities, from Pennsylvania to Texas, paralyzing local governments and driving up costs.

The N.S.A. connection to the attacks on American cities has not been previously reported, in part because the agency has refused to discuss or even acknowledge the loss of its cyberweapon, dumped online in April 2017 by a still-unidentified group calling itself the Shadow Brokers. Years later, the agency and the Federal Bureau of Investigation still do not know whether the Shadow Brokers are foreign spies or disgruntled insiders.

< – >

WHERE ARE THE CLASS ACTION SUITS?

WHY DOESN’T THE STATE HOLD THE DEFENSE DEPARTMENT ACCOUNTABLE FOR THE DAMAGE DONE TO THEIR CITIZENS?

Breaking news. Patch yourself for the CVEs exploited by NSA tools on the loose. This includes major cities!

ETERNALBLUE was initially nicknamed EternalBluescreen —NSA never seriously considered alerting Microsoft about discovering the vulnerability (before Shadow Brokers happened), and —“held on it” (“used it,” presumably) for more than five years
https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html


NEW: Baltimore was hit with an NSA hacking tool that is being used to hijack U.S. cities. ⁦⁩ and I spent months looking into the origins of EternalBlue, a stolen NSA weapon that is popping up in more and more attacks across the country.

The NSA spent more than a year searching for the flaw in Microsoft’s software and writing the code to exploit it.

NSA TAO operators jokingly referred to it as “EternalBluescreen” because it often crashed computer systems, a risk they might tip off targets. It took months to hone. Once it became a reliable espionage tool, it netted some of the NSA’s best counter-terrorism intelligence, and there was never any serious consideration that NSA would turn over the underlying flaw to Microsoft for patching.

The NSA kept it for 5+ years until unidentified hackers threatened to publish it.

In April 2017, the group, which calls itself the ShadowBrokers, dumped it online, where it has been picked up by North Korea, Russia, Iran and, just this week, China in attacks that have cut a path of destruction around the globe. But in the last year, it has boomeranged back to the NSA’s own backyard, hitting Baltimore, Allentown, San Antonio and countless other cities in attacks that have paralyzed municipal operations and alarmed government officials, who privately say the NSA needs to account. The NSA refuses to discuss the incidents or even acknowledge that the dumped tools were part of its cyber arsenal, but in an unusually candid interview, NSA former director Mike Rogers, who oversaw the agency during the leak, deflected blame. “If Toyota makes pickup trucks and someone takes a pickup truck, welds an explosive device onto the front, crashes it through a perimeter and into a crowd of people, is that Toyota’s responsibility?

“The N.S.A. wrote an exploit that was never designed to do what was done.”

Microsoft rejects that analogy: “These exploits are developed and kept secret by governments for the express purpose of using them as weapons or espionage tools. They’re inherently dangerous. When someone takes that, they’re not strapping a bomb to it. It’s already a bomb.”

EternalBlue is being packaged as part of many malware attacks as one possible lateral movement tool. Making a bomb is very much responsibility of the creator.

NSA toyota analogy was not correct. Exploit is like a bomb its a different matter who detonate it and where. NSA is very much responsible for their malicious espionage tools.

https://twitter.com/waveslide/status/1132442317372219392

EternalBlue was leaked 2 years ago. MS patched BEFORE it hit the wild. Some industry gossip the NSA knew they’d lost control and gave MS a heads-up. THIS PATCH HAS BEEN OUT FOR TWO YEARS! If it hits your network now, you deserve it. Usually, it’s a component of a malware package.

China has also been able to intercept an NSA tool as it attacked their networks. They stopped it, copied it, modified it, and sent it back to us and all of our allies.


‏ @bitsdigits
No, it wasn’t the NSA hacking tool that did this. It was basic exemptions to the #Baltimore #CIO policies that didn’t address patch management deficiencies that did this. Has anyone looked at what .gov requirements are
https://home.dotgov.gov/registration/requirements/

In Baltimore and Beyond, a Stolen N.S.A. Tool Wreaks Havoc

https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html

For nearly three weeks, Baltimore has struggled with a cyberattack by digital extortionists that has frozen thousands of computers, shut down email and disrupted real estate sales, water bills, health alerts and many other services.

But here is what frustrated city employees and residents do not know: A key component of the malware that cybercriminals used in the attack was developed at taxpayer expense a short drive down the Baltimore-Washington Parkway at the National Security Agency, according to security experts briefed on the case.

Since 2017, when the N.S.A. lost control of the tool, EternalBlue, it has been picked up by state hackers in North Korea, Russia and, more recently, China, to cut a path of destruction around the world, leaving billions of dollars in damage. But over the past year, the cyberweapon has boomeranged back and is now showing up in the N.S.A.’s own backyard.

It is not just in Baltimore. Security experts say EternalBlue attacks have reached a high, and cybercriminals are zeroing in on vulnerable American towns and cities, from Pennsylvania to Texas, paralyzing local governments and driving up costs.

The N.S.A. connection to the attacks on American cities has not been previously reported, in part because the agency has refused to discuss or even acknowledge the loss of its cyberweapon, dumped online in April 2017 by a still-unidentified group calling itself the Shadow Brokers. Years later, the agency and the Federal Bureau of Investigation still do not know whether the Shadow Brokers are foreign spies or disgruntled insiders.

< – >

https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html

In Pennsylvania School Districts Stockpiling Huge budget surplus accounts, while still raising property taxes every year

Showcase 5 Powerful Founder / CEO Women

Judith Faulkner – Founder/CEO, Epic Systems
Lynda Weinman – Founder/CEO, Lynda.com
Shira Goodman – CEO, Staples.com
Helen Greiner – Co-founder, iRobot
Kelsey Wirth – Co-founder, Align Technologies

http://techcrunch.com/2019/05/03/dear-hollywood-here-are-five-female-founders-to-showcase-instead-of-elizabeth-holmes/

Media bias “electable”, “authentic”, “likable” against #women on the 2020 campaign

Media bias against women on the 2020 campaign trail is already starting to ramp up, @jess_mc explains

Media bias against women, #electable, #likeable, #authentic

we like #uncorruptable #women

Elizabeth Warren is likable, authentic, and electable plus she is  #uncorruptable look at her policy plans.

King of the Dudes, What is Battle of the Bros all duded up?

King of the Dudes

Other words such as dude also emerged in the Five Points, said Cassidy.

Dud in old Irish, appearing in the Irish-English dictionary by Father Patrick Dineen published in 1927, means “dolt, a numbskull, a rubbernecker; a mopish, shy, foolish-looking fellow”, he said. In the Five Points, says Cassidy, richer classes would come for the booze and the girls, and the working-class Irish used to look at them with their monocles and top hats and derogatorily called them “dud”.

1888 Evander Berry Wall a New York Socialite was dubbed
“King of the Dudes.”
New York American newspaper “Battle of the Dudes”. The New York Journal-American was a daily newspaper published in New York City from 1937 to 1966.
dude

This version of the word is still in occasional use in American slang, as in the phrase “all duded up” for getting dressed in fancy clothes.
He inherited $2 million before the age of 22.  He went bankrupt in 1899 and  declared that “New York had become fit only for businessmen” and left for Paris in 1912. He used bespoke shirtmaker Charvet, where Wall had his signature “spread eagle” collar shirts and cravats custom-made for himself and his dog. Wall always dined at the Ritz with his dog, whose collars and ties were made by Charvet in the same style and fabric as his master’s. When he died, he left only $12,608, having “squandered nearly every cent on pleasure.”

Learn about Irish American Vernacular English
How the Irish Invented Slang
Subtitle: The Secret Language of the Crossroads
by Professor Dan Cassidy

How the Irish Invented American Gambling Slang into Irish American Vernacular English.

What Does Boogie Mean?
The Linguist is taking notes. 1941 Ball of Fire – Billy Wilder, Gary Cooper, Barbara Stanwyk.

Slang is words that takes off his coat, spits on it’s hands and gets to work!

Giniker – Irish American Vernacular English: The Sunday Times Ireland July 9th 2006

IT SOUNDS like a load of bunkum, or in this case buanchumadh, but according to an American academic the Irish language has been a huge influence on American slang.

The Sanas (Irish Etymology) of Faro, Poker and the Secret Flash Words for the Brotherhood of American Gamblers. By DANIEL CASSIDY 5/13/06

Remember in 1859 Philadelphia is the 4th largest city in the WORLD.

“There’s A Sucker (Sách úr, fresh new “fat cat”) Born Every Minute.” See etymology of Bunk and Dude both are Irish.

The Sanas (Irish Etymology) of Faro, Poker and the Secret Flash Words for the Brotherhood of American Gamblers. By DANIEL CASSIDY 5/13/06

“Language is a virus from outer space.” – William S. Burroughs BEAT generation

Irish American Vernacular English words traced, found, and borrowed into Standard American English.

Karen Ellis Guest Lecturer
Honoring the work of Scholar Peter Tamony and The Sanas, the Etymology of Jazz and Dan Cassidy

Dudes: NYT News Desk 1942

dude

Well dressed in 1902 

The best-dressed American in Europe, the King of the Dudes. He was reported to possess 285 pairs of pants, 5,000 custom-tailored neckties. It was rumored that he changed his ties six times a day. His conduct was motivated by a great principle: find out what suits you and always wear it. Berry Wall usually wore capes and coats of horse-blanket plaid, high horse-collars cinched with lush Ascot cravats.

Donald Trump advisor/confidante Roger J Stone Jr with wife Nydia at the Inauguration. #Dandy #Style Roger Stone is primarily known as a political consultant, but he also serves as the men’s fashion correspondent for the Daily Caller. #1 DUDE The Dapper Don

Panicked Wall Street Bros Wonder: What Is Business-Casual??

Goldman Sachs bank execs Panicked Wall Street Bros Wonder: What Is Business-Casual???

Patter for Three-Card Monte – thanks to Whit Haydn School for Scoundrels

Who Killed Society by Cleveland Amory

DHS, FBI say election systems in all 50 states were targeted in 2016

DUDE Trump’s Justice Department OKs Trading with the Enemy
Trading with the Enemy Act  George Bush’s grandfather, the late US senator DUDE Prescott Bush, was a director and shareholder of companies that profited from their involvement with the financial backers of Nazi Germany. Files in the US National Archives shows Prescott Bush – how did we get here was a director  involved with…

Thorstein Veblen, the greatest American thinker you probably never heard of, predicted the rise of a Gilded Business Man and the demolition of democracy. The man who saw this coming a century ago

Louis the 14th thought “The State” was a person. HIM!

DUDE Trump’s money came from his grandfather another DUDE WHO owned a general store and whore house.

Donald Trump’s money originally came from his grandfather Friedrich Trump a German immigrant, who ran a whore house /restaurant – bar, in British Columbia.
Buried in a ghost town in Canada’s subarctic are the roots of the family fortune that paved Donald Trump’s path to prominence.

Guthrie reworked his signature Dust Bowl ballad “I Ain’t Got No Home” into a blistering broadside against his landlord: BEACH HAVEN AIN’T MY HOME (aka. “Old Man Trump”) Words by Woody Guthrie

Nov. 8 election that Eric had asked if American Hat Co. could make a custom hat for his father. Soon after, the manufacturer was at work getting measurements ready as well as the materials befitting the president of the United States.
“It morphed into now we’re making hats for Eric, for Don Jr. and for Mike Pence as well,” Mundee said.
Mundee said the Trump family requested a light-colored hat versus black, so the manufacturer went with a silverish tone. The material is a mixture of beaver belly fur and mink, making the hat soft as silk. The crown, or top of the hat, is done in a cattleman’s style. He said this specific style of hat is widely known as the finest in the cowboy market.
And it’s not just the material that American Hat Co. uses that puts their stamp on the product. It’s also the gold foil stamp on the inside band that also illustrates its quality, as well as the Keith Maddox mark of “KM” on the brim of the hat. The hat retails for about $2,800.

K12 PlayGround Find a School Discover the right school for your child.

K12Playground.com Find a School Discover the right school for your child.

Submit or Update Your School or Organization.

Once you’ve located your school, update the information about the school such as the amenities, features or programs that make this school special.

Find and compare K12 Schools and School Districts in the USA and Territories.

The Man Who Saw Trump Coming a Century Ago

Thorstein Veblen, the greatest American thinker you probably never heard of, predicted the rise of a Gilded Business Man and the demolition of democracy.

The Man Who Saw Trump Coming a Century Ago

Veblen got his initial job, teaching political economy at a salary of $520 a year, in 1890 when the University of Chicago first opened its doors. Back in the days before SATs and admissions scandals, that school was founded and funded by John D. Rockefeller, the classic robber baron of Standard Oil. (Think of him as the Mark Zuckerberg of his day.)

from the beginning, Thorstein Veblen was there, prepared to focus his mind on Rockefeller and his cronies, the cream of the upper class and the most ruthless profiteers behind that Gilded Age. He was already asking questions that deserve to be raised again in the 1% world of 2019. How had such a conspicuous lordly class developed in America? What purpose did it serve? What did the members of the leisure class actually do with their time and money? And why did so many of the ruthlessly over-worked, under-paid lower classes tolerate such a peculiar, lopsided social arrangement in which they were so clearly the losers?

A CURRENT ACCEPTABLE PREJUDICE by Jonathan Weiss Esq.

“Old white men.” The words separate are sometimes used pejoratively. All together they are considered by many “liberals” and many in the media as a crucial criticism. “Old” creates the most disdain. Rather than being considered an achievement implying future contribution, the years accumulated is considered negative.

Reactionaries often attack “political correctness” as a cover for the attitude and practice of racism, xenophobia, nativism, misogyny, wealth against poor, and disparagement of different gender and sexual practices – in their array of intolerant and discriminatory practices. But beyond all the despicable perspectives, with associated practices, glimmers a point.

Well out of population proportion, Blacks are now omnipresent in most ads, plays, and movies. Obligatory Blacks, generally cast as superior or educated, are featured in almost every dramatic or commercial presentation.. While it is true, there are many aspiring and unemployed actors available, to give preference on the basis on melanin amount should not be a functioning criterion. All actors should be allowed to play different parts. Forrest Whitaker portrays an excellent “Hughie”; Glenda Jackson a riveting “King Lear”, But the converse? – a white performer in “A Raison in the Sun”, Sam Rea as Lady Macbeth? (Shakespeare’s plays, historians say, were only performed by men). A few years back the bourgeoise identity advocate Spike Lee caused a furor to make sure that he, not a white man, direct “Malcolm X” failing to do justice to the charismatic, inspiring, and politically profound leader – who should have continued through old age. (Can you imagine Gershwin writing an opera, called ”Porgy and Bess” about a poor Black community (“Catfish Row”? Who would present it, if written now?)

This color preference, with a sprinkling of Asiatics, neglects Latinos and American Indians. (Indeed, the opposite is true when one watches an Atlanta Braves home game crowd do a publicly guided “tomahawk” while “nock- a-homer” displays an Indian character dancing around a wigwam.) This constant presence has created a backlash, to excite those with conscious or unconscious race resentment, while it satisfies only a select elite with a hope it improves markets or escapes criticism. It is hard to see it justified as “reparations” or “affirmative action” – concepts themselves subject to serious challenge.

The commendable Seth Meyers features a Black, a Puerto Rican Lesbian, and an Asian as writers on his late night show. The Black and Lesbian tell jokes labeled as “Jokes Seth Can Not Tell” with apparent lesbian and Black punchlines. On the other hand, he constantly jokes about “old men.” Most of the media stars including the talented Trevor Noah (bi-racial identifying as Black) do constantly: how they have lost their wits, are politically reactionary, look disgusting in a gym, particularly naked, lost their sexuality and attractiveness, can not do many tasks. Trevor Noah started his interview with Bernie Sanders “Are you too old?” to receive the appropriate reply: “Are you a bigot?” Let us note that his message seems to resonate with the younger voters in current polls putting him first in the current carnival of Democratic candidates.

The “old white men” accusation is frequently leveled at Congress with age complaints about Judges. (Where would the Supreme Court be without Ruth Bader Ginsberg in her mid 80s?). Seniority, in the Republican Party, is a problem endemic to the Rules. But, if we remove “white” from the triad, we all should celebrate the principled leadership from Elijah Cummings and John Lewis in the Congress. We should be delighted with Alexandra Ocasia Cortez for all she says and does, as well as thrilled that she replaced a 9 term Congressman, not because of his age, but because he was a retrograde party hack. An “old white man” has a long history to evaluate while he should have learned and grown politically, practically, and philosophically. Wisdom acquired constitutes a virtue.

Making “old white men” an acceptable criticism anywhere is wrong. Individuals are to be judged on their merits and potentialities. To accept “old white me” automatically as a negative cliche is discrimination wherever it occurs. Accepting the deplorable degradation and/or inequality practiced against “people of color”, women, and the poor, emphasizing the continued damage done to Native Americans, Latinos (now particularly Puerto Rican and Mexicans) and those with “different” sexual preferences requires real action rather than an elitist attack on another group.

The general social conditions are deplorable with poverty, racism, and exclusion of the oppressed from satisfying their needs and fulfilling their potentialities. Such a horror is not reduced by selected public featuring of anointed “people of color”, gender and age, but rather creates an anger for those so stigmatized and an excuse for those who are prejudiced. Occasional fawning obeisance to a “legend” exaggerates rather than minimizes a general “ageist” culture, particularly prominent in the media. Mandatory retirement, particularly in an era with pensions (promises for future payment to forgo present payments) and public benefits destroyed, creates poverty and wastes resources for the work place. The spectacle of the “elderly” serving at fast food places is not ennobling vision.

Nothing is inherently wrong for a human being to be “white”, “old”, or “man” The first, of course, has varied in definition (once including some Italians and Jews), the second an ascription dependent on societal longevity generalities, the third a biological classification. Together the words offer only an irrelevant characterization. Not redeemed by reverse preference, it perpetuates bigotry, pure and simple. Instead of a condemned, as an irrelevant, perspective, this pernicious prejudice is prevalent and reinforced by mass media for a “balance” based a fraudulent fad of “diversity”.

Old white men.” Honor the best of them. Respect all of them.

[ECP] NetHappeinings 3/12/19 #K12 #CPO

#NetHappenings @Nethappenings

3/12/19 #Web30 The World Wide Web turns 30 today!

Do you remember what life was like 30 years ago, pre-www,  when cyber-utopians heralded the new era of human collaboration and communication to  the underworld of social media posts called  ‘e-bile’?

Who Invented the Internet?
Who Controls The Internet?
Seven people control the system at the heart of the web: the domain name system, or DNS.

NetHappenings Where Internet Pioneer Gleason Sackmann got things started.

► @NetHappenings 

► K12PlayGround TM 
1st and oldest online K12 School directory in the World ©1993 History:
Be a part of Internet History!
Find, Edit, and Submit your K12 school information.
Join a #STEAM Project link to video project  find with #hashtags
@K12PlayGround

EduTech of ND @EduTechND History: Where Internet Pioneer Gleason Sackmann got things started.
EduTech provides information technology services and education technology professional development to K-12 educators in ND.

https://twitter.com/edutechnd

Girls Go CyberStart. The 2019 Girls Go CyberStart program is a series of online challenges that allow students to act as cyber protection agents to solve cybersecurity-related puzzles and explore related topics such as cryptography and digital forensics.
+++++++++++++++++++++++++++++++++++++++

NetBSD is a free, fast, secure, and highly portable Unix-like Open Source operating system. It is available for a wide range of platforms, from large-scale servers and powerful desktop systems to handheld and embedded devices.

Marcus J. Ranum, #Computer and #NetworkSecurity Researcher is now discussing our assumptions about #ComputerSecurity at #govsatcom 2019 #CyberSecurity #Luxembourg

2011 “The Internet will remain as insecure as it is possible to be and still function. ” -Marcus Ranum

► Amnesty Demands Israel Revoke NSO’s License After Haaretz Report on Firm’s Negotiations With Saudis Israeli Firm’s Spyware Was Used to Track Khashoggi

► Coinbase’s Newest Team Members Helped Authoritarians Worldwide Monitor Journalists and Dissidents H — king team
https://foreignpolicy.com/2016/04/26/fear-this-man-cyber-warfare-hacking-team-david-vincenzetti/

Never underestimate power, never underestimate fame. And our nation is run on loyalty, whether it be in Congress or your own little home, we’re positively tribal. Being rich and famous does not entitle you to break society’s rules. From time immemorial the wealthy have paid for silence, look at banks and offshore tax accounts.

+++++++++++++++++++++++++++++++++++++++

How much less California spends on each public school student than other states.
$25.4k per student in NYC, $16.7k in PA and $10.4k here in California.
How do young families keep moving  to CA?

Rankings of the States 2017 and Estimates of School Statistics 2018

California is 41st in the nation in per pupil K-12 spending

California is “No. 1 in per prisoner” spending.

Mostly True: You are shocked because the stats are bunk. Look at how much California teachers make (2nd highest in US) and then ask how overall spending could rank 41st? Answer: the 41st stat, like the $10.4k per student stat, has been helpfully “adjusted” to eliminate salary differences.

FALL ENROLLMENT 49,800,148 children
Average Daily Attendance 46,457,525 children

2017 High School Graduates 3,238,440 page 18

AVERAGE SALARY OF INSTRUCTIONAL STAFF 60,206 page 25
AVERAGE SALARY OF TEACHERS  58,479 page 26

How Much Federal Money follows the child out of the public school system into for profit charter follows no rules companies.

PUBLIC SCHOOL REVENUE PER STUDENT IN FALL ENROLLMENT page 29
PERCENTAGE OF COMBINED STATE & LOCAL REVENUE 49.8 page 34

The exceptions start on page 83
example: Enrollment figures only include students attending public schools and do not include those students attending private schools at public expense.

WHAT ABOUT ALL THE MONEY FROM THE LOTTERY?

Is The Lottery Shortchanging Schools?

Powerball Windfall? Schools Don’t Always Benefit From Lottery Sales

“Revenues generated from lottery have very little or no impact on overall education spending,” said Lucy Dadayan, a senior policy analyst at the Nelson A. Rockefeller Institute of Government, an Albany, New York, think tank. The reason: State legislatures often use the millions of dollars that come in from the lottery as an opportunity to reallocate other funds intended for schools from the state’s general revenue, making the overall education budget barely higher than it was before lottery money was added. “The state legislators added the funding in to the budget, and then they take it out,” said John O’Neil, communications director for the Virginia Education Association, an organization of more than 50,000 teachers and school professionals.

►Public school districts large systems that serve close to or more than 100,000 students have No Chief Privacy Officers.

Who is senior-level official who is responsible for the organization’s privacy policies and data governance in your school district?

Big Education Ape: Oakland, CA: Billionaires Will Convene to Discuss New Plans for Privatizing Public Schools | Diane Ravitch’s blog

Stats already show that Charter Schools do not graduate their students from high school.

Billionaires want all the K12 Department of Education money meant for the common good, the commons, our common wealth for their own pocket. These billionaires want the tax payers money for their own private  gain just to enrich themselves.

This has NOTHING to do with the quality of K12 Education.

The big business of selling student information and they do not protect their rights to privacy.

This is the art of the Steal.

https://www.newschools.org/about-us/team/donors/

Buying and selling the Data!

Anonymous at the top of the list
Chan Zuckerberg Foundation
Charles & Helen Schwab Foundation
The Walton Family Foundation
W.K. Kellogg Foundation
Perkins Hunter Foundation (Perkins family wealth started by opium drug running pirates)
The College Board
Michael & Susan Dell Foundation
John & Ann Doerr
Omidyar Network

► THERE ARE NO CHIEF PRIVACY OFFICERS IN K-12 EDUCATION

Children’s Rights K12 School Rights vs. Students Online privacy rights.

#StudentPrivacyRights

#ChiefPrivacyOfficer #CPO #K12CPO

STUDENT RIGHTS TO PRIVACY AND K12 SCHOOL RIGHTS VS. STUDENTS ONLINE PRIVACY RIGHTS.
and

DO YOU KNOW WHAT YOUR STATE IS COLLECTING ABOUT YOUR CHILD?There isn’t a single school district with a K-12 CPO. In fact, it is still extremely rare for districts to hire even one full-time employee dedicated to privacy.

Student Privacy Bill Protection : No Parental Consent Needed for Data Mining

Anyone who tells you they don’t need privacy because they “have nothing to hide” is a sheep that will enable a total surveillance state. Just don’t do it. Privacies protect our basic human rights.

► This story on IBM hoovering up millions of Flickr photos to power its facial recognition machine learning is fascinating and a nightmare

Facebook Is Giving Advertisers Access to Your Shadow Contact Information

: “Screen-grabbed from Facebook: a teacher had her students turn their phone volume up and create a collective record

Alex Stamos on Twitter: “This explains how Facebook plans to monetize a unified, 2 billion user end-to-end encrypted messaging service. I can’t think of a tech project with a more important privacy/safety balancing act than this one. I hope my friends working on it start public discussions on that.

Bob Lefsetz Zuckerberg’s Blog Post
A Privacy-Focused Vision for Social Networking
This isn’t about privacy, this is about MONOPOLY!

 

+++++++++++++++++++++++++++++++++++++++

COLLEGE ADMISSIONS IS BRIBED

A few months ago I was interviewing a college admissions coach who told me the following about how big of a donation it takes to get a child into an Ivy no questions asked: “There’s a certain magic number. It’s way higher than people think: $10 million.”

“what it takes to break into the 1% in various countries

$25 million nationwide college admissions cheating scam

“This case is about the widening corruption of elite college admissions through the steady application of wealth combined with fraud,” Andrew Lelling, the U.S. attorney for the District of Massachusetts, said at a news conference. According to Lelling, the ringleader of the scam is William Singer, owner of a college counseling service called Key Worldwide Foundation, who accepted bribes totaling $25 million from parents between 2011 and 2018 “to guarantee their children’s admission to elite schools.”
“The parents are a catalog of wealth and privilege,” Lelling said. “They include, for example, the CEOs of private and public companies, successful securities and real estate investors, two well-known actresses, a famous fashion designer and the co-chairman of a global law firm.”
Also named as defendants in the indictment are Robert Zangrillo, founder and CEO of the private investment firm Dragon Global; Bill Glashan, a businessman and international private equity investor; and Gordon Caplan, a New York attorney.

► Former PIMCO CEO Doug Hodge Named In Fraud Complaint Alongside Aunt Becky From “Full House”
Imagine surviving years of working with Bill Gross only to be taken down by bribing your kid into college. Um, Doug? You do have to talk in code. You’re doing a fraud.
JFC, you’d think a guy who spent that much time with Bill Gross would know how to bullshit properly.

How a Bicoin Evangelist Made Himself Vanish, in 15 (Not So Easy) Steps
#10 Buy a decoy house to fool the D.M.V.
Dozens of companies leaked sensitive data thanks to misconfigured Box accounts
Hospitals have ‘holy grail of personal data, ‘ yet their spending lags on 
digital security
Car alarms with security flaws put 3 million vehicles at risk of hijack
Drop Huawei or See Intelligence Sharing Pared Back, U.S. Tells Germany
Defense tech founded by Trump’s most prominent Silicon Valley supporters wins secretive military AI contract
Dreamers and Dropouts: Stories From Stanford, Cradle of Unicorns: The Good and the Bad of Stanford’s Massively Successful Startup Scene
Yes: a flying, jet-powered motorcycle As spec’ed out, the commercial speeder will weigh 231 lbs and be powered by four jet engines fueled with kerosene, diesel or Jet-A fuel. An ultralight version of the speeder will fly 60mph and won’t require a pilot’s license; alternatively, an experimental version of the craft will be able to fly over 150mph, but will require a formal license to fly. That aircraft should also have 30 minutes of flight time with 1200lbs of max thrust and a flight ceiling of 15,000 feet, though JetPack fully admits that most of its customers won’t need that…
Cyberization means it’s not your daddy’s war anymore: Kurdish rebels are exploiting an app to befriend and get information from Turkish soldiers. Reminiscent of the dating apps used by Hamas recently to spy on Israeli soldiers.

 NYC Media Lab newletter – https://nycmedialab.org/data/
How AI Will Rewire Us
Nicholas A. Christakis, Sterling Professor of Social and Natural Science at Yale and author of Blueprint: The Evolutionary Origins of a Good Society, believes AI is the only general purpose technology (GPT) that will fundamentally change our relations towards each other. If you look at any other GPT – the steam engine, electricity, the internet – these have changed everything around us except our “love, friendship, cooperation, and teaching” – what Christakis calls our evolutionary social suite. In this Atlantic piece, he explores how AI will be the first GPT to affect our social suite. Christakis noticed some peculiar things at his Yale lab. For one, when you include a cheerful bot who admits to occasional mistakes in a group assignment, the humans in the group work better together, vs. groups with bland robots. This holds true in larger experiments, with thousands of participants: “groups with mistake-prone bots consistently outperformed groups containing bots that did not make mistakes”. ~ Joly MacFie

John Gilmore  **Copyright seizure approaching** SpaCCS 2019 CFP (10+SIs): The 12th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage

Don’t submit your paper to this conference!  When researchers refuse to
supply their papers to the publishers who extort monopoly fees from
academic librarians, they have found the easiest way to tear down these
monopolies.

If you submit any paper to this conference, you will be forced
to assign your entire copyright in the paper to “Springer Nature
Switzerland AG”, now and forever, for their profit and your loss
and the public’s loss (see below).

Jun Feng is a program chair.  He should know to warn authors that
the whole conference is a scam on academic authors, which steals their
copyrights in order to extract large fees from academic libraries.  But
perhaps he did not mention this because he’s helping to run the scam.

I recommend publishing your work in Open Access conferences and journals in which (1) you are free to retain your copyright and control your
rights, and (2) the public is free to read your paper without paying
exhorbitant fees to a walled-garden publisher that prevents public
access to your scholarship.  See
https://en.wikipedia.org/wiki/Open_access

For example, the USENIX
Association runs many respected conferences and does Open Access
publication of their proceedings (https://www.usenix.org/).  The Public
Library of Science journals are also Open Access
(https://www.plos.org/).  Open access publishing increases your impact,
because all potential readers can actually read your paper.  Many
funders and academic institutions *require* that your work be published
with open access, because they have seen how the academic publishing
monopoly has damaged academic libraries (and science in general).

For general info about the highly profitable scams around academic
publishing, see:
https://en.wikipedia.org/wiki/Academic_publishing#Publishers_and_business_aspects

Jun Feng <junfeng989@gmail.com> wrote:

Papers must be clearly presented in English, must not exceed 14 pages (or
up to 20 pages with the pages over length charge) in Springer LNCS format (
https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines),