Educational CyberPlayGround: NetHappenings News Letter 11-7-19

EDUCATIONAL CYBERPLAYGROUND
Reference Directory of K-12 public, private, and charter schools in all 50 states. Find Teaching Resources for Teachers, Music, Literacy, Internet, Technology, Arts and Linguistics for students, teachers, parents, and policy makers.

K12PlayGround.com
IT IS ALL ABOUT THE PROCESS
working together, problem solving, team building, imagination, creativity and failure, which carries into art, math, writing, science, reading, social studies, and all other parts of the curricula. Help students gain enduring skills and knowledge for current and future challenges.

NEWS

Credibility, not information, is the real currency!
Newspapers are still considered by most as credible. American Newspapers still decide what is a real story by covering it, which is makes it important and real.
“On the Internet, nobody knows you’re a dog.” is an adage and meme about Internet anonymity which began as a cartoon caption written by Peter Steiner and published by The New Yorker on July 5, 1993.
The Internet democratized access to the production and dissemination of information and simultaneously destroyed the economics of high-quality journalism while leaving in place the culture and custom of credibility and truth.

Boeing’s poor information security posture threatens passenger safety, national security, researcher says
Boeing test development networks are publicly exposed to the internet, Kubecka said, and at least one of Boeing’s email servers is infected with multiple strains of malware. Kubecka believes that the infected email servers are being used to exfiltrate sensitive intellectual property including code used in both civilian passenger aircraft as well as aircraft Boeing sells to the US military.
Kubecka, a well-respected security researcher, critical infrastructure expert, and Air Force veteran, tells CSO she has struggled to report what she calls blatant, easily fixable security issues for more than six months. She also alleges that Boeing, through back channels at DEF CON, threatened her with legal action and a public relations smear campaign to prevent her from going public. Kubecka declined to identify who made the threats, when and where they were made, or how they might be associated with Boeing.
“If I saw a broken door on an aircraft, I would not get in trouble for reporting to the FAA that the plane flew,” Kubecka tells CSO. “But as a security researcher, it’s legally fraught to report security vulnerabilities.”
https://www.csoonline.com/article/3451585/boeings-poor-information-security-posture-threatens-passenger-safety-national-security-researcher-s.html

Former Twitter employees charged with spying for Saudi Arabia by digging into the accounts of kingdom critics.  The arrest of one of the former Twitter employees, Ahmad Abouammo, a U.S. citizen who is alleged to have spied on the accounts of three users — including one whose posts discussed the inner workings of the Saudi leadership — on behalf of the government in Riyadh.
The Justice Department has charged two former Twitter employees with spying for Saudi Arabia by accessing the company’s information on dissidents who use the platform, marking the first time federal prosecutors have publicly accused the kingdom of running agents in the United States. One of those implicated in the scheme, according to court papers, is an associate of Saudi Crown Prince Mohammad bin Salman, who the CIA has concluded likely ordered the assassination of journalist Jamal Khashoggi in Istanbul last year.

In Trump’s Twitter Feed: Conspiracy-Mongers, Racists and Spies
“…The New York Times examined Mr. Trump’s interactions with Twitter since he took office, reviewing each of his more than 11,000 tweets and the hundreds of accounts he has retweeted, tracking the ways he is exposed to information and replicating what he is likely to see on the platform. The result, including new data analysis and previously unreported details, offers the most comprehensive view yet of a virtual world in which the president spends significant time mingling with extremists, impostors and spies.
https://www.nytimes.com/interactive/2019/11/02/us/politics/trump-twitter-disinformation.html

Dark Web: 8chan returns with new name 8kun
8kun  warning says ‘Any content that violates the laws of the United States of America will be deleted and the poster will be banned.’” Launched in 2013 by Fredrick Brennan as an alternative to 4chan, 8chan had been linked to harassment campaigns, racism, misogyny, neo-Nazism, pedophilia and mass shootings. It was also a hub for believers of far-right conspiracy theory QAnon, which claims that a secret cabal of “Satan-worshiping pedophiles” rules the world and that only Donald Trump can stop them.
https://mashable.com/article/8chan-8kun-rebrand-return

https://www.vice.com/en_us/article/a359dz/8chan-is-back-with-a-new-name-and-qanon-is-already-posting

Putin’s Top Spy: We’re Teaming Up With D.C. on Cybersecurity
By Amy Knight The Daily Beast 11.04.19
Behind-the-scenes cooperation with U.S. agencies, particularly on cybercrime and terrorism, is a theme the Kremlin likes to push onto center stage. Trump likes it, too.
https://www.thedailybeast.com/putins-top-spy-russian-fsb-chief-alexander-bortnikov-were-teaming-up-with-dc-on-cybersecurity

The Pentagon is under assault every hour of the day
Microsoft’s $10 billion contract win over cloud rival Amazon for the ultra-lucrative military contact means that an intelligence-gathering apparatus among the most important in the world is based in the woods outside Seattle. These kinds of national security responsibilities once sat almost exclusively in Washington, DC. Now in this corner of Washington state, dozens of engineers and intelligence analysts are dedicated to watching and stopping the government-sponsored hackers proliferating around the world.
https://www.technologyreview.com/s/614646/inside-the-microsoft-team-tracking-the-worlds-most-dangerous-hackers/

Following a recent conference of foreign security and law enforcement agencies, the head of Russia’s State Security Service, the FSB, made the surprising announcement that Russia and the United States have resumed cooperation on cybersecurity.
“We are maintaining working contacts by our experts and special unit heads with the Central Intelligence Agency, the Federal Bureau of Investigation and the Drug Enforcement Agency,” said Gen. Alexander Bortnikov, noting that such contacts should always occur, regardless of the foreign policy situation.
Behind-the-scenes cooperation with the Trump administration, particularly when it comes to cybercrime and terrorism, is a theme the Kremlin likes to push onto center stage every so often. And according to our sources there is indeed some consultation at a practical level, but for Washington’s intelligence professionals it’s a very delicate, very dangerous game, complicated enormously by the inclinations and prejudices of President Donald J. Trump.
In response to queries about Bortnikov’s statement, spokespersons for both the CIA and the DEA told The Daily Beast that they had no comment, and the FBI has not responded at all. […]

Cyber memo warns of new risks to White House network

An internal memo on cybersecurity, obtained by Axios, warns that “the White House is posturing itself to be electronically compromised once again.”
The state of play: That’s after at least a dozen top- or high-level officials have resigned or been pushed out of a cybersecurity mission that was established under Barack Obama to protect the White House from Russian hacking and other threats, according to conversations with several current and former officials.

KGB Manuals Notes on Exposure of the Enemy’s Set-Ups
Top Secret: Exposure of the Enemy’s Set-ups [Dangles] in the Process of Development of Persons of Interest to Intelligence 1971
http://www.interpretermag.com/notes-on-exposure-of-the-enemys-set-ups/

Facebook will allow UK election candidates to run false ads. “A controversial policy allowing politicians to run false ads on Facebook will extend to the United Kingdom as the country prepares to vote in a historic December election, Facebook confirmed to CNN Business.”
https://www.cnn.com/2019/11/01/tech/facebook-false-ads-uk/index.html

Why Facebook Should Sit Out The 2020 Election.
American democracy is in deep trouble, social media companies have violated our trust too many times to count and, at least in the US, there’s no way to regulate digital election ads — or to even ask the Federal Elections Commission, which has been effectively shut down under Republican control, to offer guidance. Without oversight, there’s no civically responsible way to allow digital ad buys. From my experience as a political strategist for Democratic candidates and advocacy groups, I believe Facebook should adopt the same policy.
https://www.buzzfeednews.com/article/melissaryan1/facebook-political-ads-2020-election-dorsey-zuckerberg

The US government is looking into the popular social media app TikTok for possible security risks. TikTok, which is owned by Chinese company ByteDance, has become incredibly popular with teenagers in the US and around the world for its short-form videos.
https://www.cnet.com/news/us-launches-a-national-security-review-of-tiktok-report/#ftag=CAD590a51e

Why worry about the KGB when ISPs do a fantastic job lying to Congress
ISPs lied to Congress to spread confusion about encrypted DNS, Mozilla says. “Mozilla is urging Congress to reject the broadband industry’s lobbying campaign against encrypted DNS in Firefox and Chrome. The Internet providers’ fight against this privacy feature raises questions about how they use broadband customers’ Web-browsing data, Mozilla wrote in a letter sent [yesterday] to the chairs and ranking members of three House of Representatives committees.”
https://arstechnica.com/tech-policy/2019/11/isps-lied-to-congress-to-spread-confusion-about-encrypted-dns-mozilla-says/

0-Day Alert! #Google is warning Windows, Mac, #Linux users to update their #Chrome browser (to 78.0.3904.87) immediately due to a security vulnerability.

#Google is trying to kill web URLs and this has nothing to do with security
a chrome extension tries to restore the URLs to searches
https://chrome.google.com/webstore/detail/remove-breadcrumbs/banhponphmmpnpogmfaahcgkgbgkcoka?hl=en

PRIVACY

NordVPN users’ passwords exposed in mass credential-stuffing attacks
https://arstechnica.com/information-technology/2019/11/nordvpn-users-passwords-exposed-in-mass-credential-stuffing-attacks/

BRAVE Browser
Chrome, Firefox, DuckDuckGo, and Opera’s “private” browsing mode is not truly private. Brave was created with a built-in ad-blocker to give you the fastest internet browsing experience, while providing the deepest level of privacy and security protection. Brave also lets you control who profits from your data with blockchain-based tokens. Faster, Safer, Ad-Free Browsing.

 

This Is How the U.S. Military’s Massive Facial Recognition System Works
The presentation also sheds light on how military, state, and local law enforcement biometrics systems are linked. According to Krizay’s presentation, ABIS is connected to the FBI’s biometric database, which is in turn connected to databases used by state and local law enforcement. Ultimately, that means that the U.S. military can readily search against biometric data of U.S. citizens and cataloged non-citizens. The DFBA is also currently working to connect its data to the Department of Homeland Security’s biometric database. The network will ultimately amount to a global surveillance system. In his notes, Krizay outlines a potential scenario in which data from a suspect in Detroit would be run against data collected from “some mountaintop in Asia.”
The documents, which are embedded in full below, were obtained through a Freedom of Information Act request. These documents were presented earlier this year at a closed-door defense biometrics conference known as the Identity Management Symposium…
https://onezero.medium.com/exclusive-this-is-how-the-u-s-militarys-massive-facial-recognition-system-works-bb764291b96d

“After more than half a year of work, check out our latest paper Light Commands: Laser-Based Audio Injection on Voice-Controllable Systems.
https://twitter.com/sara_rampazzi/status/1191415126630354944

GDPR matchup: The California Consumer Privacy Act 2018
https://iapp.org/news/a/gdpr-matchup-california-consumer-privacy-act/

Road to Adequacy: Can California Apply Under the GDPR?
https://www.lawfareblog.com/road-adequacy-can-california-apply-under-gdpr

FTC Brings First Case Against Developers of “Stalking” Apps
https://www.ftc.gov/news-events/press-releases/2019/10/ftc-brings-first-case-against-developers-stalking-apps

Instagram is shutting down a creepy app that lets you stalk loved ones. A new app is looking to revive one of the creepiest Instagram features and encouraging people to spy on their significant others through social media. Critics said the apps offerings make it resemble stalkerware.
https://www.cnet.com/news/instagram-is-shutting-down-a-creepy-app-that-lets-you-stalk-loved-ones/

Amazon, Apple, And Google Are Distributing Products From Companies Building China’s Surveillance State
https://www.buzzfeednews.com/article/rosalindadams/apple-amazon-google-apps-blacklist-china-xinjiang

WHERE ARE THE ETHICS AT THESE COMPANIES????

The Smart Girl’s Guide to Privacy: Practical Tips for Staying Safe Online: Violet Blue: 9781593276485: Amazon.com: Books

Chapter 2 https://nostarch.com/download/Smart%20Girls%20Guide%20to%20Privacy_Chapter2.pdf

Former Trend Micro employee enabled scam calls by stealing customers’ personal data
https://www.cyberscoop.com/trend-micro-customer-data-stolen-scam/

Spanish companies’ networks shut down as result of ransomware
https://arstechnica.com/information-technology/2019/11/spanish-companies-networks-shut-down-as-result-of-ransomware/

Paradise Ransomware Decryptor Gets Your Files Back for Free
Emsisoft has released a decryptor for the Paradise Ransomware that allows victims going back as far as 2017 to decrypt their files without paying a ransom.
https://www.bleepingcomputer.com/news/security/paradise-ransomware-decryptor-gets-your-files-back-for-free/

Once you have an encrypted and unencrypted file pair, download Emsisoft’s Paradise Ransomware decryptor and execute it.
https://www.emsisoft.com/ransomware-decryption-tools/paradise

HEALTH

Healthcare data breaches will cost industry $4 billion by year’s end, and 2020 is poised to be worse
https://www.healthcarefinancenews.com/news/healthcare-data-breaches-will-cost-industry-4-billion-years-end-and-2020-poised-be-worse

‘Volume Control’ Author David Owen Says Ambient Noise Threatens Our Hearing
https://www.npr.org/sections/health-shots/2019/11/05/776242285/from-lawn-mowers-to-rock-concerts-our-deafening-world-is-hurting-our-ears

BANKSTERS

ETHICS BE DAMNED

2/25/19 Commerce Secretary Ross Flouts Government Ethics Rules.

Fake Billionaire Wilbur Ross Ignores the Law and Lies About His Stock Holdings

Kremlin connections to investments in Facebook and Twitter are the results of a capitalist “free market” fetish.

Paradise Papers reveal Companies controlled by the Russian government quietly invested in several major Silicon Valley startups, including Facebook.

11/5/17 Paradise Papers reveals a vast financial network—beyond the reach of most governments—maintained by the world’s wealthiest people. They include commerce secretary Wilbur Ross, Queen Elizabeth of the UK, and a close advisor to Canadian prime minister Justin Trudeau. Here’s a guide to the major revelations in the Paradise Papers
https://qz.com/1120731/paradise-papers-a-guide-to-the-major-revelations/

Wilbur Ross’s business ties to Putin’s inner circle
US commerce secretary Wilbur Ross maintains a stake in a shipping company that is closely linked to the family of Russian president Vladimir Putin. According to the Paradise Papers, Ross owns between $2 million and $10 million in shipping company Navigator. The second-biggest client of Navigator is Russian gas company Sibur. Kirill Shamalov, who is Putin’s son-in-law, has been deputy chairman of Sibur’s board and until April owned more than a fifth of the company. (He has since reduced his ownership share.) @SecretaryRoss conceals business dealings with Vladimir Putin’s son-in-law. 

“The Paradise Papers showed Ross failed to disclose financial interest in Navigator Gas, a shipping company that transports petrochemicals for Russian gas and petrochemicals company Sibur. Sibur is subject to sanctions for its close ties to Putin’s son-in-law Kirill Shamalov.” https://qz.com/1120731/paradise-papers-a-guide-to-the-major-revelations/

Ross shorted Russian-linked shipping company ahead of Paradise Papers
https://www.icij.org/investigations/paradise-papers/ross-shorted-russian-linked-shipping-company-ahead-paradise-papers/

also …. Former Co-Chair of (Russian Laundromat) Bank of Cyprus
REMINDER- Paul Manafort & Rick Gates allegedly laundered money through bank accounts in Cyprus. @SecretaryRoss & @DeutscheBank former chairman Josef Ackermann served on the board of Bank of Cyprus.

Donald Trump’s commerce secretary, Wilbur Ross, is doing business with Vladimir Putin’s son-in-law through a shipping venture in Russia.

Leaked documents and public filings show Ross holds a stake in a shipping company, Navigator, through a chain of offshore investments. Navigator operates a lucrative partnership with Sibur, a Russian gas company part-owned by Kirill Shamalov, the husband of Putin’s daughter Katerina Tikhonova.
https://www.theguardian.com/news/2017/nov/05/trump-commerce-secretary-wilbur-ross-business-links-putin-family-paradise-papers

2017

WALL STREET

Wall Street’s Liquidity Crisis: It’s Not Getting Better
https://wallstreetonparade.com/2019/11/wall-streets-liquidity-crisis-its-not-getting-better/
By Pam Martens and Russ Martens: November 7, 2019 ~
Deutsche Bank Headquarters in Frankfurt, Germany
This morning, Wall Street’s money spigot arm of the Federal Reserve, the New York Fed, paid out $35 billion in 14-day term loans to Wall Street’s trading houses. The problem was, this morning the banks wanted $41.15 billion or $6.15 billion or $6.15 billion more than the Fed was offering. That’s a very clear sign that liquidity remains tight on Wall Street and we have yet to enter the pivotal year-end period when banks try to dress up their books by dumping or parking their most toxic positions. Between the term loan and the overnight loan, the New York Fed paid out $115 billion this morning to unnamed securities firms on Wall Street. (The Fed won’t say who is doing all of this borrowing and Congress can’t summon the willpower to hold a hearing.) 
https://wallstreetonparade.com/2019/11/wall-streets-liquidity-crisis-its-not-getting-better/

Dangerous Liaisons: New York Fed and JPMorgan’s Incestuous Relationship By Pam Martens and Russ Martens
The Federal Reserve Bank of New York (New York Fed) is just one of the 12 regional Federal Reserve banks around the country. But it has amassed enormous powers for itself since the Federal Reserve was created in 1913. Three of those powers dwarf all others: the ability to create money electronically at the push of a button; the accepted right to meddle in the markets; and the supervision of some of the largest bank holding companies in America.
After Wall Street blew itself up under the indulging and incompetent supervision of the New York Fed in 2008 and it was exposed that the Fed had secretly created $29 trillion in electronic money to bail out zombie banks – most of that funneled out by the New York Fed – most rational folks would have assumed that Congress would have stripped it of supervisory and money-printing powers for bailouts. Insanely, that did not happen and here we are today with the same deeply-conflicted New York Fed creating its own money to dole out $690 billion a week in super-cheap loans to unnamed securities firms while buying up $60 billion a month in the debt of the United States. (The Fed doesn’t want you to call the $60 billion a month QE4 because that would strongly suggest that this is just Stage II of the continuing 2008 bailout of Wall Street and that QE-Infinity is coming.)
https://wallstreetonparade.com/2019/11/dangerous-liaisons-new-york-fed-and-jpmorgans-incestuous-relationship/

 

LOOKING FORWARD TO THANKSGIVING EVERYONE!

Inland Northwest’s thriving turkey population is an invasive nuisance or a conservation success – or both

Thanksgiving Turkey Recipe from the First Nation American Indians and every state.
The 1621 feast between the Pilgrims and the Indians was not the first official Thanksgiving.

POTLATCH – The Tradition of Giving / Sharing a Meal

Roasted Pumpkin Soup with Fresh Tarragon and the best Brined Turkey

                   .--.
    {\             / q {\
    { `\           \ (-(~`
   { '.{`\          \ \ )
   {'-{ ' \  '-. \ \
   {._{'.' \/       '.) \
   {_.{.   {`            |
   {._{ ' {   ;'-=-.     |
    {-.{.' {  ';-=-.`    /
     {._.{.;    '-=-   .'
      {_.-' `'.__  _,-'
            |||`
              .='==,

May First Movement Technology

May First is a Coop

Mission Statement

MFPL engages in building movements by advancing the strategic use and collective control of technology for local struggles, global transformation, and emancipation without borders.

About May First Movement Technology
https://mayfirst.coop/en/

May First Movement Technology is a non-profit membership organization that engages in building movements by advancing the strategic use and collective control of technology for local struggles, global transformation, and emancipation without borders.

We are the largest membership technology organization in the movements for fundamental change in the United States and Mexico, bringing together over 2300 activists in about 850 memberships. We share our technology (as a collaborative, non-profit service provider) and participate in (and often lead) many networks and coalitions working on various issues like net neutrality, data protection, privacy, access and alternative connection systems. We have been in existence for 15 years.  email info@mayfirst.org.

Who we are : Leadership

May First Movement Technology is a democratic cooperative. Based on our bylaws, the members elect 16 – 20 people to the board and the workers select five.
Representatives from Mexico are allocated based on the total percentage of their membership (approximately 20% or five members).
The following board was elected in October 2019.

Find our more about the board and Micky Metts hacker, activist and organizer elected 2019.

PLATFORM COOPERATIVISM EXPLAINED: “Platform Cooperativism: The Internet, Ownership, Democracy”

NetHappenings: Privacy, Data, Your Rights

Want to mess with the surveillance state?
A new clothing line confuses automated license plate readers
https://www.technologyreview.com/f/614175/a-new-clothing-line-confuses-automated-license-plate-readers/

Join the Congressional Innovation Fellowship
TechCongress places computer scientists, engineers, and other technologists to serve as technology policy advisors to to Members of Congress through our one-year Congressional Innovation Fellowship. We bridge the divide of knowledge and experience between DC and Silicon Valley for better outcomes for both.

EU votes to create gigantic biometrics database
https://www.zdnet.com/article/eu-votes-to-create-gigantic-biometrics-database/

What Are Psychographics?
https://huffpost.com/us/entry/us_594be378e4b07cdb1933c05b

The vocabulary of BS. Where Wall Street is capitalism unvarnished, Silicon Valley is capitalism euphemized.
https://www.theguardian.com/us-news/2019/jun/26/how-to-speak-silicon-valley-decoding-tech-bros-from-microdosing-to-privacy

Hackers are stealing years of call records from hacked cell networks
https://techcrunch.com/2019/06/24/hackers-cell-networks-call-records-theft/

Cellphone location data from T-Mobile, AT&T and Sprint was sold to bail bondsmen
https://www.fiercewireless.com/wireless/cell-phone-location-data-from-t-mobile-at-t-and-sprint-was-sold-to-bail-bondsmen

Verizon, AT&T, T-Mobile and Sprint suspend selling of customer location data after prison officials were caught misusing it
https://www.washingtonpost.com/news/the-switch/wp/2018/06/19/verizon-will-suspend-sales-of-customer-location-data-after-a-prison-phone-company-was-caught-misusing-it/

How a trivial cell phone hack is ruining lives
https://www.engadget.com/2019/06/28/cell-phone-hack-is-ruining-lives-identity-theft/

Former Equifax executive sentenced to prison for insider trading prior to data breach
https://www.theverge.com/2019/6/29/20056655/jun-ying-equifax-breach-jail-time-insider-trading-department-of-justice

Huawei Technicians Helped African Governments Spy on Political Opponents
Employees embedded with cybersecurity forces in Uganda and Zambia intercepted encrypted communications and used cell data to track opponents, according to a Wall Street Journal investigation
https://www.wsj.com/articles/huawei-technicians-helped-african-governments-spy-on-political-opponents-11565793017

Threat Groups Cards A THREAT ACTOR ENCYCLOPEDIA
https://www.dropbox.com/s/ds0ra0c8odwsv3m/Threat%20Group%20Cards.pdf

reCAPTCHA Usage Statistics
https://trends.builtwith.com/widgets/reCAPTCHA

Disrupting at the highest levels, its #CyberWar4Ever!
https://cybersquirrel1.com/

  • Privacy should not be not a one-off exercise by the legal division whenever a new law comes out. It needs to be a company-wide program with ongoing policies and clear accountability for each division.
  • If the service is free you are in fact the product being sold.
  • Not collecting the data in the first place is easier than protecting it.
  • Privacy: Once described by Supreme Court Justice Louis Brandeis as, “the right to be left alone,” privacy is now best described as the ability to control data we cannot stop generating, giving rise to inferences we can’t predict.
  • Dont reuse passwords. Ever.
  • One way to ensure your personal data remains private is never to give it*. Today, under #dataprivacy laws you can refuse to give that information.
  • Don’t use production data in pre-production environments.
  • Do not use Facebook, or WeChat
  • In addition to strong, unique passwords, use unique account usernames and sign-up email addresses.
  • Don’t reuse profile photos.
  • 99.98% of Americans would be correctly re-identified in any dataset using 15 demographic attributes.

The Illusion of Choice – Spread Awareness

Exclusive: For yrs ES&S, top voting machine maker in US, has been saying its vote tabulators and election-management systems are not connected to the internet. That appears not to be true. Researchers say they found what appear to be 35 online.
https://www.vice.com/en_us/article/3kxzk9/exclusive-critical-us-election-systems-have-been-left-exposed-online-despite-official-denials

A Researcher Found a Bunch of Voting Machine Passwords Online
https://www.motherjones.com/politics/2019/06/a-researcher-found-a-bunch-of-north-carolina-voting-machine-passwords-online/

 

 

 

#Privacy, #Facebook Coin, Uber, PayPal, Visa to Back Facebook’s GlobalCoin Cryptocurrency

#Privacy, #Facebook Coin, Uber, PayPal, Visa to Back #Facebook’s GlobalCoin Cryptocurrency

Starting with Facebook can’t get into China and 2015 Facebook Announces a Payments Feature for Its Messenger App

2019 #WeChat has become the centerpiece of digital life in China

where people use it to order movie tickets, subway passes, food delivery and rides. If Facebook succeeds in turning its own messaging services into a platform for everything, it could ultimately threaten established services such as Snapchat, Yelp, Venmo, eBay and even Apple and Amazon.

IN CHINA THERE IS NO PRIVACY!

IN AMERICA THERE IS NONE! THANKS TO THE DEMOCRAT$ AND THE REPUBLICAN$

  1. Cambridge Analytica and Facebook: The Scandal and the Fallout So Far Revelations that digital consultants to the Trump campaign misused the data of millions of Facebook users set off a furor on both sides of the Atlantic. https://www.businessinsider.com/cambridge-analytica-trump-firm-facebook-data-50-million-users-2018-3/
  2. Are you ready? Here is all the #data Facebook and Google have on you
    https://www.theguardian.com/commentisfree/2018/mar/28/all-the-data-facebook-google-has-on-you-privacy
  3. #Trump linked firm Cambridge Analytica collected personal information from 50 million Facebook users without permission https://www.businessinsider.com/cambridge-analytica-trump-firm-facebook-data-50-million-users-2018-3/
  4. Comparing #Obama Cambridge Analytica https://www.politifact.com/truth-o-meter/statements/2018/mar/22/meghan-mccain/comparing-facebook-data-use-obama-cambridge-analyt/

Facebook can’t get into China and wants to be WhatsApp China’s top app.

#Tencent-owned WeChat is China’s most popular messaging app and has a mobile payments feature known as #WeChat Pay. #Facebook Coin, which would be pegged to the U.S. dollar and allow users to transfer money through Facebook-owned messaging application WhatsApp, according to Bloomberg.

Facebook wants to be America’s version of China’s WeChat

and started developing its own digital currency to make it easier for users to send money to their messaging contacts. Facebook didn’t offer many details on its digital currency endeavors but said a “new small team” was looking for ways to make use of the type of technology powering bitcoins and other cryptocurrencies.

Facebook has reportedly lined up Uber, PayPal, Visa and others to invest $10 million each in the consortium governing its secretive crypto project.
https://www.coindesk.com/report-uber-paypal-visa-to-back-facebooks-globalcoin-cryptocurrency

Tencent, is more than just a messaging app. It’s what some analysts dub a “super-app” because it offers everything from mobile payments to the ability to book flights and even play games — all without leaving the app. ‘WeChat of the West’
https://www.cnbc.com/2019/03/13/facebook-wants-to-copy-wechat-pay-with-facebook-coin-payments.html

The reason why FB wants these partners. To turn every single account holder into a new banking account. Personal and business at the same time. Very centralized indeed. Multiple privacy concerns and contracts. Personal data is at risk.
Facts: 1. Facebook is issuing its own ‘cryptocurrency’
2. Evan Cheng is Facebooks’s Director of Blockchain engineering

One of Facebook’s most senior engineers just became Director of Engineering, Blockchain


3. Evan Cheng is advisor of #chainlink
4. Facebook will need an oracle for the purpose they’re looking for.

Facebook Gave Data Access to Chinese Firm Flagged by U.S. Intelligence

“https://www.nytimes.com/interactive/2018/06/03/technology/facebook-device-partners-users-friends-data.html

Sarah Jamie Lewis ‏@SarahJamieLewis
Can’t wait for a cryptocurrency with the ethics of Uber, the censorship resistance of Paypal, and the centralization of Visa, all tied together under the proven privacy of Facebook. I’ve always said the thing that cryptocurrency was missing was consortiums of corporations fully invested in the existing financial sector. Who, seriously, looked around the room and said, “shit, we really need to invite PayPal”
Do you trust 2/3 of paypal, visa, uber and facebook <insert other corps here> not to collude to publish contradictory checkpoints? What does byzantine consensus even mean in that scenario? “Facebook won’t control the coin” it will just develop the coin and then assemble the initial members of the consortium after which point the power will be distributed to the consortium members, that Facebook picked, and who are all large corporations.

See, decentralized. “Facebook won’t directly control the coin, nor will the individual members of the consortium — known as the Libra Association. Some of the members could serve as “nodes” along the system that verify transactions and maintain records of them, creating a brand-new payments network, according to people familiar with the setup.”
In the future, Paypal will verify your transaction behind the scenes as you pay for your Uber seamlessly using your phone, just top up your Facebook Libre account with Visa or Mastercard. So much innovation.

Roxana Nasoi @roxanasoi

Ever wondered how PayPal shares your Data? And to who?
Let’s go with the major funnels:
1. PayPal shares your data with Auditors. Internal and external, due to its nature.
2. PayPal shares your data with Customer Services. In the process of handling claims, customer services need access to your account history – so basically they need your historical data information. In case of disputes, they can access the last 30 to 90 days. Maybe even more?
3. PayPal shares your data with Fraud agencies and AML services. You will discover that after $1k to $2k, you need to KYC in order to continue using your account. If you use PayPal for business purposes, but your account is a personal one, you can end up with funds frozen.
4. Next is Financial Products. All those business and personal finance tools you see inside your PayPal dashboard can’t be used without your financial data. To add more, new products are created based on user data patterns. Unknown the extent of external financial products.
5. Don’t forget about your data being shared with Commercial Partnerships. Don’t worry, banks do the same. Apps do the same. Nothing new here.
6. PayPal uses your data for Marketing and PR. Need another example? Try Facebook, Google (Gmail) etc. Data sells, and we can’t really talk about performance and customer experience without backing claims with data reports.
7. PayPal (along with 95% of systems) shares your data with Operational Services.
8. Group Enterprises also have access to your data. Blame it on group dynamics if you want to or on contracts you’ll never have a say in.
9. Commercial Partners (to no surprise) can access your data, as well through a service called PayPal for Partners (Merchants use it).
10. Legal. From disputes to payment protection to lawsuits, to internal or partner legal firms – yes, they can access the data. Or have access to it in some form.
11. Other services and agencies. At some point they argued that government agencies cannot claim access to a user’s data. However, this is an overstatement. Under the premise of fraud, Gov agencies can and will get access. Based on historical examples, we know it’s possible.
This is probably the main reason why we do need crypto. A coded architecture that makes it incorruptible.
“Code is Law”.
Bitcoin has managed to provide a clear first example of incorruptibility, where growth and maturity of one system does not change the core.

Educational CyberPlayGround, Inc. NetHappenings and K12Newsletters 6.2.19

Educational CyberPlayGround, Inc. NetHappenings and K12Newsletters 6.2.19

SCIENCE  – STEM

  • Find a School – Discover the right school for your child.

  • The history of sign language

  • The contemporary Icelandic belief in elves explained

  • Anatomy of a Perfect Album: On Joni Mitchell’s Blue

  • Joel Bernstein lifetime achievement award for photography

  • Virality Is Dead

  • David Epstein on the Genius of the Self-Taught Musician

  • Personas of a Rock ‘N’ Roll Icon

  • 737 MAX Disaster fatal consequences

  • US Customs Facial Recognition Photos Data Breach

  • Why airport face scans are a privacy trap

  • GPS Degraded Across Much of US

  • Online Spreadsheet Discloses Museum Workers’ Salaries

Find a School – Discover the right school for your child.
Find and compare K12 Schools and School Districts in the USA and Territories.  https://k12playground.com/

ARTS – STEAM

The history of sign language
https://www.nationalgeographic.com/archaeology-and-history/magazine/2019/05-06/creation-of-sign-language/

Anatomy of a Perfect Album: On Joni Mitchell’s Blue
“ONLY A PHASE, THESE DARK CAFÉ DAYS.”
https://lithub.com/anatomy-of-a-perfect-album-on-joni-mitchells-blue/
Mitchell starts the record right off with wanderlust, her first words: I am on a lonely road and I am traveling, traveling, traveling, traveling, amplifying the feeling later: I am on a lonely road and I am traveling / Looking for the key to set me free. By boat, plane, foot, and ice skate, her whims and fancies take her to a Greek island, Paris (she doesn’t like it there), Spain, Las Vegas, maybe Amsterdam and Rome, and return home to her Ithaca, which is California. You hear Mitchell’s original Canadian-ness when she lands on the word “sorrow” as “soe-row” on “Little Green,” a poignant 1967 song, revived for this recording, from the perspective of a young single mother, also in the reverent way she intones the Canadian national anthem, “O Canada,” in the middle of “A Case of You.”

Friend  JOEL BERNSTEIN Musician / Photographer / Writer / Archivist  Compilation of Photographs – all the album covers you know
2018 IPHF FEATURES PROFILE ON JOEL FOR HIS LIFETIME ACHIEVEMENT AWARD [ friend during junior high / high school times ]
https://www.edu-cyberpg.com/Ringleaders/joel.html

Images of rock legends from Laurel Canyon
https://www.youtube.com/watch?v=n6OXzsUQWpg

Virality Is Dead
I’m an independent concert promoter going on 40 years now. My clients are now only a few, and I work them nationwide. Without question, Facebook “boosted posts” are quietly putting radio and print out of business in terms of how to get the word out on a cost-effective basis. And you don’t really need virality anymore in order to promote an artist or event.
I’m not talking Facebook “ads,” but “boosted posts.” Users see these posts from the artist’s page in their newsfeeds and can share them organically, unlike “ads,” which cannot be shared. I used to spend thousands of dollars breaking a show with print ads and radio. I won’t mention the act or the market, but recently I spent $1000 on a print ad in a major metropolitan market and… in a literal example of the old saying… “Did 10 tickets.” That’s right. I sold exactly 10 tickets, not even covering the cost of the ad. I spent a fraction of that amount on boosted Facebook posts and did 500 tickets. And you wonder how the Russians spent only $100k on Facebook and turned an entire election in 2016? ~ Brian Martin”
https://www.sfgate.com/news/article/Investors-say-promoter-owes-them-2-million-3242597.php

David Epstein on the Genius of the Self-Taught Musician
https://lithub.com/david-epstein-on-the-genius-of-the-self-taught-musician/

What David Bowie Borrowed From William Burroughs On the Shifting Personas of a Rock ‘N’ Roll Icon
https://lithub.com/what-david-bowie-borrowed-from-william-burroughs/

Online Spreadsheet Discloses Museum Workers’ Salaries
http://www.artnews.com/2019/05/31/google-spreadsheet-museum-workers-disclose-salaries/
In another sign of increasing demand for transparency at art institutions across the world, museum workers have begun making public their salary rates via a Google Spreadsheet document that began circulating on Friday morning. Titled Art/Museum Salary Transparency 2019, the document allows users to add information about the terms of their employment and their rates of pay at some of the biggest museums in the world.

Folklore: The contemporary Icelandic belief in elves explained
http://www.bbc.com/travel/story/20181217-the-elusive-hidden-people-of-iceland

Overview of the ArtPlace/DAISA initiative (download a copy of the report) here: https://www.artplaceamerica.org/agriculture-food
The report argues that “integrating artistic and cultural practices with food and agriculture enables a creative and inclusive process and ensures community members see their identities, histories, and interests reflected in the work.” ~ Clifford Murphy – Folk & Traditional Arts Director | Multidisciplinary Arts National Endowment for the Arts

SCIENCE  – STEM

Don’t smile for surveillance: Why airport face scans are a privacy trap
https://www.washingtonpost.com/technology/2019/06/10/your-face-is-now-your-boarding-pass-thats-problem/

How Boeing’s Bean-Counters Courted the 737 MAX Disaster Just when the smallest jet should have been replaced with a new model, the company fell into tight-fisted hands—with fatal consequences. https://www.thedailybeast.com/how-boeing-bean-counters-courted-the-737-max-disaster

US Customs And Border Protection’s Database Of Traveler Facial Recognition Photos Was Stolen In A Data Breach
“CBP learned that a subcontractor … transferred copies of license plate images and traveler images collected by CBP to the subcontractor’s company network. The subcontractor’s network was subsequently compromised by a malicious cyber-attack.” https://www.buzzfeednews.com/article/daveyalba/the-us-governments-database-of-traveler-photos-has-been

GPS Degraded Across Much of US
Blog Editor’s Note: Even as a Presidential Advisory Board was discussing GPS as “the Gold Standard” for satellite-based navigation last week, the system may have been operating in a degraded mode.
On Sunday the Federal Aviation Administration held a teleconference to discuss the issue that seems to have persisted for several days.  While not “failing,” GPS signal quality seems to have degraded and this is impacting some equipment and services. Specifically, the aviation safety Automatic Dependent Surveillance Broadcast system has been impacted across much of the United States. FAA has posted the following map depicting the areas impacted:
These problems have delayed and cancelled flights, possibly by the thousands. The FAA seems to have addressed some of this problem by issuing waivers for some aircraft to fly without operable ADS-B safety systems, as long as they stay on pre-planned routes and below 28,000 ft altitude.
Speculation on some on-line forums point to specific manufactures’ equipment and aircraft that are primarily effected. Previous degradation in GPS signal quality, such as the SVN-23 caused problem in January 2016, have shown that equipment from different vendors react differently to the problem. Some are unaffected, some go offline, and some just perform poorly.
The January 2016 SVN-23 degradation caused much of the nation’s ADS-B system to be unavailable for much of the day. Other receivers and systems were impacted also. Cellular networks, first responder systems, digital broadcast, and numerous other systems were impacted.
Watchstanders at the US Coast Guard Navigation Center seemed unaware of the problem early Monday morning, but promised to investigate and respond.
https://rntfnd.org/2019/06/10/gps-degraded-across-much-of-us-ads-b-impacted/

 

Facebook Responds to Global Coalition’s Demand That Users Get a Say in Content Removal Decisions

This Business Insider article was originally published May 13, 2010

Facebook CEO Mark Zuckerberg and his company are suddenly facing a big new round of scrutiny and criticism about their cavalier attitude toward user privacy. An early instant messenger exchange Mark had with a college friend won’t help put these concerns to rest.

According to SAI sources, the following exchange is between a 19-year-old Mark Zuckerberg and a friend shortly after Mark launched The Facebook in his dorm room:

Zuck: Yeah so if you ever need info about anyone at Harvard
Zuck: Just ask.
Zuck: I have over 4,000 emails, pictures, addresses, SNS
[Redacted Friend’s Name]: What? How’d you manage that one?
Zuck: People just submitted it.
Zuck: I don’t know why.

Zuck: They “trust me”
Zuck: Dumb fucks.

#deletefacebook

#DeleteFacebook your info is breached again and again and again and again and again

https://www.businessinsider.com/well-these-new-zuckerberg-ims-wont-help-facebooks-privacy-problems-2010-5

Mercer, Zuckerberg, Sandberg, Page, Brinn, Dorsey Handmaidens to Authoritarism

Esteemed Reporter Carole Cadwalla takes down piece of shit Mark Zuckerberg at TedTalk

Years of Mark Zuckerberg’s old Facebook posts have vanished. The company says it ‘mistakenly deleted’ them.

Zuckerberg reportedly has a secret escape chute beneath his conference room

#Zuckerberg is a liar and the Congress is paid to Ignore this

A withering verdict: MPs report on Zuckerberg, Russia and Cambridge Analytica

 

EFF and more than 100 civil society organizations across the globe wrote directly to Mark Zuckerberg recently demanding greater transparency and accountability for Facebook content moderation practices. A key step, we told Facebook, is implementation of a robust appeals process giving all users the power to challenge and reverse the platform’s content removal decisions.

https://www.eff.org/deeplinks/2018/12/facebook-responds-global-coalitions-demand-users-get-say-content-removal-decisions

 

A proposed “sovereign internet” law currently working its way through Russia’s government.

Russia wants to cut itself off from the global internet. Here’s what that really means.

The plan is going to be tricky to pull off, both technically and politically, but the Kremlin has set its sights on self-sufficiency.
By Charlotte Jee
Mar 21 2019
<https://www.technologyreview.com/s/613138/russia-wants-to-cut-itself-off-from-the-global-internet-heres-what-that-really-means/>

In the next two weeks, Russia is planning to attempt something no other country has tried before. It’s going to test whether it can disconnect from the rest of the world electronically while keeping the internet running for its citizens. This means it will have to reroute all its data internally, rather than relying on servers abroad.

The test is key to a proposed “sovereign internet” law currently working its way through Russia’s government. It looks likely to be eventually voted through and signed into law by President Vladimir Putin, though it has stalled in parliament for now.

Pulling an iron curtain down over the internet is a simple idea, but don’t be fooled: it’s a fiendishly difficult technical challenge to get right. It is also going to be very expensive. The project’s initial cost has been set at $38 million by Russia’s financial watchdog, but it’s likely to require far more funding than that. One of the authors of the plan has said it’ll be more like $304 million, Bloomberg reports, but even that figure, industry experts say, won’t be enough to get the system up and running, let alone maintain it.

Not only that, but it has already proved deeply unpopular with the general public. An estimated 15,000 people took to the streets in Moscow earlier this month to protest the law, one of the biggest demonstrations in years.

Operation disconnect

So how will Russia actually disconnect itself from the global internet? “It is unclear what the ‘disconnect test’ might entail,” says Andrew Sullivan, president and CEO of the Internet Society. All we know is that if it passes, the new law will require the nation’s internet service providers (ISPs) to use only exchange points inside the country that are approved by Russia’s telecoms regulator, Roskomnadzor.

Operating hours Mon-Thu 8:30-17:30 Fri 8:30-16:15

+7 (495) 987-68-00

These exchange points are where internet service providers connect with each other. It’s where their cabling meets at physical locations to exchange traffic. These locations are overseen by organizations known as internet exchange providers (IXPs). Russia’s largest IXP is in Moscow, connecting cities in Russia’s east but also Riga in neighboring Latvia.

MSK-IX, as this exchange point is known, is one of the world’s largest. It connects over 500 different ISPs and handles over 140 gigabits of throughput during peak hours on weekdays. There are six other internet exchange points in Russia, spanning most of its 11 time zones. Many ISPs also use exchanges that are physically located in neighboring countries or that are owned by foreign companies. These would now be off limits. Once this stage is completed, it would provide Russia with a literal, physical “on/off switch” to decide whether its internet is shielded from the outside world or kept open.

What’s in a name?

As well as rerouting its ISPs, Russia will also have to unplug from the global domain name system (DNS) so traffic cannot be rerouted through any exchange points that are not inside Russia.

The DNS is basically a phone book for the internet: when you type, for example, “google.com” into your browser, your computer uses the DNS to translate this domain name into an IP address, which identifies the correct server on the internet to send the request. If one server won’t respond to a request, another will step in. Traffic behaves rather like water—it will seek any gap it can to flow through.

“The creators of the DNS wanted to create a system able to work even when bits of it stopped working, regardless of whether the decision to break parts of it was deliberate or accidental,” says Brad Karp, a computer scientist at University College London. This in-built resilience in the underlying structure of the internet will make Russia’s plan even harder to carry out.

The actual mechanics of the DNS are operated by a wide variety of organizations, but a majority of the “root servers,” which are its foundational layer, are run by groups in the US. Russia sees this as a strategic weakness and wants to create its own alternative, setting up an entire new network of its own root servers.

“An alternate DNS can be used to create an alternate reality for the majority of Russian internet users,” says Ameet Naik, an expert on internet monitoring for the software company ThousandEyes. “Whoever controls this directory controls the internet.” Thus, if Russia can create its own DNS, it will have at least a semblance of control over the internet within its borders.

This won’t be easy, says Sullivan. It will involve configuring tens of thousands of systems, and it will be difficult, if not impossible, to identify all the different access points citizens use to get online (their laptops, smartphones, iPads, and so on). Some of them will be using servers abroad, such as Google’s Public DNS, which Russia simply won’t be able to replicate—so the connection will fail when a Russian user tries to access them.

[snip]

Could someone really destroy the whole Internet?  YES

The Internet is more than just a technology. It is a domain similar to the domains of land, air, sea and space, but with its own distinct challenges.

WHO CONTROLS THE INTERNET?

The whole internet is controlled by seven actual, physical keys. – The key issue with internet governance is always trust, which is ridiculous.

WHO MANAGES THE INTERNET’S ADDRESS BOOK?
BY VINT CERF Vint Cerf summarizes the transition of ICANN.

THE NET IS A WORLD OF ENDS. The Internet is a “network of networks” of computers. It was born on Oct. 29, 1969, when a UCLA student programmer sent a message from his computer to one at Stanford.

[ECP] NetHappenings 3/18/19

YOUR HEALTH INFORMATION PRIVACY RIGHTS

HIPPA  

Office for Civil Rights Headquarters
U.S. Department of Health & Human Services
200 Independence Avenue, S.W.
Washington, D.C. 20201
Toll Free Call Center: 1-800-368-1019
TTD Number: 1-800-537-7697

HHS Releases Voluntary Cybersecurity Practices for Health Industry

GDPR, California’s Consumer Privacy Act, and next-generation ransomware and denial of service attacks, a firm’s ability to provide security is also becoming a matter of survival. Put it all together, and many CISOs today exist in environments where they are not understood by business executives and thus are not being included in business initiatives until it is too late and security vulnerabilities expose the enterprise to cyberattacks and compliance violations.

WHO OWNS YOUR MEDICAL RECORDS?

In 2016, more than 100 million Americans have had their electronic medical records hacked from health systems. For example, this June, Banner Health in Phoenix had a breach of 3.7 million electronic medical records.
Many hospitals throughout the country have been held hostage for their health information system by hackers and have had to pay ransom to regain control of their patients’ medical data.

2016 more than 100 million Americans have had their electronic medical records hacked. Each one can be sold for $50.
The Health Insurance Portability and Accountability Act was written 20 years ago, when medical records were kept on paper, and is not applicable to the contemporary digital era.

Moreover, the pervasive selling of our medical data is unchecked, with no legal protection. The massive hacking of health system data has not resulted in any new legislation to date or enforcement via established laws.

Informed Patient Institute
We rate the websites that help you find the right doctor, hospital, and nursing homes and we provide tips about quality concerns. also see

https://www.philly.com/philly/health/what-is-philly-health-costs-and-how-can-it-help-me-20180220.html

ProPublica analyzed nearly 17,000 surgeons and found wide variations in complication rates for some of the most routine elective procedures. Explore our database to know more about a surgeon before your operation.
https://www.propublica.org/article/surgeon-level-risk-quotes

2016 Consumer Reports Medical Board Ratings

Medicare Provider Utilization and Payment Data: Physician and Other Supplier

Digital business has become a key driver to business strategy across industries.
CIOs have digital transformation at the center of their corporate
strategy.  #Cybersecurity, amazingly, is often not a top-tier priority in enterprise risk management. The #CISO, is only noticed when things go wrong. This is why CISOs are almost always fired or “resign” after major data breaches. The CISO is usually the most qualified person to manage post breach forensics, cleanup, and compliance audits.
https://venturebeat.com/2019/03/16/cisos-you-need-to-manage-by-walking-around/

Think a strong information security posture means you’re complying with HIPAA? Without proper documentation for government regulators, infosec protocols might safeguard data without meeting federal criteria.

Staff lapses and IT system vulnerabilities are key reasons behind SingHealth cyberattack, according to COI Report

ClassAction.org is a group of online professionals who are committed to exposing corporate wrongdoing and giving consumers the tools they need to fight back. We’ve been reporting on the legal space for nearly a decade and have built relationships with class action and mass tort attorneys across the country.

Prescription Hope
Prescription Hope offers over 1,500 brand-name medications all for the
set price of $50 per month for each medication. This covers 100% of the medication cost, no matter the retail price.

Market Share Matters: Evidence Of Insurer And Provider Bargaining Over Prices
Health-care providers and insurers have to agree on how much doctors will be reimbursed before doctors begin treating insurers’ clients. Those fees, which depend on the two parties’ relative clout. Abstract

A survey of the numbers, published this week in Health Affairs, shows that small-time doctor’s offices and insurance companies are getting squeezed by their larger competitors.
https://www.washingtonpost.com/news/wonk/wp/2017/01/09/its-hard-to-be-a-small-time-family-doctor-these-days-new-data-show/

Finally, U.S. hospitals will have to post their prices online.

Hospitals must post ‘chargemaster’ prices online.
Patient Estimate team call  484.337.1970
FAQ Requirements for Hospitals To Make Public a List of Their Standard Charges via the Internet
https://www.cms.gov/Medicare/Medicare-Fee-for-Service-Payment/AcuteInpatientPPS/Downloads/FAQs-Req-Hospital-Public-List-Standard-Charges.pdf
The chargemaster is not a useful tool for consumers who are comparison shopping between hospitals or health systems.
The chargemaster amounts are billed to an insurance company, Medicare, or Medicaid, and those insurers then apply their contracted rates to the services that are billed. In situations where a patient does not have insurance, our hospital has financial assistance policies that apply discounts to the amounts charged.
https://www.mainlinehealth.org/patient-services/patient-billing/standard-charges

A huge trove of medical records and prescriptions found exposed Thousands of health records and doctor’s notes were exposed daily
By Zack Whittaker TechCrunch.com March 17, 2019 A health tech company was leaking thousands of doctor’s notes, medical records, and prescriptions daily after a security lapse left a server without a password. The little-known software company, California-based Meditab, bills itself as one of the leading electronic medical records software makers for hospitals, doctor’s offices, and pharmacies. The company, among other things, processes electronic faxes for healthcare providers, still a primary method for sharing patient files to other providers and pharmacies. But that fax server wasn’t properly secured, according to the security company that discovered the data. SpiderSilk, a Dubai-based cybersecurity firm, told TechCrunch of the exposed server. The exposed fax server was running a Elasticsearch database with over six million records since its creation in March 2018. The faxes also included personal data and health information on children. None of the data was encrypted. […] Board of Directors responsible

MOUNTAIN VIEW, CA

800 West El Camino Real, Suite 350
Mountain View, California 94040
General +1 650 458 2620
Sales +1 650 458 2625
info@elastic.co
sales@elastic.co

The server was hosted on an subdomain of MedPharm Services, a Puerto Rico-based affiliate of Meditab, both founded by Kalpesh Patel.

NY Governor Cuomo Calls For Investigation on Facebook Health Data Collection

American Travelers Seek Cheaper Prescription Drugs In Mexico And Beyond
In Utah last year, the Public Employee Health Plan took this idea to a new level with its voluntary Pharmacy Tourism Program. For certain PEHP members who use any of 13 costly prescription medications — including the popular arthritis drug Humira — the insurer will foot the bill to fly the patient and a companion to San Diego, then drive them to a hospital in Tijuana, Mexico, to pick up a 90-day supply of medicine.

TechCrunch: Screen time inhibits toddler development, study finds. “In news that will surprise few but still alarm many, a study has found that kids 2-5 years old who engage in more screen time received worse scores in developmental screening tests. The apparent explanation is simple: when a kid is in front of a screen, they’re not talking, walking or playing, the activities during which basic skills are cultivated

Researchers Create Algorithm to Protect Kids from Disturbing YouTube Videos

Computer program that could bypass patents to produce synthetic drugs Software that can bypass current intellectual property and design medication with the same function as top drugs could help pharma companies…

“Massachusetts Attorney General Maura Healey alleges eight Sackler family members and nine Purdue board members or executives played key roles in the nation’s deadly opioid epidemic.

[ECP] NetHappeinings 3/12/19 #K12 #CPO

#NetHappenings @Nethappenings

3/12/19 #Web30 The World Wide Web turns 30 today!

Do you remember what life was like 30 years ago, pre-www,  when cyber-utopians heralded the new era of human collaboration and communication to  the underworld of social media posts called  ‘e-bile’?

Who Invented the Internet?
Who Controls The Internet?
Seven people control the system at the heart of the web: the domain name system, or DNS.

NetHappenings Where Internet Pioneer Gleason Sackmann got things started.

► @NetHappenings 

► K12PlayGround TM 
1st and oldest online K12 School directory in the World ©1993 History:
Be a part of Internet History!
Find, Edit, and Submit your K12 school information.
Join a #STEAM Project link to video project  find with #hashtags
@K12PlayGround

EduTech of ND @EduTechND History: Where Internet Pioneer Gleason Sackmann got things started.
EduTech provides information technology services and education technology professional development to K-12 educators in ND.

https://twitter.com/edutechnd

Girls Go CyberStart. The 2019 Girls Go CyberStart program is a series of online challenges that allow students to act as cyber protection agents to solve cybersecurity-related puzzles and explore related topics such as cryptography and digital forensics.
+++++++++++++++++++++++++++++++++++++++

NetBSD is a free, fast, secure, and highly portable Unix-like Open Source operating system. It is available for a wide range of platforms, from large-scale servers and powerful desktop systems to handheld and embedded devices.

Marcus J. Ranum, #Computer and #NetworkSecurity Researcher is now discussing our assumptions about #ComputerSecurity at #govsatcom 2019 #CyberSecurity #Luxembourg

2011 “The Internet will remain as insecure as it is possible to be and still function. ” -Marcus Ranum

► Amnesty Demands Israel Revoke NSO’s License After Haaretz Report on Firm’s Negotiations With Saudis Israeli Firm’s Spyware Was Used to Track Khashoggi

► Coinbase’s Newest Team Members Helped Authoritarians Worldwide Monitor Journalists and Dissidents H — king team
https://foreignpolicy.com/2016/04/26/fear-this-man-cyber-warfare-hacking-team-david-vincenzetti/

Never underestimate power, never underestimate fame. And our nation is run on loyalty, whether it be in Congress or your own little home, we’re positively tribal. Being rich and famous does not entitle you to break society’s rules. From time immemorial the wealthy have paid for silence, look at banks and offshore tax accounts.

+++++++++++++++++++++++++++++++++++++++

How much less California spends on each public school student than other states.
$25.4k per student in NYC, $16.7k in PA and $10.4k here in California.
How do young families keep moving  to CA?

Rankings of the States 2017 and Estimates of School Statistics 2018

California is 41st in the nation in per pupil K-12 spending

California is “No. 1 in per prisoner” spending.

Mostly True: You are shocked because the stats are bunk. Look at how much California teachers make (2nd highest in US) and then ask how overall spending could rank 41st? Answer: the 41st stat, like the $10.4k per student stat, has been helpfully “adjusted” to eliminate salary differences.

FALL ENROLLMENT 49,800,148 children
Average Daily Attendance 46,457,525 children

2017 High School Graduates 3,238,440 page 18

AVERAGE SALARY OF INSTRUCTIONAL STAFF 60,206 page 25
AVERAGE SALARY OF TEACHERS  58,479 page 26

How Much Federal Money follows the child out of the public school system into for profit charter follows no rules companies.

PUBLIC SCHOOL REVENUE PER STUDENT IN FALL ENROLLMENT page 29
PERCENTAGE OF COMBINED STATE & LOCAL REVENUE 49.8 page 34

The exceptions start on page 83
example: Enrollment figures only include students attending public schools and do not include those students attending private schools at public expense.

WHAT ABOUT ALL THE MONEY FROM THE LOTTERY?

Is The Lottery Shortchanging Schools?

Powerball Windfall? Schools Don’t Always Benefit From Lottery Sales

“Revenues generated from lottery have very little or no impact on overall education spending,” said Lucy Dadayan, a senior policy analyst at the Nelson A. Rockefeller Institute of Government, an Albany, New York, think tank. The reason: State legislatures often use the millions of dollars that come in from the lottery as an opportunity to reallocate other funds intended for schools from the state’s general revenue, making the overall education budget barely higher than it was before lottery money was added. “The state legislators added the funding in to the budget, and then they take it out,” said John O’Neil, communications director for the Virginia Education Association, an organization of more than 50,000 teachers and school professionals.

►Public school districts large systems that serve close to or more than 100,000 students have No Chief Privacy Officers.

Who is senior-level official who is responsible for the organization’s privacy policies and data governance in your school district?

Big Education Ape: Oakland, CA: Billionaires Will Convene to Discuss New Plans for Privatizing Public Schools | Diane Ravitch’s blog

Stats already show that Charter Schools do not graduate their students from high school.

Billionaires want all the K12 Department of Education money meant for the common good, the commons, our common wealth for their own pocket. These billionaires want the tax payers money for their own private  gain just to enrich themselves.

This has NOTHING to do with the quality of K12 Education.

The big business of selling student information and they do not protect their rights to privacy.

This is the art of the Steal.

https://www.newschools.org/about-us/team/donors/

Buying and selling the Data!

Anonymous at the top of the list
Chan Zuckerberg Foundation
Charles & Helen Schwab Foundation
The Walton Family Foundation
W.K. Kellogg Foundation
Perkins Hunter Foundation (Perkins family wealth started by opium drug running pirates)
The College Board
Michael & Susan Dell Foundation
John & Ann Doerr
Omidyar Network

► THERE ARE NO CHIEF PRIVACY OFFICERS IN K-12 EDUCATION

Children’s Rights K12 School Rights vs. Students Online privacy rights.

#StudentPrivacyRights

#ChiefPrivacyOfficer #CPO #K12CPO

STUDENT RIGHTS TO PRIVACY AND K12 SCHOOL RIGHTS VS. STUDENTS ONLINE PRIVACY RIGHTS.
and

DO YOU KNOW WHAT YOUR STATE IS COLLECTING ABOUT YOUR CHILD?There isn’t a single school district with a K-12 CPO. In fact, it is still extremely rare for districts to hire even one full-time employee dedicated to privacy.

Student Privacy Bill Protection : No Parental Consent Needed for Data Mining

Anyone who tells you they don’t need privacy because they “have nothing to hide” is a sheep that will enable a total surveillance state. Just don’t do it. Privacies protect our basic human rights.

► This story on IBM hoovering up millions of Flickr photos to power its facial recognition machine learning is fascinating and a nightmare

Facebook Is Giving Advertisers Access to Your Shadow Contact Information

: “Screen-grabbed from Facebook: a teacher had her students turn their phone volume up and create a collective record

Alex Stamos on Twitter: “This explains how Facebook plans to monetize a unified, 2 billion user end-to-end encrypted messaging service. I can’t think of a tech project with a more important privacy/safety balancing act than this one. I hope my friends working on it start public discussions on that.

Bob Lefsetz Zuckerberg’s Blog Post
A Privacy-Focused Vision for Social Networking
This isn’t about privacy, this is about MONOPOLY!

 

+++++++++++++++++++++++++++++++++++++++

COLLEGE ADMISSIONS IS BRIBED

A few months ago I was interviewing a college admissions coach who told me the following about how big of a donation it takes to get a child into an Ivy no questions asked: “There’s a certain magic number. It’s way higher than people think: $10 million.”

“what it takes to break into the 1% in various countries

$25 million nationwide college admissions cheating scam

“This case is about the widening corruption of elite college admissions through the steady application of wealth combined with fraud,” Andrew Lelling, the U.S. attorney for the District of Massachusetts, said at a news conference. According to Lelling, the ringleader of the scam is William Singer, owner of a college counseling service called Key Worldwide Foundation, who accepted bribes totaling $25 million from parents between 2011 and 2018 “to guarantee their children’s admission to elite schools.”
“The parents are a catalog of wealth and privilege,” Lelling said. “They include, for example, the CEOs of private and public companies, successful securities and real estate investors, two well-known actresses, a famous fashion designer and the co-chairman of a global law firm.”
Also named as defendants in the indictment are Robert Zangrillo, founder and CEO of the private investment firm Dragon Global; Bill Glashan, a businessman and international private equity investor; and Gordon Caplan, a New York attorney.

► Former PIMCO CEO Doug Hodge Named In Fraud Complaint Alongside Aunt Becky From “Full House”
Imagine surviving years of working with Bill Gross only to be taken down by bribing your kid into college. Um, Doug? You do have to talk in code. You’re doing a fraud.
JFC, you’d think a guy who spent that much time with Bill Gross would know how to bullshit properly.

How a Bicoin Evangelist Made Himself Vanish, in 15 (Not So Easy) Steps
#10 Buy a decoy house to fool the D.M.V.
Dozens of companies leaked sensitive data thanks to misconfigured Box accounts
Hospitals have ‘holy grail of personal data, ‘ yet their spending lags on 
digital security
Car alarms with security flaws put 3 million vehicles at risk of hijack
Drop Huawei or See Intelligence Sharing Pared Back, U.S. Tells Germany
Defense tech founded by Trump’s most prominent Silicon Valley supporters wins secretive military AI contract
Dreamers and Dropouts: Stories From Stanford, Cradle of Unicorns: The Good and the Bad of Stanford’s Massively Successful Startup Scene
Yes: a flying, jet-powered motorcycle As spec’ed out, the commercial speeder will weigh 231 lbs and be powered by four jet engines fueled with kerosene, diesel or Jet-A fuel. An ultralight version of the speeder will fly 60mph and won’t require a pilot’s license; alternatively, an experimental version of the craft will be able to fly over 150mph, but will require a formal license to fly. That aircraft should also have 30 minutes of flight time with 1200lbs of max thrust and a flight ceiling of 15,000 feet, though JetPack fully admits that most of its customers won’t need that…
Cyberization means it’s not your daddy’s war anymore: Kurdish rebels are exploiting an app to befriend and get information from Turkish soldiers. Reminiscent of the dating apps used by Hamas recently to spy on Israeli soldiers.

 NYC Media Lab newletter – https://nycmedialab.org/data/
How AI Will Rewire Us
Nicholas A. Christakis, Sterling Professor of Social and Natural Science at Yale and author of Blueprint: The Evolutionary Origins of a Good Society, believes AI is the only general purpose technology (GPT) that will fundamentally change our relations towards each other. If you look at any other GPT – the steam engine, electricity, the internet – these have changed everything around us except our “love, friendship, cooperation, and teaching” – what Christakis calls our evolutionary social suite. In this Atlantic piece, he explores how AI will be the first GPT to affect our social suite. Christakis noticed some peculiar things at his Yale lab. For one, when you include a cheerful bot who admits to occasional mistakes in a group assignment, the humans in the group work better together, vs. groups with bland robots. This holds true in larger experiments, with thousands of participants: “groups with mistake-prone bots consistently outperformed groups containing bots that did not make mistakes”. ~ Joly MacFie

John Gilmore  **Copyright seizure approaching** SpaCCS 2019 CFP (10+SIs): The 12th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage

Don’t submit your paper to this conference!  When researchers refuse to
supply their papers to the publishers who extort monopoly fees from
academic librarians, they have found the easiest way to tear down these
monopolies.

If you submit any paper to this conference, you will be forced
to assign your entire copyright in the paper to “Springer Nature
Switzerland AG”, now and forever, for their profit and your loss
and the public’s loss (see below).

Jun Feng is a program chair.  He should know to warn authors that
the whole conference is a scam on academic authors, which steals their
copyrights in order to extract large fees from academic libraries.  But
perhaps he did not mention this because he’s helping to run the scam.

I recommend publishing your work in Open Access conferences and journals in which (1) you are free to retain your copyright and control your
rights, and (2) the public is free to read your paper without paying
exhorbitant fees to a walled-garden publisher that prevents public
access to your scholarship.  See
https://en.wikipedia.org/wiki/Open_access

For example, the USENIX
Association runs many respected conferences and does Open Access
publication of their proceedings (https://www.usenix.org/).  The Public
Library of Science journals are also Open Access
(https://www.plos.org/).  Open access publishing increases your impact,
because all potential readers can actually read your paper.  Many
funders and academic institutions *require* that your work be published
with open access, because they have seen how the academic publishing
monopoly has damaged academic libraries (and science in general).

For general info about the highly profitable scams around academic
publishing, see:
https://en.wikipedia.org/wiki/Academic_publishing#Publishers_and_business_aspects

Jun Feng <junfeng989@gmail.com> wrote:

Papers must be clearly presented in English, must not exceed 14 pages (or
up to 20 pages with the pages over length charge) in Springer LNCS format (
https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines),