[ECP] NetHappeinings 3/12/19 #K12 #CPO

#NetHappenings @Nethappenings

3/12/19 #Web30 The World Wide Web turns 30 today!

Do you remember what life was like 30 years ago, pre-www,  when cyber-utopians heralded the new era of human collaboration and communication to  the underworld of social media posts called  ‘e-bile’?

Who Invented the Internet?
Who Controls The Internet?
Seven people control the system at the heart of the web: the domain name system, or DNS.

NetHappenings Where Internet Pioneer Gleason Sackmann got things started.

► @NetHappenings 

► K12PlayGround TM 
1st and oldest online K12 School directory in the World ©1993 History:
Be a part of Internet History!
Find, Edit, and Submit your K12 school information.
Join a #STEAM Project link to video project  find with #hashtags
@K12PlayGround

EduTech of ND @EduTechND History: Where Internet Pioneer Gleason Sackmann got things started.
EduTech provides information technology services and education technology professional development to K-12 educators in ND.

https://twitter.com/edutechnd

Girls Go CyberStart. The 2019 Girls Go CyberStart program is a series of online challenges that allow students to act as cyber protection agents to solve cybersecurity-related puzzles and explore related topics such as cryptography and digital forensics.
+++++++++++++++++++++++++++++++++++++++

NetBSD is a free, fast, secure, and highly portable Unix-like Open Source operating system. It is available for a wide range of platforms, from large-scale servers and powerful desktop systems to handheld and embedded devices.

Marcus J. Ranum, #Computer and #NetworkSecurity Researcher is now discussing our assumptions about #ComputerSecurity at #govsatcom 2019 #CyberSecurity #Luxembourg

2011 “The Internet will remain as insecure as it is possible to be and still function. ” -Marcus Ranum

► Amnesty Demands Israel Revoke NSO’s License After Haaretz Report on Firm’s Negotiations With Saudis Israeli Firm’s Spyware Was Used to Track Khashoggi

► Coinbase’s Newest Team Members Helped Authoritarians Worldwide Monitor Journalists and Dissidents H — king team
https://foreignpolicy.com/2016/04/26/fear-this-man-cyber-warfare-hacking-team-david-vincenzetti/

Never underestimate power, never underestimate fame. And our nation is run on loyalty, whether it be in Congress or your own little home, we’re positively tribal. Being rich and famous does not entitle you to break society’s rules. From time immemorial the wealthy have paid for silence, look at banks and offshore tax accounts.

+++++++++++++++++++++++++++++++++++++++

How much less California spends on each public school student than other states.
$25.4k per student in NYC, $16.7k in PA and $10.4k here in California.
How do young families keep moving  to CA?

Rankings of the States 2017 and Estimates of School Statistics 2018

California is 41st in the nation in per pupil K-12 spending

California is “No. 1 in per prisoner” spending.

Mostly True: You are shocked because the stats are bunk. Look at how much California teachers make (2nd highest in US) and then ask how overall spending could rank 41st? Answer: the 41st stat, like the $10.4k per student stat, has been helpfully “adjusted” to eliminate salary differences.

FALL ENROLLMENT 49,800,148 children
Average Daily Attendance 46,457,525 children

2017 High School Graduates 3,238,440 page 18

AVERAGE SALARY OF INSTRUCTIONAL STAFF 60,206 page 25
AVERAGE SALARY OF TEACHERS  58,479 page 26

How Much Federal Money follows the child out of the public school system into for profit charter follows no rules companies.

PUBLIC SCHOOL REVENUE PER STUDENT IN FALL ENROLLMENT page 29
PERCENTAGE OF COMBINED STATE & LOCAL REVENUE 49.8 page 34

The exceptions start on page 83
example: Enrollment figures only include students attending public schools and do not include those students attending private schools at public expense.

WHAT ABOUT ALL THE MONEY FROM THE LOTTERY?

Is The Lottery Shortchanging Schools?

Powerball Windfall? Schools Don’t Always Benefit From Lottery Sales

“Revenues generated from lottery have very little or no impact on overall education spending,” said Lucy Dadayan, a senior policy analyst at the Nelson A. Rockefeller Institute of Government, an Albany, New York, think tank. The reason: State legislatures often use the millions of dollars that come in from the lottery as an opportunity to reallocate other funds intended for schools from the state’s general revenue, making the overall education budget barely higher than it was before lottery money was added. “The state legislators added the funding in to the budget, and then they take it out,” said John O’Neil, communications director for the Virginia Education Association, an organization of more than 50,000 teachers and school professionals.

►Public school districts large systems that serve close to or more than 100,000 students have No Chief Privacy Officers.

Who is senior-level official who is responsible for the organization’s privacy policies and data governance in your school district?

Big Education Ape: Oakland, CA: Billionaires Will Convene to Discuss New Plans for Privatizing Public Schools | Diane Ravitch’s blog

Stats already show that Charter Schools do not graduate their students from high school.

Billionaires want all the K12 Department of Education money meant for the common good, the commons, our common wealth for their own pocket. These billionaires want the tax payers money for their own private  gain just to enrich themselves.

This has NOTHING to do with the quality of K12 Education.

The big business of selling student information and they do not protect their rights to privacy.

This is the art of the Steal.

https://www.newschools.org/about-us/team/donors/

Buying and selling the Data!

Anonymous at the top of the list
Chan Zuckerberg Foundation
Charles & Helen Schwab Foundation
The Walton Family Foundation
W.K. Kellogg Foundation
Perkins Hunter Foundation (Perkins family wealth started by opium drug running pirates)
The College Board
Michael & Susan Dell Foundation
John & Ann Doerr
Omidyar Network

► THERE ARE NO CHIEF PRIVACY OFFICERS IN K-12 EDUCATION

Children’s Rights K12 School Rights vs. Students Online privacy rights.

#StudentPrivacyRights

#ChiefPrivacyOfficer #CPO #K12CPO

STUDENT RIGHTS TO PRIVACY AND K12 SCHOOL RIGHTS VS. STUDENTS ONLINE PRIVACY RIGHTS.
and

DO YOU KNOW WHAT YOUR STATE IS COLLECTING ABOUT YOUR CHILD?There isn’t a single school district with a K-12 CPO. In fact, it is still extremely rare for districts to hire even one full-time employee dedicated to privacy.

Student Privacy Bill Protection : No Parental Consent Needed for Data Mining

Anyone who tells you they don’t need privacy because they “have nothing to hide” is a sheep that will enable a total surveillance state. Just don’t do it. Privacies protect our basic human rights.

► This story on IBM hoovering up millions of Flickr photos to power its facial recognition machine learning is fascinating and a nightmare

Facebook Is Giving Advertisers Access to Your Shadow Contact Information

: “Screen-grabbed from Facebook: a teacher had her students turn their phone volume up and create a collective record

Alex Stamos on Twitter: “This explains how Facebook plans to monetize a unified, 2 billion user end-to-end encrypted messaging service. I can’t think of a tech project with a more important privacy/safety balancing act than this one. I hope my friends working on it start public discussions on that.

Bob Lefsetz Zuckerberg’s Blog Post
A Privacy-Focused Vision for Social Networking
This isn’t about privacy, this is about MONOPOLY!

 

+++++++++++++++++++++++++++++++++++++++

COLLEGE ADMISSIONS IS BRIBED

A few months ago I was interviewing a college admissions coach who told me the following about how big of a donation it takes to get a child into an Ivy no questions asked: “There’s a certain magic number. It’s way higher than people think: $10 million.”

“what it takes to break into the 1% in various countries

$25 million nationwide college admissions cheating scam

“This case is about the widening corruption of elite college admissions through the steady application of wealth combined with fraud,” Andrew Lelling, the U.S. attorney for the District of Massachusetts, said at a news conference. According to Lelling, the ringleader of the scam is William Singer, owner of a college counseling service called Key Worldwide Foundation, who accepted bribes totaling $25 million from parents between 2011 and 2018 “to guarantee their children’s admission to elite schools.”
“The parents are a catalog of wealth and privilege,” Lelling said. “They include, for example, the CEOs of private and public companies, successful securities and real estate investors, two well-known actresses, a famous fashion designer and the co-chairman of a global law firm.”
Also named as defendants in the indictment are Robert Zangrillo, founder and CEO of the private investment firm Dragon Global; Bill Glashan, a businessman and international private equity investor; and Gordon Caplan, a New York attorney.

► Former PIMCO CEO Doug Hodge Named In Fraud Complaint Alongside Aunt Becky From “Full House”
Imagine surviving years of working with Bill Gross only to be taken down by bribing your kid into college. Um, Doug? You do have to talk in code. You’re doing a fraud.
JFC, you’d think a guy who spent that much time with Bill Gross would know how to bullshit properly.

How a Bicoin Evangelist Made Himself Vanish, in 15 (Not So Easy) Steps
#10 Buy a decoy house to fool the D.M.V.
Dozens of companies leaked sensitive data thanks to misconfigured Box accounts
Hospitals have ‘holy grail of personal data, ‘ yet their spending lags on 
digital security
Car alarms with security flaws put 3 million vehicles at risk of hijack
Drop Huawei or See Intelligence Sharing Pared Back, U.S. Tells Germany
Defense tech founded by Trump’s most prominent Silicon Valley supporters wins secretive military AI contract
Dreamers and Dropouts: Stories From Stanford, Cradle of Unicorns: The Good and the Bad of Stanford’s Massively Successful Startup Scene
Yes: a flying, jet-powered motorcycle As spec’ed out, the commercial speeder will weigh 231 lbs and be powered by four jet engines fueled with kerosene, diesel or Jet-A fuel. An ultralight version of the speeder will fly 60mph and won’t require a pilot’s license; alternatively, an experimental version of the craft will be able to fly over 150mph, but will require a formal license to fly. That aircraft should also have 30 minutes of flight time with 1200lbs of max thrust and a flight ceiling of 15,000 feet, though JetPack fully admits that most of its customers won’t need that…
Cyberization means it’s not your daddy’s war anymore: Kurdish rebels are exploiting an app to befriend and get information from Turkish soldiers. Reminiscent of the dating apps used by Hamas recently to spy on Israeli soldiers.

 NYC Media Lab newletter – https://nycmedialab.org/data/
How AI Will Rewire Us
Nicholas A. Christakis, Sterling Professor of Social and Natural Science at Yale and author of Blueprint: The Evolutionary Origins of a Good Society, believes AI is the only general purpose technology (GPT) that will fundamentally change our relations towards each other. If you look at any other GPT – the steam engine, electricity, the internet – these have changed everything around us except our “love, friendship, cooperation, and teaching” – what Christakis calls our evolutionary social suite. In this Atlantic piece, he explores how AI will be the first GPT to affect our social suite. Christakis noticed some peculiar things at his Yale lab. For one, when you include a cheerful bot who admits to occasional mistakes in a group assignment, the humans in the group work better together, vs. groups with bland robots. This holds true in larger experiments, with thousands of participants: “groups with mistake-prone bots consistently outperformed groups containing bots that did not make mistakes”. ~ Joly MacFie

John Gilmore  **Copyright seizure approaching** SpaCCS 2019 CFP (10+SIs): The 12th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage

Don’t submit your paper to this conference!  When researchers refuse to
supply their papers to the publishers who extort monopoly fees from
academic librarians, they have found the easiest way to tear down these
monopolies.

If you submit any paper to this conference, you will be forced
to assign your entire copyright in the paper to “Springer Nature
Switzerland AG”, now and forever, for their profit and your loss
and the public’s loss (see below).

Jun Feng is a program chair.  He should know to warn authors that
the whole conference is a scam on academic authors, which steals their
copyrights in order to extract large fees from academic libraries.  But
perhaps he did not mention this because he’s helping to run the scam.

I recommend publishing your work in Open Access conferences and journals in which (1) you are free to retain your copyright and control your
rights, and (2) the public is free to read your paper without paying
exhorbitant fees to a walled-garden publisher that prevents public
access to your scholarship.  See
https://en.wikipedia.org/wiki/Open_access

For example, the USENIX
Association runs many respected conferences and does Open Access
publication of their proceedings (https://www.usenix.org/).  The Public
Library of Science journals are also Open Access
(https://www.plos.org/).  Open access publishing increases your impact,
because all potential readers can actually read your paper.  Many
funders and academic institutions *require* that your work be published
with open access, because they have seen how the academic publishing
monopoly has damaged academic libraries (and science in general).

For general info about the highly profitable scams around academic
publishing, see:
https://en.wikipedia.org/wiki/Academic_publishing#Publishers_and_business_aspects

Jun Feng <junfeng989@gmail.com> wrote:

Papers must be clearly presented in English, must not exceed 14 pages (or
up to 20 pages with the pages over length charge) in Springer LNCS format (
https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines),

K12PlayGround.com Learn to recognize what is Real Fake

K12PlayGround.com FIND YOUR K12 SCHOOL AND SUBMIT /EDIT YOUR K12 SCHOOL INFORMATION

FOLLOW https://twitter.com/K12PlayGround.com bookmark and read it without subscribing to twitter.

FAKE

►”Covington Catholic is a perfect fit for a NYT Feature on how Trump’s message has resonated in this hardscrabble rural Kentucky high school riven with economic anxiety, except for its being located in a well-to-do suburb of Cincinnati and charging ten grand a year in tuition.”
Covington Catholic Teen Sues Washington Post for a Reasonable $250 Million

Crooks Created 28 Fake Ad Agencies to Disguise Massive Malvertising Campaign

Social Media Bots Fake Twitter / Instagram Followers are the business model that @Jack relies on for his advertising money.
American company named Devumi that has collected millions of dollars in a shadowy global marketplace for social media fraud. Devumi sells Twitter followers and retweets to celebrities, businesses and anyone who wants to appear more popular or exert influence online. Drawing on an estimated stock of at least 3.5 million automated accounts, each sold many times over, the company has provided customers with more than 200 million Twitter followers, a New York Times investigation found.
Of course Twitter policy doesn’t allow fake accounts but his company doesn’t get rid of fake bot accounts to keep his advertising money. It isn’t a code flaw it is a feature.
Court records showing that Devumi has more than 200,000 customers, including reality television stars, professional athletes, comedians, TED speakers, pastors and models.
For just pennies each — sometimes even less — Devumi offers Twitter followers, views on YouTube, plays on SoundCloud, the music-hosting site, and endorsements on LinkedIn, the professional-networking site.

The U.S. derivatives regulator is set to announce it has fined European lenders UBS, HSBC and Deutsche Bank millions of dollars each for so-called “spoofing” and manipulation in the U.S. futures market, three people with direct knowledge of the matter told Reuters.

 

K12Playground.com- GOVERNANCE

K12PlayGround.com
FIND YOUR K12 SCHOOL AND SUBMIT /EDIT YOUR K12 SCHOOL INFORMATION
FOLLOW  http://twitter.com K12PlayGround.com

► “When they substitute their knowledge for ours, we grow angry because they have robbed us of our agency.”

@weeklystandard @smarick Trends in governing have eroded the beliefs, norms and processes by which we learn to be accommodating citizens in a pluralistic, deliberative democracy. By manufacturing rights that limit democratic decision-making, centralizing power in Washington far from citizens’…

►  January 2019 “Within period of 72 hours, Nixon was inaugurated for second term, LBJ died, Roe v. Wade was decided, Vietnam War settlement was announced–all 46 years ago this month. ~ @BeschlossDC

Ajit Pai Refuses to Brief Congress About Why Bounty Hunters Can Buy Cell Phone Location Data

Ex-RNC Chair Puts Trump-Supporting Senators On Notice: ‘It’s All Collusion’

► Former Trump Tax Attorney Ed Burke’s Office Raided by Feds
It was reported in 2016 that Ald. Ed Burke’s firm helped Donald Trump trim $11.7M off his property taxes
https://news.wttw.com/2016/05/03/ald-burkes-law-firm-helps-trump-trim-117m-property-taxes

Here’s What I’m Telling US Congress about Data Breaches

► “Your regular reminder that Equifax still exists. Everyone who was running the company when 148 million Americans’ data was stolen is still rich, and now their former lawyer is running the office at the Federal Trade Commission that’s supposed to investigate them.”

►  Montgomery County PA Announces Purchase of New Voting Machines

Songwriters Score Win Over Streaming Services With Pay Hike

National Music Publishers’ Association
The Copyright Royalty Board ruled that songwriters will get at least a 15.1% share of streaming revenues over the next five years, from a previous 10.5%. The CRB’s decision will require streaming services to pay 15.1 percent of revenue to songwriters and publishers, up from 10.5 percent. The court also issued a ruling regarding a late fee, which will force digital music services to pay songwriters faster, or be subject to a significant penalty.
Amazon, Apple, Google, Pandora and Spotify compelled to pay more for the use of music.
Pryor Cashman who represented NMPA and NSAI in the litigation that resulted in the Copyright Royalty Board (CRB) being ruled to increase royalty payments to songwriters and music publishers from music streaming companies.
This was a hearing pitting songwriters and music publishers against five technology companies, including three of the largest companies in the world (Apple, Amazon and Google), which sought to reduce the already low rate of royalties that they pay to songwriters for the use of their music on their streaming services.

Federal Judge Asks Spotify: ‘How Many Songs Have You Infringed, Anyway?’

K12PlayGround.com COPYLEFT / OPEN SOURCE

K12PlayGround.com FIND YOUR K12 SCHOOL AND SUBMIT /EDIT YOUR K12 SCHOOL INFORMATION

FOLLOW
https://twitter.com/K12PlayGround.com bookmark and read it without subscribing to twitter.

COPYLEFT / OPEN SOURCE

Nicholas C. Zakas on Twitter:
“Mom: Dad said you invented a thing? ESLint?
Me: Yes.
Mom: What is it?
Me: It finds and fixes problems in JavaScript.
Mom: Huh. Do people use it?
Me: Basically everyone writing JS.
Mom: How much did you make on it?
Me: Nothing.
Mom: I don’t understand your industry.
Me: Me either.”

► Open Collective @opencollect
Organizing the Internet generation, one community at a time.

Elsevier journal editors resign, start rival open-access journal

Bryce Weiner “The true financial power of cryptocurrencies aren’t in the limited supplies which drive market volatility, but in the ability to mint your own money. That’s what “being your own bank” really means.”

Hacker Fantastic “2,982 bitcoin miners exposed to the Internet, have factory default credentials of “root/root” and an insecure unsigned firmware update process… this is going to end in tears

Wikipedia’s Larry Sanger Joins Blockchain Startup to Disrupt His Own Creation

World War II’s Best Codebreaker Was a Woman Elizebeth Smith Friedman

Shodan is the world’s first search engine for Internet-connected device  Antminer

►  Tim Bray · Google Memory Loss is ongoing – google isn’t coughing it up anymore / they don’t waste their effort going back to get what you are looking for – this has become the worst search engine to use.

5G the Free WiFi Killer

From: Dave Burstein dslprime.com
Date: Monday, August 24, 2015
Subject: “5G the Free WiFi Killer” EE Times

The Intel/Verizon/Ericsson model of future wireless has everything controlled by a (carrier-managed) gateway. This report from the Intel Developers’ Forum suggests troubling consequences.
The EE Times article below may be making some assumptions I don’t share, but the underlying point is on target. The author fears a carrier gateway will impede WiFi and more. To be proven.
50-70% of wireless traffic now goes over WiFi, a figure that will increase as faster WiFi routers become common and more home gateways are configured to share unused bandwidth.
That’s an existential threat to phone companies depending on revenue from expanding data usage. They are fighting back in industry fora, including defining LTE-U/LAA as “LTE spectrum owners only” and seeking to dedicate 40 MHz of current WiFi spectrum to the 4 telcos.
Anyone who believes in a “multi-stakeholder” “open” Internet should be worried. In particular, the carriers are bringing this to industry only organizations especially 3GPP (the LTE standard setter), EU 5G groups, the Flex5GWare project and Horizon2020.
We badly need to get a consumer voice in these groups. I’ve raised the issue to Larry Strickling (U.S. Gov) and Kathy Brown (ISOC). vocal supporters of “multi-stakeholder.” The decisions being made in these groups will have more impact on consumers than the limited scope of the ITU/ICANN debate. I’m only one voice and I hope more speak up on the importance of the public interest.

5G the Free WiFi Killer

http://www.eetimes.com/document.asp?doc_id=1327482&

Integrating comm comes at a price
8/21/2015 09:50 AM EDT
SAN FRANCISCO, Calif.—5G may be not much more than a moniker for what comes after 4G, but Intel clarified its vision recently at a keynote during the Intel Developer Forum 2015 (IDF, San Francisco, Aug.18-20). “Seamless” is the goal and it comes at a price.
The top-line is that Intel hopes to apply all its expertise in computing, networking and wireless communications to make a seamless 5G solution that incorporates distributed intelligence at all levels–from the smartphone to the router to the basestation aggregator to cloudlets, clouds and our fastest supercomputers.
The bottom line is that cellular, WiFi, centimeter- and millimeter wavelength bands must be seamlessly integrated from the user’s point-of-view, according to Aicha Evans, vice president of platform engineering group and general manager of the communications and devices group at Intel.
“5G is not about faster, but about integrating all types of connectivity,” Evans told her keynote attendees at IDF. “The building blocks of 5G are already here today.”
To the carriers this integration will come at a price, since 5G-for-all presents the opportunity to kill free WiFi and instead charge users for every data packet they send or receive, no matter which of the integrated communications technologies is used. At Evans’ keynote she gathered together carriers, service providers and strategists to outline what it is that they expect from 5G, including Alex Choi, chief technical officer (CTO) of SK Telecom (Asia), Bin Shen, Verizon’s vice president of strategy (U.S.) and Paul McNamara, vice president of Ericsson’s corporate strategy group (Europe).

However, before the panel painted the world-changing picture of extraordinary speeds and ultra-low latency–at a price–Intel’s Sandra Rivera, vice president of the data center group and general manager of the Internet of Things (IoT) described the benefits of 5G to the users.

“Intelligence will begin with at the base station,” Rivera asserted to the crowd at IDF. <snip>

Editor, Fast Net News, Net Policy News and DSL Prime
Author with Jennie Bourne  DSL (Wiley) and Web Video: Making It Great, Getting It Noticed (Peachpit)

Nestle Pays Only $524 To Extract 27,000,000 Gallons Of California Drinking Water

Nestle Continues Stealing World’s Water During Drought
Nestlé is draining California aquifers, from Sacramento alone taking 80 million gallons annually. Nestlé then sells the people’s water back to them at great profit under many dozen brand names.
http://www.mintpressnews.com/nestle-continues-stealing-worlds-water-during-drought/203544/

Nestle Pays Only $524 To Extract 27,000,000 Gallons Of California Drinking Water

Activists have called for a boycott of Nestle Waters and all Nestle products until they are held accountable for their actions in California.
  • ARROWHEAD MORONGO NESTLE
(ANTIMEDIA) Los Angeles, CA — Nestle has found itself more and more frequently in the glare of theCalifornia drought-shame spotlight than it would arguably care to be — though not frequently enough, apparently, for the megacorporation to have spontaneously sprouted a conscience.
Drought-shaming worked sufficiently enough for Starbucks to stop bottling water in the now-arid state entirely, uprooting its operations all the way to Pennsylvania. But Nestle simply shrugged off public outrage and then upped the ante by increasing its draw from natural springs — most notoriously in the San Bernardino National Forest — with an absurdly expired permit.
Because profit, of course. Or, perhaps more befittingly, theft. But you get the idea.
Nestle has somehow managed the most sweetheart of deals for its Arrowhead 100% Mountain Spring Water, which is ostensibly sourced from Arrowhead Springs — and which also happens to be located on public land in a national forest.
In 2013, the company drew 27 million gallons of water from 12 springs in Strawberry Canyon for the brand — apparently by employing rather impressive legerdemain — considering the permit to do so expired in 1988.
But, as Nestle will tell you, that really isn’t cause for concern since it swears it is a good steward of the land and, after all, that expired permit’s annual fee has been diligently and faithfully paid in full — all $524 of it.
And that isn’t the only water it collects. Another 51 million gallons of groundwater were drawn from the area by Nestle that same year.
There is another site the company drains for profit while California’s historic drought rages on: Deer Canyon. Last year, Nestle drew 76 million gallons from the springs in that location, which is a sizable increase over 2013’s 56 million-gallon draw — and under circumstances just as questionable as water collection at Arrowhead.
This extensive collection of water is undoubtedly having detrimental effects on the ecosystem and its numerous endangered and threatened species, though impact studies aren’t available because they were mysteriously stopped before ever getting underway.
In fact, the review process necessary to renew Nestle’s antiquated permit met a similarly enigmatic termination: once planning stages made apparent the hefty price tag and complicated steps said review would entail, the review was simply dropped. Completely. Without any new stipulations or stricter regulations added to the expired permit that Nestle was ostensibly following anyway — though, obviously, that remains an open question.
In 2014, Nestle used roughly 705 million gallons of water in its operations in California, according to natural resource manager Larry Lawrence. That’s 2,164 acre-feet of water — enough to“irrigate 700 acres of farmland” or “fill 1,068 Olympic-sized swimming pools,” as Ian James pointed out in The Desert Sun.
Though there is no way to verify exactly how much Nestle must spend to produce a single bottle of Arrowhead spring water, the astronomical profit is undeniable fact: the most popular size of a bottle of Arrowhead 100% Mountain Spring Water (1 liter) retails for 89¢ — putting the potential profit for Nestle in the tens of billions.
Activists have called for a boycott of Nestle Waters and all Nestle products until they are held accountable for their actions in California.
There is much more to be revealed in future articles as the investigation into Nestle’s reckless profit-seeking during California’s unprecedented drought continues.


This is the second in our series of investigations into Nestle’s role in extracting massive amounts of groundwater in California during the record drought. The third in this series will delve further into Nestle’s corrupt business practices. Make sure you don’t miss the rest of this series! Subscribe to our newsletter here.
This article (Nestle Pays Only $524 to Extract 27,000,000 Gallons of California Drinking Water) is free and open source. You have permission to republish this article under a Creative Commons license with attribution to Claire Bernish and theAntiMedia.org.
Share this article!

@Nethappenings

@nethappenings
Stocks
‘Flash’ events hurt market liquidity for days: N.Y. Fed blog | Reuters http://ow.ly/R5K9F
Flash Boys Puts a Flashlight on Dark, Predatory HFT Trading | Dennis M. Kelleher http://ow.ly/R5Kou
The scariest reason China devalued the yuan, in one chart China employment market is showing strains http://ow.ly/R5Rnm
Ashley Madison
Notes on the Ashley-Madison dump http://ow.ly/R5SCf
https://twitter.com/rabite/status/633814926046416897
https://twitter.com/rabite/status/633826608890126336
https://twitter.com/rabite/status/633817724830023680
https://twitter.com/rabite/status/601694797863231488
– Are you a Californian worried about state deficit? Don’t worry, Ramon Hernandez of the CA FTB is looking for solutions on @adultfriendfind
.@Sidragon1 wouldn’t have to risk prison if FAA IT guys like Billy Enos found bugs instead of searching @adultfriendfind with state property
– Military legislative fellow Matt Daack used @ashleymadison to cheat on his wife with the House email he uses to evaluate classified data.
https://twitter.com/rabite/status/633813156641525761
-John Tokarczyk of the Attorney General’s office hard at work investigating potential sex partners on @ashleymadison
https://twitter.com/rabite/status/633814926046416897
From page 46 of the “How to Hack a Jeep” manual: masscan http://ow.ly/R5T6H
Hillary Emailgate
Hillary’s Secret Email @clintonemail.com culprits reg to Eric P. @eric_hothem, Teneo holdings http://ow.ly/R5WUf Douglas J. Band http://ow.ly/R5YLy
The Spy Satellite Secrets in Hillary’s Emails http://ow.ly/R5UsP
How the FBI Took Down the Botnet Designed to Be ‘Impossible’ to Take Down | Motherboard http://ow.ly/R5V5b
Hillary Clinton will hand over to the Justice Department the private email server http://ow.ly/R5WHF
The Spy Satellite Secrets in Hillary’s Emails “TOP SECRET // SI // TK // NOFORN”
Most seriously, the inspector general assessed that Clinton’s emails included information that was highly classified—yet mislabeled as unclassified. Worse, the information in question should have been classified up to the level of “TOP SECRET//SI//TK//NOFORN,” according to the inspector general’s report. http://ow.ly/R5VPv
For 3 months Hillary Clinton’s email was unencrypted, open to spies http://ow.ly/R5W6R
BITCOIN
Bitcoin at a crossroads: Bitcoin Foundation’s Andresen and Hearn propose Bitcoin XT – New York Business Journal http://ow.ly/R6bum
Money Laundering
Sons of Indicted Swiss Financial Adviser Keep Business in the Family
London is now the global money-laundering centre for the drug trade, says crime expert http://ow.ly/R6ugD
Cryptography
bcrypt  There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter. — Preface to Applied Cryptography by Bruce Schneier

China is the E-Waste Computer dump for the world

E-waste dump of the world.

Guiyu computer dump –
1. The Electronics Junkyard Dismantlers of Guiyu

    2008 Guiyu was once a peaceful rice-growing village located in the eastern province of Guangdong, southern China – that is – until a surge of broken computers and laptops arrived from the Western World. Since then, Guiyu has been proclaimed the World’s electronic-waste capital. For around $1.50 USD, around 60,000 local workers including children risk their lives and limbs to scramble for anything of value out of your old computer. Some workers go the river bank, located just outside the village, where they make small fires to heat an extremely toxic mixture dubbed Aqua Regia. It contains 75 per cent pure Hydrochloric Acid and 25 per cent pure Nitric acid. Using the mixture, workers try to extract the small amount of gold found within a number of electronic parts such as computer chips. This method is extremely harmful both to humans and environment, as it produces sulfur dioxide and chlorine. At best, protection comes in the form of only a pair of rubber boots or a pair of gloves; but many of the workers endure a day’s labor without any protection at all.

2. Much toxic computer waste lands in Third World

    “25 Feb 2002 … (AP) — What happened to that old computer after you sold it to a … That often involves operations like the dump in Guiyu or similar ones …”

3. The Seattle Times: Nation & World: E-waste dump of the world

    “9 Apr 2006 … A worker piles discarded aluminum computer casings on the back of a motorized transport at the town of Guiyu in southern China. …”

4. Electronic waste in Guiyu – Wikipedia

    “While taping part of the story onsite at an illegal recycling dump in Guiyu, representatives of the Chinese recyclers attempted without success to …”

5. E-Waste Not How–and why–we should make sure our old cell phones, TVs and PCs get dismantled properly

    “Even though holiday sales were down at least 2% from 2007, millions of Americans awoke Christmas morning to new computers, TVs and iPhones. (I didn’t, but thanks for the pens, Mom.) Many of those gifts were replacements or upgrades, which prompts the question, What should you do with your old cell phone and other electronic equipment?

6. KILLER Digital Dumping Grounds on Earth, in Agbogbloshie, Ghana …

    “23 Jul 2009 … BIGGEST Military Computer Hacking of ALL-TIME, from a normal …. The southern Chinese city of Guiyu has been completely built around the e-waste trade. … and maybe one day put the digital dumps out of business. …” http://www.pbs.org/frontlineworld/stories/ghana804/video/video_index.html

7. Journal of Material Cycles and Waste Management March 2006, Volume 8, Issue 1, pp 21-33 Environmental contamination from electronic waste recycling at …

    ” dismantling electronic equipment, selling computer … roller dump site. A reservoir located in the northern part of. Guiyu, approximately 6km from the …” http://www.springerlink.com/index/G8K452X2542HK200.pdf

8. 2007 Elevated blood lead levels of children in Guiyu, an Electronic …

    “Guiyu has become a hub for illegal and unsafe computer recycling. … Dump. One of the worst polluted spots is Guiyu, China, where the levels of dioxin, …”

9. “12 Nov 2007 … “A migrant child from Henan province holds up a piece of e-trash, once a computer screen bearing a “Nokia” logo in a junk yard in Guiyu in …”
10. The WIP Contributors: E-waste: America’s Electronics Feed the …

    “26 Apr 2009 … The landscape of Guiyu, a remote town in China’s Guangdong province, … piles of unrecyclable computer waste imported from around the world in Guiyu, China. … Nigeria to this nearby informal dump sitting on a swamp. …” http://www.thewip.net/contributors/2009/04/ewaste_americas_electronics_fe.html

11. Elevated Blood Lead Levels of Children in Guiyu, an Electronic …

    “Leaching of lead from computer printed wire boards and cathode ray tubes by … Johnson T. E-waste dump of the world. 2006. [[accessed 20 July 2006]]. …”

12. FOXNews.com – Chinese Recyclers Live in Toxic E-Waste Dump

    “Chinese Recyclers Live in Toxic E-Waste Dump, Southern city of Guiyu full of … wires to recover copper and cooking computer motherboards to release gold. …”

13. GARBAGE AND RECYCLING IN CHINA

    China produces 254 million tons of garage a year, or about a third of a kilogram per person per day—a third of the world’s annual trash and garbage output.

14. “2008 Following The Trail Of Toxic E-Waste
60 Minutes
is going to take you to one of the most toxic places on Earth — a place that government officials and gangsters don’t want you to see. It’s a town in China where you can’t breathe the air or drink the water, a town where the blood of the children is laced with lead. It’s worth risking a visit because, as correspondent Scott Pelley first reported last November, much of the poison is coming out of the homes, schools and offices of America.
15. E Waste

    “Burn houses in distance and smoke where computer parts from the United States are burned. … Guiyu is one of the biggest e-waste centers of the world. … Alaba market in Lagos, Nigeria to this nearby informal dump sitting on a swamp. …”

16. The World’s Electronic Waste Dump
Guiyu, China is often referred to as the “e-waste capital of the world.” The city employs over 150,000 electronic waste dis-assemblers, recyclers, and salvage workers who toil through 16-hour days tearing apart discarded computers and other electronic devices.
17. Where computers go to die — and kill | Salon News

    “10 Apr 2006 … Top: Woman in Guiyu, China, about to smash a cathode ray tube from a … A short distance inland, the trucks dump their loads in what looks like … rivers that have become dumping grounds for discarded computer parts. …”

http://www.salon.com/news/feature/2006/04/10/ewaste/
18. Elevated blood lead levels of children in Guiyu, an Electronic

    “RESULTS: BLLs in 165 children of Guiyu ranged from 4.40 to 32.67 ….. Leaching of lead from computer printed wire boards and cathode ray tubes by municipal solid waste “Municipal waste” redirects here. … E-waste dump of the world. …”

A Critical Moment for the Future of the Internet | Techonomy

A Critical Moment for the Future of the Internet By Fadi Chehadé

The Internet, the greatest invention of our generation — several generations in fact — is in many ways a reflection of the American Dream. It’s vast and open, unlimited in its potential reach. It’s inclusive and welcoming. Anyone can be part of it and make a difference. The fastest growing part of the global economy is Internet-based, and the Internet accounts for a significant and growing portion of global GDP. According to Boston Consulting Group, the Internet is contributing up to 8 percent of GDP in some economies, powering growth and creating jobs.

You’d be correct in arguing it’s an American-made innovation. We can trace the roots of the Internet back some 50 years to a U.S. Defense Department research program. But as the Internet has expanded globally, it’s become increasingly clear that one government cannot lay claim to it. The Internet is a worldwide resource. It belongs to everyone.

Appropriately, the U.S. Government has long understood the Internet’s global potential. That’s why it helped create the Internet Corporation for Assigned Names and Numbers (ICANN) in 1998 — a neutral, independent and private-sector led organization designed to coordinate the Internet’s domain name system functions. Its operations are not made under the direction of one government, but through a bottom-up, multi-stakeholder policy development process involving business, civil society, engineers, academics, everyday users and many governments (around 150 of them participate). Under that system, the Internet has flourished, connecting over 3 billion of us, through our billions of devices.

Over the past two decades, the U.S. Government has gradually lightened its touch in its stewardship over the key Internet domain name system functions operated by ICANN. These technical functions are known as the Internet Assigned Numbers Authority (IANA) functions. The U.S. Government is now prepared to give up stewardship over the IANA functions altogether.

But why? And why now?

The U.S. Government always envisioned that its role in the IANA functions would be temporary. In March of 2014, the U.S. Commerce Department’s National Telecommunications and Information Administration (NTIA) announced its intent to transition out of its stewardship of the IANA functions. In its announcement, NTIA cited its belief that ICANN as an organization has matured and improved its accountability, transparency and its technical competence. NTIA also asserted that the Internet, managed and driven by the global community of diverse stakeholders, is in very good hands.

The current model of Internet governance is the only one that can keep pace with the global expansion of users, including where, how, how often and in what language they’re using it. Continual evolution is key: Internet governance must evolve to meet the changing needs of all users to ensure the network remains available, open, stable and secure. A report by Microsoft projects that the number of Internet users will grow to 4.7 billion in 2025, 75 percent of that growth coming from emerging economies. We must work together to take into consideration this changing landscape.

Many believe that if the U.S. Government does not step aside, other governments, including some that are uncomfortable with an open and inclusive Internet, will step in to try to capture control of it through intergovernmental organizations. Alternatively, governments could become motivated to break away from the one, unified Internet to form their own national or regional networks, essentially fragmenting the Internet we know today. The result of this could be a patchwork of incompatible networks spread across different nation states, with long-term social, cultural, political and economic casualties. Why take that chance?

The ICANN multi-stakeholder community brings together thousands of representatives from large and small businesses and civil society with technical experts, researchers, academics and end users from all over the world. Our role at ICANN is to coordinate this community. We are neutral and independent facilitators.

Many stakeholders have been working tirelessly over the past year to meet NTIA’s guidelines for the transition of their stewardship role to the global multi-stakeholder community. Since March 2014, the community has spent more than 400 hours together on calls and in meetings, working to develop a proposal that meets the following guidelines:

• Supports and enhances the existing multi-stakeholder model.

• Maintains the security, stability and resiliency of the Internet Domain Name System.

• Meets the needs and expectations of the global customers and partners of the IANA services.

• Maintains the openness of the Internet.

They also have to take into account that NTIA also specified that it would not accept a proposal that replaces NTIA’s role with a government-led or intergovernmental organization solution.

Should the transition fail, the United States could lose credibility in its quest to maintain an open, multi-stakeholder-driven Internet. The risk of fragmentation will grow and U.S. and global economies risk losing the commercial and social benefits inherent in the single, global, free and open Internet where innovation happens, and on which we’ve all come to rely.

I invite you to please join our process. If you have concerns, voice them. If you agree with the fundamental principles the proposal is based on, share that. Engage with the multi-stakeholder community and share your thoughts and opinions. It is critical to the success of our effort and the future of the Internet that we have as much participation in the process as possible.

Fadi Chehadé is the president and CEO of ICANN, a not-for-profit, public benefit corporation with participants from all over the world dedicated to keeping the Internet secure, stable and interoperable. He will be speaking on a session at the Techonomy Policy conference June 9 on the Worrisome Future of the Internet.
To attend, you can register here. Original article published at Techonomy.com.
http://www.huffingtonpost.com/techonomy/a-critical-moment-for-the_b_7513308.html

The USA FREEDOM Act, the President’s Review Group and the Biggest Intelligence Reform in 40 Years

The USA FREEDOM Act, the President’s Review Group and the Biggest Intelligence Reform in 40 Years
https://privacyassociation.org/news/a/the-usa-freedom-act-the-presidents-review-group-and-the-biggest-intelligence-reform-in-40-years/
 
Two years after the first story based on Edward Snowden’s leaks hit the press, the U.S. government enacted the USA FREEDOM Act, ending bulk collection under Section 215. As one of five members of President Obama’s Review Group on Intelligence and Communications Technology, I applaud its passage—the biggest pro-privacy change to U.S. intelligence law since the original enactment of the Foreign Intelligence Surveillance Act in 1978.
There is a close fit between the Review Group’s work and the new law as well as multiple significant reform measures the Obama administration has already adopted without legislative change. In this era of partisan gridlock, the U.S. system of government has proved more responsive and resilient than many skeptics had predicted.
<snip>