We need to develop nationwide policies and security protocols that would govern how voting machines are secured.

We need to develop nationwide policies and security protocols that would govern how #voting machines are secured.

https://www.edu-cyberpg.com/Technology/vote.html

The fact that information is stored unencrypted on hard drives simply makes no sense in the current threat environment. That they can be left on devices, unencrypted, that are then sold on the open market is malpractice.

Since these machines are for sale online, individuals, precincts, or adversaries could buy them, modify them, and put them back online for sale. Envision a scenario in which foreign actors purchased these voting machines. By reverse engineering the machine like I did to exploit its weaknesses, they could compromise a small number of ballot boxes in a particular precinct. That’s the greatest fear of election security researchers: not wholesale flipping of millions of votes, which would be easy to detect, but a small, public breach of security that would sow massive distrust throughout the entire election ecosystem.

I BOUGHT USED VOTING MACHINES ON EBAY FOR $100 APIECE. WHAT I FOUND WAS ALARMING

AUTHOR: BRIAN VARNERBRIAN

IN 2016, I bought two voting machines online for less than $100 apiece. I didn’t even have to search the dark web. I found them on eBay. Surely, I thought, these machines would have strict guidelines for lifecycle control like other sensitive equipment, like medical devices. I was wrong. I was able to purchase a pair of direct-recording electronic voting machines and have them delivered to my home in just a few days. I did this again just a few months ago. Alarmingly, they are still available to buy online.
reverse-engineered the machines to understand how they could be manipulated. After removing the internal hard drive, I was able to access the file structure and operating system. Since the machines were not wiped after they were used in the 2012 presidential election, I got a great deal of insight into how the machines store the votes that were cast on them. Within hours, I was able to change the candidates’ names to be that of anyone I wanted. When the machine printed out the official record for the votes that were cast, it showed that the candidate’s name I invented had received the most votes on that particular machine.
This year, I bought two more machines to see if security had improved. To my dismay, I discovered that the newer model machines—those that were used in the 2016 election—are running Windows CE and have USB ports, along with other components, that make them even easier to exploit than the older ones. Our voting machines, billed as “next generation,” and still in use today, are worse than they were before—dispersed, disorganized, and susceptible to manipulation.

A recent in-depth report on voting machine vulnerabilities concluded that a perpetrator would need physical access to the voting machine to exploit it. I concur with that assessment. When I reverse-engineered voting machines in 2016, I noticed that they were using a smart card as a means of authenticating a user and allowing them to vote. There are many documented liabilities in certain types of smart cards that are used, from Satellite receiver cards to bank chip cards. By using a $15 palm-sized device, my team was able to exploit a smart chip card, allowing us to vote multiple times.

Karl Auerbach
Date: March 18, 2019
Well more than a decade ago, but after the disastrous Gore vs Bush election the Open Voting Consortium bought a used Diebold DRE (touchscreen) voting machine that had become unclaimed freight. An interesting aspect is that the laws regarding unclaimed freight can potentially extinguish or diminish things like license limitations – or non-disclosures – that might have applied to those taking the items in a normal chain of transfers.

The machine was as heavy as a Diebold vault, but that’s where the security ended.  It had a cheap lock that could, and was, picked in just a few seconds.  It ran MS Windows CE off of a compact flash.  It even still had the votes from the last election in which it was used (in Ohio.)

Subsequently I was part of a team on a project to build a reference implementation of voting systems for the state of California (and anyone else) – from precinct and canvassing (counting) center hardware to vote capture machines to vote counting machines to all of the surrounding procedures.  We had buy in for all of the various parts – UCLA and UC Berkeley law on procedures, UC Merced on hardware, UC Santa Cruz on software, etc.

We did not find “open source” to be necessary.  Rather we felt that the public would be best served by systems that could be inspected by anyone (including inspection of code), full testing by any interested party (of all components), and open publication of test results.  We did not feel that it was necessary to take the step to require free distribution (or re-distribution) of parts: we wanted to encourage private vendors to produce this stuff and we had to leave them some incentive to do so.

The key element was that all of the devices would be totally open for inspection and testing – and that at the precinct all inter-machine APIs would be in the form of paper that could be reliably read by both humans (with normal eyesight) and machines.

Some precinct machines would gather voter intent – with different machines for different kinds of human frailties ranging from bad eyesight to inability to accurately use a finger on a touch screen.  All would produce that paper ballot.  Separate machines would record those ballots.

Most people have tended to forget that often the easiest place to steal an election is in the transfer of ballots/tallies from precincts to the counting/canvassing center or at the counting center itself, especially as we move towards instant runoff style ballots.  So we designed all of that stuff, and procedures, as well.

One surprising obstacle was from county clerks:  they are tasked with the very difficult jobs of delivering a believable election on a small budget.  They have to deal with all of the practical things like warehousing voting machines and training precinct workers.  They have a real concern about the costs of storing paper ballots; they are not equipped to become local versions of Iron Mountain.

In addition various states have old laws that have to be rewritten.  For example, California has very strict limits on how long voting materials – such as cast ballots – can be retained after an election.

Unfortunately the project died before it was launched due to a sex (I think) scandal involving the California Secretary of State that broke on the day he was to sign the papers to launch the project.)

I think that it is a project that deserves to be resurrected.

THEY ALREADY KNOW WHO YOU ARE WHEN YOU #VOTE

Exactis, as the source of a leak of the personal records of nearly everyone in the United States.

Exactis, as the source of a leak of the personal records of nearly everyone in the United States.

The result is a cautionary tale about the liability that a massive dataset can create for a tiny company like Exactis. It also hints at just how easy it’s become for small firms to wield massive, leak-prone databases of personal information—without necessarily having the resources or know-how to secure them.

https://www.wired.com/story/exactis-data-leak-fallout/

WIRED had revealed that Exactis exposed a database of 340 million records on the open internet, as first spotted by an independent security researcher named Vinny Troia.

Using the scanning tool Shodan, Troia identified a misconfigured Amazon ElasticSearch server that contained the database, and then downloaded it. There he found 230 million personal records and another 110 million related to businesses—more than two terabytes of information in total. Those files didn’t include credit card information, passwords, or Social Security numbers. But each one enumerated hundreds of details on individuals, ranging from the value of people’s mortgages to the age of their children, as well as other personal information like email addresses, home addresses, and phone numbers.

Exactis licensed that information to marketing and sales customers, so that they could integrate it with their existing databases to build more comprehensive profiles. But privacy advocates have warned that those same details, left open to the public, could just as easily allow spammers or scammers to profile targets.

the most painful breaches, like the Office of Personnel Management or Anthem health insurance incidents that involved stolen Social Security numbers and other hard-to-change personal data, are naturally the most valuable targets for attackers. Don’t forget the massive credit reporting agency Equifax to that list.

Social media, infowar, cyber and human security and ethics

google

 

 

 

 

From last year’s , but still cogent. With , and .

How hackers pulled off a $20 million bank heist

https://arstechnica.com/information-technology/2019/03/how-hackers-pulled-of-a-20-million-bank-heist/

By Lily Hay Newman
Wired.com
3/17/2019

In January 2018 a group of hackers, now thought to be working for the North Korean state-sponsored group Lazarus, attempted to steal $110 million from the Mexican commercial bank Bancomext. That effort failed. But just a few months later, a smaller yet still elaborate series of attacks allowed hackers to siphon off 300 to 400 million pesos, or roughly $15 to $20 million from Mexican banks. Here’s how they did it.

At the RSA security conference in San Francisco last Friday, penetration tester and security advisor Josu Loza, who was an incident responder in the wake of the April attacks, presented findings on how hackers executed the heists both digitally and on the ground around Mexico. The hackers’ affiliation remains publicly unknown. Loza emphasizes that while the attacks likely required extensive expertise and planning over months, or even years, they were enabled by sloppy and insecure network architecture within the Mexican financial system, and security oversights in SPEI, Mexico’s domestic money transfer platform run by central bank Banco de México, also known as Banxico.

[ECP] NetHappenings 3/18/19

YOUR HEALTH INFORMATION PRIVACY RIGHTS

HIPPA  

Office for Civil Rights Headquarters
U.S. Department of Health & Human Services
200 Independence Avenue, S.W.
Washington, D.C. 20201
Toll Free Call Center: 1-800-368-1019
TTD Number: 1-800-537-7697

HHS Releases Voluntary Cybersecurity Practices for Health Industry

GDPR, California’s Consumer Privacy Act, and next-generation ransomware and denial of service attacks, a firm’s ability to provide security is also becoming a matter of survival. Put it all together, and many CISOs today exist in environments where they are not understood by business executives and thus are not being included in business initiatives until it is too late and security vulnerabilities expose the enterprise to cyberattacks and compliance violations.

WHO OWNS YOUR MEDICAL RECORDS?

In 2016, more than 100 million Americans have had their electronic medical records hacked from health systems. For example, this June, Banner Health in Phoenix had a breach of 3.7 million electronic medical records.
Many hospitals throughout the country have been held hostage for their health information system by hackers and have had to pay ransom to regain control of their patients’ medical data.

2016 more than 100 million Americans have had their electronic medical records hacked. Each one can be sold for $50.
The Health Insurance Portability and Accountability Act was written 20 years ago, when medical records were kept on paper, and is not applicable to the contemporary digital era.

Moreover, the pervasive selling of our medical data is unchecked, with no legal protection. The massive hacking of health system data has not resulted in any new legislation to date or enforcement via established laws.

Informed Patient Institute
We rate the websites that help you find the right doctor, hospital, and nursing homes and we provide tips about quality concerns. also see

https://www.philly.com/philly/health/what-is-philly-health-costs-and-how-can-it-help-me-20180220.html

ProPublica analyzed nearly 17,000 surgeons and found wide variations in complication rates for some of the most routine elective procedures. Explore our database to know more about a surgeon before your operation.
https://www.propublica.org/article/surgeon-level-risk-quotes

2016 Consumer Reports Medical Board Ratings

Medicare Provider Utilization and Payment Data: Physician and Other Supplier

Digital business has become a key driver to business strategy across industries.
CIOs have digital transformation at the center of their corporate
strategy.  #Cybersecurity, amazingly, is often not a top-tier priority in enterprise risk management. The #CISO, is only noticed when things go wrong. This is why CISOs are almost always fired or “resign” after major data breaches. The CISO is usually the most qualified person to manage post breach forensics, cleanup, and compliance audits.
https://venturebeat.com/2019/03/16/cisos-you-need-to-manage-by-walking-around/

Think a strong information security posture means you’re complying with HIPAA? Without proper documentation for government regulators, infosec protocols might safeguard data without meeting federal criteria.

Staff lapses and IT system vulnerabilities are key reasons behind SingHealth cyberattack, according to COI Report

ClassAction.org is a group of online professionals who are committed to exposing corporate wrongdoing and giving consumers the tools they need to fight back. We’ve been reporting on the legal space for nearly a decade and have built relationships with class action and mass tort attorneys across the country.

Prescription Hope
Prescription Hope offers over 1,500 brand-name medications all for the
set price of $50 per month for each medication. This covers 100% of the medication cost, no matter the retail price.

Market Share Matters: Evidence Of Insurer And Provider Bargaining Over Prices
Health-care providers and insurers have to agree on how much doctors will be reimbursed before doctors begin treating insurers’ clients. Those fees, which depend on the two parties’ relative clout. Abstract

A survey of the numbers, published this week in Health Affairs, shows that small-time doctor’s offices and insurance companies are getting squeezed by their larger competitors.
https://www.washingtonpost.com/news/wonk/wp/2017/01/09/its-hard-to-be-a-small-time-family-doctor-these-days-new-data-show/

Finally, U.S. hospitals will have to post their prices online.

Hospitals must post ‘chargemaster’ prices online.
Patient Estimate team call  484.337.1970
FAQ Requirements for Hospitals To Make Public a List of Their Standard Charges via the Internet
https://www.cms.gov/Medicare/Medicare-Fee-for-Service-Payment/AcuteInpatientPPS/Downloads/FAQs-Req-Hospital-Public-List-Standard-Charges.pdf
The chargemaster is not a useful tool for consumers who are comparison shopping between hospitals or health systems.
The chargemaster amounts are billed to an insurance company, Medicare, or Medicaid, and those insurers then apply their contracted rates to the services that are billed. In situations where a patient does not have insurance, our hospital has financial assistance policies that apply discounts to the amounts charged.
https://www.mainlinehealth.org/patient-services/patient-billing/standard-charges

A huge trove of medical records and prescriptions found exposed Thousands of health records and doctor’s notes were exposed daily
By Zack Whittaker TechCrunch.com March 17, 2019 A health tech company was leaking thousands of doctor’s notes, medical records, and prescriptions daily after a security lapse left a server without a password. The little-known software company, California-based Meditab, bills itself as one of the leading electronic medical records software makers for hospitals, doctor’s offices, and pharmacies. The company, among other things, processes electronic faxes for healthcare providers, still a primary method for sharing patient files to other providers and pharmacies. But that fax server wasn’t properly secured, according to the security company that discovered the data. SpiderSilk, a Dubai-based cybersecurity firm, told TechCrunch of the exposed server. The exposed fax server was running a Elasticsearch database with over six million records since its creation in March 2018. The faxes also included personal data and health information on children. None of the data was encrypted. […] Board of Directors responsible

MOUNTAIN VIEW, CA

800 West El Camino Real, Suite 350
Mountain View, California 94040
General +1 650 458 2620
Sales +1 650 458 2625
info@elastic.co
sales@elastic.co

The server was hosted on an subdomain of MedPharm Services, a Puerto Rico-based affiliate of Meditab, both founded by Kalpesh Patel.

NY Governor Cuomo Calls For Investigation on Facebook Health Data Collection

American Travelers Seek Cheaper Prescription Drugs In Mexico And Beyond
In Utah last year, the Public Employee Health Plan took this idea to a new level with its voluntary Pharmacy Tourism Program. For certain PEHP members who use any of 13 costly prescription medications — including the popular arthritis drug Humira — the insurer will foot the bill to fly the patient and a companion to San Diego, then drive them to a hospital in Tijuana, Mexico, to pick up a 90-day supply of medicine.

TechCrunch: Screen time inhibits toddler development, study finds. “In news that will surprise few but still alarm many, a study has found that kids 2-5 years old who engage in more screen time received worse scores in developmental screening tests. The apparent explanation is simple: when a kid is in front of a screen, they’re not talking, walking or playing, the activities during which basic skills are cultivated

Researchers Create Algorithm to Protect Kids from Disturbing YouTube Videos

Computer program that could bypass patents to produce synthetic drugs Software that can bypass current intellectual property and design medication with the same function as top drugs could help pharma companies…

“Massachusetts Attorney General Maura Healey alleges eight Sackler family members and nine Purdue board members or executives played key roles in the nation’s deadly opioid epidemic.

[ECP] NetHappeinings 3/12/19 #K12 #CPO

#NetHappenings @Nethappenings

3/12/19 #Web30 The World Wide Web turns 30 today!

Do you remember what life was like 30 years ago, pre-www,  when cyber-utopians heralded the new era of human collaboration and communication to  the underworld of social media posts called  ‘e-bile’?

Who Invented the Internet?
Who Controls The Internet?
Seven people control the system at the heart of the web: the domain name system, or DNS.

NetHappenings Where Internet Pioneer Gleason Sackmann got things started.

► @NetHappenings 

► K12PlayGround TM 
1st and oldest online K12 School directory in the World ©1993 History:
Be a part of Internet History!
Find, Edit, and Submit your K12 school information.
Join a #STEAM Project link to video project  find with #hashtags
@K12PlayGround

EduTech of ND @EduTechND History: Where Internet Pioneer Gleason Sackmann got things started.
EduTech provides information technology services and education technology professional development to K-12 educators in ND.

https://twitter.com/edutechnd

Girls Go CyberStart. The 2019 Girls Go CyberStart program is a series of online challenges that allow students to act as cyber protection agents to solve cybersecurity-related puzzles and explore related topics such as cryptography and digital forensics.
+++++++++++++++++++++++++++++++++++++++

NetBSD is a free, fast, secure, and highly portable Unix-like Open Source operating system. It is available for a wide range of platforms, from large-scale servers and powerful desktop systems to handheld and embedded devices.

Marcus J. Ranum, #Computer and #NetworkSecurity Researcher is now discussing our assumptions about #ComputerSecurity at #govsatcom 2019 #CyberSecurity #Luxembourg

2011 “The Internet will remain as insecure as it is possible to be and still function. ” -Marcus Ranum

► Amnesty Demands Israel Revoke NSO’s License After Haaretz Report on Firm’s Negotiations With Saudis Israeli Firm’s Spyware Was Used to Track Khashoggi

► Coinbase’s Newest Team Members Helped Authoritarians Worldwide Monitor Journalists and Dissidents H — king team
https://foreignpolicy.com/2016/04/26/fear-this-man-cyber-warfare-hacking-team-david-vincenzetti/

Never underestimate power, never underestimate fame. And our nation is run on loyalty, whether it be in Congress or your own little home, we’re positively tribal. Being rich and famous does not entitle you to break society’s rules. From time immemorial the wealthy have paid for silence, look at banks and offshore tax accounts.

+++++++++++++++++++++++++++++++++++++++

How much less California spends on each public school student than other states.
$25.4k per student in NYC, $16.7k in PA and $10.4k here in California.
How do young families keep moving  to CA?

Rankings of the States 2017 and Estimates of School Statistics 2018

California is 41st in the nation in per pupil K-12 spending

California is “No. 1 in per prisoner” spending.

Mostly True: You are shocked because the stats are bunk. Look at how much California teachers make (2nd highest in US) and then ask how overall spending could rank 41st? Answer: the 41st stat, like the $10.4k per student stat, has been helpfully “adjusted” to eliminate salary differences.

FALL ENROLLMENT 49,800,148 children
Average Daily Attendance 46,457,525 children

2017 High School Graduates 3,238,440 page 18

AVERAGE SALARY OF INSTRUCTIONAL STAFF 60,206 page 25
AVERAGE SALARY OF TEACHERS  58,479 page 26

How Much Federal Money follows the child out of the public school system into for profit charter follows no rules companies.

PUBLIC SCHOOL REVENUE PER STUDENT IN FALL ENROLLMENT page 29
PERCENTAGE OF COMBINED STATE & LOCAL REVENUE 49.8 page 34

The exceptions start on page 83
example: Enrollment figures only include students attending public schools and do not include those students attending private schools at public expense.

WHAT ABOUT ALL THE MONEY FROM THE LOTTERY?

Is The Lottery Shortchanging Schools?

Powerball Windfall? Schools Don’t Always Benefit From Lottery Sales

“Revenues generated from lottery have very little or no impact on overall education spending,” said Lucy Dadayan, a senior policy analyst at the Nelson A. Rockefeller Institute of Government, an Albany, New York, think tank. The reason: State legislatures often use the millions of dollars that come in from the lottery as an opportunity to reallocate other funds intended for schools from the state’s general revenue, making the overall education budget barely higher than it was before lottery money was added. “The state legislators added the funding in to the budget, and then they take it out,” said John O’Neil, communications director for the Virginia Education Association, an organization of more than 50,000 teachers and school professionals.

►Public school districts large systems that serve close to or more than 100,000 students have No Chief Privacy Officers.

Who is senior-level official who is responsible for the organization’s privacy policies and data governance in your school district?

Big Education Ape: Oakland, CA: Billionaires Will Convene to Discuss New Plans for Privatizing Public Schools | Diane Ravitch’s blog

Stats already show that Charter Schools do not graduate their students from high school.

Billionaires want all the K12 Department of Education money meant for the common good, the commons, our common wealth for their own pocket. These billionaires want the tax payers money for their own private  gain just to enrich themselves.

This has NOTHING to do with the quality of K12 Education.

The big business of selling student information and they do not protect their rights to privacy.

This is the art of the Steal.

https://www.newschools.org/about-us/team/donors/

Buying and selling the Data!

Anonymous at the top of the list
Chan Zuckerberg Foundation
Charles & Helen Schwab Foundation
The Walton Family Foundation
W.K. Kellogg Foundation
Perkins Hunter Foundation (Perkins family wealth started by opium drug running pirates)
The College Board
Michael & Susan Dell Foundation
John & Ann Doerr
Omidyar Network

► THERE ARE NO CHIEF PRIVACY OFFICERS IN K-12 EDUCATION

Children’s Rights K12 School Rights vs. Students Online privacy rights.

#StudentPrivacyRights

#ChiefPrivacyOfficer #CPO #K12CPO

STUDENT RIGHTS TO PRIVACY AND K12 SCHOOL RIGHTS VS. STUDENTS ONLINE PRIVACY RIGHTS.
and

DO YOU KNOW WHAT YOUR STATE IS COLLECTING ABOUT YOUR CHILD?There isn’t a single school district with a K-12 CPO. In fact, it is still extremely rare for districts to hire even one full-time employee dedicated to privacy.

Student Privacy Bill Protection : No Parental Consent Needed for Data Mining

Anyone who tells you they don’t need privacy because they “have nothing to hide” is a sheep that will enable a total surveillance state. Just don’t do it. Privacies protect our basic human rights.

► This story on IBM hoovering up millions of Flickr photos to power its facial recognition machine learning is fascinating and a nightmare

Facebook Is Giving Advertisers Access to Your Shadow Contact Information

: “Screen-grabbed from Facebook: a teacher had her students turn their phone volume up and create a collective record

Alex Stamos on Twitter: “This explains how Facebook plans to monetize a unified, 2 billion user end-to-end encrypted messaging service. I can’t think of a tech project with a more important privacy/safety balancing act than this one. I hope my friends working on it start public discussions on that.

Bob Lefsetz Zuckerberg’s Blog Post
A Privacy-Focused Vision for Social Networking
This isn’t about privacy, this is about MONOPOLY!

 

+++++++++++++++++++++++++++++++++++++++

COLLEGE ADMISSIONS IS BRIBED

A few months ago I was interviewing a college admissions coach who told me the following about how big of a donation it takes to get a child into an Ivy no questions asked: “There’s a certain magic number. It’s way higher than people think: $10 million.”

“what it takes to break into the 1% in various countries

$25 million nationwide college admissions cheating scam

“This case is about the widening corruption of elite college admissions through the steady application of wealth combined with fraud,” Andrew Lelling, the U.S. attorney for the District of Massachusetts, said at a news conference. According to Lelling, the ringleader of the scam is William Singer, owner of a college counseling service called Key Worldwide Foundation, who accepted bribes totaling $25 million from parents between 2011 and 2018 “to guarantee their children’s admission to elite schools.”
“The parents are a catalog of wealth and privilege,” Lelling said. “They include, for example, the CEOs of private and public companies, successful securities and real estate investors, two well-known actresses, a famous fashion designer and the co-chairman of a global law firm.”
Also named as defendants in the indictment are Robert Zangrillo, founder and CEO of the private investment firm Dragon Global; Bill Glashan, a businessman and international private equity investor; and Gordon Caplan, a New York attorney.

► Former PIMCO CEO Doug Hodge Named In Fraud Complaint Alongside Aunt Becky From “Full House”
Imagine surviving years of working with Bill Gross only to be taken down by bribing your kid into college. Um, Doug? You do have to talk in code. You’re doing a fraud.
JFC, you’d think a guy who spent that much time with Bill Gross would know how to bullshit properly.

How a Bicoin Evangelist Made Himself Vanish, in 15 (Not So Easy) Steps
#10 Buy a decoy house to fool the D.M.V.
Dozens of companies leaked sensitive data thanks to misconfigured Box accounts
Hospitals have ‘holy grail of personal data, ‘ yet their spending lags on 
digital security
Car alarms with security flaws put 3 million vehicles at risk of hijack
Drop Huawei or See Intelligence Sharing Pared Back, U.S. Tells Germany
Defense tech founded by Trump’s most prominent Silicon Valley supporters wins secretive military AI contract
Dreamers and Dropouts: Stories From Stanford, Cradle of Unicorns: The Good and the Bad of Stanford’s Massively Successful Startup Scene
Yes: a flying, jet-powered motorcycle As spec’ed out, the commercial speeder will weigh 231 lbs and be powered by four jet engines fueled with kerosene, diesel or Jet-A fuel. An ultralight version of the speeder will fly 60mph and won’t require a pilot’s license; alternatively, an experimental version of the craft will be able to fly over 150mph, but will require a formal license to fly. That aircraft should also have 30 minutes of flight time with 1200lbs of max thrust and a flight ceiling of 15,000 feet, though JetPack fully admits that most of its customers won’t need that…
Cyberization means it’s not your daddy’s war anymore: Kurdish rebels are exploiting an app to befriend and get information from Turkish soldiers. Reminiscent of the dating apps used by Hamas recently to spy on Israeli soldiers.

 NYC Media Lab newletter – https://nycmedialab.org/data/
How AI Will Rewire Us
Nicholas A. Christakis, Sterling Professor of Social and Natural Science at Yale and author of Blueprint: The Evolutionary Origins of a Good Society, believes AI is the only general purpose technology (GPT) that will fundamentally change our relations towards each other. If you look at any other GPT – the steam engine, electricity, the internet – these have changed everything around us except our “love, friendship, cooperation, and teaching” – what Christakis calls our evolutionary social suite. In this Atlantic piece, he explores how AI will be the first GPT to affect our social suite. Christakis noticed some peculiar things at his Yale lab. For one, when you include a cheerful bot who admits to occasional mistakes in a group assignment, the humans in the group work better together, vs. groups with bland robots. This holds true in larger experiments, with thousands of participants: “groups with mistake-prone bots consistently outperformed groups containing bots that did not make mistakes”. ~ Joly MacFie

John Gilmore  **Copyright seizure approaching** SpaCCS 2019 CFP (10+SIs): The 12th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage

Don’t submit your paper to this conference!  When researchers refuse to
supply their papers to the publishers who extort monopoly fees from
academic librarians, they have found the easiest way to tear down these
monopolies.

If you submit any paper to this conference, you will be forced
to assign your entire copyright in the paper to “Springer Nature
Switzerland AG”, now and forever, for their profit and your loss
and the public’s loss (see below).

Jun Feng is a program chair.  He should know to warn authors that
the whole conference is a scam on academic authors, which steals their
copyrights in order to extract large fees from academic libraries.  But
perhaps he did not mention this because he’s helping to run the scam.

I recommend publishing your work in Open Access conferences and journals in which (1) you are free to retain your copyright and control your
rights, and (2) the public is free to read your paper without paying
exhorbitant fees to a walled-garden publisher that prevents public
access to your scholarship.  See
https://en.wikipedia.org/wiki/Open_access

For example, the USENIX
Association runs many respected conferences and does Open Access
publication of their proceedings (https://www.usenix.org/).  The Public
Library of Science journals are also Open Access
(https://www.plos.org/).  Open access publishing increases your impact,
because all potential readers can actually read your paper.  Many
funders and academic institutions *require* that your work be published
with open access, because they have seen how the academic publishing
monopoly has damaged academic libraries (and science in general).

For general info about the highly profitable scams around academic
publishing, see:
https://en.wikipedia.org/wiki/Academic_publishing#Publishers_and_business_aspects

Jun Feng <junfeng989@gmail.com> wrote:

Papers must be clearly presented in English, must not exceed 14 pages (or
up to 20 pages with the pages over length charge) in Springer LNCS format (
https://www.springer.com/gp/computer-science/lncs/conference-proceedings-guidelines),

Zuckerberg reportedly has a secret escape chute beneath his conference room

Mark Zuckerberg reportedly has a secret escape chute beneath his conference room

#DeleteFacebook

Facebook CEO Mark Zuckerberg and COO Sheryl Sandberg have 24/7 security details

Facebook’s board of directors in July 2018 approved a $10 million security allowance for Zuckerberg and his family for 2018.
Facebook’s executive-protection team consists of more than 70 people. Led by former US Secret Service special agent Jill Leavens Jones, the team provides Zuckerberg and Chief Operating Officer Sheryl Sandberg with a 24/7 security detail.
Zuckerberg works at a desk in an open space at Facebook although the area below his desk – an underground parking lot – is sectioned off due to fears of car bombs. There are even rumors that a conference room, one with large bullet-proof glass walls, features a secret “panic chute” that can be used to evacuate the executive in the event of an emergency.
https://www.businessinsider.com/facebook-global-security-mark-zuckerberg-executive-protection-2019-3

Individual 1 Trump Organization, Trump Tower Moscow Project

Individual 1 Trump Organization and his Family involved with the Trump Tower Moscow Project

Trump Knew and directed the negotiation during the presidential campaign.

The American population needs to know what happened.

Laurence Tribe: President Donald Trump Can Be Indicted For Federal Crimes

The get out of jail free card.

If no indictment then Trump can be pardoned by Pence and get to keep all the profits!!!

Harvard’s Laurence Tribe: Impeach Donald Trump Now
Constitutional law professor Laurence Tribe explains why it is critically important to put the impeachment process in motion now, before it is too late.

President Donald Trump, Ivanka Deny Special Treatment For Jared Kushner

White House announces Kushner met with Saudi crown prince as Cohen testifies

FEBRUARY 27, 2019
Donald Trump’s senior adviser Jared Kushner met with Saudi Arabia’s crown prince Tuesday in their first face-to-face encounter since the October 2018 murder of journalist Jamal Khashoggi. Crown Prince Mohammed bin Salman, who sources have told CNN the CIA assesses with high confidence ordered Khashoggi’s murder, met Kushner along with his father King Salman
https://www.nytimes.com/2019/02/27/world/middleeast/kushner-Mohammed-bin-Salman.html

House panel demands Kushner clearance details from White House
A Democratic-led congressional panel on Friday demanded that the White House comply with requests for documents and witnesses for a probe into alleged security clearance abuses involving President Donald Trump’s son-in-law Jared Kushner and others.
https://www.reuters.com/article/us-usa-trump-kushner/house-panel-demands-kushner-clearance-details-from-white-house-idUSKCN1QI5CU

I’ll take venal hypocrites for $1,000 please Alex.

Missouri Rep Demands Public ID of Anyone Suing Over Separation of Church and State

Missouri Rep Demands Public ID of Anyone Suing Over Separation of Church and State

Missouri Representative Hardy Billington (R-Poplar Bluff) is on a mission from God. Unfortunately, it’s not the type of mission that requires driving to Chicago at night while wearing sunglasses, but rather one to make the separation of church and state just a bit less separate. In a House committee hearing Tuesday, Billington presented a bill that would force plaintiffs advocating for the separation of church and state — those suing to stop the public display of crosses on government property, or seeking to block prayer in public schools — to disclose their real names. No more Jane Doe or Jane Roe. In these cases, and only these cases, Billington would require the legal system to out the person suing.

The foundation has been busy in Missouri. In 2016, its complaint and threat of a lawsuit forced the Tipton school district to prohibit staff from leading prayers in school. In 2017, the nonprofit targeted a 60-foot long cross in a public park in Neosho — the city opted to sell a chunk of the park to a private entity rather than remove the enormous religious symbol.

What do they mean when people say Capitalist or they say Socialist?

What do they mean when People say he/she is a Capitalist or he/she is a Socialist?

Capitalism is about being able to make as much money as you can legally. Billionaires, the .01% got there because of generational untaxed wealth, they also hid their money in offshore tax havens.

ICIJ’s investigations

Hidden in 11.5 million secret files are 140 politicians from more than 50 countries connected to offshore companies in 21 tax havens.

SUPPORT ICIJ
ICIJ’s investigations are supported by readers like you. If you believe journalism can help bring about positive change, join our ICIJ Insiders community by contributing $3 per month – or more!

Corporate Monopolies

#Amazon, #facebook, #Google, #Snapchat, #Instagram

got there through paying off the politicians who allowed antitrust law to atrophy.  Antitrust Law has not kept up with technology in 2020.

 

The politicians who equate Freedom with capitalism that supports monopolies are not taking care of the needs of America and democracy. They are voting their own business interests before that of welfare of 99% of the country.

United States Falls Deeper Into Corrupt Nation Status By Pam Martens: January 29, 2019
The U.S. is no longer in the top 10, or even the top 20, of least corrupt nations. Transparency International’s Corruption Perceptions Index for 2018 was released today and the United States has fallen four points deeper into corruption than last year. The U.S. now ranks below Luxembourg, Estonia and France, coming in at number 22 on the chart. In the Americas region, only Canada came in among the top 10 least corrupt nations, earning a number 9 ranking. (View the full list here.) Zoe Reiter, Acting Representative to the U.S. at Transparency International said this about the report: “A four point drop in the CPI score is a red flag and comes at a time when the US is experiencing threats to its system of checks and balances, as well as an erosion of ethical norms at the highest levels of power. If this trend continues, it would indicate a serious corruption problem in a country that has taken a lead on the issue globally. This is a bipartisan issue that requires a bipartisan solution.”

 

Senator Bernie Sanders Should Be Taken Very Seriously as a Presidential Candidate
By Pam Martens: February 21, 2019 ~

On Tuesday, Senator Bernie Sanders of Vermont declared his candidacy to seek the Democratic nomination for President of the United States.

Wall Street On Paradeendorsed Senator Sanders over Hillary Clinton in 2016because Clinton was effectively running as Wall Street’s candidate and as Obama’s third term. Unfortunately, eight years of Obama had produced zero criminal prosecutions of the executives of the largest Wall Street banks who had brought the country to its knees as they grew obscenely rich from corrupt, cartel behavior at their banks. Obama also seriously misinformed the American people about how little had changed in terms of reining in the risks on Wall Street. Obama also refused to provide a bully pulpit for breaking up the dangerous Wall Street banks by restoring the Glass-Steagall Act.

Bernie Sanders explains Democratic Socialism

GOP Pence attacks ‘socialism’

Mike Pence Secures the No Law Zone Around Wall Street By Pam Martens and Russ Martens: October 25, 2017 Millions of Americans have quietly been pondering for months what a President Mike Pence would be like should Donald Trump be impeached or resign. Yesterday they found out and it’s not a pretty picture. After the U.S. Senate tied 50-50 on a vote yesterday, Vice President Mike Pence cast the deciding vote to keep the nation’s courthouse doors closed to the customers of the Too-Big-to-Fail banks on Wall Street – effectively strengthening the no law zone that already exists for these banks. The vote came about as a result of the Consumer Financial Protection Bureau (CFPB) issuing its final rule in July which would allow consumers who have been defrauded in financial transactions involving credit cards and bank accounts to have access to file a group action (known legally as a “class action”) using the nation’s courts.

Senator Bernie Sanders’ Banking Bill and the Kavanaugh Confirmation By Pam Martens and Russ Martens: October 8, 2018

Last week when Senator Bernie Sanders introduced a new banking bill to break up the mega banks on Wall Street, he had this to say: “In our nation today, we are moving toward an oligarchic form of society where a small number of very wealthy individuals and large corporations have enormous control over our economic and political life. Today, we are in a country where three people, three of the wealthiest people, own more wealth than the bottom half of American society and 52 percent of all new income is going to the top 1 percent.” Sanders made this statement on October 3.

Just three days later, on October 6, a thoroughly discredited nominee for the U.S. Supreme Court, Brett Kavanaugh, who had the financial backing of a front group funded by billionaires Charles and David Koch, Americans for Prosperity, was installed on the U.S. Supreme Court. This marked a new milestone for the oligarchs. There was no longer any need to mount even a pretense of representative government. Kavanaugh’s confirmation was opposed by 2400 law professors from a wide array of universities; the National Council of Churches, which represents 100,000 congregations and over 40 million individuals; former Supreme Court Justice John Paul Stevens; and tens of thousands of Americans who protested in cities across the U.S.

In 2019, Wall Street Banks Will Determine the Future of America By Pam Martens: January 2, 2019

In short, Americans have gotten both the stock market and the government they deserve for failing to meaningfully reform both following the epic 2008 financial crash which pointed so clearly to unprecedented corruption on Wall Street and within the corridors of power in Washington.

Americans’ failure to demand real reform of what Senator Bernie Sanders has correctly called a business model of fraud on Wall Street means that those same behemoth Wall Street banks that crashed the financial system in 2008 are even more dangerous today. For its part, the Trump administration has become a willing enabler to Wall Street’s financial hubris by putting its former lawyer, Jay Clayton, in charge of the Securities and Exchange Commission and a former foreclosure king, Steven Mnuchin, in charge of the U.S. Treasury and the Financial Stability Oversight Council.

Wall Street banks have now grown so massive and interconnected that they are in a position to determine the very future of this nation. The big banks’ share prices are signaling that the day of reckoning is coming in 2019.

Wall Street Banks Are Trading in Their Own Company’s Stock: How Is This Legal? By Pam Martens and Russ Martens: February 15, 2017

House Oversight Committee

K12PlayGround.com Learn to recognize what is Real Fake

K12PlayGround.com FIND YOUR K12 SCHOOL AND SUBMIT /EDIT YOUR K12 SCHOOL INFORMATION

FOLLOW https://twitter.com/K12PlayGround.com bookmark and read it without subscribing to twitter.

FAKE

►”Covington Catholic is a perfect fit for a NYT Feature on how Trump’s message has resonated in this hardscrabble rural Kentucky high school riven with economic anxiety, except for its being located in a well-to-do suburb of Cincinnati and charging ten grand a year in tuition.”
Covington Catholic Teen Sues Washington Post for a Reasonable $250 Million

Crooks Created 28 Fake Ad Agencies to Disguise Massive Malvertising Campaign

Social Media Bots Fake Twitter / Instagram Followers are the business model that @Jack relies on for his advertising money.
American company named Devumi that has collected millions of dollars in a shadowy global marketplace for social media fraud. Devumi sells Twitter followers and retweets to celebrities, businesses and anyone who wants to appear more popular or exert influence online. Drawing on an estimated stock of at least 3.5 million automated accounts, each sold many times over, the company has provided customers with more than 200 million Twitter followers, a New York Times investigation found.
Of course Twitter policy doesn’t allow fake accounts but his company doesn’t get rid of fake bot accounts to keep his advertising money. It isn’t a code flaw it is a feature.
Court records showing that Devumi has more than 200,000 customers, including reality television stars, professional athletes, comedians, TED speakers, pastors and models.
For just pennies each — sometimes even less — Devumi offers Twitter followers, views on YouTube, plays on SoundCloud, the music-hosting site, and endorsements on LinkedIn, the professional-networking site.

The U.S. derivatives regulator is set to announce it has fined European lenders UBS, HSBC and Deutsche Bank millions of dollars each for so-called “spoofing” and manipulation in the U.S. futures market, three people with direct knowledge of the matter told Reuters.