~Arab Proverb
ESP's First Meeting Has Many Non Performers on Edge ...
‘The stickiness of any nudge, they conclude, will depend greatly on the context.’
The great management theorist, Tony Soprano, when confronted by his therapist about modifying his overbearing behavior, asked, “Then how do I get people to do what I want?”
In Dostoyevski’s most celebrated novel, The Brothers Karamazov, the character Ivan tells the tale of The Grand Inquisitor. Encapsulated, it is the story of the second coming of the messiah during the Spanish Inquisition. Alerted to His presence, the Inquisitor promptly imprisons Him. His crime: endangering the mystery of the church ( like mystery shit also rises to the top)Massive Attack on MEdia Dragons the mud never sticks in the log run ;-) By Craig Murray
OF COURSE ADRIAN AND INC DO: Under Fire And Losing Trust, Facebook Plays The Victim.
UN asks Samsung to explain reports of worker ‘intimidation’ Financial Times
We hang the petty thieves and appoint the great ones to public office.
~ Aesop
In a view of recent scandals Cf. late 14th-cent. Fr. les petits larrons sont penduez, non pas les grands, little thieves are hanged, not big ones.
We hang the petty thieves and appoint the great ones to public office.
~ Aesop
In a view of recent scandals Cf. late 14th-cent. Fr. les petits larrons sont penduez, non pas les grands, little thieves are hanged, not big ones.
1639 J. CLARKE Parœmiologia Anglo-Latina 172 Little theeves are hang’d, but great ones escape.
The big thieves hang the little ones.
Simon's story, and its story within a story, starts with simple facts a boy's mother dies when he was Seven (7) years old, leaves school at sweet sixteen (16) works as a cleaner in the aboriginal settlements where destiny takes him to Cambridge ...
Simon Longstaff, executive director of The Ethics Centre – which helps advise corporate Australia – jokes he feels he's been trying to sell umbrellas in a drought for nearly 30 years. "Now it's drizzling," he told the AFR BOSS Leadership Summit
The purpose of the workshop was to explore different perspectives, possibilities and ethical reasoning styles, encourage a shared ethical framework to allow productive and effective dialogue, and explore case studies to further our understanding of ethical behaviour and leadership.
“The burden of choice means some people want others to take responsibility for their actions,” Dr Longstaff said.
“But better a world in which people think and take responsibility for their choices.”
Drawing from his experiences working with the Australian Defence Force, Simon encouraged the team to consider moral authority, and how humans commit acts of folly.
“For leaders, the projection of the moral authority of an institution becomes a key element,” Simon said.
The Tiger in the Room | International Grammar School Sydney Serious students of history are likely to have been stimulated by Barbara Tuchman's excellent and provocative book, The March of Folly. Tuchman advances the thesis that history is replete with notable cases of large-scale and avoidable acts of folly. Indeed, an act of folly is defined by her as the wilful pursuit of a course of action, even though there is unambiguous, contemporary advice that to proceed is against self-interest and when a realistic alternative is available. In other words, the relevant act was seen to be folly at the time, and not just with the benefit of hind-sight. Set against this definition, Tuchman points to archetypical acts of folly including: the decision by the Trojans to take the wooden horse within their walls (despite the advice of Laocoon), the Renaissance Popes' provocation of the Protestant secession, British decisions, strategies and tactics leading to the loss of the North American colonies, and the USA's prosecution of the war in Vietnam – leading as it did to defeat. In each and every case, avoidable errors led to a disastrous outcome that could have been prevented.
I want to suggest that Australia, and business in particular, is perched on the edge of a precipice beyond which folly lies. It will seem curious to some that such a comment is made at a time when there are so many signs of renewed economic vigour, when employment statistics are improving, when exports are up and when company profits are mounting to record highs. The seeds of folly? - The Ethics Centre - Dr Simon Longstaff AO
The March of Folly: From Troy to Vietnam is a book by Barbara W. Tuchman, an American historian and author. It was published on St Jozef's Day Name, March 19, 1984, Orwell's Year, by Knopf in New York. Like MEdia Dragon, Barbara peppered her story with provocative examples explaining how foolish leadership produced disaster ....
The March of Folly: From Troy to Vietnam: Barbara W. Tuchman: 9780345308238: Amazon.com: Books
The March of Folly: From Troy to Vietnam by Barbara W. Tuchman - Goodreads
Australian Taxation Office calls in ethics doctor Simon Longstaff
With
the Australian Taxation Office set to face unprecedented attention due
to the forthcoming trial of former assistant deputy commissioner Michael
Cranston on two counts of abusing public office, ethics expert Simon
Longstaff of the St James Ethics Centre has been appointed to lead an
internal review.
“The 2018 Edelman TRUST BAROMETER [Download the Global Results] reveals a world of seemingly stagnant distrust. People’s trust in business, government, NGOs and media remained largely unchanged from 2017 — 20 of 28 markets surveyed now lie in distruster territory, up one from last year. Yet dramatic shifts are taking place at the market level and within the institution of media.” Note – ‘distruster’ is new to me, but it sure works – especially in light of the following postings – Facebook, Cambridge Analytica, the 2016 Election, and a colossal misappropriation of social media data and Implications of Cambridge Analytica scandal widen in scope as do responses and associated revelations that keep on growing in magnitude.]
France: Nicolas Sarkozy Detained in Illegal Finance Probe | Time
John Lennon, The World Is Run by Insane People
The dark night of economic collapse is always descending in capitalist countries and yet lands only in the socialist ones
Older women in Japan shoplift in order to go to prison, where they find company, sustenance, reprieve from anxietyWhy Goldman Sachs alums go into government NY Post. Good pointFOOD STAMPS CUTS COULD HIT RURAL AMERICA HARDEST Daily YonderGreece’s golden visa program under fire Handelsblatt
↩︎ Bloomberg
Allison Christians (McGill), Jumping the Line or Out of the Net? Tax and the Immigrant Investor, 88 Tax Notes Int'l 357 (Oct. 23, 2017):
Many countries seek to attract wealthy individuals — their capital, if not actually themselves — with programs that confer residence or citizenship in exchange for specified investments in local property or business ventures. Some programs simply facilitate jumping the immigration line, while other facilitate jumping out of the tax net in one country to land in another potentially more favorable.
ANALYSIS: TRUE. No one can pretend Facebook is just harmless fun any more
Even if we want to avoid the site and keep our data protected, it’s not as easy as one might think. According to Roger McNamee, an early investor in Facebook, the company uses techniques found in propaganda and casino gambling to foster psychological addiction in its users – such as constant notifications and variable rewards. By keeping us hooked, Facebook is able to hold a huge amount of data on us. What is surprising, and worrying, is the derived data Facebook has – the profiles it can build of its users based on seemingly innocuous information. The author of the book Networks of Control, Wolfie Christl, noted that a patent published by Facebook works out people’s commute times by using location data from mobile apps. It then uses this and other data to segregate users into social classes.Facebook’s massive data cache goes hand in hand with its acquisition of competitors. Nick Srnicek, author of Platform Capitalism, says, “Facebook is acting like a classic monopoly: it’s buying up competitors like Instagram, it’s blatantly copying rivals like Snapchat, and it even has its own app, Onavo, that acts to warn them of potential threats. All of this is combined with an unchecked sweeping up of our data that’s being used to build an impervious moat around its business.”
Public Troubled by ‘Deep Stat
One of the most interesting details to emerge from the Comey-McCabe Affair is the . . . er, tension between what McCabe has just said about who said what to whom and with what authority and the testimony of Comey before Congress under oath. In his post-firing statement, McCabe said “I chose to share [information about the investigation into Hillary Clinton’s use of a private email server] with a reporter through my public affairs officer and a legal counselor. As deputy director, I was one of only a few people who had the authority to do that. It was not a secret, it took place over several days, and others, including the director, were aware of the interaction with the reporter” (my emphasis).But as Jonathan Turley reports at The Hill, “If the ‘interaction’ means leaking the information, then McCabe’s statement would seem to directly contradict statements Comey made in a May 2017 congressional hearing.”
CyberScoop March 16,
2018
The
neverending stream of high-profile, large scale data breaches has lawmakers
searching for answers on how hackers are benefiting and how to stop them. At a
hearing Thursday, the House Financial Services Subcommittee on Terrorism and
Illicit Finance heard from experts about how to find and crack down on
cybercriminals who are swiping and trading massive amounts of individuals’
compromised private information. “The victim of a breach can become a victim
repeatedly as their identity can be used to apply for credit cards, mortgages,
and other financial products over and over again,” subcommittee Chairman Steve
Pearce, R-N.M., said. “Unfortunately, this activity is only becoming more
widespread as criminal organizations realize the low cost of entry, the ease of
using hacking tools, and the difficulty law enforcement faces trying to
apprehend hackers.”
New report: German-African research linking illicit and criminal financial flows with global poverty
Only
13 percent of government employees take personal responsibility for
cybersecurity, survey finds
CNBC March 16,
2018
Public
sector employees in the U.S. have little concern about their personal
cybersecurity responsibilities, according to a survey. Just 13 percent of
government employees believe they have complete personal responsibility for the
security of their work devices or information, the report carried out by
analytics firm YouGov and published by security firm Dtex Systems said.
Forty-eight percent of those surveyed said they had no responsibility at all,
believing the securing of data to be squarely the remit of IT professionals.
Roughly half of respondents believed that being hacked was inevitable no matter
what protective measures they took, while 43 percent simply didn't believe they
could be hacked. Few people surveyed seemed to take seriously the likelihood
and frequency of cyber threats — one in three employees believed they were more
likely to be struck by lightning than have their work data compromised.
Nextgov March 16,
2018
There are
weaknesses in six out of the FBI’s seven information security domains,
according to an independent auditor that recommended 38 separate fixes. The
findings were only released in a brief summary because of concerns hackers
might capitalize on them. The summary is the most recent in the annual cascade
of agency compliance reports with the Federal Information Security Management
Act, the main law governing government cyber protections. Because the audit,
performed by the consultant KPMG, does not provide many details, it’s
impossible to assess the severity of the agency’s weaknesses or the urgency of
the report’s recommendations. The FBI is responsible for investigating major
cyber crimes. The bureau also stores sensitive information about
investigations, personnel files and background investigations for top
government officials.
FCW March 14,
2018
The
Department of Interior is vulnerable to the theft of sensitive data, unprepared
to detect and deal with cyber threats and failing to keep users on its computer
network from visiting —downloading materials from — illicit websites, according
to a new watchdog report. During testing at a U.S. Geological Survey facility
as part of a department-wide audit, Interior's inspector general identified a
"workstation attempting to communicate with IP addresses of known malware
command and control website in Russia." The machine, Interior later
determined, had been compromised. Inappropriate and risky network behavior
occurred undetected, auditors found, due to deficiencies and inconsistencies in
Interior's Office of the CIO incident response program. Rep. Elijah Cummings
(D-Md.), the ranking member of the House Oversight and Government Reform
Committee, said the findings "are symptomatic of a much broader
problem," pointing to the White House's proposed multi-billion-dollar cuts
to many civilian agencies.
The
Detroit News March 16,
2018
A Michigan
department tasked with managing the state’s vast computer network did not
follow best practices to limit access, respond to vulnerabilities, test risks
or update firewalls to protect data and equipment from cyber threats, according
to a critical new state audit. The three-year review by the Office of Auditor
General, which concluded last fall, uncovered a series of “material
conditions,” the most severe description of a problem used by state auditors.
The Department of Technology Management and Budget told auditors it has already
made some improvements. And a spokesman told The Detroit News that “the data
held within the state government network is safe and secure due to the many
layers of protection in our security ecosystem.” Recommendations by auditors
included additional “phishing” exercises to measure the effectiveness of cyber
security awareness training for state employees, which can reduce the risk of
identity theft, unauthorized account use, stolen information and “damage to
credibility, all which may take years for an organization to fully recover.”
CNN
March 10,
2018
Whether
it's an attack on the banking infrastructure or disinformation campaigns on
social media, the United States is "woefully unprepared" to combat
cyber attacks and disinformation campaigns, Senator Mark Warner said on
Saturday. Speaking at the SXSW festival, Warner said it's time to consider the
liability of tech platforms and software makers. Warner, the top Democrat on
the Senate Select Intelligence Committee, outlined a four-part
"cyberdoctrine," actions the government could take to address
cybersecurity threats. He suggested the establishment of basic rules for cyber
aggressions, like those in place for nuclear weapons. Warner also called for
using the government's purchasing power to force tech product makers to adopt
security standards, and said the United States should reallocate some defense
resources into the cyber domain. "One of the things I want to do is bring
together parliamentarians of all the Western nations that have been
attacked," he said. "The West ought to start seeing if we can get
some commonality," around cybersecurity efforts.
CyberScoop
March 16,
2018
A leader of
the Securities and Exchange Commission says that corporations need to do more
to protect investors from financial damages caused by data beaches. Speaking at
Tulane University’s Corporate Tulane Law School on Thursday, SEC Commissioner
Robert Jackson plainly stated that American companies are “under attack” from
hackers. “The cyberthreat is not primarily a regulatory issue any more than it
is primarily a technological issue. Cybercrime is an enterprise-level risk that
will require an interdisciplinary approach, significant investments of time and
talent by senior leadership and board-level attention,” Jackson said. The SEC
issued updated guidance last month for how companies should approach the issue
of breach disclosure. Jackson said that he only reluctantly joined the guidance
because it leaves too much discretion to corporate counsel to decide whether
investors should be informed of an incident.