Pages

Thursday, March 22, 2018

Low and High of Latitude Folly: Da Theatre of Aggorance and Envy

The enemy of my enemy is my friend.  
~Arab Proverb


ESP's First Meeting Has Many Non Performers on Edge ...

‘The stickiness of any nudge, they conclude, will depend greatly on the context.’

The great management theorist, Tony Soprano, when confronted by his therapist about modifying his overbearing behavior, asked, “Then how do I get people to do what I want?”
In Dostoyevski’s most celebrated novel, The Brothers Karamazov, the character Ivan tells the tale of The Grand Inquisitor.  Encapsulated, it is the story of the second coming of the messiah during the Spanish Inquisition.  Alerted to His presence, the Inquisitor promptly imprisons Him.  His crime:  endangering the mystery of the church ( like mystery shit also rises to the top)

Massive Attack on MEdia Dragons the mud never sticks in the log run ;-) By Craig Murray




UN asks Samsung to explain reports of worker ‘intimidation’ Financial Times


We hang the petty thieves and appoint the great ones to public office. 
~ Aesop

In a view of recent scandals Cf. late 14th-cent. Fr. les petits larrons sont penduez, non pas les grands, little thieves are hanged, not big ones.
1639 J. CLARKE Parœmiologia Anglo-Latina 172 Little theeves are hangd, but great ones escape.

The big thieves hang the little ones.


'Constructive subversion': turning off workplace autopilot

cute snake linksSimon's  story, and its story within a story, starts with simple facts a boy's mother dies when he was Seven (7) years old, leaves school at sweet sixteen (16) works as a cleaner in the aboriginal settlements where destiny takes him to Cambridge ...

Simon Longstaff, executive director of The Ethics Centre – which helps advise corporate Australia – jokes he feels he's been trying to sell umbrellas in a drought for nearly 30 years. "Now it's drizzling," he told the AFR BOSS Leadership Summit


The purpose of the workshop was to explore different perspectives, possibilities and ethical reasoning styles, encourage a shared ethical framework to allow productive and effective dialogue, and explore case studies to further our understanding of ethical behaviour and leadership.

“The burden of choice means some people want others to take responsibility for their actions,” Dr Longstaff said.

“But better a world in which people think and take responsibility for their choices.”

Drawing from his experiences working with the Australian Defence Force, Simon encouraged the team to consider moral authority, and how humans commit acts of folly.

“For leaders, the projection of the moral authority of an institution becomes a key element,” Simon said.
The Tiger in the Room | International Grammar School Sydney

Serious students of history are likely to have been stimulated by Barbara Tuchman's excellent and provocative book, The March of Folly. Tuchman advances the thesis that history is replete with notable cases of large-scale and avoidable acts of folly. Indeed, an act of folly is defined by her as the wilful pursuit of a course of action, even though there is unambiguous, contemporary advice that to proceed is against self-interest and when a realistic alternative is available. In other words, the relevant act was seen to be folly at the time, and not just with the benefit of hind-sight. Set against this definition, Tuchman points to archetypical acts of folly including: the decision by the Trojans to take the wooden horse within their walls (despite the advice of Laocoon), the Renaissance Popes' provocation of the Protestant secession, British decisions, strategies and tactics leading to the loss of the North American colonies, and the USA's prosecution of the war in Vietnam – leading as it did to defeat. In each and every case, avoidable errors led to a disastrous outcome that could have been prevented.
I want to suggest that Australia, and business in particular, is perched on the edge of a precipice beyond which folly lies. It will seem curious to some that such a comment is made at a time when there are so many signs of renewed economic vigour, when employment statistics are improving, when exports are up and when company profits are mounting to record highs. 
The seeds of folly? - The Ethics Centre - Dr Simon Longstaff AO


The March of Folly: From Troy to Vietnam is a book by Barbara W. Tuchman, an American historian and author. It was published on St Jozef's Day Name, March 19, 1984, Orwell's Year, by Knopf in New York. Like MEdia Dragon, Barbara peppered her story with provocative examples explaining how foolish leadership produced disaster .... 

The March of Folly: From Troy to Vietnam: Barbara W. Tuchman: 9780345308238: Amazon.com: Books

The March of Folly: From Troy to Vietnam by Barbara W. Tuchman - Goodreads  

Australian Taxation Office calls in ethics doctor Simon Longstaff

With the Australian Taxation Office set to face unprecedented attention due to the forthcoming trial of former assistant deputy commissioner Michael Cranston on two counts of abusing public office, ethics expert Simon Longstaff of the St James Ethics Centre has been appointed to lead an internal review.
 

“The 2018 Edelman TRUST BAROMETER [Download the Global Results] reveals a world of seemingly stagnant distrust. People’s trust in business, government, NGOs and media remained largely unchanged from 2017 — 20 of 28 markets surveyed now lie in distruster territory, up one from last year. Yet dramatic shifts are taking place at the market level and within the institution of media.” Note – ‘distruster’ is new to me, but it sure works – especially in light of the following postings – Facebook, Cambridge Analytica, the 2016 Election, and a colossal misappropriation of social media data and Implications of Cambridge Analytica scandal widen in scope as do responses and associated revelations that keep on growing in magnitude.]

France: Nicolas Sarkozy Detained in Illegal Finance Probe | Time

  John Lennon, The World Is Run by Insane People    




The dark night of economic collapse is always descending in capitalist countries and yet lands only in the socialist ones 


The world is becoming like a lunatic asylum run by lunatics. - David Lloyd George
Older women in Japan shoplift in order to go to prison, where they find company, sustenance, reprieve from anxiety 
↩︎ Bloomberg 

Allison Christians (McGill), Jumping the Line or Out of the Net? Tax and the Immigrant Investor, 88 Tax Notes Int'l 357 (Oct. 23, 2017):  
Many countries seek to attract wealthy individuals — their capital, if not actually themselves — with programs that confer residence or citizenship in exchange for specified investments in local property or business ventures. Some programs simply facilitate jumping the immigration line, while other facilitate jumping out of the tax net in one country to land in another potentially more favorable.


Even if we want to avoid the site and keep our data protected, it’s not as easy as one might think. According to Roger McNamee, an early investor in Facebook, the company uses techniques found in propaganda and casino gambling to foster psychological addiction in its users – such as constant notifications and variable rewards. By keeping us hooked, Facebook is able to hold a huge amount of data on us. What is surprising, and worrying, is the derived data Facebook has – the profiles it can build of its users based on seemingly innocuous information. The author of the book Networks of Control, Wolfie Christl, noted that a patent published by Facebook works out people’s commute times by using location data from mobile apps. It then uses this and other data to segregate users into social classes. 
Facebook’s massive data cache goes hand in hand with its acquisition of competitors. Nick Srnicek, author of Platform Capitalism, says, “Facebook is acting like a classic monopoly: it’s buying up competitors like Instagram, it’s blatantly copying rivals like Snapchat, and it even has its own app, Onavo, that acts to warn them of potential threats. All of this is combined with an unchecked sweeping up of our data that’s being used to build an impervious moat around its business.” 


Public Troubled by ‘Deep Stat



One of the most interesting details to emerge from the Comey-McCabe Affair is the . . . er, tension between what McCabe has just said about who said what to whom and with what authority and the testimony of Comey before Congress under oath. In his post-firing  statement, McCabe said “I chose to share [information about the investigation into Hillary Clinton’s use of a private email server] with a reporter through my public affairs officer and a legal counselor. As deputy director, I was one of only a few people who had the authority to do that. It was not a secret, it took place over several days, and others, including the director, were aware of the interaction with the reporter” (my emphasis). 
But as Jonathan Turley reports at The Hill, “If the ‘interaction’ means leaking the information, then McCabe’s statement would seem to directly contradict statements Comey made in a May 2017 congressional hearing.”


CyberScoop  March 16, 2018
The neverending stream of high-profile, large scale data breaches has lawmakers searching for answers on how hackers are benefiting and how to stop them. At a hearing Thursday, the House Financial Services Subcommittee on Terrorism and Illicit Finance heard from experts about how to find and crack down on cybercriminals who are swiping and trading massive amounts of individuals’ compromised private information. “The victim of a breach can become a victim repeatedly as their identity can be used to apply for credit cards, mortgages, and other financial products over and over again,” subcommittee Chairman Steve Pearce, R-N.M., said. “Unfortunately, this activity is only becoming more widespread as criminal organizations realize the low cost of entry, the ease of using hacking tools, and the difficulty law enforcement faces trying to apprehend hackers.”

New report: German-African research linking illicit and criminal financial flows with global poverty



Public sector employees in the U.S. have little concern about their personal cybersecurity responsibilities, according to a survey. Just 13 percent of government employees believe they have complete personal responsibility for the security of their work devices or information, the report carried out by analytics firm YouGov and published by security firm Dtex Systems said. Forty-eight percent of those surveyed said they had no responsibility at all, believing the securing of data to be squarely the remit of IT professionals. Roughly half of respondents believed that being hacked was inevitable no matter what protective measures they took, while 43 percent simply didn't believe they could be hacked. Few people surveyed seemed to take seriously the likelihood and frequency of cyber threats — one in three employees believed they were more likely to be struck by lightning than have their work data compromised.




Nextgov March 16, 2018

There are weaknesses in six out of the FBI’s seven information security domains, according to an independent auditor that recommended 38 separate fixes. The findings were only released in a brief summary because of concerns hackers might capitalize on them. The summary is the most recent in the annual cascade of agency compliance reports with the Federal Information Security Management Act, the main law governing government cyber protections. Because the audit, performed by the consultant KPMG, does not provide many details, it’s impossible to assess the severity of the agency’s weaknesses or the urgency of the report’s recommendations. The FBI is responsible for investigating major cyber crimes. The bureau also stores sensitive information about investigations, personnel files and background investigations for top government officials.
 



The Department of Interior is vulnerable to the theft of sensitive data, unprepared to detect and deal with cyber threats and failing to keep users on its computer network from visiting —downloading materials from — illicit websites, according to a new watchdog report. During testing at a U.S. Geological Survey facility as part of a department-wide audit, Interior's inspector general identified a "workstation attempting to communicate with IP addresses of known malware command and control website in Russia." The machine, Interior later determined, had been compromised. Inappropriate and risky network behavior occurred undetected, auditors found, due to deficiencies and inconsistencies in Interior's Office of the CIO incident response program. Rep. Elijah Cummings (D-Md.), the ranking member of the House Oversight and Government Reform Committee, said the findings "are symptomatic of a much broader problem," pointing to the White House's proposed multi-billion-dollar cuts to many civilian agencies.




The Detroit News March 16, 2018

A Michigan department tasked with managing the state’s vast computer network did not follow best practices to limit access, respond to vulnerabilities, test risks or update firewalls to protect data and equipment from cyber threats, according to a critical new state audit. The three-year review by the Office of Auditor General, which concluded last fall, uncovered a series of “material conditions,” the most severe description of a problem used by state auditors. The Department of Technology Management and Budget told auditors it has already made some improvements. And a spokesman told The Detroit News that “the data held within the state government network is safe and secure due to the many layers of protection in our security ecosystem.” Recommendations by auditors included additional “phishing” exercises to measure the effectiveness of cyber security awareness training for state employees, which can reduce the risk of identity theft, unauthorized account use, stolen information and “damage to credibility, all which may take years for an organization to fully recover.”
  



CNN

March 10, 2018

Whether it's an attack on the banking infrastructure or disinformation campaigns on social media, the United States is "woefully unprepared" to combat cyber attacks and disinformation campaigns, Senator Mark Warner said on Saturday. Speaking at the SXSW festival, Warner said it's time to consider the liability of tech platforms and software makers. Warner, the top Democrat on the Senate Select Intelligence Committee, outlined a four-part "cyberdoctrine," actions the government could take to address cybersecurity threats. He suggested the establishment of basic rules for cyber aggressions, like those in place for nuclear weapons. Warner also called for using the government's purchasing power to force tech product makers to adopt security standards, and said the United States should reallocate some defense resources into the cyber domain. "One of the things I want to do is bring together parliamentarians of all the Western nations that have been attacked," he said. "The West ought to start seeing if we can get some commonality," around cybersecurity efforts.




CyberScoop
March 16, 2018
A leader of the Securities and Exchange Commission says that corporations need to do more to protect investors from financial damages caused by data beaches. Speaking at Tulane University’s Corporate Tulane Law School on Thursday, SEC Commissioner Robert Jackson plainly stated that American companies are “under attack” from hackers. “The cyberthreat is not primarily a regulatory issue any more than it is primarily a technological issue. Cybercrime is an enterprise-level risk that will require an interdisciplinary approach, significant investments of time and talent by senior leadership and board-level attention,” Jackson said. The SEC issued updated guidance last month for how companies should approach the issue of breach disclosure. Jackson said that he only reluctantly joined the guidance because it leaves too much discretion to corporate counsel to decide whether investors should be informed of an incident.