"A city, like a book, can be read"
Characters who wanted MEdia Dragon hounded moan over being hounded Attractive, Funny and Rich
Mark Zuckerberg is a horror show. But there’s a glimmer of truth hidden in his latest blunder. Margaret Sullivan, WaPo
Australia comes in second place in latest UN digital gov rankings
The United Nations thinks we’re doing well at digital transformation — or everyone else is doing worse.
IN THE MAIL: The Courage to Be Disliked: The Japanese Phenomenon That Shows You How to Change Your Life and Achieve Real Happiness
Amar Singh is Victoria police's most wanted
Poynter has updated this very useful guide – Here’s where governments are taking action against online misinformation – subject matter includes hate speech law, misinformation. media literacy, fake news, election misinformation, political bots and advertising, foreign disinformation campaigns, media regulation, internet regulation.
Pew – As the #BlackLivesMatter hashtag turns 5 years old, a look at its evolution on Twitter and how Americans view social media’s impact on political and civic engagement: “This month marks the fifth anniversary of the #BlackLivesMatter hashtag, which was first coinedfollowing the acquittal of George Zimmerman in the shooting death of unarmed black teenager Trayvon Martin. In the course of those five years, #BlackLivesMatter has become an archetypal example of modern protests and political engagement on social media: A new Pew Research Center analysis of public tweets finds the hashtag has been used nearly 30 million times on Twitter – an average of 17,002 times per day – as of May 1, 2018
HONEY TRAP: Judge Orders Accused Russian Spy to Stay Behind Bars as DOJ Alleges Sex Offered for Political Influence
ABA Journal, ABA Reveals $1.3M Theft by a Now-Former Staff Member on Tax Form:
PGP encryption isn’t dead, despite the panic over EFAIL
Modern threats have emerged from the prevalence of social networks. Hostile actors, such as extremist groups or foreign governments, utilize these networks to run propaganda campaigns with different aims. For extremists, these campaigns are designed for recruiting new members or inciting violence. For foreign governments, the aim may be to create instability in rival nations. Proper social network counter-measures are needed to combat these threats. Here we present one important counter-measure: penetrating social networks. This means making target users connect with or follow agents deployed in the social network. Once such connections are established with the targets, the agents can influence them by sharing content which counters the influence campaign. In this work we study how to penetrate a social network, which we call the follow-back problem.
New tool helps you find 48,000+ open Amazon S3 buckets The Daily Swig: “Hundreds of thousands of potentially sensitive files are publically available through open Amazon buckets, a new online tool can reveal. The free tool, created by software engineer GrayhatWarfare, is a searchable database where a current list of 48,623 open S3 buckets can be found. Amazon’s S3 cloud storage, or Simple Storage Service, is used by the private and public sector alike as a popular way to cache content. Files are allocated buckets, which are secured and private by default, but can easily be set for public access. While it is perfectly acceptable to set S3 buckets as available for all to read, numerous data breaches have been the result of an administrator’s misconfiguration. In March of this year, for example, an unsecured bucket at a US-based jewelry company resulted in the exposure of the personal details of over 1.3 million people, including addresses, emails, and IP identifiers. Bob Diachenko of Kromtech Security was the first to report the incident, and has helped create a tool aimed at detecting bucket permissions, similar to the one created by GrayhatWarefare.
Bulletin of the Atomic Scientists – Putin: The one-man show the West doesn’t understand – Fiona Hill, Published online: 13 Apr 2016.
“The West is at an inflection point in its relations with Russia; the stakes for having an accurate understanding of its president, Vladimir Putin, have never been higher. A misreading of this man – now one of the most consequential international political figures and challengers to the US-led world order since the end of the Cold War – could have catastrophic consequences. Russia’s 8,000 nuclear weapons (and the vehicles to deliver them to any point on the globe) underscore the huge risks of not understanding who Putin is, what he wants, how he thinks, and why. Where do his ideas and conceptions come from?
The Data Transfer Project (DTP) “is a collaboration of organizations committed to building a common framework with open-source code that can connect any two online service providers, enabling a seamless, direct, user initiated portability of data between the two platforms. The Data Transfer Project was formed in 2017 to create an open-source, service-to-service data portability platform so that all individuals across the web could easily move their data between online service providers whenever they want. The contributors to the Data Transfer Project believe portability and interoperability are central to innovation. Making it easier for individuals to choose among services facilitates competition, empowers individuals to try new services and enables them to choose the offering that best suits their needs. Current contributors include: Facebook, Google, Microsoft and Twitter.
Mark Zuckerberg is a horror show. But there’s a glimmer of truth hidden in his latest blunder. Margaret Sullivan, WaPo
“I saw things children shouldn’t see” – surviving a troubled childhood Mosaic (CL). From June, still germane.
Australia comes in second place in latest UN digital gov rankings
The United Nations thinks we’re doing well at digital transformation — or everyone else is doing worse.
IN THE MAIL: The Courage to Be Disliked: The Japanese Phenomenon That Shows You How to Change Your Life and Achieve Real Happiness
Amar Singh is Victoria police's most wanted
Poynter has updated this very useful guide – Here’s where governments are taking action against online misinformation – subject matter includes hate speech law, misinformation. media literacy, fake news, election misinformation, political bots and advertising, foreign disinformation campaigns, media regulation, internet regulation.
Pew – As the #BlackLivesMatter hashtag turns 5 years old, a look at its evolution on Twitter and how Americans view social media’s impact on political and civic engagement: “This month marks the fifth anniversary of the #BlackLivesMatter hashtag, which was first coinedfollowing the acquittal of George Zimmerman in the shooting death of unarmed black teenager Trayvon Martin. In the course of those five years, #BlackLivesMatter has become an archetypal example of modern protests and political engagement on social media: A new Pew Research Center analysis of public tweets finds the hashtag has been used nearly 30 million times on Twitter – an average of 17,002 times per day – as of May 1, 2018
HONEY TRAP: Judge Orders Accused Russian Spy to Stay Behind Bars as DOJ Alleges Sex Offered for Political Influence
ABA Journal, ABA Reveals $1.3M Theft by a Now-Former Staff Member on Tax Form:
The
American Bar Association has posted a tax form that reveals a onetime
staff member diverted about $1.3 million from the ABA over a period of
eight years.
The ABA became aware of the theft by a nonmanagerial staff member last September, according to Form 990 (see page 118) and an interview with ABA Executive Director Jack Rives.
Penetrating a Social Network: The Follow-back Problem Fanyu Que,Krishnan Rajagopalan, Tauhid Zaman(Submitted on 8 Apr 2018)arXiv:1804.02608 [cs.SI] (orarXiv:1804.02608v1 [cs.SI] for this version)
PGP encryption isn’t dead, despite the panic over EFAIL
Press Release, Treasury Department and IRS Announce Significant Reform to Protect Personal Donor Information to Certain Tax-Exempt Organizations:
The
Treasury Department and IRS announced today that the IRS will no longer
require certain tax-exempt organizations to file
personally-identifiable information about their donors as part of their
annual return. The revenue procedure released today does not affect the
statutory reporting requirements that apply to tax-exempt groups
organized under section 501(c)(3) or section 527, but it relieves other
tax-exempt organizations of an unnecessary reporting requirement that
was previously added by the IRS.
New tool helps you find 48,000+ open Amazon S3 buckets The Daily Swig: “Hundreds of thousands of potentially sensitive files are publically available through open Amazon buckets, a new online tool can reveal. The free tool, created by software engineer GrayhatWarfare, is a searchable database where a current list of 48,623 open S3 buckets can be found. Amazon’s S3 cloud storage, or Simple Storage Service, is used by the private and public sector alike as a popular way to cache content. Files are allocated buckets, which are secured and private by default, but can easily be set for public access. While it is perfectly acceptable to set S3 buckets as available for all to read, numerous data breaches have been the result of an administrator’s misconfiguration. In March of this year, for example, an unsecured bucket at a US-based jewelry company resulted in the exposure of the personal details of over 1.3 million people, including addresses, emails, and IP identifiers. Bob Diachenko of Kromtech Security was the first to report the incident, and has helped create a tool aimed at detecting bucket permissions, similar to the one created by GrayhatWarefare.
“On the one hand, it [GrayhatWarfare’s tool] follows the same path as Shodan does,” Diachenko told The Daily Swig. “It gives researchers and the general audience a possibility to check if their infrastructure is safe. At the same time, it opens doors for ‘passwords-seekers’ and people with malicious intents to leverage upon data found in this ‘Semsem’ cave…”
Putin: The one-man show the West doesn’t understand
“The West is at an inflection point in its relations with Russia; the stakes for having an accurate understanding of its president, Vladimir Putin, have never been higher. A misreading of this man – now one of the most consequential international political figures and challengers to the US-led world order since the end of the Cold War – could have catastrophic consequences. Russia’s 8,000 nuclear weapons (and the vehicles to deliver them to any point on the globe) underscore the huge risks of not understanding who Putin is, what he wants, how he thinks, and why. Where do his ideas and conceptions come from?
The Data Transfer Project (DTP) “is a collaboration of organizations committed to building a common framework with open-source code that can connect any two online service providers, enabling a seamless, direct, user initiated portability of data between the two platforms. The Data Transfer Project was formed in 2017 to create an open-source, service-to-service data portability platform so that all individuals across the web could easily move their data between online service providers whenever they want. The contributors to the Data Transfer Project believe portability and interoperability are central to innovation. Making it easier for individuals to choose among services facilitates competition, empowers individuals to try new services and enables them to choose the offering that best suits their needs. Current contributors include: Facebook, Google, Microsoft and Twitter.
- How does it work – The Data Transfer Project uses services’ existing APIs and authorization mechanisms to access data. It then uses service specific adapters to transfer that data into a common format, and then back into the new service’s API. Learn More
- Why do we need DTP – Users should be in control of their data on the web, part of this is the ability to move their data. Currently users can download a copy of their data from most services, but that is only half the battle in terms of moving their data. DTP aims make move data between providers significantly easier for users.” Learn More