“You were hit by a truck and you were lying there in that gutter — dying — and you had time to sing one song. One song people would remember before you’re dirt. One song that would sum you up. You’re telling me that’s the song you’d sing? That same Jimmy Davis tune we hear on the radio all day… about your peace within, and how it’s real and how you’re gonna shout it? Or, would you sing something different? Something real. Something you felt. ‘Cause I’m telling you right now, that’s the kind of song people want to hear. That’s the kind of song that truly saves people. It ain’t got nothing to do with believing in God, mister Cash. It’s got to do with believing in yourself.”
The Subtle and Not-So-Subtle Force of Ageism
“So
often, I see signs that they’re looking for someone younger. Ads ask
for ‘digital natives’ and people who ‘live, eat, and dream social
media.’”
Why political leaders want to connect informally with everyday people
RESEARCH: The call for politicians to ‘get real’ and ‘go public’ is more than just about winning elections. Officials can design engagement spaces to better suit the needs of citizens and decision-makers.
It’s Now Possible To Telepathically Communicate with a Drone Swarm Defense One
Police say Nigerian national Fisayo Oluwafemi ran a ... scam he was running from inside Sydney's Villawood Detention Centre.
Police arrested people at Villawood, Granville and Chester Hill during raids to crack an email scam.
With cryptocurrency fraud and IRS scams making headlines, I had thought Nigerian email ...
A Top Goldman Banker Raised Ethics Concerns. Then He Was Gone. NYT
Engadget – We requested our personal information from dozens of companies. Here’s what they gave us — and what they didn’t: “The average American, one study tell us, touches their phone 2,600 times per day. By the end of a given year, that’s nearly a million touches, rising to two million if you’re a power user. Each one of those taps, swipes and pulls is a potential proxy for our most intimate behaviors. Our phones are not only tools that help us organize our day but also sophisticated monitoring devices that we voluntarily feed with interactions we think are private. The questions we ask Google, for instance, can be more honest than the ones we ask our loved ones — a “digital truth serum,” as ex-Googler and author Seth Stephens-Davidowitz writes in Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are. Hoover up these data points and combine them with all of our other devices — smart TVs, fitness trackers, cookies that stalk us across the web — and there exists an ambient, ongoing accumulation of our habits to the tune of about 2.5 quintillion (that’s a million trillion) bytes of data per day. Sometimes that data gets spliced, scattered and consolidated across a web of collaborators, researchers and advertisers. Acxiom, for instance, claims 1,500 data points for each of the 500 million people in its database, including most US adults. Just in the past few months, Facebook was reported to have asked hospitals, including Stanford University School of Medicine, to share and integrate patients’ medical data with its own (the research project has since been put on hold). In April, gay dating app Grindr was revealed to have shared customers’ HIV status with two app-optimization companies. And who suspected completing an online personality test would pave the way for President Donald Trump’s targeted political advertising?…”Seventeen years after Sept. 11, Al Qaeda may be stronger than ever Los Angeles Times. Is the center ready to handle national securityIs the next financial crisis already brewing? Nouriel Roubini, FT
Presented by Tony Poulakis, Assistant Commissioner (Phoenix and Refund Fraud) Australian Taxation Office April ...
In 2014, Ruben Bolling created an updated version of Richard Scarry’s Busytown (as seen in What Do People Do All Day? and Busy, Busy Town) populated with workers with job descriptions like climate change denier, content aggregator, and rage pundit. At Topic, Bolling has updated the activities of Busytown residents for 2018.
“There’s no precedent to look to regarding the top-selling artist of the digital era becoming a total free agent.” - Variety
The worker who can concentrate,
Lose himself in the hardest task,
Scrapes up time at double the rate,
Creating what? He doesn't ask.
Muscles are meant for heat and toil,
The eyes for precise measurement,
The voice for whispering contempt,
Listening, for the night bell's toll.
It takes a man to scrape a floor.
(God offers no alternative.)
He will go to bed drunk and sore,
Not knowing what it means to live.
The half-finished floorboards await
The restoration of their fate.
Gizmodo: “Openly recognizing their companies’ past failures in rare displays of modesty, Facebook and Twitter executives touted new efforts to combat state-sponsored propaganda across their platforms before the Senate Intelligence Committee on Wednesday, acknowledging that the task is often “overwhelming” and proving a massive drain on their resources. Despite frequent and contradictory remarks by President Donald Trump, America’s top national security officials have continued to warn of ongoing foreign influence operations aimed at the 2018 and 2020 U.S. elections.
GPO grapples with ‘Keeping America Informed’ in the digital information age
Nextgov
September
7, 2018
The risks
to the IT systems that underpin the nation’s critical infrastructure “are
increasing,” upping the odds of a successful cyberattack, according to a report
from the Government Accountability Office. The report identifies four major
cybersecurity challenges and 10 critical actions the federal government needs
to take to secure the nation’s energy grids, transportation systems, dams or
financial institutions, but it takes a dim view of the government’s past
actions shoring these systems up.
The New
York Times
September
6, 2018
House
Republicans withdrew on Thursday from negotiations with Democrats over a pact
that would have effectively barred both parties from using hacked or stolen
material on the campaign trail this fall. Leaders of the National Republican
Congressional Committee, the campaign arm of House Republicans, and their
counterparts at the Democratic Congressional Campaign Committee had labored for
much of the summer over rules that would have governed the way the
congressionally run committees and their candidates treated material like the
thousands of pages of damaging Democratic documents stolen and leaked by
Russian hackers in 2016.
CyberScoop
September
5, 2018
The House
of Representatives on Wednesday passed a bipartisan bill aimed at deterring
foreign governments from conducting hacking operations against U.S. critical
infrastructure. The Cyber Deterrence and Response Act put forth by Rep. Ted
Yoho, R-Fla., calls on the president to identify individuals and organizations
engaged in state-sponsored hacking that significantly threatens U.S. interests,
and then to impose one or more of a slew of sanctions on them. That “naming and
shaming” approach is an effort to ward off future cyberattacks from China,
Russia, Iran, and North Korea — four countries that U.S. officials routinely
label as top adversaries in cyberspace.
Inside
Cybersecurity
September
5, 2018
Streamlining
congressional oversight of cybersecurity policy, creating a high-level “cyber
director” role at the White House and -- of course -- closer scrutiny of Trump
administration cyber efforts will top the priority list if Democrats take the
House in November, according to one key Democratic lawmaker.
CyberScoop
September
5, 2018
he House
passed two bills Tuesday that aim to bolster the Department of Homeland
Security’s cybersecurity efforts as they relate to securing the agency’s own
vendor supply chain as well as securing other federal agencies’ networks. Both
bills now head to the Senate.
AP
September
4, 2018
Just two
months before the midterm elections, bipartisan legislation to try to prevent
foreign hacking into U.S. election systems is stalled in Congress as the White
House and some Republicans worry it could exert too much federal control over
the states.
ADMINISTRATION
Bloomberg
September
7, 2018
The Trump
administration is considering imposing sanctions on Chinese entities caught
stealing U.S. intellectual property via cyber attacks, three people familiar
with the matter said. The plan being discussed would use an Obama
administration executive order that allows the U.S. to impose sanctions on
individuals or entities engaging in “malicious cyber-enabled activities.”
Nextgov
Within
Vicki Hildebrand’s first three months as chief information officer of the
Transportation Department in 2017 and 2018, various component agencies were hit
with three separate ransomware attacks. .
CyberScoop
September
7, 2018
The U.S.
has announced the extradition of accused Russian hacker Andrei Tyurin from the
nation of Georgia for his alleged role in a hacking campaign against American
financial institutions, according to the Department of Justice.
FCW
September
6, 2018
Electrical
grid providers and the federal government should develop collaborative response
templates to handle cyber and physical attacks on power supply infrastructure,
according to a new study by a member of the Homeland Security Advisory Council
and grid expert.
The
Washington Post
September
5, 2018
Cyberweapons
and sophisticated hacking pose a greater threat to the United States than the
risk of physical attacks, Homeland Security Secretary Kirstjen Nielsen said
Wednesday while urging state election officials to add more safeguards to their
voting systems
CyberScoop
September
5, 2018
Hackers
sponsored by foreign governments have chipped away at the United States’ global
economic advantage through a steady campaign of intellectual property theft,
according to a top National Security Agency official.
Fifth
Domain
September 4,
2018
The
Department of Homeland Security named Robert Kolasky as head of the new
National Risk Management Center, part of a larger emphasis from the Trump
administration on working with the private sector to halt cyberattacks.
INDUSTRY
Gov Info
Security
September
7, 2018
British
Airways is warning customers that it suffered a hack attack that compromised up
to 380,000 customers' payment cards as well as personal data over a 15-day period.
The
Washington Post
September
7, 2018
Sonatype, a
Maryland-based cybersecurity company, announced Friday that it has raised $80
million from investors.
Cyberscoop
September
6, 2018
o ahead and
hack that car in peace. In a move greeted happily by cybersecurity researchers
around the world, the electric-automobile company Tesla announced that hacking
the company’s software as part of “good-faith security research” will not void
your warranty.
Gov Info
Security
September
6, 2018
Unknown
attackers are intercepting every piece of data handled by more than 7,500
routers made by MikroTik, while also using another 239,000 compromised routers
to serve as proxies, according to new research from 360's Network Security
Research Lab.
The Hill
September
5, 2018
Private
companies are stepping up to offer cybersecurity programs for midterm campaigns
as Congress stalls on passing election security legislation.
Infosecurity
Magazine
September
5, 2018
Celebrating
the success of this year’s live hacking event, HackerOne (H1) recently
announced that more than $500,000 was paid in bounties during the third annual
h1-702 at DEF CON 26 in Las Vegas last month.
The Wall
Street Journal
September
4, 2018
Hackers are
constantly probing for “the one flaw overlooked” in Houston’s computer
networks, the official responsible for safeguarding the fourth-largest U.S.
city’s system said. “Compromise is inevitable,” said Christopher Mitchell,
chief information security official, at a Houston City Council hearing last
month.
Inside
Cybersecurity
September
4, 2018
It's been a
year since the massive Equifax data breach was revealed, but Congress and
federal agencies appear stuck in neutral when it comes to crafting a policy
response that would address cybersecurity requirements for consumer credit
agencies, including breach-notice and related issues.
INTERNATIONAL
The
Washington Post
September 6,
2018
The Justice
Department announced charges Thursday against an alleged hacker for the North
Korean government in connection with a series of major cyberattacks including
the 2014 assault on Sony Pictures Entertainment, marking the first time the
United States has brought such charges against a Pyongyang operative.
Reuters
September
4, 2018
A growing
number of countries can hack into private computer networks and install
malicious software to sabotage another country’s infrastructure, Germany’s
domestic spy chief said. China, Russia and other countries continued to try to
break into German companies’ computers to steal valuable industrial
information, Hans-Georg Maassen, head of the BfV domestic intelligence agency,
told a security conference.
FCW
September
3, 2018
Over the past year, U.S. policymakers have paid increasing attention to
threats facing the technology supply chain from foreign intelligence agencies.
New evidence of a Chinese hacking group's links to Beijing could give law
enforcement investigators and members of the new ammunition to crack down on
economic espionage and threats to the technology supply chain.
AP
September
6, 2018
An expert
panel of the National Academy of Sciences called for fundamental reforms to
ensure the integrity of the U.S. election system, which is handicapped by
antiquated technology and under stress from foreign destabilization efforts.
Couple’s disturbing Airbnb discovery
A COUPLE was horrified to find a hidden spy camera in a clock which was pointed at the bed in their Airbnb apartment.
Dougie Hamilton, from Glasgow, Scotland was on holiday in Toronto, Canada, with his girlfriend when he made the chilling discovery.
The 34-year-old informed Airbnb right away, and bosses have said they will launch an investigation.
Facebook Source:
Supplied Source:
Mr Hamilton told the Daily
Record: “We were only in the place for 20 minutes
when I noticed the clock. We’d had a busy day around the city and finally were
able to get to the Airbnb and relax.“I just happened to be facing this clock and was staring at it for about 10 minutes. There was just something in my head that made me feel a bit uneasy.
“It was connected to a wire like a phone charger which wasn’t quite right. The weirdest thing was, I’d seen a video on Facebook about cameras and how they could be hidden and they had a clock with one in it, too.”— Read more