Everything is Broken Medium. Brian C: “In light of the recent hacking stories in the news, I thought it would be a good time to share one of my favorite blog posts of all time. I have been reading about information technology and working with it since about 1974, and I have never found a narrative that so perfectly captures my personal observations of the state of computer technology today.”
The leader of a gang of Nigerian business email compromise and romance scammers, who headed a network of at least 40 criminals, has been arrested and his operation disbanded, according to Interpol. A 40-year-old Nigerian known as "Mike" was arrested by local police in June along with a 38-year old accomplice in Port Harcourt, in the south of the African nation, Interpol said. The pair face charges of hacking, conspiracy and obtaining money under false pretences, and are on administrative bail as police continue the investigation. Aussie businesses hit hard by busted Nigerian email scam ring
Residents are being warned to keep their guard up against bogus callers as a spate of phone scams hits the Gold Coast... Second Commissioner Mr Geoff Leeper said the tax office was very concerned about taxpayer privacy and he reminded people of the key differences between a scam of this nature and a genuine call from the ATO.
“We would never cold call you about a debt, we would never threaten jail or arrest, and our staff certainly wouldn’t behave in an aggressive manner,” he said. “If you have a debt, we will write to you first. If we do ring you, our staff will identify themselves and let you know how you can call us back using our publicly listed phone number. “If the person calling you is rude and aggressive, threatening police or legal action if you don’t do something immediately, it’s not the ATO.”
Mr Leeper said a person’s tax agent would be able to confirm claims of a debt.
“We will never request the payment of a tax debt via gift or prepaid cards such as iTunes and Visa cards. Nor will we ask for direct credit to be paid to a personal bank account,” he said. “If you’re not sure (about a caller), hang up and call us back on 1800 008 540.”
Gold Coast elderly targeted by Unitycare and ATO scammers
Geoff Leeper from the Client Identity Unit to fight identity fraud. Photo: Lyn Mills
The US Department of Justice has a battle on its hands, as dozens of lawyers question evidence the FBI obtained using hacking techniques across a string of ongoing cases. In 2015, the FBI used a piece of malware to identify suspected visitors of a dark web child pornography site. Now, nearly 30 legal teams across the country have pushed to get all evidence thrown out of court, and many attorneys have decided to pool their efforts in a “national working group.” The cases revolve around Operation Pacifier, in which the FBI briefly assumed control of the “Playpen” website.
Hacker puppets explain how they find your passwords in non-technical ways
Hack the State Mike Bracken Orders Public Servants
GovHack was originally an Australian initiative by Web Directions. They ran the first GovHack in 2009 which was funded by the Gov 2.0 Taskforce as part of their MashUp Australia initiative.
GovHack is a two-day event held simultaneously around Australia to create working prototypes with government data, and to help find new ways to solve the challenges facing government and contributes towards social and economic development. GovHack includes a number of locations around Australia with participation from federal, state and local governments.
This is a non-profit event proudly run by a team of passionate volunteers and mentors that collaborate from all corners of Australia and New Zealand to form the GovHack Coordination Team GovHackthon 2016 ; A series of sample files of individual tax return information for more advanced users Australian taxation office taxation statistics individual sample files
Discovery and Reuse of Open Datasets: An Exploratory Study – Sara Mannheimer, Montana State University-Bozeman; Leila Belle Sterman, Montana State Univeristy-Bozeman; Susan Borda, Montana State University-Bozeman. Publication Date 7-19-2016. DOI Link http://dx.doi.org/10.7191/jeslib.2016.1091
Zulfikar bin Mohamad Shariff: Australian resident detained for 'terrorism-related activities' in Singapore
Will Preemptive Accusations Against Russia Cover Up Voting Fraud? Moon of Alabama
How Is the Federal Government Using the Internet of Things? By Daniel Castro, Joshua New & Alan McQuinn. July 25, 2016: “The Internet of Things (IoT)—a term used to describe the set of physical objects embedded with sensors or actuators and connected to a network—offers numerous opportunities for the federal government to cut costs and improve citizen services
Qld pays $300k to build an app already available for free
Court ruling shows the internet does have borders after all CSO Online. Stunning that techies ever thought otherwise. Did they not understand that Wikileaks has its servers in Sweden for a reason
Algorithms that predict future criminals get a thumbs up from Wisconsin Supreme Court Fusion
An Interview With Cyberwarrior Eugene Kaspersky
HHS Will Fund Cyberthreat Information Sharing
Cyber resiliency in the Fourth Industrial Revolution – A roadmap for global leaders facing emerging cyber threats
“The First Industrial Revolution, in the late 18th century, was driven largely by steam engines. The second, in the late 19th century, introduced mass production and the division of labor. The third, in the late 20th century, involved digital automation and information technology.
Who’s Hillary’s Hacker and Why?
For example, at its simplest, I would expect a middling-competency hacker to find an open wifi hub across town to connect to, then VPN to server in, say, Tonga, then VPN from there to another box in Sweden, then connect to a PC previously compromised in Iowa, then VPN to yet another anonymous cloud server in Latvia, and (assuming the mountain dew is running low, gotta get cracking) then RDP to the target server and grab as many docs as possible. RAR those up and encrypt them, FTP them to a compromised media server in South Korea, email them from there to someones gmail account previously hacked, xfer them to a P2P file sharing app, and then finally access them later from a completely different set of servers.
Can we even know who hacked the DNS email
"N.J. Supreme Court to decide if government metadata is public": Jan Hefler of The Philadelphia Inquirer has an article that begins, "The New Jersey Supreme Court has agreed to hear a case brought by an open-government activist who contends that the public should be allowed to view electronic data and metadata kept by local government agencies."
Bill O’Reilly melts down over ‘slaves were well-fed’ criticism: Liberals ‘want me dead’ Raw Story
Mitigating the Cybersecurity Skills Shortage – Top Insights and Actions from Cisco Security Advisory Services
“Increasingly sophisticated threat campaigns. High-profile data breaches. Determined threat actors. The sophistication of the technology and tactics used by criminals has outpaced the ability of IT and security professionals to address these threats. Security Magazine reports that “most organizations do not have the people or systems to monitor their networks consistently and to determine how they are being infiltrated.” Cisco estimates there are more than 1 million unfilled security jobs worldwide.”
Dudley Kneller of Madgwicks Lawyers fame: This paper briefly examines some of the new social media technologies available and considers the compliance and risk issues lawyers need to be aware of when advising their clients in this space. It provides some guidance on advising on these compliance risks and makes recommendations on assisting clients to implement a digital marketing strategy which seeks to use such technologies effectively while properly complying with applicable legal and regulatory requirements. So, how best to advise your clients on this new risk to their business?
Technology and compliance — uncomfortable bed-fellows! (via Lexis)
Our Digital Expanses Have Made Us Confidently Arrogant. Where’s The Value In Humility?
PRESIDENTIAL POLICY DIRECTIVE/PPD-41 SUBJECT: United States Cyber Incident Coordination, July 26, 2016
“The advent of networked technology has spurred innovation, cultivated knowledge, encouraged free expression, and increased the Nation’s economic prosperity.
Data modeling or database design is the process of producing a detailed model of a database. The start of data modeling is to grasp the business area and functionality being developed. When we work with an Agile process (in this case, Scrum), there is a tendency to assume that everyone can work with everything. However, I would like to point out flaws in that idea and my recommendations related to data modeling and Scrum.
Data Modeling in Agile Development: One Data Modeler’s Experience
According to Verizon's 2015 Data Breach Investigations Report, about 50 percent of all security incidents — any event that compromises the confidentiality, integrity or availability of an information asset — are caused by people inside an organization. And while 30 percent of all cases are due to worker negligence like delivering sensitive information to the wrong recipient or the insecure disposal of personal and medical data, roughly 20 percent are considered insider misuse events, where employees could be stealing and/or profiting from company-owned or protected information.
After DNC hack, the case for paper ballots. Are paper ballots really a superior technology to voting machines? Absolutely... (Paper Tax Returns next?)
The Federal Communications Commission has decided to make a European-owned company the clearinghouse for routing billions of cellphone calls and text messages across the United States, despite claims by critics that the plan poses national security risks, officials said on Thursday. The F.C.C.’s approval, which has not been publicly announced, will give a New Jersey subsidiary of Ericsson, the Swedish technology giant, the obscure but critical job of operating a sprawling national system to track and route wireless calls and texts among hundreds of service providers. The routing system began in the 1990s as a way for people to keep their cellphone numbers when they switched carriers, but intelligence and law enforcement agencies have come to rely on it to track and trace phone numbers in investigations.
A hacking group called the Turk Hack Team is taking credit for a shutdown of the Library of Congress website and hosted systems including Congress.gov, the Copyright Office, Congressional Research Service and other sites.
The House Science, Space and Technology Committee is questioning whether foreign nationals may have had direct access to sensitive Office of Personnel Management data before a historic OPM hack attack was disclosed last summer.