Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

February 18, 2017

On ElectionA/M Russian SecOfficer Found Dead on Floor of Consulate

 NYC Morgue workers come in thru service entrance

In NEW YORK — He was found just before 7 a.m. on Election Day, lying on the floor of the Russian Consulate on the Upper East Side.

The man was unconscious and unresponsive, with an unidentified head wound — “blunt force trauma,” in cop parlance. By the time emergency responders reached him, he was dead.
Initial reports said the nameless man had plunged to his death from the roof of the consulate. As journalists rushed to the scene, consular officials quickly changed the narrative. The anonymous man had not fallen dozens of feet from the roof of the consular building, they said, but rather had suffered a heart attack in the security office, and died.

By the time the man’s body left the morgue the next day, Donald J. Trump was president-elect of the United States.

By the time the man’s body left the morgue the next day, Donald J. Trump was president-elect of the United States. It was the culmination of a sensational, bitterly divisive political campaign that US intelligence agencies would later say Russia actively sought to manipulate and skew in Trump’s favor. With the election results, the world had turned upside down, and the death of the man at the consulate quickly faded from view.

Police officers said the death of Sergei Krivov — his name revealed here publicly for the first time — looked natural, and listed the case as closed.
But who was Krivov? And how did he really die? Three months after he was found dead, as tensions between the US and Russia reach a fever pitch, the New York City medical examiner isn’t sure he had a heart attack after all.
As far as paper trails go, dying is a messy thing, even under normal circumstances. But in the months since Krivov’s death, it’s proven nearly impossible to find out how he died, who he was, and how, if at all, federal authorities were involved in any investigation.

English-language news reports said Krivov, identified then only as a 63-year-old Russian national and Manhattan resident, was a security officer. But a November report from Sputnik, the English-language Russian media outlet, says he was a consular duty commander.

That position is no ordinary security guard. According to other public Russian-language descriptions of the duty commander position, Krivov would have been in charge of, among other things, “prevention of sabotage” and suppression of “attempts of secret intrusion” into the consulate.
In other words, it was Krivov’s job to make sure US intelligence agencies didn’t have ears in the building.
As far as paper trails go, dying is a messy thing, even under normal circumstances.
The duty commander would also have had access to the consulate’s crypto-card — the top secret codebreaker used to encrypt and decrypt messages transmitted between the consulate and other Russian channels. It was likely Krivov who helped transmit cables in and out of the heavily guarded building.

Despite being described as a Manhattan resident by the NYPD, Krivov is a phantom in public records. No one with his name, or any iteration of it, has lived in Manhattan for years, and the only other two Krivovs listed in New York state didn’t return calls asking if they knew a Sergei (in the NYPD’s files, Krivov’s name is not transliterated as “Sergei” or “Sergey” but as the less common “Cergej”). Neither were listed as related to one. An NYPD officer looking at the case file told BuzzFeed News no family was listed.

The NYPD told BuzzFeed News the responding officers were in contact with “whoever was in charge of the consulate” for information regarding Krivov.
But when BuzzFeed News went to Krivov’s address, listed in the NYPD’s files, at 11 E. 90th St., it wasn’t a residence. It’s a Smithsonian-owned office building for its neighboring Cooper Hewitt design museum. It’s located a block behind the Russian Consulate, which is at 9 E. 91st St. One of the consulate’s public entrances is 11 E. 91st St.

Asked about the discrepancy, the NYPD insisted that 11 E. 90th St. was the address they had been given for Krivov, apparently by Russian consular officials.
“No one is living here — this is where my desk is right now,” a Smithsonian employee at the address said when BuzzFeed News called.

It’s unclear how thoroughly or for how long the NYPD investigated Krivov’s death. Multiple officials declined to offer any details about the investigation. Several officers told BuzzFeed News the case is listed as “closed.”
“The narrative of the story is kind of vague, it’s not saying much,” one officer said, scanning the incident report with BuzzFeed News on the phone. “With all cases like this, it is investigated by the detective squad,” he said. “For some reason it was closed out.”

A separate officer said the case was listed as “no criminology suspected, natural causes.”
The medical examiner’s office, though, says their investigation of Krivov’s death remains open.
“The cause and manner of death are pending further studies,” said Julie Bolcer, a spokeswoman for the office. “There are no results to share yet.”

After BuzzFeed News published this story, the Medical Examiner’s office said that, while it did continue investigating the cause of death, the office had determined Krivov died naturally.
“This is a natural death,” Bolcer said. “We are doing advanced studies to characterize the details of the underlying disease.”

Further, the office said it is not unusual for the NYPD to close the case despite the lack of a clear cause of death, since the office had said the death was not suspicious. Toxicology tests were completed, the office continued, and the results were not going to be related to the death.
But others who spoke with BuzzFeed News said his disconnect between the medical examiner’s office and the NYPD is not normal. In standard practice, a death investigation would not be formally closed by police officers until the medical examiner had reached a determination on the death.

“It’s open until you can get a cause of death….there has to be a complete circuit with a case,” said Marq Claxton, a former NYPD investigator. “That case is going to stay open until there’s a final determination, it could be a homicide, it could be something, it could be accidental or whatever.”
A separate medical examiner official said Krivov’s body had been released the day after his death, but declined to say to whom the body was released. That the medical examiner no longer has the body, but testing continues, suggests toxicology screening of tissue or blood samples.

It’s not necessarily uncommon for toxicology tests to take weeks or even months to come back. The medical examiner’s office would not specify the kind of further testing being done.
None of the five major funeral chapels or funeral homes in upper Manhattan knew of any recently deceased person named Krivov. The New York City Health Department declined BuzzFeed News’ request to search for records related to Krivov’s death, saying that by standard practices, any search had to be requested by a family member. The city’s burial desk, which tracks documentation from funeral homes, said it only files paperwork and doesn’t have a searchable database.

The NYPD denied BuzzFeed News’ request for the incident report, saying the request did not contain enough details, including the date, precinct, and location of Krivov’s death, or the incident number. BuzzFeed News’ request in fact included all of that information. A separate denial said the incident report “is not a public record and can only be obtained through due process of law (Court Ordered Subpoena).”
According to experts and former police officers, incident reports are not generally withheld by the NYPD.

“The incident report, after an investigation is closed, typically that is releasable,” said Michael Morisy, the founder of MuckRock, a nonprofit organization dedicated to government transparency and records laws. “It’s really weird that they would categorically state that was rejected…incident reports are not broadly exempt from public records law.”

In a last-ditch effort to find where Krivov’s body may have been taken, BuzzFeed News called Aeroflot airlines, the only major carrier with direct flights between New York and Moscow. Aeroflot would not say whether it had flown a body from New York to Russia in the days following Nov. 8. Information about body transports, it said, was classified and could only be released by a government entity.

As police made their way to the consulate that Election Day morning, Americans’ interest in Moscow had reached a fever pitch of Cold War–era proportions, fueled by a near-constant barrage of reports detailing a wide-ranging Russian intelligence operation that the US intelligence community says was designed to undermine the US election.

It stands to reason that Krivov, who was nearing the upper end of the mortality curve for Russian men, may have died a completely natural death, and that much of the hand-wringing over the incident is due to bureaucratic red tape rather than suspicious circumstances.
But given the unique circumstances — and a backdrop of plummeting US–Russia relations — the lack of information has done little to quell theories. The more questions that were asked about Krivov, the less people wanted to talk.

“No one seems to want to discuss this,” one law enforcement source said, after reaching out to other law enforcement officials to see what they had heard about the case.
In the hours following Krivov’s death, the NYPD had said it would identify him following notification of his family. When BuzzFeed News asked for his identity months later, police immediately said the request would have to go to through the US State Department.

The State Department, after being initially responsive, abruptly told BuzzFeed News it wouldn’t help, and said the information would have to come from the Russian Consulate.
“No one seems to want to discuss this.”
“I’m not sure why they would or would not want to share this,” one State Department official said in a follow-up phone call, referring to the NYPD and the State Department. A New York police officer eventually gave BuzzFeed News Krivov’s name.

The incident — and the lack of information surrounding it — has raised eyebrows in Washington.
Two sources to whom BuzzFeed News spoke, who requested anonymity to discuss the probe, said Krivov appeared to be a heavy drinker, which law enforcement concluded led to his natural death.
“I don’t think there’s anything there,” one US intelligence official said.
The State Department also refused to say whether Krivov was registered as a foreign agent, how long he had been in the US, what his immigration status was, and whether they had any contact with the Russian mission regarding his death.
When asked about the incident, Russian foreign ministry spokeswoman Maria Zakharova said: “Are you serious?” She continued: “He had heart problems, he had heart attacks. It’s weird that your outlet is interested in this.”

“The employee of the Consulate General of Russia Sergei Krivov passed away on November 8, 2016,” the consulate told BuzzFeed News. “An American doctor that was admitted to the Consulate General stated without a doubt that the death was by natural reasons. Medical examiners are currently establishing the cause of his death, but it is believed that the man suffered a heart attack.”
The FBI said it was not involved in investigating Krivov’s death. It declined to comment further and deferred to the NYPD.

The NYPD did not give BuzzFeed News an official comment on the investigation. BuzzFeed News spoke with the NYPD several times for this story, including with the precinct involved in the incident and the NYPD’s public affairs office.

Krivov’s place of employment — a palatial stone compound in Manhattan’s posh Upper East Side — has long been one of the premiere spy hotspots in the decades-old espionage war between the US and Moscow. Where many aficionados would understandably expect Washington, DC, to be prime real estate for cloak-and-dagger theater, New York City is oft-trodden territory, not least for its hosting of the United Nations.

It is unknown whether Krivov worked with Russian or US intelligence agencies. His work may not have even put him near any intelligence operations that were being run out of the consulate.
According to FBI court documents from 2015, the foreign arm of the Russian intelligence service, the SVR, likely keeps a secure office space inside the Manhattan consulate where Krivov worked.
In criminal documents filed against Evgeny Buryakov, Igor Sporyshev, and Victor Podobny — three undercover Russian foreign intelligence agents working in New York City — the bureau described “a secure office in Manhattan used by SVR agents to send and receive intelligence reports and assignments from Moscow (the ‘SVR NY Office’).”

The criminal complaint does not say specifically that the “SVR NY Office” is in the Manhattan consulate, but the document does say it is “located within an office maintained by the Russian Federation in New York, New York.”
It’s an open secret, US intelligence officials say, that the consulate is a staging ground for Russian intelligence operations. It’s also a coveted target for US agents. And its importance, officials say, has been underscored as US intelligence agencies try to get their arms around the Russians’ sweeping operation to manipulate the US election.

“That’s always a target,” the US intelligence official said of the Manhattan consulate.
In an unprecedented report issued in early January, on the eve of Trump’s inauguration, the intelligence community writ large detailed the concerted Russian effort to manipulate and undermine the US election. Key to the intelligence community assessment were a multitude of intelligence channels, including signals intelligence — or SIGINT — like intercepted electronic communications or IP addresses. The specifics of where that SIGINT came from, and what it consisted of, remain secret.

BuzzFeed News has filed a FOIA request with the NYPD for the police report on Krivov’s death, and any related paperwork. That request was received, but a determination has not yet been made as to whether the department will provide them.
Maybe those documents will provide insight into a death that, for now, remains a mystery. Nov. 8 began with his death, and ended with one of the most contentious political upsets in history. After that, Sergei Krivov simply vanished. ●

Ali Watkins is a national security correspondent for BuzzFeed News and is based in Washington, D.C.
Contact Ali Watkins at

December 14, 2016

Yahoo Gets Hacked Making All-time History with Billions of Accounts Compromised

This morning my phone kept waking me up with a beep which should only happen on my down time if something horribly is happening. War war 3, wait Donald is not president yet. The message had to do with something to do with Yahoo but I could not understand it unless I went to my computer. It doesn’t happen once Im in my deep sleep. Would rather hear the beep every hour or so than get up. When  I got up and was able to go into the net I saw Yahoo was being hacked or was hacked. I could not believe it was happening again. Today I got the story and what was happening already happened months ago. Not only was Yahoo allowed to be caught with its pants down, worse is that it kept it quiet.

More than 1 billion Yahoo user accounts — including phone numbers, birthdates, and security questions — may have been stolen by hackers during an attack that took place in August 2013, the company revealed on Wednesday.

The announcement of what could represent the largest hack of all time is a separate incident than the one Yahoo disclosed back in September. In that hack, Yahoo said that at least 500 million user accounts were compromised.

"The company has not been able to identify the intrusion associated with this theft," Yahoo said on Wednesday about the new incident.

News of the breach sent Yahoo shares sliding about 2.5% in after-hours trading on Wednesday.

The revelation of the hack could have implications for the $4.8 billion sale of Yahoo to Verizon, which has yet to close. Yahoo disclosed the previous hack to Verizon only after agreeing to the deal, and Verizon has since said that it considers the hack a material event that could affect the terms and price of the acquisition.

"As we’ve said all along, we will evaluate the situation as Yahoo continues its investigation," Verizon told CNBC on Wednesday, regarding the latest hack.

Forged cookies
With a billion accounts at risk, that would make this the biggest breach of ever — bigger than the Myspace breach of 360 million user accounts and 427 million passwords.

Yahoo said that payment card data and bank account information were not stored on the system the company "believes" was affected.  But the hackers may have collected a trove of other valuable personal information, such as user names, email addresses, telephone numbers, dates of birth, hashed passwords  and, in some cases, encrypted or unencrypted security questions and answers.

Yahoo said that it now believes an "unauthorized third party accessed the company's proprietary code to learn how to forge cookies." It was not clear which incident the forged cookies related to. But Yahoo said that "the company has connected some of this activity to the same state-sponsored actor believed to be responsible for the data theft the company disclosed on September 22, 2016."

Here's the entire message from Yahoo:
"Yahoo! Inc. (NASDAQ:YHOO) has identified data security issues concerning certain Yahoo user accounts. Yahoo has taken steps to secure user accounts and is working closely with law enforcement.

"As Yahoo previously disclosed in November, law enforcement provided the company with data files that a third party claimed was Yahoo user data. The company analyzed this data with the assistance of outside forensic experts and found that it appears to be Yahoo user data. Based on further analysis of this data by the forensic experts, Yahoo believes an unauthorized third party, in August 2013, stole data associated with more than one billion user accounts. The company has not been able to identify the intrusion associated with this theft. Yahoo believes this incident is likely distinct from the incident the company disclosed on September 22, 2016.

"For potentially affected accounts, the stolen user account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5) and, in some cases, encrypted or unencrypted security questions and answers. The investigation indicates that the stolen information did not include passwords in clear text, payment card data, or bank account information. Payment card data and bank account information are not stored in the system the company believes was affected.

"Yahoo is notifying potentially affected users and has taken steps to secure their accounts, including requiring users to change their passwords. Yahoo has also invalidated unencrypted security questions and answers so that they cannot be used to access an account.

"Separately, Yahoo previously disclosed that its outside forensic experts were investigating the creation of forged cookies that could allow an intruder to access users' accounts without a password. Based on the ongoing investigation, the company believes an unauthorized third party accessed the company's proprietary code to learn how to forge cookies. The outside forensic experts have identified user accounts for which they believe forged cookies were taken or used. Yahoo is notifying the affected account holders, and has invalidated the forged cookies. The company has connected some of this activity to the same state-sponsored actor believed to be responsible for the data theft the company disclosed on September 22, 2016.

"Yahoo encourages users to review all of their online accounts for suspicious activity and to change their passwords and security questions and answers for any other accounts on which they use the same or similar information used for their Yahoo account. The company further recommends that users avoid clicking links or downloading attachments from suspicious emails and that they be cautious of unsolicited communications that ask for personal information. Additionally, Yahoo recommends using Yahoo Account Key, a simple authentication tool that eliminates the need to use a password on Yahoo altogether.

Business Insider

Additional information is available on the Yahoo Account Security Issues FAQs page:

September 26, 2016

Why Would You Need an Armed Guard to Be a Farmer in NYS?

 For the first time in 80 years, a farm in New York State is legally growing cannabis. But no one could get high from these plants.
The farm, JD Farms, roughly 230 miles north of New York City, is actually growing industrial hemp, which can be used to make everything from flour to building materials to clothes to plastic.
“Industrial hemp and marijuana are actually the same species, but they have bred and evolved to be quite different from each other,” said Jennifer Gilbert Jenkins, a professor of agriculture at Morrisville State College, which has paired with JD Farms on a hemp research pilot program.
Still, industrial hemp remains on the Drug Enforcement Administration’s list of illegal Schedule I drugs, though its content of THC — the chemical that gets marijuana users high — is below 0.3 percent. Because of that status, JD Farms had to adhere to stringent federal regulations just to get the seeds to grow the crop. “We had to jump through hoops to get a D.E.A. permit to import our seeds from Canada,” Mark Justh, an owner of the farm, said.
Mr. Justh, 51, and Daniel Dolgin, 40, a co-owner, were not always pioneering farmers.
Mr. Justh had already bought a few defunct dairy farms here before his employer, JPMorgan Chase & Company, sent him across the world in 2010.

Facebook Live: Visit to a New York Hemp Farm 

“I was running a business in Asia for JPMorgan and traveling a lot all over Asia,” he said. “When my two sons were becoming teenagers, I really wanted to travel less and spend a lot more time with my family. As I bought the farms and as we were building them up, I wanted to return full time.”
In 2015, he did. His three sons are now 18, 14 and 13.
“My sons are in school. They work on the farm over the summers. And my wife is a writer,” he said. “They split their time between Park Slope and the farm, and they are up here all summer.”
Mr. Dolgin, who is single, previously worked in counterterrorism and national security in Washington. “I left D.C. around 2010,” he said. “I did some consulting in the private sector, and I wanted to do something different.”
A friend of Mr. Dolgin’s introduced the men. “Mark was looking to get involved in the hemp world,” Mr. Dolgin said, “and I thought I could be of service in terms of navigating regulations and getting stuff done in D.C.”
“I started coming to the farm more and more and starting to fall in love with what he was doing there,” he added.
Mr. Justh said he became interested in hemp while looking for a tall canopy plant with broad leaves and a short growth period that could keep weeds from taking root in his crops. The farm, which covers 1,300 acres, also produces organic hay, pastured pigs and pastured cattle.
Mark Justh, left, and Daniel Dolgin are co-owners of JD Farms. Mr. Justh previously worked for JPMorgan Chase & Company, and Mr. Dolgin had worked in counterterrorism and national security in Washington CreditKarsten Moran for The New York Times 
“I started off looking at hemp as weed cover,” Mr. Justh said, “and believe it or not, Dan and I partnered together and started recognizing the larger industrial benefits of hemp.”
“We are phenomenally excited to see the benefits of what this crop can do,” he added.
The door to hemp farming — and its economic possibilities — was opened in 2014 when federal legislation allowed for the transportation, processing, sale and distribution of hemp grown in research programs.
“This is not marijuana,” Donna A. Lupardo, a New York assemblywoman for the Southern Tier who sponsored the legislation to allow hemp to be grown in the state, said as she looked over the field during a visit to the farms. “This is not something that can be used recreationally.”
Ms. Lupardo, a Democrat, said she believes hemp “has a really high potential to put farmland back to use in New York State and to also be a very lucrative, potentially lucrative manufacturing crop for our state.”
“In my community alone, there are a million potential acres to be farmed for a number of new crops like industrial hemp,” she said later in a phone interview. “It’s a field of dreams, it really is. It’s just a fabulous opportunity and just a wonderful plant.”
To comply with federal guidelines, JD Farms had to have an armed security guard oversee the seed planting. So it hired an officer from the New York State University Police at Morrisville State College. The officer would have told the D.E.A. if anything had gone wrong, Enrico L. D’Alessandro, the chief of police at Morrisville, said.
Mr. Dolgin and Mr. Justh said they hoped it would become easier for other farmers to grow industrial hemp. “We believe farmers should be able to grow this crop without a license and be able to obtain seeds across state lines and internationally,” Mr. Justh said. CreditNathaniel Brooks for The New York Times 
“That officer had to stand by there to make sure all the seeds went into the ground,” Mr. D’Alessandro said.
In an interview at the farm, Mr. Dolgin called the requirement “ridiculous for a crop that has no psychotropic value, but we had to do what we had to do.”
Mr. Dolgin and Mr. Justh said they hoped their first crop would pave the way to a quicker process for those who follow.
“Until the laws become more uniform and less gray, for the industry to develop, it’s going to be challenging,” Mr. Justh said. “We believe farmers should be able to grow this crop without a license and be able to obtain seeds across state lines and internationally. Until that happens, industry will struggle to develop.”
As for their 30 acres of hemp, Mr. Dolgin and Mr. Justh said they were looking for customers.
“We don’t have contracts signed yet, but we have a lot of interested buyers,” Mr. Dolgin said. “We are working with a major protein-bar company in Pennsylvania that is interested in using hemp protein to start a few new lines of product into their distribution channel.”
Mr. Dolgin added that a large biomaterial manufacturing company in Albany was interested in buying their stalks. “They currently import ground-up hemp stalks from Europe, so having a New York supply is much more ideal,” he said.
New York Times

September 12, 2016

Did Secret Service Brake Protocol on Mrs. Clinton’s Security?

 On this picture you can see Secret Service on the right opening the door of the van for Mrs.Clinton. He left her side to open door then had to rush back when Clinton on center seemed to be collapsing. You can see Mrs. Clinton uncovered or lightly covered on the right… Those few seconds or even a split second is all it takes as we learned from the shooting of Pres. Reagan

The US Secret Service appears to have broken its own protocol with Hillary Clinton’s early departure from Sunday’s commemoration of the 15th anniversary of the Sept. 11, 2001, terrorist attacks at ground zero.

In a widely circulated video of the Democratic presidential nominee’s departure from the ceremony, Clinton can be seen leaning against a security bollard and then buckling and stumbling as her security detail helps her into a black van.

 According to a former Secret Service agent who reviewed the video, the detail was clearly rushing and did not expect for Clinton to leave at that time. The former agent noted that it is against Secret Service protocol for the protected individual to wait for a car to arrive. In the video, Clinton is leaning against the bollard as a black van pulls up.

It is also very unusual for a detail leader to leave the protected individual’s side, as a Secret Service agent, Todd Madison, is seen doing in the video, to open the van’s doors. Opening the van is the site agent’s job, according to the former agent; the detail leader’s proper position is next to Clinton. The agent may have had little choice given the rushed nature of the departure. 

Hillary Clinton abruptly left a 9/11 ceremony after feeling ‘’overheated,’’ and video later showed her stumbling and appearing to fall off a curb.

The incident also raised questions about Clinton’s traveling pool of reporters, which she left behind at ground zero when she departed unexpectedly, leaving the press with no knowledge of her whereabouts or condition for about 90 minutes.

Clinton travels with a small group of reporters and photographers representing broadcast and print outlets. The arrangement, called a ‘‘pool,’’ approximates the rotating group of press outlets that travel with the president.

Trump has no such pool, a break with past candidates. He had no reporters with him Sunday, when he appeared unannounced at the same Sept. 11 memorial ceremony Clinton attended.

Clinton resisted very close contact with her pool over the summer, consenting only to travel on her own small jet in tandem with the pool and not allowing the same kind of full-time coverage customary at the White House.

Starting on Labor Day, Clinton began traveling on the same large campaign plane with her Secret Service detail and reporters, and the pool has had greater access to some of her events including a find-raising party in New York on Friday night that featured Barbra Streisand. It was at that event when Clinton stirred controversy by referring to some Donald Trump supporters as ‘‘deplorables.’’

In the White House model, a so-called protective pool is on constant standby each day, until given an all-clear that the president will not have any further public events or outings. That model has been followed more closely by presidential candidates in the past.

Clinton is not allowing door-to-door pool coverage, in which the pool group would assemble at her home and travel with her from there. Instead, pool reporters have met up with Clinton at her plane or elsewhere. On Sunday, the pool was left behind both when Clinton departed the memorial and when she departed her daughter Chelsea’s apartment. The pool was later driven separately to Westchester County, where Clinton lives.

Robert Gibbs, President Barack Obama’s first White House press secretary, suggested in a tweet Sunday that it’s time for Clinton to adopt a more formal protective pool.

‘’Protective pool isn’t always easy for either candidate or press but there comes a point for each nominee when it must be part of daily life,’’ he said.

December 29, 2013

Hard Pill to Swallow to be Secured

 Vitamin authentication password pill

Motorola and a few others are interested in a system in which you take a pill with your pin encrypted inside of it. You have to take one everyday with different pins and because you will loose the one you had within 24 hrs or so it will need to be replaced. The way it works is your stomach juices will melt the coating of the pill or capsule and your electrolytes will serve as the means to transmit to your computer the information.  You will have to be in front of your computer in order to work of coarse.  No one will be able to connect to your computer from afar even if they electronically deciphered your pin/password.

There are still some kinks on the idea like what happens if someone else gains access to your pills.  Can you overdose if taken more than one causing your computer to crash or what happen if you get the revenge of Montezuma? I guess you will be too busy making trips to the bathroom to want to network?

As the end of this year comes quickly to a close those are the things that we know are happening, the frightening stuff comes from your fav cell, cable company and your money supported and voted on by you and me, 'our government’. There isn’t much we can do to stop or slow down what’s coming down the pipes, what we can do is make sure that we know what we are doing to be able to survive and in many cases enjoy developments putting them to our advantage.  One thing you can control I hope is you. Our lives are lived through decisions and the fruit or aftermath of those decisions.  If you know you and how you make your decisions this will help.

If you want to see an example of bad posting on a security point of view,  all you have to do is go to Facebook and see the stuff scrolling down on your screen. Either too much important information is laid out for people you never met to see to others panicking when they hear that FB read your private messages or that people can take the pic of your child and publish it in some sort deviant magazine or web site.

Just three days ago I read a message from someone I knew, a mom. The message was written in a “breaking news” kind of format and I could see from hundreds of miles apart the expression of agony in this mom. The message was a warning to moms not to post pictures of their kids because “they’ discovered a website in FB that is after kids pictures for use by pedophiles. I wanted to send her a message and tell her that there are ways to pick the people you want the photos to be seen and wether they  could be tag or not. Im sure she knew, she was just passing the message along like when commerce law virgins were putting disclaimer on the pages stating that their stuff was theirs. I still see it today. How interesting! The site belongs to FB but what you give to FB belongs to you. I guess none of these forks read Face Books’ disclaimer saying that everything there is theirs.

I decided not to say anything because after not being in contact for a long time for me to start telling them how to do things, I was afraid the information might get lost along the conversation about me, not in touch and may be even writing badly about their hero the ‘Duck and his dynasty.” Besides I was afraid that by the time I explained how you do things today it might be different tomorrow.

I figure if they are afraid of a pedophile web site even though there are but many in every social network and they won’t learn the tool to protect themselves, What are they doing there? Posting pics and being part of it all?  The warning from this mom was well intentioned but it was not based on the realities of security on FaceBook.

A lot of the mistakes I’ve made in FaceBook have been based in not checking for changes frequently.  One day my pics are all private and my setting are being followed and the next day they are all visible to all because FB changed their settings without any warning and it exposed things I thought they were private.

What I do now is review all the time my settings on my private page of FB and post what is known or what only has importance to people that I personally know and it has no real importance if reposted by someone. Still I had an ex-employer calling to tell me someone complaint to have seen me naked on Face Book. I was disappointed about a complaint on my body, but I figure it wasn’t me.  It was probably a posting from this blog with someone semi naked.
On the public page on FB I only post the story tittles with the link to the site. If I decide to talk about the snow or the rain I will do it from my private page. Separating your professional pages from personal stuff is very important.

 Im writing for you to warn you that our times are not ours anymore because we have to share.  Once we know we are not alone anymore then we can take steps, what ever they are and what ever works for you (no cookie cutter system to follow for all) to insure our personal security and the security of what we try to accomplish in a public way.

If target can be hit exposing not only customers name and address with may be social security numbers, which was the past, now Target gets hit and all the information is lost including the account numbers pins and any bank account numbers and pins connected to their target account. That is as bad as it gets nowadays and unless the simple pin base system to encode applications is not change, we will see of more instances like these. I guess bring on the pill? Im hoping for something better!

Target as a target teach us to review our security on the net and know where you should be on that spectrum. If you do banking on the net many banks offer free filters and malware detectors for suspicious sites for your computer and sometimes your iPhone and android. They do business with you on the net so they are smart enough to know that they don’t want you to be the weak link in the chain.

Good Luck and Chin Up like the British will tell us.

Adam Gonzalez, Publisher
Sourcing done by this blog using public, government, commercial sites.

January 6, 2013

5 Top Cyber Security Threats That Could Affect Your Life

Our electronic devices are such a big part of our lives today that it’s hard to imagine what we once did without them. But our constant use of technology to keep in touch, pay bills, stay on top of the news, shop and research things has a downside: Our data can be exposed to criminals who commit crimes such as identity theft and credit card fraud – unless we take the proper precautions. Our growing reliance on electronic devices is part of the reason why careers in cyber security are growing at a faster pace. Jobs in information security, web development and computer network architecture – three fields at the forefront of cyber security – are expected to grow 22% between 2010 and 2020.[1] Understanding the threats can help everyone do their part to make those jobs easier. Here are five top cyber security threats and tips on how to protect yourself against them, according to experts.
Malware and Bots
If you’ve ever spent a frustrating afternoon calling a help line to tackle a computer virus, then you know how pesky malicious software – or malware, for short – can be. Malware also includes nuisances like spyware, which allows digital hackers to track your every move and to view the passwords you are entering, according to the National Cyber Security Alliance, an organization focused on educating the public about how to use the Internet safely. Typically consumers get tricked into downloading malware by accident, when for instance they click on a rogue website or try to download what seems to be free software, like a screen saver. When criminals use malware to take control of individuals’ computers remotely to perpetrate financial crimes or attack computer networks and websites, the setup is known as a botnet.
Further, “malware can be spread by your Friends on social networking sites like Facebook,” says, Linda McCarthy, cyber security expert, former senior director of Internet safety at Symantec and author of Own Your Space: Keep Yourself and Your Stuff Safe Online. You need to think about that link your Friend is telling you to click on. Is that really a Friend sending that link, or was their account compromised? Don’t click on suspicious links, McCarthy warns. Spreading malware on social networking sites is growing at an alarming rate. “Even though social networking sites have systems in place to minimize the risk, you are still the first line of defense in protecting yourself. It makes sense that malware writers target social networks because you are likely to trust a link that came from one of your friends,” she says.
You already know that “spam” is the email equivalent of junk mail. But it can do more than clutter up your inbox. Some of these email missives can contain a link or an attachment prompting you to download a computer virus. They can also be used to defraud those close to you. For instance, someone who has hacked into your email account can send a message asking every one of your contacts to wire money because you are in distress – and possibly rope in a few people who aren’t familiar with this common fraud. The CAN-SPAM Act was set up to protect consumers from deceptive email messages, subjecting senders to fines of up to $16,000 per violation.
Hacked Accounts
One common way for identity thieves to gain control of consumers’ personal information is through digital crimes known as “phishing.” In this practice, fraudsters create an email that looks like it was issued from a legitimate company. They will ask for a recipient’s personal information – like an account number or a password – and then use that information to commit financial crimes, such as opening fraudulent charge cards in a consumer’s name and running up big bills on them.
“Phishing scams are successful because they use social engineering techniques to gain your trust,” says McCarthy. For example, one scam claims to be a relative traveling in another country reaching out for your help. It’s an email from your nephew. He was mugged, lost his wallet, and he needs you to wire him money right away. “It’s a natural reaction to want to help someone in trouble. That’s what the phishers count on. Beware of social networking techniques and be sure to protect your accounts,” she adds.
Unsecured Home Wireless Networks
Many of us have converted to home wireless Internet networks to connect our TVs, smartphones, laptops, computers and tablets. And why not? It’s very convenient. But with these home networks come risks. Without certain protections, cyber criminals in the area may be able to access the Internet through your network and possibly gain access to your computer and other devices.
Data Gone AWOL
Given all of the places where we tote mobile devices such as laptops, tablets and smartphones, it becomes very easy to lose them. If the data on those devices falls into the wrong hands and isn’t properly protected through techniques like encryption (the process of masking information using an algorithm, so that it becomes unreadable), it can be a field day for cybercriminals. It’s not just consumers who lose data. Forty-five percent of data breaches at companies are caused by lost laptops and mobile devices, according to a 2012 study by the Ponemon Institute, a research center based in Traverse City, Mich., that is dedicated to consumer privacy, data protection and information security policy. Even use of YouSendIt, Dropbox and other Internet-based file-sharing tools by employees – now a common phenomenon – raise the risk that confidential corporate data will be leaked, according to Ponemon.
But even if devices don’t get lost, it’s possible that in using them we’ll fall prey to cyber criminals while checking emails in an airport lounge using Wi-Fi on a smartphone, or while reading on a tablet over a mocha latte in a café.
“With all of your devices and more to come, be sure to have a backup strategy,” advises McCarthy. Many of the security software packages now include backup as an option. That won’t help with all of the data on every device, so be sure you plan and back up all of your important devices. There’s no telling what types of devices will be part of our lives years from now. The tech explosion presents immense opportunity for those with the creativity and know-how to make the gadgets we use better and better – and to simply keep them running smoothly. In the meantime, building a few smart cyber security habits is a good way for all of us to enjoy the technology we use every day with few hassles.
Advances in technology are not likely to slow down in the future, nor is our increased reliance on the fruits of that growth. New security threats will be a constant reality, which makes it more important than ever that skilled individuals step up to fill the increasing number of jobs available in cyber security, and that those who choose other career paths take steps to protect their own security.

A variety of sources, including Microsoft, the Department of Homeland Security, theFederal Trade Commission, the National Cyber Security Alliance, the Bureau of Consumer Protection Business CenterAbsolute Software and WatchDox, provided the data included in this article.
 [1] U.S. Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, 2012-13 EditionInformation Security Analysts, Web Developers, and Computer Network Architects, on the Internet

Featured Posts

The Food Delivery/Ride Companies Wont Allow Drivers to be Employees But California is Changing That

                               Hamilton Nolan Senior Writer. After a monumental...