Skip to content

Nick L

FCC stonewalled investigation of net neutrality comment fraud, NY AG says

Quote

Net neutrality fraudsters likely impersonated “hundreds of thousands” of people.

New York’s attorney general has been trying to investigate fraud in public comments on the Federal Communications Commission’s anti-net neutrality plan but alleges that the FCC has refused to cooperate with the investigation.

NY State Attorney General Eric Schneiderman says that “hundreds of thousands of Americans” were likely impersonated in fake comments on the net neutrality docket. But FCC Chairman Ajit Pai’s office would not provide information needed for New York’s investigation, Schneiderman wrote yesterday in an open letter to Pai:

[T]he process the FCC has employed to consider potentially sweeping alterations to current net neutrality rules has been corrupted by the fraudulent use of Americans’ identities — and the FCC has been unwilling to assist my office in our efforts to investigate this unlawful activity.

Specifically, for six months my office has been investigating who perpetrated a massive scheme to corrupt the FCC’s notice and comment process through the misuse of enormous numbers of real New Yorkers’ and other Americans’ identities. Such conduct likely violates state law—yet the FCC has refused multiple requests for crucial evidence in its sole possession that is vital to permit that law enforcement investigation to proceed.

The FCC received 22 million comments on its plan to repeal net neutrality rules and deregulate broadband providers, but many were fraudulent. In May, some of the people who were impersonated by anti-net neutrality spammers asked the Federal Communications Commission to notify other victims of the impersonation and remove fraudulent comments from the net neutrality docket.

But the FCC has seemingly taken no action to remove fraudulent comments or to prevent them from being filed.

On Twitter, Schneiderman described “a massive scheme that fraudulently used real Americans’ identities” in order to “drown out the views of real people and businesses.”

Here is New York State Attorney General’s Letter Eric Schneiderman’s Letter

F.C.C. Plans Net Neutrality Repeal in a Victory for Telecoms

Quote

The Federal Communications Commission released a plan on Tuesday to dismantle landmark regulations that ensure equal access to the internet, clearing the way for internet service companies to charge users more to see certain content and to curb access to some websites.

The proposal, made by the F.C.C. chairman, Ajit Pai, is a sweeping repeal of rules put in place by the Obama administration. The rules prohibit high-speed internet service providers, or I.S.P.s, from stopping or slowing down the delivery of websites. They also prevent the companies from charging customers extra fees for high-quality streaming and other services.

The announcement set off a fight over free speech and the control of the internet, pitting telecom titans like AT&T and Verizon against internet giants like Google and Amazon. The internet companies warned that rolling back the rules could make the telecom companies powerful gatekeepers to information and entertainment. The telecom companies say that the existing rules prevent them from offering customers a wider selection of services at higher and lower price points.

Nothing to see here folks, just normal government for big business, by big business, and all for the best democracy that money can buy.

Big Cable’s pillow talk with FCC to forbid US states from writing own net neutrality rules

Quote

The stomach-churning love-fest between the American cable industry and FCC Ajit Pai continues apace with Big Cable now pillow talking the federal regulator into how to prevent individual US states forming their own net neutrality protections.

Pai is expecting to call for a vote on dismantling net neutrality rules on December 14 – despite widespread opposition to the idea – but cable companies are worried that state legislators will simply write their own laws to effectively reintroduce them.

And so, joining a determined campaign by cable giants Verizon and Comcast to lobby against such actions, the wireless comms trade association CTIA has joined the fray, sending a letter to the FCC informing it how it can usurp such state efforts.

The CTIA even has its own simple anecdote to explain why it makes sense for the FCC to set the rules across the entire US: a train journey.

“A passenger riding on Amtrak between Washington D.C. and New York City travels through five different jurisdictions during the course of a 3.5-hour trip,” the letter argued. “If each of these jurisdictions were permitted to enforce its own rules regarding (for example) traffic prioritization, the rider’s mobile broadband usage during the trip would be subject to five different legal regimes, even if the rider spent the entire trip watching a single movie. This would be impracticable, and only underscores the risks inherent in a patchwork quilt of broadband regulation.”

The argument is, of course, gibberish: internet users pull content from all over the world every second of every day with it passing through hundreds of jurisdictions. And yet somehow the internet continues to function. How? Because internet traffic is not road or rail traffic.

Whether Pai and the other FCC commissioners are able to see through such obvious, false manipulation or get seduced by the appeal to their own importance, we will have to see. Or perhaps the bigger question: how far is Pai willing to go to please the cable industry? And is he prepared to make a fool of himself doing so? Infatuation is a difficult thing to judge.

As The FCC Guts Net Neutrality, Comcast Again Falsely Claims You Have Nothing To Worry About

Quote

With the FCC formally confirming its plan to kill existing net neutrality protections December 15, Comcast is back again insisting that you have absolutely nothing to worry about. In a new blog post, top Comcast lobbyist “Chief Diversity Officer” David Cohen once again claims that net neutrality harmed industry investment (independent analysis and executive statements have repeatedly shown this to be a lie), that Comcast will be able to self-regulate in the absence of real oversight, and that gutting the Title II foundation underpinning the agency’s rules just isn’t that big of a deal:

“As we have said previously, this proposal is not the end of net neutrality rules. With the FCC transparency requirement and the restoration of the FTC‘s role in overseeing information services, the agencies together will have the authority to take action against any ISP which does not make its open Internet practices clearly known to consumers, and if needed enforce against any anti-competitive or deceptive practices. Comcast has already made net neutrality promises to our customers, and we will continue to follow those standards, regardless of the regulations in place.”

Monoplists

Facebook needs to be regulated more tightly, or broken up so that no single entity controls all of its data

Quote

The message was clear: The company just wanted negative stories to stop. It didn’t really care how the data was used.

Facebook knows what you look like, your location, who your friends are, your interests, if you’re in a relationship or not, and what other pages you look at on the web. This data allows advertisers to target the more than one billion Facebook visitors a day. It’s no wonder the company has ballooned in size to a $500 billion behemoth in the five years since its I.P.O.

The more data it has on offer, the more value it creates for advertisers. That means it has no incentive to police the collection or use of that data — except when negative press or regulators are involved. Facebook is free to do almost whatever it wants with your personal information, and has no reason to put safeguards in place.

For a few years, Facebook’s developer platform hosted a thriving ecosystem of popular social games. Remember the age of Farmville and Candy Crush? The premise was simple: Users agreed to give game developers access to their data in exchange for free use of addictive games.

..

In one instance, a developer appeared to be using Facebook data to automatically generate profiles of children, without their consent. When I called the company responsible for the app, it claimed that Facebook’s policies on data use were not being violated, but we had no way to confirm whether that was true. Once data passed from the platform to a developer, Facebook had no view of the data or control over it. In other cases, developers asked for permission to get user data that their apps obviously didn’t need — such as a social game asking for all of your photos and messages. People rarely read permissions request forms carefully, so they often authorize access to sensitive information without realizing it.

At a company that was deeply concerned about protecting its users, this situation would have been met with a robust effort to cut off developers who were making questionable use of data. But when I was at Facebook, the typical reaction I recall looked like this: try to put any negative press coverage to bed as quickly as possible, with no sincere efforts to put safeguards in place or to identify and stop abusive developers. When I proposed a deeper audit of developers’ use of Facebook’s data, one executive asked me, “Do you really want to see what you’ll find?”

The message was clear: The company just wanted negative stories to stop. It didn’t really care how the data was used.

This makes for a dangerous mix: a company that reaches most of the country every day and has the most detailed set of personal data ever assembled, but has no incentive to prevent abuse. Facebook needs to be regulated more tightly, or broken up so that no single entity controls all of its data. The company won’t protect us by itself, and nothing less than our democracy is at stake.

Indeed. And users, including businesses, need to get serious about privacy and the damage the likes of facebook are doing and flee Facebook and their ilk in droves. Will this happen? I doubt it. As long as it is free they will come. As the increased popularity of Alexa, and other personal assistants that listen in shows, people are continuing to invite these modern forms of big brother into their private lives.

Thousand-dollar iPhone X’s Face ID wrecked by ‘$150 3D-printed mask

Quote

Apple’s facial-recognition login system in its rather expensive iPhone X can be, it is claimed, fooled by a 3D printed mask, a couple of photos, and a blob of silicone.

Bkav Corporation, an tech security biz with offices in the US and Singapore, specializes in bypassing facial-recognition systems, and set out to do the same with Face ID when it got hold of a $999 iPhone X earlier this month. The team took less than a week to apparently crack Cupertino’s vaunted new security mechanism, demonstrating that miscreants can potentially unlock a phone with a mask of the owner’s face.

“Everything went much more easily than you expect. You can try it out with your own iPhone X, the phone shall recognize you even when you cover a half of your face,” the biz said in an advisory last updated on Saturday.

The team is still researching how to crack the system more easily and refining their methods. In the meantime the biz advises sticking to fingerprints for biometric security. ®

More Holes than Swiss Cheese

Quote

Microsoft and Adobe are getting into the holiday spirit this month by gorging users and admins with a glut of security fixes.

The November of Patch Tuesday brings fixes for more than 130 bugs between the two software giants for products including IE, Edge, Office, Flash Player and Acrobat.

Microsoft’s patch dump addresses a total 53 CVE-listed vulnerabilities, including three that already have been publicly detailed. Those include CVE-2017-11827, a memory corruption flaw in Edge and IE that lets webpages achieve remote code execution, CVE-2017-8700, a flaw in ASP.NET that lets web apps access restricted memory contents, and CVE-2017-11848, a flaw in IE that allows webpages to track users when they leave the website.

As usual, memory corruption and scripting engine flaws in IE and Edge make up the bulk of what Microsoft considers to be the highest risk flaws.

Those include a total of 17 CVE entries (CVE-2017-11837,CVE-2017-11839, CVE-2017-11841, CVE-2017-11861, CVE-2017-11862, CVE-2017-11870, CVE-2017-11836, CVE-2017-11838, CVE-2017-11840, CVE-2017-11843, CVE-2017-11846, CVE-2017-11859, CVE-2017-11871, CVE-2017-11873) described as browser scripting engine memory corruption holes that would allow attackers to execute arbitrary evil code on vulnerable PCs by crafting webpages that exploit the programming blunders.

Three other flaws, CVE-2017-11845, CVE-2017-11855, CVE-2017-11856, concern similar remote code execution holes in other components of Edge and Internet Explorer that can be exploited by malicious webpages.

….

And then there’s Adobe

Elsewhere, Adobe’s Flash Player has once again earned its moniker of The Internet’s Screen Door as the Windows, macOS and Linux versions of the browser plugin received fixes for five remote-code execution vulnerabilities.

The largest Adobe patch load, however, was reserved for Acrobat and Reader this month. The PDF readers were the subject of a whopping 62 CVE entries, most of which are remote code execution flaws triggered by opening a malformed PDF file.

Remember Shockwave Player? It got an update to fix CVE-2017-11294, a memory corruption flaw that would let a malformed Shockwave file achieve remote code execution.

Adobe also released updates for Photoshop CC, Connect, DNG Converter, InDesign, and Digital Editions, and Experience Manager

Have Smartphones Destroyed a Generation?

Quote

Around 2012, I noticed abrupt shifts in teen behaviors and emotional states. The gentle slopes of the line graphs became steep mountains and sheer cliffs, and many of the distinctive characteristics of the Millennial generation began to disappear. In all my analyses of generational data—some reaching back to the 1930s—I had never seen anything like it.


The more I pored over yearly surveys of teen attitudes and behaviors, and the more I talked with young people like Athena, the clearer it became that theirs is a generation shaped by the smartphone and by the concomitant rise of social media. I call them iGen. Born between 1995 and 2012, members of this generation are growing up with smartphones, have an Instagram account before they start high school, and do not remember a time before the internet. The Millennials grew up with the web as well, but it wasn’t ever-present in their lives, at hand at all times, day and night. iGen’s oldest members were early adolescents when the iPhone was introduced, in 2007, and high-school students when the iPad entered the scene, in 2010. A 2017 survey of more than 5,000 American teens found that three out of four owned an iPhone.


But the allure of independence, so powerful to previous generations, holds less sway over today’s teens, who are less likely to leave the house without their parents. The shift is stunning: 12th-graders in 2015 were going out less often than eighth-graders did as recently as 2009.

Today’s teens are also less likely to date. The initial stage of courtship, which Gen Xers called “liking” (as in “Ooh, he likes you!”), kids now call “talking”—an ironic choice for a generation that prefers texting to actual conversation. After two teens have “talked” for a while, they might start dating. But only about 56 percent of high-school seniors in 2015 went out on dates; for Boomers and Gen Xers, the number was about 85 percent.

The decline in dating tracks with a decline in sexual activity. The drop is the sharpest for ninth-graders, among whom the number of sexually active teens has been cut by almost 40 percent since 1991. The average teen now has had sex for the first time by the spring of 11th grade, a full year later than the average Gen Xer. Fewer teens having sex has contributed to what many see as one of the most positive youth trends in recent years: The teen birth rate hit an all-time low in 2016, down 67 percent since its modern peak, in 1991.

Even driving, a symbol of adolescent freedom inscribed in American popular culture, from Rebel Without a Cause to Ferris Bueller’s Day Off, has lost its appeal for today’s teens. Nearly all Boomer high-school students had their driver’s license by the spring of their senior year; more than one in four teens today still lack one at the end of high school.

….

If you were going to give advice for a happy adolescence based on this survey, it would be straightforward: Put down the phone, turn off the laptop, and do something—anything—that does not involve a screen.

She flipped off President Trump — and got fired from her government contracting job

She should of been given a hero’s welcome, but instead she got the boot from here job at Akima.

In about Akima

Akima ensures non-discrimination in all programs and activities in accordance with Title VI of the Civil Rights Act of 1964

More Bullshit. This company which is now essentially another I.T. Beltway Bandit is a disgrace. They stood up for money over common sense, money over fair employee treatment and justice, and money over decency. Too bad my tax dollars funds their ilk.

And hypocrisy and favoritism do not escape them either.

She identifies herself as an Akima employee on her LinkedIn account but makes no mention of the middle-finger photo there.

Wait. It gets even more obscene.

Because Briskman was in charge of the firm’s social-media presence during her six-month tenure there, she recently flagged something that did link her company to some pretty ugly stuff.

As she was monitoring Facebook this summer, she found a public comment by a senior director at the company in an otherwise civil discussion by one of his employees about the Black Lives Matter movement.

“You’re a f—— Libtard a——,” the director injected, using his profile that clearly and repeatedly identifies himself as an employee of the firm.

In fact, the person he aimed that comment at was so offended by the intrusion into the conversation and the coarse nature of it that he challenged the director on representing Akima that way.

So Briskman flagged the exchange to senior management.

Did the man, a middle-aged executive who had been with the company for seven years, get the old “Section 4.3” boot?

Nope. He cleaned up the comment, spit-shined his public profile and kept on trucking at work.

But the single mother of two teens who made an impulsive gesture while on her bike on her day off?

Adios, amiga.

Source: WP Article

According to their code of conduct

While using social media sites and other social networking tools we must keep the best interests of the Company in mind. Employees are prohibited from posting illegal or prohibited materials on Company social media sites, including but not limited to materials that are harassing or discriminatory. Confidential information must be protected and never disclosed in an unauthorized manner, including posted to any unauthorized site.

Well she was not at work and not using company’ assets. She was on her day off. She was exercising her 1st amendment rights. Or does one surrender their 1st amendment rights to work for Akima?