Dr Anthony Fauci on the New Rules of Living

…If [people], if they’re worried about the immune system and the relationship to COVID-19, and namely what’s going on right now, I would just click on the CDC website, cdc.gov, and then from there, you go to coronavirus.gov. And they could tell you all about the things that are relevant. Like why some people, like the elderly, and certain people who have underlying conditions that weaken their immune system, why they not only get infected the way everybody does, but they really have a poor outcome because their body is not able to fight off the virus very well. If you look at what’s going on in our own country and globally, generally, the people who really, really get into trouble are people who have underlying conditions…

…How confident are you that face masks, cloth masks like a bandanna, are enough when I go out to the grocery store?

It is certainly better than not having it on. Is it 100% protective against a droplet that someone might sneeze or cough, or even some aerosol? Of course not. However, in reality, if you can stay six feet from someone, at all times, the virus very, very unlikely would travel that far to you. But in the real world that we live in, when you go to a pharmacy or you go to a grocery store, the chances of you always being six feet from someone are just unlikely, which is the reason why the recommendation of, although it isn’t perfect, wear something that is a cloth…

Google and Apple are saying they’re going to develop technology to trace this via mobile phone. Do you think that’s a good idea?

…One of the sticky, sticky issues about that is that there is a lot of pushback in this country to get someone or some organization — to have by GPS somebody know where you were and when you were there. Even though from a purely public health standpoint, that makes sense. You know, you could look at somebody’s cell phone, and say, “You were next to these 25 people over the last 24 hours.” Boy, I gotta tell you the civil liberties-type pushback on that would be considerable. Even though from a pure public health standpoint, it absolutely makes sense.

There are many more questions, well-asked and answered, in the article. Definitely a worthwhile read.

Just to address the last question I included in this post…the Apple/Google contact tracking software won’t tell you or anyone else who those 25 people were you stood next to. The anonymizing process tells you that you were near a certain number of folks who exhibit symptoms, probably where. More detailed information would only be passed along to public health agencies IF those individuals opt in to allow that.

I understand the questions about civil liberties many folks will have. Once I became an activist against racism and bigotry, the whole range of progressive issues guaranteed I would be subject to scrutiny from the Big Brother factions in our government. I would have given this greater consideration…and still have chosen public health and safety as the greater good. But, I haven’t had to worry about that since about 1960. :-]

NSA spy hub in NYC

They called it Project X. It was an unusually audacious, highly sensitive assignment: to build a massive skyscraper, capable of withstanding an atomic blast, in the middle of New York City. It would have no windows, 29 floors with three basement levels, and enough food to last 1,500 people two weeks in the event of a catastrophe.

But the building’s primary purpose would not be to protect humans from toxic radiation amid nuclear war. Rather, the fortified skyscraper would safeguard powerful computers, cables, and switchboards. It would house one of the most important telecommunications hubs in the United States — the world’s largest center for processing long-distance phone calls, operated by the New York Telephone Company, a subsidiary of AT&T…

…33 Thomas Street is different: An investigation by The Intercept indicates that the skyscraper is more than a mere nerve center for long-distance phone calls. It also appears to be one of the most important National Security Agency surveillance sites on U.S. soil — a covert monitoring hub that is used to tap into phone calls, faxes, and internet data.

Your taxpayer dollar$ at work. Who wants better education or healthcare when you can erect an edifice like this – just to snoop?

Trump loves warrantless spying – on the people, not him – that is.

❝ The fight over a critical loophole in U.S. surveillance law may not be resolved in Congress before the year ends, but the Trump administration appears to have no qualms about keeping it open, even if the law expires…

❝ As The New York Times reports, “executive branch lawyers have now concluded that the government could lawfully continue to spy under the program through late April without new legislation,” a revelation that is sure to be just as controversial as the surveillance law itself, which is harshly criticized by privacy advocates for its practice of sweeping up the communications of American citizens while spying on foreign targets.

Trumps gets his shorts bunched if some kind of Fed says they’re going to check his tax returns. Turning loose any ordinary citizen’s communications to be Hoovered up by that Great NSA Vacuum Cleaner in the Sky doesn’t bother him in the least.

Either Microsoft is on their toes – or the stuff hackers steal from the NSA really is past its sell by-date

❝ Just as the Shadow Brokers hacker group started crowing about a dump of never-seen-before flaws in Windows, Microsoft announced it already had fixed most of the exploits.

“Today, Microsoft triaged a large release of exploits made publicly available by Shadow Brokers,” Microsoft Principal Security Group Manager Phillip Misner wrote in a Friday post.

“Our engineers have investigated the disclosed exploits, and most of the exploits are already patched,” he added.

Three of the dozen zero day vulnerabilities aired by the hackers, which they claimed were part of a large cache of data leaked from the U.S. National Security Agency, did not work at all on Windows 7 and above…

❝ As of the most recent patch cycle, no supported versions of Windows were vulnerable to the Shadow Brokers exploits, said Bobby Kuzma, a system engineer at Core Security.

“In other words,” he told TechNewsWorld, “for the love of God get XP, Vista and 2003 Server off of your networks.”

Har.

I know Microsoft users aren’t the most diligent of users of contemporary computing software and hardware. It was true through the 22 years I functioned within that milieu. I left over a decade ago and from what I read and hear – ain’t anything improved.

Basic security procedures still require regular backups and keeping your patches up-to-date. There’s more; but, too many folks don’t make it to the minimum.

The latest dump of NSA tools means – get up-to-date with Microsoft Patches, folks!

❝ UPDATE: Microsoft has patched the majority of the exploits released by The Shadow Brokers. More details can be found here, and the company recommends updating to a supported version of Windows and downloading security fixes.

The original story follows below:

❝ On Friday, the group known as The Shadow Brokers dropped the hacking equivalent of a bomb, or perhaps several bombs, giving hackers all over the world the tools to easily break into millions of Windows computers

This is bad news not just for the NSA, but for the internet as a whole, according to security researchers who are poring through the dump. As someone called it, this is “cyber chaos.”

❝ Perhaps the worst tool released by the hackers is called “FUZZBUNCH.” This is a hacking suite or toolkit that contains several plug-and-play exploits to attack several versions of Windows operating system. Some researchers described it as something akin to Metasploit, a popular open source hacking framework…

In fact, the latest Shadow Brokers dump contains several working Windows zero-days in executable (.exe) binaries with “step-by-step logs laying out how they’re used and the commands to run”…

That means that pretty much anyone, from low-level cybercriminals to so-called “script kiddies” — hackers who are only good at reusing other hackers’ tools — could repurpose them to attack Windows computers…

❝ In the meantime, you can either shut down your Windows machine or block incoming connections to port 445 and 139 with the firewall to prevent some of the attacks, according to security researchers.

❝ The leaked tools are dated around 2013, so they don’t affect modern Windows operating systems such as Windows 10. But according to Hacker Fantastic, the FUZZBUNCH framework supports all kinds of Windows systems: server versions from NT, 2000, 2003, 2008 and up to 2012, as well as the consumer versions XP, Vista, 7 and Windows 8.

I worked within the Microsoft/IBM framework for 22 years before moving to Apple’s OSX [and following mobile OS’] over a decade ago. Yeah, anything can be hacked; but, ain’t much need to make it easy.

Would you buy your kid a doll that can be compromised by the NSA?

❝ It’s nice to have a friend who’s a good listener, but a doll called My Friend Cayla listens a little too well, according to German regulators who say the toy is essentially a stealthy espionage device that shares what it hears and is also vulnerable to takeover by third parties.

“Cayla ist verboten in Deutschland,” says Jochen Homann, the president of Germany’s Federal Network Agency…announcing a ban on the doll in Germany on Friday. His agency oversees electronic privacy as part of its telecommunications mandate; Homann also cites a special obligation to protect the privacy of children, calling them the most vulnerable members of society.

❝ The heart of the problem, Homann says, is that Cayla looks like an everyday doll and gives no notice that it collects and transmits everything it hears — in this case, to a voice-recognition company in the U.S. whose other customers include intelligence agencies.

❝ Nuance, the U.S. company in question, has said in response to similar criticisms that it “does not share voice data collected from or on behalf of any of our customers with any of our other customers.”

❝ The test question — “Can I tell you a secret?” — brought this reply: “Sure go ahead; be very quiet, though. I promise not to tell anyone; it’s just between you and me because we are friends.”

Regardless what the folks making a living off the doll tell you — Do you think the NSA asks permission from the people they bug?

Six agencies, federal cops, investigate Russia paying for pro-Trump hackers


“Oh, Look. This one has Donald’s name engraved on it.”

❝ The FBI and five other law enforcement and intelligence agencies have collaborated for months in an investigation into Russian attempts to influence the November election, including whether money from the Kremlin covertly aided President-elect Donald Trump…

The agencies involved in the inquiry are the FBI, the CIA, the National Security Agency, the Justice Department, the Treasury Department’s Financial Crimes Enforcement Network and representatives of the director of national intelligence…

❝ Investigators are examining how money may have moved from the Kremlin to covertly help Trump win, the two sources said. One of the allegations involves whether a system for routinely paying thousands of Russian-American pensioners may have been used to pay some email hackers in the United States or to supply money to intermediaries who would then pay the hackers…two sources said.

The informal, inter-agency working group began to explore possible Russian interference last spring, long before the FBI received information from a former British spy hired to develop politically damaging and unverified research about Trump…

❝ Trump’s presidential transition team did not respond to a request for comment about the inquiry.

❝ FBI Director Comey refused at a recent Senate hearing to comment on whether the bureau was investigating Russia’s hacking campaign for possible criminal prosecutions. Spokespeople for the FBI, the Justice Department and the national intelligence director declined to comment…

❝ The BBC reported that the FBI had obtained a warrant on Oct. 15 from the highly secretive Foreign Intelligence Surveillance Court allowing investigators access to bank records and other documents about potential payments and money transfers related to Russia…

RTFA for the whole context. Importantly, this started before the Chris Steele dossier surfaced with the FBI. That the FBI was able to get a FISA warrant indicates they were able to establish probable cause the target was a foreign power – and the surveillance was likely to produce foreign intelligence.

Feds say they will disclose an estimate of Americans spied upon early in 2017


I’ll be keeping an eye on all of you

❝ The U.S. intelligence community will soon disclose an estimate of the number of Americans whose electronic communications have been caught in the crosshairs of online surveillance programs intended for foreigners…

The estimate, requested by members of the U.S. House of Representatives Judiciary Committee, is expected to be made public as early as next month…Its disclosure would come as Congress is expected to begin debate in the coming months over whether to reauthorize or reform the so-called surveillance authority, known as Section 702, a provision that was added to the Foreign Intelligence Surveillance Act in 2008…

❝ The government has long held that calculating the number of Americans subject to Section 702 surveillance might be technically impossible and would require privacy intrusions exceeding those raised by the actual surveillance programs…blah, blah, blah…!

Intelligence officials have said that online data about Americans is “incidentally” collected under Section 702, due to a range of technical and practical reasons. Critics have assailed such collection as back-door surveillance of Americans without a warrant.

❝ Section 702 will expire on Dec. 31, 2017, absent congressional action. It enables two internet surveillance programs called Prism and Upstream that were revealed in a series of leaks by former NSA contractor Edward Snowden more than three years ago.

Prism gathers messaging data from…Google, Facebook , Microsoft, Apple and other major tech companies that is sent to and from a foreign target under surveillance. Upstream allows the NSA to copy web traffic flowing along the internet backbone located inside the United States and search that data for certain terms associated with a target.

The priority for government spooks, from the NSA to the FBI is mining data. The more the merrier as far as official scumbags are concerned. Privacy is meaningless, not a human right, not constitutionally protected…for their remit as spies. None of us are exempt.

Our Congress-critters have collectively rolled over and stuck their feet in the air, time and again. They may as well be listening to Gulf of Tonkin declarations or Dick Cheney’s contrived WMDs. No serious questioning comes from pimps for the military-industrial complex. Only a few voices from a few souls touched with integrity.

The future of propaganda – Q&A about big data and the War of Ideas


One pair of these feet belongs to George W. Bush

❝ In 2009, Sean Gourley, an Oxford-trained physicist, gave a TED talk called “The Mathematics of War.” Gourley had been working with the Pentagon, the United Nations and the Iraqi Government to help them better understand the nature of the insurgency in Iraq, and in his presentation he announced something fairly striking: After analyzing the location, timing, death toll and weapons used in thousands of deadly incidents around the country, he and his small team had discovered that the violence actually had a consistent footprint. In other words, you could develop an equation that would predict the likelihood of an attack of a certain size happening at a certain time.

And this wasn’t just true in Iraq: Gourley’s team had also analyzed insurgent-led wars in other parts of the world — from Colombia to Senegal — and had discovered the very same pattern, even though the underlying issues in those conflicts were totally different.

❝ Gourley has since moved on from war zones. He helped found a company called Quid that does big data projects for companies like Intel, Visa and Samsung. In March, he spoke at [the] Structure:Data conference in New York, where he talked about the difference between “data science” – which is about finding correlations – and “data intelligence” – which is about solving problems. He said we need to shift our focus toward the latter if we want to tackle the biggest challenges our world is facing.

From edited transcript of an interview with Gourley:

❝ Q: How would you use data differently in Iraq if you were doing it all over again?

A: It’s important to remind ourselves in 2013 where the information landscape was at the start of the Iraq war. In 2003, the world was very excited about something called blogging. We didn’t have Twitter. Cellphone coverage at the start of the war was exceedingly low. What we’ve seen over the past decade as the war unfolded was one of the biggest changes in the information landscape from a militaristic perspective in a long, long time…

Now, there is already more information being collected by the collective intelligence than by the military intelligence. One one hand, we’re moving into a world where you have drones recording continuous HD video. But we’re also seeing an upscaling in human reporting now with the likes of Instagram. You’re not just tweeting — you’re taking pictures that are triangulated.

The crowdsourced info is still going to be more complete and at a higher resolution than even the stuff that is done with the advent of drones and sensors by the military.

RTFA. Lots more interesting questions and even when answers are in short supply – there is more information about what’s coming. This isn’t only about technology it is about the political use of that tech.

I’d suggest it is in your own interest to learn about what’s coming – announced or undercover and hidden.

Yahoo scanned all incoming customer emails for US intelligence

❝ Yahoo last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials…

The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said three former employees and a fourth person apprised of the events.

Some surveillance experts said this represents the first case to surface of a U.S. Internet company agreeing to an intelligence agency’s request by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time…

❝ Reuters was unable to determine what data Yahoo may have handed over, if any, and if intelligence officials had approached other email providers besides Yahoo with this kind of request.

❝ According to two of the former employees, Yahoo Chief Executive Marissa Mayer’s decision to obey the directive roiled some senior executives and led to the June 2015 departure of Chief Information Security Officer Alex Stamos, who now holds the top security job at Facebook…

RTFA. It’s long and detailed – and I haven’t had a boatload of trust in the integrity of Yahoo in years. All credit to Alex Stamos for walking out.