Wednesday, June 22, 2016

Interesting on several levels.  Look at how politicians (not just the Clintons) deflect this and compare it to the really bad job Sony did when faced with a similar breach and disclosure.
Clinton Foundation Said to Be Breached by Russian Hackers
The Bill, Hillary and Chelsea Clinton Foundation was among the organizations breached by suspected Russian hackers in a dragnet of the U.S. political apparatus ahead of the November election, according to three people familiar with the matter.
The attacks on the foundation’s network, as well as those of the Democratic Party and Hillary Clinton’s presidential campaign, compound concerns about her digital security even as the FBI continues to investigate her use of a personal e-mail server while she was secretary of state.
Clinton Foundation officials said the organization hadn’t been notified of the breach and declined to comment further. [The whole world knows, but they “haven’t been notified.”  Bob] 
   Before the Democratic National Committee disclosed a major computer breach last week, U.S. officials informed both political parties and the presidential campaigns of Clinton, Donald Trump and Bernie Sanders that sophisticated hackers were attempting to penetrate their computers, according to a person familiar with the government investigation into the attacks.
The hackers in fact sought data from at least 4,000 individuals associated with U.S. politics -- party aides, advisers, lawyers and foundations -- for about seven months through mid-May, according to another person familiar with the investigations.
   The Republican Party and the Trump campaign have been mostly silent on the computer attacks.  In an earlier statement, Trump said the hack was a political ploy concocted by the Democrats.
   If the Democrats can show the hidden hand of Russian intelligence agencies, they believe that voter outrage will probably outweigh any embarrassing revelations, a person familiar with the party’s thinking said.
   Bloomberg News reported Friday that the hackers who hit the DNC and Clinton’s campaign burrowed much further into the U.S. political system than initially thought, sweeping in law firms, lobbyists, consultants, foundations and policy groups in a campaign that targeted thousands of Google e-mail accounts and lasted from October through mid-May.

There’s an App for that!
This Windows App Alerts You When Your Accounts Are Hacked
Unfortunately, data breaches are increasingly common these days, and even huge websites like LinkedIn are falling to hackers.
It’s important to know if you’ve had any of your accounts compromised, and we can attest that some websites that check your email address against known breaches are great tools to stay informed.
Sites like Have I Been Pwned? are great, but if you have to manually check it from time to time to know if you’ve been attacked, you might miss a critical notification.  The Windows 10 app Hacked?, powered by Have I Been Pwned? (HIBP?), will check your email address twice a day for breaches.
   If you’re not on Windows 10 yet, you can also use the main page of HIBP to regularly check for new breaches.  Just click the Notify me button at the top to get alerts, similar to the Modern app.

There’s nothing like a good debate to wake my students up!
The Federal Bureau of Investigation, the Department of Justice, and technology and internet companies have been waging a little-known war for years over how much information companies are obligated to hand over about customers during national security investigations — absent a court order.
In early June, when Yahoo disclosed three secret government requests for customer information — called national security letters — one of those requests revealed that the FBI might have been exceeding its authority by asking for email records, such as headers or browsing information, in addition to basic subscriber information.
While the revelation that the FBI kept asking for those records surprises some academics, lawmakers, and privacy advocates – national security attorneys and large technology companies have known about the problem for years, and have been arguing with FBI attorneys over what’s allowed and what’s not.

Revising the recently revised revisions to changed FAA rules.  These may be tentative.
FAA issues new commercial drone rules
by Sabrina I. Pacifici on
“The Federal Aviation Administration (FAA) is amending its regulations to adopt specific rules for the operation of small Unmanned Aircraft Systems (sUAS) in the National Airspace System (NAS) through a final rule.  These changes address the classification of sUAS, certification of sUAS remote pilots, and sUAS operational limitations.  This advisory circular (AC) provides guidance for conducting sUAS operations in the NAS in accordance with Title 14 of the Code of Federal Regulations (14 CFR) part 107.”

So, Microsoft just won, right? 
Microsoft invokes Supreme Court opinion in Ireland email case
   In a decision Monday in a separate case on the extraterritorial application of a provision of the Racketeer Influenced and Corrupt Organizations Act (RICO), the Supreme Court set out the ground rules for its analysis, pointing out that “absent clearly expressed congressional intent to the contrary, federal laws will be construed to have only domestic application.”  The court was applying a canon of statutory construction known as the presumption against extraterritoriality.
It stated that the “the question is not whether we think ‘Congress would have wanted’ a statute to apply to foreign conduct ‘if it had thought of the situation before the court,’ but whether Congress has affirmatively and unmistakably instructed that the statute will do so."

Something I can pull from for my next IT Governance class.  I’ll change the format, I don’t PowerPoint.
Looking Forward: Corporate Governance of the Successful 21st Century Company
by Sabrina I. Pacifici on
da Silveira, Alexandre Di Miceli, Looking Forward: Corporate Governance of the Successful 21st Century Company (Presentation Slides) (June 20, 2016).  Available for download at SSRN:
“This is a PPT presentation that discusses what is coming next on corporate governance (CG) and in which ways the successful business of the 21st century will differ from its successful 20th century counterpart.  The presentation is divided into five key messages:
1) This is a moment of lower trust in big business around the world due to successive financial crises, CG misconducts, and politically-related corruption scandals;
2) There is an increasingly criticism on the standard narrative for CG based on shareholder value maximization;
3) One of the few consensuses in this changing world is that stakeholders have increasingly higher expectations about the role of companies in society;
4) There is a new approach for CG and the successful business of the 21st century based on: ethical culture & intrinsic values, stakeholder orientation, and conscious capitalism; and,
5) There is growing evidence that adopting this new approach to CG pays off.”

Interesting, but we’ve been teaching these languages for decades. 
Half of the high-paying jobs in America now require this skill
If terms like SQL, Python and JavaScript aren’t on your radar, employers may not be interested in hiring you.
Roughly half of the jobs in the top income quartile — defined as those paying $57,000 or more per year — are in occupations that commonly require applicants to have at least some computer coding knowledge or skill, according to an analysis of 26 million U.S. online job postings released this month by job market analytics firm Burning Glass and computer science education firm Oracle Academy in Redwood City, Calif.  In simple terms, coders write the instructions that tell computers what to do; in-demand programming languages include SQL, Java, JavaScript, C# and Python.
   However, there is good news for those without coding skills: You can acquire these skills without having to study computer science in college — sometimes for free.  CodeAcademy is one of the better programs, according to technology magazine Wired (and its free), but there are plenty of others, including Girl Develop It and Udacity.

We have a 3D printer and I have a key to the room it’s locked in…
10 Educational Toys You Can 3D Print

No comments: