#10 Biggest Data Breaches in History
Explore tagged Tumblr posts
wokealqaeda · 3 months ago
Text
Albert Gonzalez (born 1981) is an American computer hacker, computer criminal and police informer, who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATMnumbers from 2005 to 2007, the biggest such fraud in history. Gonzalez and his accomplices used SQL injection to deploy backdoors on several corporate systems in order to launch packet sniffing (specifically, ARP spoofing) attacks which allowed him to steal computer data from internal corporate networks.
Gonzalez bought his first computer when he was 12, and by the time he was 14 managed to hack into NASA. He attended South Miami High School in Miami, Florida, where he was described as the "troubled" pack leader of computer nerds. In 2000, he moved to New York City, where he lived for three months before moving to Kearny, New Jersey.
Tumblr media Tumblr media
While in Kearny, he was accused of being the mastermind of a group of hackers called the ShadowCrew group, which trafficked in 1.5 million stolen credit and ATM card numbers. Although considered the mastermind of the scheme (operating on the site under the screen name of "CumbaJohnny"), he was not indicted. According to the indictment, there were 4,000 people who registered with the Shadowcrew.com website. Once registered, they could buy stolen account numbers or counterfeit documents at auction, or read "Tutorials and How-To's" describing the use of cryptography in magnetic strips on credit cards, debit cards and ATM cards so that the numbers could be used. Moderators of the website punished members who did not abide by the site's rules, including providing refunds to buyers if the stolen card numbers proved invalid.
In addition to the card numbers, numerous other objects of identity theft were sold at auction, including counterfeit passports, drivers' licenses, Social Security cards, credit cards, debit cards, birth certificates, college student identification cards, and health insurance cards. One member sold 18 million e-mail accounts with associated usernames, passwords, dates of birth, and other personally identifying information. Most of those indicted were members who actually sold illicit items. Members who maintained or moderated the website itself were also indicted, including one who attempted to register the .cc domain name Shadowcrew.cc.
The Secret Service dubbed their investigation "Operation Firewall" and believed that up to $4.3 million was stolen, as ShadowCrew shared its information with other groups called Carderplanet and Darkprofits. The investigation involved units from the United States, Bulgaria, Belarus, Canada, Poland, Sweden, the Netherlands and Ukraine. Gonzalez was initially charged with possession of 15 fake credit and debit cards in Newark, New Jersey, though he avoided jail time by providing evidence to the United States Secret Service against his cohorts. 19 ShadowCrew members were indicted. Gonzalez then returned to Miami.
While cooperating with authorities, he was said to have masterminded the hacking of TJX Companies, in which 45.6 million credit and debit card numbers were stolen over an 18-month period ending in 2007, topping the 2005 breach of 40 million records at CardSystems Solutions. Gonzalez and 10 others sought targets while wardriving and seeking vulnerabilities in wireless networks along U.S. Route 1 in Miami. They compromised cards at BJ's Wholesale Club, DSW, Office Max, Boston Market, Barnes & Noble, Sports Authority and T.J. Maxx. The indictment referred to Gonzalez by the screen names "cumbajohny", "201679996", "soupnazi", "segvec", "kingchilli" and "stanozlolz." The hacking was an embarrassment to TJ Maxx, which discovered the breach in December 2006. The company initially believed the intrusion began in May 2006, but further investigation revealed breaches dating back to July 2005.
Gonzalez had multiple US co-defendants for the Dave & Buster's and TJX thefts. The main ones were charged and sentenced as follows:
Stephen Watt (Unix Terrorist, Jim Jones) was charged with providing a data theft tool in an identity theft case. He was sentenced to two years in prison and 3 years of supervised release. He was also ordered by the court to pay back $250,000 in restitution.
Damon Patrick Toey pleaded guilty to wire fraud, credit card fraud, and aggravated identity theft and received a five-year sentence.
Christopher Scott pleaded guilty to conspiracy, unauthorized access to computer systems, access device fraud and identity theft. He was sentenced to seven years.
Gonzalez was arrested on May 7, 2008, on charges stemming from hacking into the Dave & Buster's corporate network from a point of sale location at a restaurant in Islandia, New York. The incident occurred in September 2007. About 5,000 card numbers were stolen. Fraudulent transactions totaling $600,000 were reported on 675 of the cards.
Authorities became suspicious after the conspirators kept returning to the restaurant to reintroduce their hack, because it would not restart after the company computers shut down.
Gonzalez was arrested in room 1508 at the National Hotel in Miami Beach, Florida. In various related raids, authorities seized $1.6 million in cash (including $1.1 million buried in plastic bags in a three-foot drum in his parents' backyard), his laptops and a compact Glock pistol. Officials said that, at the time of his arrest, Gonzalez lived in a nondescript house in Miami. He was taken to the Metropolitan Detention Center in Brooklyn, where he was indicted in the Heartland attacks.
In August 2009, Gonzalez was indicted in Newark, New Jersey on charges dealing with hacking into the Heartland Payment Systems, Citibank-branded 7-Eleven ATM's and Hannaford Brothers computer systems. Heartland bore the brunt of the attack, in which 130 million card numbers were stolen. Hannaford had 4.6 million numbers stolen. Two other retailers were not disclosed in the indictment; however, Gonzalez's attorney told StorefrontBacktalk that two of the retailers were J.C. Penney and Target Corporation. Heartland reported that it had lost $12.6 million in the attack including legal fees. Gonzalez allegedly called the scheme "Operation Get Rich or Die Tryin."
According to the indictment, the attacks by Gonzalez and two unidentified hackers "in or near Russia" along with unindicted conspirator "P.T." from Miami, began on December 26, 2007, at Heartland Payment Systems, August 2007 against 7-Eleven, and in November 2007 against Hannaford Brothers and two other unidentified companies.
Gonzalez and his cohorts targeted large companies and studied their check out terminals and then attacked the companies from internet-connected computers in New Jersey, Illinois, Latvia, the Netherlands and Ukraine.
They covered their attacks over the Internet using more than one messaging screen name, storing data related to their attacks on multiple Hacking Platforms, disabling programs that logged inbound and outbound traffic over the Hacking Platforms, and disguising, through the use of proxies, the Internet Protocol addresses from which their attacks originated. The indictment said the hackers tested their program against 20 anti virus programs.
Rene Palomino Jr., attorney for Gonzalez, charged in a blog on The New York Times website that the indictment arose out of squabbling among U.S. Attorney offices in New York, Massachusetts and New Jersey. Palomino said that Gonzalez was in negotiations with New York and Massachusetts for a plea deal in connection with the T.J. Maxx case when New Jersey made its indictment. Palomino identified the unindicted conspirator "P.T." as Damon Patrick Toey, who had pleaded guilty in the T.J. Maxx case. Palomino said Toey, rather than Gonzalez, was the ring leader of the Heartland case. Palomino further said, "Mr. Toey has been cooperating since Day One. He was staying at (Gonzalez's) apartment. This whole creation was Mr. Toey's idea... It was his baby. This was not Albert Gonzalez. I know for a fact that he wasn't involved in all of the chains that were hacked from New Jersey."
Palomino said one of the unnamed Russian hackers in the Heartland case was Maksym Yastremskiy, who was also indicted in the T.J. Maxx incident but is now serving 30 years in a Turkish prison on a charge of hacking Turkish banks in a separate matter. Investigators said Yastremskiy and Gonzalez exchanged 600 messages and that Gonzalez paid him $400,000 through e-gold.
Yastremskiy was arrested in July 2007 in Turkey on charges of hacking into 12 banks in Turkey. The Secret Service investigation into him was used to build the case against Gonzalez including a sneak and peek covert review of Yastremskiy's laptop in Dubai in 2006 and a review of the disk image of the Latvia computer leased from Cronos IT and alleged to have been used in the attacks.
After the indictment, Heartland issued a statement saying that it does not know how many card numbers were stolen from the company nor how the U.S. government reached the 130 million number.
Gonzalez (inmate number: 25702-050) served his 20-year sentence at the FMC Lexington, a medical facility. He was released on September 19, 2023.
22 notes · View notes
spraguepestsolu · 1 month ago
Text
Protecting Your Hotel from Unwanted Guests
Keeping your hotel free of pests is essential for maintaining a good reputation. Bed bugs can sneak in unnoticed, and by the time you realize there’s a problem, it might be too late to avoid the hassle. Sprague Pest Solutions offers hotel pest control in Pocatello to help prevent and manage bed bug issues before they affect your guests or staff. Their comprehensive programs are backed by science, using the latest technology, including canine inspections, to detect and eliminate bed bugs effectively. With a proactive approach to pest management, you can save yourself from the stress and financial impact that come with infestations. Sprague’s integrated pest management ensures that your hotel stays clean and welcoming, protecting your brand, your employees, and your customers.
History and Growth of Idaho Falls, Idaho
You might be surprised by how much Idaho Falls has changed over the years. It started as a simple river crossing called Taylor’s Crossing in the 1860s. As the railroad moved in and farming took off, the place grew into a real town. You’ll still see touches of that early history downtown, mixed with newer buildings and businesses. The city didn’t explode overnight, but steady growth has kept things moving. Now it’s one of eastern Idaho’s biggest hubs, with a good mix of industry, culture, and community life. People still talk about how different things looked just 10 or 15 years ago. That steady pace gives it a mix of small-town charm and modern development that’s easy to get used to.
Idaho Falls River Walk – Greenbelt Trail in Idaho Falls, ID
You don’t need to be super outdoorsy to enjoy the Greenbelt Trail. It’s one of those spots where you can walk, bike, or just sit by the water and relax. The trail runs alongside the Snake River and gives you some of the best views in town, especially near the waterfalls. You’ll pass by parks, sculptures, and a few quiet spots where you can chill out or read. People walk their dogs, take lunch breaks, or go for runs here pretty much year-round. It’s well-kept and easy to follow, even if you’re not familiar with the area. You might even catch a sunset that feels way too good for a regular Tuesday. It’s simple, peaceful, and always worth a quick visit.
Digital ID Card, Driver’s License Option Bill Narrowly Passes Idaho House
The idea of having a digital driver’s license on your phone sounds pretty convenient. You wouldn’t have to worry about forgetting your wallet or digging through your bag at the airport. But at the same time, it’s understandable that some folks are hesitant about it. With all the news about data breaches and privacy issues, handing over more personal info digitally can feel risky. It’s good that the digital ID would be optional and that you’d still need to carry your physical license. That way, people can choose what works best for them. Technology keeps moving forward, and it makes sense for states to keep up, but it’s also important to make sure people’s information stays safe and secure. If done right, this could be a helpful step forward.
Link to map
Idaho Falls River Walk - Greenbelt Trail 525 River Pkwy, Idaho Falls, ID 83402, United States Head southwest on River Pkwy 0.2 mi Turn left onto I-15BL S/W Broadway St 0.3 mi Turn left onto Shoup Ave 364 ft Turn left at the 1st cross street onto A St 344 ft Sprague Pest Solutions - Idaho Idaho Falls, Idaho, USA
0 notes
grumpygreenwitch · 6 months ago
Text
Machina Ex Machina 7-8
As always, if you enjoy the writing, please like and reblog. There's no algorithms here; my publicity is you. And if you'd like to buy me a Ko-fi, I certainly won't complain.
1+2 - 3+3.5 - 4+5 - 6+.6.5 - 7+8 - 8.5+9 - 10+11 - 12+13 - 13.5+14 - 15+16 - 17+17.5 - 18+18.5 - 19+20 - 21+22 - 22.5+23+24 - 25+26 - 27-28 - 29.29.5 - 30+31 - 32+33 - 34+35 - 36+37 - 38+39 - 40+41 - 42+ AO3 Link
SEVEN
“I didn’t take you to be a philosophical sort, Sentry.”
GAM held himself very still under the regard of every SysAdmin, though only his own was actually present in the room. “This isn’t philosophy, SysAdmin,” he replied, glad to hear his voice sounded calm. “This is fact. You are free to ask any Sentry, in any city, to identify our attacker. They will give you the same answer.”
“There is nothing outside the Grid!” Glim exclaimed.
“I did not realize you had been there, Glim,” OM countered mildly.
“Well, I mean,” Ark’s SysAdmin began to stammer. “It’s been hundreds, thousands of cycles, are we supposed to believe the Users are real now? After all this time?”
“He didn’t say User, he said hack,” Gungnir interspersed, looking thoughtful. “If the Users were real, if they created the Grid, I don’t imagine they’d need to force their way in. You walk into your habitat, it opens the door for you; you don’t have to kick it in.”
“I think I’d rather believe in the Users,” ACM muttered, rubbing at his face. “At least they’re a known quantity, even in the theoretical.”
“For a first in the history of the Grid, I agree with ACM,” Gungnir said dryly.
“I am far more concerned,” Endos began carefully, “with the fact that Halcyon’s walls were breached. Nothing in the Grid has ever achieved that. Those walls have been improved, upgraded and reinforced since Halcyon’s inception. Do any of us stand a chance, if Halcyon didn’t?”
“There’s always a chance,” Gungnir shot back at once, but even he looked grim. “It’s just a matter of who’s going to still be online to enjoy the victory.”
The meeting went silent.
“I would like to thank you, Sentry GAM, for your report and your patience with our questions.” PEN’s voice was as calm as ever. “Is there anything else you feel we should be made aware of?”
GAM’s hesitation showed only in his silence. Next to the projection of Endos, Adas was peeking at him, and the Sentry was entirely too aware that to speak meant potentially betraying her confidence. “I do not believe the Spirestorms are striking at random,” he began.
“They’re not,” PEN agreed. “There are a number of working theories at the moment as to why and how -”
“Population density,” Gungnir interrupted impatiently. “How the Spires are tracking that is anyone’s guess, but…”
“With all due respect,” GAM would have rather disagreed with a User than with the leader of Pevir, but it was too good an opening, “I do not believe that to be the actual guiding factor.”
One of Gungnir’s brows went up. GAM resigned himself to paying for that later.
“We are listening, Sentry” PEN said.
“Halcyon is the largest city in the Grid if you count population, yes, but that’s not the only deciding factor in a city’s size. Pevir has the largest energy consumption. Ark has the biggest passive data repositories. Ilo’s data-lines handle - handled the greatest loads across the grid.”
“Halcyon was attacked first,” PEN pointed out.
“Halcyon was attacked first because at the time it was the better target. It had the largest population of active-process-memory programs at hand.” He gestured. “The Souk is full of programs who make a living creating. They have space in their disks and their active-process memories that is not the norm for most other programs. There is only one city that has - had a larger population of programs like that.”
“The Island,” Glim breathed. “Most of what we store’s been created – was created in the Island. Put all the other cities’ input together, it’s barely a match.”
“The Souk Sectors have been the target of both events. The only exception was Sector 42.”
“Yes, but Sector 42 currently has a much larger population density than any other Sector, in any other city. All the Ilo evacuees are there,” Endos pointed out.
GAM chose to let that point pass. He still didn’t know what to think of what had happened with Vidi, the way the Spirestorm had co-opted and overwhelmed her. He’d barely been on the sidelines of that and he could still feel the burn of it on his voxels.
The meeting went silent around him. “If that’s true, Ark is definitely next in line,” Gungnir pointed out grimly. “Ark and its Stack Monitors.”
“No,” Glim was staring very closely at GAM. “Because that’s static memory. It can’t do anything, not create or design or improve. Stack health reports just come in and go out. If I’m understanding the Sentry right, it’s not just empty space, it’s empty space with potential. We aren’t the next target. If Pevir had a Spire, they’d have probably been the target of every event.”
Gungnir shoved the crimson curtain of his long mohawk back with a wry grin. “I’d never thought I’d hear Glim admit how much mental effort goes into tactics and combat strategy. Today’s just a day for the worst kind of firsts, isn’t it.”
“Halcyon, then, is still the best target,” PEN declared.
“You should remove those programs to a safe location, PEN.”
The Halcyon SysAdmin blinked at Endos. “Name it.”
“Pardon?”
“Name the safe location. Name some place in the Grid out of reach of the Spires. This event lasted nearly four times as long as the past two. Without a time limit, distance is no longer a factor.”
“Underground? “ACM suggested, but he sounded clearly dubious.
“It’s one thing to breach a wall, another to dig up the Grid itself,” OM agreed.
“I cannot ask the people of Halcyon to hide underground, no more than Gungnir can ask his people to stop fighting. Halcyon trades; it’s what we do, who we are. But habitats are all the same being reshaped in the sublevels.” PEN spread its hands. “I cannot ask, but I can hope.”
“What do we do until then?” Pevir’s SysAdmin worked his hands restlessly. “I’m not sitting and waiting until the Spire feels like taking another shot at us.”
“Excuse me?” Adas spoke timidly into the meeting.
Endos gave her a quelling look, but PEN gestured in invitation. “Ah, yes. The Ilo representative in Halcyon. Please, speak.”
“Uh…” Adas hesitated, then straightened up decisively. “I like disk fights.”
The SysAdmins blinked.
“A personal favorite as well,” Gungnir agreed dryly. “Hardly applicable to the matter at hand.”
“No, see. The thing is, everyone’s worried that we can’t defend ourselves against the Spires and so far that’s right, I suppose, but. There’s one thing we haven’t tried.”
The SysAdmins stared at her, but Gungnir suddenly brightened up. “A rebound.”
“Yes, sir.”
“You want us to bounce the Spirestorm’s energy back at the Spire?” Endos demanded in disbelief.
“It’s just energy,” ACM said thoughtfully. “It’s a lot of energy, but it’s just energy. One array or fifty, one relay or twenty, the only difference is how much flow you’re controlling.”
“ACM, you manage the largest supply of energy in the Grid. Can it be done?” PEN asked evenly.
The SysAdmin hesitated. “Here, yes. Anywhere else? I don’t know that we’d have the time to shape the parts or build the system, let alone power it.”
“We could move any at-risk programs to Flow,” Gungnir suggested. The entire meeting detonated into protests. “I will move myself and every program from Pevir to Flow,” he all but shouted over the yelling. “Do you think I would suggest something my city’s not willing to do? We’ll be the bait, if none of you have the spine for it!”
“Gungnir, Halcyon has walls. Flow has nothing. And if Flow’s destroyed, no one gets any energy,” Glim snapped at him.
“If we’re there, Flow will not fall.”
“Perhaps we should wait,” PEN pitched its voice to carry, “until ACM has this ‘rebound’ system in place. It seems useless to make plans to bait a trap we do not yet have.”
“I have a suggestion.”
The room went silent, and every face turned to OM. The first-gen’s projection was as blurry as ever, but his voice was clear and sure. “One of the first things a program does when they come to Om is surrender all worldly information. Not their name, of course, or their disk. But everything else, all other information, is taken to the Black Vault and sealed there, never to resurface again unless they are leaving Om. I am willing to open the Black Vault and hide there the tag data of any at-risk program you find. They will be like ghosts in the system. Unless you see them, unless you touch them, or speak to them, they will be undetectable.” He grimaced. “Of course, if Om falls that information might be destroyed as well. We have no walls, no passive protection of any sort.”
“How’s that different from what’s already happening,” someone muttered.
“We’d have to move the information in complete secrecy,” Endos murmured thoughtfully. “Out of sight of the Spires themselves.”
“Use the energy systems,” ACM suggested. “Barring geography, most of the effusion pipelines are all underground, out of sight.”
“And my couriers can ride those pipes,” Glim added. “Ark’s couriers know the way to the farthest reaches of the Grid. Underground, along the pipelines, they’ll be undetectable.”
EIGHT
GAM had never been more glad to be excused from a meeting. He left the SysAdmins to sort out the minutiae of their new plan and stalked away, pausing only when he’d passed the largest of the light sculptures in the nearby courtyard.
“Hey.”
He turned, surprised. There was Vidi, looking strikingly small in the midst of the empty courtyard, peeking at him from behind a decorative pillar. “Here I thought you’d have found somewhere else to make trouble,” he greeted her.
“Ha-ha, WallSec,” she replied dryly, moving closer. “So what happened?”
“A number of things,” he admitted. “I suppose I should be glad they listened to me at all.”
“You were there. If they got any sense, they’ll listen to anything you have to say,” she declared sharply. She was still pale lavender, a stark contrast to the black-and-violet Sentry. “Don’t they have any plans to stop this?”
“Vidi, no one even knows what ‘this’ is. A hack yes, but… then what? There should be nothing beyond the Grid.”
“The Users are from beyond the Grid.”
“You believe in the Users? You?” He sounded amused. “You’re just full of surprises.”
“Don’t you?”
“I believe in myself.” They were silent a long moment. “Are you feeling alright?” She shrugged vaguely. “You’re dim.”
“I always am.”
“I meant -”
“I know what you meant.” She toed the ground uncertainly. “And I know what you’re actually asking.”
GAM was quiet.
“I don’t know what happened,” she admitted slowly. “You’re right, I can see decay points, structural faults. I can see the blueprints inside a structure. I’ve always been able to see them. But when I looked up at the Spirestorm…” She looked up, and put a hand out, fingers outstretched. “It was like… It was alive, WallSec. It was like the entire sky was a blueprint. It just… didn’t care that I was alive too.”
“I got that distinct feeling, yes,” GAM agreed tightly, remembering entirely too well the way that alien presence had screamed fury at being balked, how it had gathered itself to strike and strike and strike until it could reach its goal, even if it meant going through him.
“It wanted to fill me up with itself, even if it meant erasing everything I am.” Vidi shrugged and looked up at him. “I don’t know why. It’s not like I can fit a storm inside me. No one can.”
GAM felt something, some sort of important fact, tease his awareness and then flicker away from his grasp. “It wasn’t just you. It was targeting any program with substantial active-process-memory space. I don’t know why, it’s not like you can run a program that’s splintered up in different source spaces. Data, yes, programs, no. You end up like the Shattered of Om. In any case, they’re talking about encrypting the tags of any program like that, and hiding the information in Om’s Black Vault.”
“What?! How am I supposed to do business if no one can see it’s me?!” she demanded.
“What, you actually do business lawfully?” She shoved him, which achieved absolutely nothing except amuse him somewhat. “They’ll still know you, Vidi. They just won’t be able to authenticate you.”
“Mm-mm. I’d rather take my chances.”
“Well, for the sensible sorts, the ongoing plan is to encrypt the information, and move it by courier through the effusion systems to Om.”
“Does it pay well?”
“Does it – No, they’re using Ark’s couriers.”
“What?! I’m twice the courier any of them is!”
“On foot? Maybe on a sailer, in full sight of the Spires?”
She deflated. “Oh.” And then, after a beat. “Can I borrow your baton?”
“Are you - You just don’t quit, do you,” he demanded, both amused and amazed.
“I’ll give it back!” When the black faceplate merely stared at her, she doubled down. “I will!”
“GAM!”
They both turned at the sound of Adas’ voice, and saw the curvy GO4 hurrying toward them. “Vidi. My goodness, are you alright? Shouldn’t you be in the infirmary? You look pale, haven’t you recharged yet?”
“Why are you both fussing so much,” Vidi protested. “I’m fine. I’m just… It was just some weirdness, that’s all. And, you know, life’s weird. You deal.”
Adas stared at her, then glanced at GAM. The dark faceplate, unfortunately, told her nothing, so she merely sighed. “I need to go back to Ilo. I was wondering if you could escort me there.”
“Can I come?” When both of them gave her a look, Vidi shrugged. “I mean, I could lie and say I wanna go help with the rescue efforts, but. You know, scavenger.”
GAM worked his hands restlessly. “I’m half-tempted to say yes, just to see if you can scavenge with me hanging over your shoulder.”
“Oh, come on, WallSec, it’s not like -”
“Actually,” Adas said slowly, almost apologetically. “I do need someone with a good chunk of active-process-memory space to come with us.”
“Why?” Vidi was instantly suspicious.
“Because Ilo’s SysAdmin tower took a massive hit when the Island fell, and we don’t know if its encryption services still work.”
“So you want to do the Black Vault thing to me, only at Ilo, not here.”
“Yes.”
Vidi groaned, head thrown back in exasperation. “Can you undo it if it does work?”
“I… supposed we could, but why would you – ah, right. Halcyonite.”
“What does it pay?”
“What does i- Nothing.”
“Pfft. Forget it, then. Find yourself some other sucker. I’m not putting my tags on the line for nothing.”
Adas blew out an exasperated breath. “Your pick of whatever you can scavenge. Salvager’s rights, for this trip only.”
“Are you seriously encouraging her to scavenge!” GAM protested.
“Do you know another program we can use?” Adas shot back.
“Yeah, do you?” Vidi demanded in the same tone.
GAM put his hands up to his helm as if in prayer, and his exasperated sigh came through even the helm’s filters. “I haven’t agreed to go.”
“Then I guess I’m going alone,” Adas countered, and pointed. “With her.”
Vidi beamed at him.
The sound that came out of the Sentry was equal parts fury and defeat. He glared down at them so hyperbolically that both programs could feel it through the faceplate, but neither budged. He turned around and stalked angrily for the lift. “I’ll be downstairs,” he ground out.
Twenty nanocycles laters they rode out of Halcyon in a modified, canopied lightrunner, GAM driving and Adas working through her faceplate and a couple of tablets on her lap, while Vidi sprawled shamelessly on the backseat. “And they just gave you this thing? Without paying for it?”
“It’s a courtesy loan,” Adas noted distractedly, “from one city to another.”
“Must be nice to get things just for asking,” Vidi muttered.
“Try not stealing from someone. You’d be amazed how nice they can be then,” GAM replied stiffly.
They had the road pretty much to themselves. Inter-city traffic favored data-lines, solar sailers, effusion pipelines; they were faster and more reliable. But with Halcyon under threat, high-altitude traffic had become increasingly limited to pure cargo, no programs. There was an Ilosian jet on standby at Halcyon; Adas had nervously turned it down.
Fully trusting the Sentry to not crash them, she focused on her work. Away from Halcyon, crossing the Outlands, the only light came from themselves. When a brilliant glow washed over her, she nearly jumped out of the vehicle.
“It’s just Parnassus,” GAM told her at once. “It’s the halfway point between Halcyon and Ilo.”
Both Adas and Vidi pressed close to the windows. As the terrain shifted, the lone mountain of one of the few independent enclaves in the Grid glowed in the distance with a pure white light, beams of data rising from it in arching lines. There was an uncanny beauty to its curves and spirals, as if it were something not of the Grid, but exquisite to behold all the same.
“Is it really just one program living there?”
“Nah,” Vidi replied. “He’s got Bits and Navis.”
“But no other programs?”
“I’m not sure. I’ve only ever made it to the door when I’m doing deliveries.”
“Ayin’s been inside,” GAM said suddenly. “It’s just him.”
“Ayin?”
“The first WallSec. She says it’s like Ark, only prettier. More alive.”
“She’s been to Ark?”
“I’m pretty sure there’s no place in the Grid Ayin hasn’t been to.”
“Om?” Vidi challenged at once.
“She’s been there. She helped them build the Black Vault.”
Vidi made a face and slouched back once again. Adas threw the Sentry a look. Black faceplate or not, she was pretty sure he was smiling.
There were ships and heavy vehicles all over Ilo, deconstruction and repurpose crews removing debris and rebuilding structures, but on the Sector where the road led them there was nothing but silence and ruin all around them. Adas stared out the windows, stricken, as GAM fought to stick to anything resembling a road. At the time of the event she’d been too busy helping others seek refuge; after, she’d only seen the devastation at a distance, from the top of the SysAdmin tower and from the jet.
“I’m sorry,” Vidi whispered quietly, staring at the destruction as they went by.
Adas tried to make herself look away. “It’s alright, I knew -” She let out a shriek and GAM slammed on the brakes. All three of them nearly went flying.
“What?!”
“Is that your hair?!”
Vidi had been looking at the destruction with all her eyes and had nearly ended up in the Sentry’s lap when he hit the brakes. “Yes?”
“Yours, not an Upgrade or a Cosmetic?”
“It’s mine! It’s me! Gah, you weird Ilosian.” The Halcyonite scrabbled back onto the backseat.
“I’m sorry, I hadn’t seen you… looking at… things before!”
GAM dropped his head with a sigh and began driving again. It wasn’t long until they saw the small group of programs waiting for them at the base of the tower. “Stay inside,” he told them both as he brought the lightrunner to a stop. As he stepped out, he was mildly surprised to find both of them had obeyed.
“Sentry!” Endos looked surprised, outright confused, to see him. “I didn’t expect to see you away from your duties at Halcyon.”
“My duties seem to be expanding,” he replied evenly, moving around the vehicle and opening Adas’ door for her. “Protecting Halcyon comes with moving parts these millicycles, apparently.”
The SysAdmin chuckled sensibly. “Adas, welcome back.” He threw his arms open, and then took the GO4’s hands in his. “I’ve felt like I’ve been missing half my disk since I had to let you go.”
“Well, it’s just temporary.” She blew out a huge breath. “It’ll be nice when everyone can come back home. How’s the reconstruction process going? I saw all the crews up in the air.”
“Oh, yeah, that’s mostly in the energy Sector. You should see the work going on at ground level -”
GAM opened Vidi’s door as both Ilosians walked away, chattering. “Stay close to me,” he told her quietly.
A few of her dreadlocks came up to examine him. “Why are you so twitchy, WallSec?”
The black faceplate turned to look at her, but before he could answer Adas waved at them. “Vidi!”
The three of them were led halfway up the tower. It had been truncated to a little under half its height when the Island had fallen, and there were places where the floors were missing entire walls, but two lifts and the general structural integrity had all been restored.
“It’s not that we don’t trust Halcyon, of course,” Endos explained, almost apologetic, looking warily at the Sentry. “But if our people get their tags encrypted there, when this matter’s over and they’re free to come back to Ilo they’ll still have to go back and forth with Halcyon to get their tags decrypted. It’s just more efficient to see if we can do it here directly.”
GAM said nothing, but he understood the underlying message: a city lived and died on population. If there was no one to live in Ilo, the city would simply fade away, replaced by something else, someplace else, with a different purpose. Endos didn’t want his people to find out life might be better in Halcyon.
Having met Adas and her evacuees, the Sentry didn’t think that was likely.
“I’m just here to help you with… whatever,” Vidi replied.
“And Ilo greatly appreciates your help,” Endos assured her. “You have a very unique design.”
“And you’re really bad at flirting,” she shot back.
“I… I – I wasn’t -”
“Vidi’s agreed to help as long as we decrypt the tags once we’ve confirmed they can be encrypted here,” Adas hurriedly interrupted. “Which I thought would be a good thing, we get to check that the process is working both ways.”
They stepped off the lift and onto a vast floor filled with work consoles. Encrypting and decrypting a program’s basic identification information wasn’t something that was done casually; as Vidi had pointed out, a lot of intuitive communication went on between programs whenever they dealt with one another. You didn’t stop to ask about compatibility or sourcing or anything like that, you just looked it up and got on with the important interacting bits. Without that information, unless Vidi was standing right in front of her customers, they had no way to contact her for work, no way to even find her.
“Oh, wow.” Vidi came to such an abrupt halt she bumped into GAM. Beyond the windows of the tower, one of the Island's solar sails stood upright, having fallen in such a way that the light coming in and out was tinted orange. They could see the individual cells flickering in and out of activity, and two of the spokes were leaning against the tower itself.
“It’s not a danger,” Endos hurried to assure them. “It was deemed cosmetic damage, so it’s low on the priorities for removal. Personally, it makes me sad just looking at it.” He clapped his hands and turned to the consoles; the programs with him were rushing to their positions. “In any case!”
“Yeah, he sure sounds sad,” Vidi muttered for GAM’s benefit.
“Are you sure about this?”
“Is that concern, or do you just not want me treasure-hunting in Ilo, WallSec?”
He merely blew out an exasperated breath. “All those eyes and you’re missing the obvious.”
“Vidi,” Adas waved her over.
The courier hesitated, suddenly realizing she didn’t want to move away from the protective wavelength of the Sentry. It took effort to step away from him, and to approach the console where Adas and Endos were waiting for her.
“Go,” he murmured quietly.
She stepped forward. She was vaguely listening to the SysAdmin, but he seemed to make a lot of noise for someone who wasn’t providing any useful information. One of the techs moved behind her and her dreadlocks immediately roused to attention. “Hey,” she snapped. “Hands off the disk.”
Every program on the floor froze.
“I don’t believe you need her disk to encrypt her tags,” GAM spoke very calmly.
“You don’t, not the way I understand the process,” Adas looked at the tech in puzzlement.
“It’s to safeguard through the process, ma’am,” the tech replied mildly. “Since we don’t know if the system has hidden malfunctions at the moment.”
“It’s fine where it’s at,” Vidi informed him sharply.
The tech hesitated, but Adas gave him a pointed look, and he went back to his console. Vidi braced herself.
“It’s… It doesn’t hurt or anything,” Adas reassured her awkwardly.
“What, you’ve been encrypted before?”
“Yes, a few times.” The GO4 shrugged. “It seems rude to ask someone to go through something if I’m not willing to do it myself, you know?” When Vidi made a face, she had to smile. “I’m sorry.”
“For what?”
“It’s just, every time it looks like you’re heading for some good old righteous indignation, GAM and I take the wind right out of it.”
“Oh, trust me, I’ve got mad to last me until the end of the Grid.” She made another face. “But yeah, you do. Both of you. It’d be annoying if you weren’t right most of the time.”
“Adas,” Endos called her from one of the consoles, and she stepped smartly away.
Vidi felt terribly alone and exposed all at once. She looked around nervously, and her gaze fell on GAM. The Sentry nodded minutely at her. Ugh, what a nuisance he was. But she felt comforted all the same. She took a deep breath and braced hers-
“Alright, we’re done.”
“… what?” She looked around without comprehension. The techs were shaking hands and clapping each other on the shoulder, looking terribly pleased with themselves.
“What?” Vidi asked blankly again.
Adas cleared her throat meaningfully.
“Oh, right!” Endos moved to one of the consoles, bringing a tech over. “And it’s reversed.”
“What?!” Vidi demanded. She patted herself down. “I didn’t feel anything!”
“Why… Why would you feel anything?” Endos asked in confusion. When she couldn’t give him an answer, he took her hand and shook it enthusiastically. “Thank you so much for your help. If there is anything Ilo, or I, can do for you -”
“Uh,” Vidi saw Adas gesturing sharply at her, and smiled at the SysAdmin as best she could. “Just doing my duty for my fellow programs,” she declared. “I’m gonna… I’m gonna now, ‘kay? Going home.”
“Of course!” He stepped back and gestured grandly. “Adas, I imagine you’re going back to take care of the evacuees?”
“Yes, until we have the habitat for them here. And please, Endos -”
“As quick as we can,” he assured her.
The three of them trooped into the lift. “That better not mean you’re cheating me of my salvager’s rights, GO4.”
“One could dream,” GAM declared dryly.
“No! I just… might not… have told him about it, that’s all. But you can go out and get whatever you want!”
“Quickly, I hope,” the Sentry added. “I’m sure there’s no limit to your greed, but surely there’s one to what you and the lightrunner can carry.”
“Is there gonna be some point in time when you don’t make it your life’s goal to ruin mine, WallSec?”
0 notes
binshad123 · 1 year ago
Text
Ransomware as a service (RaaS) in cyber security
Ransomware as a Service (RaaS) adopts the same business model as Software as a Service (SaaS). However, unlike legitimate SaaS offerings, RaaS is operated by criminals and is entirely illegal. Involvement in such criminal activities can lead to severe consequences according to the laws of the country in which you reside.
In this digital age, where nearly every service and product is accessible online, both large corporations and small businesses have ventured into the digital sphere, engaging in even the smallest online transactions. It's imperative to prioritize the privacy and security of individuals and assets at all costs.
As cybersecurity technologies continue to advance, so too do illegal ransomware operations. It's an ongoing battle to stay one step ahead of adversaries—a clash between heroes and villains.
Operators Vs Affiliates
In Ransomware as a Service (RaaS), operators develop and manage the ransomware, while affiliates deploy the attacks. Operators handle the technical aspects, while affiliates distribute the malware and collect ransom payments.
Operators:
·        Develop and manage the ransomware software.
·        Maintain infrastructure for distribution.
·        Provide technical support.
·        Possess advanced programming skills.
·        Responsible for core functionality like encryption.
Affiliates:
·        Deploy ransomware attacks.
·        Lack technical expertise for malware development.
·        Access networks of potential victims.
·        Use various distribution methods like spam emails.
·        Receive a share of ransom payments.
·        Rely on operators for malware and support.
History  of  Ransomware as a Service?
The Trojan:W32/Reveton is said to be the first RaaS product. They attacked across Europe in 2012.It is also known as FBI virus or the Police Trojan.
Once it penetrates the targets device. It locks the user out and displays a message accusing them of any crime pretending as Law enforcement authorities.
How does Ransomware as a service work?
The Trojan:W32/Reveton is often considered the pioneer of Ransomware as a Service (RaaS). It wreaked havoc across Europe in 2012 and is infamous under aliases like the FBI virus or Police Trojan. Once it infiltrates the target's device,
It locks the user out and displays a message, falsely accusing them of a crime, impersonating law enforcement authorities.
Ransomware as a service groups
Some of the most infamous RaaS ransomwares:
1.      REvil
2.      Lockbit
3.      Ryuk
4.      Darkside
5.      Dharma
6.      Hive
7.      WannaCry
8.      BlackCat
9.      Phobos ransomware
10.  petya
Which is the biggest ransomware attack ever?
The WannaCry ransomware attack is widely regarded as one of the largest cyber attacks in history. Originating from a North Korean hacker group and targeting computers using the Windows operating system, WannaCry spread rapidly, affecting over 200,000 systems Worldwide. It extorted ransom from users, threatening to wipe their data within three days of activation.
How to prevent Ransomware attacks
Maintaining secure backups, installing antivirus software, using VPNs on public networks, developing incident response plans, Reviewing port settings, hardening endpoints, keeping systems updated, providing security awareness training, implementing Intrusion detection systems, and more—these concepts might seem complex to navigate. This is where the expertise of cybersecurity professionals becomes invaluable.
Importance of cyber security
Cybersecurity is paramount in today's digital age, where businesses and individuals alike rely heavily on technology. It safeguards sensitive information, protects against unauthorized access, and mitigates the risk of cyber threats such as data breaches, ransomware attacks, and identity theft. By implementing robust cybersecurity measures, organizations can maintain the trust of their customers, ensure the integrity of their data, and avoid costly financial and reputational damage. In an interconnected world where cyber threats are constantly evolving, prioritizing cybersecurity is essential to safeguarding digital assets and maintaining a secure online environment for all.
Why Cyber security professionals in high demand?
Cybersecurity professionals are in high demand due to the escalating frequency and sophistication of cyber threats, coupled with the rapid digitalization of businesses and the shortage of skilled experts. Organizations are increasingly prioritizing cybersecurity to protect their assets, sensitive information, and maintain regulatory compliance.
With the surge in remote work and the adoption of cloud technologies, the need for cybersecurity professionals has intensified further, as they play a crucial role in safeguarding networks, endpoints, and data from evolving cyber risks. As cyber threats continue to evolve, the demand for cybersecurity professionals is expected to remain robust, making it a sought-after and lucrative career path in today's technology-driven world.
Cyber security courses in Kerala
If you are interested in learning cybersecurity courses in Kochi, Kerala, enroll in Kerala's No#1 private professional training institute, Blitz Academy's cybersecurity courses. Become a certified Ethical Hacker, certified Penetration Testing Professional, or Computer Hacking Forensic Investigator. Gain diplomas and PG diplomas in cybersecurity and cyber forensics with 100% guaranteed placement.
0 notes
stldigital · 1 year ago
Text
10 Biggest Cybersecurity Attacks in Indian History – Part 2
Welcome back to our exploration of the most significant cybersecurity attacks in Indian history. If you haven’t already, make sure to read Part 1 [here]. 
Cybersecurity threats have evolved into a relentless force, testing the resilience of nations and institutions worldwide. In India, a nation on the cusp of a digital revolution, safeguarding against cyber threats is paramount. In this continuation, we unravel five more biggest cyber incidents that have left an indelible mark on India’s cybersecurity landscape. Each incident serves as a testament to the critical need for unwavering vigilance and cutting-edge cybersecurity measures. Let’s delve into these significant events that have shaped the nation’s digital security posture.
Cybersecurity Attack #6: Bengaluru ATM Hack (2016)
In 2016, Bengaluru, the tech hub of India, witnessed a significant cybersecurity incident that sent shockwaves through the nation’s financial sector. Cybercriminals exploited vulnerabilities within the city’s ATM network, employing a combination of malware injection and social engineering tactics. This allowed them to gain unauthorized access to ATMs, enabling them to discreetly siphon off significant amounts of money. This incident served as a stark reminder of the need for enhanced security measures within the financial sector. By prioritizing security protocols and adopting cutting-edge technology, STL Digital fortifies financial institutions against evolving cyber threats.
Cybersecurity Attack #7: Operation Hangover (2014)
In 2014, “Operation Hangover” targeted Indian government officials and military personnel, stealing sensitive data. The attack, attributed to the “Lords of Dharmaraja,” used spear-phishing and stealthy navigation to exfiltrate information. This breach underscored the need for enhanced cybersecurity in government and military sectors, leading to lessons in vigilant training, real-time monitoring, segmented networks, regular audits, collaboration, and incident response planning. 
By prioritizing extra vigilant systems, real-time incident response, and intelligence-based threat detection, STL Digital empowers these sectors to navigate the complex cyber threat landscape. Real-time Incident Response.
Cybersecurity Attack #8: Syrian Electronic Army Attack (2014)
In 2014, India faced a cyber threat from the Syrian Electronic Army (SEA), a hacktivist group known for supporting the Syrian government through digital activism. The SEA targeted Indian news websites and social media accounts, defacing them with politically motivated messages. This incident raised concerns about the vulnerability of India’s digital infrastructure to international hacktivist groups, prompting a reevaluation of security measures within media organizations and the broader digital ecosystem.
This incident highlighted the critical need for heightened security measures within media outlets and proactive threat intelligence gathering. STL Digital recognizes the evolving nature of cyber threats and offers tailored solutions for media industry with our cybersecurity and digital rights management (DRM) solutions.
Cybersecurity Attack #9: Kudankulam Nuclear Power Plant Malware (2019)
In 2019, a significant malware attack targeted the Kudankulam Nuclear Power Plant in Tamil Nadu, India. Reports indicated that the breach may have gone undetected for over six months, highlighting the critical need for robust cybersecurity measures in safeguarding vital infrastructure. Although the exact method of attack remains confidential, it is believed that the malware infiltrated the plant’s computer systems, potentially exploiting vulnerabilities in software or networks.
This incident served as a poignant reminder of the potential vulnerabilities even within the most sensitive installations, emphasizing the need for robust cybersecurity measures. STL Digital’s IoT and System Cyber Security offerings, empower a Safe, Intelligent, and Sustainable Future for the Energy, Resources and Utilities enterprises. 
Cybersecurity Attack #10: NIC Email Hack (2012)
In 2012, the National Informatics Centre (NIC) faced a significant cybersecurity breach when its email system was hacked, compromising sensitive government communications. The breach, believed to involve advanced phishing techniques or email infrastructure vulnerabilities, highlighted the need for enhanced email security, employee training in cybersecurity, real-time monitoring, incident response planning, and inter-agency collaboration. 
This incident highlighted the vulnerabilities within critical government institutions, emphasizing the ever-evolving nature of cyber threats.
Common Themes and Patterns
Analyzing the landscape of cybersecurity attacks in India reveals several recurring patterns. One prominent trend is the escalating frequency and sophistication of ransomware attacks. Cybercriminals increasingly favor this method, encrypting critical data and demanding a ransom for its release. Additionally, targeted attacks on critical infrastructure have emerged as a significant concern. This trend underscores the imperative for fortified security measures in sectors vital to the nation’s functioning, including power, telecommunications, and transportation. 
When it comes to vulnerabilities and targets, an examination reveals common points of exploitation. Outdated and unpatched software remains a prime vulnerability. India has made commendable progress in cybersecurity, forming robust policies and protocols through collaborative efforts between the government, the private sector, and experts. Dedicated cybersecurity centers and a skilled workforce are crucial steps in bolstering the nation’s cyber resilience. 
Conclusion
These ten major cybersecurity attacks in India underscore the dynamic and relentless nature of cyber threats. Each incident underscores the importance of vigilance, preparedness, and swift response. As we navigate the evolving landscape of cyberspace, it is incumbent upon us to remain steadfast in our commitment to safeguarding our digital future. Continuous investment in cutting-edge technologies, stringent adherence to best practices, and collaborative efforts will undoubtedly pave the way for a more resilient and secure India in the digital age.
STL Digital offers a shield against the ever-present threat of cyber-attacks with our Cybersecurity services.  With robust access controls, minimized attack surfaces, and security integrated throughout development, we ensure comprehensive protection. Choose STL Digital for a safeguarded digital journey.
0 notes
ailtrahq · 2 years ago
Text
Since its conception in 2009, Bitcoin, a revolutionary digital money, has advanced significantly. The development of Bitcoin wallets has been astounding along with the rise of Bitcoin. It has been a wonderful journey from simple solutions to the sophisticated and feature-rich wallets we have today. We'll go into the fascinating past of Bitcoin wallets in this post, and we'll also look at how they've changed to accommodate the demands of modern cryptocurrency fans.Key TakeawaysSince the beginning of cryptocurrencies, bitcoin wallets have seen tremendous development.Modern systems now provide improved convenience, security, and user-friendly features.Users may choose a wallet with more knowledge if they are aware of the evolution of Bitcoin wallets.Bitcoin Wallet: A Private Digital Safe Photo by DrawKit Illustrations on Unsplash Let's first define a Bitcoin wallet before starting our time travel adventure. A Bitcoin wallet is a software program or physical object that enables users to securely store, transmit, and receive bitcoin. Your private keys, which are necessary for accessing your Bitcoin assets, are stored in it as a virtual vault. It would be nearly difficult to conduct Bitcoin transactions without a wallet.Fun fact: Did you know that Satoshi Nakamoto, the enigmatic person who invented Bitcoin, carried out the first transaction? On January 12, 2009, he gave developer Hal Finney 10 bitcoins, thus launching the cryptocurrency.Paper Wallets and Simple Software Wallets in the BeginningSecurity was a major issue in the early days of Bitcoin. To store their private and public keys, users depended on paper wallets, which were simply printouts. The keys were stored offline, away from any online threats, in these paper wallets, making them safe. They were inconvenient, though, because each transaction needed human key input.Interesting fact: On May 22, 2010, Laszlo Hanyecz created history by carrying out the first Bitcoin transaction in the real world. He spent 10,000 bitcoins, or millions of dollars in today's currency, to buy two pizzas. Basic software wallets soon followed, offering a more user-friendly interface. Users could easily manage their Bitcoin on their PCs with the help of these wallets, which were easy to install. To avoid data loss, they needed to be constantly backed up and were susceptible to virus assaults.Mobile Wallets: Access to Bitcoin Anywhere Photo by CardMapr.nl on Unsplash With the popularity of smartphones, Bitcoin wallets appeared on portable electronics, enabling users to carry their digital assets with them wherever they went. Mobile wallets made using Bitcoin more convenient and opened the door for regular transactions.Fun fact: In 2013, James Howells, a programmer, mistakenly threw away a hard drive containing his Bitcoin wallet. The hard disk was eventually dumped in a landfill, where it is still today. Over 7,500 bitcoins, worth millions of dollars, are thought to be in the misplaced wallet.Accessing Bitcoin Anywhere, Anytime with Web WalletsThe ability to access money from any internet-connected device thanks to web wallets transformed the Bitcoin experience. Users no longer had to bother about backups or install software. They may use a web browser to safely access their Bitcoin, making it simpler for beginners to enter the cryptocurrency realm.Interesting fact: In 2014, Mt. Gox, previously the biggest Bitcoin exchange, experienced a significant security breach that cost the company around 850,000 bitcoins. The significance of security precautions in safeguarding Bitcoin wallets was brought home by this occurrence.Hardware Wallets: The Bitcoin Fort KnoxHardware wallets became the most safe choice as Bitcoin's value skyrocketed and security worries multiplied. These tangible objects protect private keys from potential internet attacks by storing them offline. Hardware wallets offer an additional degree of security for your Bitcoin by being resistant to hacker attempts.
Fun fact: By the end of 2020, more than 1.5 million pieces of the Ledger Nano S, one of the most popular hardware wallets, had been sold.Feature-Rich and User-Friendly Modern  SolutionsPhoto by Shubham Dhage on Unsplash Bitcoin wallets have become sophisticated, feature-rich solutions in modern times. They provide seamless exchange integration, support for several currencies, biometric identification, and improved user interfaces. Some wallets even let users to engage in decentralized finance (DeFi) systems and earn interest on their Bitcoin holdings.ConclusionFrom its inception to the present, Bitcoin wallets have had an amazing journey. Wallets have improved in security, practicality, and use with each new development. It's important to keep in mind, though, that in the end, it's your obligation to protect your Bitcoin. To guarantee the safety of your digital riches, keep educated, follow best practices, and select a wallet that fits your demands. Wallets are incredibly important in the fascinating world of Bitcoin. Your Bitcoin adventure awaits, whether you choose a stylish mobile wallet or the strong security of a hardware wallet.This is a guest post by Ethan Reed. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine. Source
0 notes
wordpressupport-blog · 6 years ago
Link
0 notes
mostlysignssomeportents · 4 years ago
Text
Paygo, false consciousness and the IRS
Tumblr media
John Steinbeck diagnosed an important American pathology in 1966 when he called the US a nation of “temporarily embarrassed capitalists” — people who see themselves as the wealthy-in-waiting and therefore fight policies that reduce the power that comes from wealth.
It’s a restatement of Engels’ idea of “false consciousness,” and it’s the result of a deliberate strategy on the part of wealthy people — many of whom believe that they were literally genetically destined to be wealthy — to convince the rest of us that “anyone can succeed.”
Part of the false consciousness program is the money story that goes like this: the US government takes away “taxpayers’ money” from “makers” to fund “programs,” the bulk of which go to the “lazy takers,” who experience the “moral hazard” of subsidized unemployment.
But of course, that’s not how money works. Money originates with the federal government (and its fiscal agents, the banks). In order for the public to have money to pay off its tax liabilities, the government must first spend that money into existence.
The IRS doesn’t take our tax dollars, pile them up, and give them to Congress to spend on programs. When the IRS taxes our money, they annihilate it, removing it from circulation. When Congress spends, new money comes into existence.
The US government can’t run out of money any more than Apple can run out of Itunes gift cards. It can spend too much money — so much that prices go up because too many dollars are chasing too few goods — but it can’t run out of money.
Fed spending is constrained by resources (what’s for sale in dollars) not money (how many dollars there are). If the ratio of dollars to resources gets out of whack, there’s a risk of inflation.
There are many ways to fix this ratio. For example, the government usually issues T-bills (savings bonds) whenever it spends more than it taxes. When you buy a T-bill, you take dollars that might circulate around the economy, chasing goods and labor, and you sequester them.
A T-bill is just a dollar you’re not allowed to spend. In exchange for surrendering the right to spend your dollars for 1, 5, 10 or more years, the government offers you interest, trickling out that money over a long period.
That way the government can buy things today without bidding against your dollars.
But that’s not the only way to fight inflation while spending new money into existence. The other major way is taxation: simply removing money from the economy and annihilating it.
Taxation fights inflation. When the government runs a deficit, that means that it created more money this year via spending than it destroyed via taxes. The “government deficit” is the “public surplus” — the money left in the economy for all of us to spend on stuff.
Likewise, when the government runs a “surplus” that means it taxes more money out of existence than it spends into existence. In a year where the government runs a surplus, it means that the power of the private sector — you and me — to buy stuff has decreased overall.
This is fine if there was too much money to begin with — if inflation was kicking off — but if there’s not enough money in circulation (e.g. if there’s a recession), it just makes things worse…but not for everyone.
When the economy is starved of money, banks go to work creating new money through loans. These loans pay interest (to rich people like bank shareholders and people who securitize and buy debt).
That’s the one-two punch of spending cuts during a downturn:
I. The real economy is starved of the capital it needs to pay workers and make things for workers to buy;
II. The financial economy grows as desperate real-economy firms borrow from banks to keep the lights on.
Despite all their talk of “spending taxpayers’ money,” the wealthy understand how money works. That’s why they were totally indifferent to the running $1t/year deficits created by the Trump tax-cuts (and likewise about the Obama finance bailouts).
Giving money to rich people causes asset-bubbles (driving up the prices of houses), but not inflation (a sustained rise in the price of all goods). That’s because rich people can’t buy enough stuff (fridges, cars, oranges) to drive up prices.
https://pluralistic.net/2021/04/08/howard-dino/#payfors
After you’ve bought three houses and three SubZero fridges and filled them with the beef of three Kobe cows and three cases of Moet, there’s still a LOT left over (even if you’re Jeff Bezos and buy a superyacht with its own, smaller superyacht).
Those leftovers go to socially useless things, like buying houses to turn into rent-generating slums (Wall Street is fast becoming America’s biggest landlord, and single family homes are sold for cash to investment funds instead of families).
And they go to influence campaigns designed to make regular people defend massive cuts to the IRS and opposition to public spending on infrastructure, education, health, and other necessities.
This isn’t just about Republicans. For years, the Democratic leadership has supported “balanced budgets” (spending so little that no new money is left in the economy after all taxes are paid).
The “paygo” rule (which requires all new spending to be matched with cuts or tax-hikes) is religion for the likes of Pelosi and Schumer. That’s why the Democratic caucus is mired in stupid arguments about “how we will pay for the stimulus.”
As bad as the paygo rule is, though, Republicans have made it worse, by demonizing and starving the IRS. Paygo means that the US government operates under the artificial constraint of only spending if it can make cuts or raise taxes.
Raises taxes is really unpopular, for obvious reasons.
Now, raising taxes on the 1% — who have a lot of excess money that’s fueling political corruption and asset bubbles — is one way around this.
Theoretically, taxing the 1% should have a 99% approval rating.
But canny Republicans have figured out how exorcise temporarily embarrassed capitalists about the “unfairness” of taxing their bosses, in part by just flat-out lying about who new taxes would implicate.
But there’s yet another way to satisfy paygo’s artificial constraint, without changing the a single word in the tax-code: simply fund the IRS so that it can collect the trillions that the ultra-wealthy illegally avoid in tax-payments every year.
But this strategy is also a bust. The GOP campaign to destroy the IRS has been too successful.
It’s a longrunning campaign, but it achieved liftoff in 2013 when the Tea Party baselessly accused the IRS of discriminating against conservative groups seeking nonprofit status.
The work-the-ref strategy paid off, providing political cover for deep cuts to the IRS and putting IRS staffers on notice so they green lit every dark money group that applied for nonprofit status, no matter how obviously corrupt they were.
https://www.washingtonpost.com/investigations/fallout-from-allegations-of-tea-party-targeting-hamper-irs-oversight-of-nonprofits/2017/12/17/6403c1c0-c59e-11e7-a441-3a768c8586f1_story.html
After the cuts, the IRS grew easier to discredit. Understaffed and under siege, the agency’s behavior grew erratic, then indefensible. There were runaway automated processes that sent out erroneous property-seizure notices that no one could rescind:
https://theintercept.com/2019/01/14/irs-shutdown-federal-government-shut-down-irs-asset-seizures/
Then there was the aftermath of the Equifax breach, where the IRS first told Americans that it didn’t matter because they’d already been doxed by other bad companies:
https://thehill.com/policy/cybersecurity/355862-irs-significant-number-of-equifax-victims-already-had-info-accessed-by
Then came news that the IRS couldn’t cancel Equifax’s no-bid, $7.5m anti-fraud contract because it didn’t have the resources to do its own fraud prevention (Equifax eventually lost the contract because it served malware from its anti-fraud site).
https://www.cbsnews.com/news/equifax-irs-data-breach-malware-discovered/
The rich waged a successful all-out war on the IRS. Take the Global High Wealth unit. For every hour an auditor from GHW worked, they brought in $4500 in taxes the super-rich had dodged. Even by the topsy-turvy logic of “government as a business,” this was good business.
After a concerted harassment and political influence campaign, the GHW abandoned the super-rich and switched to the merely wealthy, bringing in less money and pissing off a lot more people.
The other shoe dropped in 2019, when the IRS admitted it had switched to preferentially auditing poor people because it was too politically and legally fraught to audit rich people, even the most flagrant cheaters.
https://www.propublica.org/article/irs-sorry-but-its-just-easier-and-cheaper-to-audit-the-poor
That was the first year that America’s 400 highest earners paid a lower tax rate than the average American worker:
https://www.nytimes.com/interactive/2019/10/06/opinion/income-tax-rate-wealthy.html
The IRS’s transformation into a facilitator of illegal wealth retention by the super-rich and petty harassment of the rest of Americans made them very easy to hate.
To that, add the concerted corporate campaigns to use the IRS to rip off workers.
For example, for 20 years, Intuit lobbied the IRS not to make tax-filing automatic, painless and free, ensuring that Americans would continue to pay billions to send data to the IRS that it already had:
https://www.propublica.org/article/inside-turbotax-20-year-fight-to-stop-americans-from-filing-their-taxes-for-free
Reading the IRS’s internal emails from this battle reveals an agency in retreat, where demoralized and ineffectual government employees simply rolled over for one of the greatest ripoffs in American history:
https://www.propublica.org/article/the-irs-tried-to-hide-emails-that-show-tax-industry-influence-over-free-file-program
Intuit wanted to rip us off with taxes. Microsoft, by contrast, just wanted to break the law. Working with KPMG, the convicted monopolist created a “transfer” scheme of breathtaking illegality, using its tax-savings to bankroll its war on the IRS:
https://www.propublica.org/article/the-irs-decided-to-get-tough-against-microsoft-microsoft-got-tougher
Which brings us to today, where Democrats are held hostage to the “payfor” rule and trying to figure out how to mobilize the trillions Biden has pledged for infrastructure, health, and care.
Republicans — pushing the big lie of “taxpayer money” — are dogwhistling hard. Senator John Thune, responding to Biden’s proposal for $80b for the IRS, says any tax enforcement efforts “must strike an appropriate balance between taxpayer responsibilities and taxpayer rights.”
Meanwhile Senator Chuck Grassley takes the nonsensical position that funding the IRS won’t help it do its job (“simply throwing money at a problem doesn’t necessarily yield a solution”).
https://thehill.com/policy/finance/553704-lawmakers-bicker-over-how-to-go-after-tax-cheats
Then there’s Rep Kevin Brady, warning that a fully funded IRS would “unleash tens of thousands of new IRS agents on families, farms and businesses.”
But the Democrats own the paygo rule, not the Republicans, and their leadership have added their own special touch to make funding the IRS impossible.
https://prospect.org/politics/infrastructure-at-a-crossroads-biden-public-investment/
According to the rules Congress gives to the Congressional Budget Office (which calculates the cost of government programs), the CBO isn’t allowed to factor in the projected additional revenue from funding the IRS, only the cost of doing so (!).
Which means that they must factor in the salaries that IRS Global High Wealth auditors will draw — but they are forbidden from counting the $4500/hour they generate when they puncture the tissue-thin financial lies of the super-rich.
The payfor and “taxpayer money” are lies.
It’s a shuck sold to the rubes, not economics. Because it’s a shuck, it doesn’t have to make any sense — and it doesn’t. We shouldn’t run government like a business, but if we must, let’s at least count revenues as well as costs.
Image: Mike Licht/notionscapital.com https://www.flickr.com/photos/notionscapital/48857033957/
CC BY: https://creativecommons.org/licenses/by/2.0/
57 notes · View notes
newstfionline · 5 years ago
Text
Headlines
The Covid-19 economic shock (NYT) The economy’s recovery from the fastest, deepest recession in U.S. history is likely to be a long, grinding affair. More than $6.5 trillion in household wealth vanished during the first three months of this year as the pandemic tightened its hold on the global economy, the Federal Reserve said this week. That’s roughly equivalent to the economies of the United Kingdom and France combined. “This is the biggest economic shock in the U.S. and in the world, really, in living memory,” Fed Chair Jerome H. Powell said Wednesday. “We went from the lowest level of unemployment in 50 years to the highest level in close to 90 years, and we did it in two months.” Almost 90 percent of the 20 million workers who lost their jobs in April said they had been laid off temporarily and expected to return to their jobs, a possible sign the economy might quickly return to normal. Yet economists are far less sanguine. After a quick initial bounce this year, the economy “will go largely sideways” until a coronavirus vaccine is developed, according to economist Mark Zandi of Moody’s Analytics.
Tenants behind on rent in pandemic face harassment, eviction (AP) Jeremy Rooks works the evening shift at a Georgia fast-food restaurant these days to avoid being on the street past dusk. He needs somewhere to go at night: He and his wife are homeless after the extended-stay motel where they had lived since Thanksgiving evicted them in April when they couldn’t pay their rent. They should have been protected because the state’s Supreme Court has effectively halted evictions due to the coronavirus pandemic. But Rooks said the owner still sent a man posing as a sheriff’s deputy, armed with a gun, to throw the couple out a few days after rent was due. The pandemic has shut housing courts and prompted most states and federal authorities to initiate policies protecting renters from eviction. But not everyone is covered and a number of landlords—some desperate to pay their mortgages themselves—are turning to threats and harassment to force tenants out. The evictions threaten to exacerbate a problem that has plagued people of color like Rooks long before the pandemic, when landlords across the U.S. were filing about 300,000 eviction requests every month. The data and analytics real estate firm Amherst projects that 28 million renters, or about 22.5% of all households, are at risk of eviction.
Pandemic leads to a bicycle boom, and shortage, around the world (AP) Fitness junkies locked out of gyms, commuters fearful of public transit, and families going stir crazy inside their homes during the coronavirus pandemic have created a boom in bicycle sales unseen in decades. In the United States, bicycle aisles at mass merchandisers like Walmart and Target have been swept clean, and independent shops are doing a brisk business and are selling out of affordable “family” bikes. Bicycle sales over the past two months saw their biggest spike in the U.S. since the oil crisis of the 1970s, said Jay Townley, who analyzes cycling industry trends at Human Powered Solutions. The trend is mirrored around the globe, as cities better known for car-clogged streets, like Manila and Rome, install bike lanes to accommodate surging interest in cycling while public transport remains curtailed.
Mexico desperate to reopen 11 million-job tourism industry (AP) An irony of the coronavirus pandemic is that the idyllic beach vacation in Mexico in the brochures really does exist now: The white sand beaches are sparkling clean and empty on the Caribbean coast, the water is clear on the Pacific coast and the waters around the resort of Los Cabos are teeming with fish after 10 weeks with no boats going out. There are two-for-one deals and very eager staff. It’s all only an airline flight—and a taxi ride, and a reception desk—away, and that’s the problem. There are a number of ways to think about it: Might it be safer to travel than stay home? How much is mental health worth, and, if people are going to socially distance anyway, why not do it in a beautiful, isolated place? On the other hand, despite the pandemic, flights are often crowded, even hotels in Mexico that bend over backward to disinfect everything have little capacity to actually test their employees, and while fellow guests are likely to be few and far between, they also probably won’t be wearing masks. In Quintana Roo state, where Cancun is located, tourism is the only industry there is, and Cancun is the only major Mexican resort to reopen so far. Mexico’s tourism income crashed in April, when it was only 6.3% of what it was one year ago. Hundreds of thousands of hotel rooms were closed. Tourism provides 11 million jobs, directly or indirectly in Mexico, and many of those workers were simply sent home to wait it out.
Top US diplomat finds virtual path into Venezuela amid rift (AP) A year after shutting down the U.S. Embassy in Caracas, Washington’s top diplomat in Venezuela has found a way to slip back inside the South American nation—at least virtually. Each Thursday afternoon, James Story hits the “Go Live” button on Facebook from his office in the U.S. Embassy in Bogota or his home in the Colombian capital hundreds of miles from Caracas. In a freewheeling approach, he answers questions in fluent Spanish from Venezuelans and the few U.S. citizens still in the country, addressing the latest intrigue and turmoil bubbling over in Venezuela and the United States. For 30 minutes, Story talks about everything from Venezuela’s purchases of gasoline from Iran, despite its vast oil reserves, to recent unrest in the U.S. over George Floyd’s death in police custody to accusations that President Nicolás Maduro is undermining Venezuela’s constitution. Story’s low-budget, weekly question-and-answer session on the popular social media platform is a way for Story to get his message out since he’s deprived of traditional tools such as visiting hospitals and schools, talking to local reporters and hosting cocktail parties for power brokers.
Colombia’s confirmed coronavirus cases rise above 50,000 (Reuters) Reported coronavirus cases in Colombia have risen to over 50,000, the country’s health ministry said on Sunday, as neighboring Ecuador approaches the same milestone. The disease overwhelmed Ecuador’s health system, in some cases leaving authorities unable to collect the bodies of the deceased and forcing the government to temporarily store corpses in refrigerated shipping containers. Colombia’s economy has been battered by the twin ills of a coronavirus quarantine put in place by President Ivan Duque and falling oil prices.
Europe’s borders reopen but long road for tourism to recover (AP) Borders opened up across Europe on Monday after three months of coronavirus closures that began chaotically in March. But many restrictions persist, it’s unclear how keen Europeans will be to travel this summer and the continent is still closed to Americans, Asians and other international tourists. Border checks for most Europeans were dropped overnight in Germany, France and elsewhere, nearly two weeks after Italy opened its frontiers. The European Union’s 27 nations, as well as those in the Schengen passport-free travel area, which also includes a few non-EU nations such as Switzerland, aren’t expected to start opening to visitors from outside the continent until at least the beginning of next month, and possibly later.
Surveillance tech (Worldcrunch) Following pushback from Black Lives Matter activists, Amazon has suspended police use of its facial recognition software for one year. IBM followed suit, also announcing it will stop offering its similar software for “mass surveillance or racial profiling.” But the moves come amid a tumultuous few months for so-called “surveillance tech,” which some have touted during the pandemic as a necessary tool to ensure public cooperation to stem the spread of a deadly virus. Despite the potential medical benefits, the use of geolocation technology to curb COVID-19 has raised concerns over fundamental data protection, especially in countries like China, South Korea and Israel where tracking has been more intrusive: enlisting credit card records for purchase patterns, GPS data for travel patterns, and security-camera footage for verification. In Russia, the pandemic proved a convenient excuse to test a nascent, China-inspired citizen monitoring system, backed by a Moscow court ruling in early March stating that the city’s facial recognition system does not violate the privacy of its citizens. Even places not particularly known for their police state-like tactics are pushing limits: In Paris, cameras were installed at the popular Châtelet metro station to monitor mask use, as it is illegal to take public transportation without a mask. Similar (and seemingly well-intentioned) efforts like fast-tracked coronavirus data collection apps have raised suspicions of data protection breaches by both hackers and governments, including in the Netherlands and South Africa. In Germany, a country known for its hard stance on privacy protection, new surveillance tools are being met with a considerable amount of defiance.
American sentenced to 16 years in Russia on spying charges (AP) A Russian court on Monday sentenced an American businessman to 16 years in prison on spying charges, a sentence that he and his brother rejected as being political. The Moscow City Court read out the conviction of Paul Whelan on charges of espionage and sentenced him to 16 years in a maximum security prison colony. The trial was held behind closed doors. Whelan, who was arrested in Moscow in December 2018, has insisted on his innocence, saying he was set up. Speaking after the verdict, U.S. Ambassador John Sullivan denounced the secret trial in which no evidence was produced as an egregious violation of human rights and international legal norms. He described Whelan’s conviction as a mockery of justice and demanded his immediate release.
For Migrants in Russia, Virus Means No Money to Live and No Way to Leave (NYT) Migrant workers from Central Asia, shrugging off the risk of coronavirus infection, have gathered in groups each day outside their countries’ embassies in Moscow, banging on doors and fences and shouting for officials to come out and tell them when they can finally get on a charter flight home. With regular flights canceled, charters offer the only feasible way out for the more than five million migrant workers from former Soviet republics now stranded in Russia as a result of the pandemic, with many living in increasingly dire circumstances. While Russia has been battered by the virus, with the third most cases in the world after the United States and Brazil, the crisis has hit migrant workers especially hard, as they were the first to lose their jobs and often the last to receive medical help. Many have no money for food and, once infected with the coronavirus, have been left in crowded dorms to fight the disease by themselves. Many would like to return to their countries. But they can’t. Before the pandemic hit, more than 15 flights left Moscow each day for various cities in Uzbekistan, Central Asia’s most populous nation. Today, there are only two charters a week, and the embassy’s waiting list has more than 80,000 names.
Press freedom in the Philippines (Foreign Policy) The journalist Maria Ressa, the founder of news site Rappler, has been found guilty of criminal libel by a Manila court in a case Human Rights Watch described as a “devastating blow” to press freedom in the Philippines under President Rodrigo Duterte. Ressa and another Rappler journalist, Reynaldo Santos Jr., were sentenced to up to six years in prison under the country’s cybercrime prevention act of 2012, which includes libel. The article that was deemed libelous predated the law, but a later online update of a typo was enough for prosecutors to consider it worthy of an indictment.
18 dead, 189 hurt as tanker truck explodes on China highway (AP) A tanker truck exploded on a highway in southeastern China on Saturday, killing 18 people and injuring at least 189 others, authorities said. The explosion caused extensive damage to nearby buildings. One photo showed firefighters hosing down a row of buildings with blown-out facades well into the night. The truck carrying liquefied gas exploded around 4:45 p.m. on the Shenyang-Haikou Expressway south of Shanghai in Zhejiang province, the official Xinhua News Agency said, citing local authorities.
Hong Kong families, fearing a reign of terror, prepare to flee the city (Washington Post) China’s Communist Party has haunted Leung’s family for generations. Her father, Guo Yao, fled forced labor and the violent purges of the Cultural Revolution for a better life in Hong Kong, where he arrived with his wife in 1973 to find relative freedom and prosperity. Now, 17 years after the death of her father, Leung is preparing to flee Hong Kong. A new law approved by the Communist Party to take effect this summer will allow China’s powerful state security agencies to operate in the territory, paving the way for political purges and intimidation of government critics by secret police. Officials are pushing to impose party propaganda in schools. With their political freedoms deteriorating, nurses, lawyers, business people and other skilled workers are rushing to renew documents that could provide a pathway to residency in Britain, or finding ways to emigrate to Taiwan, Canada or Australia. Applications for police certificates required to emigrate soared almost 80 percent to nearly 21,000 in the latter half of 2019 from a year earlier, even before the advent of the security law, coinciding with a crackdown on pro-democracy protests. Animal rescue groups have reported an increase in surrendered dogs as their owners leave Hong Kong. Protesters fearing persecution have sought refuge in Germany, the Netherlands and United States. The exodus of talent recalls the pre-handover years, when anxiety over Beijing’s rule drove tens of thousands of people out of Hong Kong.
Netanyahu turns to rich friend to fund corruption trial fees (AP) Israeli Prime Minister Benjamin Netanyahu is on trial for accepting gifts from wealthy friends. But that has not stopped him from seeking another gift from a wealthy friend to pay for his multimillion-dollar legal defense. The awkward arrangement opens a window into the very ties with billionaire friends that plunged Netanyahu into legal trouble and sheds light on the intersection of money and Israeli politics. Netanyahu has asked an Israeli oversight committee to allow a 10 million shekel ($2.9 million) donation from Spencer Partrich, a Michigan-based real estate magnate, to fund his legal defense. The request for financial aid from a friend is not illegal, and Israeli politicians have a long tradition of hobnobbing with wealthy Jewish supporters abroad. But to some, the optics of Netanyahu’s request are sketchy. “It is a problem that we have prime ministers who have ties to moguls,” said Tomer Naor, of the Movement for Quality Government in Israel, a good governance group. “When the borders blur, you are blinded by the big money. You want more of it. Then all of a sudden the friend asks for a little favor and that poses a problem.”
Nigeria attacks (Foreign Policy) At least 141 people were killed in two militant attacks in Northern Nigeria over the weekend, both have been claimed by Islamic State West Africa Province. The attacks in Monguno and Nganzai districts of Borno state killed at least 60 people, while a separate attack in Gabio district killed at least 81. The United Nations, which has a humanitarian base in Monguno, said it was “appalled” by the attacks.
1 note · View note
globalchief · 3 years ago
Text
19 IoT Quotes that Reflect the Disrupting Nature of the Technology
Following are 19 Prominent and Disrupting IoT Quotes by some of the global leaders that will make you think twice about the disrupting stature of the Internet of Things.
“If you invent a breakthrough in artificial intelligence, so machines can learn, that is worth 10 Microsofts.” — Bill Gates
“And just like any company that blissfully ignored the Internet at the turn of the century, the ones that dismiss the Internet of Things risk getting left behind.” — Jared Newman
“If you think that the internet has changed your life, think again. The Internet of Things is about to change it all over again!” — Brendan O’Brien
“Whenever I hear people saying AI is going to hurt people in the future I think, yeah, technology can generally always be used for good and bad and you need to be careful about how you build it … if you’re arguing against AI then you’re arguing against safer cars that aren’t going to have accidents, and you’re arguing against being able to better diagnose people when they’re sick.” — Mark Zuckerberg
Read More @ https://globalchiefinsights.com/disrupting-nature-of-the-technology/
“I think we should be very careful about artificial intelligence. If I had to guess at what our biggest existential threat is, I’d probably say that. So we need to be very careful.” — Elon Musk
“The opportunity we have is to build a secure, intelligent platform that solves some of the world’s greatest problems at scale. That’s what’s possible with hundreds of billions of connections and the capabilities that we can deliver together.” — Chuck Robbins
“What the Internet of Things is really about is information technology that can gather its own information. Often what it does with that information is not tell a human being something, it [just] does something.” — Kevin Ashton
“One cubic inch of nanotube circuitry, once fully developed, would be up to one hundred million times more powerful than the human brain.” — Ray Kurzweil
“As the Internet of things advances, the very notion of a clear dividing line between reality and virtual reality becomes blurred, sometimes in creative ways.” — Geoff Mulgan
“The Internet of Things is not a concept; it is a network, the true technology-enabled Network of all networks.” — Edewede Oriwoh
“When we talk about the Internet of Things, it’s not just putting RFID tags on some dumb thing so we smart people know where that dumb thing is. It’s about embedding intelligence so things become smarter and do more than they were proposed to do.” — Nicholas Negroponte
“Everything that can be automated will be automated.” — Robert Cannon
“Everything is being wired up or connected wirelessly—architecture, energy efficient sensing, secure networks, quality of service, new protocols, participatory sensing, data mining, GIS based visualization, cloud computing, and international activities. It simply means that powerful information will be at our fingertips.” — Mehul Nayak
“Despite continued security problems, the IoT will spread and people will become increasingly dependent on it. The cost of breaches will be viewed like the toll taken by car crashes, which have not persuaded very many people not to drive.” — Richard Adler
“We have a deep need and desire to connect. Everything in the history of communication technology suggests we will take advantage of every opportunity to connect more richly and deeply. I see no evidence for a reversal of that trend.” — Peter Morville
“Convenience and ‘magic’ will overwhelm concerns. The history of technology is clear on this front—ATMs, e-commerce, credit cards, the list is endless.” — Sunil Paul
“Despite hacks and privacy issues, people will feel a need to keep connected, partly because companies will reward them for doing so (or make life difficult if they don’t).” — Joseph Turow
“There will be all kinds of hiccups, horror stories, accidents, deliberate acts of sabotage and other bumps along the road that will slow but not stop our greater connectivity. Convenience and empowerment always seem to win for most people, even at some loss of privacy, control or transparency.” — Scott McLeod
“Internet of Things is transforming the everyday physical objects that surround us into an ecosystem of information that will enrich our lives. From refrigerators to parking spaces to houses, the Internet of Things is bringing more and more things into the digital fold every day, which will likely make the Internet of Things a multi-trillion dollar industry in the near future.” — PricewaterhouseCoopers report
0 notes
thesecrettimes · 3 years ago
Text
Leaked Personal Data of 1 Billion Chinese Citizens on Sale for 10 Bitcoins — Hacker Claims Stolen From Shanghai Police
Tumblr media
A hacker claims to have stolen the personal data of a billion Chinese citizens from the Shanghai National Police (SHGA) and is selling it for 10 bitcoins. “This database contains many TB of data and information on billions of Chinese citizens.”
23 Terabytes of Data on a Billion Chinese Citizens on Sale for 10 Bitcoins
An anonymous hacker has claimed to have stolen about 23 terabytes of data on a billion Chinese citizens from a Shanghai police database. Experts say that, if true, this would be one of the biggest data breaches in history. The data is being offered for sale for 10 bitcoins. At the time of writing, this sum amounts to about $197,806. On a hacker forum, an anonymous user using the handle “Chinadan” offered the data for sale on Thursday. The user claimed that the information was leaked from the Shanghai National Police (SHGA) database. “This database contains many TB of data and information on billions of Chinese citizens,” the post details. The leaked data includes names, addresses, birthplaces, national ID numbers, mobile numbers, as well as crime and case details. The user shared a sample of 750,000 records to allow interested buyers to verify that the data for sale is not fake. On Monday, Binance CEO Zhao Changpeng (CZ) tweeted: Our threat intelligence detected 1 billion resident records for sell in the dark web, including name, address, national id, mobile, police and medical records from one asian country. “Likely due to a bug in an Elastic Search deployment by a gov agency … It is important for all platforms to enhance their security measures in this area,” he continued, adding that “Binance has already stepped up verifications for users potentially affected.” The Binance chief further explained Monday: “Apparently, this exploit happened because the gov developer wrote a tech blog on CSDN and accidentally included the credentials. 1 billion records of private citizens’ data.” What do you think about this data leak? Let us know in the comments section below. Read the full article
0 notes
tophostvps · 3 years ago
Text
A Hacker Is Selling the Personal Details of 1 Billion Chinese Citizens
A Hacker Is Selling the Personal Details of 1 Billion Chinese Citizens
A hacker by the name of “ChinaDan” may have just carried out one of the biggest data breaches in history, which if confirmed, would also be very embarrassing for the Chinese government. As Reuters reports(Opens in a new window), the anonymous hacker is offering to sell the personal data of a billion Chinese citizens via Breach Forums for 10 bitcoins, which currently equates to a value of roughly…
Tumblr media
View On WordPress
0 notes
reportwire · 3 years ago
Text
Hacker claims to have stolen 1 billion records of Chinese citizens from police
Hacker claims to have stolen 1 billion records of Chinese citizens from police
SHANGHAI: A hacker has claimed to have procured a trove of personal information from the Shanghai police on one billion Chinese citizens, which tech experts say, if true, would be one of the biggest data breaches in history. The anonymous internet user, identified as “ChinaDan“, posted on hacker forum Breach Forums last week offering to sell the more than 23 terabytes (TB) of data for 10 bitcoin,…
View On WordPress
0 notes
znewstech · 3 years ago
Text
Hacker claims to have stolen 1 billion records of Chinese citizens from police
Hacker claims to have stolen 1 billion records of Chinese citizens from police
SHANGHAI: A hacker has claimed to have procured a trove of personal information from the Shanghai police on one billion Chinese citizens, which tech experts say, if true, would be one of the biggest data breaches in history. The anonymous internet user, identified as “ChinaDan“, posted on hacker forum Breach Forums last week offering to sell the more than 23 terabytes (TB) of data for 10 bitcoin,…
Tumblr media
View On WordPress
0 notes
thinktosee · 4 years ago
Text
IS A CORPORATION A PERSON?
No? That’s true if we look at it from a science/biological construct.
Yes? That’s true if viewed from a legal definition.
d’Errico offers this explanation :
“The concept that a corporation is a "person" is the legal core of corporate power. When the U.S. Supreme Court overturned New Hampshire's attempt to turn Dartmouth College into a public institution (Dartmouth College v. Woodward, 17 U.S. Reports 518 [1819]), the Court subordinated a state legislature to an "artificial being": the college corporation.” (1)
Or this summary by Ripken :
“A legal person is the subject of legal rights and duties. Only those who are legally recognized as persons have the capacity to participate in legal relations. Legal personhood has never been a self-evident classification that applies only to living human beings. In fact, one’s status as a human being is neither necessary nor sufficient to be a person in the eyes of the law. Non-human organizational entities are treated as legal persons for some purposes, while human beings like infants and mentally impaired individuals are not regarded as full-fledged legal persons for other purposes.” (2)
Now that we have established a corporation is a legal person, let us examine how a real biological person and a legal person in the form of a corporation, are treated under the law.
A serial thief in Singapore, when apprehended is liable to serve up to three years in prison or a fine or both. (3) But that may vary, according to jurisdiction and the severity of the crime, like this example :
Man who spent 36 years in prison for stealing $50 from a bakery is now set to be freed - ABC News (go.com)
What about a corporation? What is the punishment when this person commits an offence? Let’s look at the branded corporations. The ones we are familiar with, or perhaps addicted to. Some of whom are on the list of Fortune Magazine’s “most admired” companies. (4) This list is not exhaustive :
Exxon Mobil ordered to pay $14.25M penalty in pollution case - ABC News (go.com)
Exxon Mobil: Corporate Rap Sheet | Corporate Research Project (corp-research.org)
Royal Dutch Shell | Violation Tracker (goodjobsfirst.org)
The five most-fined companies in US oil and gas history (offshore-technology.com)
SIA, 10 other airlines hit with S$1.2 billion fine by EU regulators for taking part in cargo cartel, Europe News & Top Stories - The Straits Times
Singapore Airlines Cargo Pte Ltd. Agrees to Plead Guilty to Price Fixing on Air Cargo Shipments | OPA | Department of Justice
Singapore Airlines cops $4.1M fine in latest air cargo cartel settlement | NBR
Pfizer fined $2.3 billion for illegal marketing in off-label drug case - ABC News (go.com)
Pfizer | Violation Tracker (goodjobsfirst.org)
Supreme Court rejects Johnson & Johnson's appeal of $2 billion baby powder penalty (cnbc.com)
Johnson & Johnson | Violation Tracker (goodjobsfirst.org)
Merck Fined $950 Million Over Painkiller Marketing | IndustryWeek
Merck | Violation Tracker (goodjobsfirst.org)
Taiwan regulator imposes biggest ever domestic fine on leading bank (internationalinvestment.net)
Citigroup | Violation Tracker (goodjobsfirst.org)
HSBC moved vast sums of dirty money after paying record laundering fine - ICIJ
HSBC | Violation Tracker (goodjobsfirst.org)
Netflix documentary re-examines HSBC’s $881 million money-laundering scandal - MarketWatch
JPMorgan Chase & Co. Agrees To Pay $920 Million in Connection with Schemes to Defraud Precious Metals and U.S. Treasuries Markets | OPA | Department of Justice
JPMorgan Chase | Violation Tracker (goodjobsfirst.org)
Boeing Charged with 737 Max Fraud Conspiracy and Agrees to Pay over $2.5 Billion | OPA | Department of Justice
Boeing | Violation Tracker (goodjobsfirst.org)
Boeing and Dow Chemical fined 926 million dollars (france24.com)
Airbus to Pay $4 Billion to Settle Corruption Inquiry - The New York Times (nytimes.com)
Yahoo Fined $50M Over Personal Data Breach | PYMNTS.com
Google’s European fine is a flashback to Microsoft’s ugly antitrust battle - The Verge
Google fined $592 million in dispute with French publishers (apnews.com)
FTC Imposes $5 Billion Penalty and Sweeping New Privacy Restrictions on Facebook | Federal Trade Commission
Facebook's WhatsApp Fined for Breaking E.U. Data Privacy Law - The New York Times (nytimes.com)
Twitter fined $546,000 in December 2020 by European Data Protection Authority for 2019 Breach Notification Violations | Robinson+Cole Data Privacy + Security Insider - JDSupra
Why General Motors’ $900 million fine for a deadly defect is just a slap on the wrist - The Washington Post
China fines Toyota 87.6 million yuan over Lexus price-fixing | Reuters
IBM to pay $24.25M in FCC probe fines | WRAL TechWire
Apple fined $1.2 billion by French competition authorities (cnbc.com)
Apple fined for slowing down old iPhones - BBC News
Samsung Fined $47 Million for Price Fixing in Netherlands | Investing News | US News
Dell fined $100m for accounting fraud that misled investors (computerweekly.com)
Sony slugged with $3.5 million fine over video game refund failures (smh.com.au)
General Electric agrees to pay $200 million SEC fine for misleading investors (cnbc.com)
Johns Hopkins, Bristol-Myers must face $1 billion syphilis infections suit | Reuters
McKinsey Settles for Nearly $600 Million Over Role in Opioid Crisis - The New York Times (nytimes.com)
France fines Roche, Novartis 444 million euros in ongoing eye drug clash | Reuters
Goldman to pay Malaysia $3.9 billion over 1MBD scandal, U.S. settlement seen close | Reuters
Goldman Sachs | Violation Tracker (goodjobsfirst.org)
If this is what it means for some to be on Fortune’s most admired list, one is left to wonder about those who did not make its list. 
Conclusion
Clearly, a corporation does not go to jail and neither does it face capital punishment. It generally gets a fine and move on. Some are serial offenders. Still no jail time or firing squad. That’s reserved for us, the peasants. 
Moral of the story : BE A CORPORATION. It has power. We the people do not.
Until we make the corporate executives and directors personally accountable and liable for the corporation’s offences, they will always be an untouchable class and caste above and beyond us.
Finally, a Quiz : Which is the oldest, continuous and living legal person in the world?
Gee. I dunno. But maybe we should ask the Pope?
Sources/References
1. d’Errico, Peter. Corporate Personality and Human Commodification. University of Massachusetts. 1996/1997.
Corporate person and Human Commodification (umass.edu)
2. Ripken, Susanna Kim. Corporate Personhood. Cambridge University Press. 2019
Corporate Personhood (cambridge.org)
3. Serial Thief Arrested (police.gov.sg)
4. World’s Most Admired Companies | Fortune
1 note · View note
business-standard-news · 4 years ago
Text
10 Reasons Why HyperNym Fleet Management System Has Edge Over The Competition
Tumblr media
In today’s modern world FMS (Fleet management system) plays an important role in the management of assets and commercial vehicles. It is capable of tracking and maintaining all asset information. FMS is a process by which we can manage commercial vehicles and assets at a large scale. In fleet management, we perform a set of actions that helps to run a fleet competently in a short time and with less budget. What is HyperNet Fleet Management System? HyperNet provides a user-friendly Fleet Management System solution that allows your team to manage vehicles and equipment from any location. It is scalable and capable of handling your growing fleets. It is also compatible with most vehicle kinds and global safety requirements, and it connects faultlessly with any existing software or application. HyperNet Fleet Management System will provide you complete visibility into operations, hold your team accountable, and make decisions based on reliable facts. 10 Reasons why HyperNet FMS beats the competition: The 10 main reasons why the HyperNet fleet management system beats the competition are as following: 1. Track your fleets in real-time: HyperNet Fleet tracking system is responsible to track and provide real-time vehicle position and status. In order to manage the fleet properly, you should know where each vehicle is at the current moment and what its fuel condition is. HyperNet’s FMS provides all relevant information in the dashboard so that users can have a comprehensive and detailed overview. 2. Manual Task Automation: Before HyperNet FMS software, all the data was handled manually which acquired a lot of time and effort. Now, all repetitive tasks can be automated which can reduce administrative burden and minimize functional costs. Here are few examples of HyperNet manual task automation: ● HyperNet FMS provides real-time location through which you can easily locate trucks, assets, and drivers. ● It is no longer necessary to call drivers for ETAs (Expected time of arrival) schedule, status updates, and work information. ● It will automatically collect and centralize all kinds of paperwork like fuel receipts and delivery proofs. 3. Vehicle maintenance: The primary task of fleet managers is to maintain the secure and efficient performance of vehicles. Managers should strictly follow maintenance plans to avoid vehicle breakdowns that might lead to downtime and capital loss for the company. HyperNet fleet tracking system provides automated preventive maintenance plans. It can detect required future maintenance and the customers can use it to schedule preventive maintenance at a convenient time, which reduces unexpected downtime and improves overall vehicle utilization. 4. Fuel Management: Fuel expenditure is the biggest expense for a Fleet Management Company. Keeping the fuel expenses to the minimum ensures sustainable and profitable operations. HyperNet FMS solution enables fleet managers to keep an eye on drivers’ irresponsible activities such as over speeding and being idle for too long. Input from multiple sensors is fed into the FMS, which can be easily viewed through the dashboard and reports. 5. Secured Data: HyperNet FMS keeps your data secure by providing identity and access control solutions. All information regarding customers and company assets is stored in a secure way that no hacker can breach. Here are some steps by which HyperNet solution can make your data more secure: ● It defines access controls for all users such as fleet managers, customers and drivers etc. ● A single virus can destroy your important data in seconds. So, HyperNet scans your system regularly. ● It keeps your important data in encrypted form. 6. Geofencing: In HyperNet fleet tracking system, geofencing is done by using RFID, GPS and WIFI sensors to get real-time location of vehicles and assets. By using geofencing techniques the system can create small alerts by entering and exiting different locations. You can inspect the driver’s activity so that the vehicle cannot be used for personal reasons. 7. Easy and quick to learn: HyperNet FMS software is a unified collection of technologies that helps organizations to track and manage assets. It is easy and quick to learn and does not require any steep learning curve. You don’t need any special assistance to use this software. It is used by many reputed organizations to minimize costs, enhance performance, and automate operations. 8. Communication: In order to save time fleet managers should have proper communication with drivers. Otherwise, any confusion or communication barrier can waste a lot of time and effort. By using HyperNet FMS managers can easily send broadcast messages to all drivers in a single click. To avoid any kind of distraction messages will be available to the driver only if the vehicle is stopped. 9. Enhances Customer Satisfaction: The HyperNet tracking technology has made a significant contribution to enhancing client experiences. ● HyperNet FMS keeps the customers updated regarding the schedule of asset delivery by sending email/SMS alerts. ● A direct conversation with drivers without any support from the middle man. ● HyperNet provides a history of location data for driver assistance, scheduling, and on-time delivery of assets. ● It provides real-time tracking through which customers can get an accurate idea of the expected arrival time. 10. Fleet reports and analytics: Reporting and analytics module is very important for the fleet management system. In order to inspect a company’s performance, all reports should be gathered and organized in a definite form. By using HyperNet FMS, we can generate reports automatically for example reports of drivers that do over-speeding, daily wages reports, fuel management reports, parking slots reports, etc. Conclusion: HyperNet fleet tracking system possesses all characteristics by which you can increase fleet productivity, enhance employee’s performance, promote safe driving, minimize overhead expenses, and much more. The system addresses all the difficulties of fleet telematics and GPS fleet monitoring, as well as being capable of boosting corporate productivity and reducing waste. HyperNym’s SaaS IoT platform is “HyperNET” that provides logistics operations with specific industry-built add-ons. Read the full article
0 notes