#10 Biggest Data Breaches in History
Explore tagged Tumblr posts
Text
Machina Ex Machina 7-8
As always, if you enjoy the writing, please like and reblog. There's no algorithms here; my publicity is you. And if you'd like to buy me a Ko-fi, I certainly won't complain.
1+2 - 3+3.5 - 4+5 - 6+.6.5 - 7+8 - 8.5+9 - 10+11 - 12+13 - 13.5+14 - 15+16 - 17+17.5 - 18+18.5 - 19+20 - 21+22 - 23+24 -
AO3 Link
SEVEN
“I didn’t take you to be a philosophical sort, Sentry.”
GAM held himself very still under the regard of every SysAdmin, though only his own was actually present in the room. “This isn’t philosophy, SysAdmin,” he replied, glad to hear his voice sounded calm. “This is fact. You are free to ask any Sentry, in any city, to identify our attacker. They will give you the same answer.”
“There is nothing outside the Grid!” Glim exclaimed.
“I did not realize you had been there, Glim,” OM countered mildly.
“Well, I mean,” Ark’s SysAdmin began to stammer. “It’s been hundreds, thousands of cycles, are we supposed to believe the Users are real now? After all this time?”
“He didn’t say User, he said hack,” Gungnir interspersed, looking thoughtful. “If the Users were real, if they created the Grid, I don’t imagine they’d need to force their way in. You walk into your habitat, it opens the door for you; you don’t have to kick it in.”
“I think I’d rather believe in the Users,” ACM muttered, rubbing at his face. “At least they’re a known quantity, even in the theoretical.”
“For a first in the history of the Grid, I agree with ACM,” Gungnir said dryly.
“I am far more concerned,” Endos began carefully, “with the fact that Halcyon’s walls were breached. Nothing in the Grid has ever achieved that. Those walls have been improved, upgraded and reinforced since Halcyon’s inception. Do any of us stand a chance, if Halcyon didn’t?”
“There’s always a chance,” Gungnir shot back at once, but even he looked grim. “It’s just a matter of who’s going to still be online to enjoy the victory.”
The meeting went silent.
“I would like to thank you, Sentry GAM, for your report and your patience with our questions.” PEN’s voice was as calm as ever. “Is there anything else you feel we should be made aware of?”
GAM’s hesitation showed only in his silence. Next to the projection of Endos, Adas was peeking at him, and the Sentry was entirely too aware that to speak meant potentially betraying her confidence. “I do not believe the Spirestorms are striking at random,” he began.
“They’re not,” PEN agreed. “There are a number of working theories at the moment as to why and how -”
“Population density,” Gungnir interrupted impatiently. “How the Spires are tracking that is anyone’s guess, but…”
“With all due respect,” GAM would have rather disagreed with a User than with the leader of Pevir, but it was too good an opening, “I do not believe that to be the actual guiding factor.”
One of Gungnir’s brows went up. GAM resigned himself to paying for that later.
“We are listening, Sentry” PEN said.
“Halcyon is the largest city in the Grid if you count population, yes, but that’s not the only deciding factor in a city’s size. Pevir has the largest energy consumption. Ark has the biggest passive data repositories. Ilo’s data-lines handle - handled the greatest loads across the grid.”
“Halcyon was attacked first,” PEN pointed out.
“Halcyon was attacked first because at the time it was the better target. It had the largest population of active-process-memory programs at hand.” He gestured. “The Souk is full of programs who make a living creating. They have space in their disks and their active-process memories that is not the norm for most other programs. There is only one city that has - had a larger population of programs like that.”
“The Island,” Glim breathed. “Most of what we store’s been created – was created in the Island. Put all the other cities’ input together, it’s barely a match.”
“The Souk Sectors have been the target of both events. The only exception was Sector 42.”
“Yes, but Sector 42 currently has a much larger population density than any other Sector, in any other city. All the Ilo evacuees are there,” Endos pointed out.
GAM chose to let that point pass. He still didn’t know what to think of what had happened with Vidi, the way the Spirestorm had co-opted and overwhelmed her. He’d barely been on the sidelines of that and he could still feel the burn of it on his voxels.
The meeting went silent around him. “If that’s true, Ark is definitely next in line,” Gungnir pointed out grimly. “Ark and its Stack Monitors.”
“No,” Glim was staring very closely at GAM. “Because that’s static memory. It can’t do anything, not create or design or improve. Stack health reports just come in and go out. If I’m understanding the Sentry right, it’s not just empty space, it’s empty space with potential. We aren’t the next target. If Pevir had a Spire, they’d have probably been the target of every event.”
Gungnir shoved the crimson curtain of his long mohawk back with a wry grin. “I’d never thought I’d hear Glim admit how much mental effort goes into tactics and combat strategy. Today’s just a day for the worst kind of firsts, isn’t it.”
“Halcyon, then, is still the best target,” PEN declared.
“You should remove those programs to a safe location, PEN.”
The Halcyon SysAdmin blinked at Endos. “Name it.”
“Pardon?”
“Name the safe location. Name some place in the Grid out of reach of the Spires. This event lasted nearly four times as long as the past two. Without a time limit, distance is no longer a factor.”
“Underground? “ACM suggested, but he sounded clearly dubious.
“It’s one thing to breach a wall, another to dig up the Grid itself,” OM agreed.
“I cannot ask the people of Halcyon to hide underground, no more than Gungnir can ask his people to stop fighting. Halcyon trades; it’s what we do, who we are. But habitats are all the same being reshaped in the sublevels.” PEN spread its hands. “I cannot ask, but I can hope.”
“What do we do until then?” Pevir’s SysAdmin worked his hands restlessly. “I’m not sitting and waiting until the Spire feels like taking another shot at us.”
“Excuse me?” Adas spoke timidly into the meeting.
Endos gave her a quelling look, but PEN gestured in invitation. “Ah, yes. The Ilo representative in Halcyon. Please, speak.”
“Uh…” Adas hesitated, then straightened up decisively. “I like disk fights.”
The SysAdmins blinked.
“A personal favorite as well,” Gungnir agreed dryly. “Hardly applicable to the matter at hand.”
“No, see. The thing is, everyone’s worried that we can’t defend ourselves against the Spires and so far that’s right, I suppose, but. There’s one thing we haven’t tried.”
The SysAdmins stared at her, but Gungnir suddenly brightened up. “A rebound.”
“Yes, sir.”
“You want us to bounce the Spirestorm’s energy back at the Spire?” Endos demanded in disbelief.
“It’s just energy,” ACM said thoughtfully. “It’s a lot of energy, but it’s just energy. One array or fifty, one relay or twenty, the only difference is how much flow you’re controlling.”
“ACM, you manage the largest supply of energy in the Grid. Can it be done?” PEN asked evenly.
The SysAdmin hesitated. “Here, yes. Anywhere else? I don’t know that we’d have the time to shape the parts or build the system, let alone power it.”
“We could move any at-risk programs to Flow,” Gungnir suggested. The entire meeting detonated into protests. “I will move myself and every program from Pevir to Flow,” he all but shouted over the yelling. “Do you think I would suggest something my city’s not willing to do? We’ll be the bait, if none of you have the spine for it!”
“Gungnir, Halcyon has walls. Flow has nothing. And if Flow’s destroyed, no one gets any energy,” Glim snapped at him.
“If we’re there, Flow will not fall.”
“Perhaps we should wait,” PEN pitched its voice to carry, “until ACM has this ‘rebound’ system in place. It seems useless to make plans to bait a trap we do not yet have.”
“I have a suggestion.”
The room went silent, and every face turned to OM. The first-gen’s projection was as blurry as ever, but his voice was clear and sure. “One of the first things a program does when they come to Om is surrender all worldly information. Not their name, of course, or their disk. But everything else, all other information, is taken to the Black Vault and sealed there, never to resurface again unless they are leaving Om. I am willing to open the Black Vault and hide there the tag data of any at-risk program you find. They will be like ghosts in the system. Unless you see them, unless you touch them, or speak to them, they will be undetectable.” He grimaced. “Of course, if Om falls that information might be destroyed as well. We have no walls, no passive protection of any sort.”
“How’s that different from what’s already happening,” someone muttered.
“We’d have to move the information in complete secrecy,” Endos murmured thoughtfully. “Out of sight of the Spires themselves.”
“Use the energy systems,” ACM suggested. “Barring geography, most of the effusion pipelines are all underground, out of sight.”
“And my couriers can ride those pipes,” Glim added. “Ark’s couriers know the way to the farthest reaches of the Grid. Underground, along the pipelines, they’ll be undetectable.”
EIGHT
GAM had never been more glad to be excused from a meeting. He left the SysAdmins to sort out the minutiae of their new plan and stalked away, pausing only when he’d passed the largest of the light sculptures in the nearby courtyard.
“Hey.”
He turned, surprised. There was Vidi, looking strikingly small in the midst of the empty courtyard, peeking at him from behind a decorative pillar. “Here I thought you’d have found somewhere else to make trouble,” he greeted her.
“Ha-ha, WallSec,” she replied dryly, moving closer. “So what happened?”
“A number of things,” he admitted. “I suppose I should be glad they listened to me at all.”
“You were there. If they got any sense, they’ll listen to anything you have to say,” she declared sharply. She was still pale lavender, a stark contrast to the black-and-violet Sentry. “Don’t they have any plans to stop this?”
“Vidi, no one even knows what ‘this’ is. A hack yes, but… then what? There should be nothing beyond the Grid.”
“The Users are from beyond the Grid.”
“You believe in the Users? You?” He sounded amused. “You’re just full of surprises.”
“Don’t you?”
“I believe in myself.” They were silent a long moment. “Are you feeling alright?” She shrugged vaguely. “You’re dim.”
“I always am.”
“I meant -”
“I know what you meant.” She toed the ground uncertainly. “And I know what you’re actually asking.”
GAM was quiet.
“I don’t know what happened,” she admitted slowly. “You’re right, I can see decay points, structural faults. I can see the blueprints inside a structure. I’ve always been able to see them. But when I looked up at the Spirestorm…” She looked up, and put a hand out, fingers outstretched. “It was like… It was alive, WallSec. It was like the entire sky was a blueprint. It just… didn’t care that I was alive too.”
“I got that distinct feeling, yes,” GAM agreed tightly, remembering entirely too well the way that alien presence had screamed fury at being balked, how it had gathered itself to strike and strike and strike until it could reach its goal, even if it meant going through him.
“It wanted to fill me up with itself, even if it meant erasing everything I am.” Vidi shrugged and looked up at him. “I don’t know why. It’s not like I can fit a storm inside me. No one can.”
GAM felt something, some sort of important fact, tease his awareness and then flicker away from his grasp. “It wasn’t just you. It was targeting any program with substantial active-process-memory space. I don’t know why, it’s not like you can run a program that’s splintered up in different source spaces. Data, yes, programs, no. You end up like the Shattered of Om. In any case, they’re talking about encrypting the tags of any program like that, and hiding the information in Om’s Black Vault.”
“What?! How am I supposed to do business if no one can see it’s me?!” she demanded.
“What, you actually do business lawfully?” She shoved him, which achieved absolutely nothing except amuse him somewhat. “They’ll still know you, Vidi. They just won’t be able to authenticate you.”
“Mm-mm. I’d rather take my chances.”
“Well, for the sensible sorts, the ongoing plan is to encrypt the information, and move it by courier through the effusion systems to Om.”
“Does it pay well?”
“Does it – No, they’re using Ark’s couriers.”
“What?! I’m twice the courier any of them is!”
“On foot? Maybe on a sailer, in full sight of the Spires?”
She deflated. “Oh.” And then, after a beat. “Can I borrow your baton?”
“Are you - You just don’t quit, do you,” he demanded, both amused and amazed.
“I’ll give it back!” When the black faceplate merely stared at her, she doubled down. “I will!”
“GAM!”
They both turned at the sound of Adas’ voice, and saw the curvy GO4 hurrying toward them. “Vidi. My goodness, are you alright? Shouldn’t you be in the infirmary? You look pale, haven’t you recharged yet?”
“Why are you both fussing so much,” Vidi protested. “I’m fine. I’m just… It was just some weirdness, that’s all. And, you know, life’s weird. You deal.”
Adas stared at her, then glanced at GAM. The dark faceplate, unfortunately, told her nothing, so she merely sighed. “I need to go back to Ilo. I was wondering if you could escort me there.”
“Can I come?” When both of them gave her a look, Vidi shrugged. “I mean, I could lie and say I wanna go help with the rescue efforts, but. You know, scavenger.”
GAM worked his hands restlessly. “I’m half-tempted to say yes, just to see if you can scavenge with me hanging over your shoulder.”
“Oh, come on, WallSec, it’s not like -”
“Actually,” Adas said slowly, almost apologetically. “I do need someone with a good chunk of active-process-memory space to come with us.”
“Why?” Vidi was instantly suspicious.
“Because Ilo’s SysAdmin tower took a massive hit when the Island fell, and we don’t know if its encryption services still work.”
“So you want to do the Black Vault thing to me, only at Ilo, not here.”
“Yes.”
Vidi groaned, head thrown back in exasperation. “Can you undo it if it does work?”
“I… supposed we could, but why would you – ah, right. Halcyonite.”
“What does it pay?”
“What does i- Nothing.”
“Pfft. Forget it, then. Find yourself some other sucker. I’m not putting my tags on the line for nothing.”
Adas blew out an exasperated breath. “Your pick of whatever you can scavenge. Salvager’s rights, for this trip only.”
“Are you seriously encouraging her to scavenge!” GAM protested.
“Do you know another program we can use?” Adas shot back.
“Yeah, do you?” Vidi demanded in the same tone.
GAM put his hands up to his helm as if in prayer, and his exasperated sigh came through even the helm’s filters. “I haven’t agreed to go.”
“Then I guess I’m going alone,” Adas countered, and pointed. “With her.”
Vidi beamed at him.
The sound that came out of the Sentry was equal parts fury and defeat. He glared down at them so hyperbolically that both programs could feel it through the faceplate, but neither budged. He turned around and stalked angrily for the lift. “I’ll be downstairs,” he ground out.
Twenty nanocycles laters they rode out of Halcyon in a modified, canopied lightrunner, GAM driving and Adas working through her faceplate and a couple of tablets on her lap, while Vidi sprawled shamelessly on the backseat. “And they just gave you this thing? Without paying for it?”
“It’s a courtesy loan,” Adas noted distractedly, “from one city to another.”
“Must be nice to get things just for asking,” Vidi muttered.
“Try not stealing from someone. You’d be amazed how nice they can be then,” GAM replied stiffly.
They had the road pretty much to themselves. Inter-city traffic favored data-lines, solar sailers, effusion pipelines; they were faster and more reliable. But with Halcyon under threat, high-altitude traffic had become increasingly limited to pure cargo, no programs. There was an Ilosian jet on standby at Halcyon; Adas had nervously turned it down.
Fully trusting the Sentry to not crash them, she focused on her work. Away from Halcyon, crossing the Outlands, the only light came from themselves. When a brilliant glow washed over her, she nearly jumped out of the vehicle.
“It’s just Parnassus,” GAM told her at once. “It’s the halfway point between Halcyon and Ilo.”
Both Adas and Vidi pressed close to the windows. As the terrain shifted, the lone mountain of one of the few independent enclaves in the Grid glowed in the distance with a pure white light, beams of data rising from it in arching lines. There was an uncanny beauty to its curves and spirals, as if it were something not of the Grid, but exquisite to behold all the same.
“Is it really just one program living there?”
“Nah,” Vidi replied. “He’s got Bits and Navis.”
“But no other programs?”
“I’m not sure. I’ve only ever made it to the door when I’m doing deliveries.”
“Ayin’s been inside,” GAM said suddenly. “It’s just him.”
“Ayin?”
“The first WallSec. She says it’s like Ark, only prettier. More alive.”
“She’s been to Ark?”
“I’m pretty sure there’s no place in the Grid Ayin hasn’t been to.”
“Om?” Vidi challenged at once.
“She’s been there. She helped them build the Black Vault.”
Vidi made a face and slouched back once again. Adas threw the Sentry a look. Black faceplate or not, she was pretty sure he was smiling.
There were ships and heavy vehicles all over Ilo, deconstruction and repurpose crews removing debris and rebuilding structures, but on the Sector where the road led them there was nothing but silence and ruin all around them. Adas stared out the windows, stricken, as GAM fought to stick to anything resembling a road. At the time of the event she’d been too busy helping others seek refuge; after, she’d only seen the devastation at a distance, from the top of the SysAdmin tower and from the jet.
“I’m sorry,” Vidi whispered quietly, staring at the destruction as they went by.
Adas tried to make herself look away. “It’s alright, I knew -” She let out a shriek and GAM slammed on the brakes. All three of them nearly went flying.
“What?!”
“Is that your hair?!”
Vidi had been looking at the destruction with all her eyes and had nearly ended up in the Sentry’s lap when he hit the brakes. “Yes?”
“Yours, not an Upgrade or a Cosmetic?”
“It’s mine! It’s me! Gah, you weird Ilosian.” The Halcyonite scrabbled back onto the backseat.
“I’m sorry, I hadn’t seen you… looking at… things before!”
GAM dropped his head with a sigh and began driving again. It wasn’t long until they saw the small group of programs waiting for them at the base of the tower. “Stay inside,” he told them both as he brought the lightrunner to a stop. As he stepped out, he was mildly surprised to find both of them had obeyed.
“Sentry!” Endos looked surprised, outright confused, to see him. “I didn’t expect to see you away from your duties at Halcyon.”
“My duties seem to be expanding,” he replied evenly, moving around the vehicle and opening Adas’ door for her. “Protecting Halcyon comes with moving parts these millicycles, apparently.”
The SysAdmin chuckled sensibly. “Adas, welcome back.” He threw his arms open, and then took the GO4’s hands in his. “I’ve felt like I’ve been missing half my disk since I had to let you go.”
“Well, it’s just temporary.” She blew out a huge breath. “It’ll be nice when everyone can come back home. How’s the reconstruction process going? I saw all the crews up in the air.”
“Oh, yeah, that’s mostly in the energy Sector. You should see the work going on at ground level -”
GAM opened Vidi’s door as both Ilosians walked away, chattering. “Stay close to me,” he told her quietly.
A few of her dreadlocks came up to examine him. “Why are you so twitchy, WallSec?”
The black faceplate turned to look at her, but before he could answer Adas waved at them. “Vidi!”
The three of them were led halfway up the tower. It had been truncated to a little under half its height when the Island had fallen, and there were places where the floors were missing entire walls, but two lifts and the general structural integrity had all been restored.
“It’s not that we don’t trust Halcyon, of course,” Endos explained, almost apologetic, looking warily at the Sentry. “But if our people get their tags encrypted there, when this matter’s over and they’re free to come back to Ilo they’ll still have to go back and forth with Halcyon to get their tags decrypted. It’s just more efficient to see if we can do it here directly.”
GAM said nothing, but he understood the underlying message: a city lived and died on population. If there was no one to live in Ilo, the city would simply fade away, replaced by something else, someplace else, with a different purpose. Endos didn’t want his people to find out life might be better in Halcyon.
Having met Adas and her evacuees, the Sentry didn’t think that was likely.
“I’m just here to help you with… whatever,” Vidi replied.
“And Ilo greatly appreciates your help,” Endos assured her. “You have a very unique design.”
“And you’re really bad at flirting,” she shot back.
“I… I – I wasn’t -”
“Vidi’s agreed to help as long as we decrypt the tags once we’ve confirmed they can be encrypted here,” Adas hurriedly interrupted. “Which I thought would be a good thing, we get to check that the process is working both ways.”
They stepped off the lift and onto a vast floor filled with work consoles. Encrypting and decrypting a program’s basic identification information wasn’t something that was done casually; as Vidi had pointed out, a lot of intuitive communication went on between programs whenever they dealt with one another. You didn’t stop to ask about compatibility or sourcing or anything like that, you just looked it up and got on with the important interacting bits. Without that information, unless Vidi was standing right in front of her customers, they had no way to contact her for work, no way to even find her.
“Oh, wow.” Vidi came to such an abrupt halt she bumped into GAM. Beyond the windows of the tower, one of the Island's solar sails stood upright, having fallen in such a way that the light coming in and out was tinted orange. They could see the individual cells flickering in and out of activity, and two of the spokes were leaning against the tower itself.
“It’s not a danger,” Endos hurried to assure them. “It was deemed cosmetic damage, so it’s low on the priorities for removal. Personally, it makes me sad just looking at it.” He clapped his hands and turned to the consoles; the programs with him were rushing to their positions. “In any case!”
“Yeah, he sure sounds sad,” Vidi muttered for GAM’s benefit.
“Are you sure about this?”
“Is that concern, or do you just not want me treasure-hunting in Ilo, WallSec?”
He merely blew out an exasperated breath. “All those eyes and you’re missing the obvious.”
“Vidi,” Adas waved her over.
The courier hesitated, suddenly realizing she didn’t want to move away from the protective wavelength of the Sentry. It took effort to step away from him, and to approach the console where Adas and Endos were waiting for her.
“Go,” he murmured quietly.
She stepped forward. She was vaguely listening to the SysAdmin, but he seemed to make a lot of noise for someone who wasn’t providing any useful information. One of the techs moved behind her and her dreadlocks immediately roused to attention. “Hey,” she snapped. “Hands off the disk.”
Every program on the floor froze.
“I don’t believe you need her disk to encrypt her tags,” GAM spoke very calmly.
“You don’t, not the way I understand the process,” Adas looked at the tech in puzzlement.
“It’s to safeguard through the process, ma’am,” the tech replied mildly. “Since we don’t know if the system has hidden malfunctions at the moment.”
“It’s fine where it’s at,” Vidi informed him sharply.
The tech hesitated, but Adas gave him a pointed look, and he went back to his console. Vidi braced herself.
“It’s… It doesn’t hurt or anything,” Adas reassured her awkwardly.
“What, you’ve been encrypted before?”
“Yes, a few times.” The GO4 shrugged. “It seems rude to ask someone to go through something if I’m not willing to do it myself, you know?” When Vidi made a face, she had to smile. “I’m sorry.”
“For what?”
“It’s just, every time it looks like you’re heading for some good old righteous indignation, GAM and I take the wind right out of it.”
“Oh, trust me, I’ve got mad to last me until the end of the Grid.” She made another face. “But yeah, you do. Both of you. It’d be annoying if you weren’t right most of the time.”
“Adas,” Endos called her from one of the consoles, and she stepped smartly away.
Vidi felt terribly alone and exposed all at once. She looked around nervously, and her gaze fell on GAM. The Sentry nodded minutely at her. Ugh, what a nuisance he was. But she felt comforted all the same. She took a deep breath and braced hers-
“Alright, we’re done.”
“… what?” She looked around without comprehension. The techs were shaking hands and clapping each other on the shoulder, looking terribly pleased with themselves.
“What?” Vidi asked blankly again.
Adas cleared her throat meaningfully.
“Oh, right!” Endos moved to one of the consoles, bringing a tech over. “And it’s reversed.”
“What?!” Vidi demanded. She patted herself down. “I didn’t feel anything!”
“Why… Why would you feel anything?” Endos asked in confusion. When she couldn’t give him an answer, he took her hand and shook it enthusiastically. “Thank you so much for your help. If there is anything Ilo, or I, can do for you -”
“Uh,” Vidi saw Adas gesturing sharply at her, and smiled at the SysAdmin as best she could. “Just doing my duty for my fellow programs,” she declared. “I’m gonna… I’m gonna now, ‘kay? Going home.”
“Of course!” He stepped back and gestured grandly. “Adas, I imagine you’re going back to take care of the evacuees?”
“Yes, until we have the habitat for them here. And please, Endos -”
“As quick as we can,” he assured her.
The three of them trooped into the lift. “That better not mean you’re cheating me of my salvager’s rights, GO4.”
“One could dream,” GAM declared dryly.
“No! I just… might not… have told him about it, that’s all. But you can go out and get whatever you want!”
“Quickly, I hope,” the Sentry added. “I’m sure there’s no limit to your greed, but surely there’s one to what you and the lightrunner can carry.”
“Is there gonna be some point in time when you don’t make it your life’s goal to ruin mine, WallSec?”
#fanfiction#my writing#original character#tron 1982#tron evolution#tron legacy#tron uprising#fantasy#sci fi#fantasy violence
0 notes
Text
Ransomware as a service (RaaS) in cyber security
Ransomware as a Service (RaaS) adopts the same business model as Software as a Service (SaaS). However, unlike legitimate SaaS offerings, RaaS is operated by criminals and is entirely illegal. Involvement in such criminal activities can lead to severe consequences according to the laws of the country in which you reside.
In this digital age, where nearly every service and product is accessible online, both large corporations and small businesses have ventured into the digital sphere, engaging in even the smallest online transactions. It's imperative to prioritize the privacy and security of individuals and assets at all costs.
As cybersecurity technologies continue to advance, so too do illegal ransomware operations. It's an ongoing battle to stay one step ahead of adversaries—a clash between heroes and villains.
Operators Vs Affiliates
In Ransomware as a Service (RaaS), operators develop and manage the ransomware, while affiliates deploy the attacks. Operators handle the technical aspects, while affiliates distribute the malware and collect ransom payments.
Operators:
· Develop and manage the ransomware software.
· Maintain infrastructure for distribution.
· Provide technical support.
· Possess advanced programming skills.
· Responsible for core functionality like encryption.
Affiliates:
· Deploy ransomware attacks.
· Lack technical expertise for malware development.
· Access networks of potential victims.
· Use various distribution methods like spam emails.
· Receive a share of ransom payments.
· Rely on operators for malware and support.
History of Ransomware as a Service?
The Trojan:W32/Reveton is said to be the first RaaS product. They attacked across Europe in 2012.It is also known as FBI virus or the Police Trojan.
Once it penetrates the targets device. It locks the user out and displays a message accusing them of any crime pretending as Law enforcement authorities.
How does Ransomware as a service work?
The Trojan:W32/Reveton is often considered the pioneer of Ransomware as a Service (RaaS). It wreaked havoc across Europe in 2012 and is infamous under aliases like the FBI virus or Police Trojan. Once it infiltrates the target's device,
It locks the user out and displays a message, falsely accusing them of a crime, impersonating law enforcement authorities.
Ransomware as a service groups
Some of the most infamous RaaS ransomwares:
1. REvil
2. Lockbit
3. Ryuk
4. Darkside
5. Dharma
6. Hive
7. WannaCry
8. BlackCat
9. Phobos ransomware
10. petya
Which is the biggest ransomware attack ever?
The WannaCry ransomware attack is widely regarded as one of the largest cyber attacks in history. Originating from a North Korean hacker group and targeting computers using the Windows operating system, WannaCry spread rapidly, affecting over 200,000 systems Worldwide. It extorted ransom from users, threatening to wipe their data within three days of activation.
How to prevent Ransomware attacks
Maintaining secure backups, installing antivirus software, using VPNs on public networks, developing incident response plans, Reviewing port settings, hardening endpoints, keeping systems updated, providing security awareness training, implementing Intrusion detection systems, and more—these concepts might seem complex to navigate. This is where the expertise of cybersecurity professionals becomes invaluable.
Importance of cyber security
Cybersecurity is paramount in today's digital age, where businesses and individuals alike rely heavily on technology. It safeguards sensitive information, protects against unauthorized access, and mitigates the risk of cyber threats such as data breaches, ransomware attacks, and identity theft. By implementing robust cybersecurity measures, organizations can maintain the trust of their customers, ensure the integrity of their data, and avoid costly financial and reputational damage. In an interconnected world where cyber threats are constantly evolving, prioritizing cybersecurity is essential to safeguarding digital assets and maintaining a secure online environment for all.
Why Cyber security professionals in high demand?
Cybersecurity professionals are in high demand due to the escalating frequency and sophistication of cyber threats, coupled with the rapid digitalization of businesses and the shortage of skilled experts. Organizations are increasingly prioritizing cybersecurity to protect their assets, sensitive information, and maintain regulatory compliance.
With the surge in remote work and the adoption of cloud technologies, the need for cybersecurity professionals has intensified further, as they play a crucial role in safeguarding networks, endpoints, and data from evolving cyber risks. As cyber threats continue to evolve, the demand for cybersecurity professionals is expected to remain robust, making it a sought-after and lucrative career path in today's technology-driven world.
Cyber security courses in Kerala
If you are interested in learning cybersecurity courses in Kochi, Kerala, enroll in Kerala's No#1 private professional training institute, Blitz Academy's cybersecurity courses. Become a certified Ethical Hacker, certified Penetration Testing Professional, or Computer Hacking Forensic Investigator. Gain diplomas and PG diplomas in cybersecurity and cyber forensics with 100% guaranteed placement.
0 notes
Text
10 Biggest Cybersecurity Attacks in Indian History – Part 2
Welcome back to our exploration of the most significant cybersecurity attacks in Indian history. If you haven’t already, make sure to read Part 1 [here].
Cybersecurity threats have evolved into a relentless force, testing the resilience of nations and institutions worldwide. In India, a nation on the cusp of a digital revolution, safeguarding against cyber threats is paramount. In this continuation, we unravel five more biggest cyber incidents that have left an indelible mark on India’s cybersecurity landscape. Each incident serves as a testament to the critical need for unwavering vigilance and cutting-edge cybersecurity measures. Let’s delve into these significant events that have shaped the nation’s digital security posture.
Cybersecurity Attack #6: Bengaluru ATM Hack (2016)
In 2016, Bengaluru, the tech hub of India, witnessed a significant cybersecurity incident that sent shockwaves through the nation’s financial sector. Cybercriminals exploited vulnerabilities within the city’s ATM network, employing a combination of malware injection and social engineering tactics. This allowed them to gain unauthorized access to ATMs, enabling them to discreetly siphon off significant amounts of money. This incident served as a stark reminder of the need for enhanced security measures within the financial sector. By prioritizing security protocols and adopting cutting-edge technology, STL Digital fortifies financial institutions against evolving cyber threats.
Cybersecurity Attack #7: Operation Hangover (2014)
In 2014, “Operation Hangover” targeted Indian government officials and military personnel, stealing sensitive data. The attack, attributed to the “Lords of Dharmaraja,” used spear-phishing and stealthy navigation to exfiltrate information. This breach underscored the need for enhanced cybersecurity in government and military sectors, leading to lessons in vigilant training, real-time monitoring, segmented networks, regular audits, collaboration, and incident response planning.
By prioritizing extra vigilant systems, real-time incident response, and intelligence-based threat detection, STL Digital empowers these sectors to navigate the complex cyber threat landscape. Real-time Incident Response.
Cybersecurity Attack #8: Syrian Electronic Army Attack (2014)
In 2014, India faced a cyber threat from the Syrian Electronic Army (SEA), a hacktivist group known for supporting the Syrian government through digital activism. The SEA targeted Indian news websites and social media accounts, defacing them with politically motivated messages. This incident raised concerns about the vulnerability of India’s digital infrastructure to international hacktivist groups, prompting a reevaluation of security measures within media organizations and the broader digital ecosystem.
This incident highlighted the critical need for heightened security measures within media outlets and proactive threat intelligence gathering. STL Digital recognizes the evolving nature of cyber threats and offers tailored solutions for media industry with our cybersecurity and digital rights management (DRM) solutions.
Cybersecurity Attack #9: Kudankulam Nuclear Power Plant Malware (2019)
In 2019, a significant malware attack targeted the Kudankulam Nuclear Power Plant in Tamil Nadu, India. Reports indicated that the breach may have gone undetected for over six months, highlighting the critical need for robust cybersecurity measures in safeguarding vital infrastructure. Although the exact method of attack remains confidential, it is believed that the malware infiltrated the plant’s computer systems, potentially exploiting vulnerabilities in software or networks.
This incident served as a poignant reminder of the potential vulnerabilities even within the most sensitive installations, emphasizing the need for robust cybersecurity measures. STL Digital’s IoT and System Cyber Security offerings, empower a Safe, Intelligent, and Sustainable Future for the Energy, Resources and Utilities enterprises.
Cybersecurity Attack #10: NIC Email Hack (2012)
In 2012, the National Informatics Centre (NIC) faced a significant cybersecurity breach when its email system was hacked, compromising sensitive government communications. The breach, believed to involve advanced phishing techniques or email infrastructure vulnerabilities, highlighted the need for enhanced email security, employee training in cybersecurity, real-time monitoring, incident response planning, and inter-agency collaboration.
This incident highlighted the vulnerabilities within critical government institutions, emphasizing the ever-evolving nature of cyber threats.
Common Themes and Patterns
Analyzing the landscape of cybersecurity attacks in India reveals several recurring patterns. One prominent trend is the escalating frequency and sophistication of ransomware attacks. Cybercriminals increasingly favor this method, encrypting critical data and demanding a ransom for its release. Additionally, targeted attacks on critical infrastructure have emerged as a significant concern. This trend underscores the imperative for fortified security measures in sectors vital to the nation’s functioning, including power, telecommunications, and transportation.
When it comes to vulnerabilities and targets, an examination reveals common points of exploitation. Outdated and unpatched software remains a prime vulnerability. India has made commendable progress in cybersecurity, forming robust policies and protocols through collaborative efforts between the government, the private sector, and experts. Dedicated cybersecurity centers and a skilled workforce are crucial steps in bolstering the nation’s cyber resilience.
Conclusion
These ten major cybersecurity attacks in India underscore the dynamic and relentless nature of cyber threats. Each incident underscores the importance of vigilance, preparedness, and swift response. As we navigate the evolving landscape of cyberspace, it is incumbent upon us to remain steadfast in our commitment to safeguarding our digital future. Continuous investment in cutting-edge technologies, stringent adherence to best practices, and collaborative efforts will undoubtedly pave the way for a more resilient and secure India in the digital age.
STL Digital offers a shield against the ever-present threat of cyber-attacks with our Cybersecurity services. With robust access controls, minimized attack surfaces, and security integrated throughout development, we ensure comprehensive protection. Choose STL Digital for a safeguarded digital journey.
#cloud first business strategy#cloud solution#enterprise saas services#data analytics & ai solution#cybersecurity#digital
0 notes
Text
Since its conception in 2009, Bitcoin, a revolutionary digital money, has advanced significantly. The development of Bitcoin wallets has been astounding along with the rise of Bitcoin. It has been a wonderful journey from simple solutions to the sophisticated and feature-rich wallets we have today. We'll go into the fascinating past of Bitcoin wallets in this post, and we'll also look at how they've changed to accommodate the demands of modern cryptocurrency fans.Key TakeawaysSince the beginning of cryptocurrencies, bitcoin wallets have seen tremendous development.Modern systems now provide improved convenience, security, and user-friendly features.Users may choose a wallet with more knowledge if they are aware of the evolution of Bitcoin wallets.Bitcoin Wallet: A Private Digital Safe Photo by DrawKit Illustrations on Unsplash Let's first define a Bitcoin wallet before starting our time travel adventure. A Bitcoin wallet is a software program or physical object that enables users to securely store, transmit, and receive bitcoin. Your private keys, which are necessary for accessing your Bitcoin assets, are stored in it as a virtual vault. It would be nearly difficult to conduct Bitcoin transactions without a wallet.Fun fact: Did you know that Satoshi Nakamoto, the enigmatic person who invented Bitcoin, carried out the first transaction? On January 12, 2009, he gave developer Hal Finney 10 bitcoins, thus launching the cryptocurrency.Paper Wallets and Simple Software Wallets in the BeginningSecurity was a major issue in the early days of Bitcoin. To store their private and public keys, users depended on paper wallets, which were simply printouts. The keys were stored offline, away from any online threats, in these paper wallets, making them safe. They were inconvenient, though, because each transaction needed human key input.Interesting fact: On May 22, 2010, Laszlo Hanyecz created history by carrying out the first Bitcoin transaction in the real world. He spent 10,000 bitcoins, or millions of dollars in today's currency, to buy two pizzas. Basic software wallets soon followed, offering a more user-friendly interface. Users could easily manage their Bitcoin on their PCs with the help of these wallets, which were easy to install. To avoid data loss, they needed to be constantly backed up and were susceptible to virus assaults.Mobile Wallets: Access to Bitcoin Anywhere Photo by CardMapr.nl on Unsplash With the popularity of smartphones, Bitcoin wallets appeared on portable electronics, enabling users to carry their digital assets with them wherever they went. Mobile wallets made using Bitcoin more convenient and opened the door for regular transactions.Fun fact: In 2013, James Howells, a programmer, mistakenly threw away a hard drive containing his Bitcoin wallet. The hard disk was eventually dumped in a landfill, where it is still today. Over 7,500 bitcoins, worth millions of dollars, are thought to be in the misplaced wallet.Accessing Bitcoin Anywhere, Anytime with Web WalletsThe ability to access money from any internet-connected device thanks to web wallets transformed the Bitcoin experience. Users no longer had to bother about backups or install software. They may use a web browser to safely access their Bitcoin, making it simpler for beginners to enter the cryptocurrency realm.Interesting fact: In 2014, Mt. Gox, previously the biggest Bitcoin exchange, experienced a significant security breach that cost the company around 850,000 bitcoins. The significance of security precautions in safeguarding Bitcoin wallets was brought home by this occurrence.Hardware Wallets: The Bitcoin Fort KnoxHardware wallets became the most safe choice as Bitcoin's value skyrocketed and security worries multiplied. These tangible objects protect private keys from potential internet attacks by storing them offline. Hardware wallets offer an additional degree of security for your Bitcoin by being resistant to hacker attempts.
Fun fact: By the end of 2020, more than 1.5 million pieces of the Ledger Nano S, one of the most popular hardware wallets, had been sold.Feature-Rich and User-Friendly Modern SolutionsPhoto by Shubham Dhage on Unsplash Bitcoin wallets have become sophisticated, feature-rich solutions in modern times. They provide seamless exchange integration, support for several currencies, biometric identification, and improved user interfaces. Some wallets even let users to engage in decentralized finance (DeFi) systems and earn interest on their Bitcoin holdings.ConclusionFrom its inception to the present, Bitcoin wallets have had an amazing journey. Wallets have improved in security, practicality, and use with each new development. It's important to keep in mind, though, that in the end, it's your obligation to protect your Bitcoin. To guarantee the safety of your digital riches, keep educated, follow best practices, and select a wallet that fits your demands. Wallets are incredibly important in the fascinating world of Bitcoin. Your Bitcoin adventure awaits, whether you choose a stylish mobile wallet or the strong security of a hardware wallet.This is a guest post by Ethan Reed. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine. Source
0 notes
Text
Paygo, false consciousness and the IRS
John Steinbeck diagnosed an important American pathology in 1966 when he called the US a nation of “temporarily embarrassed capitalists” — people who see themselves as the wealthy-in-waiting and therefore fight policies that reduce the power that comes from wealth.
It’s a restatement of Engels’ idea of “false consciousness,” and it’s the result of a deliberate strategy on the part of wealthy people — many of whom believe that they were literally genetically destined to be wealthy — to convince the rest of us that “anyone can succeed.”
Part of the false consciousness program is the money story that goes like this: the US government takes away “taxpayers’ money” from “makers” to fund “programs,” the bulk of which go to the “lazy takers,” who experience the “moral hazard” of subsidized unemployment.
But of course, that’s not how money works. Money originates with the federal government (and its fiscal agents, the banks). In order for the public to have money to pay off its tax liabilities, the government must first spend that money into existence.
The IRS doesn’t take our tax dollars, pile them up, and give them to Congress to spend on programs. When the IRS taxes our money, they annihilate it, removing it from circulation. When Congress spends, new money comes into existence.
The US government can’t run out of money any more than Apple can run out of Itunes gift cards. It can spend too much money — so much that prices go up because too many dollars are chasing too few goods — but it can’t run out of money.
Fed spending is constrained by resources (what’s for sale in dollars) not money (how many dollars there are). If the ratio of dollars to resources gets out of whack, there’s a risk of inflation.
There are many ways to fix this ratio. For example, the government usually issues T-bills (savings bonds) whenever it spends more than it taxes. When you buy a T-bill, you take dollars that might circulate around the economy, chasing goods and labor, and you sequester them.
A T-bill is just a dollar you’re not allowed to spend. In exchange for surrendering the right to spend your dollars for 1, 5, 10 or more years, the government offers you interest, trickling out that money over a long period.
That way the government can buy things today without bidding against your dollars.
But that’s not the only way to fight inflation while spending new money into existence. The other major way is taxation: simply removing money from the economy and annihilating it.
Taxation fights inflation. When the government runs a deficit, that means that it created more money this year via spending than it destroyed via taxes. The “government deficit” is the “public surplus” — the money left in the economy for all of us to spend on stuff.
Likewise, when the government runs a “surplus” that means it taxes more money out of existence than it spends into existence. In a year where the government runs a surplus, it means that the power of the private sector — you and me — to buy stuff has decreased overall.
This is fine if there was too much money to begin with — if inflation was kicking off — but if there’s not enough money in circulation (e.g. if there’s a recession), it just makes things worse…but not for everyone.
When the economy is starved of money, banks go to work creating new money through loans. These loans pay interest (to rich people like bank shareholders and people who securitize and buy debt).
That’s the one-two punch of spending cuts during a downturn:
I. The real economy is starved of the capital it needs to pay workers and make things for workers to buy;
II. The financial economy grows as desperate real-economy firms borrow from banks to keep the lights on.
Despite all their talk of “spending taxpayers’ money,” the wealthy understand how money works. That’s why they were totally indifferent to the running $1t/year deficits created by the Trump tax-cuts (and likewise about the Obama finance bailouts).
Giving money to rich people causes asset-bubbles (driving up the prices of houses), but not inflation (a sustained rise in the price of all goods). That’s because rich people can’t buy enough stuff (fridges, cars, oranges) to drive up prices.
https://pluralistic.net/2021/04/08/howard-dino/#payfors
After you’ve bought three houses and three SubZero fridges and filled them with the beef of three Kobe cows and three cases of Moet, there’s still a LOT left over (even if you’re Jeff Bezos and buy a superyacht with its own, smaller superyacht).
Those leftovers go to socially useless things, like buying houses to turn into rent-generating slums (Wall Street is fast becoming America’s biggest landlord, and single family homes are sold for cash to investment funds instead of families).
And they go to influence campaigns designed to make regular people defend massive cuts to the IRS and opposition to public spending on infrastructure, education, health, and other necessities.
This isn’t just about Republicans. For years, the Democratic leadership has supported “balanced budgets” (spending so little that no new money is left in the economy after all taxes are paid).
The “paygo” rule (which requires all new spending to be matched with cuts or tax-hikes) is religion for the likes of Pelosi and Schumer. That’s why the Democratic caucus is mired in stupid arguments about “how we will pay for the stimulus.”
As bad as the paygo rule is, though, Republicans have made it worse, by demonizing and starving the IRS. Paygo means that the US government operates under the artificial constraint of only spending if it can make cuts or raise taxes.
Raises taxes is really unpopular, for obvious reasons.
Now, raising taxes on the 1% — who have a lot of excess money that’s fueling political corruption and asset bubbles — is one way around this.
Theoretically, taxing the 1% should have a 99% approval rating.
But canny Republicans have figured out how exorcise temporarily embarrassed capitalists about the “unfairness” of taxing their bosses, in part by just flat-out lying about who new taxes would implicate.
But there’s yet another way to satisfy paygo’s artificial constraint, without changing the a single word in the tax-code: simply fund the IRS so that it can collect the trillions that the ultra-wealthy illegally avoid in tax-payments every year.
But this strategy is also a bust. The GOP campaign to destroy the IRS has been too successful.
It’s a longrunning campaign, but it achieved liftoff in 2013 when the Tea Party baselessly accused the IRS of discriminating against conservative groups seeking nonprofit status.
The work-the-ref strategy paid off, providing political cover for deep cuts to the IRS and putting IRS staffers on notice so they green lit every dark money group that applied for nonprofit status, no matter how obviously corrupt they were.
https://www.washingtonpost.com/investigations/fallout-from-allegations-of-tea-party-targeting-hamper-irs-oversight-of-nonprofits/2017/12/17/6403c1c0-c59e-11e7-a441-3a768c8586f1_story.html
After the cuts, the IRS grew easier to discredit. Understaffed and under siege, the agency’s behavior grew erratic, then indefensible. There were runaway automated processes that sent out erroneous property-seizure notices that no one could rescind:
https://theintercept.com/2019/01/14/irs-shutdown-federal-government-shut-down-irs-asset-seizures/
Then there was the aftermath of the Equifax breach, where the IRS first told Americans that it didn’t matter because they’d already been doxed by other bad companies:
https://thehill.com/policy/cybersecurity/355862-irs-significant-number-of-equifax-victims-already-had-info-accessed-by
Then came news that the IRS couldn’t cancel Equifax’s no-bid, $7.5m anti-fraud contract because it didn’t have the resources to do its own fraud prevention (Equifax eventually lost the contract because it served malware from its anti-fraud site).
https://www.cbsnews.com/news/equifax-irs-data-breach-malware-discovered/
The rich waged a successful all-out war on the IRS. Take the Global High Wealth unit. For every hour an auditor from GHW worked, they brought in $4500 in taxes the super-rich had dodged. Even by the topsy-turvy logic of “government as a business,” this was good business.
After a concerted harassment and political influence campaign, the GHW abandoned the super-rich and switched to the merely wealthy, bringing in less money and pissing off a lot more people.
The other shoe dropped in 2019, when the IRS admitted it had switched to preferentially auditing poor people because it was too politically and legally fraught to audit rich people, even the most flagrant cheaters.
https://www.propublica.org/article/irs-sorry-but-its-just-easier-and-cheaper-to-audit-the-poor
That was the first year that America’s 400 highest earners paid a lower tax rate than the average American worker:
https://www.nytimes.com/interactive/2019/10/06/opinion/income-tax-rate-wealthy.html
The IRS’s transformation into a facilitator of illegal wealth retention by the super-rich and petty harassment of the rest of Americans made them very easy to hate.
To that, add the concerted corporate campaigns to use the IRS to rip off workers.
For example, for 20 years, Intuit lobbied the IRS not to make tax-filing automatic, painless and free, ensuring that Americans would continue to pay billions to send data to the IRS that it already had:
https://www.propublica.org/article/inside-turbotax-20-year-fight-to-stop-americans-from-filing-their-taxes-for-free
Reading the IRS’s internal emails from this battle reveals an agency in retreat, where demoralized and ineffectual government employees simply rolled over for one of the greatest ripoffs in American history:
https://www.propublica.org/article/the-irs-tried-to-hide-emails-that-show-tax-industry-influence-over-free-file-program
Intuit wanted to rip us off with taxes. Microsoft, by contrast, just wanted to break the law. Working with KPMG, the convicted monopolist created a “transfer” scheme of breathtaking illegality, using its tax-savings to bankroll its war on the IRS:
https://www.propublica.org/article/the-irs-decided-to-get-tough-against-microsoft-microsoft-got-tougher
Which brings us to today, where Democrats are held hostage to the “payfor” rule and trying to figure out how to mobilize the trillions Biden has pledged for infrastructure, health, and care.
Republicans — pushing the big lie of “taxpayer money” — are dogwhistling hard. Senator John Thune, responding to Biden’s proposal for $80b for the IRS, says any tax enforcement efforts “must strike an appropriate balance between taxpayer responsibilities and taxpayer rights.”
Meanwhile Senator Chuck Grassley takes the nonsensical position that funding the IRS won’t help it do its job (“simply throwing money at a problem doesn’t necessarily yield a solution”).
https://thehill.com/policy/finance/553704-lawmakers-bicker-over-how-to-go-after-tax-cheats
Then there’s Rep Kevin Brady, warning that a fully funded IRS would “unleash tens of thousands of new IRS agents on families, farms and businesses.”
But the Democrats own the paygo rule, not the Republicans, and their leadership have added their own special touch to make funding the IRS impossible.
https://prospect.org/politics/infrastructure-at-a-crossroads-biden-public-investment/
According to the rules Congress gives to the Congressional Budget Office (which calculates the cost of government programs), the CBO isn’t allowed to factor in the projected additional revenue from funding the IRS, only the cost of doing so (!).
Which means that they must factor in the salaries that IRS Global High Wealth auditors will draw — but they are forbidden from counting the $4500/hour they generate when they puncture the tissue-thin financial lies of the super-rich.
The payfor and “taxpayer money” are lies.
It’s a shuck sold to the rubes, not economics. Because it’s a shuck, it doesn’t have to make any sense — and it doesn’t. We shouldn’t run government like a business, but if we must, let’s at least count revenues as well as costs.
Image: Mike Licht/notionscapital.com https://www.flickr.com/photos/notionscapital/48857033957/
CC BY: https://creativecommons.org/licenses/by/2.0/
57 notes
·
View notes
Text
Headlines
The Covid-19 economic shock (NYT) The economy’s recovery from the fastest, deepest recession in U.S. history is likely to be a long, grinding affair. More than $6.5 trillion in household wealth vanished during the first three months of this year as the pandemic tightened its hold on the global economy, the Federal Reserve said this week. That’s roughly equivalent to the economies of the United Kingdom and France combined. “This is the biggest economic shock in the U.S. and in the world, really, in living memory,” Fed Chair Jerome H. Powell said Wednesday. “We went from the lowest level of unemployment in 50 years to the highest level in close to 90 years, and we did it in two months.” Almost 90 percent of the 20 million workers who lost their jobs in April said they had been laid off temporarily and expected to return to their jobs, a possible sign the economy might quickly return to normal. Yet economists are far less sanguine. After a quick initial bounce this year, the economy “will go largely sideways” until a coronavirus vaccine is developed, according to economist Mark Zandi of Moody’s Analytics.
Tenants behind on rent in pandemic face harassment, eviction (AP) Jeremy Rooks works the evening shift at a Georgia fast-food restaurant these days to avoid being on the street past dusk. He needs somewhere to go at night: He and his wife are homeless after the extended-stay motel where they had lived since Thanksgiving evicted them in April when they couldn’t pay their rent. They should have been protected because the state’s Supreme Court has effectively halted evictions due to the coronavirus pandemic. But Rooks said the owner still sent a man posing as a sheriff’s deputy, armed with a gun, to throw the couple out a few days after rent was due. The pandemic has shut housing courts and prompted most states and federal authorities to initiate policies protecting renters from eviction. But not everyone is covered and a number of landlords—some desperate to pay their mortgages themselves—are turning to threats and harassment to force tenants out. The evictions threaten to exacerbate a problem that has plagued people of color like Rooks long before the pandemic, when landlords across the U.S. were filing about 300,000 eviction requests every month. The data and analytics real estate firm Amherst projects that 28 million renters, or about 22.5% of all households, are at risk of eviction.
Pandemic leads to a bicycle boom, and shortage, around the world (AP) Fitness junkies locked out of gyms, commuters fearful of public transit, and families going stir crazy inside their homes during the coronavirus pandemic have created a boom in bicycle sales unseen in decades. In the United States, bicycle aisles at mass merchandisers like Walmart and Target have been swept clean, and independent shops are doing a brisk business and are selling out of affordable “family” bikes. Bicycle sales over the past two months saw their biggest spike in the U.S. since the oil crisis of the 1970s, said Jay Townley, who analyzes cycling industry trends at Human Powered Solutions. The trend is mirrored around the globe, as cities better known for car-clogged streets, like Manila and Rome, install bike lanes to accommodate surging interest in cycling while public transport remains curtailed.
Mexico desperate to reopen 11 million-job tourism industry (AP) An irony of the coronavirus pandemic is that the idyllic beach vacation in Mexico in the brochures really does exist now: The white sand beaches are sparkling clean and empty on the Caribbean coast, the water is clear on the Pacific coast and the waters around the resort of Los Cabos are teeming with fish after 10 weeks with no boats going out. There are two-for-one deals and very eager staff. It’s all only an airline flight—and a taxi ride, and a reception desk—away, and that’s the problem. There are a number of ways to think about it: Might it be safer to travel than stay home? How much is mental health worth, and, if people are going to socially distance anyway, why not do it in a beautiful, isolated place? On the other hand, despite the pandemic, flights are often crowded, even hotels in Mexico that bend over backward to disinfect everything have little capacity to actually test their employees, and while fellow guests are likely to be few and far between, they also probably won’t be wearing masks. In Quintana Roo state, where Cancun is located, tourism is the only industry there is, and Cancun is the only major Mexican resort to reopen so far. Mexico’s tourism income crashed in April, when it was only 6.3% of what it was one year ago. Hundreds of thousands of hotel rooms were closed. Tourism provides 11 million jobs, directly or indirectly in Mexico, and many of those workers were simply sent home to wait it out.
Top US diplomat finds virtual path into Venezuela amid rift (AP) A year after shutting down the U.S. Embassy in Caracas, Washington’s top diplomat in Venezuela has found a way to slip back inside the South American nation—at least virtually. Each Thursday afternoon, James Story hits the “Go Live” button on Facebook from his office in the U.S. Embassy in Bogota or his home in the Colombian capital hundreds of miles from Caracas. In a freewheeling approach, he answers questions in fluent Spanish from Venezuelans and the few U.S. citizens still in the country, addressing the latest intrigue and turmoil bubbling over in Venezuela and the United States. For 30 minutes, Story talks about everything from Venezuela’s purchases of gasoline from Iran, despite its vast oil reserves, to recent unrest in the U.S. over George Floyd’s death in police custody to accusations that President Nicolás Maduro is undermining Venezuela’s constitution. Story’s low-budget, weekly question-and-answer session on the popular social media platform is a way for Story to get his message out since he’s deprived of traditional tools such as visiting hospitals and schools, talking to local reporters and hosting cocktail parties for power brokers.
Colombia’s confirmed coronavirus cases rise above 50,000 (Reuters) Reported coronavirus cases in Colombia have risen to over 50,000, the country’s health ministry said on Sunday, as neighboring Ecuador approaches the same milestone. The disease overwhelmed Ecuador’s health system, in some cases leaving authorities unable to collect the bodies of the deceased and forcing the government to temporarily store corpses in refrigerated shipping containers. Colombia’s economy has been battered by the twin ills of a coronavirus quarantine put in place by President Ivan Duque and falling oil prices.
Europe’s borders reopen but long road for tourism to recover (AP) Borders opened up across Europe on Monday after three months of coronavirus closures that began chaotically in March. But many restrictions persist, it’s unclear how keen Europeans will be to travel this summer and the continent is still closed to Americans, Asians and other international tourists. Border checks for most Europeans were dropped overnight in Germany, France and elsewhere, nearly two weeks after Italy opened its frontiers. The European Union’s 27 nations, as well as those in the Schengen passport-free travel area, which also includes a few non-EU nations such as Switzerland, aren’t expected to start opening to visitors from outside the continent until at least the beginning of next month, and possibly later.
Surveillance tech (Worldcrunch) Following pushback from Black Lives Matter activists, Amazon has suspended police use of its facial recognition software for one year. IBM followed suit, also announcing it will stop offering its similar software for “mass surveillance or racial profiling.” But the moves come amid a tumultuous few months for so-called “surveillance tech,” which some have touted during the pandemic as a necessary tool to ensure public cooperation to stem the spread of a deadly virus. Despite the potential medical benefits, the use of geolocation technology to curb COVID-19 has raised concerns over fundamental data protection, especially in countries like China, South Korea and Israel where tracking has been more intrusive: enlisting credit card records for purchase patterns, GPS data for travel patterns, and security-camera footage for verification. In Russia, the pandemic proved a convenient excuse to test a nascent, China-inspired citizen monitoring system, backed by a Moscow court ruling in early March stating that the city’s facial recognition system does not violate the privacy of its citizens. Even places not particularly known for their police state-like tactics are pushing limits: In Paris, cameras were installed at the popular Châtelet metro station to monitor mask use, as it is illegal to take public transportation without a mask. Similar (and seemingly well-intentioned) efforts like fast-tracked coronavirus data collection apps have raised suspicions of data protection breaches by both hackers and governments, including in the Netherlands and South Africa. In Germany, a country known for its hard stance on privacy protection, new surveillance tools are being met with a considerable amount of defiance.
American sentenced to 16 years in Russia on spying charges (AP) A Russian court on Monday sentenced an American businessman to 16 years in prison on spying charges, a sentence that he and his brother rejected as being political. The Moscow City Court read out the conviction of Paul Whelan on charges of espionage and sentenced him to 16 years in a maximum security prison colony. The trial was held behind closed doors. Whelan, who was arrested in Moscow in December 2018, has insisted on his innocence, saying he was set up. Speaking after the verdict, U.S. Ambassador John Sullivan denounced the secret trial in which no evidence was produced as an egregious violation of human rights and international legal norms. He described Whelan’s conviction as a mockery of justice and demanded his immediate release.
For Migrants in Russia, Virus Means No Money to Live and No Way to Leave (NYT) Migrant workers from Central Asia, shrugging off the risk of coronavirus infection, have gathered in groups each day outside their countries’ embassies in Moscow, banging on doors and fences and shouting for officials to come out and tell them when they can finally get on a charter flight home. With regular flights canceled, charters offer the only feasible way out for the more than five million migrant workers from former Soviet republics now stranded in Russia as a result of the pandemic, with many living in increasingly dire circumstances. While Russia has been battered by the virus, with the third most cases in the world after the United States and Brazil, the crisis has hit migrant workers especially hard, as they were the first to lose their jobs and often the last to receive medical help. Many have no money for food and, once infected with the coronavirus, have been left in crowded dorms to fight the disease by themselves. Many would like to return to their countries. But they can’t. Before the pandemic hit, more than 15 flights left Moscow each day for various cities in Uzbekistan, Central Asia’s most populous nation. Today, there are only two charters a week, and the embassy’s waiting list has more than 80,000 names.
Press freedom in the Philippines (Foreign Policy) The journalist Maria Ressa, the founder of news site Rappler, has been found guilty of criminal libel by a Manila court in a case Human Rights Watch described as a “devastating blow” to press freedom in the Philippines under President Rodrigo Duterte. Ressa and another Rappler journalist, Reynaldo Santos Jr., were sentenced to up to six years in prison under the country’s cybercrime prevention act of 2012, which includes libel. The article that was deemed libelous predated the law, but a later online update of a typo was enough for prosecutors to consider it worthy of an indictment.
18 dead, 189 hurt as tanker truck explodes on China highway (AP) A tanker truck exploded on a highway in southeastern China on Saturday, killing 18 people and injuring at least 189 others, authorities said. The explosion caused extensive damage to nearby buildings. One photo showed firefighters hosing down a row of buildings with blown-out facades well into the night. The truck carrying liquefied gas exploded around 4:45 p.m. on the Shenyang-Haikou Expressway south of Shanghai in Zhejiang province, the official Xinhua News Agency said, citing local authorities.
Hong Kong families, fearing a reign of terror, prepare to flee the city (Washington Post) China’s Communist Party has haunted Leung’s family for generations. Her father, Guo Yao, fled forced labor and the violent purges of the Cultural Revolution for a better life in Hong Kong, where he arrived with his wife in 1973 to find relative freedom and prosperity. Now, 17 years after the death of her father, Leung is preparing to flee Hong Kong. A new law approved by the Communist Party to take effect this summer will allow China’s powerful state security agencies to operate in the territory, paving the way for political purges and intimidation of government critics by secret police. Officials are pushing to impose party propaganda in schools. With their political freedoms deteriorating, nurses, lawyers, business people and other skilled workers are rushing to renew documents that could provide a pathway to residency in Britain, or finding ways to emigrate to Taiwan, Canada or Australia. Applications for police certificates required to emigrate soared almost 80 percent to nearly 21,000 in the latter half of 2019 from a year earlier, even before the advent of the security law, coinciding with a crackdown on pro-democracy protests. Animal rescue groups have reported an increase in surrendered dogs as their owners leave Hong Kong. Protesters fearing persecution have sought refuge in Germany, the Netherlands and United States. The exodus of talent recalls the pre-handover years, when anxiety over Beijing’s rule drove tens of thousands of people out of Hong Kong.
Netanyahu turns to rich friend to fund corruption trial fees (AP) Israeli Prime Minister Benjamin Netanyahu is on trial for accepting gifts from wealthy friends. But that has not stopped him from seeking another gift from a wealthy friend to pay for his multimillion-dollar legal defense. The awkward arrangement opens a window into the very ties with billionaire friends that plunged Netanyahu into legal trouble and sheds light on the intersection of money and Israeli politics. Netanyahu has asked an Israeli oversight committee to allow a 10 million shekel ($2.9 million) donation from Spencer Partrich, a Michigan-based real estate magnate, to fund his legal defense. The request for financial aid from a friend is not illegal, and Israeli politicians have a long tradition of hobnobbing with wealthy Jewish supporters abroad. But to some, the optics of Netanyahu’s request are sketchy. “It is a problem that we have prime ministers who have ties to moguls,” said Tomer Naor, of the Movement for Quality Government in Israel, a good governance group. “When the borders blur, you are blinded by the big money. You want more of it. Then all of a sudden the friend asks for a little favor and that poses a problem.”
Nigeria attacks (Foreign Policy) At least 141 people were killed in two militant attacks in Northern Nigeria over the weekend, both have been claimed by Islamic State West Africa Province. The attacks in Monguno and Nganzai districts of Borno state killed at least 60 people, while a separate attack in Gabio district killed at least 81. The United Nations, which has a humanitarian base in Monguno, said it was “appalled” by the attacks.
1 note
·
View note
Text
19 IoT Quotes that Reflect the Disrupting Nature of the Technology
Following are 19 Prominent and Disrupting IoT Quotes by some of the global leaders that will make you think twice about the disrupting stature of the Internet of Things.
“If you invent a breakthrough in artificial intelligence, so machines can learn, that is worth 10 Microsofts.” — Bill Gates
“And just like any company that blissfully ignored the Internet at the turn of the century, the ones that dismiss the Internet of Things risk getting left behind.” — Jared Newman
“If you think that the internet has changed your life, think again. The Internet of Things is about to change it all over again!” — Brendan O’Brien
“Whenever I hear people saying AI is going to hurt people in the future I think, yeah, technology can generally always be used for good and bad and you need to be careful about how you build it … if you’re arguing against AI then you’re arguing against safer cars that aren’t going to have accidents, and you’re arguing against being able to better diagnose people when they’re sick.” — Mark Zuckerberg
Read More @ https://globalchiefinsights.com/disrupting-nature-of-the-technology/
“I think we should be very careful about artificial intelligence. If I had to guess at what our biggest existential threat is, I’d probably say that. So we need to be very careful.” — Elon Musk
“The opportunity we have is to build a secure, intelligent platform that solves some of the world’s greatest problems at scale. That’s what’s possible with hundreds of billions of connections and the capabilities that we can deliver together.” — Chuck Robbins
“What the Internet of Things is really about is information technology that can gather its own information. Often what it does with that information is not tell a human being something, it [just] does something.” — Kevin Ashton
“One cubic inch of nanotube circuitry, once fully developed, would be up to one hundred million times more powerful than the human brain.” — Ray Kurzweil
“As the Internet of things advances, the very notion of a clear dividing line between reality and virtual reality becomes blurred, sometimes in creative ways.” — Geoff Mulgan
“The Internet of Things is not a concept; it is a network, the true technology-enabled Network of all networks.” — Edewede Oriwoh
“When we talk about the Internet of Things, it’s not just putting RFID tags on some dumb thing so we smart people know where that dumb thing is. It’s about embedding intelligence so things become smarter and do more than they were proposed to do.” — Nicholas Negroponte
“Everything that can be automated will be automated.” — Robert Cannon
“Everything is being wired up or connected wirelessly—architecture, energy efficient sensing, secure networks, quality of service, new protocols, participatory sensing, data mining, GIS based visualization, cloud computing, and international activities. It simply means that powerful information will be at our fingertips.” — Mehul Nayak
“Despite continued security problems, the IoT will spread and people will become increasingly dependent on it. The cost of breaches will be viewed like the toll taken by car crashes, which have not persuaded very many people not to drive.” — Richard Adler
“We have a deep need and desire to connect. Everything in the history of communication technology suggests we will take advantage of every opportunity to connect more richly and deeply. I see no evidence for a reversal of that trend.” — Peter Morville
“Convenience and ‘magic’ will overwhelm concerns. The history of technology is clear on this front—ATMs, e-commerce, credit cards, the list is endless.” — Sunil Paul
“Despite hacks and privacy issues, people will feel a need to keep connected, partly because companies will reward them for doing so (or make life difficult if they don’t).” — Joseph Turow
“There will be all kinds of hiccups, horror stories, accidents, deliberate acts of sabotage and other bumps along the road that will slow but not stop our greater connectivity. Convenience and empowerment always seem to win for most people, even at some loss of privacy, control or transparency.” — Scott McLeod
“Internet of Things is transforming the everyday physical objects that surround us into an ecosystem of information that will enrich our lives. From refrigerators to parking spaces to houses, the Internet of Things is bringing more and more things into the digital fold every day, which will likely make the Internet of Things a multi-trillion dollar industry in the near future.” — PricewaterhouseCoopers report
0 notes
Text
Leaked Personal Data of 1 Billion Chinese Citizens on Sale for 10 Bitcoins — Hacker Claims Stolen From Shanghai Police
A hacker claims to have stolen the personal data of a billion Chinese citizens from the Shanghai National Police (SHGA) and is selling it for 10 bitcoins. “This database contains many TB of data and information on billions of Chinese citizens.”
23 Terabytes of Data on a Billion Chinese Citizens on Sale for 10 Bitcoins
An anonymous hacker has claimed to have stolen about 23 terabytes of data on a billion Chinese citizens from a Shanghai police database. Experts say that, if true, this would be one of the biggest data breaches in history. The data is being offered for sale for 10 bitcoins. At the time of writing, this sum amounts to about $197,806. On a hacker forum, an anonymous user using the handle “Chinadan” offered the data for sale on Thursday. The user claimed that the information was leaked from the Shanghai National Police (SHGA) database. “This database contains many TB of data and information on billions of Chinese citizens,” the post details. The leaked data includes names, addresses, birthplaces, national ID numbers, mobile numbers, as well as crime and case details. The user shared a sample of 750,000 records to allow interested buyers to verify that the data for sale is not fake. On Monday, Binance CEO Zhao Changpeng (CZ) tweeted: Our threat intelligence detected 1 billion resident records for sell in the dark web, including name, address, national id, mobile, police and medical records from one asian country. “Likely due to a bug in an Elastic Search deployment by a gov agency … It is important for all platforms to enhance their security measures in this area,” he continued, adding that “Binance has already stepped up verifications for users potentially affected.” The Binance chief further explained Monday: “Apparently, this exploit happened because the gov developer wrote a tech blog on CSDN and accidentally included the credentials. 1 billion records of private citizens’ data.” What do you think about this data leak? Let us know in the comments section below. Read the full article
0 notes
Text
A Hacker Is Selling the Personal Details of 1 Billion Chinese Citizens
A Hacker Is Selling the Personal Details of 1 Billion Chinese Citizens
A hacker by the name of “ChinaDan” may have just carried out one of the biggest data breaches in history, which if confirmed, would also be very embarrassing for the Chinese government. As Reuters reports(Opens in a new window), the anonymous hacker is offering to sell the personal data of a billion Chinese citizens via Breach Forums for 10 bitcoins, which currently equates to a value of roughly…
View On WordPress
0 notes
Text
Hacker claims to have stolen 1 billion records of Chinese citizens from police
Hacker claims to have stolen 1 billion records of Chinese citizens from police
SHANGHAI: A hacker has claimed to have procured a trove of personal information from the Shanghai police on one billion Chinese citizens, which tech experts say, if true, would be one of the biggest data breaches in history. The anonymous internet user, identified as “ChinaDan“, posted on hacker forum Breach Forums last week offering to sell the more than 23 terabytes (TB) of data for 10 bitcoin,…
View On WordPress
0 notes
Text
Hacker claims to have stolen 1 billion records of Chinese citizens from police
Hacker claims to have stolen 1 billion records of Chinese citizens from police
SHANGHAI: A hacker has claimed to have procured a trove of personal information from the Shanghai police on one billion Chinese citizens, which tech experts say, if true, would be one of the biggest data breaches in history. The anonymous internet user, identified as “ChinaDan“, posted on hacker forum Breach Forums last week offering to sell the more than 23 terabytes (TB) of data for 10 bitcoin,…
View On WordPress
0 notes
Text
IS A CORPORATION A PERSON?
No? That’s true if we look at it from a science/biological construct.
Yes? That’s true if viewed from a legal definition.
d’Errico offers this explanation :
“The concept that a corporation is a "person" is the legal core of corporate power. When the U.S. Supreme Court overturned New Hampshire's attempt to turn Dartmouth College into a public institution (Dartmouth College v. Woodward, 17 U.S. Reports 518 [1819]), the Court subordinated a state legislature to an "artificial being": the college corporation.” (1)
Or this summary by Ripken :
“A legal person is the subject of legal rights and duties. Only those who are legally recognized as persons have the capacity to participate in legal relations. Legal personhood has never been a self-evident classification that applies only to living human beings. In fact, one’s status as a human being is neither necessary nor sufficient to be a person in the eyes of the law. Non-human organizational entities are treated as legal persons for some purposes, while human beings like infants and mentally impaired individuals are not regarded as full-fledged legal persons for other purposes.” (2)
Now that we have established a corporation is a legal person, let us examine how a real biological person and a legal person in the form of a corporation, are treated under the law.
A serial thief in Singapore, when apprehended is liable to serve up to three years in prison or a fine or both. (3) But that may vary, according to jurisdiction and the severity of the crime, like this example :
Man who spent 36 years in prison for stealing $50 from a bakery is now set to be freed - ABC News (go.com)
What about a corporation? What is the punishment when this person commits an offence? Let’s look at the branded corporations. The ones we are familiar with, or perhaps addicted to. Some of whom are on the list of Fortune Magazine’s “most admired” companies. (4) This list is not exhaustive :
Exxon Mobil ordered to pay $14.25M penalty in pollution case - ABC News (go.com)
Exxon Mobil: Corporate Rap Sheet | Corporate Research Project (corp-research.org)
Royal Dutch Shell | Violation Tracker (goodjobsfirst.org)
The five most-fined companies in US oil and gas history (offshore-technology.com)
SIA, 10 other airlines hit with S$1.2 billion fine by EU regulators for taking part in cargo cartel, Europe News & Top Stories - The Straits Times
Singapore Airlines Cargo Pte Ltd. Agrees to Plead Guilty to Price Fixing on Air Cargo Shipments | OPA | Department of Justice
Singapore Airlines cops $4.1M fine in latest air cargo cartel settlement | NBR
Pfizer fined $2.3 billion for illegal marketing in off-label drug case - ABC News (go.com)
Pfizer | Violation Tracker (goodjobsfirst.org)
Supreme Court rejects Johnson & Johnson's appeal of $2 billion baby powder penalty (cnbc.com)
Johnson & Johnson | Violation Tracker (goodjobsfirst.org)
Merck Fined $950 Million Over Painkiller Marketing | IndustryWeek
Merck | Violation Tracker (goodjobsfirst.org)
Taiwan regulator imposes biggest ever domestic fine on leading bank (internationalinvestment.net)
Citigroup | Violation Tracker (goodjobsfirst.org)
HSBC moved vast sums of dirty money after paying record laundering fine - ICIJ
HSBC | Violation Tracker (goodjobsfirst.org)
Netflix documentary re-examines HSBC’s $881 million money-laundering scandal - MarketWatch
JPMorgan Chase & Co. Agrees To Pay $920 Million in Connection with Schemes to Defraud Precious Metals and U.S. Treasuries Markets | OPA | Department of Justice
JPMorgan Chase | Violation Tracker (goodjobsfirst.org)
Boeing Charged with 737 Max Fraud Conspiracy and Agrees to Pay over $2.5 Billion | OPA | Department of Justice
Boeing | Violation Tracker (goodjobsfirst.org)
Boeing and Dow Chemical fined 926 million dollars (france24.com)
Airbus to Pay $4 Billion to Settle Corruption Inquiry - The New York Times (nytimes.com)
Yahoo Fined $50M Over Personal Data Breach | PYMNTS.com
Google’s European fine is a flashback to Microsoft’s ugly antitrust battle - The Verge
Google fined $592 million in dispute with French publishers (apnews.com)
FTC Imposes $5 Billion Penalty and Sweeping New Privacy Restrictions on Facebook | Federal Trade Commission
Facebook's WhatsApp Fined for Breaking E.U. Data Privacy Law - The New York Times (nytimes.com)
Twitter fined $546,000 in December 2020 by European Data Protection Authority for 2019 Breach Notification Violations | Robinson+Cole Data Privacy + Security Insider - JDSupra
Why General Motors’ $900 million fine for a deadly defect is just a slap on the wrist - The Washington Post
China fines Toyota 87.6 million yuan over Lexus price-fixing | Reuters
IBM to pay $24.25M in FCC probe fines | WRAL TechWire
Apple fined $1.2 billion by French competition authorities (cnbc.com)
Apple fined for slowing down old iPhones - BBC News
Samsung Fined $47 Million for Price Fixing in Netherlands | Investing News | US News
Dell fined $100m for accounting fraud that misled investors (computerweekly.com)
Sony slugged with $3.5 million fine over video game refund failures (smh.com.au)
General Electric agrees to pay $200 million SEC fine for misleading investors (cnbc.com)
Johns Hopkins, Bristol-Myers must face $1 billion syphilis infections suit | Reuters
McKinsey Settles for Nearly $600 Million Over Role in Opioid Crisis - The New York Times (nytimes.com)
France fines Roche, Novartis 444 million euros in ongoing eye drug clash | Reuters
Goldman to pay Malaysia $3.9 billion over 1MBD scandal, U.S. settlement seen close | Reuters
Goldman Sachs | Violation Tracker (goodjobsfirst.org)
If this is what it means for some to be on Fortune’s most admired list, one is left to wonder about those who did not make its list.
Conclusion
Clearly, a corporation does not go to jail and neither does it face capital punishment. It generally gets a fine and move on. Some are serial offenders. Still no jail time or firing squad. That’s reserved for us, the peasants.
Moral of the story : BE A CORPORATION. It has power. We the people do not.
Until we make the corporate executives and directors personally accountable and liable for the corporation’s offences, they will always be an untouchable class and caste above and beyond us.
Finally, a Quiz : Which is the oldest, continuous and living legal person in the world?
Gee. I dunno. But maybe we should ask the Pope?
Sources/References
1. d’Errico, Peter. Corporate Personality and Human Commodification. University of Massachusetts. 1996/1997.
Corporate person and Human Commodification (umass.edu)
2. Ripken, Susanna Kim. Corporate Personhood. Cambridge University Press. 2019
Corporate Personhood (cambridge.org)
3. Serial Thief Arrested (police.gov.sg)
4. World’s Most Admired Companies | Fortune
1 note
·
View note
Text
10 Reasons Why HyperNym Fleet Management System Has Edge Over The Competition
In today’s modern world FMS (Fleet management system) plays an important role in the management of assets and commercial vehicles. It is capable of tracking and maintaining all asset information. FMS is a process by which we can manage commercial vehicles and assets at a large scale. In fleet management, we perform a set of actions that helps to run a fleet competently in a short time and with less budget. What is HyperNet Fleet Management System? HyperNet provides a user-friendly Fleet Management System solution that allows your team to manage vehicles and equipment from any location. It is scalable and capable of handling your growing fleets. It is also compatible with most vehicle kinds and global safety requirements, and it connects faultlessly with any existing software or application. HyperNet Fleet Management System will provide you complete visibility into operations, hold your team accountable, and make decisions based on reliable facts. 10 Reasons why HyperNet FMS beats the competition: The 10 main reasons why the HyperNet fleet management system beats the competition are as following: 1. Track your fleets in real-time: HyperNet Fleet tracking system is responsible to track and provide real-time vehicle position and status. In order to manage the fleet properly, you should know where each vehicle is at the current moment and what its fuel condition is. HyperNet’s FMS provides all relevant information in the dashboard so that users can have a comprehensive and detailed overview. 2. Manual Task Automation: Before HyperNet FMS software, all the data was handled manually which acquired a lot of time and effort. Now, all repetitive tasks can be automated which can reduce administrative burden and minimize functional costs. Here are few examples of HyperNet manual task automation: ● HyperNet FMS provides real-time location through which you can easily locate trucks, assets, and drivers. ● It is no longer necessary to call drivers for ETAs (Expected time of arrival) schedule, status updates, and work information. ● It will automatically collect and centralize all kinds of paperwork like fuel receipts and delivery proofs. 3. Vehicle maintenance: The primary task of fleet managers is to maintain the secure and efficient performance of vehicles. Managers should strictly follow maintenance plans to avoid vehicle breakdowns that might lead to downtime and capital loss for the company. HyperNet fleet tracking system provides automated preventive maintenance plans. It can detect required future maintenance and the customers can use it to schedule preventive maintenance at a convenient time, which reduces unexpected downtime and improves overall vehicle utilization. 4. Fuel Management: Fuel expenditure is the biggest expense for a Fleet Management Company. Keeping the fuel expenses to the minimum ensures sustainable and profitable operations. HyperNet FMS solution enables fleet managers to keep an eye on drivers’ irresponsible activities such as over speeding and being idle for too long. Input from multiple sensors is fed into the FMS, which can be easily viewed through the dashboard and reports. 5. Secured Data: HyperNet FMS keeps your data secure by providing identity and access control solutions. All information regarding customers and company assets is stored in a secure way that no hacker can breach. Here are some steps by which HyperNet solution can make your data more secure: ● It defines access controls for all users such as fleet managers, customers and drivers etc. ● A single virus can destroy your important data in seconds. So, HyperNet scans your system regularly. ● It keeps your important data in encrypted form. 6. Geofencing: In HyperNet fleet tracking system, geofencing is done by using RFID, GPS and WIFI sensors to get real-time location of vehicles and assets. By using geofencing techniques the system can create small alerts by entering and exiting different locations. You can inspect the driver’s activity so that the vehicle cannot be used for personal reasons. 7. Easy and quick to learn: HyperNet FMS software is a unified collection of technologies that helps organizations to track and manage assets. It is easy and quick to learn and does not require any steep learning curve. You don’t need any special assistance to use this software. It is used by many reputed organizations to minimize costs, enhance performance, and automate operations. 8. Communication: In order to save time fleet managers should have proper communication with drivers. Otherwise, any confusion or communication barrier can waste a lot of time and effort. By using HyperNet FMS managers can easily send broadcast messages to all drivers in a single click. To avoid any kind of distraction messages will be available to the driver only if the vehicle is stopped. 9. Enhances Customer Satisfaction: The HyperNet tracking technology has made a significant contribution to enhancing client experiences. ● HyperNet FMS keeps the customers updated regarding the schedule of asset delivery by sending email/SMS alerts. ● A direct conversation with drivers without any support from the middle man. ● HyperNet provides a history of location data for driver assistance, scheduling, and on-time delivery of assets. ● It provides real-time tracking through which customers can get an accurate idea of the expected arrival time. 10. Fleet reports and analytics: Reporting and analytics module is very important for the fleet management system. In order to inspect a company’s performance, all reports should be gathered and organized in a definite form. By using HyperNet FMS, we can generate reports automatically for example reports of drivers that do over-speeding, daily wages reports, fuel management reports, parking slots reports, etc. Conclusion: HyperNet fleet tracking system possesses all characteristics by which you can increase fleet productivity, enhance employee’s performance, promote safe driving, minimize overhead expenses, and much more. The system addresses all the difficulties of fleet telematics and GPS fleet monitoring, as well as being capable of boosting corporate productivity and reducing waste. HyperNym’s SaaS IoT platform is “HyperNET” that provides logistics operations with specific industry-built add-ons. Read the full article
0 notes
Text
How Many Registered Republicans In Pa
New Post has been published on https://www.patriotsnet.com/how-many-registered-republicans-in-pa/
How Many Registered Republicans In Pa
The Numbers Bear Out The Dominance Of The Democrats
Republicans Gain Statewide And Locally In Voter Registration
According to gallup.com about 42% of voters claim to be independents. Nationally, the democratic advantage in the party registration states approaches 12 million. Many other republicans, as noted, lean in either the conservative or highly religious direction. Overall, targetsmart found that 42.6 percent of the new voters registered this year lean democratic, and only 29 percent lean republican . There are about twice as many registered democrats living in passaic county than republicans. The counties with the 10 highest percentages of democratic party, republican party, and no party preference registered voters are: the percentage of voters registered with the republican party decreased from 27.1% to 24.0%. 4,600 fewer republicans after the riot. In the week from jan. Currently, republicans have 51 seats, and democrats have 47 with two races still undecided. The biggest spikes in republicans leaving the party came in the days after jan. Their partisan affiliation was roughly split between three groups: Gallup.com says 31% of voters are democrats.
How The Gop Could Win Pennsylvania
Hello, party leaders, potential candidates, lifelong donors, and long-suffering base voters. Its me, the guy who constantly asks about Pennsylvania. The guy who drives people to muting me on Twitter because I wont stop talking about Pennsylvania. Who is already showing flashcards of Collar Counties to his seven-week-old son.
Recently, I received an email from a follower of the Decision Desk, the gist of which was asking me, yes or no, do I really believe the Keystone State is winnable.
Well, heres my answer: Yes.
Yes, this state, which hasnt gone for a Republican president since H.W. Bush in 1988, is absolutely winnable. But not for the reasons often cited . In fact, the thing has driven me along in my obsessive quest for the great beast east of Ohio is an article Nate Cohn, now with The New York Times, but then with The New Republic, wrote on the eve of the 2012 election: Romney has a problem in Pennsylvania: Math. This passage, in particular, has stuck with me for three years:
Its easy to understand why Romney would invest in Pennsylvania.;Like Missouri or North Carolina for Democrats, Pennsylvania is what I call a spreadsheet state. When you start plugging in favorable numbers for the traditionally disadvantaged party, its too easy to get up to 48 percent of the vote, or even more. But those final hundred thousand votes are incredibly difficult and require something extraordinary.
Illinois: Error Registered A Possible 545 Noncitizen Voters
CHICAGO An error in Illinois new automatic voter registration system led to a possible 545 non-U.S. citizens being registered to vote, 15 of whom cast ballots, state officials publicly acknowledged this week.
Illinois Secretary of State Jesse Whites office, which oversees drivers licenses, said the data of 574 people who self-identified as non-citizens was erroneously forwarded to elections officials to be registered to vote. Election officials confirmed Tuesday that 545 of them were ultimately registered.
It was a computer error, White spokesman Dave Druker said Tuesday. We moved to correct it and contacted people involved.
As Illinois Republicans called for an immediate hearing over a serious breach of voter protections, election officials worked to determine how many of the registrations were indeed invalid. Over 150 registrations had been canceled, said State Board of Elections spokesman Matt Dietrich.
Dietrich said it was possible some people indicated that they werent citizens by mistake. When Illinois residents get standard drivers licenses, they have to confirm they meet the criteria to vote, certifying they are 18 and a U.S. citizen. Only those who meet the criteria are supposed to be sent to election officials for registration.
The 15 people cast 19 ballots in elections in 2018 and 2019.
It was not immediately unclear what would happen to the individuals.
Follow Sophia Tareen on Twitter: https://twitter.com/sophiatareen.
You May Like: How Many Seats Do The Republicans Have In The Senate
The Secret Is Unregistered Voters
So is there a path to winning the Keystone? As I said before, yes. The secret lies not with the current number of registered voters, where Democrats dwarf Republicans by a cool million, but in the number of citizens of voting age not registered. Finding them and goading them into registering wont be easy, but they arent a rare breed: per current registration figures provided by the Department of State, and the Census estimate of current voting-age population, there are more than 1.6 million such untapped voters residing here. Heck, some of them may have already registered once before, but it lapsed.
Attesting to the sheer power of that Democratic voter drive that started a decade ago, only 14 percent of them reside in Philadelphia or Allegheny County. A clear majority, 62 percent to 38 percent, of this untapped mass resides in counties that went to Romney. I broke down the numbers and converted it into a simple diagram, where the counties have been re-sized according to how big a share of the untapped vote they account for:
As A Successful Republican New Mexico Governor 2016 Libertarian Party Presidential Candidate Gary Johnson Pronounced That He Had Slashed Taxes More Than A Dozen Times Balanced The There Are Many On The Left Who Support The Libertarian Partys Proposals To Legalize The Liberal Use Of Marijuana
39.66 percent of voters are registered with that party. The most recent poll at the time of writing gives a d+11 advantage. Even if youd rather not commit to any particular party, you may find yourself wishing to support a specific democrat candidate when primaries come around. Once you know which party you belong to, it will be easier to decide which candidates to vote for during elections. This quiz will ask you questions about your political beliefs. However, registered republicans outnumber democrats in six of the states 21 counties, and there several other counties that are pretty evenly split. Over 60% of black voters are registered democrats compared to just 3% that are registered in surveys, more than half of seattle voters identified as democrat or leaning democratic. The answer may surprise you. Are you a democrat or a republican? Are there more democrats or republicans who top that list? The election of 2010 gave republicans the majority beginning in january, 2011. These are broadly generalized opinions; There are still way more registered democrats;
The election of 2010 gave republicans the majority beginning in january, 2011. Hello and thank you for registering. It was a more natural association. related: Are there more democrats or republicans who top that list? The republican party has waxed and waned in popularity and membership over the years, never quite having as many registered partisans as the democrats.
Don’t Miss: Did The Republicans Win The Senate Last Night
Republicans Had Been Making Voter Registration Gains On Democrats In Pennsylvania For Years Stats Show 2020 May Have Changed That
PENNSYLVANIA Fraught with turmoil, judicial anxieties, violence, and uncertainties which shook democracy to its core, the 2020 election season in Pennsylvania was unlike any other in history.
And the fallout from the events of the past few months is only just beginning to unfold, with repercussions likely to be felt for years to come.
While it’s too early to tell exactly what will happen to the Republican Party after President Donald Trump’s loss, a glimpse at shifting voter registration patterns provides a glimpse at how the electorate is responding to recent events.
Democrats Have Been Getting Out There
Committed partisans are the most reliable participants in elections, and often vote more than 90 percent of the time with their stated party. Independents, on the other hand, are mostly lying , and when truly independent, are incredibly unreliable as a bloc from cycle to cycle. If they are the true pox on both houses types, and that terribly undecided, they may not even bother to vote. To win a major election, greater emphasis must be placed on finding, registering, contacting, and turning out new voters.
This is exactly what Democrats did throughout the country after 2004, and they certainly gave Pennsylvania a good one-over. From 2000 to 2014, Democratic and third-party efforts tipped the scales of registration even further to the Left, expanding the blue teams edge over Republicans by almost 650,000 voters. President Obama received more votes in 2012 than Sen. John Kerry did eight years prior, even with a drop-off from his 2008 high, a testament to his teams incredible turnout operation.
Despite that sizable shift, the actual impact on elections from 2000 to 2012 was miniscule: the presidents margin in the Keystone in 2012 was only about 105,000 votes wider than Gores had been. How does his performance over Gores stack up with other states he carried?
In Virginia, the margin swung by over 379,000 from 2000. In Colorado, 283,000. Wisconsin, 218,000. Iowa, 88,000. Nevada, 89,000.
You May Like: What Republicans Are Running For President
It’s Always Blue In Philadelphia And It’s Getting Bluer
There’s been a saying for decades that you can’t win Pennsylvania without winning the Philadelphia suburbs. Trump proved that untrue, at least for one year, when he won in 2016 without winning Philadelphia and its suburbs.
But the old adage became;true again in 2018, when a five-county region in southeastern Pennsylvania sent a record number of women to U.S. Congress and state offices.;
In 2019, history was made again. Democrats were elected to all five seats on the Delaware County Council, which had been held by a majority of Republicans since the Civil War. That same year, Democrats won the Board of Commissioners in Bucks County for the first time since 1983.;
This year could yield a record Democratic turnout in Philadelphia, Montgomery, Bucks, Chester and Delaware counties. As of Monday, the five-county region had added 75,574 more registered Democrats than in 2016. The biggest increase was an addition of 20,214 Democrats in Montgomery County since the last presidential election.;
In the same time period, the region has shed 31,384 Republicans from its voting rolls. The biggest loss was in Delaware County, where there are 16,981 fewer Republicans than in 2016.;
Past Jumps In Party Affiliations
Republicans In Pennsylvania Changing Party Registration Following Deadly Insurrection At US Capitol
The bump in Democratic affiliation following Bidens inauguration mirrors that of former President Barack Obamas first term, Jones said.
That was really the high point that weve seen; kind of the 2006-2009 period, when really the majority of Americans either identified as Democrats outright or were independents but they leaned toward the party, he said.;Our data on this only goes back to the 90s, but its pretty much the only time we consistently had one party with the majority of Americans on their side.
Republican advantages, though rarer and more short-lived, followed the Gulf War in 1991 when George H.W. Bush was in office and the 9/11 terrorist attacks during President George W. Bushs term, according to Gallup. More people also reported GOP affiliation after the 1994, 2010 and 2014 midterm elections.
Whether the Republican Party can regain advantage during the 2022 midterm elections may rely on the successes of the Biden administration, according to Jones.
A lot of it is going to depend on how things go over the course of the year. If things get better with the coronavirus and the economy bounces back and a lot of people expect Biden can keep relatively strong approval ratings, then that will be better for the Democrats, Jones said.;But if things start to get worse unemployment goes up or coronavirus gets worse; then his approval is going to go down. Its going to make things a lot better for the Republican Party for the midterm next year.
Also Check: What Is Difference Between Democrats And Republicans
Are You Surrounded By Democrats Or Republicans How Jersey Breaks Red And Blue In All 21 Counties
Here is a county-by-county breakdown of which political party rules in each of New Jerseys 21 counties and how much each party gained since this time last year.
New Jersey is a Democratic-leaning state, and its getting bluer by the month.
Democrats have registered voters at a faster pace than Republicans in the Garden State. But the GOP still maintains pockets of control in some counties.
Republicans are outnumbered by registered Democrats by nearly 1 million people , according to the latest statistics from the states Division of Elections. As of the end of September, New Jersey had 2,307,937 registered Democrats and 1,331,102 Republicans.
Over the past year, Democrats added more than double the number of registered voters compared to the GOP , according to the data.
However, registered Republicans outnumber Democrats in six of the states 21 counties, and there are a few other counties that are pretty evenly split. Also, Republicans out registered the number of new Democrats in six counties from this time last year, including in three counties where the number of Ds outweigh the Rs.
The largest number of New Jersey voters 2,378,040 to be exact have not formally claimed any party affiliation.
Twelve years ago, Democrats had a 290,000 vote plurality over registered Republicans statewide, said Ben Dworkin, director of Rowan Universitys Institute for Public Policy and Citizenship.
There Are 644835 Inactive Voters In Pennsylvania
Pennsylvania could rock;the vote a little harder.
There are 644,835 inactive voters in the state, including 418,777 inactive Democrats and 226,058 inactive Republicans, according to voter registration records.
The state defines an inactive voter as someone who has not voted in five years or has moved and not registered to vote in their new Pennsylvania county.
Think of a Penn State football game. Imagine a sellout crowd at Beaver Stadium. Multiply it by 6. Add 5,403 more people. That’s how many registered voters in Pennsylvania;are not actually voting.;
That includes 80,862 voters in southcentral Pennsylvania throughout Adams, Cumberland, Dauphin, Franklin, Lancaster, Lebanon and York Counties.;
A closer look:;
Lancaster County: 20,040 inactive voters
Cumberland County: 18,662 inactive voters
York County: 16,926 inactive voters
Dauphin County: 12,508 inactive voters
Franklin County: 5,282 inactive voters
Adams County: 3,943 inactive voters
Lebanon County: 3,501 inactive voters
While those numbers pale in comparison to the more than 6.6 million active voters in Pennsylvania, every vote matters; especially in a battleground state. The 644,835 inactive voters here could easily decide the election.;
Remember, in 2016, it was 44,000 votes that decided the winner.;
The USA Today Network is working to register every voter, make it easy for voters to check their registration and find their polling place. You can find all of that here.;
Don’t Miss: What Percent Of Republicans Approve Of Trump
We Dont Know How Many Mail Ballots Wont Count
Under state law, counties can only accept mail ballots that arrive by 8 p.m. on Election Day. But last fall, anticipating unprecedented voting by mail and U.S. Postal Service delays, the Pennsylvania Supreme Court ruled officials could count ballots that arrived up to three days after the election.
That grace period is gone, and ballots had to arrive at county election offices by 8 p.m. Tuesday to count. Its too soon to say how many ballots will come in after that deadline, but in last years general election about 10,000 ballots arrived during that three-day period.
Most Counties Finished Counting Mail Ballots Tuesday Night
The states universal mail voting law gave Pennsylvanians a new way to cast a ballot in 2020, but it also put increased pressure on county election offices. Local officials repeatedly pleaded with lawmakers to pass a bill giving them time before Election Day to begin processing, or pre-canvassing, these ballots.
But in the end, no such change was made, and it took some counties days to get through millions of ballots, giving former President Donald Trump a window to falsely claim the election was stolen from him.
County election departments once again couldnt start processing mail ballots until 7 a.m. Tuesday, but many were able to count most or all of their mail ballots by the time polls closed, thanks to low turnout.
Some counties, including Beaver and Monroe, chose not to begin counting mail ballots until Wednesday, with election officials saying they wanted their staff to focus on running the in-person election.
Mercer County Election Director Thad Hall said his staff will count the countys approximately 4,000 ballots Wednesday and conduct an audit by hand with the two major political parties on Friday.
Also Check: Are There More Democrats Or Republicans In Us
Poring Over Party Registration
This is not the best of times for the Democratic Party. No White House; no Senate; no House of Representatives; and a clear minority of governorships and state legislatures in their possession. Yet the Democrats approach this falls midterm elections with an advantage in one key aspect of the political process their strength in states where voters register by party.
Altogether, there are 31 states with party registration; in the others, such as Virginia, voters register without reference to party. Among the party registration states are some of the nations most populous: California, New York, Florida, North Carolina, Pennsylvania, New Jersey, Arizona, and Massachusetts.
The basic facts: In 19 states and the District, there are more registered Democrats than Republicans. In 12 states, there are more registered Republicans than Democrats. In aggregate, 40% of all voters in party registration states are Democrats, 29% are Republicans, and 28% are independents. Nationally, the Democratic advantage in the party registration states approaches 12 million.
Still, Republican Donald Trump found a route to victory in 2016 that went through the party registration states. He scored a near sweep of those where there were more Republicans than Democrats, winning 11 of the 12, while also taking six of the 19 states where there were more Democrats than Republicans a group that included the pivotal battleground states of Florida, North Carolina, and Pennsylvania.
At Least 60 Afghans And 13 Us Service Members Killed By Suicide Bombers And Gunmen Outside Kabul Airport: Us Officials
Two suicide bombers and gunmen attacked crowds of Afghans flocking to Kabuls airport Thursday, transforming a scene of desperation into one of horror in the waning days of an airlift for those fleeing the Taliban takeover. At least 60 Afghans and 13 U.S. troops were killed, Afghan and U.S. officials said.
You May Like: How Many Republicans Are In The United States
0 notes
Text
Ten things we learned from F1's 2021 British Grand Prix
Formula 1, the British Grand Prix and a sold out Silverstone – it had the feeling of familiarity after the unknown and empty grandstands since the COVID-19 pandemic took hold. But the 2021 British GP was anything but recognisable, starting on the Thursday with the first showing of a full-scale 2022 F1 car model and then a new weekend format which pivoted around the inaugural sprint qualifying race. It all resulted in a dramatic and controversial victory for Lewis Hamilton after his lap one collision with Max Verstappen which sent the F1 world championship leader into a 51G impact with the tyre barriers. Hamilton recovered from a 10-second time penalty for the incident to reel in shock leader Ferrari's Charles Leclerc and overtake him with just two laps to go – maximising his advantage with Verstappen out and cutting the deficit in the standings to eight points. While penalties and sportsmanship became the major post-race talking points, it created a race weekend jammed with action and memorable moments. Here are 10 things we learned from the 2021 British GP. 1. The first major clash of Hamilton vs Verstappen reveals true rivalry (By Alex Kalinauckas)
Lewis Hamilton congratulates Max Verstappen after the Red Bull driver's sprint race victory Photo by: Steve Etherington / Motorsport Images It's easy to see why the Lewis Hamilton/Max Verstappen collision at Copse, which put the Red Bull driver out in a scary, high-speed accident, is being described as 'inevitable' – because, really, it was. They have already clashed once in 2021 – at Imola. Then there was Verstappen's divebomb in Spain, plus the ultra-on-the-line close racing between them between Abbey and the approach to Copse in both Silverstone races. But the reason why the grand prix clash ended as it did is precisely because of the championship situation Hamilton faces, as well as the fierce nature of both driver's on-track attitude. Hamilton came into the British GP 33 points down on Verstappen. This isn't 2017-2021, when the Mercedes driver could afford to take a 'big picture' championship-points-tally-consideration view in 50-50 moves. He has more to lose now if something goes wrong, vital ground in a title battle where he has a slower package, so simply cannot afford to give an inch. And that's Verstappen's attitude overall – just look at his reaction to Hamilton getting alongside at Abbey and Brooklands on Sunday. In the crash, Hamilton deserved a penalty for causing the incident, but it was still a fine call. Don't expect this to be the last flashpoint of the 2021 title fight. 2. F1's penalty system needs to be explained better (By Jonathan Noble)
Lewis Hamilton had to sit stationary in his pitbox for 10s before his mechanics could service him Photo by: Steven Tee / Motorsport Images Red Bull's calls for Lewis Hamilton to be given a race ban for his part in the opening-lap crash with Max Verstappen were always going to fall on deaf ears. But you could fully understand its frustration that the 10-second penalty given to Lewis Hamilton for the clash ultimately cost the world champion nothing. Although it meant he had to fight a bit harder for the victory, he was still able to come home with the full 25 points. While that may seem unfair for Verstappen, who saw his title advantage slashed massively, F1 is quite right not to dish out penalties based on the consequences of offences. For doing it that way could open an even worse scenario where drivers get heavy sanctions for relatively minor rule breaches, but the book thrown at them when a tiny issue has big consequences. What perhaps is most lacking in F1 is actually a definition of driving rules and etiquette – so fans are better able to judge incidents based on the same criteria the stewards use. That would be hugely helpful in preventing the kind of polarised opinions that have engulfed social media in the last 24 hours. 3. A spirited sprint success, but the overall verdict remains to be decided (By James Newbold)
Max Verstappen, Red Bull Racing RB16B, Lewis Hamilton, Mercedes W12, Valtteri Bottas, Mercedes W12, Charles Leclerc, Ferrari SF21, and the rest of the field at the start Photo by: Steven Tee / Motorsport Images Until the ill-fated clash of the titans at Copse, the weekend's biggest talking point had been F1's inaugural sprint race (let's call it what it was, shall we?) which generated mixed reviews. From "weird" according to Sebastian Vettel) to "I loved it" from Charles Leclerc, just about everybody had their opinion. Many welcomed the added excitement it brought to Fridays and the engineering challenge of getting the set-up nailed in FP1, while others questioned the relevance of FP2 when the cars were in parc ferme conditions which meant evaluating tyres was the only feasible action. The 17-lap distance allowed for variation in tyre strategies which was seized upon by Fernando Alonso, whose star turn on the soft tyres undoubtedly enlivened the proceedings as the race for the top four proved pretty static after the opening lap. F1 now faces a decision over whether to continue its experiment beyond the two further (as yet unconfirmed) sprint events planned for this season and, if so, whether to make further tweaks. Series bosses are encouraged by initial feedback, and have an unspecified "job list" to work through, but can at least be pleased that the format shake-up achieved what it set out to in building anticipation throughout the weekend. 4. Two-day race weekends look realistic option to ease pressure on growing F1 calendar (JNob)
Lewis Hamilton, Mercedes, waves to fans after securing pole Photo by: Andy Hone / Motorsport Images F1's first sprint race trial at the British Grand Prix can be viewed as an overall success. The boost in audience figures on Friday, plus increased interest for the Saturday 17-lap dash that provided a few spills and thrills, were exactly what F1 chiefs wanted. Sure there are some things that need improving – like the issue of Saturday's final free-practice being pretty much of no interest to fans on TV – but this is just a case of tidying up rather than starting from a clean sheet of paper. And, of course, the sooner the FIA goes back to awarding pole position in the history books to the fastest driver in Friday qualifying, rather than the winner of the sprint, the better things will be. But the success of the compressed format has also reopened the debate on whether F1 actually needs to stick at three-day weekends. Hamilton suggested a two-day schedule in the future would be the right way to go. It's something that F1 has baulked at in the past, and circuits would certainly not be happy at losing an extra day's ticket sales. But could it be something that proves preferable for some venues in exchange for holding one of F1's Grand Slam sprint weekends? 5. F1 at its best with packed crowds as Silverstone roars again (AK)
Fans cheer from the grandstands Photo by: JEP / Motorsport Images Questions over the merits of letting a capacity crowd – that totalled 365,000 at Silverstone over the entire British GP weekend – gather during an ongoing pandemic should directed to the UK government, with the track itself understandably just trying to stay afloat in these awful times. But the fans in attendance were treated to an exceptional sporting event. Friday night qualifying produced two exceptional displays from British drivers in front their home fans, with the reaction to George Russell's Q3 lap the highlight for this writer given how the Williams racer was cheered from corner-to-corner. Then the sprint race delivered nicely in terms of an interesting race, even if it wasn't the all-out thriller some claimed. But it did set up a grand prix that fizzled spectacularly throughout – capped by the title rivals colliding and Leclerc nearly holding on for a famous against-the-odds victory. But there's an interesting footnote to Hamilton's victory. Motorsport.com was told there were plenty of new, younger fans seen at Silverstone – with an apparent increase in female spectators too. It will be interesting to see if this can be backed up in official data, but even anecdotally it suggests the 'Netflix effect', as well as Hamilton's laudable efforts to help diversify motorsport are having an impact. And what a race they were treated to, hopefully cementing lifelong motorsport fan status. 6. Leclerc demonstrates Ferrari's resurgence (By Jake Boxall-Legge)
Charles Leclerc, Ferrari SF21, Lewis Hamilton, Mercedes W12 Photo by: Mark Sutton / Motorsport Images Leclerc was unbelievably close to a surprise victory at the British GP, but there wasn't quite enough in the tank to repel Hamilton's late assault for the lead. But Leclerc had been stellar, and his opportunistic move to clear Hamilton moments after the Verstappen incident rewarded him with the upper hand for the restart. His getaway from the pole spot and subsequent managing of the gap to Hamilton were incredibly well-judged and, despite facing engine cut-out issues while in the lead, Leclerc was able to weather the storm and find enough in reserve to keep Hamilton at bay. The seven-time champion's recovery post-penalty, however, was too much for Leclerc to resist and his slight wide moment at Copse was the only blot on the Monegasque's copybook. Meanwhile, Carlos Sainz Jr's recovery in the sprint and continued progress in the race also showed the pace of the Ferrari in the pack, although his ascent was halted by a slow pitstop. That dropped him behind Daniel Ricciardo, whose McLaren proved to be a tough cookie to overtake. Nonetheless, Ferrari has showed greatly improved form after a disastrous Paul Ricard race, and the upcoming Hungarian GP could be a race in which the Scuderia truly shines. 7. Perez suffers like those before him in Red Bull's second seat (By Haydn Cobb)
Sergio Perez, Red Bull Racing, and Max Verstappen, Red Bull Racing, on the grid, ahead of the 2022 Formula 1 car unveiling Photo by: Charles Coates / Motorsport Images Sergio Perez appeared to have the Red Bull support role nailed after picking up the pieces to win in Baku and then claim a deserved podium at the next race at Paul Ricard. But after being in the wars in Austria against McLaren's Lando Norris and Leclerc, Perez's performance in the British GP had shades of the struggles Pierre Gasly and Alex Albon endured before the Mexican came to Red Bull's rescue. It must be said it is down to fine margins, but qualifying behind Leclerc on Friday night set the wheels in motion for Perez's downward spiral. Trapped in the midfield battle at the start of the feisty sprint race, he was caught out by dirty air and spun off, to be condemned to the back of the grid for the main event. Despite Red Bull F1 car tweaks made in a bid to aid his retaliation in the grand prix, but also meaning a pitlane start, Perez was making progress until he got stuck in DRS trains and then got impatient and collided with Kimi Raikkonen. A P10 finish was as good as it was going to get until Red Bull sacrificed that solitary point to pit Perez for softs to take the fastest lap point away from Hamilton – even though finishing outside of the top 10 meant he wouldn't earn the point himself. Perez has slipped back to fifth place in the standings and is set to play 'who can be the best support driver' against Valtteri Bottas for the rest of the year. 8. Old dog Alonso makes the most of new tricks (HC) Fernando Alonso, Alpine A521, Lando Norris, McLaren MCL35M, and Sergio Perez, Red Bull Racing RB16B Photo by: Charles Coates / Motorsport Images Alonso demonstrated he's lost none of his racecraft with his stunning start to the sprint. The Alpine driver's charge from 11th to fifth was aided by his soft tyre gamble, but the TV onboard footage was reminiscent of the old Alonso - carving through the pack and finding gaps few others can. As his softs faded and left him seventh for the start of the main event, the double world champion held his nerve against an early attack from Vettel, before his old rival spun off on his inside at Woodcote, and went on to take seventh to extend his points-scoring run to a fifth race. The British GP marks Alonso's last race before his turns 40 and after a steady start to his F1 comeback, slowed by his pre-season training accident and adapting to his Alpine surroundings, he feels fresher and ready – a warning that the old dog has learned new tricks. "After the accident at the beginning of the year, in the first couple of races, there was still a part of the stress of coming back to the sport. I was concerned about the jaw, about the shoulder as well that I had the small injury with," Alonso said after the British GP. "But now, I'm super fit and I am 200%. "Next week is another number. So we'll eat some cake. But apart from that, it's going to be a very normal weekend. I feel 25. So whatever number it says in the passport it's not what I feel." 9. Williams progress clear but Russell is making the difference (JNew)
George Russell, Williams, waves to fans from Parc Ferme after Qualifying Photo by: Andy Hone / Motorsport Images Hamilton's qualifying triumph on Friday stole the headlines, but one of the biggest cheers from the crowd was reserved for Russell's lap of honour in his one and only Q3 run. The Williams driver made the final segment of qualifying for the third race in a row with the eighth quickest time, raising questions over whether the FW43B should be considered a Q3 car henceforth. The team's head of vehicle performance Dave Robson reckoned it was "a little too early to say whether that's going to be something that's a regular occurrence", admitting he expected Williams would find it harder than in Austria but the "very calm conditions" on Friday evening played to the car's strengths. Despite the Hungaroring requiring a totally different set-up, Robson predicts "there's a good chance we'll be there or there abouts". But even if it's not, Russell can be counted on to make the difference. While his weekend went downhill after qualifying - a first-lap tangle in the sprint with Sainz resulted in a "harsh" three-place grid penalty for the grand prix that he couldn't recover from against cars that remain quicker in race-trim - Russell is in the form of his life right now. "I think there's an element for him of getting on that upward spiral," explained Robson. The question now is, how high can it go? 10. What the 2022 F1 show car hints at (JBL)
The 2022 Formula 1 car launch event on the Silverstone grid Photo by: Charles Coates / Motorsport Images Although F1's vision for 2022 has been long defined after the unveiling of the all-new regulations (initially planned for 2021) back in 2019, the championship's promoters unveiled a full-size model of its interpretation of next year's chargers. Of course, it came with all the bells and whistles expected for next year: the low-slung nose directly attached to the front wing, the simplified bodywork and focus on ground-effect aerodynamics all featured on the car wrapped in a distinctive holographic livery. That being said, there were a few small differences between the physical model and the render, particularly around the front end; the nose tip sat in the middle of the leading front wing element, rather than protruding beyond them, hinting at the variation the teams can employ. Although F1 elected to pick a representation of next year's rules largely based on aesthetics, it can only be expected that the teams will take a more pragmatic view of the rules and might not necessarily stick to the spirit of them. There's a greater focus on prescribed designs and single-spec components to cut costs and develop the aero effect that F1 has studied and earmarked as the way forward for closer on-track racing, but those effects will surely be a little diluted when it comes to the actual range of cars next year. Regardless, it's an exciting new direction for F1; although some have questioned the necessity of the new rules as 2021 continues to intrigue us all, the British GP still showed the difficulties of racing within the current level of dirty air. The new rules should reduce that problem, should everything go to plan. By Alex Kalinauckas, Jonathan Noble, James Newbold, Jake Boxall-Legge and Haydn Cobb Read the full article
1 note
·
View note