Tuesday, June 26, 2018

Prescription for Disaster: More Cuts to Healthcare Under Trump

Good morning!

The MRI people called back THREE TIMES to add insult to injury now telling me that the $395 dollars doesn't include the fee for the radiologist to read the report.

Insurance is no longer paying for my psych meds and won't even allow my pharmacist to substitute something the makes sense. After prescribing Valium for years by my incompetent shrink who spends four minutes with me once a month after I wait 4-6 hours in the waiting room so full people are sitting on the floor, I'm feeling a little agitated to say the least.

Grandma was with me when Manzano wanted to give me a script for Valium to add to Zanaflex for the myoclonic seizures and muscle spasms which are terribly painful. I told him not to write a script for Valium since my psychiatrist prescribes it to me so he didn't.

Now my shrink decided not to give it to me (from what I heard he got busted by the DEA for being an incompetent pill mill and drug pusher) and I have to suffer. Which I am.

However, I am going to call Manzano's office right now because the muscle spasms are quite bad. Of course it makes more sense to get it from my psychiatrist since I will (unfortunately) be in his care longer than a neurosurgeon but I'm not even sure if my shrink speaks English because he's never even asked me how I'm doing and it takes months to get an appointment or even to get someone on the phone.

This article I wrote that was widely published back in 2005 seems more relevant than ever.

And I just read that more cuts to Medicaid and Medicare are coming soon thanks to Trump and the complicit GOP.

Since Grandma doesn't think it "counts" as a "real" publication unless she sees it in the newspaper, I probably still have the hard copy somewhere but hopefully she can still read it if she clicks on the link below.

And here's another for good measure. The Editor has requested permission to publish some of the writing I did when I was in the hospital and I was thrilled until Grandma told me not to let them publish anything unless they pay me.

Well, Yahoo agreed to pay me for 73 articles I wrote and I never received a single penny.

I wish I knew a good lawyer who could settle this family debate!!

My writing could save millions from having to suffer needlessly from Healthcare cuts so Trumpski can have his stupid Wall and Space Force to go with his ICE, his personal Gestapo.

That to me is worth more than a few dollars here and there in royalties.

I had a really bad week but I'm feeling better today and will be out protesting at Mar-a-Lago again this weekend.

I can't "March" just yet, but my friend has a wheelchair I can borrow because as someone directly affected by Trump's agenda and deep cuts to everything I value, healthcare, housing, education, I feel that my voice matters and I'm not going to let a disability keep me from voicing my opinion and opposition to his policies.

I refuse to remain silent during this dark period in American history.

Sunday, June 24, 2018

Dailyddose 6/24/2018



Elyssa D. Durant 
Research & Policy Analyst
Columbia University, New York


Begin forwarded message:

From: PTB <powersthatbeat@gmail.com>
Date: June 24, 2018 at 7:47:56 PM EDT
To: ElyssaD@icloud.com
Cc: DailyDDoSe <dailyddose@icloud.com>, ed Student <ed70@tc.columbia.edu>, Ed <elyssad@outlook.com>
Subject: Dailyddose












This is the second notice I received like this. I'm well aaEe there is a problem and have contacted you on several occasions. 

Please escalate to the Security Dept. 

Thank you, 

Elyssa Durant 
Amazon Account: ed70@columbia.edu

There are multiple accounts associated with my account as reflected as a Content producer with Amazon:


They were originally associated with kindle that died completely and two others programmed incorrectly. I cannot deregister the device because I don't have access to it. 

I will get out my Kindle and contact Amazon Kindle Support as soon as it takes a charge. 

Thanks so much, 

Elyssa Durant




Elyssa D. Durant 
Research & Policy Analyst
Columbia University, New York




Elyssa D. Durant
Research & Policy Analyst
Columbia University, New York

Comcast Routers Hacked by North Korea as per the FBI and US Cert

12:24:59 AM Madhu : They will help you with the internet issue .
12:25:28 AM Madhu : Please be assured about it and I am connecting your chat
with them.
12:25:30 AM Chilly Penguin : Who will help me with the billing
12:26:05 AM Chilly Penguin : billing department and the inconveniences 12:26:27 AM System : You have been transferred to queue Internet
12:26:37 AM System : You are now chatting with Gurpreet
12:26:39 AM Chilly Penguin : This is NOT a drill.
12:26:45 AM Gurpreet : Thank you for contacting Xfinity Chat Support, my name
is Gurpreet. May I have your complete name?
12:26:47 AM Chilly Penguin : Hi Gurpegi
12:27:10 AM Gurpreet : Pleas allow me a minute to read you chat history.
12:27:16 AM Gurpreet : Please do not minimize or toggle between the windows as we might lose the chat connection.
12:27:20 AM Chilly Penguin : My name is Elyssa Durant and my service does bro work.
12:28:54 AM Chilly Penguin : You don't get it. There is a remote and user closing the apps and I'm paying by the hour to re t
12:29:08 AM Chilly Penguin : use htotspot
12:30:17 AM Gurpreet : Please allow me a minute to check the above chat history.
12:30:20 AM Chilly Penguin : What department are you and I need to speak wirh supervisor in tier 2 tech support and fraud
12:30:59 AM Gurpreet : Let me connect you with my supervisor .
12:31:09 AM Chilly Penguin : I don't have a minute. I spent SIX hours on the
phone with tech supervisor who didn't even know what VOIP is
12:31:42 AM Chilly Penguin : give me a reference number.
12:31:43 AM Gurpreet : I apologize for the inconvenience.let me connect you right now .
data:text/html;base64,CiAgICAgIDxtZXRhIG5hbWU9InZpZXdwb...pIENoaWxseSwgdGhhbmsgeW91IGZvciBjb250YWN0aW5nIFhmaW


6/24/18, 2R51 AM Page 5 of 6


He did not comp the hotspot fee

Friday, June 22, 2018

Updates | CSRC

Updates | CSRC





  

News & Updates

Search Title, Description

Advanced Search

Showing 1 through 100 of 533 matching records.

1 | 2 | 3 | 4 | 5 | 6  >  >>

NIST Publishes SP 800-171A
June 13, 2018
NIST is publishing Special Publication (SP) 800-171A, Assessing Security Requirements for Controlled Unclassified Information (CUI). It is intended to help organizations develop assessment plans and conduct efficient,...
NIST Publishes SP 800-125A Rev 1
June 7, 2018
Server Virtualization is now a key component for enterprise IT infrastructure in data centers and cloud services. Virtual servers provide.....
NIST Releases Draft NISTIR 8204
May 17, 2018
NIST is seeking public comments on Draft NISTIR 8204, Cybersecurity Framework Online Informative References (OLIR) Submissions: Specification for Completing the OLIR Template. The public comment period is open until...
NIST Published SP 800-202
May 10, 2018
Data recovered from digital devices is often helpful in providing clues for incidents and potential criminal.....
NIST Releases Draft SP 800-37 Rev 2
May 9, 2018
The initial public draft of SP 800-37 Revision 2, Risk Management Framework for Information Systems and Organizations, is available for public comment until June 22, 2018.
NIST Releases SP 800-193
May 4, 2018
NIST announces the release ofSpecial Publication 800-193, Platform Firmware Resiliency Guidelines, a document that provides technical guidelines and recommendations supporting resiliency of the collection of hardware and...
NIST Publishes NISTIR 7511 Rev. 5
April 23, 2018
NIST has published NIST Internal Report (NISTIR) 7511 Revision 5, Security Content Automation Protocol (SCAP) Version 1.3 Validation Program Test Requirements.
NIST Releases SP 800-87 Rev 2
April 19, 2018
NIST has updated the federal agency organizational codes specified in Special Publication (SP) 800-87, Codes for the Identification of Federal and Federally-Assisted Organizations. The changes included in this update...
NIST Releases Draft SP 800-125A Rev 1
April 12, 2018
Ensuring the Security of Virtualized Server Platforms Against Potential Threats: NIST Releases Draft Special Publication 800-125A Revision 1, Security Recommendations for Server-based Hypervisor Platforms
NISTIR 8179 Criticality Analysis Process Model
April 11, 2018
NIST is releasing NIST Internal Report (NISTIR) 8179, Criticality Analysis Process Model: Prioritizing Systems and Components, to help organizations identify those systems and components that are most vital and which may...
Open Meeting of the ISPAB - March 2018
February 28, 2018
The Information Security and Privacy Advisory Board (ISPAB) will meet Thursday, March 15, 2018 from 9:00 a.m. until 5:00 p.m., Eastern Time, and Friday, March 16, 2018 from 9:00 a.m. until 4:30 p.m. Eastern Time. All...
NIST Announces the Release of SP 800-90B
January 10, 2018
NIST announces the release of Special Publication 800-90B, Recommendation for the Entropy Sources Used for Random Bit Generation.  This document....
Update to NIST SP 800-160
January 3, 2018
As part of its ongoing cybersecurity efforts, NIST has issued the first update to its flagship systems security engineering...
Errata Update for SP 800-171 Rev. 1
November 28, 2017
NIST announces the release of an errata update for Special Publication 800-171, Revision 1, Protecting Controlled Unclassified Information is Nonfederal Systems and Organizations. The errata.....
Draft SP 800-171A for public comment
November 28, 2017
NIST announces the release of Draft Special Publication 800-171A, Assessing Security Requirements for Controlled Unclassified Information. This publication is.....
NIST Releases SP 800-67 Rev. 2
November 21, 2017
NIST announces the release of Special Publication (SP) 800-67, Revision 2, Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. This publication specifies.....
NIST Releases Draft SP 800-52 Rev. 2 for public comment
November 15, 2017
NIST announces the public comment release of Draft Special Publication 800-52 Revision 2, Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. Transport Layer Security...
NIST Releases Draft NISTIR 8193
November 8, 2017
The national need for a common lexicon to describe & organize the cybersecurity workforce and requisite knowledge, skills, and abilities (KSAs) led to the.....
NIST Releases NISTIR 8176
October 12, 2017
NIST announces the release of NIST Interagency Report (NISTIR) 8176, Security Assurance Requirements for Linux Application Container Deployments
NIST NCCoE Releases Draft SP 1800-12
October 2, 2017
NIST's National Cybersecurity Center of Excellence (NCCoE) Releases Draft SP 1800-12, Derived Personal Identity Verification (PIV) Credentials
NIST Releases SP 800-37 Rev 2 Discussion Draft
September 28, 2017
NIST Announces the Release of a Discussion Draft of Special Publication (SP) 800-37, Revision 2, Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy
NIST Releases NISTIR 8192
September 19, 2017
NISTIR 8192, "Enhancing Resilience of the Internet and Communications Ecosystem," is now available
NIST Releases Draft SP 800-177 Rev. 1
September 15, 2017
NIST Releases the Draft Special Publication 800-177 Revision 1, Trustworthy Email for public comment.  This updated Special Publication has a new....
NIST Releases Second Draft SP 800-125A
September 14, 2017
NIST Releases the Second Draft of Special Publication 800-125A, Security Recommendations for Hypervisor Deployment, for public comment.
NIST Release First Draft SP 800-53 Rev. 5
August 15, 2017
NIST Releases the Initial Public Draft of Special Publication 800-53, Revision 5, Security and Privacy Controls for Information Systems and Organizations.
NIST Releases Draft SP 800-56C Rev. 1
August 7, 2017
NIST Announces the release of Draft Special Publication 800-56C Revision 1, Recommendation for Key Derivation through Extraction-then-Expansion for public comment.
NIST Releases Draft SP 800-56A Rev. 3
August 7, 2017
NIST Releases Draft Special Publication 800-56A Revision 3, Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography, for public comment.
NCCoE Secure Inter-Domain Routing Building Block
August 2, 2017
NIST invites organizations to provide products and technical expertise to support and demonstrate security platforms for the Secure Inter-Domain Routing Building Block. Participation in the building block is open...
NIST releases Draft SP 800-70 Rev. 4
August 1, 2017
NIST requests public comments on the release of Draft Special Publication (SP) 800-70 Revision 4, National Checklist Program for IT Products: Guidelines for Checklist Users and Developers. 
NIST releases Draft NISTIR 8176
August 1, 2017
Application Containers are slowly finding adoption in enterprise IT infrastructures. To address security concerns associated with deployment of application container platforms, NIST Special Publication 800-190 (2nd Draft),...
NIST Releases SP 800-192
June 28, 2017
NIST Releases Special Publication 800-192, Verification and Test Methods for Access Control Policies/Models
NIST Releases NISTIR 8011
June 15, 2017
NIST is pleased to announce the final publication of NIST Interagency Report (NISTIR) 8011, Automation Support for Security Control Assessments, Volumes 1 and 2.
NIST Releases Draft SP 800-193 for Public Comment
May 30, 2017
NIST announces the public comment release of Draft Special Publication 800-193,  Platform Firmware Resiliency Guidelines. The platform is a collection of fundamental hardware and firmware components needed to boot and...
DHS Study on Mobile Device Security
May 8, 2017
The Department of Homeland Security (DHS) has published the "Study on Mobile Device Security," a report to Congress that details current and emerging threats to the Federal Government's use of mobile devices. It also...
Status of NIST SP 800-53, Revision 5
March 31, 2017
What is the current status of release of Draft Special Publication 800-53 Revision 5?  This news item will explain the current status of this document.
Release of NISTIR 8114
March 30, 2017
NISTIR 8114, Report on Lightweight Cryptography has been approved as final and is now available.
Research Results on SHA-1 Collisions
February 24, 2017
On Thursday, February 23rd, Google announced  that a team of researchers from the CWI Institute in Amsterdam and Google have successfully demonstrated an attack on the SHA-1 hash algorithm by creating two files that...
NIST Launches CSRC Beta Site
February 22, 2017
NIST has launched a beta site for a new version of CSRC.nist.govhttps://beta.csrc.nist.gov.  It will be available alongside http://csrc.nist.gov for several months as we continue to fix issues, implement...
NIST announces the release of SP 800-179
December 12, 2016
Special Publication 800-179 aims to assist IT professionals in securing Apple OS X 10.10 desktop and laptop systems within various environments. It provides detailed information about the security features of OS X 10...
NIST Released Draft Special Publication (SP) 800-187
November 21, 2016
NIST invites comments on Draft NIST SP 800-187, Guide to LTE Security. Cellular technology plays an increasingly large role in society as it has become the primary portal to the Internet for a large segment of...
NIST Announce the Release of NISTIR 7621 Revision 1
November 14, 2016
NIST released NISTIR 7621 Revision 1, Small Business Information Security: The Fundamentals. NIST developed this interagency report as a reference guideline about cybersecurity for small businesses...
Draft Special Publication 800-181
November 2, 2016
NIST is pleased to release the draft NICE Cybersecurity Workforce Framework (NCWF) - a reference resource that will allow our nation to more effectively identify, recruit, develop and maintain its cybersecurity talent...
DRAFT SP 800-121 Revision 2, Guide to Bluetooth Security
October 17, 2016
NIST announces the release of Draft Special Publication 800-121 Revision 2 Guide to Bluetooth Security. This draft is the second revision to NIST SP 800-121, Guide to Bluetooth Security. Updates in this revision...
NIST Announce the Release of DRAFT NISTIR 8151
October 4, 2016
NIST invites comments on Draft NIST Interagency Report (NISTIR) 8151, Dramatically Reducing Software Vulnerabilities -- Report to the White House Office of Science and Technology Policy.
NIST Released Draft NISTIR 8138, VDO
September 30, 2016
DRAFT NISTIR 8138, Vulnerability Description Ontology (VDO): a Framework for Characterizing Vulnerabilities; aims to describe a more effective and efficient methodology for characterizing vulnerabilities found in ...












Elyssa D. Durant 
Research & Policy Analyst
Columbia University, New York

Related Resources | US-CERT

Related Resources | US-CERT








Related Resources | US-CERT

US-CERT does not endorse specific organizations. The following links are included for your information and convenience.

Security Organizations

Vulnerability Information

Tools, Techniques, Research, and Guidelines

Education

Security at Home

  • OnGuard Online
    Practical tips from the Federal Government and technology industry to help consumers guard against Internet fraud, secure their computers, and protect personal information
  • Stay Safe Online
    Resources sponsored by the National Cyber Security Alliance (NCSA) to promote safe behavior online
  • The NetSmartz Workshop
    Educational materials for children and teens
  • Stop. Think. Connect. || Get Involved and Informed | Tips and Advice
    A national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online

Information Sharing and Analysis Centers (ISACs)

Information Sharing and Analysis Centers (ISACs) were established to allow sectors to share information and work together in an effort to protect our critical infrastructures.

Policy and Government














Elyssa D. Durant 
Research & Policy Analyst
Columbia University, New York

FBI demands new powers to hack into computers and carry out surveillance | US news | The Guardian

FBI demands new powers to hack into computers and carry out surveillance | US news | The Guardian



FBI demands new powers to hack into computers and carry out surveillance

Agency requests rule change but civil liberties groups say 'extremely invasive' technique amounts to unconstitutional power grab

Agency requests rule change but civil liberties groups say 'extremely invasive' technique amounts to unconstitutional power grab

The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement in order to seize significant new powers to hack into and carry out surveillance of computers throughout the US and around the world.

Civil liberties groups warn that the proposed rule change amounts to a power grab by the agency that would ride roughshod over strict limits to searches and seizures laid out under the fourth amendment of the US constitution, as well as violate first amendment privacy rights. They have protested that the FBI is seeking to transform its cyber capabilities with minimal public debate and with no congressional oversight.

The regulatory body to which the Department of Justice has applied to make the rule change, the advisory committee on criminal rules, will meet for the first time on November 5 to discuss the issue. The panel will be addressed by a slew of technology experts and privacy advocates concerned about the possible ramifications were the proposals allowed to go into effect next year.

"This is a giant step forward for the FBI's operational capabilities, without any consideration of the policy implications. To be seeking these powers at a time of heightened international concern about US surveillance is an especially brazen and potentially dangerous move," said Ahmed Ghappour, an expert in computer law at University of California, Hastings college of the law, who will be addressing next week's hearing.

The proposed operating changes related to rule 41 of the federal rules of criminal procedure, the terms under which the FBI is allowed to conduct searches under court-approved warrants. Under existing wording, warrants have to be highly focused on specific locations where suspected criminal activity is occurring and approved by judges located in that same district.

But under the proposed amendment, a judge can issue a warrant that would allow the FBI to hack into any computer, no matter where it is located. The change is designed specifically to help federal investigators carry out surveillance on computers that have been "anonymized" – that is, their location has been hidden using tools such as Tor.

The amendment inserts a clause that would allow a judge to issue warrants to gain "remote access" to computers "located within or outside that district" (emphasis added) in cases in which the "district where the media or information is located has been concealed through technological means". The expanded powers to stray across district boundaries would apply to any criminal investigation, not just to terrorist cases as at present.

Were the amendment to be granted by the regulatory committee, the FBI would have the green light to unleash its capabilities – known as "network investigative techniques" – on computers across America and beyond. The techniques involve clandestinely installing malicious software, or malware, onto a computer that in turn allows federal agents effectively to control the machine, downloading all its digital contents, switching its camera or microphone on or off, and even taking over other computers in its network.

"This is an extremely invasive technique," said Chris Soghoian, principal technologist of the American Civil Liberties Union, who will also be addressing the hearing. "We are talking here about giving the FBI the green light to hack into any computer in the country or around the world."

A glimpse into the kinds of operations that could multiply under the new powers was gained this week when Soghoian discovered from documents obtained by the Electronic Frontier Foundation that in 2007 the FBI had faked an Associated Press story as a ruse to insert malware into the computer of a US-based bomb plot suspect. The revelation prompted angry responses from the AP and from the Seattle Times, whose name was also invoked in the documents, though the FBI said it had not in the end imitated the newspaper.

Civil liberties and privacy groups are particularly alarmed that the FBI is seeking such a huge step up in its capabilities through such an apparently backdoor route. Soghoian said of next week's meeting: "This should not be the first public forum for discussion of an issue of this magnitude."

Jennifer Granick, director of civil liberties at the Stanford center for internet and society, said that "this is an investigative technique that we haven't seen before and we haven't thrashed out the implications. It absolutely should not be done through a rule change – it has to be fully debated publicly, and Congress must be involved."

Ghappour has also highlighted the potential fall-out internationally were the amendment to be approved. Under current rules, there are no fourth amendment restrictions to US government surveillance activities in other countries as the US constitution only applies to domestic territory.

However, the US government does accept that it should only carry out clandestine searches abroad where the fourth amendment's "basic requirement of reasonableness" applies. In a letter setting out its case for the rule 41 reform, the department of justice states that new warrants issued to authorise FBI hacking into computers whose location was unknown would "support the reasonableness of the search".

Ghappour fears that such a statement amounts to "possibly the broadest expansion of extraterritorial surveillance power since the FBI's inception". He told the Guardian that "for the first time the courts will be asked to issue warrants allowing searches outside the country".

He warned that the diplomatic consequences could be serious, with short-term FBI investigations undermining the long-term international relationship building of the US state department. "In the age of cyber attacks, this sort of thing can scale up pretty quickly."

Another insight into the expansive thrust of US government thinking in terms of its cyber ambitions was gleaned recently in the prosecution of Ross Ulbricht, the alleged founder of the billion-dollar drug site the Silk Road. Experts suspect that the FBI hacked into the Silk Road server, that was located in Reykjavik, Iceland, though the agency denies that.

In recent legal argument, US prosecutors claimed that even if they had hacked into the server without a warrant, it would have been justified as "a search of foreign property known to contain criminal evidence, for which a warrant was not necessary".



Elyssa Durant

Netanyahu warns of cyber risks that can down fighter jets - Israel News - Haaretz.com

Netanyahu warns of cyber risks that can down fighter jets - Israel News - Haaretz.com

WATCH Netanyahu Warns of Cyber Risks That Can Down Fighter Jets

'This is a supreme test for our civilization. It's going to be tested not only by criminal organisations, by terrorists, but by other states. We have to combine forces,' said Netanyahu

Israeli Prime Minister Benjamin Netanyahu gestures as he speaks during the Cyber Week conference at Tel Aviv University, Israel June 20, 2018
Israeli Prime Minister Benjamin Netanyahu gestures as he speaks during the Cyber Week conference at Tel Aviv University, Israel June 20, 2018 REUTERS/Ammar Awad

Israeli Prime Minister Benjamin Netanyahu called on governments worldwide on Wednesday to join forces to defend against cyber threats that he said could even bring down military and civilian aircraft.

Cybersecurity also represents an enormous business opportunity, Netanyahu told a cyber conference at Tel Aviv University, adding that Israel receives about 20 percent of global investment in the sector.

"We cannot go back to the world of levers, pulleys and couriers. Since we are going forward, we are absolutely vulnerable. Our airlines can be brought down, our fighter planes can be brought down," he said.

Netanyahu spoke days after Israel was stunned to learned that former Energy Minister Gonen Segev was allegedly spying for Iran. 

PM Netanyahu Addresses CyberWeek 2018 Cybersecurity Conference

In today's cyber era, Segev's connections with and information about people in the Israeli defense, energy and foreign-policy arenas are worth a great deal more and have a much higher potential to harm Israeli national security, the experts say. Via malware, such information can be exploited in the Iranians' huge databases for cyberattacks against defense companies and other strategic sites in Israel.

While Israel monitors attacks at its cybersecurity centre in the southern city of Beersheba, Netanyahu said there was "no silver bullet".

"This is a supreme test for our civilization. It's going to be tested not only by criminal organisations, by terrorists, but by other states. We have to combine forces," said Netanyahu.

As he spoke, lights flashed and another voice boomed out in the room in a simulation of a hacking attack, saying that the hackers were "based in a country not far from Israel" - an apparent reference to the country's arch-foe Iran.

The voice told attendees their bank accounts had been frozen and their information was being shared with their enemies.

Israeli cyber exports last year amounted to $3.8 billion, Netanyahu said, adding: "We are punching about 200 times above our weight here."

The Beersheba centre brings together military, academia and businesses, which is a risk with regard to Israel's military applications.

"But I'm willing to take on that risk because I think cybersecurity growth through cooperation and cybersecurity as a business is tremendous," he said.



Elyssa Durant