Archive for April, 2017

New play flips tragedy of Trayvon Martin on its head – Buffalo News

In his new play "The Trial of Trayvon Martin," set to open April 6 in the Manny Fried Playhouse, Buffalo playwright Gary Earl Ross poses a simple question with a damning answer:

What would have happened on Feb. 26, 2012 if the roles of Trayvon Martinand George Zimmerman, whose deadly confrontation that evening helped to fuel a new movement for racial justice in America,had been switched?

"Would Martin have been released because there was nothing to contradict his story?" Ross asked. "Or would he have been held until they found something to contradict his story?"

Given what we know about the skewed application ofjustice inFloridaand the rising tide of racist rhetoric across the United States, the likely answer is not hard to guess.

And that's why Ross set out to write this play, the third in the Subversive Theatre Collective's "Black Power Play Series." The larger question he poses to audiences iswhy they should tacitly accept a system that treats criminal suspects, defendants and victims differently based on the color of their skin.

Ross, known for his mystery novels, thrillers and courtroom dramas, based the play on a story he wrote shortly after a jury acquitted Zimmermanfor his role in Martin's death. It was averdict that surprised even many observers of Florida'sfamously flawed criminal justice system. That includes Ross, whose son is a Florida police officer.

"I thought, there's no way he can get an acquittal on this, because from everything I've read, George Zimmerman instigated this whole thing by following the child," Ross said. "I went through 911 transcripts, I went through trial transcripts and articles about the trial. It seems to me that it probably shouldn't have been second-degree murder, it should have been manslaughter."

But would even that have resulted in a conviction?There's no way to know. So Ross applied his knowledge of the justice system and its history of shortchanging black men, to this hypothetical situation.

The result, hesuggested, is as much an indictment of thecriminal justice system as it is ofthe insidiousness of American racism.

"They charge more children as adults, they don't keep track of who owns firearms, and it just struck me that we have a convergence of gun culture, racism and the unequal criminal justice system," Ross said. "There's a level of subconscious racism that exists in America, and part of what I hope I'm doing in this play is pointing it out."

THEATER PREVIEW

What: "The Trial of Trayvon Martin" Where: Manny Fried Playhouse, 255 Great Arrow Ave. When: April 6 to May 6 Tickets: $25 to $30 Info: 408-0499 or subversivetheatre.org

Read this article:
New play flips tragedy of Trayvon Martin on its head - Buffalo News

Florida legislature poised to bolster ‘Stand Your Ground’ law – Reuters

Florida lawmakers advanced a measure on Wednesday that could make it easier to avoid prosecution in deadly shootings and other use-of-force cases by seeking immunity on self-defense grounds under the state's pioneering "stand your ground" law.

In a 74-39 vote, the state's House of Representatives passed legislation that shifts the burden of proof from defendants to prosecutors when the law is invoked to avoid trial.

The measure now returns to the state Senate, which last month approved its own version of the bill. Both chambers are controlled by Republicans.

Florida's "stand your ground" law, passed in 2005, received wide scrutiny and inspired similar laws in other states. It removed the legal responsibility to retreat from a dangerous situation and allowed use deadly force when a person felt greatly threatened.

Opponents say the measures will embolden gun owners to shoot first, citing the 2012 death of unarmed black teenager Trayvon Martin in Florida, which spurred national protests and the Black Lives Matter movement. The neighborhood watchman who killed him, George Zimmerman, was acquitted of murder after the law was included in jury instructions.

Wednesday's House vote on changing the law followed party lines.

Supporters, including the National Rifle Association, the powerful U.S. gun lobby, see the legislation as bolstering a civilian's right to quell an apparent threat.

"This bill is trying to put the burden of proof where it belongs, on the state, because all people are innocent before being proven guilty," said the Republican sponsor of the bill, Representative Bobby Payne.

Florida's law did not specify the process for applying "stand your ground" immunity. State courts established the current protocol, which calls for a pre-trial hearing before a judge and puts the burden of proof on the defendant.

Most of those speaking in the House debate were Democrats who said the bill would lead to more violence.

"Who will speak for the voiceless victims, silenced by an aggressor who claims he wasnt an aggressor but is protected by a flawed law? said Democrat Representative Bobby Dubose.

While public defenders support the changes to the law, the Florida Prosecuting Attorneys Association and gun control advocates oppose them.

"Every battery case, every domestic violence case, every use of force case, as a matter of routine, defense attorneys will now request hearings," said Phil Archer, a state attorney.

Archer, a lifetime NRA member who teachers gun owners about "stand your ground," said of the changes: "This is just going too far."

WASHINGTON The Trump administration and the Japanese government are in discussions to ensure that the bankruptcy of Toshiba Corp's U.S. unit Westinghouse Electric Co does not lead to U.S. technology secrets and infrastructure falling into Chinese hands, a U.S. official said on Thursday.

AUGUSTA, Georgia American journeyman Charley Hoffman led the U.S. Masters after firing a sparkling 65 in a wind-swept first round on Thursday as world number one Dustin Johnson pulled out due to a back injury.

AUGUSTA, Georgia In a field of golfing thoroughbreds, self-described plow horse William McGirt plodded his way up to second place at the U.S. Masters on Thursday after a gusty opening round at Augusta National.

Excerpt from:
Florida legislature poised to bolster 'Stand Your Ground' law - Reuters

Facebook Introduces New Tools to Fight Revenge Porn – PCMag India

Facebook today introduced new tools designed to help victims of so-called revenge porn.

Going forward, if you happen to come across an intimate image on Facebook that you believe was shared without permission, it will be easier to report it. To do so, just tap on the downward arrow or "" next to a post and click "Report."

Once you report it, "specially trained representatives" from Facebook's Community Operations team will review the image and, if it's found to be in violation of the social network's Community Standards, will take it down.

"In most cases, we will also disable the account for sharing intimate images without permission," Facebook's Head of Global Safety Antigone Davis wrote in a blog post. "We offer an appeals process if someone believes an image was taken down in error."

The company also plans to use "photo-matching technologies" to prevent any subsequent attempts to share the same image on not only Facebook but also Messenger and Instagram. If someone tries to share the image after it's been reported or removed, Facebook won't allow it and the person will get a notification stating that the image violates the social network's policies.

Finally, Facebook is partnering with safety organizations to offer revenge porn victims resources and support.

"These tools, developed in partnership with safety experts, are one example of the potential technology has to help keep people safe," Davis wrote. "We look forward to building on these tools and working with other companies to explore how they could be used across the industry."

According to a recent study from the Cyber Civil Rights Initiative, 93 percent of US revenge porn victims suffer "significant emotional distress" as a result of the abuse, while 82 percent report "significant impairment in social, occupational, or other important areas" of their life.

Continue reading here:
Facebook Introduces New Tools to Fight Revenge Porn - PCMag India

Feds, Seeking Twitter Account Data, Get Lawsuit Instead – PCMag India

Twitter filed a lawsuit against the Trump administration on Thursday to stop federal agencies from compelling the company to hand over information about an anti-Trump account.

The suit, which lists the US Department of Homeland Security (DHS) and its secretary John Kelly among the defendants, claims that DHS is abusing its power by trying to unmask the identity of the person behind the @ALT_uscis account.

The account is one of many created after President Donald Trump took office, purporting to be owned by current or former employees of federal agencies who often send tweets to speak out anonymously against the Trump administration. Twitter received an administrative summons in March from the US Customs and Border Protection (CBP) agency requesting records that would reveal the identity of the @ALT_uscis account holder, according to the lawsuit.

Twitter's lawyers wrote that the company is refusing to give up that information because "permitting CBP to pierce the pseudonym of the @ALT_uscis account would have a grave chilling effect on the speech of that account in particular and on the many other 'alternative agency' accounts that have been created to voice dissent to government policies."

The CBP summons did not indicate that the any laws had been broken, nor did the agency obtain a court order to prevent Twitter from notifying the @ALT_uscis account holder about the request for information, according to the lawsuit. Twitter said that it informed the account holder on April 4, and told CBP that its request infringes on the First Amendment rights of the company and its users.

A DHS spokesperson did not immediately respond to a request for comment.

Twitter, like other social media companies, frequently receives requests from law enforcement agencies to remove content or for more information about specific accounts. During the second half of last year, the company received 2,304 such requests from US law enforcement agencies, and offered up information for 82 percent of them, according to its latest transparency report.

See the original post here:
Feds, Seeking Twitter Account Data, Get Lawsuit Instead - PCMag India

What to Expect from the NSA Hacker Turned White House Cyber … – GovTechWorks

The choice of Rob Joyce, former head of the National Security Agencys Tailored Access Operations unit as cyber security coordinator puts an experienced offensive cyber operator at the nexus of the nations cyber policy and strategy at a time when nation-state cyber interference is at the forefront of public consciousness.

Joyce succeeds Michael Daniel, who had a public policy, economist and finance background and spent nearly a decade in cyber policy at the Office of Management and Budget and the White House. Joyces background, by contrast, is as an operator in the cyber realm, bringing an intimate understanding of the threat to the forefront of national cyber policy.

As cyber coordinator, Joyce is not the federal chief information security officer (CISO). That post is largely focused on securing the federal enterprise; the cyber coordinator drives policy beyond the federal government. The cyber coordinator is also interested in cybersecurity across the entire digital ecosystem, including private industry, state and local governments and foreign governments, as well. So its a much broader role than what the federal CISO focuses on, says Daniel, who is now president of the Cyber Threat Alliance, a non-profit focused on cyber threat sharing across the industry. There is some degree of overlap and complementarity obviously the cybersecurity coordinator has to care about the security of federal networks but the cybersecurity coordinator has a broader mandate than that.

Little is publicly known about NSAs offensive cyber activities. But in a rare public appearance last August at the USENIX 2016 conference, Joyce described the five steps to a successful cyber intrusion initial exploitation, establish presence, install tools, move laterally and collect/ex-filtrate/exploit and then walked through the weaknesses he and his hackers came across and exploited each day.

If you really want to protect your network, he said then, you really have to know your network. You have to know the devices, the security technologies, and the things inside it. His clear message: His team often knew better than the networks managers. Indeed, while NSA hackers might not understand products and technologies as well as the people who design them, Joyce said they learn to understand the security aspects of those products and technologies better than the people who created them.

You know the technologies you intended to use in that network, he said. We know the technologies that are actually in use in that network. [Theres a] subtle difference. Youd be surprised at the things that are running on a network versus the things you think are supposed to be there.

Penetration-testing is essential, as is follow-up. Joyces OTA regularly conducted Red Team testing against government networks. Well inevitably find things that are misconfigured, things that shouldnt be set up within that network, holes and flaws, he said. The unit reported its findings, telling the network owner what to fix.

Then a few years later, it would be time to test that network again. It is not uncommon for us to find the same security flaws that were in the original report, Joyce said. Inexcusable, inconceivable, but returning a couple of years later, the same vulnerabilities continue to exist. Ive seen it in the corporate sector too. Ive seen it in our targets.

Laziness is a risk factor all its own. People tell you youre vulnerable in a space, close it down and lock it down, Joyce said, reflecting on the fact that network administrators frequently dont take all threats and risks seriously enough. Dont assume a crack is too small to be noted or too small to be exploited. Theres a reason its called advanced persistent threats: Because well poke and well poke and well wait and well wait and well wait, because were looking for that opportunity to [get in and] finish the mission.

As an offensive cyber practitioner, Joyce sought to identify and, when needed, exploit the seams in government and enemy networks. He focused on the sometimes amorphous boundaries where the crack in the security picture might come from getting inside a personal device, an unsecured piece of operational security, such as a security camera or a network-enabled air conditioning system, or even an application in the cloud. Cloud computing is really just another name for somebody elses computer, he said. If you have your data in the cloud, you are trusting your security protocols the physical security and all of the other elements of trust to an outside entity.

Most networks are well protected, at least on the surface. They have high castle walls and a hard crusty shell, he said. But inside theres a soft gooey core.

Figuring out how to protect that core from a national security and policy perspective will be Joyces new focus, and if Daniels experience is any indicator, it will be a challenge.

From his perspective, cybersecurity is only partly about technology. Adversaries tend to get into networks through known, fixable vulnerabilities, Daniel says. So the reason those vulnerabilities still exist is not a technical problem because we know how to fix it its an incentive problem an economics problem. That is, network owners either fail to recognize the full extent of the risks they face or, if they do, may be willing to accept those risks rather than invest in mitigating them.

The challenge, then, is formulating policy in an environment in which the true level of risk is not generally understood. In that sense, Joyces ability to communicate the extent to which hackers can exploit weaknesses could be valuable in elevating cyber awareness throughout the White House.

The NSC is about managing the policy process for the national security issues affecting the US government, Daniel explains. You dont have any direct formal authority over anyone. But you do have the power to convene. You have the power to raise issues to people in the White House. You have the ability to try to persuade and cajole. The background he brings will obviously color what he prioritizes and what he puts his time against. But the role itself will not be dramatically different. understanding how to get decisions keyed up in a way that you can actually get them approved.

Joyces background could affect how this administration views commercial technologies, such as cloud services, mobile technology and other advances that, while ubiquitous in our daily lives, are not yet standard across the federal government.

Trust boundaries now extended to partners, Joyce said a year ago. Personal devices youre trusting those on to the network. So what are you doing to really shore up the trust boundary around the things you absolutely must defend? That for me is what it comes down to: Do you really know what the keys to the kingdom are that you must defend?

National security cyber policy is not just defensive, however, and having a coordinator with a keen insiders understanding of offensive cyber capabilities could have a significant long-term impact on national cyber strategy.

Just as Daniel sees cybersecurity as an incentives, or economics problem, Kevin Mandia, chief executive at the cyber security firm FireEye and founder of Mandiant, its breach-prevention and mitigation arm, sees incentives and disincentives as playing a critical role for cyber criminals and nation-state attackers, alike. Simply put, he says, the risk-reward ratio tilts in their favor, because the consequences of an attack do not inflict enough pain.

Mandia agrees that the first priority for U.S. cyber policy should be self-defense. Every U.S. citizen believes the government has a responsibility to defend itself, he said at the FireEye Government Forum March 15. So first and foremost, our mission security folks must defend our networks. But the second thing the private sector wants is deterrence. We need deterrence for cyber activities.

And in order to develop an effective deterrence policy, he argues, the nation needs fast, reliable attribution the ability to unequivocally identify who is responsible for a cyber attack.

Id take nothing off the table to make sure we have positive attribution on every single cyber attack that happens against U.S. resources, Mandia says. Because you cant deter unless you know who did it. You have to have proportional response alternatives, and you have to know where to direct that proportionate response.

Where Joyce stands on deterrence and attribution is not yet clear, but what is clear is that sealing off the cracks in federal network security is sure to get more intense.

A lot of people think the nation states are running on this engine of zero-days, Joyce said a year ago, referring to unreported, unpatched vulnerabilities. Its not that. Take any large network and I will tell you that persistence and focus will get you in, will achieve that exploitation without the zero days. There are so many more vectors that are easier, less risky and quite often more productive than going down that route.

Closing off those vectors forces threat actors to assume more risk, expose zero-day exploits and operate with less cover. When that happens, the balance of cyber power could finally start to tilt away from the hackers.

Tobias Naegele is the editor in chief of GovTechWorks. He has covered defense, military, and technology issues as an editor and reporter for more than 25 years, most of that time as editor-in-chief at Defense News and Military Times.

Here is the original post:
What to Expect from the NSA Hacker Turned White House Cyber ... - GovTechWorks