Archive for July, 2017

MEDIA ALERT: PcVue, Inc. presents Trusted & Unified Monitoring and Control in Building Management Systems at … – EconoTimes

MEDIA ALERT: PcVue, Inc. presents Trusted & Unified Monitoring and Control in Building Management Systems at the IEEE Power and Energy Society General Meeting

WOBURN, Mass., June 30, 2017 -- ARC Informatique, the publisher of PcVue Solutions for Building Management Systems (BMS), and its worldwide affiliates in the ARC Group, are involved in a collaborative project known as Facility Using smart Secured Energy & Information Technology (Fuse-IT). Fuse-IT is addressing the need of sustainable, reliable, user-friendly, efficient and secure BMS in the context of critical intelligent facilities. The primary focus of this project is to provide a Smart Building and Security Management System that addresses the often incompatible objectives of the Facilities Manager and the Security Manager for critical sites. Such a system will improve the energy-efficiency of the building while strengthening its security.

WHAT: The FUSE-IT project will be presented as part of the Trusted monitoring and intelligent consumption data management for smart buildings panel at the IEEE Power and Energy General meeting. http://www.pes-gm.org/2017

The IEEE PES GM attracts professionals from every segment of the electric power industry. It features a comprehensive technical program with paper presentations, poster and panel sessions, a number of technical tours, a student program and companion activities. This years theme is energizing a more secure, resilient, and adaptable grid.

Ed Nugent, COO of PcVue Inc., will participate on the panel. He will present the research and development performed by ARC Group in support of the FUSE-IT project. The complete abstract is shown below.

Intelligent buildings have to tackle the challenges of smarter energy management, enhanced automation and connectivity. Facing environmental policies and cost-reduction objectives, building managers are asking for adequate solutions to predict, monitor, control, command, and optimize energy consumption, in the context of all the energy transactions and service provision opportunities. The trend toward smart building is enabled by the growing integration of Information Technology and Operational Technology. An unwanted consequence of this is the growing exposure to cyber-attacks. Legacy automation systems have been traditionally thought secured by isolation and physical protection. Now, they are exposed to fast-expanding cyber-threats, targeting their availability, integrity and confidentiality. A joint initiative, gathering engineers and researchers from energy, automation, information and communication technology, and security backgrounds, is working to deliver the innovative intelligent building system architecture and a set of advanced technological capabilities to solve the dilemma of efficiency and security in intelligent buildings.

WHEN: IEEE PES GM: JULY 16-20, 2017; PANEL SESSION: JULY 19, 1:00PM-5:00PM

WHERE: SHERATON GRAND CHICAGO HOTEL CHICAGO, IL

Register here: https://pesgm.ieeepesreg.com

About PcVue

PcVue is a provider of advanced HMI/SCADA software solutions in North America. For more than 30 years, PcVue and its affiliate ARC Informatique have been developing, marketing and supporting innovative component-based solutions used by VAR's, OEM's and System Integrators for BMS and SCADA applications in energy, manufacturing, infrastructure and utilities. Headquartered in Woburn, Massachusetts and backed by ARC Informatique's global reach, PcVue automation solutions are used by Fortune 500 and multinational corporations around the world. http://www.pcvuesolutions.com.

New Study Could End Insulin Dependence Of Type-1 Diabetics

Infertility in men could point to more serious health problems later in life

Electrically stimulating your brain can boost memory but here's one reason it doesn't always work

Fainting and the summer heat: Warmer days can make you swoon, so be prepared

Why bad moods are good for you: the surprising benefits of sadness

Here's why 'cool' offices don't always make for a happier workforce

Four myths about diabetes debunked

What are 'fasting' diets and do they help you lose weight?

Placebos work even when patients know what they are

Read more:
MEDIA ALERT: PcVue, Inc. presents Trusted & Unified Monitoring and Control in Building Management Systems at ... - EconoTimes

George Zimmerman Found Dead By Security Guard In A Woman’s … – Business 2 Community

George Zimmerman being found dead by a security guard in a hotels womans bathroom is a death hoax. There is no truth to the report that the controversial figure was found dead.

Zimmerman is known for the fatal shooting of Trayvon Martin on Feb. 26, 2012, in Sanford, Florida. On July 13, 2013, he was acquitted of second-degree murder. As of 2015, he remained the subject of media interest due to ongoing controversy over the Martin case. In addition, he has been involved in other violent incidents, with allegations of violence made against him since he was acquitted of the murder of Martin.

Now, where did this death hoax originate? Channel23News published the article reporting that Zimmerman was found dead in a womans bathroom. You can read the story below.

A security guard smelled a putrid odor coming from a stall in the women restroom of a Marriott hotel. While surveying the area a person was observed on their knees behind the door. After several unfailed attempts to communicate with the individual local authorities were notified and arrived 20 minutes later. The Orlando Police Dept. entered the area only to discover George Zimmerman, 38 year old Hispanic male, head down in a toilet bowl of feces.

However, the above story is fake news. Channel23News is a prank website apparently operated by a Korry Scherer from Milwaukee, WI. according to Hoax-Alert. The site lets visitors create their own realistic looking fake news stories to prank friends and family. The above story is just another example of a realistic but fake news article.

Here are some examples of people sharing the fake news on social media.

This has not been the first time Zimmerman has been the subject of fake news. In March 2014, the Cream Bmp Daily web site published an article reporting that Zimmerman had accidentally shot and killed himself while loading a gun.

911 first responders found George Zimmermans lifeless body at a Florida gun range after responding to an emergency call that he shot himself while loading his weapon.

Im not saying we took our time getting there, but weve shown up faster to black neighborhoods. According to a first responder, they stopped at every light, didnt use a siren and drove behind an elderly woman all before finally arriving on the scene. If he was a rapper hed be more famous now that hes dead, but nope! Everybody just glad hes dead.

As noted in Cream Bmp Dailys About page, that web site deals strictly in satire:

CreamBmp.com Written by comedian CREAM. This website is comprised of satire and parody of current news and urban culture. For entertainment purposes only.

What did you think of the death hoax about Zimmerman? Did you believe it or see people sharing it falsely on social media? Let us know in the comments section.

Photo Credit: Source

Webcast, July 6th: Advanced SEO Site Auditing

Originally posted here:
George Zimmerman Found Dead By Security Guard In A Woman's ... - Business 2 Community

Let’s get off social media, and we might find something we’ve been missing – The Hill (blog)

Retweet. Comment. Like. The world has certainly changed over the last 10 years, with social media playing a massive role in the transformation. Social network giants have taken over peoples computers, phones, tablets, and lives.

For all the good that technology can impart through the ability to communicate with friends and family, and the quick dissemination of news (hopefully not fake), it is imperative that we also acknowledge the deleterious effects that social media can have on both our youth and adults.

Children are spending significant amounts of time on social networking sites, and it has the potential to negatively impact emotional intelligenceessentially, ones ability to identify and comprehend emotions in oneself and other people, and drawing upon this awareness to direct behavior and manage personal relationships.

The Grand Caf in Oxford, UK is the oldest coffee house in England, with an establishment date of circa 1650. The coffee shop novelty had a profound influence on the citizens of Oxford, as the coffee stimulant and social environment provided a way to share bright ideas and original thoughts that would go on to inspire genius inventions.

When you walk into the same coffee shop today, it is common to see young 20-year-old classmates looking down at their phones, swiping right on a dating application or double-tapping a friends post. Sure, it may be fun and help to pass the time, but what about looking up at your peers and engaging with them on an issue just discussed in class? Or perhaps asking your friend how they are coping with a recent family members passing and how you can help?

Emotional intelligence is threatened by the rise of social media, but so is general intellect. Again, there can certainly be benefits to having quick access to the most up-to-date news stories, possibly consuming new information, and interacting with diverse populations beyond what one may be experiencing in his or her physical environment.

Some researchers have actually suggested that social media can improve verbal and critical thinking skills. But it can be argued that spending hours upon hours each day swiping up and down on a social network feed is leading to a less-informed and less cultured society. Instead of picking up a newspaper to read entire articles (rather than a 140-character quip) or beginning a classic novel that could prove to be great discussion material during a college or job interview, our youth have been exposed to the glamour and excitement of pictures and one-line witticisms. Obsession over distant celebrities and the daily ventures of friends (who you often know only on a superficial level) has become all too frequent.

Social media will not die, at least not while we are around. And I am not, by any stretch of the imagination, suggesting that it will or should falter.

But what we can do is take it upon ourselves to encourage those around us to live in the moment.Engage with your children, colleagues, mentors, and strangers. Look them in the eye. Challenge them to escape from behind the touchscreen of a mobile device. We might just find something that we have been missing.

The views expressed by contributors are their own and are not the views of The Hill.

More here:
Let's get off social media, and we might find something we've been missing - The Hill (blog)

The NSA’s inadvertent role in Petya, the cyberattack on Ukraine. – Slate Magazine

Should the NSA stop hacking computers out of concern that bad guys could steal its tools and use them for their own nefarious purposes?

Wikimedia Commons

Theres a moment in Dr. Strangelove, Stanley Kubricks dark Cold War comic masterpiece, when President Merkin Muffley (played by Peter Sellers) learns that an insane general has exploited a loophole in the militarys command-control system and launched a nuclear attack on Russia. Muffley turns angrily to Air Force Gen. Buck Turgidson (played by George C. Scott) and says, When you instituted the human reliability tests, you assured me there was no possibility of such a thing ever occurring. Turgidson gulps and replies, I dont think its quite fair to condemn a whole program because of a single slip-up.

The National Security Agency currently finds itself in a similar situation.

One of the NSAs beyondtop secret hacking tools has been stolen. And while the ensuing damage falls far short of an unauthorized nuclear strike, the thieves have wreaked cybermayhem around the world.

The mayhem was committed by a group called the Shadow Brokers, which in April announced that it had acquired the NSA tool (known as Eternal Blue) and published its exploit code online for any and all hackers to copy.* In May, some entitywidely believed to be North Koreansused the the exploit code to develop some malware, which became known as WannaCry, and launched a massive ransomware attack, which shut down 200,000 computers, including those of many hospitals and other critical facilities.

Then on June 27 came this latest attack, which was launched by the Shadow Brokers themselves. This struck some security analysts as odd, for two reasons. First, the Shadow Brokers are believed to be members ofor criminal hackers affiliated witha Russian intelligence agency, and Russians tend not to hack for mere cash. Second, the attack was slipshod: The ransoms were to be paid to a single email address, which security experts shut down in short order. If the Russians had decided to indulge in this mischief for money, it was a shock that they did it so poorly.

Now, however, several cybersecurity analysts are convinced that the ransomware was a brief ploy to distract attention from a devastating cyberattack on the infrastructure of Ukraine, through a prominent but vulnerable financial server.

Jake Williams, founder of Rendition InfoSec LLC (and a former NSA analyst), told me on Thursday, two days after the attack, The ransomware was a cover for disrupting Ukraine; we have very high confidence of that. This disruptive attack shut down computers running Ukrainian banks, metro systems, and government ministries. The virus then spread to factories, ports, and other facilities in 60 countriesthough Williams says its unclear whether this rippling effect was deliberate. (Because computers are connected to overlapping networks, malware sometimes infects systems far beyond a hackers intended targets.)

By the way, the attack left the ransomware victims, marginal as they were, completely screwed. Once the email address was disconnected, those who wanted to pay ransom had no place to send their bitcoins. Their computers remain frozen. Unless they had back-up drives, their files and data are irretrievable.

Its not yet clear how the Shadow Brokers obtained the hacking tool. One cybersecurity specialist involved in the probe told me that, at first, he and others figured that the theft had to be an inside job, committed by a second Snowden, but the forensics showed otherwise. One possibility, he now speculates, is that an unnamed NSA contractor, who was arrested last year for taking home files, either passed them onto the Russians or was hacked by the Russians himself. The other possibility is that the Russians hacked into classified NSA files. Its a toss-up which theory is more disturbing; the upshot of both is, it could happen again.

So should the NSA stop hacking computers out of concern that bad guys could steal its tools and use them for their own nefarious purposes? This remedy is probably unreasonable. After all, spy agencies spy, and the NSA spies by intercepting communications, including digital communications, and some of that involves hacking. In other words, the cyber equivalent of Gen. Turgidson would have a point if he told an angry superior its unfair to condemn a whole program for a single slip-up.

It may be time to view surfing the internet on computers as similar to the way we view driving cars on the highway.

Besides, the NSA doesnt do very many hacks of the sort that the Shadow Brokers stolehacks that involve zero-day exploits, the discovery and use of vulnerabilities (in software, hardware, servers, networks, and so forth) that no one has previously discovered. Zero-day exploits were once the crown jewels of the NSAs signals-intelligence shops. But theyre harder to come by now. Software companies continually test their products for security gaps and patch them right away. Hundreds of firms, many created by former intelligence analysts, specialize in finding zero-day vulnerabilities in commercial productsthen alerting the companies for handsome fees. Often, by the time the NSA develops an exploit for a zero-day vulnerability, someone in the private sector has also found it and already developed a patch.

More and more, in recent years, the NSA chooses to tell companies about a problem and even help them fix it. This trend accelerated in December 2013, when a five-member commission, appointed by President Obama in the wake of the Snowden revelations, wrote a 300-page report proposing 46 reforms for U.S. intelligence agencies. One proposal was to bar the government from doing anything to subvert, undermine, weaken, or make vulnerable generally available commercial software. Specifically, if NSA analysts found a zero-day exploit, they should be required to patch the hole at once, except in rare instances when the government could briefly authorize the exploit for high-priority intelligence collection, though, even then, only after approval not by the NSA directorwho, in the past, made such decisionsbut rather in a senior interagency review involving all appropriate departments.

Obama approved this recommendation, and as a result his White House cybersecurity chief, Michael Daniel, drafted a list of questions that this senior review panel must ask before letting the NSA exploit, rather than patch, the zero-day discovery. The questions: Would this vulnerability, if left unpatched, pose risks to our own societys infrastructure? If adversaries or crime groups knew about the vulnerability, how much harm could they inflict? How badly do we need the intelligence that the exploit would provide? Are there other ways to get this intelligence? Could we exploit the vulnerability for just a short period of time, then disclose and patch it?

A 2016 article in Bloomberg News reported that, due in part to this new review process, the NSA keepsand exploits for offensive purposesonly about two of the roughly 100 zero-day vulnerabilities it finds in the course of a year.

The vulnerability exploited in the May ransomware attack was one of those zero-days that the NSA kept for a while. (It is not known for how long or what adversaries it allowed us to hack.) The vulnerability was in a Microsoft operating system. In March, the government notified Microsoft of the security gap. Microsoft quickly devised a patch and alerted users to install the software upgrade. Some users did; others didnt. The North Koreans were able to hack into the systems of those who didnt. Thats how the vast majority of hacks happenthrough carelessness.

It may be time to view surfing the internet on computers as similar to the way we view driving cars on the highway. Both are necessary for modern life, and both advance freedoms, but they also carry responsibilities and can do great harm if misused. It would be excessive to require the equivalent of drivers licenses to go online; a government that can take away such licenses for poor digital hygiene could also take them away for impertinent political speech. But its not outrageous to impose regulations on product liability, holding vendors responsible for malware-infected devices, just as car companies are for malfunctioning brakes. Its not outrageous to force government agencies and companies engaged in critical infrastructure (transportation, energy, finance, and so forth) to meet minimal cybersecurity standards or to hit them with heavy fines if they dont. Its not outrageous to require companies to program their computers or software to shut down if users dont change or randomize their passwords or if they dont install software upgrades after a certain amount of time. Or if this goes too far, the government could require companies to program their computers or software to emit a loud noise or flash a bright light on the screen until the users take these precautionsin much the same way that drivers hear ding-ding-ding until they fasten their seatbelts.

Some of these ideas have been kicking around for decades, a few at high levels of government, but theyve been crushed by lobbyists and sometimes by senior economic advisers who warned that regulations would impede technical progress and harm the competitive status of American industries. Resistance came easy because many of these measures were expensive and the dangers they were meant to prevent seemed theoretical. They are no longer theoretical. The cyberattack scenarios laid out in government reports decades ago, dismissed by many as alarmist and science fiction, are now the stuff of front-page news stories.

Cyberthreats will never disappear; cybervulnerabilities will never be solved. They are embedded in the technology, as its developed in the 50 years since the invention of the internet. But the problems can be managed and mitigated. Either we take serious steps now, through a mix of regulations and market-driven incentivesor we wait until a cybercatastrophe, after which far more brutal solutions will be slammed down our throats at far greater cost by every measure.

*Correction, June 30, 2017: This article originally misstated that the NSA tool stolen by the Shadow Brokers was called WannaCry. It was called Eternal Blue, and its code was used to create WannaCry. (Return.)

See the rest here:
The NSA's inadvertent role in Petya, the cyberattack on Ukraine. - Slate Magazine

John W. Whitehead column: A dangerous proposition: Making the NSA’s powers permanent – Richmond.com

The Trump administration wants to make some of the National Security Agencys vast spying powers permanent. Thats a dangerous proposition, and Ill tell you why.

Since 9/11, Americans have been asked to sacrifice their freedoms on the altar of national security. Weve had our phone calls monitored, our emails read, our movements tracked, and our transactions documented.

Every second of every day, the American people are being spied on by the U.S. governments vast network of digital Peeping Toms, electronic eavesdroppers and robotic snoops.

These government snoops are constantly combing through and harvesting vast quantities of our communications.

They are conducting this mass surveillance without a warrant, thus violating the core principles of the Fourth Amendment which protects the privacy of all Americans.

PRISM and Upstream, two of the spying programs conducted under Section 702 of the Foreign Intelligence Surveillance Act, are set to expire at the end of this year.

Heres why they should be allowed to expire.

PRISM lets the NSA access emails, video chats, instant messages, and other content sent via Facebook, Google, Apple, and others.

Upstream lets the NSA worm its way into the internet backbone the cables and switches owned by private corporations like AT&T that make the internet into a global network and scan traffic for the communications of tens of thousands of individuals labeled targets.

Ask the NSA why its carrying out this warrantless surveillance on American citizens, and youll get the same Orwellian answer the government has been trotting out since 9/11 to justify its assaults on our civil liberties: to keep America safe.

Yet warrantless mass surveillance by the government and its corporate cohorts hasnt made America any safer. And it certainly isnt helping to preserve our freedoms.

Frankly, America will never be safe as long as the U.S. government is allowed to shred the Constitution.

Now the government wants us to believe that we have nothing to fear from its mass spying program because theyre only looking to get the bad guys who are overseas.

Dont believe it.

The governments definition of a bad guy is extraordinarily broad, and it results in the warrantless surveillance of innocent, law-abiding Americans on a staggering scale.

Under Section 702, the government collects and analyzes over 250 million internet communications every year. There are estimates that at least half of these contain information about U.S. residents, many of whom have done nothing wrong.

The government claims its spying on Americans is simply incidental, as though it were an accident but it fully intends to collect this information.

Indeed, this sensitive data is not destroyed after the NSA vacuums it up. Rather, the government has written its own internal rules called minimization procedures that allow spy agencies such as the NSA to retain Americans private communications for years.

Far from minimizing any invasion of privacy, the rules expressly allow government officials to read our emails and listen to our phone calls without a warrant the very kinds of violations that the Fourth Amendment was written to prohibit.

Finally, once this information collected illegally and without any probable cause is ingested into NSA servers, other government agencies can often search through the databases to make criminal cases against Americans that have nothing to do with terrorism or anything national security-related. One Justice Department lawyer called the database the FBIs Google.

In other words, the NSA, an unaccountable institution filled with unelected bureaucrats, operates a massive database that contains the intimate and personal communications of countless Americans.

Warrantless mass surveillance of American citizens is wrong, un-American, and unconstitutional.

Its time to let Section 702 expire or reform the law to ensure that millions and millions of Americans are not being victimized by a government that no longer respects its constitutional limits.

Constitutional attorney John W. Whitehead, author of Battlefield America: The War on the American People, is the president of The Rutherford Institute, a civil liberties and human rights organization that is one of the plaintiffs in a lawsuit challenging Upstream surveillance under Section 702. Contact Whitehead at johnw@rutherford.org.

View post:
John W. Whitehead column: A dangerous proposition: Making the NSA's powers permanent - Richmond.com