Archive for August, 2017

The real benefits of social networking id you’re a tech entrepreneur – Manchester Evening News

Networking events can initially seem an inconvenient distraction for entrepreneurs from the day-to-day running of their company.

But all the evidence suggests that there is business to be won for savvy networkers.

Networking events range from business breakfasts to after-work happy hours at restaurants, as well as more formal events.

And the benefits frequently become manifest on innumerable levels regardless of the setting or the tone of the event.

But Will Kennedy, sales and marketing director at managed services provider Solar Communications, believes that the IT sector in particular is missing a trick when it comes to the many benefits of networking.

He explained: The impact of networking in the IT industry is often underestimated, even by the very people working within it.

After all, once weve installed the software and done twiddling with the wires, do they need to see or hear from us again unless theres a problem?

That, I fear, is the perception, and it couldnt be more wrong.

Whats so important for us in the IT industry to understand and appreciate, is that our products are critical to the everyday functioning of our clients businesses.

Being on hand, be it through a fully furnished corporate event, or over a cappuccino, strengthens that sense of trust in us as providers of solutions who will always be there should things go wrong.

Many networking experts maintain that there are five steps when it comes to successfully building business contacts...

Kennedy added: Cultivating and developing that trust through regular contact with clients is good for building a reputation, understanding more about their business and a stronger relationship but it also has another, more basic function - increased sales.

Ours is a fast-moving industry, and new technologies and solutions are appearing all the time offering new ways for businesses to execute mission-critical processes more quickly, more efficiently, more easily and more cost-effectively.

Regular face-to-face contact with clients gives us the opportunity to showcase these solutions and, hopefully, close sales further down the line.

A reputation for reliability and trustworthiness is vital for all industries, but particularly so for ours, an industry whose failings can have a catastrophic impact on our clients businesses.

Organising events where we can share our levels of expertise via thought leadership allows clients both existing and prospective an opportunity to see and hear that they are right to put their faith in our solutions and in our people.

It consolidates their belief in us, and that belief can translate to enhanced loyalty, greater custom, and new partners. Successfully selling a product to a client shouldnt be the end of face-to-face interaction with them - it should be the beginning.

Lawrence Jones, CEO of UKFast, adds: "There is nothing more important for a start-up than getting to know people. Potential customers, potential mentors, other start-ups and successful businesses everyone knows something or someone that you dont.

"Nowadays, theres really no excuse. The internet has opened up the world and there are more routes than ever to meeting new people. I recommend using all of the tools at your disposal

"LinkedIn is fantastic to expand your network and access to professionals whereas Twitter gives you more personal, broader access. Twitter is an incredible tool for getting advice and linking into events that you cant make.

"That being said, nothing can replace meeting face to face. Getting to know someone over a cup of tea, a game of squash or at an event rather than solely online is a sure-fire way to build a lasting business relationship.

"When I first met Sir Richard Branson, we went for a run every morning. Whilst getting exercise and enjoying the beach around us, we were chatting about business and asking each other questions. We ran for hours and the insight that I gained was extraordinary.

"Equally, Ive been skiing, climbed Mount Snowdon and been camping with many business leaders, rather than sitting in an office forcing the conversation

"If youre struggling with where to start, take a look at TechMCR which connects businesses and mentors and holds events throughout the year for tech startups."

Tech Manchester was launched earlier this month with the expressed remit of enabling the next generation of tech entrepreneurs to access the support they require to grow their business.

As part of this process, it has promoting networking and is organising events throughout the year.

For more details visit: techmanchester.co.uk/events

Read more:
The real benefits of social networking id you're a tech entrepreneur - Manchester Evening News

What is social media and how did it grow so quickly? – Telegraph.co.uk

All of these sites allow users to create and share content with an audience the essential media element that email is missing. On all sites, there are methods of connection and building a network: Facebook friends, followers on Twitter and connections on LinkedIn. In many cases, you will not have met all of these connections in real life (although that is less true in the case of Facebook friends), so followers can often represent more of an "audience"than being actual collaborators.

Social media is also closely associated with "Web 2.0" the concept of the "second stage"of the web popularised by Tim OReilly and Dale Dougherty. In the first stage of the web, users were limited to passive viewing of content; for example, they would go to a website and be able to access its information, but not be able to interact with it.

With Web 2.0, the Internet is thought of as a platform in itself, where people are essentially building applications within it. The more people collaborating, the better the applications get, and where users are able to interact with the content and create their own.

See the rest here:
What is social media and how did it grow so quickly? - Telegraph.co.uk

NextDoor offers specific information for neighborhoods – Times Daily

FLORENCE In an effort to provide information pertaining to specific areas of the city, the Florence Police Department has partnered with the social network, NextDoor.

The Police Department continues to search for means and methods to improve efforts at crime prevention, public education, and ways to interact with our neighbors and residents, Florence Police Chief Ron Tyler said. NextDoor is a platform for all of that.

NextDoor is a community-based social-networking site for a neighborhood.

Detective Sgt. Greg Cobb said the program will allow police to post safety/crime information for specific neighborhoods.

The advantage is that if we have a rash of burglaries in a certain area of Florence, we can alert just that area of the city about the crimes, he said. If we have a missing person in certain area, we can alert that neighborhood and the surrounding area about the issue.

NextDoor was launched in 2011. Cobb said there are 1,500 local members in the system. To sign up or get more information go to nextdoor.com.

The chief said people are embracing technology more and more andwe encourage people to sign up."

Police Lt. Brad Holmes said Nextdoor.com is a free service to residents. He said when a resident signs up for NextDoor, the system will ask for their address and a means of verification like the last four digits of a Social Security number, last four of a debit card that is billed to the address, or a cellphone number registered to the address.

This allows the company to confirm that you do in fact live where you claim. The information you provide isn't shared or used for any other purpose, Holmes said.

He said after an individual is signed up, the site will allow communication with others in the neighborhood, seek solutions to concerns, sell items, socialize, and keep each other informed about items of interest to their neighborhood.

No other neighborhood sees your posts, he said.

Holmes said NextDoor is a "virtual neighborhood watch" app for neighborhood-specific information about criminal activity.

The benefit to our department is the speed of information release, Holmes said. The system also allows the user to direct message our staff. Since we put the system online early (Monday) morning we have already received more than 20 requests for information."

As opposed to getting misinformation from social media about crime, we want residents to utilize this for accurate, up-to-date information, Tyler said.

See the article here:
NextDoor offers specific information for neighborhoods - Times Daily

The justices return to cellphones and the Fourth Amendment: In Plain English – SCOTUSblog (blog)

In 1976, in United States v. Miller, the Supreme Court ruled that the bank records of a man accused of running an illegal whiskey-distilling operation were not obtained in violation of the Fourth Amendment, even though law-enforcement officials did not have a warrant, because the bank records contained only information voluntarily conveyed to the banks and exposed to their employees in the ordinary course of business. Three years later, in Smith v. Maryland, the justices ruled that no Fourth Amendment violation had occurred when, without a warrant and at the request of the police, the phone company installed a device to record all of the phone numbers that a robbery suspect called from his home, leading to his arrest.

These cases are often cited as examples of the third-party doctrine the idea that the Fourth Amendment does not protect records or information that someone voluntarily shares with someone or something else. But does the third-party doctrine apply the same way to cellphones, which only became commercially available a few years after the courts decisions in Miller and Smith? Justice Sonia Sotomayor, at least, has suggested that it should not: In 2012, she argued that the doctrine is ill suited to the digital age, in which people reveal a great deal of information about themselves to third parties in the course of carrying out mundane tasks. That question is at the heart of Carpenter v. United States, in which the justices will hear oral argument this fall.

The petitioner in the case, Timothy Carpenter, was accused of being the mastermind behind a series of armed robberies in Ohio and Michigan. Law-enforcement officials asked cellphone providers for the phone records for 16 phone numbers, including Carpenters, that had been given to them by one of Carpenters partners in crime. They relied on the Stored Communications Act, a 1986 law that allows phone companies to disclose records when the government provides them with specific and articulable facts showing that there are reasonable grounds to believe that records at issue are relevant and material to an ongoing criminal investigation; the government does not need to show that there is probable cause to believe that a crime has been committed. Such requests have become a common tool for police officers investigating crimes according to Carpenter, they are made in thousands of cases each year.

Investigators received several months worth of historical cell-site records, which indicate which cell towers a cellphone connected with while it was in use. Based on those records, investigators were able to determine that, over a five-month span in 2010 and 2011, Carpenters cellphone connected with cell towers in the vicinity of the robberies. After his arrest, Carpenter argued that the records should be suppressed because the government had not obtained a warrant for them. But the district court disagreed, and Carpenter was convicted and sentenced to almost 116 years in prison.

A federal appeals court upheld his convictions. Applying the Supreme Courts decision in Smith (among others), it ruled that the government was not required to obtain a warrant because Carpenter could not have expected that cellphone records maintained by his service provider would be kept private. Carpenter then asked the justices to weigh in, which they agreed to do in June.

Carpenter contends that the disclosure of his cellphone records to the federal government was a search for which the government needed a warrant. At the heart of this argument is the idea that, as Sotomayor has suggested, times have changed, and cellphones are different from the more primitive phone technology and bank records at issue in Smith and Miller. Therefore, he tells the justices, they should not mechanically apply their earlier decisions, but should instead use a more nuanced approach that accounts for both the volume and precision of the data that is now available for cellphones. And, in particular, the fact that a third party, such as Carpenters cellphone provider, has access to his cellphone records does not automatically mean that he cannot expect those records to remain private.

But even under Smith and Miller, Carpenter continues, he would still prevail. To determine whether he can expect his records to be kept private, he contends, the justices should look at whether he voluntarily gave the records to his service provider. Here, he stresses, he did not do so in any meaningful way, because he did not affirmatively give information about his location to his service provider by either making or receiving a call. Moreover, he suggests, another factor that the justices should consider his privacy interest in the information revealed by the records weighs heavily in his favor. Most people have their phones with them all the time, he emphasizes, which means that cellphone records can show where someone was and what he was doing at any given time, even in places most notably, at home where he would expect privacy.

In a friend of the court brief, the Electronic Frontier Foundation and other privacy groups echo Carpenters arguments. In particular, the groups highlight how times have changed since the courts third-party-doctrine decisions in the 1970s. Here, they observe, the SCA gives law-enforcement officials access to much more information than just the few days worth of dialed phone numbers at issue in Smith. Moreover, the data that can be obtained under the SCA are generated simply by the act of carrying a phone that has been turned on: It is created whenever the phone tries to send and receive information, generally without forethought or conscious action by the owner.

For the federal government, this case is a straightforward one, regardless of any new technologies like cellphones that may be involved. First, the government contends, Carpenter does not have any ownership interest in the cellphone records turned over to police by his service providers. Those providers, the government reasons, simply collected the information for their own purposes, which included a desire to find weak spots in their network and to determine whether roaming charges should apply.

Second, the government adds, Carpenter does not have any reasonable expectation of privacy in the cellphone records, which only tell the government where his cellphone connected with the towers, without giving it any information about what was said in his calls a core distinction, according to the government. What Carpenters argument really boils down to, the government argues, is that law-enforcement officers could infer from his service-providers records that he was near a particular cell tower at a particular time. But, the government counters, an inference is not a search.

The federal government also pushes back against Carpenters suggestion that broader privacy concerns weigh in favor of Fourth Amendment protection for his cellphone records. Cellphone users like Carpenter know (or at least should know) how their phones work: by giving off signals that are sent to the cellphone providers through the closest tower. Therefore, the government contends, Carpenter assumed the risk that the information would be divulged to police.

Carpenters argument that cellphone records are somehow more private than the financial information that was not protected in Miller has no real support, the government tells the justices. And the information at issue in Carpenters case is more limited than in United States v. Jones, in which the Supreme Court ruled that the installation of a GPS tracking device on a suspects car, without a warrant, violated the Fourth Amendment. In Jones, the government points out, the police used the GPS device to follow the cars movements continuously for 28 days, allowing them to pinpoint the cars location to within 50 to 100 feet. Here, the government emphasizes, the only information that the government received was which tower connected with Carpenters phone when he was making the calls.

Carpenters case is not the Supreme Courts first foray into the intersection of cellphone technology and the Fourth Amendment. In 2014,the justices ruled that police must obtain a warrantto search information stored on the cellphone of someone who has been arrested. In his opinion for the court, Chief Justice John Roberts emphasized that todays phones are based on technology nearly inconceivable just a few decades ago and are now such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy. And the justices made clear that their decision did not render the information on a cellphone completely off limits to police; it just meant that police officers will normally have to get a warrant. The justices may ultimately conclude that, as the federal government argues, giving law-enforcement officials access to information about where a particular cellphone has been is not the same as allowing them to review the kind of detailed personal facts available on the phone itself. But no matter what they decide, their ruling could shed significant new light on what limits the Fourth Amendment will impose on efforts by police to benefit from the significant technological advances in the 21st century.

Posted in Carpenter v. U.S., Summer symposium on Carpenter v. United States, Plain English / Cases Made Simple, Featured, Merits Cases

Recommended Citation: Amy Howe, The justices return to cellphones and the Fourth Amendment: In Plain English, SCOTUSblog (Jul. 31, 2017, 10:57 AM), http://www.scotusblog.com/2017/07/justices-return-cellphones-fourth-amendment-plain-english/

See more here:
The justices return to cellphones and the Fourth Amendment: In Plain English - SCOTUSblog (blog)

ShadowBrokers leak probe looking at NSA insiders: report – The Hill

Investigators believe the ShadowBrokers leaks were from a National Security Agency insider, thewebsite CyberScoop reports.

Since August of last year, the ShadowBrokers have leaked files apparently stolen from the NSA, primarily source code for NSA hacking tools along with some additional files.

One set of files leaked by the group contained tools to hack into the Windows operating system. Those tools were eventually used in the devastating international ransomware attacks known as WannaCry and NotPetya.

WannaCry infected between hundreds of thousands and millions of systems, causing such damage to the United Kingdoms hospitals that some patients were turned away. NotPetya caused significant damage to a major Russian energy firm and the U.S.-based pharmaceutical giant Merck.

Citing multiple sources familiar with the investigation, CyberScoop reports that ex-NSA employees have been contacted by investigators concerning how the ShadowBreakers obtained their cache of files.

The report claims that the leadingtheory is that an inside actor was at the helm but that other theories are still in the mix, including a foreign hacker.

Sources also told CyberScoop that the investigation "goes beyond" Harold Martin, the NSA contractor arrested for hoarding classified documents at his home last year.

The ShadowBrokers claim to have leaked files to raise interest for a planned sale of the remaining cache of documents. Currently, the group is offering a subscription, leak-of-the-month service.

Continue reading here:
ShadowBrokers leak probe looking at NSA insiders: report - The Hill