FRANK CARSON ET AL 1-18-2018 AM AUDIO

080617_1506_WAZZUPDAWG1.jpg

HERE IS THE MORNING REPORT

 

Advertisements

Mark Zuckerberg’s just lost $2.9 billion…….


The co-founder of the world’s largest social-media business saw his fortune fall $2.9 billion Friday after he posted plans to shift users’ news feeds toward content from family and friends at the expense of material from media outlets and businesses.

Shares of Facebook tumbled 4.5 percent Friday, cutting Zuckerberg’s fortune to $74.4 billion on the Bloomberg Billionaires Index, costing him his place as the world’s fourth-richest person.

The drop wipes out much of the $4.5 billion Zuckerberg, 33, has added so far this year. The world’s 500 richest people gained $1 trillion in 2017 and an additional $17 billion in the first two weeks of 2018, according to the Bloomberg index.

BRING IN NEW (SORT OF) TECHNOLOGY…….

California lawmaker wants to ban gas car sales after 2040

9-30-2017


France and the United Kingdom are doing it. So is India. And now one lawmaker would like California to follow their lead in phasing out gasoline- and diesel-powered vehicles.

When the Legislature returns in January, Assemblyman Phil Ting plans to introduce a bill that would ban the sale of new cars fueled by internal-combustion engines after 2040. The San Francisco Democrat said it’s essential to get California drivers into an electric fleet if the state is going to meet its greenhouse gas reduction targets, since the transportation sector accounts for more than a third of all emissions.

“The market is moving this way. The entire world is moving this way,” Ting said. “At some point you need to set a goal and put a line in the sand.”

California already committed five years ago to putting 1.5 million “zero-emission vehicles,” such as electric cars and plug-in hybrids, on the road by 2025. By that time, the state wants these cleaner models to account for 15 percent of all new car sales.

But progress has been modest so far, as consumers wait for prices to drop and battery ranges to improve, or opt for large trucks and SUVs that are not available among electric offerings. Slightly more than 300,000 zero-emission vehicles have now been sold in California, and they accounted for just under 5 percent of new car sales in the state in the first half of the year.

Ting is among the policymakers pushing to increase incentives for drivers to ditch their gas guzzlers. He is also working on legislation that would overhaul California’s electric car rebate program by making more money available for rebates, then ratcheting down the value of those discounts as the state hits sales targets.

“California is used to being first. But we’re trying to catch up to this,” Ting said.

France and the United Kingdom both announced this summer that they would ban the sale of new gas and diesel cars after 2040. India is aiming to get there by 2030. And China said this month that it would stop the production and sale of vehicles powered solely by fossil fuels in the coming years.

DAWG SAYS:

The technology has been there for some time now, we have been too slow to put in place.

DON’T WORRY ABOUT KILLER “SEX DOLLS”…….

SOME SAY SEX TECH IS NOT THAT DANGEROUS

9-24-2017

Australian cybersecurity expert Nick Patterson created quite a stir when he told the Daily Star hackers could theoretically hijack high-tech sex dolls and use them to kill people.  “Once a robot is hacked, the hacker has full control and can issue instructions to the robot,” Patterson told The Daily Star. Despite the tabloid hype, Patterson wasn’t actually predicting a future with killer sex robots. Patterson later told Men’s Health the tabloids sensationalized his broader observation about artificial intelligence: AI-powered robots are still machines. They can get hacked just like any other computer connected to the internet. Regardless, there’s no need to fear sex tech.

For starters, the most sophisticated sex dolls on the market still can’t move on their own.


“The worst thing she can possibly do to you is insult you,” Realbotix CEO Matt McMullen, a high-tech sex toy inventor who heads a subsidiary of the Abyss Creations doll factory, told the San Diego Union-Tribune. His AI-enhanced sex doll, Harmony, can’t move its arms or legs independently. Most of the doll’s high-tech gizmos are for dynamic conversation. Yet although Harmony costs $10,000, even its advanced AI technology is a far cry from autonomous robots in sci-fi series like Westworld.

Patterson was talking about a future scenario with more advanced robotics. Assuming sex dolls will someday move on their own, it’s easy to imagine such androids being treated more like sex workers than inanimate toys. A sex doll brothel opened earlier this year in Barcelona, charging around $144 for a private encounter with Lumi Dolls, which lack built-in chatbots.

Meanwhile, the Chinese company Touch experimented with a short-lived sex doll rental service, which operated more like an escort service than a sex product subscription box. The BBC reported clients could request specific dolls, including a Wonder Woman figurine with a sword and shield. However, the service was quickly shut down by Chinese authorities. It’s a safe to assume future regulators would take a similarly critical look at potential safety hazards. Even today’s strip clubs and legal brothels hire security guards.

Even before AI and robotics were thrown into the mix, sex toys have historically inspired fear, thanks in part to social stigmas surrounding masturbation. Sexologist Jill McDevitt theorized this anxiety is part of the reason vibrators are often molded in cartoonish animal shapes. “[It] says a lot about how sex toys are still seen as ‘threatening’ and how far we have to go to normalize masturbation for women,” McDevitt told Motherboard. All things considered, high-tech sex dolls certainly aren’t dangerous now and they probably won’t be any time soon.

Are you being watched?

FinFisher government spy tool found

hiding as WhatsApp and Skype

9-23-2017


Malware used by intelligence agencies spotted in 7 countries, experts said.

Legitimate downloads of popular software including WhatsApp, Skype and VLC Player are allegedly being hacked at an internet service provider (ISP) level to spread an advanced form of surveillance software known as “FinFisher”, cybersecurity researchers warn.

FinFisher is sold to global governments and intelligence agencies and can be used to snoop on webcam feeds, keystrokes, microphones and web browsing. Documents, previously published by WikiLeaks, indicate that one tool called “FinFly ISP” may be linked to the case.

Iran’s hackers exposed: ‘APT33’ group, tied to destructive malware, seeks military secrets

The digital surveillance tools are peddled by an international firm called Gamma Group and have in the past been sold to repressive regimes including Bahrain, Egypt and the United Arab Emirates (UAE).

In March this year, the company attended a security conference sponsored by the UK Home Office.

This week (21 September), experts from cybersecurity firm Eset claimed that new FinFisher variants had been discovered in seven countries, two of which were being targeted by “man in the middle” (MitM) attacks at an ISP level – packaging real downloads with spyware.

Companies hit included WhatsApp, Skype, Avast, VLC Player and WinRAR, it said, adding that “virtually any application could be misused in this way.”

When a target of surveillance was downloading the software, they would be silently redirected to a version infected with FinFisher, research found.

When downloaded, the software would install as normal – but Eset found it would also be covertly bundled with the surveillance tool.

The stealthy infection process was described as being “invisible to the naked eye.”

The seven countries were not named for security reasons, Eset said. WhatsApp and VLC Player did not respond to request for comment by the time of publication.

A Microsoft spokesperson, referencing the Skype infections, told IBTimes UK: “Windows Defender antivirus cloud protection already automatically identifies and blocks the malware.

“For non-cloud customers, we’ve deployed signatures to protect against this in our free antivirus software,” the statement added.

An Avast spokesperson said: “Attackers will always focus on the most prominent targets.

“Wrapping official installers of legitimate apps with malware is not a new concept and we aren’t surprised to see the PC apps mentioned in this report.

“What’s new is that this seems to be happening at a higher level.

“We don’t know if the ISPs are in cooperation with the malware distributors or whether the ISPs’ infrastructure has been hijacked.”

The latest version of FinFisher was spotted with new customised code which kept it from being discovered, what Eset described as “tactical improvements.” Some tricks, it added, were aimed at compromising end-to-end (E2E) encryption software and known privacy tools.

One such application was Threema, a secure messaging service.

“The geographical dispersion of Eset’s detections of FinFisher variants suggests the MitM attack is happening at a higher level – an ISP arises as the most probable option,” the team said.

“One of the main implications of the discovery is that they decided to use the most effective infection method and that it actually isn’t hard to implement from a technical perspective,” Filip Kafka, a malware researcher at Eset, told IBTimes UK.

“Since we see have seen more infections than in the past surveillance campaigns, it seems that FinFisher is now more widely utilised in the monitoring of citizens in the affected countries.”

Anyone with any knowledge of these things let me know……

LIFE LOCK ALERT I RECEIVED TODAY: JUST FOR INFORMATION…….


I HAVE LIFE LOCK MONITORING ON MY CREDIT AND HERE IS AN ALERT I WAS SENT TODAY.

NOTICE IT REFERENCED DAILYMOTION.COM AND SUSPICIOUS ACTIVITY. I CHANGED ALL MY PASSWORDS AS THEY WERE POSSIBLY COMPRIMISED.

DAILYMOTION IS HEAVY ON FACEBOOK AND MEDIA SITES LIKE THE MODESTO BEE,AND I DO A MASSIVE AMOUNT OF RESEARCH ON ALL AREAS OF THE NET. JUST FOR INFORMATION AND FUTURE REFERENCE.

Alert Details

Internet Monitoring Activity Notification

dailymotion.com

Does this belong to you?

We detected identity information belonging to you on the Dark Web, a term used which may also include the deep web or a peer-to-peer file sharing network.

The information found is usually from a “list” that’s being given away, traded or sold. The list could be old, so it’s important to see whether or not the information on it is out of date.

If you recognize information below as belonging to you, change the password associated with the affected website or service immediately. We also recommend setting up 2-factor authentication if available with that website/service. If you see a Social Security Number belonging to you, review credit reports for suspicious activity, watch financial transactions, and make sure LifeLock alert preferences settings are up to date for the account that belongs to you.

  • DescriptionThe site dailymotion.com has been reported to possibly have suffered a data exposure that could include 85,176,234 emails, passwords and usernames. The possible exposure would have happened in October 2016 although it was reported in August 2017.
  • Potential Typebreach
  • Potentially Impacted Websitedailymotion.com
  • Where Founddarkweb
  • PasswordExposed Online

HOW IS THE LAW REGARDING STINGRAYS WORKING?

POLICE TRANSPARENCY MAY NOT BE HAPPENING

by Marty Carlson

8-30-2017


During the life of this blog I have done several reports on a cell phone call interceptors device called the Stingray. This device mimics a cell phone tower and intercepts phone calls and text messages without either party in the call or message having any idea that it’s happened.

Sacramento County finally admitted to having a stingray after years of denial. Read HERE and HERE.

It has also caused some agencies to dismiss charges rather than admit its use, read HERE and HERE

a recent article in the Los Angeles times talks about the new legislation involved concerning stingray devices and the notifications that agencies are supposed to serve to the public of their ownership, and rules of usage.

The Times did a review of records from some of the state’s largest police and sheriff’s departments and found some agencies have been slow to follow or have ignored the law. Several these agencies partner with federal agencies to work on cases that are not subject to the laws reporting requirements.

Understand the stingray can be used in a vehicle like a van and be parked around the corner from your house and target your specific handheld device. Many federal agencies have devices and make them available to local law enforcement agencies. Realizing that some investigators with the law enforcement agencies actually “double badge,” meaning they also have FBI authorities and abilities and resources. It is a common practice these days to give them more resources. Those resources include the stingray cell phone intercepting device.

The only times reported that 21 law enforcement agencies were surveyed, and 12 were found to have access or own stingray or similar devices. Nine of those agencies had developed and released online public policies.

Here is a list of the 12 agencies they found:

Department Device Policies
LAPD OWN YES
Long Beach Police OWN YES
L.A. County Sheriff OWN YES
San Diego Police OWN YES
San Jose Police OWN YES
Fresno Police ACCESS** NO
Sacramento Police OWN YES
Sacramento County Sheriff OWN YES
Oakland Police ACCESS** YES
Alameda district attorney’s office OWN YES
Santa Ana Police ACCESS** NO
Anaheim Police OWN YES

**Officers don’t operate the stingray but work with other agencies that may

The Times also reviewed hundreds of documents that he received through public information request regarding purchase orders and memos and grant proposals for the use of stingrays and similar devices are also known as “dirt boxes.”

The devices cost up to $500,000 and are marketed for preventing and responding to terrorist threats. The documents found suggests they are used more frequently in criminal cases such as burglaries murders and kidnappings.

Some of the policies that were posted online by the agencies revealed little about the devices itself except for the fact they were in use. Many agencies took months to post their guidelines online.

The times and found that some of the agencies that own the stingrays bought them between 2006 and 2013, mostly with federal grant money or under programs. Some of those agreements prohibited any type of public disclosure. Local tax dollars were not used in the cities and counties didn’t ask about them in a public forum.

In 2015, California lawmakers passed a sweeping electronic communications privacy act, which prohibited any investigative body in the state from forcing businesses to turn over digital communications without a warrant. In addition, legislation was introduced to compel local law enforcement agencies to disclose more information about the use of stingrays in California.

During one judiciary committee hearing it was stated “that our country has a rich history of democracy and civilian oversight and the stealth use of these devices undercuts that very nature of our government.”

The law which took effect in January 2016, requires cities and counties to create guidelines for how and when officers use the equipment. Any agency wants to buy a device must first receive approval at a public hearing.