Tag Archives: Cyber

Hackers Just Brought the Internet to Its Knees—And No One Knows Why

Mother Jones

A number of websites—including Twitter, Netflix, and PayPal—were disrupted today by an early morning cyberattack against a key company responsible for routing internet traffic. The company, Dyn, has been posting a series of updates throughout the day, claiming that it came under multiple Distributed Denial of Service (DDoS) attacks. A DDoS attack floods a website or server with traffic from multiple sources, slowing the targeted site or shutting it down altogether.

In this case, the target was Dyn, a major provider of Domain Name Servers (DNS), which allow internet traffic to get routed properly. (Gizmodo has an excellent breakdown of how DNS servers work, and why an attack on a major provider of them would impact so many sites at once.) The attack started at about 7:10 a.m. on the East Coast of the United States, and the company was initially able to restore service. But later in the morning a second and more widespread attack ensued, and service disruption might have spread to Western Europe, according to Reuters.

Today’s attack is being investigated by the US government as a “criminal act,” Reuters reports, and it could be just the latest in what the Department of Homeland Security has characterized as increasingly powerful DDoS attacks. In an October 14 message posted on the DHS Computer Emergency Readiness Team page, the agency warned of “increased risks” of massive DDoS attacks because of poorly secured internet-connected devices such as cameras and home routers. “Recently, Internet of Things devices have been used to create large-scale botnets—networks of devices infected with self-propogating malware—that can execute rippling distributed denial-of-service (DDoS) attacks,” the warning read.

Although it’s unclear who is behind the attack, in an early Friday evening tweet, WikiLeaks told its supporters:

By the way, here’s what a DDoS attack looks like when it’s visualized (via Gizmodo):

Link – 

Hackers Just Brought the Internet to Its Knees—And No One Knows Why

Posted in Cyber, FF, GE, LAI, LG, ONA, Radius, Uncategorized, Venta | Tagged , , , , , , , | Comments Off on Hackers Just Brought the Internet to Its Knees—And No One Knows Why

This November, Marijuana Activists are Pushing Pot Over Pills

Mother Jones

With less than a month to go before Election Day, several state level marijuana legalization campaigns have rolled out messaging that pitches weed as an alternative to deadly opioid painkillers.

This week, groups backing recreational legalization in Arizona and Massachusetts launched ads arguing marijuana should be an option for pain patients. Arizona’s Regulate Marijuana Like Alcohol campaign ran its ad during Thursday night’s NFL game, featuring former pro quarterback Jim McMahon, whose career included a stint with the Arizona Cardinals, talking about the painkillers he was prescribed for injuries.

“I was using them daily pretty much the rest of my career,” he says in the ad. “It takes its toll.”

Framing marijuana as an alternative medical treatment is of course not a new argument for pot proponents, but the strength and prominence of the country’s opioid epidemic has given marijuana activists a new chance to argue that cannabis offers a safe, overdose free option to fight pain.

Legalization activists are pointing to recent studies to make their case. One paper that came out last month found that states with medical marijuana saw fewer suspects in fatal traffic accidents test positive for opioids. And earlier this year, researchers at the University of Michigan found chronic pain patients who used medical marijuana were able to reduce their use of opioid drugs by 64 percent.

“It’s not just an argument, it’s an argument based on solid data,” said Jim Borghesani, communications director for the legalization campaign in Massachusetts, a state with one of the higher rates of drug overdoses in the country.

Earlier this month, Nevada backers of recreational marijuana legalization ran an ad showing a marine veteran who says he was prescribed OxyContin, Percocet, and Hydrocodone. After taking so many pills, “You’re addicted; You know you’re addicted,” he said. With marijuana, he says he can treat his pain but “I can also live.”

Proponents of a Florida bill legalizing medical use are running an online ad similar to the TV spots from the recreational legalization campaigns, showing a doctor who condemns prescription painkillers as “dangerous narcotics that have significant risks.”

The death toll from opioid painkillers is staggering, rivaling that of the HIV/AIDS epidemic of the late ’80s and early ’90s. In 2014, there were nearly 19,000 opioid painkiller deaths, along with more than 10,500 heroin overdose deaths, according to data from the Center for Disease Control and Prevention. Painkiller abuse has ravaged communities across the country, and opened the door for a heroin addiction crisis in some towns.

Marijuana advocates have long pitched the drug’s promise to bring relief to people diagnosed with serious diseases, highlighting an evolving series of conditions.

“For years, it was all about cancer and AIDS and glaucoma and these things, and then all of a sudden in 2013 with Sanjay Gupta it became about epilepsy and kids with intractable seizure disorders,” said Ben Pollara, head of the pro-medical-marijuana campaign in Florida. “What you’re seeing with opiate use and abuse and addiction as a rationale for marijuana reform has come about it a similar way.”

Just about three weeks out from the election, a new Gallup Poll shows 60 percent of Americans support legalization.

See the original post – 

This November, Marijuana Activists are Pushing Pot Over Pills

Posted in alo, cannabis, Cyber, FF, GE, LG, ONA, Radius, Uncategorized, Venta | Tagged , , , , , , , , , , | Comments Off on This November, Marijuana Activists are Pushing Pot Over Pills

This Is How We Know Congress Isn’t Really Serious About Election Fraud

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

The debate over possible Russian meddling in US elections was a major theme in a US House hearing Tuesday on protecting the 2016 elections from cyberattacks and machine-voting attacks. Even though election preparations have been underway for months around the country and early voting in many states begins soon, committee chairman Lamar Smith (R-Texas) said the hearing was to review the security of the election system.

“This discussion is timely as many concerns have been raised in recent months about the vulnerabilities of electronic voting machines, voting over the internet, and online voter registration,” Smith said.

Concerns about the security of the US voting system have been heightened after the recent hacking of the Democratic National Committee, the Democratic Congressional Campaign Committee, and some high-profile Democratic politicians. The DNC, along with several US government officials and security research firms, have fingered Russian intelligence as responsible for the hacks of Democratic targets. Add to that the recent revelation that state election databases in Arizona and Illinois had been hacked, although the degree of success in each attack, and the ultimate purpose, remains unclear. Even though the Russian government has denied being involved, Democrats within Congress have called on the Obama administration to publicly accuse Russia of trying to interfere with US elections.

None of the witnesses—Dr. Charles Romine of the National Institute of Standards and Technology, Louisiana Secretary of State Tom Schedler, David Becker of the Center for Election Innovation and Research, and Dr. Dan Wallach of the Baker Institute for Public Policy at Rice University—suggested Russians were attempting to hack election infrastructure, only that they, too, had received this information specific to the DNC and the DCCC from press accounts.

“The nature of the threat is that they don’t want you to see them there,” said Wallach. “So we can’t assume that if we haven’t seen them that they’re absent. What we do know is that we’ve established motive. The attack on the DNC’s email server is motive—it shows that they did it for explicit partisan purposes.”

Rep. Zoe Lofgren (D-Calif.) said the Russians’ goal might not necessarily be to manipulate vote counts or tamper with voter registration databases, but to create chaos in the system and undermine confidence. “The focus of this hearing is on the voting systems, but really the question is about the election,” she said. “It’s pretty clear that the Russians have attacked, have engaged, in a cyberattack on the DNC and the DCCC.”

For Rep. Dana Rohrbacher (R-Calif.), Russian involvement in trying to hack or access actual election systems around the country lacked any evidence. “We have seen article after article after article about how Russia is compromising the integrity of our election system, and Mr. Chairman, the panelists are just saying that is false,” Rohrbacher said. “We want our country to be safe, but we also don’t want to just continually vilify Russia and turning them into the bad guys. If we’re going to have integrity of our system, I think we have to look at home for real threats to the integrity of our voting system.”

Lofgren disagreed. “To downplay the role that the Russians have had in this is a huge mistake, when you take a look at what they did to the DNC and the DCCC,” Lofgren said, urging members to avoid making the discussion about hacking partisan. “If you attack one of the major parties, somehow that’s okay if it could be to your advantage,” she said. “I like to think if the Russians had attacked the Republican National Committee, Democrats would be as outraged as Republicans. It’s an attack on America. It’s not an attack on a party.”

The hearing came the same day that Guccifer 2.0, the hacker or hackers who have publicly taken credit for the hack of the DNC, issued a rambling statement about information security at a London cybersecurity conference where he was supposed to appear (he didn’t), according to Motherboard. Guccifer did release roughly 600 megabytes of documents containing information about DNC fundraising efforts and other Democratic planning documents at the conference, according to Politico.*

Correction: An earlier version of this article incorrectly stated that the documents released today by the hacker Guccifer 2.0 came from a Democratic contracting firm. We regret the error.

Source: 

This Is How We Know Congress Isn’t Really Serious About Election Fraud

Posted in alo, Cyber, FF, G & F, GE, LAI, LG, ONA, Prepara, PUR, Radius, Ultima, Uncategorized, Venta | Tagged , , , , , , , , , , | Comments Off on This Is How We Know Congress Isn’t Really Serious About Election Fraud

I Just Texted With the DNC Hacker…

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

The hacker or hackers working under the pseudonym “Guccifer 2.0” released another set of documents Friday, this time posting a series of documents that appear to have been stolen from the internal Democratic Congressional Campaign Committee network. The latest dump includes personal contact information for dozens of members of Congress, along with memos related to a campaign in Florida’s 18th Congressional District, and other internal DCCC documents, and is titled “Guccifer 2.0 Hacked DCCC.”

The hacker(s)’ site had been dormant for nearly a month before the DCCC documents were posted Friday evening, and over the last several weeks multiple news outlets have cited anonymous US government officials as saying that they believe the hacks are not the work of a lone hacker—as the hacker claimed in interviews with Vice News’ Motherboard and Mother Jones, among others—rather they’re the work of Russian intelligence groups or hackers working with the Russian government in an alleged effort to divide Democrats and aid Republican nominee Donald Trump.

On Wednesday, the New York Times reported that US government officials believe the hack, which was first publicly acknowledged by the Democratic National Committee on June 14, was much wider than initially thought, and could have targeted several Democratic political organizations along with the private email accounts of more than 100 Democratic Party officials and other groups.

Shortly after the documents were released Friday, Guccifer 2.0 answered a series of questions for Mother Jones via Twitter direct messaging. Here’s our semi-casual exchange:

At that point, the hacker(s) stopped communicating with me.

The initial release of hacked documents from the DNC, and the subsequent release of nearly 20,000 DNC emails and thousands of attachments by Wikileaks, showed signs that some Democratic Party officials did not like Bernie Sanders and discussed ways to undermine his campaign. The controversy led to the resignation of then-DNC Chairwoman Debbie Wasserman-Schultz and several other top party officials, and cast a shadow over the Democratic National Convention in Philadelphia. The DNC later publicly apologized to Sanders for “inexcusable” behavior of those officials.

The hacker(s) included a message about US elections along with the stolen documents posted Friday: “As you see the U.S. presidential elections are becoming a farce, a big political performance where the voters are far from playing the leading role. Everything is being settled behind the scenes as it was with Bernie Sanders. I wonder what happened to the true democracy, to the equal opportunities, the things we love the United States for,” the hacker(s) wrote. “The big money bags are fighting for power today. They are lying constantly and don’t keep their word. The MSM are producing tons of propaganda hiding the real stuff behind it. But I do believe that people have right to know what’s going on inside the election process in fact.”

View article – 

I Just Texted With the DNC Hacker…

Posted in alo, Cyber, FF, GE, LAI, LG, ONA, Radius, Uncategorized, Venta | Tagged , , , , , , , , , , , | Comments Off on I Just Texted With the DNC Hacker…

Hacker Reveals New Trove of DNC Documents and Answers a Few Personal Questions

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

The hacker using the handle “Guccifer 2.0” posted another set of internal Democratic National Committee documents Thursday, along with a series of answers to questions posed to him by journalists and others via Twitter. The hacker claims to be a male, working alone, and said “none of the US candidates has my sympathies.”

The new set of documents includes memos about foreign donations to the Clinton Foundation, details of attacks on Hillary Clinton posted on Twitter by Republicans, spreadsheets with political action committee financial commitments (along with the email and phone numbers for the PAC lobbyists), and other DNC materials.

This is the third release from the hack. The first went public on June 15 in response to a Washington Post story from the previous day in which it was announced that the DNC, and perhaps Hillary Clinton’s campaign itself, had been hacked. The hacker released an alleged DNC opposition research file on presumptive GOP nominee Donald Trump on June 15 and also posted a batch of other internal DNC files concerning notes, research on opponents (from both parties), positions on various issues, and information related to DNC donors to a WordPress blog site. In that post, the hacker claimed he was working alone and had been within the DNC’s computer system for a year before getting booted on June 12. He then claimed to have downloaded thousands of documents and passed them to WikiLeaks.

He also mocked the cybersecurity firm CrowdStrike, which had been brought in to handle the DNC hack and analyze its source. CrowdStrike said the hack was likely the work of hackers working with, for, or in collusion with the Russian government, a claim the Russian government denied to the Post. The paper reported that the hack appeared to be Russian, based on tools used in the attack, and that the Russians might be using this to help Trump.

The DNC has never confirmed the authenticity of the documents, but metadata associated with them, and some of the information within them, points to their authenticity. The DNC declined to comment on Thursday but said in a statement sent to Mother Jones after the hack was first revealed that it was all the work of the Russian government.

“Our experts are confident in their assessment that the Russian government hackers were the actors responsible for the breach detected in April, and we believe it may be a part of a disinformation campaign by the Russians,” a senior DNC official said.

In an interview with Vice News’ Motherboard on June 21, the hacker claimed he was working alone and was Romanian, not Russian. That same day, the hacker posted 261 new documents, including research on presidential candidates and talking points on Clinton controversies such as Benghazi.

On June 22, the hacker modified his Twitter account to allow questions to be sent via Twitter’s direct message system, saying he would answer them all at once. The hacker posted those answers Thursday in a post titled “FAQ FROM GUCCIFER 2.0”:

On where he’s from: “I can only tell you that I was born in Eastern Europe. I won’t answer where I am now.”
On suspected links to Russian intelligence: “I’ll tell you that everything I do, I do at my own risk. This is my personal project and I’m proud of it. Yes, I risk my life. But I know it’s worth it. No one knew about me several weeks ago. Nowadays the whole world’s talking about me. It’s really cool!” The hacker added that he’d never be able to prove he wasn’t affiliated with Russian intelligence, and he said cybersecurity firms like CrowdStrike have “no other way to justify their incompetence and failure” than to accuse Russia. “They just fucked up! They can prove nothing!”
On his gender: “I’m a man. I’ve never met a female hacker of the highest level. Girls, don’t get offended. I love you.”
About his political views and possible Trump support: “I don’t want to disappoint anyone, but none of the candidates has my sympathies. Each of them has skeletons in the closet.” He says he views Clinton and Trump differently: “Hillary seems so much false to me, she got all her money from political activities and lobbying, she is a slave of moguls, she is bought and sold;” Trump “has earned his money himself” and “at least he is sincere in what he says.” But, he added, he doesn’t support Trump: “I’m totally against his ideas about closing borders and deportation policy. It’s nonsense, absolute bullshit.”
On Bernie Sanders: “I have nothing to say about Bernie Sanders. It seems he never had a chance to win the nomination as the Democratic Party itself stood against him!”

The hacker also said he hopes he doesn’t get caught by the FBI, “but it won’t be that easy to catch me.” The FBI hasn’t responded to a request for comment on Thursday.

Continue reading here:  

Hacker Reveals New Trove of DNC Documents and Answers a Few Personal Questions

Posted in alo, Cyber, FF, GE, LAI, LG, ONA, Radius, Uncategorized, Venta | Tagged , , , , , , , | Comments Off on Hacker Reveals New Trove of DNC Documents and Answers a Few Personal Questions

Map of the Day: We Have Met the Enemy, and the Enemy is Squirrels

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

The American electrical grid remained under sustained assault in 2015 from squirrel attacks. The Obama administration, feckless as always, failed to understand the threat and protect the American people. If they refuse to even say the words “evolutionarily maladapted squirrels,” what chance do they have of defeating the enemy?

Originally posted here:  

Map of the Day: We Have Met the Enemy, and the Enemy is Squirrels

Posted in Cyber, FF, GE, LG, ONA, Uncategorized, Venta | Tagged , , , , , , , , , | Comments Off on Map of the Day: We Have Met the Enemy, and the Enemy is Squirrels

The Pentagon Is Preparing to Go to War With ISIS…on Twitter

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

Sen. Marco Rubio (R-Fla.) complained at last week’s GOP presidential debate debate that the United States isn’t doing enough to beat ISIS in the online propaganda battle. “Every war we have ever been involved in has had a propaganda informational aspect to it,” he said. “ISIS is winning the propaganda war.”

That’s probably true: Not only is ISIS skilled at recruiting people online, but the group’s huge, sophisticated video operation and its products are now a hallmark of its brand of terror. The US government’s efforts to counter that machine, led by the State Department, have mostly been a laughingstock. Now the diplomats are getting reinforcements from the Pentagon, which recently got approval to conduct its own online propaganda efforts against terrorist groups and their sympathizers.

Continue Reading »

Read the article – 

The Pentagon Is Preparing to Go to War With ISIS…on Twitter

Posted in Anchor, Casio, Cyber, FF, GE, LAI, LG, ONA, Radius, Ultima, Uncategorized, Venta | Tagged , , , , , , , , , , | Comments Off on The Pentagon Is Preparing to Go to War With ISIS…on Twitter

Hackers are messing with the oil and gas industry

Hackers are messing with the oil and gas industry

By on 18 Nov 2015commentsShare

The best part about an oil and gas addiction — besides all the pollution, environmental degradation, and crippling income inequality, of course — is how pathetically vulnerable it makes us to cyber attacks.

Say you’re a hacker. Pick a cool name — something like Krazy Keys or The Epidemic. Now, say you want to really fuck with the U.S. economy (you’re still reeling over those damn Starbucks cups). What better way to take down Uncle Sam than to target the slick, gooey oil that is his life blood? Fortunately for you, Cyber Satan, a growing number of oil and gas companies are making that pretty easy to do.

By connecting their infrastructure to the ever-expanding network of internet-enabled devices known as of the Internet of Things (check out our explainer video here), these companies are automating their operations and thus improving efficiency, but they’re also opening themselves up to cyber attacks. Here’s more from Motherboard:

The industry has a lot of different moving parts and processes, including pump control, blow-out prevention, and managing gas storage. Unexpected changes to these processes or the operations technology systems that run them can have a major impact like production stoppages or even damage to the infrastructure.

“Maybe the hackers’ intentions may not be to destroy something, but by not understanding the full picture of the system or what component of it they are messing with, they can have a real catastrophic effect,” said (cyber security expert Jasper Graham). This could be anything from bringing productivity to a standstill to disabling alarm systems or communications between workers on the field, which could put their safety at risk.

Already, there have been a number of attacks on oil companies around the world. In 2012, a group called The Cutting Sword of Justice (real name) attacked Saudi Aramco, partially or fully wiping files on 35,000 computers, Motherboard reports. The hackers didn’t manage to tamper with any pumping or drilling operations, but the company did have to temporarily shut down all of its computers. And last year, dozens of oil companies in Norway fell prey to unidentified internet marauders. Even Anonymous is getting in on the action, according to Motherboard. The notorious hacking group targeted gas stations earlier this year.

Unfortunately, oil and gas companies aren’t the only ones failing to protect themselves against cybersecurity threats. The Internet of Things is taking over a lot of our infrastructure, and most of that infrastructure isn’t ready to take on hackers. On the plus side, the oil industry is pretty evil, so as long as Queen Crypto and The Wackadoodle aren’t hurting anyone or creating serious economic mayhem, more power to them. And besides, the environmental movement is always in desperate need of a little badassery. These Hackers might just do the trick:

Source:

The Internet of Things Is Making Oil Production Vulnerable to Hacking

, Motherboard.

Share

Please

enable JavaScript

to view the comments.

Find this article interesting?

Donate now to support our work.

Get Grist in your inbox

Advertisement

See the article here: 

Hackers are messing with the oil and gas industry

Posted in Anchor, Cyber, FF, GE, LAI, ONA, PUR, Radius, Uncategorized | Tagged , , , , , , , , , , | Comments Off on Hackers are messing with the oil and gas industry

The World Will Be Watching Burma’s Election This Weekend. Here’s What You Should Know.

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

The people of Burma will head to the polls on Sunday in the Southeast Asian country’s first general election since a brutal military dictatorship stepped down from power four years ago. Here’s what you should know about Burma’s political situation and why the world is tuning in this weekend to see what happens:

Where is Burma? Burma—or Myanmar, as it’s also known—is a Buddhist-majority country almost the size of Texas, nestled between China and India. The country of 51 million people was once seen as the rice bowl of Southeast Asia, but during nearly half a century of dictatorship it became the region’s poorest country. Successive military regimes waged more than a dozen bloody wars against ethnic minorities—including the Karen people along the border with Thailand, as reported by Mother Jones‘ Mac McClelland—in addition to locking up thousands of journalists and political activists, and closing off the country from the international community. After a violent crackdown on activists in 1988, Burma made global headlines, and one of its main pro-democracy activists, Aung San Suu Kyi, shot to international acclaim, winning the Nobel Peace Prize in 1991.

Why is this election such a big deal? On Sunday, Burmese citizens will vote for lawmakers who will select Burma’s next president in 2016. It is expected to be the most credible general election the country has seen since before dictator General Ne Win seized power in 1962. (The last general election, in 2010, was rigged in favor of the military-backed party; the one before that, in 1990, was fair and led to a landslide victory for Suu Kyi’s opposition party, but the results were annulled by the junta and many pro-democracy politicians were imprisoned.)

In 2011, Senior General Than Shwe, who became the dictator in 1992, allowed a quasi-civilian government to take control. The new government, led by President Thein Sein, a prime minister under Than Shwe, embarked on a platform of reforms: It released hundreds of political prisoners, abolished prepublication censorship, and allowed Suu Kyi to run for parliament. The US government and other Western countries applauded the reforms by easing economic sanctions and re-engaging diplomatically with Burma. Companies like Coca-Cola and Gap Inc. rushed in to take advantage of the last untapped market in the region.

Governments (and corporations) around the world will be watching this election closely because they see it as a litmus test for Burma’s overall transition from dictatorship to a more democratic system, and an indicator of how stable the political and business landscape will be in coming years.

How “free and fair” will the vote likely be? The country’s army chief, Senior General Min Aung Hlaing, has publicly vowed to respect the results, and international observers have come from Europe and the United States to monitor the election. But the run-up to the vote has not been without problems. The country’s election commission is chaired by a former military leader. Suu Kyi, whose party is expected to see major gains in parliament, has said the voter lists contain “many, many errors” that will prevent her party’s supporters from casting their ballots. (Many eligible voters were not included on lists, while others who should be ineligible—because they’re dead—were.) As of Wednesday, the election commission was still struggling to finalize voter lists.

An estimated 4 million people—or more than 10 percent of the eligible voting population—will not be able to vote, whether because they lacked information to register or because they live in areas where it wasn’t possible for them to do so. In western Burma, a stateless group of persecuted people known as the Rohingya have been officially disenfranchised. In other conflict zones, ethnic minorities will not be allowed to participate in the election either, due to safety concerns and a failure to cooperate with armed rebel groups. And analysts say residents in rural areas who have registered to vote are likely to follow the orders of pro-military village chiefs when it comes time to choose their candidates.

Nationally, a lack of voter education is also a concern. A study last year found that 44 percent of Burmese respondents incorrectly believed the president would be chosen directly by the people, rather than by lawmakers, while 36 percent said they did not know how the president would be chosen. “Access to information in many parts of the country is poor, while bans placed on campaigning are stifling the people’s ability to make informed decisions and exercise their voting rights,” Bo Kyi, a former Burmese political prisoner who leads an advocacy group in Thailand, tells Mother Jones. “For a free and fair election to occur, there has to be freedom of expression, adequate access to information, and freedom from fear.”

How democratic is the country today? Unlike changes in governments in the Middle East during the Arab Spring, Burma’s political transition has been top-down. Starting as early as the 1990s, Than Shwe and his regime began making plans to eventually allow a quasi-civilian government to take over. Now, though he’s no longer in the limelight, Than Shwe (and other military heavyweights) want to control how far the transition goes (and they say they’re aiming for a “disciplined democracy.”) Last week, President Thein Sein said the country had seen enough political change. “We have changed from a military regime to a democratic government elected by the people,” he told supporters. “What more change do you want? If you want more, go for communism. Nobody wants communism, do they?”

The current government is dominated by former generals, and so is the parliament. In fact, 25 percent of seats in the legislature are reserved for unelected military representatives. That’s a big problem for reformers, because more than 75 percent of lawmakers are needed to approve any amendment to the military-drafted constitution, which gives the military special privileges in politics.

The constitution also makes Suu Kyi, the country’s most popular politician, ineligible for the presidency because her late husband was British and so are her two sons. Suu Kyi says she plans to lead the government if her party comes to power in the election, despite the constitutional ban. “Should you have to be president to lead a country?” she asked. “I will be above the president,” she told reporters in Rangoon this week, without offering concrete details. The election results aren’t expected until about two weeks after the vote, and parliament won’t decide on a president until next year, so until then, we’ll have to wait and see whether her plan plays out.

Why does the United States care about Burma’s election? To encourage reforms after the dictatorship stepped down, the United States eased economic sanctions that it had imposed on Burma in the 1990s. The Obama administration also installed a US ambassador in Burma and handed over hundreds of millions of dollars in development assistance. According to Ben Rhodes, a US deputy national security adviser and a confidante of Obama, the election this weekend will be an important factor in America’s decision about whether to fully normalize relations with Burma, including by lifting remaining sanctions.

In the United States, the Democratic Party also has something at stake in the election: In 2012, Obama became the first sitting US president to ever visit Burma, and he returned again in November last year. Hillary Clinton also visited twice during her tenure as secretary of state, and she’s touted US policy there as an example of her successful leadership. Burma’s election—and the extent to which it’s free and fair—will reflect in some ways on her foreign policy chops as she makes her bid for the White House. (For more on this, read my recent story about Clinton’s legacy in Burma.) The vote could have broader ramifications for American policy in the region, too. Given its strategic geographical position between China and India, Burma has been crucial in the US pivot to Asia. As Clinton explained in her 2014 memoir, “a meaningful reform process could become a milestone in our pivot strategy, give a boost to democracy and human rights activists across Asia and beyond, and provide a rebuke to authoritarian government.”

How can I find out about the results of this election and what they mean? Check out the English-language websites of Burmese news organizations like the Irrawaddy magazine (where I worked before joining Mother Jones), the Democratic Voice of Burma, or Myanmar Now, supported by the Thomson Reuters Foundation. Look for reports by Reuters and the Associated Press, which have consistently broken investigative stories about Burma’s political transition since 2011. On Twitter, watch for updates from journalists like Timothy McLaughlin and Andrew R.C. Marshall from Reuters, Thomas Fuller from the New York Times, Jonah Fisher from the BBC, Thin Lei Win from Myanmar Now, Poppy McPherson from Coconuts Yangon, or Burma-based freelancers Simon Lewis, Kayleigh Long, and Hanna Hindstrom. Also look for tweets by Burmese historian Thant Myint-U.

See the original post: 

The World Will Be Watching Burma’s Election This Weekend. Here’s What You Should Know.

Posted in alo, Anchor, Citizen, Cyber, FF, G & F, GE, LAI, Landmark, LG, ONA, Radius, The Atlantic, Uncategorized, Venta | Tagged , , , , , , , | Comments Off on The World Will Be Watching Burma’s Election This Weekend. Here’s What You Should Know.

Psycho-Cybernetics, Updated and Expanded – Maxwell Maltz

READ GREEN WITH E-BOOKS

Psycho-Cybernetics, Updated and Expanded

Maxwell Maltz

Genre: Self-Improvement

Price: $9.99

Publish Date: November 3, 2015

Publisher: Penguin Publishing Group

Seller: Penguin Group (USA) Inc.


Cybernetics (loosely translated from the Greek): “a helmsman who steers his ship to port.” Psycho-Cybernetics is a term coined by Dr. Maxwell Maltz, which means, “steering your mind to a productive, useful goal so you can reach the greatest port in the world, peace of mind.” Since its first publication in 1960, Maltz’s landmark bestseller has inspired and enhanced the lives of more than 30 million readers. In this updated edition, with a new introduction and editorial commentary by Matt Furey, president of the Psycho-Cybernetics Foundation, the original text has been annotated and amplified to make Maltz’s message even more relevant for the contemporary reader. “Before the mind can work efficiently, we must develop our perception of the outcomes we expect to reach. Maxwell Maltz calls this Psycho-Cybernetics; when the mind has a defined target it can focus and direct and refocus and redirect until it reaches its intended goal.” —Tony Robbins (from Unlimited Power) Maltz was the first researcher and author to explain how the self-image (a term he popularized) has complete control over an individual’s ability to achieve (or fail to achieve) any goal. And he developed techniques for improving and managing self-image—visualization, mental rehearsal, relaxation—which have informed and inspired countless motivational gurus, sports psychologists, and self-help practitioners for more than fifty years. The teachings of Psycho-Cybernetics are timeless because they are based on solid science and provide a prescription for thinking and acting that lead to quantifiable results. From the Trade Paperback edition.

Source: 

Psycho-Cybernetics, Updated and Expanded – Maxwell Maltz

Posted in Cyber, FF, GE, LAI, Landmark, ONA, Uncategorized | Tagged , , , , | Comments Off on Psycho-Cybernetics, Updated and Expanded – Maxwell Maltz