Pages

Saturday, June 19, 2021

The 150-Amp Power Box-A Cautionary Tale

 

    A little after 4:00 PM yesterday, our 150-amp power box came online. We were in hopes of activating the solar power system late in the afternoon. This will not happen until Monday because it was too late in the afternoon for the solar power people to come out.

      Am I relieved to see all this come together after 18 months? Of course, I feel relieved. Do I feel joyous that this great project is coming to fruition?

      What unfolded from 08:30 in the morning until after 4:00 PM is a cautionary tale about the future. Three huge trucks, numerous support vehicles and a crew of up to 6 men were employed to make this happen. Travel along our street was disrupted. Our power was cut off all day long. Our generator went right to work and kept us with electric power all day long. Some of our neighbors were not so fortunate. Elena and I did not have to pay the bill for this operation. I would not like to know how much it cost Pacific Gas and Electric.

       The 150-amp power box is "the wave of the future." Homes and apartments will need additional electric power to support charging of electrical vehicles and new electrical appliances coming online. (Environmentalists are demanding that natural-gas appliances and heating systems be eliminated.) It is sobering to consider the resources that will have to be employed to do this changeover.

      We have another big challenge coming as temperatures rise. People will rely more and more on cooling devices like air conditioners. Power grids will be strained beyond their limits. You will have frequent power blackouts and load shedding. Alternate ways of generating power such as solar and wind will have to come online and fast. Nuclear power will come into play. Bill Gates and his foundation have designed a new nuclear reactor that is cost effective and quite safe.

Thursday, June 17, 2021

In Praise Of The Australian Television Series The Gloaming

 

I spent 4 years and five months of my life in Australia. I came to love the Australian television and film industry. They are gutsy, creative, original, and unique. The cable network Starz is now showing a brilliant Australian series filmed on the island of Tasmania. It is called The Gloaming. Here is a quick summary of the show:

 

https://www.imdb.com/title/tt8610212/?ref_=nv_sr_srsg_0

   

     This series is a combination of a murder mystery and a horror story. It has brilliant acting, cinematography, writing, etc. It captures the wild and primitive nature of this island, not normally a major tourist destination. It has a large budget. As good as Australian TV can be, this series has exceeded all expectations!

Wednesday, June 16, 2021

The Symbolic Relationships Between Russia And Cybercriminals

 

ASSESSMENTS

The Symbiotic Relationship Between Russian Officials and Cybercriminals

10 MIN READJun 16, 2021 | 09:00 GMT

Fuel holding tanks are seen at Colonial Pipeline's Linden Junction Tank Farm on May 10, 2021, in Woodbridge, New Jersey.

Fuel holding tanks are seen at Colonial Pipeline's Linden Junction Tank Farm on May 10, 2021, in Woodbridge, New Jersey.

(Michael M. Santiago/Getty Images)

Editor's Note: This security-focused assessment is one of many such analyses found at Stratfor Threat Lens, a unique protective intelligence product designed with corporate security leaders in mind. Threat Lens enables industry professionals and organizations to anticipate, identify, measure and mitigate emerging threats to people, assets, and intellectual property the world over. Threat Lens is the only unified solution that analyzes and forecasts security risk from a holistic perspective, bringing all the most relevant global insights into a single, interactive threat dashboard.

As illustrated by recent cyberattacks, Russia maintains a mutually beneficial strategic relationship with cybercriminals to exploit their comparative advantages and minimize the fallout from their actions, giving Russia an asymmetric means to punch above its weight and complicate a Western response. Since May, criminal groups allegedly based in Russia carried out two major ransomware attacks against private U.S. critical infrastructure companies Colonial Pipeline and JBS Foods, the latest in a much longer string of cyberattacks against private and government targets worldwide. These operations frequently enjoy Moscow's tacit toleration and unspoken assurance that perpetrators are protected from Western law enforcement, and in some cases they enjoy its direct support.

  • Russian authorities' collusion with cybercriminals dates back to the fall of the Soviet Union, when a combination of factors — including the almost nonexistent rule of law, the emergence of a highly skilled but underemployed or unemployed technical workforce, frustration among rank-and-file intelligence officers, and a need to find new means to project power abroad — provided a permissive environment for opportunistic cooperation. Over time, this ad hoc collaboration became more routine, and in some cases even formalized.
  • Russian cybercriminals have come to be seen as some of, if not the most, technically proficient, tactically aggressive and monetarily successful malign cyber actors. U.S. cybersecurity firm Recorded Future estimates that of the 25 ransomware groups it tracks, 15 — including the five largest — are believed to be based in Russia or elsewhere in the former Soviet Union. A 2017 survey by the well-known Russian cybersecurity company Kaspersky Lab found that Russian-speaking cybercriminals were behind three-quarters of ransomware strains active at the time.
  • The current relationship between state officials and criminals is opaque and muddied by the fact that Russian cyber operations can often serve both criminal and strategic ends. For instance, in 2014 Russian intelligence officers recruited a cybercriminal, Aleksey Belan, to help steal information from more than 500 million Yahoo accounts; the officers then exploited the data for intelligence value while Belan profited from selling it on online criminal marketplaces.

Russian security services directly co-opt, implicitly condone and/or forcibly coerce cybercriminals' activities to facilitate their complicity and redirect the potential threat they pose domestically. In Russia and other former Soviet states, there is a mismatch between the high number of technically proficient individuals and the low number of legal jobs offering adequate pay. Recognizing that having a large group of frustrated workers with cyber skills poses a domestic threat, the Kremlin is widely acknowledged as condoning cybercriminals so long as they do not target Russian citizens or interests — explaining why Russian cybercriminals frequently use malware that will not install on computers with Russian-language keyboards — thereby shifting abroad the risk they might otherwise pose at home. As part of this bargain, there are three main ways in which Russian authorities facilitate cybercriminals' connivance:

  • Directly co-opting. In some cases, as in the Yahoo attack, there is direct collusion between the two groups. In 2019, U.S. authorities accused Maksim Yakubets, the co-leader of a cybercriminal group known as Evil Corp, of directly working with Russian intelligence agencies that tasked him with projects for the Russian state, including acquiring confidential documents and conducting criminally lucrative cyberattacks.
  • Implicitly condoning. More frequently, there is no direct collaboration between the two, but an implicit understanding that cybercriminals can operate and will be protected from the reach of foreign authorities so long as they do not cross certain "red lines" — chiefly, not targeting Russian citizens or interests — and act in ways that support or dovetail with Kremlin priorities. U.S. cybersecurity firm Advanced Intelligence revealed a chat made on the dark web from a user who apparently is Russian that "Mother Russia will help you. Love your country and nothing will happen to you."
  • Coercing. Russian authorities also allegedly at times force criminals to work on their behalf or face some penalty. In most cases, this transpires when Russian authorities offer a criminal a chance to avoid prison in exchange for conducting work on behalf of the state. According to rumors, in some cases Russian officials have even exerted physical or extralegal pressure on criminals and/or their families.

Supplementing security services' internal capabilities with those of criminals gives authorities an asymmetric means to sustain the Kremlin's perceived great power status and undermine the West. Russian officials' widespread corruption, politicized enforcement of laws, connections to criminal organizations and at times direct engagement in criminal activities enable and even encourage security services to work with cybercriminals. This collaboration, which would be impossible in Western countries that are the primary targets of their malign activities, gives Russian intelligence agencies a way to overcome strategic disadvantages and conduct more effective foreign cyber operations that support the Kremlin's sense of great power standing and ultimate foreign policy priority of weakening the West.

  • Reverse tech setbacks. Despite its long-held ambitions, Russia has been unable to develop domestic tech champions that can compete globally, in large part because — aside from a few close allies with small markets — most foreign entities refuse to use Russian tech because they assume it is linked to the country's security services. Using technically adept criminals to conduct operations abroad not only provides an external outlet for their malign skills, but also facilitates industrial espionage operations that Russian authorities see as key to overcoming domestic tech challenges.
  • Reduce resource burdens. Effectively outsourcing some of their work to what amounts to third-party subcontractors allows Russian security services to minimize costs, time and other resource outlays. Proxies require little technical support and can mobilize fairly quickly, particularly in comparison to official intelligence officers, who are then freed up to focus on other priorities, including putting cybercriminals' activities to strategic effect.
  • Sidestep strategic shortcomings. Engaging with cybercriminals gives Russia a way to make up for its comparatively weaker economic and military position against the West. Economically, Russia's global heft is largely confined to natural resource exploitation and, while its military remains formidable, there are clear limits on its utility, especially outside its regional area of influence. Facilitating cybercriminal activity offers the Kremlin a way to pursue through proxies a range of foreign operations it would otherwise struggle to carry out directly via its traditional levers of national power.
  • Provide plausible deniability. Providing a permissive environment for cybercriminals to operate enables Russian officials to portray their purely criminal actions as independent and their more sensitive intelligence-linked activities, such as foreign electoral interference, as "patriotically minded" and of their own initiative. Even in cases where there are more apparent links between the state and cybercriminals, the significant challenge of clearly proving collusion gives the Kremlin just enough space to deny complicity and/or raise doubt about the accusations to avoid accountability.

The symbiotic relationship between the Russian state and cybercriminals will be difficult to counter, requiring the West to consider both more attractive inducements and more aggressive penalties to catalyze Russian action. Given cybercriminals' ability to hide their identities and that they are based in locations beyond the reach of Western authorities, there are relatively few ways to hold them accountable. In fact, the few cases in which Western officials have disrupted a Russian cybercrime group — such as earlier in 2021 when a rare U.S.-Europol sting broke up a ransomware as a service gang known as "Bugatti" — illustrate the challenges. Shortly after the disruption, cybercriminals posting on a Russian-language dark web forum accused Bugatti of poor tradecraft, most notably by working with non-Russian affiliates who could be informants or undercover police and by not sheltering the ransomware servers in Russia, which they said would have protected the group. This clear reliance on, and expectation of, Russian protection suggests that rather than pursuing the criminals themselves, Western authorities could instead concentrate on changing Russian calculations — remaining cognizant that these options are imperfect, present tradeoffs and, even if successful, will take time to play out.

  • Agree on clear "red lines." At a minimum, all countries in theory have an interest in preventing ransomware attacks against critical infrastructure. Even if it would not address the still-damaging effects of ransomware attacks against less strategic targets and other criminal-led cyberattacks more generally, coming to an agreement on what constitutes unacceptable behavior in targeting critical infrastructure — which some ransomware groups allegedly have already forsworn — would at least establish a baseline to address the most pressing and debilitating cybercrime threat.
  • Link Russian action on cybercrime to reciprocal action on its priorities. Despite significant policy divergences, there are some areas where the White House could agree to act on the Kremlin's priorities in ways that could still serve U.S. interests in exchange for Russia tackling cybercriminals within its borders. Two possible areas include strategic stability and the Arctic, both of which encompass mutual interests but are topics on which Russia has recently sought greater U.S. engagement, which so far has not been forthcoming.
  • Collect stronger evidence to force action. Russia is able to shirk responsibility in large part because it can claim, regardless of veracity, that cybercriminals either operate on their own and/or hide their activities so well that authorities cannot crack down on them. Treating cybercrime not only as a law enforcement problem but also as a priority topic for intelligence agencies could uncover more damning evidence of either Russian government complicity and/or the details of cybercriminals' identities and whereabouts. This intelligence, which in some cases probably could use existing technical collection platforms and human assets but inevitably would require resource shifts, could then be used to try to strong-arm — possibly by threatening to "name and shame" — the Kremlin, which ostensibly seeks to portray itself as a responsible global power, to take action.
  • Expand recent executive and legislative actions. Recent executive orders open avenues for the Biden administration to impose an array of sanctions against Russian individuals and entities that engage in malign cyber activities. While initially conceived to respond to state-led intelligence operations like the SolarWinds hack and not yet used to target cybercrime, an April 15 executive order gives the White House the ability to take more aggressive measures, including sanctioning wider Russian economic interests, which probably stand more of a chance of forcing the Kremlin to act against cybercriminals than typical individually focused asset seizures and travel bans. Simultaneously, a series of cyber protection bills making their way through Congress — while focused on hardening defenses — may make it easier to attribute attacks and thereby offer more opportunities to collect valuable evidence and increase public pressure on Russia.
  • Threaten cyber retaliation. The United States could make it an explicit policy to conduct a proportionate — though not necessarily symmetric — cyber response to cybercrimes in which the hand of the Russian authorities is clear or in which they, through their inaction, enabled the perpetrators. While this option is inherently risky and it would be challenging to find appropriate targets, it could force the Kremlin to abandon the fiction that Russian cybercrime is purely criminal and cannot serve strategic ends. Given such a U.S. policy shift would escalate matters with Russia, it would be more likely to succeed if done in coordination with allies, both to maximize its operational impact and provide legitimacy.

Tuesday, June 15, 2021

Life Inside An Amazon Warehouse

 

Good morning. The Times is publishing a new investigation of life inside an Amazon warehouse.

An employee sorting items at JFK8, Amazon’s Staten Island warehouse.Chang W. Lee/The New York Times

‘Our nature as humans’

In his drive to create the world’s most efficient company, Jeff Bezos discovered what he thought was another inefficiency worth eliminating: hourly employees who spent years working for the same company.

Longtime employees expected to receive raises. They also became less enthusiastic about the work, Amazon’s data suggested. And they were a potential source of internal discontent.

Bezos came to believe that an entrenched blue-collar work force represented “a march to mediocrity,” as David Niekerk, a former Amazon executive who built the company’s warehouse human resources operations, told The Times, as part of an investigative project being published this morning. “What he would say is that our nature as humans is to expend as little energy as possible to get what we want or need.”

In response, Amazon encouraged employee turnover. After three years on the job, hourly workers no longer received automatic raises, and the company offered bonuses to people who quit. It also offered limited upward mobility for hourly workers, preferring to hire managers from the outside.

As is often the case with one of Amazon’s business strategies, it worked.

Turnover at Amazon is much higher than at many other companies — with an annual rate of roughly 150 percent for warehouse workers, The Times’s story discloses, which means that the number who leave the company over a full year is larger than the level of total warehouse employment. The churn is so high that it’s visible in the government’s statistics on turnover in the entire warehouse industry: When Amazon opens a new fulfillment center, local turnover often surges.

By The New York Times | Sources: U.S. Census Bureau, Quarterly Workforce Indicators; MWPVL International

Workers without power

The new Times story — by Jodi Kantor, Karen Weise and Grace Ashford — is full of fresh details, including internal company statistics, posts from internal message boards and interviews with Amazon workers and executives, both current and former. The story focuses on JFK8, a sprawling Staten Island warehouse, as it coped with the coronavirus pandemic and the surge in demand for online shopping.

If nothing else, I recommend you read the article to hear the story of the Castillo family. While Alberto Castillo, a 42-year-old husband, father and Amazon worker, was in the hospital suffering from Covid-related brain damage, the company sent him an email ordering him back to work. “Haven’t they kept track of what happened to him?” his wife, Ann, wondered.

My goal in today’s newsletter is to highlight a larger economic trend that Amazon reflects: Many Americans today are strikingly powerless while they are on the job. Their employers treat them as “an expendable work force,” to quote a phrase used by an Amazon employee in the story. They often lack the leverage to demand higher pay or different working conditions.

At Amazon, workers sometimes find out about a new shift only the day before, scrambling their family routine. When workers want to get in touch with human resources by phone, they must navigate an automated process that can resemble an airline customer-service department during a storm. Employees are constantly tracked and evaluated based on their amount of T.O.T., or time off task. One employee who had earned consistent praise was fired for a single bad shift.

Even so, work at an Amazon warehouse is often better than the alternative. JFK8 now pays at least $18.25 an hour, which translates to about $37,000 a year for a full-time worker. After decades in which pay has failed to keep pace with economic growth — except for the upper middle class and above — many blue-collar workers do not have a better option.

There is no reason to think American workers’ lack of bargaining power is on the verge of changing. Labor unions have a long track record of giving workers more power, but most Amazon employees have shown little interest in joining a union. A booming economy can also help workers, but its effects tend to be more fleeting.

‘Earth’s best employer’

In recent months, as Bezos has prepared to step down as chief executive, he has suggested that he wants to change Amazon’s workplace culture. “We have always wanted to be Earth’s most customer-centric company,” he wrote to shareholders in April. Now “we are going to be Earth’s best employer and Earth’s safest place to work.”

In response to The Times, Amazon said employee turnover was “only one data point” and that its internal surveys show high worker satisfaction. The company also said it was changing its policy so that workers would never be fired for one bad day.

Still, it is not at all clear that Amazon will change its basic approach to blue-collar work, because that approach has brought the company many advantages. The constant churning of workers has helped keep efficiency high and wages fairly low. Profits have soared, and the company is on pace to overtake Walmart as the nation’s largest private employer. Bezos has become one of the world’s richest people.

Many people want to believe that being a generous employer is crucial to being a successful company. But that isn’t always true.

Monday, June 7, 2021

"If You Don't Have A Past...You Can't Have A Future"

 

    When a television or a movie team really digs in and does their homework on a project, the greatest compliment that they get is:

    "Oh my gosh, that's what it's really like!"

    Elena and I have been aware of a great filmmaker named Steven Soderbergh since 1989. He "gives his all" on any project that he works on. Steve now has a series on Starz.

   Before we go any further, let me introduce a philosophical concept for you to reflect on as follows:

     "If you don't have a past, you can't have a future."

     Last night I watched a couple of episodes of the program. Carmen Ejogo portrayed a woman who has testified against major organized-crime people. She is placed in the Witness Protection Program run by the US Marshal's Service. The program has had great success with no person in the program being located by prior underworld connections or intelligence agencies of foreign governments. The few failures have come when someone in the program goes out and commits a new crime.

     A complete new identity with birth certificate, driver’s license, passport, work history, criminal record (if applicable), and credit history is created for the person. They stay in a safe house for a while. They move to a new community where they are provided housing and employment. Their life starts over. They can never have contact with prior friends or family members again.

    What was most fascinating is all the time and effort that the US Marshals take to get someone ready for their new life including using laptop computers for hypnosis. This is to teach the person to be, of all things, a great liar.

    This actress portrayed a woman who had a very-difficult time adapting to her new life. Please refer to the philosophical concept above.

Thursday, June 3, 2021

Greenland's Rare Earth's Come Into Play

 https://worldview.stratfor.com/article/fight-greenland-s-resources?mc_cid=22f0f1df68&mc_eid=1bd154cf7d