He and She

A Poem by Hans E. Holmgren (while camping with Patton’s 7th Army, 35 Artillery 1943-1946)

He asked Her if in all Her days,
She’s ever trod in sinful ways.
Or if she’d flirted with a beer,
And nursed a scotch if it was near?
She had.

He asked Her if She thought of love,
As something more than stars above.
And if She ever played with fire,
With one She knew was but a liar?
She did.

She asked Him if on a beach He’d tried,
To cool the beer in rising tide,
Or, if He’d ever welcome gin,
When over work had done Him in?
He had.

She asks Him if on weekend trips
He ever chanced those total slips.
Or, if He handed out a line?
He did.

They asked each other silently.
If They had views that did agree.
And if They both had read betwixt
The lines that each had inter mixed?
They had.

He gazed at Her, She gazed a Him.
And to them both a smile crept in
He took Her hand and squeezed it tight.
And led Her off into the night.
They did!

Drive-Bys Rocked by Swing State Polls – The Rush Limbaugh Show

would like to recommend the following article from Rush Limbaugh:

http://www.rushlimbaugh.com/daily/2016/05/10/drive_bys_rocked_by_swing_state_polls

Drive-Bys Rocked by Swing State Polls – The Rush Limbaugh Show

would like to recommend the following article from Rush Limbaugh:

http://www.rushlimbaugh.com/daily/2016/05/10/drive_bys_rocked_by_swing_state_polls

I got hacked mid-air while writing an Apple-FBI story

http://www.usatoday.com/story/tech/columnist/2016/02/24/got-hacked-my-mac-while-writing-story/80844720/

I got hacked mid-air while writing an Apple-FBI story

Steven Petrow, the journalist who had his computer hacked while on a flight, recounts his experience and what he learned. Video by Ryan Connelly Holmes for USA TODAY

“I don’t really need to worry about online privacy,” I used to think. “I’ve got nothing to hide. And who would want to know what I’m up to, anyway?”

Sure, I’m a journalist, but I’m not an investigative reporter, not a political radical, not of much interest to anyone, really.

That was last week, when the standoff between the FBI and Apple seemed much more about principle than practice to me. That’s when I thought I’d write a column on whether this legal fight matters to regular folk — people like my mother, a retired social worker; my best friend, who works in retail; or even my 20-year-old niece in college. That was before I found out — in a chillingly personal way — just why it does matter. To all of us.

Just before midnight last Friday, my plane touched down in Raleigh after a three-hour flight from Dallas. As usual, I’d spent much of the flight working, using American Airlines Gogo in-flight Internet connection to send and answer emails. As I was putting on my jacket, a fellow in the row behind me, someone I hadn’t even noticed before, said: “I need to talk to you.” A bit taken aback, I replied, “It’s late … need to get home.”

“You’re a reporter, right?”

“Um, yes.”

“Wait for me at the gate.”

[I didn’t answer, but I did wait.]

“How did you know I was a reporter?” I asked while we started walking.

“Are you interested in the Apple/FBI story?” he responded, ignoring my question.

“Kind of. Why are you asking me that?” I thought he was some kind of creepy mind reader.

Then he dropped the bombshell.

“I hacked your email on the plane and read everything you sent and received. I did it to most people on the flight.” He had verbatim detail of a long email that he repeated back to me essentially word for word.

In fact, as Steve Nolan, Gogo’s vice president of communications, told me, the service is “public” and “operates in the same ways as most open Wi-Fi hotspots on the ground.” He cautioned against “accessing sensitive materials while in flight.”

Gogo recommends that anyone sending sensitive information over any public WiFi network, including Gogo, use a virtual private network, or VPN, to protect their data, said CEO Michael Small.

One of my emails was pretty explicit about the focus of my story and I had emailed Bruce Schneier, a security expert who had previously written in the Washington Post about this very issue.

“The current case is about a single iPhone 5c, but the precedent it sets will apply to all smartphones, computers, cars and everything the Internet of Things promises,” Schneier wrote.

The danger is that the court’s demands will pave the way to the FBI forcing Apple and others to reduce the security levels of their smart phones and computers, as well as the security of cars, medical devices, homes, and everything else that will soon be computerized. The FBI may be targeting the iPhone of the San Bernardino shooter, but its actions imperil us all.”

That’s what my privacy-busting stranger had read. Back to my conversation:

“That’s how I know you’re interested in the Apple story,” he continued. “Imagine if you had been doing a financial transaction. What if you were making a date to see a whore?” My mind raced: What about my health records? My legal documents? My Facebook messages?

And then the kicker:

“That’s why this story is so important to everyone,” he told me. “It’s about everyone’s privacy.”

Then he headed down the escalator and I headed out the front door. I may have been wearing my jacket, but I felt as exposed as if I’d been stark naked.

With a newfound personal interest in the topic, the following day I called Alex Abdo, an attorney in the ACLU’s Speech, Privacy and Technology Project, to talk about why ordinary Americans should care about the Apple case. At first he told me some of what I knew. If the government wins it would set a “dangerous legal precedent … that would force companies to build back doors into their products. It will be used hundreds and hundreds of times if it becomes lawful.”

Abdo made it clear why this matters to ordinary consumers like me — to all of us. “The risk is that it makes it more likely that individuals’ devices with no connection to any investigation will become less secure because companies will have established back doors …. that will fall into the wrong hands.” For emphasis, he added: “No back door is secure.”

But really, I pushed him, who is in actual danger here? The answer, apparently, is pretty much all of us. “Anyone who relies on the security of their devices,” he told me.

It should be up to each of us to decide what to make public, and what to keep private, he continued. For me, I felt as though the stranger on the plane had robbed me of my privacy—as was explicitly his intent. He took the decision of what to share out of my hands. He went in through the back door of the Gogo connection.

Next Slide

THE TAKEAWAY:

I asked Abdo what we could to do protect our privacy. This is what he told me:

Agree or disagree with my advice? Let me know in the comments section below.

USA TODAY columnist Steven Petrow offers advice about living in the Digital Age. Submit your question to Steven at stevenpetrow. You can also follow Steven on Twitter: @StevenPetrow. Or like him on Facebook at facebook.com/stevenpetrow.


ENCRYPTION BATTLE: APPLE REFUSES FBI ORDER TO CREATE BACKDOOR TO THE IPHONEFBI fires back in its epic battle with Apple over encryption | 01:23It could be a pivotal week for stocks. A flurry of Federal Reserve officials will be speaking to various groups. Also the G20 meeting is scheduled later this week in China, where finance and economic leaders will discuss oil prices, economic growth Newslook

1 of 10


ENCRYPTION BATTLE: APPLE REFUSES FBI ORDER TO CREATE BACKDOOR TO THE IPHONEFormer NSA and CIA director on Apple, Trump and Hillary | 08:21Retired general Michael Hayden speaks with Washington Bureau Chief Susan Page about his new book ‘Playing to the Edge’ and weighs in on Apple’s case with the government, Donald Trump’s security policy and Hillary Clinton’s email scandal. Video by Jasper Colt and Ryan Holmes, USA TODAY

2 of 10


ENCRYPTION BATTLE: APPLE REFUSES FBI ORDER TO CREATE BACKDOOR TO THE IPHONEInside Editorial Board: Phone privacy vs. security | 09:50The Editorial Board struggles to answer the question: Should Apple be compelled to release the key that would allow the FBI to break into a known terrorist’s iPhone? Watch members debate long-term implications for privacy and the war on terror.

3 of 10


ENCRYPTION BATTLE: APPLE REFUSES FBI ORDER TO CREATE BACKDOOR TO THE IPHONEApple’s showdown with the FBI is about more than just iPhones | 02:37A judge ordered Apple to unlock a San Bernardino shooter’s iPhone. So what are the privacy implications? Video provided by Newsy Newslook

4 of 10


ENCRYPTION BATTLE: APPLE REFUSES FBI ORDER TO CREATE BACKDOOR TO THE IPHONEApple to Fight Order to Help FBI Unlock iPhone | 02:12Apple says it will fight a federal magistrate’s order to help the FBI hack into an encrypted iPhone belonging to one of the San Bernardino, California shooters. The company said that could potentially undermine encryption for millions of other users AP

5 of 10


ENCRYPTION BATTLE: APPLE REFUSES FBI ORDER TO CREATE BACKDOOR TO THE IPHONEHow Apple could break into San Bernardino killer’s iPhone | 00:45On Tuesday, a federal judge ordered Apple to help the FBI break into the iPhone of one of the killers in the San Bernardino, Calif., shootings. Video by Ryan Connelly Holmes for USA TODAY

6 of 10


ENCRYPTION BATTLE: APPLE REFUSES FBI ORDER TO CREATE BACKDOOR TO THE IPHONESounding off on Apple vs. government | 01:05Should the government be able to open a “back door,” to smartphones in the name of national security? Consumers sound off in Venice Beach, California.

7 of 10


ENCRYPTION BATTLE: APPLE REFUSES FBI ORDER TO CREATE BACKDOOR TO THE IPHONEApple ordered to break into killer’s iPhone | 00:43A federal judge has ordered Apple to help the FBI break into an iPhone belonging to one of the San Bernardino shooters. Wochit

8 of 10


ENCRYPTION BATTLE: APPLE REFUSES FBI ORDER TO CREATE BACKDOOR TO THE IPHONEJudge: Apple must help government break into terrorist’s iPhone | 01:07A California judge says Apple must help federal investigators crack the password protection on the iPhone of one of the San Bernardino shooters. Video provided by Newsy Newslook

9 of 10


ENCRYPTION BATTLE: APPLE REFUSES FBI ORDER TO CREATE BACKDOOR TO THE IPHONEApple Opposes DOJ, FBI Over Shooter’s iPhone Data | 03:08Apple has rejected a court order filed by the U.S. Department of Justice to unlock an iPhone belonging to one of the shooters involved in the San Bernardino, California terror attack. Bloomberg

10 of 10

Next Video

  • FBI fires back in its epic battle with Apple over encryption
  • Former NSA and CIA director on Apple, Trump and Hillary
  • Inside Editorial Board: Phone privacy vs. security
  • Apple’s showdown with the FBI is about more than just iPhones
  • Apple to Fight Order to Help FBI Unlock iPhone
  • How Apple could break into San Bernardino killer’s iPhone
  • Sounding off on Apple vs. government
  • Apple ordered to break into killer’s iPhone
  • Judge: Apple must help government break into terrorist’s iPhone
  • Apple Opposes DOJ, FBI Over Shooter’s iPhone Data

data communication techniques – special projects –

http://joenovell.com/

How the pantorouter works

The “Pantorouter” is a template guided router for cutting shapes in wood. The template is mounted on the frame above the router. A ball bearing on the pantograph mechanism is used to follow the template.

For those not familiar with pantographs, the lattice pictured at left should help explain. The six pieces of wood are connected with pins at the corners. The four areas inside this lattice each form a rhombus of equal dimensions.

Traitors – I have read about…

Hrc1234

HRC

Too bad the first one is a woman; Literally thrown out of the Nixon hearings, Partner in the Rose Law Firm, initiated Travel Gate by generating FBI attacks on an innocent family; making $1,000 (that’s a thousand dollar amount for those of you in MPLS, MN) kickback into $100,000 with a ‘brokered’ phone call; Bimbo Eruptions (google to see millions on links verifying the usage of this word), too many to mention here; Cradle to Grave Health Care; Benghazi Libya; Mysterious Video (Benghazi ruse in 2012, 2013, 2014, now not mentioned by a willing press corp); Outraged at Hearing (Methinks, she doth protest – too much!); 36 month drip drip drip of emails; Congressional hearing; FBI investigation; State Department investigation; House Hearing; Still waiting on email shoe to fall; No major accomplishments as Senator and Secretary of State; Middle East in absolute chaos as a direct result of her leadership; She hand-picked John Kerry as the worst possible Secretary of State, Ref: Iran Deal; Purse string control of Clinton Foundation; Billion dollar speaking fees, her and Bill; State Dept graft FBI probe; Sold 50% of US Uranium reserve to Russia; Spoke bad things of Bernie Sanders a Socialist; Does NOT like the 2nd Amendment, 1st Amendment, nor fond of the other eight.

Benarnold

Arnold, Benedict

Once the hero of 11 battles in the Revolutionary War. Promoted to Major General and Military Governor at Philadelphia. Later he betrayed George Washington and the Continental Army at West Point, NY.

His deeds proved fatal to British Major, John Andre, (caught using the name John Anderson, possessing the smuggled plans, in route to the British).

Arnold was ‘a man without a country’ as a result of his actions and aspirations.

“What a tangled web we weave, when we practice to deceive.”