Showing posts with label phishing. Show all posts
Showing posts with label phishing. Show all posts

Sunday, June 13, 2021

Hacker Ways And The Decline of Language

Decadent thought leads to decadent language, which leads to even more decadent thought... and a vicious vortex of decay and corruption ensues. Is the process accidental or deliberate?

In "Politics And The English Language", George Orwell compares sloppy language to a sloppy drunkard.

"A man may take to drink because he feels himself to be a failure, and then fail all the more completely because he drinks. It is rather the same thing that is happening to the English language. It becomes ugly and inaccurate because our thoughts are foolish, but the slovenliness of our language makes it easier for us to have foolish thoughts." 
 
In 1945/1946, Orwell seemed to believe that the decline was reversible and clarity of thought and expression could be revived if writers and speakers made an effort and followed simple, critical rules such as:

i. Never use a metaphor, simile or other figure of speech which you are used to seeing in print.

ii. Never use a long word where a short one will do.

iii. If it is possible to cut a word out, always cut it out.

iv. Never use the passive where you can use the active.

v. Never use a foreign phrase, a scientific word or a jargon word if you can think of an everyday English equivalent.

vi. Break any of these rules sooner than say anything outright barbarous.

https://www.orwellfoundation.com/the-orwell-foundation/orwell/essays-and-other-works/politics-and-the-english-language/
 
Today, public speakers appear not to know the difference between a benefactor and a beneficiary, or between an expletive (noun) and something that is explicative (adj).  Badly written advertisements don't say what the advertiser intends: "Like you, my hands mean everything to me." "Report your allergy to your doctor."  "As a scientist, my dog..."  How supportive of vaccine acceptance is it for one Medicare coverage provider to be advertising, "With all the uncertainty of the virus AND VACCINE..."?
 
The one-time service to help copyright owners remove infringing copies of copyrighted works from the internet, MUSO writes about the predictive value of piracy , based on a study conducted in Europe.

They describe pirates as a bellwether, and explain (approximately) what a wether is... while decorously omitting the difference between a ram and a wether.  In a nutshell, a wether is castrated.
 
If one has to explain ones metaphor or simile, and if one cannot explain it fully, perhaps the metaphor is dead and the imagery stale. That said, I dropped the "nutshell" knowingly.
 
While MUSO  may or may not be pivoting to a marketing business,  the authorities in Canada seem to have less use for intellectual property pirates.

Legal bloggers Ken Clark and Lawrence Veregin  representing the combined intellectual property team of Aird and Berlis LLP and Aird and McBurney LP predict the beginning of the end of online piracy in Canada, and describe how Take Down and Stay Down will work --in Canada-- via real time site blocking.


https://www.airdberlis.com/insights/blogs/thespotlight/post/ts-item/the-beginning-of-the-end-of-online-piracy-in-canada

On hacking, Mary B. Ramsay and Grant P. Dearborn of  Schumaker Loop and Kendrick discuss the devious ways of Hackers and the risk from phishers phishing. Never give your email address and PW in order to open an attachment, even if it appears to have come from your better half or significant other.
 
There is a story involving far greater effrontery than that shown by all those young men who make telephone calls to seniors in the hope that the senior victim will find it plausible that he or she has a grandchild in immediate financial distress... but with access to Bitcoin or Western Union.

Lexology link
https://www.lexology.com/library/detail.aspx?g=06214f43-8b53-46d1-9281-076a4569a61a

Original link:
https://www.shumaker.com/latest-thinking/publications/2021/06/client-alert-the-risk-from-phishing


The news has covered the Colonial Pipeline and the JBS meat packer hacks but less has been said about the hacking of iConstituent, perhaps because the latter is less inconvenient to the public.

Apparently, according to at least two sources, sixty members of the US Congress have been hacked or phished, and as a result they lost their access to iConstituent.  If you notice a pause in the begging letters and emails, you might infer that your Congressperson's internet hygiene is --or was-- substandard.  Maybe if your trusted Congressperson sends you an attachment or link, you should not open it or click through.
https://www.independent.co.uk/news/world/americas/us-politics/congress-ransomware-attack-internet-latest-b1861759.html

On that happy note...

All the best,

Rowena Cherry   

Sunday, January 29, 2017

Other People's Faces...and Stuff.


The most interesting copyright-law related blog of the week was penned by Kimberly Buffington of Pillsbury Winthrop Shaw Pittman LLP.  The cautionary tale concerns a young lady who was photographed without her knowledge or consent while she was eating. A photographer emerged from hiding and asked her to sign a waiver, giving him permission to make use of her likeness, and she refused.

Six years later, the young lady started to see her unmistakable likeness on posters in franchise outlets of that same restaurant. What is more, some posters had been photoshopped to make it look like she was partying with alcohol and other people.

Curious? Follow this link for the skinny.
Link

And in case that did not work for you:
 http://www.lexology.com/library/detail.aspx?g=64d455f5-e1ba-4637-9b95-9235d395232b&utm_source=Lexology+Daily+Newsfeed&utm_medium=HTML+email+-+Body+-+General+section&utm_campaign=Lexology+subscriber+daily+feed&utm_content=Lexology+Daily+Newsfeed+2017-01-23&utm_term=

I think the young lady has a point. What if her career depended on teetotalism? What if one of the other persons--and any of his apparent acquaintances--turns out to be of interest to the authorities?

Not only does this cautionary tale warn anyone who uses for commercial purposes the photographs they have taken, it also inspires my imagination with at least three stories. Which reminds me of The Rumpelstiltskin Problem by Vivian Vande Velde.  (Google Books cannot find reviews, but there are plenty on GoodReads.com).

It is not quite too late to submit your comments on the qualities and passions you'd like to see in the next Register of Copyrights.

Opine here. https://www.research.net/r/RegisterOfCopyrightsNR

One of the most important points to consider making (perhaps) is that additional weight ought to be given to the unique and thoughtful responses from creative persons who depend on copyright protections of their own work for their livelihood.

Finally, one can no longer rely on glaringly bad spelling and grammar to flag phishing attempts and spoof emails. Beware. This week, I've been bombarded with some clever ones purporting to tell me that I have purchased some very expensive sporting gear celebrating a certain Florida football team named after a large member of the cat family.

All the best,

Rowena Cherry