Archive for RB

The Mystery of Le Griffon: The First Great Lakes Shipwreck

The Mystery of Le Griffon: The First  Great Lakes ShipwreckAs the chilly winds of Halloween stir, tales of the paranormal come to life. In the darkest corners of Michigan’s history, a ghost story has lingered since the 17th century. It weaves a chilling tale around the 17th century French explorer René-Robert Cavelier, Sieur de La Salle. La Salle was, a man obsessed with discovering the mythical Northwest passage to China and Japan through the treacherous Great Lakes.

Le Griffon halloweenFirst full-sized sailing ship

La Salle commissioned the first full-sized sailing ship on the Great Lake, the Le Griffon. The Le Griffon was built at Fort Conti near Cayuga Island on the Niagara River in 1679. Le Griffon had a crew of 32, was armed with seven cannons and had a capacity of 45 tons. It was about 30 to 40 feet long and 10 to 15 feet wide.

The Le Griffon embarked from Ft. Conti on August 7, 1679. The explorers passed the Straits of Detroit on August 11, 1679 and arrived at Saginaw Bay on Lake Huron 25 August 1679. They then sailed north to Mishi-Mikinaak (Ojibwe) at East Moran Bay off the settlement of Mission St. Ignace.  On Sept. 2, 1679, the Le Griffon left St. Ignace and arrived a few days later at Detroit Harbor on Washington Island, near Green Bay.

La Salle traded with the local Pottawatomie tribe for furs and other goods. On September 18, 1679, La Salle dispatched the Le Griffon back to Niagara with six crew members and a cargo of furs. La Salle and the rest of his men continued their expedition by canoe.

Mysteriously disappeared

But the Le Griffon never made it back. It mysteriously disappeared somewhere in Lake Michigan. Leaving no trace of its fate. Some say it was sunk by a storm, and others claim the Jesuits sunk it, other say it was cursed by a witch or a griffin, a mythical creature that was half eagle and half lion.

The mystery of the Le Griffon has haunted generations of explorers, historians and treasure hunters. Some believe that the ship still sails the Great Lakes as a ghost ship, appearing and disappearing at will. Others think that it lies at the bottom of the lake, guarding its secrets and its treasure.

Final resting place

Numerous wrecks have been touted as the Le Griffon. However, none has been conclusively proven. Some of the most notable claims include:

It is said that the Le Griffon is a ghost ship. The is crew apparently heard chanting as she sails among the clouds on moonlit evenings. It has since been seen tracking a collision course with other vessels in Michigan Harbor, only to vanish before contact. Its wreck has never been definitively located.

How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Are You at Fault for the 23andMe Data Breach

Are You at Fault for the 23andMe Data Breach– Updated 10/28/2023- The data breach at 23andMe must be really bad. The data breach has drawn the attention (PDF) of a business loving GOP Senator.

A data breach has affected customers of the genomics firm 23andMe (ME). 23andMe is a U.S. biotechnology firm that offers genetic testing services to customers. Customers send a saliva sample to its labs and get back an ancestry and genetic predispositions report. The exposed information from this data breach includes full names, usernames, profile photos, sex, date of birth, genetic ancestry results, and geographical location.

23andMe data breachReports indicate that a hacker first posted the data breach on August 11, 2023. The hacker posted on the Hydra cybercrime forum. The hacker claimed to possess 300 terabytes of stolen 23andMe user data. The data re-emerged on October 2, 2023, when a hacker using the username “Golem” posted the records on the cybercrime forum BreachForums. The hacker openly made an anti-Semitic threat, boasting that it was a targeted attack on Ashkenazi Jews. The hacker claimed the data breach records contained “information on all wealthy families serving Zionism … You can see the wealthiest people living in the US and Western Europe on this list.”

The data breach expands

23andMe data breachOn October 16, Golem claimed the data contained “samples from hundreds of families, including the royal family, Rothschilds, Rockefellers, and more.” The reference to the Rothschilds, a subject of antisemitic conspiracy theories, echoes Golem’s previous publication of 23andMe records allegedly focused on people of Ashkenazi Jewish descent.

23andMe spokesperson Andy Kill told TechCrunch in an emailed statement that the company was made aware of this new leak and that it is “reviewing the data to determine if it is legitimate.

23andMe blames customers for data breach

On October 6, 23andMe announced that hackers behind the data breach had obtained some user data. They claimed that to amass the stolen data the hackers used credential stuffing. Credential stuffing is a common technique where hackers try combinations of usernames or emails and corresponding passwords that are already public from other data breaches.

In response to the data breach, 23andMe urged their users to change their passwords and enable multi-factor authentication. On its official page addressing the data breach, 23andMe blamed the incident on its customers for reusing passwords and DNA Relatives. DNA Relatives is an opt-in feature the firm offers. It allows users to see the data of other opted-in users whose genetic data matches theirs. If a user had this feature turned on, it could allow hackers to scrape data on more than one user by breaking into a single user’s account.

Splitting hairs

23andMe stated it didn’t find any evidence of a “data security incident” because the information hackers gathered was available to opted-in users. But putting the burden on consumers to protect their own sensitive data with strong passwords and careful management is wrongheaded, said Suzanne Bernstein, with the Electronic Privacy Information Center told WAPOIf 23andMe is collecting, storing and processing a tremendous amount of very highly sensitive personal data, I think at the end of the day they should take responsibility for that.” 

Data breach victims not protected

The type of information genetic testing companies like 23andMe collect is currently not protected by the Health Insurance Portability and Accountability Act (HIPAA). 23andMe still allows for third-party data sharing in its privacy policy.

How to Protect Your Data from Breaches

Now that your genetic data is probably in the wild for anyone to abuse, you should do the following:

  1. Choose unique, impossible-to-guess passwords.
    23andMe users should immediately change their passwords. The new password should be complex and never have been used on other sites. A better response would be to use a password manager.
  2. Next turn on two-factor authentication.
  3. Request to delete your data.
    A 23andMe customer can request to delete their information from the site. If you live in a state with a comprehensive privacy law company is required to do so.
  4. A 23andMe customer can request their information be deleted from the site. But during the account deletion process, 23andMe tells users that the company and its partner lab will hang onto your “genetic information, date of birth and sex,” after your account is deleted, per state and federal legal requirements, according to the Washington Post.

    This means that even after 23andMe deletes your account, it still retains potentially sensitive genetic information. Researchers have shown that so-called anonymous genetic data can in some cases be re-identified.

  5. Don’t share genetic information
    Sharing your genetics with a DNA database increases your risk of botched criminal procedure, discrimination from insurance companies and employers, and targeted attacks such as blackmail, privacy experts say.

rb-

Now that your entire family’s DNA is out there there is no getting it back.

 

How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Coffee is the Project Managers Secret Weapon

Coffee is the Project Managers Secret WeaponResearch has found that drinking coffee is just as good as exercise on your job performance. One cup of coffee improves your working memory as much as spending 20 minutes on a treadmill. Coffee can contribute to enhanced cognitive function, including working memory.

caffeine is a natural stimulantThe primary active compound in coffee, caffeine, is a natural stimulant. When consumed, caffeine blocks the action of a neurotransmitter called adenosine, which promotes relaxation and drowsiness. By inhibiting adenosine, caffeine promotes wakefulness and alertness, including enhanced cognitive functions like working memory.

Coffee Improves Working Memory

Working memoryWorking memory is key to our ability to function as a curious human being. It helps the learning process and makes it possible to store information, such as phone numbers or a shopping list, in the short term. Working memory has a significant impact on a project manager’s job performance. Working memory plays a crucial role in many cognitive tasks required to be a successful PM. Here are some ways in which coffee-enhanced working memory can affect your job performance:

Communications

Effective communication is at the core of being a project manager. Effective communication relies on listening, comprehending, and responding to information. A strong working memory capacity enables you to follow conversations, retain key details, and formulate thoughtful responses.

Problem-Solving

Problem Solving

Project managers are always solving problems and making decisions. Working memory is essential for holding and manipulating relevant information when analyzing problems and considering potential solutions.

Information Processing

Working memory is responsible for temporarily holding and manipulating information. As PMs, we need to process and remember information, such as instructions, data, and task sequences.

Learning and Adaptation

Learning new information and skills is a continuous process for PM’s. A good working memory facilitates the acquisition and retention of new knowledge, as it allows individuals to process, connect, and store information for future use.

Time Management

Time Management Time management involves planning and organizing tasks. Working memory helps in keeping track of deadlines, schedules, and task priorities, which is crucial for meeting project-related goals.

Creativity and Innovation

Project managers utilize creative problem-solving to keep projects moving forward.  Creative problem-solving and innovation require holding multiple ideas or concepts in mind, manipulating them, and exploring new connections. Working memory supports these processes, allowing for more innovative solutions.

Task Execution

Project managers must complete tasks efficiently. Completing tasks often involves holding intermediate goals or steps in memory while working toward a larger objective. Working memory assists in task execution and reduces the risk of errors.

Accuracy and Error Reduction

When individuals can hold and manipulate information more effectively, they are less likely to make mistakes or overlook critical details.

Stress Management

Project managers with strong working memory abilities may better manage stress and high-pressure situations by staying organized and focused during challenging times.

rb-

Coffee can improve working memory by increasing alertness, focus, and concentration, promoting faster information processing, and reducing mental fatigue. These effects make coffee the project manager’s secret weapon to boost job performance.

 

How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

What Native Americans Discovered Your Place First

Native Americans Discovered Michigan FirstColumbus Day marks the day when America was “discovered.” This is wrong. Columbus day ignores thousands of years of native Americans living in the Americas in favor of a Euro-centric narrative. The website Native-Lands attempts to document which native American people lived in your place before Columbus “discovered” them. 

Fort Pontchartrain du Detroit location in modern DetroitThe European history of Detroit says the first recorded contact between Europeans and the Great Lakes Indians occurred between 1534 and 1542, when Jacques Cartier of France explored the St. Lawrence River to discover gold or silver. In 1701 Antoine de la Mothe Cadillac founded Detroit. But this ignores the history of the Mound Builders who lived in the area before the Native American tribes.

The Detroit area has populated by as many as seven different native peoples before Columbus arrived.

The Peoria people are the descendants of those who created the great mound civilizations in the central U.S. 2,000 thousand years ago. Their territory ranged from Jefferson City, MO to Madison, WI over to Detroit and Toledo.

Native Lands

The Anishinabewaki native Americans populated a territory that stretched from Regina, Saskatchewan to Ottawa, Toronto, Detroit and Minneapolis.

Native Lands

Bodwéwadmi (Potawatomi) people lived in the Chicago area and ranged to Detroit, up the Door coast of Wisconsin and down the Mississippi river to near St. Louis MO.

Native Lands

Myaamia (Miami) native American people lived in an area that runs from the Door peninsula in Wisconsin down the Mississippi river into Kentucky and along the Ohio river to West Virginia and up to Detroit, on east into Ontario.

Native Lands

The Wyandot people call the eastern half of Michigan from the Mackinaw area down to Detroit and over to Cleveland their home.

Native Lands

Meškwahki·aša·hina (Fox) native people called Southeastern Michigan home. They inhabited the area from Detroit to Battle Creek, into Indiana and over to Toledo.

Native Lands

Mississauga people call the area around Lake Erie home. They ranged from Detroit east to London, ON, Buffalo NY, and Lake Ontario from Toronto to near Ottawa. Their range extended all the way to north Saulte Ste. Marie, CA on Lake Superior.

rb-

This Columbus Day, why not take some time and explore the cultures of the indigenous people who lived where you live before Columbus “discovered” America.

How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

U of M Data Breach: Is Your Information Safe

U of M Data Breach:  Is Your Information Safe– Updated 10/27/2923 – This data breach compromised 230,000 individuals according to the Detroit News.

If you attended the University of Michigan, your personal information is at risk. The media was full of stories about the U-M networks being shut-down at the beginning of the semester. Now we know at least one reason why. The U-M had to shut down its networks because the U.S. educational nonprofit National Student Clearinghouse (NSC) disclosed a data breach affecting UMich. The breach also impacted 890 other institutions using NSC services across the United States. Here is the complete list.

National Student ClearinghouseNSC said that attackers gained access to its MOVEit managed file transfer (MFT) server on May 30 and stole files containing a wide range of personal information. NSC reported the breach to the Office of the California Attorney General,

On May 31, 2023, the Clearinghouse was informed by our third-party software provider, Progress Software, of a cybersecurity issue involving the provider’s MOVEit Transfer solution

What personally identifiable information 

According to Bleeping Computer the personally identifiable information (PII) stolen includes names, dates of birth, contact information, Also compromised were Social Security numbers, student ID numbers. Finally they report and some school-related records (e.g., enrollment records, degree records, and course-level data) were also stolen.

What is the National Student Clearinghouse 

The National Student Clearinghouse provides educational reporting, data exchange, verification, and research services. They provide services to roughly 22,000 high schools and around 3,600 colleges and universities. The organization says its participants enroll roughly 97% of students in public and private institutions.

Who is behind the MoveIT data breach

The Clop ransomware gang is responsible for the extensive data-theft attacks that started on May 27. The attackers leveraged a zero-day security flaw in the MOVEit Transfer secure file transfer platform.

Starting June 15, the cyber criminals began extorting organizations that fell victim to the attacks, exposing their names on the group’s dark web data leak site. The cybercrime gang is expected to collect an estimated $75-100 million in payments due to the high ransom requests.

Reports have also revealed that multiple U.S. federal agencies and two U.S. Department of Energy (DOE) entities have fallen prey to MOVEit-related these data theft and extortion attacks.

 

How you can help Ukraine!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.