Black Lives Matter Protest or Publicity Stunt?

Martin omalley interrupted by black lives matter protesters AP 640x480

Martin O’Malley was interrupted over the weekend, by some kind of black lives matter thing, during an interview with Jose Antonio Vargas.

Vargas is a Pulitzer prize winning, self admitted illegal alien, who is also the guy behind MTV’s “White People”.

O’Malley responded to the chant “Black Lives Matter” by saying, “All lives matter” at which point he was booed by the crowd.

He’s since apologized for saying all lives matter referring to his statement as “insensitive”. At this point the old record player in my head went SCRRRRAAAAAATTTTTCCCCHHHHH!

What the hell?

He needn’t have apologized for anything. He was the wronged party here. If anything the Black Lives Matter crowd owed him AND the people who filled the auditorium to hear what he had to say an apology. Unfortunately, this is no longer the polite country I used to live in.

Given Vargas’s involvement in “White People” I wouldn’t be surprised to learn that this was a publicity stunt on his part. This could all have been “theater” to boost ratings for a show that has been criticized for being a vehicle to simply “Shame” white people for the grievous sin of being born white.

There’s something familiar about that. Humm, Oh Yes! A while ago didn’t we all agree that skin color wasn’t a reason for shame?

Moving on…

There are too many questions for me about this bit of theater. First and foremost where was security? Second, why does the lady on stage look like she was expecting to BE on stage?

You’ve got a presidential hopeful on stage, a room full of people who are being subjected to a situation that in other cities has degenerated into riots and nobody thought to call the cops? Nobody thought to escort O’Malley and Bernie Sanders to a safe place?

As I’ve said before, if I’m somewhere these BULLSHIT Black Lives Matter protesters show up, I’m leaving. It may be their right to shout and scream their beliefs… But it’s MY right not to listen!

Does anyone else notice another implication here, or is it just me?  One could infer, people yelling, “Black Lives Matter” then booing “All Lives Matter” are implying no one else does.

This whole thing doesn’t pass the smell test. It feels like manipulation.


UPDATE 07/23/2015

Caught this piece from

http://www.phoenixnewtimes.com/news/tia-oso-protester-who-interrupted-martin-omalley-is-convicted-embezzler-7505469

All I could think was, “Only in America, or some Third World Countries.”

Apparently, I’m not the ONLY one who wondered if this whole thing was staged.


Tia Oso, Protester Who Interrupted Martin O’Malley, Is Convicted Embezzler

Jose Vargas, Tia Oso, and Martin O'Malley at Saturday's event.

Jose Vargas, Tia Oso, and Martin O’Malley at Saturday’s event.
YouTube

Anshantia “Tia” Oso, one of the protesters who interrupted a Town Hall event with presidential candidates Martin O’Malley and Bernie Sanders on Saturday, writes in a high-profile column today that she was the “right person” to lead the halting of the program.

Oso touts her many activist qualifications in the column, but she left one thing off her bio: her 2009 conviction for embezzling thousands of dollars from a nonprofit Valley arts organization.

Oso was among the demonstrators with the #BlackLivesMatter movement who approached the stage at the annual Netroots Nation conference in Phoenix about 20 minutes into the Q&A between event moderator Jose Antonio Vargas and former Maryland Governor Martin O’Malley.

Vargas, a Pulitzer Prize-winning writer and immigration activist who’s in a business partnership with the Los Angeles Times, invited Oso onstage and asked stagehands to bring her a mic. Instead of asking O’Malley a question right away, though, Oso gave a speech and directed the other demonstrators for the next 15 minutes. O’Malley blundered with his politically incorrect response to the demonstrators, “black lives matter, white lives matter, all lives matter.” The demonstrators later interrupted Sanders briefly, until the Vermont senator threatened to leave if they didn’t let him speak.

Oso followed the stunt with a column that appeared today on mic.com titled, “I Am the Black Woman Who Interrupted the Netroots Presidential Town Hall, and This Is Why.” She writes that she has much in common with Sandra Bland, the activist who died in police custody last week after being arrested during a traffic stop:

“We were both black women, active in our communities and the Movement for Black Lives. We both pledged sororities: I’m a Delta, Bland was a member of Sigma Gamma Rho. I have also been harshly confronted by police during ‘routine’ traffic stops and feared for my safety and my life. Reading about Bland, about her life and brutal killing, the accusation of suicide, I felt devastated and enraged.”

Oso goes on to say in her piece:

“I felt I was the right person to open the action and shift the focus of the program, especially in the context of the conference theme of “Immigration.” I am a native to Arizona, the child of a Nigerian immigrant father and African-American mother, whose parents were migrant farm workers, aka “Okies.” I also served for three years as the Arizona organizer (and continue to work as the National Organizer) with the Black Alliance for Just Immigration, the premier racial justice and migrant rights organization in the U.S.  As I shared in my remarks on Saturday, racial justice intersects with all progressive issues, especially immigration. Black immigrants experience a double oppression, as they must contend with both the reality of racial discrimination in America as well as its complicated and punitive immigration system.”

 

While her social-justice creds can’t be criticized, her leadership skills are stained by the fact that she once severely betrayed the trust of an employer.

Jose Vargas

Jose Vargas
YouTube

While working as the business manager for the Arizona Citizens for the Arts/Arizona Action for the Arts in 2007 and 2008, a job she includes in her online résumé, Oso issued checks to herself, made unauthorized withdrawals and made personal charges on the organization’s credit card. The theft occurred over the course of a year and totaled about $11,000, court records show.

Oso had walked off the job in May 2008 without explanation “after being counseled about absences and performance-related issues,” records state. She was fired after she failed to show up for work for three days, and the embezzlement was apparently discovered soon afterward.

Twenty-seven at the time, Oso confessed to court officials that she used the money to pay rent, make car payments, and “stabilize her financial situation.”

She pleaded guilty to one count of felony theft.

Brenda Sperduti, the organization’s former executive director, told officials that the arts group, which depends on donations for its survival, “had to win back the trust of donors after this.” But Sperduti also asked for leniency for Oso.

Oso was sentenced to three days in jail and two years’ probation. She struggled in the past few years to pay off a $11,276 restitution order — to her credit, she finally paid it off entirely last year. After she completed her probation successfully, her felony conviction became a misdemeanor in court files.

The arts organization bills itself online as “the eyes, ears, and voice of the nonprofit arts and culture sector in Arizona.” It has a relatively small budget, notes Steve Carr, who works as its spokesman. Carr called New Times after we left a message for group’s current director. Sperduti, currently CEO of the Assistance League of Arizona, didn’t return a message we left seeking comment.

“This kind of situation impact on a lot of levels,” Carr says.

The “good news,” though, is that Oso paid back what she stole, he says. “We as an organization have moved ahead and put this thing behind us.”

Oso’s listed online as the national coordinator for the Black Immigration Network and Black Alliance for Just Immigration. She declined to talk to New Times about her past.

While we were interested to see if she’d comment about her theft conviction, we also wanted to ask about her scofflaw driving record — especially since she mentions her confrontations with police during traffic stops. Oso was listed as “failure to appear” in five separate traffic-court proceedings since 2006, including one from an alleged violation committed this past March.

Vargas, by the way, defended how he handled the interruption and denied any advance knowledge that the protest would occur.

“I would have loved to see how other reporters handled that,” he says, adding that he felt compelled to grant Oso’s request for a mic because her issue is important. “I did the best that I could given the circumstances.”

UPDATE: We clarified Vargas’ employment status with the LA Times. An undocumented immigrant, he’s in a business relationship with the Times, but doesn’t work “for” the paper.

Watch Oso and the demonstrators interrupt the Town Hall meeting in the video below. The interruption begins about 19:30 into the video.










 

Really Jeb?

JebBush

Mr Bush, you were never a contender for my vote. I don’t think this country needs another Bush in the oval office.

But after saying Americans need to work more hours…

Yeeeerrrrr Outta here! Nothing further you may have to say is worth my time.

You’re saying you want to continue the unrestricted flow of illegal immigration, and increase the number of H1B1 visas while you have a ton of unemployed American citizens, and at the same time you’re saying American workers need to work more hours?

With all due respect sir… KISS MY ASS!

In my job, I had to BEG and I mean BEG, then bend over the bosses desk and offer my asshole for the pleasure of the managers, just to be able to use my earned vacation time, which was a paltry two weeks. Oh, and I wasn’t allowed to use those two weeks consecutively, because of “business issues”, so NO European vacation for me!

While many americans are working 80 hours or more a week on salary with no overtime, you’re selling the American worker out, adding to your obscene wealth and you still have the audacity to say Americans need to work more hours???

You sir are a bigger moron than I originally thought. I didn’t think anyone could be that stupid and still be able to speak. Your one claim to fame is…

You’ve proved me wrong.

Now terminate your presidential run go sit your ass on the patio of one of your many mansions and shut the fuck up!

Ya know, if it’s the truth…

DonaldTrump

Donald Tump is in trouble for speaking some harsh yet verifiable truths.

“When Mexico sends its people, they’re not sending their best; they’re not sending you,” Trump said in his announcement speech. “They’re sending people that have lots of problems, and they’re bringing those problems with us. They’re bringing drugs. They’re bringing crime. They’re rapists. And some, I assume, are good people.”

Trouble is, much of his assertion can be verified, right up to the point where our Border Patrol Agents were told don’t ask don’t tell, and to release the illegal aliens into the general population with a promise that the illegal will appear at a later date in court.

theax

I personally find it interesting that speaking verifiable truth is now, “Out of Fashion?”

I don’t think I’ll be voting for Trump, I’m taking a wait & see attitude about that.

On the other hand, I’ve long thought that perhaps a business approach to government might be a good thing.

Businesses have income and expenses and one thing successful businesses seem to have in common is not wasting income. I think our government could use a strong dose of the reality of a budget that’s about being efficient instead of stupid.

Trump may have done nothing except muddy the Republican field. But I do agree with his basic sentiment. If we have no idea who is crossing the border, but we do have evidence that the folks we’re aware of aren’t the best folks and have a high level of criminals in the mix, then it follows  what he said is probably true.

mexicangangs

I’m not willing to call Trump and “honest politician” but I’m willing to hear what he has to say. A breath of direct truth might not be such a bad thing in the run up to this election.

It’s funny, we used to value people that spoke their mind, now with public shaming we have them running for the hills.

Thrilling! Thank you OPM!

OPMI kept hearing about the data breach at the OPM. I thought to myself, “no big deal,” because I’ve never been a government employee. But then one of the articles I read spoke about a particular form. The form number seemed familiar.

Out of curiosity I checked my encrypted drive.

AHHHH SHIT!!!!

Yep, that’s a form I filled out while I was working for a government contractor.

DAMN! Checking some of the other forms and sure enough! There’s a TON of information that I provided to my employer. I’m sure that that information got sent at some point to the OPM, and is now in the hands of the Chinese.

I’m sitting here looking at my encrypted volume that contains this information thinking a couple of things.

CybersecurityFirst, I’m wondering why I take the security of this information so seriously? Why is it that I’ve spent the money to secure my data and theirs (some of the information contained in the forms I filled out for them also contains information that relates directly to THEIR projects) and am mindful of what data I have “live” on my system and what data I keep in cold storage? Cold storage in my life is something (like a drive) that is archival, MUST be turned on or attached directly to my computer and is encrypted.

Second, If I can secure my data with COTS (Commercial Off The Shelf) software why can’t our government?

Third, Why is the United States Government data vulnerable in the first place? We KNOW the safest computers are computers which are not connected to a network. Granted, that’s impractical because the government must share data.

Hearings

BUT  it is possible to isolate critical subsystems. One way to do that, don’t allow employees to transport any data offsite. No USB memory sticks or other media, and laptops are available only to those employees who absolutely need mobility. Employees using those laptops have VPN access to the corporate systems and for the most part those laptops when connected to the corporate VPN are Terminals in the old school meaning of terminals. ie dumb as a rock.

The point I’m making here is that the need for computer & network security isn’t new.  So why the hell hasn’t our government kept up with the needs for security?

Having seen the way government contracts work, I have a guess.

redtape

Imagine a situation where a bunch of cooks get in the soup and specify all manner of equipment down to the smallest detail. Once finished,  the specification goes from committee to committee and after a year or two the spec is approved, money is appropriated and the funds become available.

Our happy IT guys call a government approved vendor of equipment, and are told that equipment isn’t available anymore. Or worse yet, the equipment or software can be purchased but now it’s a custom build and will be 50% more expensive than the original product and by the way have significantly fewer capabilities than current off the shelf products costing significantly less than the originally specified equipment or software originally sold for.

Old terminal

So in the one case the specification process starts over again. In the other case the “approved equipment” is less capable,  yet more expensive, than the machine a hacker in China purchased on the internet yesterday.

Rather than the committees addressing the fundamental problem in terms of appropriations and approvals they’re content to keep failing. Meanwhile the security of government systems continues to fall further and further behind.

This isn’t a partisan issue. Regardless of what the administration might say. This is an epic systemic failure on the part of an entity that has access to all of our private data. A.K.A The United States Government.

UNIVAC

How do you solve this problem?

The simplest way is to allow the IT people, The REAL IT people, not the morons that built the healthcare.gov site, say “we need a router and after figuring out which is the best unit for the money… They BUY IT!

That should go for a single router or a RACK of routers.

Does Dianne Freakin Feinstein have a clue about the difference between a CISCO and a Barracuda? NO!

So why are people like Feinstein reviewing and voting on these appropriations bills or worse yet wasting time and money having hearings about shit they’ll never understand, when they should be letting the professionals do the job? You can tell pretty darn fast if an IT dept. is pissing money away and a quarterly budget review (again by IT pros who know what’s needed and what it costs) would keep the expenditures in check and at the same time maintain security.

I’ve got another dose of BAD news for you dear reader…

JihadiHacker

The longer our leaders put off fixing the government IT infrastructure, the more expensive it’s going to be.

Think about putting off having your brakes fixed on your car.

Brake pads cost $45 a wheel, Brake ROTORS cost $1000 a wheel. Most of us average folks learn the hard lesson, it’s always better to spend the $180 rather than spending the $1180. We all learn it once!

We never make that mistake again unless we’re wealthy, elitist,  over-educated, dumbasses.

Unfortunately, most of our politicians are the latter kind of people not the former.


Update 2015 06 19

As more comes out about this breach, I think it’s clear that the government IT people are not up to the challenge.

Here is a line to an ars Technica article titled Encryption “would not have helped at OPM says DHS official”

Below is the article minus the video.


Encryption “would not have helped” at OPM, says DHS official

archuleta-opm-640x359

Office of Personnel Management Director Katherine Archuleta would be happy to discuss the particulars of the OPM brief with Congress—in a classified briefing.

CSPAN

During testimony today in a grueling two-hour hearing before the House Oversight and Government Reform Committee, Office of Personnel Management (OPM) Director Katherine Archuleta claimed that she had recognized huge problems with the agency’s computer security when she assumed her post 18 months ago. But when pressed on why systems had not been protected with encryption prior to the recent discovery of an intrusion that gave attackers access to sensitive data on millions of government employees and government contractors, she said, “It is not feasible to implement on networks that are too old.” She added that the agency is now working to encrypt data within its networks.

But even if the systems had been encrypted, it likely wouldn’t have mattered. Department of Homeland Security Assistant Secretary for Cybersecurity Dr. Andy Ozment testified that encryption would “not have helped in this case” because the attackers had gained valid user credentials to the systems that they attacked—likely through social engineering. And because of the lack of multifactor authentication on these systems, the attackers would have been able to use those credentials at will to access systems from within and potentially even from outside the network.

House Oversight Chairman Jason Chaffetz (R-Utah) told Archuleta and OPM Chief Information Officer Donna Seymour, “You failed utterly and totally.” He referred to OPM’s own inspector general reports and hammered Seymour in particular for the 11 major systems out of 47 that had not been properly certified as secure—which were not contractor systems but systems operated by OPM’s own IT department. “They were in your office, which is a horrible example to be setting,” Chaffetz told Seymour. In total, 65 percent of OPM’s data was stored on those uncertified systems.

Chaffetz pointed out in his opening statement that for the past eight years, according to OPM’s own Inspector General reports, “OPM’s data security posture was akin to leaving all your doors and windows unlocked and hoping nobody would walk in and take the information.”

When Chaffetz asked Archuleta directly about the number of people who had been affected by the breach of OPM’s systems and whether it included contractor information as well as that of federal employees, Archuleta replied repeatedly, “I would be glad to discuss that in a classified setting.” That was Archuleta’s response to nearly all of the committee members’ questions over the course of the hearing this morning.

At least we found it

Archuleta told the committee that the breach was found only because she had been pushing forward with an aggressive plan to update OPM’s security, centralizing the oversight of IT security under the chief information officer and implementing “numerous tools and capabilities.” She claimed that it was during the process of updating tools that the breach was discovered. “But for the fact that OPM implemented new, more stringent security tools in its environment, we would have never known that malicious activity had previously existed on the network and would not have been able to share that information for the protection of the rest of the federal government,” she read from her prepared statement.

Dr. Ozment reiterated that when the malware activity behind the breach was discovered, “we loaded that information into Einstein (DHS’ government-wide intrusion detection system) immediately. We also put it into Einstein 3 (the intrusion prevention system currently being rolled out) so that agencies protected by it would be protected from it going forward.”

But nearly every question of substance about the breach—which systems were affected, how many individuals’ data was exposed, what type of data was accessed, and the potential security implications of that data—was deferred by Archuleta on the grounds that the information was classified. What wasn’t classified was OPM’s horrible track record on security, which dates back at least to the George W. Bush administration—if not further.

A history of neglect

During his opening statement, Chaffetz read verbatim from a 2009 OPM inspector general report that noted, “The continuing weakness in OPM information security program results directly from inadequate governance. Most if not all of the [information security] exceptions we noted this year result from a lack of leadership, policy, and guidance.” Similar statements were read from 2010 and 2012 reports, each more dire than the last. The OPM Office of the Inspector General only began upgrading its assessment of the agency’s security posture in its fiscal year 2014 report—filed just before news of a breach at a second OPM background investigation contractor surfaced.

Rep. Will Hurd (R-Texas), a freshman member of Congress, told the OPM executives and the other witnesses—DHS’ Ozment, Interior Department CIO Sylvia Burns, the new US CIO Tony Scott, and OPM Assistant Inspector General Michael Esser— that “the execution on security has been horrific. Good intentions are not good enough.” He asked Seymour pointedly about the legacy systems that had not been adequately protected or upgraded. Seymour replied that some of them were over 20 years old and written in COBOL, and they could not easily be upgraded or replaced. These systems would be difficult to update to include encryption or multi-factor authentication because of their aging code base, and they would require a full rewrite.

seymour-opm-640x359

Enlarge / OPM CIO Donna Seymour said that systems couldn’t simply have encryption added because some of them were over 20 years old and written in COBOL.

Personnel systems have often been treated with less sensitivity about security by government agencies. Even health systems have had issues, such as the Department of Veterans’ Affairs national telehealth program, which was breached in December of 2014. And there have been two previous breaches of OPM background investigation data through contractors—first the now-defunct USIS in August of last year, and then KeyPoint Government Solutions less than four months later. Those breaches included data about both government employees and contractors working for the government.

But some of the security issues at OPM fall on Congress’ shoulders—the breaches of contractors in particular. Until recently, federal agents carried out background investigations for OPM. Then Congress cut the budget for investigations, and they were outsourced to USIS, which, as one person familiar with OPM’s investigation process told Ars, was essentially a company made up of “some OPM people who quit the agency and started up USIS on a shoestring.” When USIS was breached and most of its data (if not all of it) was stolen, the company lost its government contracts and was replaced by KeyPoint—”a bunch of people on an even thinner shoestring. Now if you get investigated, it’s by a person with a personal Gmail account because the company that does the investigation literally has no IT infrastructure. And this Gmail account is not one of those where a company contracts with Google for business services. It is a personal Gmail account.”

Some of the contractors that have helped OPM with managing internal data have had security issues of their own—including potentially giving foreign governments direct access to data long before the recent reported breaches. A consultant who did some work with a company contracted by OPM to manage personnel records for a number of agencies told Ars that he found the Unix systems administrator for the project “was in Argentina and his co-worker was physically located in the [People’s Republic of China]. Both had direct access to every row of data in every database: they were root. Another team that worked with these databases had at its head two team members with PRC passports. I know that because I challenged them personally and revoked their privileges. From my perspective, OPM compromised this information more than three years ago and my take on the current breach is ‘so what’s new?'”

Given the scope and duration of the data breaches, it may be impossible for the US government to get a handle on the exact extent of the damage done just by the latest attack on OPM’s systems. If anything is clear, it is that the aging infrastructure of many civilian agencies in Washington magnify the problems the government faces in securing its networks, and OPM’s data breach may just be the biggest one that the government knows about to date.


<END>

What ever happened to EQUAL?

Boston University FINALLY got around to condemning a Professors Racist Misandric tweets.

donaldsterling

I’m about to talk about that which dare not be spoken of.

NO! Not kinky sex, hell I’ll talk about that!

In this context I’m speaking about Racism & Sexism.

Close your eyes and think “RACIST” What do you visualize? Now repeat the exercise and think “SEXIST”, do yo see the same person?

We’ve all been trained to think of racism and sexism in terms of the racist is ALWAYS WHITE and a Sexist Bastard is ALWAYS a MALE and usually White.

But there has been a growing sexist / racist element in our society which is not always white, and which is almost never male that gets a pass to say things I haven’t’ heard since the ‘60s.

davidduke

Consider this phrase:

Why is black America so reluctant to identify black college males as a problem population?

You read that and think, “OMG that’s SOOO Racist! The man that said that should be punished!” And you’d be right according to the unwritten rules of our society today.

You’d expect a comment like that from Rush Limbaugh, or Donald Sterling, or David Duke.

What was actually said:

why is white america so reluctant to identify white college males as a problem population?

tweet1

It’s just as racist.

The “Man” that said this is actually a Sociology and African American Studies Professor named Saida Grundy, who happens to be a black woman.

While Donald Sterling was forced to sell his interest in his basketball franchise, publicly humiliated, and denied his freedom of speech and opinion, this professor enjoys protection of her free speech rights. Frankly I don’t see the difference between the two people.

Boston University is asserting that her first amendment right to free speech while disagreeable, is protected.

Fundamentally I agree. Freedom of speech applies equally to all of us.  So does the public shaming, the loss of career, and all the punishment commonplace in our society today.

We’ll force a millionaire owner to divest himself of a franchise because he used the “N” word (Exercising his right to free speech), but we’ll give this professor a pass to say something equally offensive? Does anyone else see a problem with this?

We’ll force a TV personality like Paula Dean loose pretty much everything because she said the “N” word 25 years ago.

NicoleHe Tweet

But we’ll tolerate an Asian lady in a well known financial organization tweeting that she hates white people.

In her case there was no penalty. Even when other twitter followers demanded a response from Kickstarter there was no apology, & no consequences for this sweet racist.

A person of color is not automatically immune to being a racist anymore than a woman is immune to being a sexist.  Our society continues to choose to look the other way when a non-white person or woman behaves or speaks in a racist or sexist way.

Plain and simple if it’s wrong for one group, it’s wrong for all groups, regardless of the groups protected status or historical injustices committed against them.

We must all be treated with respect, dignity and equality or none of us will ever know equality. That means calling out a woman if she’s sexist. And calling out a person of color, if they’re racist.

It’s well past time for equality to be applied equally.