64, passed away at the Bayonne Medical Center on July 3, 2018. Catherine was born in Bayonne, and lived there lifelong. Wife of the late John J. Lawrence, Jr. Sister of Edward J. Niederhaus and his wife Phyllis and the late Daniel Niederhaus. Aunt of Tara and Nicole Niederhaus. She is also survived by other Nieces and Nephews. Funeral arrangements by G. KEENEN O’BRIEN Funeral Home, 984 Avenue C.
When it comes to modern funk artists, Turkuaz and The New Mastersounds are about as funky as they get. The two bands teamed up for a major fall tour, bringing an onslaught of feel-good grooves to just about every corner of the country. Playing back-to-back sets, the bands collaborated with one another throughout the tour for a heavy dose of funk.Their co-bill came to a triumphant end on Saturday at The Orange Peel in Asheville, North Carolina. Turkuaz opened the evening with their explosive sounds, and The New Mastersounds carried it on home with plenty of special sit-ins from the previous band. The two bands made sure to close their tour together with their best sets yet. Fortunately, taper poppag76 was there to capture the magic.Enjoy both sets from their final show together below:TurkuazThe New MastersoundsTurkuaz is hitting Providence’s Fete Ballroom on 12/30 & 12/31 with support from Moon Hooch, and Kung Fu and West End Blend. Tickets to both nights of “The Ball Drop” can be found here.[Photo from Capacity Images at Terminal 5]
The Daily Gazette Sign up for daily emails to get the latest Harvard news. Hackers have infiltrated the computer networks of some of the nation’s biggest corporations, leading defense contractors, and top U.S. government agencies, including those in national security branches, in what security analysts believe is a “very significant” breach.So far, the Department of Homeland Security, parts of the Pentagon, the U.S. Treasury, the Commerce Department, the Centers for Disease Control and Prevention, and the National Institutes of Health are known to have had systems attacked through malware installed on widely used network monitoring software. The software’s ubiquity and the likelihood that the hackers had access for months means there could be many other targets affected, including the National Security Agency.U.S. officials reportedly only learned of the breach recently after a private cybersecurity firm, FireEye, informed them that some hacking tools had been stolen, according to The New York Times. The breach’s full scope and precise methodology remain unknown, but analysts say its complexity and tradecraft point to Russia’s foreign intelligence service as the likeliest perpetrator.The Gazette spoke with Paul Kolbe, a former senior CIA official and Russia specialist who now oversees the Belfer Center’s Intelligence Project at Harvard Kennedy School (HKS), and Lauren Zabierek, executive director of the Center’s Cyber Project, to gain a deeper understanding of the cyberattack and a sense of what the U.S. may do next.Q&APaul Kolbe and Lauren ZabierekGAZETTE: How damaging does this appear to be?KOLBE: We’re probably seeing the tip of the iceberg right now. What’s clear is that the sophistication, the scope, the depth of this, and how long-lasting it was, how many government and nongovernment entities that it affected, is really significant. If one [means] in bypassing security systems was manipulating or bypassing the two-factor authentication, which many companies and places … use, that would be very significant because that’s a primary defense that financial systems, highly classified systems, systems that organizations are trying to provide extra security use. If they’re finding ways past that, that both increases the potential damage and it carries wider implications than just this specific series of hacks.It’s a major incident and it’s exceptional in that it’s come out, but it’s not exceptional in terms of the types of activity that happen every day, the types of espionage that are conducted against U.S. government and corporations.GAZETTE: Russia’s foreign intelligence service, the SVR, is believed to be responsible. Does it look like the work of Russian hackers? Could it be anyone else?ZABIEREK: There’s definitely a limited pool of actors that could pull off such a sustained, targeted, far-reaching campaign. I certainly can’t attribute it to a specific actor; I would definitely leave it up to the experts to make that determination. In general, the Russians are definitely interested in government targets, in sowing distrust, especially with the FireEye piece of it, in those particular institutions, and the targeted and sustained espionage against our federal entities, whereas a North Korean attack or breach would be more financially motivated. The Wanna Cry hack was really intended to generate finances. China, again very generally, tends to focus on intellectual property theft or stealing data on people. But to me, this definitely seems more like a Russian operation.I do think it’s interesting that they targeted this particular piece of software that many of us haven’t heard of that is used by a large swath of customers. I think that alone probably took a very long time to discover on their part. So then, that initial targeting and then probing into seeing what vulnerabilities are there and if there are any zero-day vulnerabilities, and then developing the exploits for those, and then penetrating those holes and then getting in — the timeline they’re saying it began in spring 2020 — that seems very, very quick. Not a lot of time to execute such an attack.KOLBE: The Chinese have the capabilities to do it and it would be well within their M.O. But from what I’m reading, the specific malware tools being used are pretty clearly identifiable with the Russians and with SVR.GAZETTE: As the list of victimized entities grows, does that suggest more about what they were after?KOLBE: One of the striking things is how long this has apparently taken place. They’ve had a lot of time to sit quietly in the digital shadows, mapping out the networks, studying them, seeing where they link to, seeing where pockets of information are that may be useful, going after some things that they know they want. But also, almost certainly, finding and scooping up things for use on a rainy day.As far as scope, it just shows it’s much wider. It shows a really voracious appetite for lots of different, potentially valuable sources of information and data. Nothing I’ve seen really shows — and it’s going to be a while before folks figure out, if ever, what was actually accessed and what was actually exfiltrated and stolen — but the fact that it’s so many organizations across such a broad scope of activities indicates a “casting a wide net” approach. But certainly then within those organizations, there are undoubtedly efforts to identify and target the most valuable datasets. Almost certainly they weren’t able to get to everything that they might have had access to. [Something] like 13,000 or 18,000 different companies had uploaded the software. I mean, that’s a massive potential effort.GAZETTE: The U.S. is still litigating the last major Russian breach from 2015‒2016. Are you surprised an attack of this magnitude has happened again so soon?KOLBE: No, I’m surprised that we don’t hear about more. SVR, the Chinese, others, they’ve all built huge capabilities, they’re well-resourced, well-staffed, [and] focused on doing exactly this. This is not a one-off, this is not something unusual. The extent of it sounds quite grand, but, is, in fact, what’s reality and what’s taking place every day. I guarantee you that there are other operations similar in size and scope, if not larger, that haven’t been discovered.GAZETTE: How does an investigation of this get done and how long could that take?KOLBE: There will be a huge forensics operation to determine what happened, i.e., following the breadcrumbs, with what breadcrumbs that they can find, trying to determine where did it come in, what systems did it proliferate out into? And that may be impossible to determine because a lot of times what happens is as folks maneuver through the networks, they’re erasing their tracks as they go. And if there’s been exfiltrating of information, i.e., stealing it, it won’t be gone, so it’s hard to determine if it’s been stolen or not. So we may actually never know exactly what systems were accessed and what information was lost. So it’s a massive forensics job, a massive triage of what would have been most important, and then a damage assessment: If this was lost, what does it mean?GAZETTE: That could take a long time to complete. Potentially months?KOLBE: Easily.GAZETTE: What can be done to shore up breached systems while an investigation is underway?ZABIEREK: There are a lot of things that we can do in the meantime. You have your incident responders who are going to essentially clear out and rebuild or clear out and shut down any sort of holes in the network. So, kick out any intruders, potentially patch any of those vulnerabilities if they need to continue working with that particular software.CISA, the Cybersecurity Infrastructure Security Agency, they’re responsible for protecting federal networks and, of course, the Department of Defense is responsible for protecting DoD networks. So right now you definitely have cyber defenders in the DoD working to make sure that our DoD networks are protected and not being compromised. But there is a real lack of capability now without a confirmed director.Later, once attribution is finalized, then the federal government, the administration, whether it’s before Biden takes leadership or not, can make a decision on what they’re going to do at that level. We have the Office of Cyber Engagement in the State Department, but that bureau had been folded into, I think, economic affairs. So you don’t have that confirmed, high-level cyber diplomat anymore to engage diplomatically.You do have CyberCom [U.S. Cyber Command] that is going to be engaging in cyberspace; the intelligence community is doing certain things. But from a domestic standpoint, the current administration has hobbled our ability to respond in certain ways. I’m not really sure what they would do. If there is a national cyber director [under the Biden administration], for instance, and they reinstall that State Department Bureau of Cyber Affairs, then I think that you’ll have a much stronger response.GAZETTE: Will an investigation and U.S. response be hampered by the transition to a new administration?KOLBE: I don’t think so. It fits into a long, long, long pattern of spy vs. spy. And whether it’s human spies or cyber spies, digital spies or human spies, that game continues. Spies will get caught, there will be a brief flurry of press and protests and expressions of shock, and then folks get back to business. I don’t think the Biden administration will allow what’s essentially an uncovered espionage operation change their views of Russia, which I think are pretty clear-eyed to begin with. It’s not going to help any renewal of discussions. But on things like arms control and other issues that are a core interest in bilateral relations, it’s also not going to impact those, I don’t think.GAZETTE: Would President-elect Biden and Vice President-elect Harris receive detailed intelligence about this so they’re up to speed?KOLBE: Absolutely, if for no other reason than transition staff is a highly attractive target themselves.Interviews were edited for clarity and length.
Your outdoor news bulletin for June 26, the day the U.S. Supreme Court knocked down DOMA in 2013:BEARS!It’s been a big week for bears in the Blue Ridge. First, there was the adorable saga of Rusty the red panda from the National Zoo in Washington, D.C. The little scamp escaped his enclosure and evaded capture for almost a day until he was discovered in Adams Morgan later in the afternoon. Before this story had even run its course, there was another bear incident in the District. Following a 90 minute game of hide and seek with local animal control officers, a black bear was captured in Northwest D.C. earlier today. The bear was described by authorities as being “very harmless,” mainly because it was less than a year old and weighed about 100 pounds. That bear is being released back into the wild in an undisclosed Maryland location. And finally, a (different) black bear pulled a switcheroo and tried to break into the Knoxville Zoo on Monday – “they’ll never suspect it!” The bear was spotted climbing a fence into the zoo, but officials were unable to locate the bear inside, so they are working on the assumption that he retreated once he realized he had made a huge mistake. That, or he is successfully blending in with the Knoxville Zoo crowd.Rabbits!Speaking of enclosed animals that are no longer where they are supposed to be, two rabbits were stolen from the Western North Carolina Nature Center. Slate, a male Flemish Giant rabbit, and Pogo, a male Holland lop rabbit were taken from their barn exhibit sometime Monday night. There was no signs of forced entry. Both require special care: Pogo has a special diet and Slate has a foot issue. If you know where they are, call Crime Stoppers at (828) 255-5050, then take a long look in the mirror for being associated with people who steal sick rabbits, and getting yourself mixed up in the underground exotic bunny trade.STRIPERS!North Carolina’s Norman Lake is now being stocked with hybrid striped bass by the N.C. Wildlife Resources Commission, moving the lake from a striped bass fishery to a hybrid striped bass fishery. They stocked 162,500 hybrids in an attempt to counter recent summertime kills – hybrid striped bass are a cross between striped bass and white bass, making them slightly more resilient to warmer water.Tsunamis!According to the National Oceanic and Atmospheric Administration, a tsunami hit the East Coast earlier this month. On June 13 a six foot wave hit the coast of New Jersey which experts believe was caused by a strong storm, though the official source of the wave is “complex and under review.” It is a telling sign that a six foot swell can be classified as a tsunami on the East Coast, brah. Our waves are small, but not that small. Also: GLOBAL WARMING!
Live Outside and Play from Blue Ridge Outdoors on Vimeo.The past few days have been a flurry of catching up on assignments, meetings with Eddie Bauer and SylvanSport, and getting geared up and ready to hit the road. It’s hard to believe that this project is finally underway, and I couldn’t be happier to begin the adventure in Asheville where the magazine’s second office is located. It’s been raining off and on since I arrived in town on Sunday, but the stormy clouds can’t dampen the energy that’s been building around the Live Outside and Play project. I am excited, humbled, and forever grateful for all of the support that readers, friends, sponsors, and strangers near and far have shown. You are what this adventure is all about.I’m sure there are a lot of questions about Live Outside and Play, so expect some insights to be posted as the week progresses. For now, check out this short wrap-up of the past 48 hours. You can also head to the project’s social media handles and follow along as I embark on my yearlong adventure throughout the Southeast and Mid-Atlantic. Until then, here’s to where the path may lead!facebook.instagram.twitter.
This month’s Instagram Takeover features South Carolina-based adventure photographer Will Milford, AKA @stognasty. Will’s portfolio spans the gamut from natural landscapes to wildlife scenes captured in and around his South Carolina home. Will has been documenting the sights, scenes, plants, and wildlife connected to his native region and areas all over the U.S. for several years as his passion for new photographic challenges have emerged.Check out a sampling of his work below, follow him on Instagram for more great shots, and read our in-depth Q & A to find out what makes Will tick.Tumbling cascades somewhere deep in the Blue Ridge.Living on the Edge.Frozen in Time.Hammock Heaven.First Light on the Lake.[divider]Check out our Q & A with Will [/divider]BRO: How long have you been into outdoor photography and how’d you discover your passion?WM: I’ve had the shutterbug for about two and a half years, but I was an addict from the start. I began by taking a mandatory class in college using a 15-year-old canon dslr that had dust spots all over the sensor, but I began investing my money and time updating equipment and honing my skills.BRO: Where are you based out of?WM: I’m from a little town known for the widest main street in the United States. Greenwood, is in the piedmont of South Carolina, but I try to make a voyage to the mountains at least once a week to get a dose of the outdoors.BRO: What is you favorite place to shoot in the Southeast and/or Mid-Atlantic?WM: There is no place in the US that compares with the scenery we are able to enjoy right here in our on backyards. The Blue Ridge Mountains are one of the most picturesque spots and one of my favorites. However, I have a love of bird photography as well and the Charleston, SC area is one of the greatest places to chase that passion, as well as some fine coastal cuisine.BRO: One piece of gear (minus your camera) you wouldn’t head into the woods without?WM: Besides a cooler full of beer waiting on me at the campsite after a long hike, one thing I never go into the woods without is a good pair of boots. I’ve got an old pair of Scarpas that have stood the test of time and traversed a lot of rocky terrain. My ankles owe them a huge debt of gratitude.BRO: Aside from photography, what is your favorite outdoor activity?WM: I’m an avid water lover, so kayaking is one of my favorite outdoor activities. I’ve been paddling since I was in high school and I still try to hit some of the local rivers whenever my schedule will allow. As with most anything else, a good group of friends always makes the outdoor experience that much better!BRO: Craziest adventure ever experienced during an outdoor shoot?WM: I’m hoping that the craziest is still yet to come, but once (actually more than once) I was in a rush to catch a sunset in an iconic spot and was pulled over by the long arm of the law. He was not amused when I told him I was in a hurry to catch some good light. That was crazy expensive.BRO: Is photography your primary gig?WM: I wish my job was as cool as getting paid to spend time photographing the places I love, but for now that is just a passion. I sell Velux skylights by day to fund the weekend adventures!BRO: What advice would you give to an aspiring outdoor photographer?WM: I would give the same advice that was given to me when I first picked up a camera. Rather than investing in equipment, invest in a tank of gas. To take more interesting photos, you must stand in front of more interesting places.
By Dialogo September 16, 2010 Brazil is the host country of the Inter-American Naval Conference (CNI, for its acronym in Portuguese and Spanish), the most important forum bringing together Latin American Navies, say conference organizers. The 24th edition of the CNI is being held from September 13th through 17th, in Rio de Janeiro. “We want to promote hemispheric solidarity and also the just defense of the interests of each nation. It’s important to make our ties stronger and to make our diplomatic relations even better,” said Admiral Júlio Soares de Moura Neto, Brazilian Navy Commander during a press conference after the conference’s opening ceremony. Created in 1959 in order to foster permanent professional contacts between the Navies of the participating countries, the CNI provides a forum for exchanging ideas, knowledge and mutual understanding of maritime issues affecting the Americas. The Navies of the following countries sent representatives to the 24th CNI: Argentina, Bolivia, Brazil, Canada, Chile, Colombia, Ecuador, El Salvador, USA, Honduras, Mexico, Nicaragua, Panama, Paraguay, Peru, the Dominican Republic and Venezuela. In addition to these participants, delegations of the Inter-American Defense Board (JID) and the Naval Inter-American Telecommunications Network (RNIT) are also in attendance. During the Conference, various topics of naval interest will be discussed regarding the official theme of the 24th CNI: “Inter-American Maritime Security: awareness of regional maritime domain and mechanisms for its promotion; the deployment of naval power in maritime security and protection of natural resources; and issues of legal order”.
2SHARESShareShareSharePrintMailGooglePinterestDiggRedditStumbleuponDeliciousBufferTumblr If your credit union is using only traditional underwriting methods, chances are that you’re limiting your lending potential. The use of alternative data in underwriting opens credit avenues for members and small businesses that otherwise might have been closed to them. Alternative data is here to stay, and lenders who do not have a strategy in place to utilize this powerful tool will be left behind. Download our white paper, written by Velocity Solutions CEO Christopher Leonard, to learn how you can expand your lending and reduce charge offs using alternative data. Download white paper now.
Categories: Letters to the Editor, Opinion It’s been another great season of golf at the Schenectady Municipal Golf Course.Thank you, Matt Dailey, for all your hard work improving and maintaining the course. A great job was done by your courteous staff and groundskeepers.Here’s to spring 2018 and another season of golf at Schenectady Muni.Sharran A CoppolaSchenectadyMore from The Daily Gazette:Schenectady man dies following Cutler Street dirt bike crashEDITORIAL: Urgent: Today is the last day to complete the censusEDITORIAL: Thruway tax unfair to working motoristsSchenectady NAACP calls for school layoff freeze, reinstatement of positionsSchenectady department heads: Budget cutbacks would further stress already-stretched departments
To access this article REGISTER NOWWould you like print copies, app and digital replica access too? SUBSCRIBE for as little as £5 per week. Would you like to read more?Register for free to finish this article.Sign up now for the following benefits:Four FREE articles of your choice per monthBreaking news, comment and analysis from industry experts as it happensChoose from our portfolio of email newsletters