WBEZ | Hacking http://www.wbez.org/tags/hacking Latest from WBEZ Chicago Public Radio en Senate approves cybersecurity bill: what you need to know http://www.wbez.org/news/senate-approves-cybersecurity-bill-what-you-need-know-113539 <p><div class="image-insert-image "><img alt="" building="" class="image-original_image" important="" kevin="" lamarque="" reuters="" src="http://www.wbez.org/system/files/styles/original_image/llo/insert-images/President%20Obama%2C%20seen%20at%20a%20cybersecurity%20summit%20in%20Palo%20Alto%2C%20Calif..jpg" style="height: 464px; width: 620px;" title="President Obama, seen at a cybersecurity summit in Palo Alto, Calif., in February. The White House has called the Cybersecurity Information Sharing Act an &quot;important building block.&quot; (Kevin Lamarque/Reuters/Landov)" /></div><p>The latest clash in the cybersecurity vs. privacy debate played itself out in Congress on Tuesday when the Senate passed the&nbsp;<a href="https://www.congress.gov/bill/114th-congress/senate-bill/754">Cybersecurity Information Sharing Act</a>. Supporters say the bill, approved 74-21, will help stop hackers by getting companies that have been breached to share information about the embarrassing attack with federal law enforcement. The House passed&nbsp;<a href="https://www.congress.gov/bill/114th-congress/house-bill/1560">its version</a>&nbsp;in April.</p><p>But CISA is very controversial. While proponents call it common sense, critics say it&#39;s just an excuse for intelligence officials to grab data on citizens without a warrant.</p><p><strong>Before we get to the controversy, what is the bill supposed to&nbsp;do?</strong></p><p>According to supporters, there&#39;s a big problem: an information gap. When hackers hit a private company, that company is handcuffed or tongue-tied. It can&#39;t readily tell people outside its legal walls what happened, what suspicious Internet &mdash; IP &mdash; addresses or malware code hit it. So other potential targets can&#39;t defend themselves.</p><p>Supporters say CISA changes that by letting companies share &quot;cyber threat indicators&quot; with the Department of Homeland Security, which in turn can send out the red alert, share the code and warn others.</p><p><strong>So that <em>doesn&#39;t </em>happen right now?</strong></p><p>Well actually, it does. There are existing initiatives, coordinated by&nbsp;<a href="http://www.dhs.gov/ccubedvp">Homeland Security&nbsp;</a>and the&nbsp;<a href="http://www.nist.gov/itl/csd/sharing-111014.cfm">National Institute of Standards and Technology</a>, to share threat information. There are also subscription services in the private market.</p><div id="con452343227" previewtitle="Related NPR Stories"><div id="res452343226"><div class="image-insert-image "><a href="http://www.wbez.org/news/cybercrime-proliferates-so-does-demand-insurance-against-it-113315" target="_blank"><img -="" 000="" a="" about="" alt="" and="" been="" checking="" class="image-original_image" company="" consecutive="" construction="" down="" email="" excluding="" five="" following="" hacked="" had="" his="" its="" john="" losses="" mark="" night="" of="" on="" our="" out="" over="" patterson="" period="" s="" src="http://www.wbez.org/system/files/styles/original_image/llo/insert-images/mark_patterson.jpg" style="height: 299px; width: 400px; float: left; margin-left: 10px; margin-right: 10px;" system.="" taken="" the="" title="&quot;Over the period of five consecutive nights, excluding weekends, $100,000 a night had been taken out of our checking account, and we were down about $545,000.&quot; - Mark Patterson on his construction company PATCO's losses following its hacked email system. Patterson has since taken out cybercrime insurance to protect his company. (John Ydstie/NPR)" we="" were="" ydstie="" /></a></div></div></div><p>This bill creates a new pipeline. Homeland Security has to share the company&#39;s report &mdash; which may include customers&#39; personally identifiable information &mdash; with the National Security Agency and other spy agencies.</p><p>The Senate bill is coming out of the Intelligence Committee, not the Commerce Committee. It had&nbsp;<a href="http://fedscoop.com/heres-the-amendments-that-could-change-cisa">many amendments</a>. One that failed Tuesday would have required the removal of personally identifiable information before a company shares information about threats.</p><p><strong>Is privacy the&nbsp;main&nbsp;criticism?</strong></p><p>Privacy is a huge issue. Tech giants, which have to rebuild trust with users following the Edward Snowden leaks, have&nbsp;<a href="https://www.decidethefuture.org/#corporate">come out against the bill</a>&nbsp;for that reason.</p><p>Though another concern is simply effectiveness &mdash; or ineffectiveness. There&#39;s a technical problem. Many companies don&#39;t realize they&#39;ve been attacked, either because they&#39;re not investing in services to identify breaches or they&#39;re not reading the data they&#39;ve collected. According to a&nbsp;<a href="http://www.verizonenterprise.com/DBIR/2015/">breach report by Verizon</a>, this lag in detection is &quot;one of the primary challenges to the security industry.&quot;</p><div class="image-insert-image " style="text-align: center;"><img alt="" class="image-original_image" src="http://www.wbez.org/system/files/styles/original_image/llo/insert-images/AP_910189987279.jpg" style="height: 392px; width: 620px;" title="In this Sept. 24, 2015 file photo, Senate Intelligence Committee Chairman Sen. Richard Burr, R-N.C., right, and Committee Vice Chair Sen. Dianne Feinstein, D-Calif. listen as Director of the National Security Agency (NSA) Adm. Michael Rogers testifies on Capitol Hill in Washington.The Cybersecurity Information Sharing Act is co-sponsored by Feinstein and Burr, who said it was critical to limit increasingly high-profile cyberattacks, such as one suffered by Sony Pictures last year. (AP Photo/Pablo Martinez Monsivais, File)" /></div><p>Lawmakers could have focused on creating mandatory cybersecurity standards for companies, to encourage the firms to invest more in data security. A group of professors who teach cyber law and cybersecurity &mdash; and oppose CISA &mdash; say in a <a href="https://www.elon.edu/e/CmsFile/GetFile?FileID=202">statement</a>:</p><blockquote><div><p><em>&quot;Rather than encouraging companies to increase their own cybersecurity standards, CISA ignores that goal and offloads responsibility to a generalized public-private secret information sharing network. CISA creates new law in the wrong places.&quot;</em></p></div></blockquote><p><strong>Does the bill require information-sharing?</strong></p><p>No. Cooperation is voluntary. But there&#39;s a nice incentive built in. Say a company shares too much about its users or customers. The bill eliminates legal liability, so the company can be shielded from private lawsuits and antitrust laws.</p><p>This isn&#39;t the first time we&#39;ve heard about an information-sharing bill to stop hackers. Another failed in 2012. What&#39;s different?</p><p>CISA comes at a different time, politically.</p><p>Back when Democrats controlled the Senate, they blocked a bill with a similar acronym &mdash; CISPA (the Cyber Intelligence Sharing and Protection Act) &mdash; that had the same thrust. Now Republicans control the Senate.</p><p>And on President Obama&#39;s watch, we&#39;ve had megabreaches like Sony and the federal Office of Personnel Management. He feels pressure to do something. Five days ago, the White House came out in support of the latest bill, saying in a memo that it&#39;s an &quot;<a href="https://www.whitehouse.gov/sites/default/files/omb/legislative/sap/114/saps754s_20151022.pdf">important building block</a>.&quot;</p><p>&mdash;<a href="http://www.npr.org/sections/alltechconsidered/2015/10/27/452338925/senate-approves-cybersecurity-bill-what-you-need-to-know?ft=nprml&amp;f=452338925" target="_blank"><em> via NPR</em></a></p></p> Wed, 28 Oct 2015 12:24:00 -0500 http://www.wbez.org/news/senate-approves-cybersecurity-bill-what-you-need-know-113539 As cybercrime proliferates, so does demand for insurance against it http://www.wbez.org/news/cybercrime-proliferates-so-does-demand-insurance-against-it-113315 <p><p>Cybercrime is costing the global economy&nbsp;<a href="https://www.allianz.com/en/press/news/studies/150909_businesses-must-prepare-for-cyber-risks.html/">nearly half a trillion dollars a year</a>, according to the insurer Allianz. It&#39;s a major threat to businesses, which are looking for ways to protect themselves. One option is cybercrime insurance.</p><p>Mark Patterson found out the hard way that firewalls and anti-virus software are no longer enough protection for a small business.&nbsp;<a href="http://www.npr.org/sections/alltechconsidered/2015/09/15/440252972/when-cyber-fraud-hits-businesses-banks-may-not-offer-protection">Cybercrooks hacked into the email system of PATCO</a>, Patterson&#39;s construction company in Sanford, Maine, and ordered money transfers from its bank account.</p><p>&quot;Over the period of five consecutive nights, excluding weekends, $100,000 a night had been taken out of our checking account, and we were down about $545,000,&quot; he recalls.</p><p>Patterson&#39;s bank refused to reimburse him. He sued and finally won, but legal costs ate up most of what the bank paid. After that experience, Patterson boosted his security and bought cybercrime insurance.</p><p>But most companies aren&#39;t insured for cybercrime losses. In fact, only about one in five is. However, Chris Arehart, a vice president and cybercrime specialist at Chubb Group of Insurance Companies, says demand is now booming.</p><p>&quot;We have interest every day on this emerging topic, and it really has taken the world by storm,&quot; Arehart says.</p><p><span style="font-size:16px;"><strong>Computer Hacking And Old-Fashion Cons</strong></span></p><p>Chubb has added some cybercrime elements to its commercial crime policies over the past decade, and recently it added coverage for something called social engineering fraud, which Arehart says, often combines computer hacking and an old-fashioned con.</p><p>&quot;They may begin by researching online, using the wealth of information that we all share, to determine an appropriate mark within the company. They build up a pretext, a story that&#39;s as varied as the imagination of the criminal,&quot; he says.</p><p>Cybercriminals often penetrate a company&#39;s computer and email systems, and for a year or more watch and plan their attack. Then they strike.</p><p>One scenario might involve a fraudster impersonating a top company officer in Asia calling a lower level, U.S.-based employee. The fraudster knows the employee&#39;s boss&#39; name &mdash; and knows the boss is away &mdash; and asks the employee to handle an urgent, emergency wire transfer.</p><div class="image-insert-image " style="text-align: center;"><img 20="" 70="" a="" alleged="" alliance="" alt="" and="" ap="" at="" authorities="" been="" buy="" can="" class="image-original_image" computer="" countries="" cripple="" cyber-forensics="" cybercrimals="" department="" english="" for="" from="" gene="" hacked="" has="" in="" information="" j.="" justice="" largest-known="" malicious="" malware="" marketplace="" members-only="" more="" national="" online="" or="" other="" photo="" pittsburgh.="" sell="" software="" speaking="" src="http://www.wbez.org/system/files/styles/original_image/llo/insert-images/AP_638634222060.jpg" steal="" style="height: 386px; width: 580px;" systems.="" targeted="" than="" that="" the="" title="In this photo taken July 14, 2015, FBI Supervisory Special Agent J. Keith Mularski, who heads the cybercrime squad at the agency’s Pittsburgh field office, displays a screenshot from the Darkcode website, top left, an English-language " to="" training="" using="" ve="" /></div><p>Cybercrimes like these are growing at an alarming rate, according to the FBI. Cyberfraud insurance can help protect companies from those losses.</p><p>But it&#39;s not a silver bullet, says Garrett Droege, who runs TechAssure, an association of companies that offer cybercrime insurance. Part of the problem, he says, is that many policies don&#39;t cover the latest scams.</p><p>&quot;Unfortunately, there&#39;s a lot of &#39;gotchas&#39; in this type of policy, just because it&#39;s evolved so quickly and the insurance companies are having a hard time innovating fast enough to keep up with the risks,&quot; he says.</p><p><span style="font-size:16px;"><strong>Risk Isn&#39;t Well Understood</strong></span></p><p>A company looking for coverage, Droege says, first needs to figure out its cyberrisk profile, then put protections and protocols in place and educate its workers. In fact, companies may not even be able to buy insurance unless they have that all in place, says Arehart, with Chubb Insurance.</p><p>&quot;We&#39;re looking for companies that have strong controls in the first place, and then strong cultural controls that would prevent this type of fraud from making it past the first phone call or the first email that hits the company&#39;s computer systems,&quot; Arehart says.</p><p>Insurers are being selective because the ultimate risk they&#39;re taking is not well understood, Droege says.</p><p>&quot;Traditional insurance is based on sometimes hundreds of years of historical data,&quot; he says. &quot;They can look back, see where the losses came from, and they price accordingly. Where cyber, the market&#39;s still very, very juvenile.&quot;</p><p>Because criminal hackers are so proficient and because computer systems are so central to business, some analysts predict insurers could soon face catastrophic losses. But Droege says the industry has to step up.</p><p>&quot;We don&#39;t have a choice as an industry. We have to figure it out,&quot; he says. &quot;If the cyberrisk is so pervasive today, think, 10, 20 years into the future, when we&#39;re even more reliant on technology. Businesses cannot afford to deal with these things by themselves.&quot;</p><p>&mdash; <a href="http://www.npr.org/sections/alltechconsidered/2015/10/12/445267832/as-cybercrime-proliferates-so-does-demand-for-insurance-against-it?ft=nprml&amp;f=445267832" target="_blank"><em>via NPR</em></a></p></p> Tue, 13 Oct 2015 13:17:00 -0500 http://www.wbez.org/news/cybercrime-proliferates-so-does-demand-insurance-against-it-113315 Credit cards with chips become standard this week http://www.wbez.org/programs/here-and-now/2015-09-28/credit-cards-chips-become-standard-week-113091 <img typeof="foaf:Image" src="http://llnw.wbez.org//main-images/Credit cards with chips are pictured in Philadelphia on June 10, 2015.jpg" alt="" /><p><div>Starting Thursday, credit cards with embedded microchips will become standard, instead of cards having only the magnetic swipe strip on the back.</div><div>&nbsp;</div><div>The chips are aimed at increasing security and preventing hacks. Here &amp; Now&lsquo;s Jeremy Hobson speaks with Ali Velshi, host of &ldquo;Ali Velshi on Target&rdquo; on Al Jazeera America, about the change.</div><div>&nbsp;</div><div>&mdash; <a href="http://hereandnow.wbur.org/2015/09/28/credit-cards-with-chips" target="_blank"><em>via Here &amp; Now</em></a></div></p> Mon, 28 Sep 2015 14:05:00 -0500 http://www.wbez.org/programs/here-and-now/2015-09-28/credit-cards-chips-become-standard-week-113091 Obama says Sony should not have pulled film over hacking http://www.wbez.org/news/culture/obama-says-sony-should-not-have-pulled-film-over-hacking-111277 <img typeof="foaf:Image" src="http://llnw.wbez.org//main-images/AP809914660283_0.jpg" alt="" /><p><p>President Obama called Sony&#39;s decision to pull its film&nbsp;The Interview&nbsp;over a hacking by North Korea a &quot;mistake.&quot;</p><p>&quot;We cannot have a society in which some dictator someplace can start imposing censorship here in the United States,&quot; the president&nbsp;<a href="http://www.npr.org/blogs/thetwo-way/2014/12/19/371881952/live-obamas-year-end-news-conference">said in his year-end news conference</a>.</p><p>He added that he was &quot;sympathetic&quot; about their concerns, but, &quot;I wish they would have spoken to me first.&quot;</p><p>Earlier Friday, the FBI said it has enough information to confirm that North Korea was behind the hacking of Sony Pictures.</p><p>The agency tied the attack to North Korea because the malware used in the attack had the hallmarks of software written by the country in the past.</p><p>&quot;For example, there were similarities in specific lines of code, encryption algorithms, data deletion methods, and compromised networks,&quot; the FBI said in a statement.</p><p>The tools used, the agency said, also had similarities to a cyberattack that took place in March of last year against banks in South Korea.</p><p>The hack has caused serious repercussions for Sony. The stolen data have made public some embarrassing emails written by its executives. Hackers also leaked unreleased movies and scripts.</p><p>The group that took responsibility for the attack, &quot;Guardians of Peace,&quot; said it was responding to Sony Pictures&#39; comedy about an assassination plot against North Korean leader Kim Jong Un.</p><p>After the group issued threats to attack movie theaters that show the film, major movie chains pulled&nbsp;The Interview&nbsp;and&nbsp;<a href="http://www.npr.org/blogs/thetwo-way/2014/12/17/371477960/major-theater-chains-wont-screen-the-interview-amid-threats">Sony decided against a Christmas Day release</a>.</p><p>&quot;We are deeply concerned about the destructive nature of this attack on a private-sector entity and the ordinary citizens who worked there,&quot; the FBI said. &quot;Further, North Korea&#39;s attack on [Sony] reaffirms that cyber threats pose one of the gravest national security dangers to the United States.&quot;</p><p>In a separate statement, Department of Homeland Security Secretary Jeh Johnson said the hack &quot;underscores the importance of good cybersecurity practices to rapidly detect cyber intrusions and promote resilience throughout all of our networks.</p><p>&quot;Every CEO should take this opportunity to assess their company&#39;s cybersecurity,&quot; he added.</p><p>Immediately following the FBI announcement, the chairman of the House Committee on Foreign Affairs, Rep. Ed Royce, R-Calif., criticized the White House for not imposing tough financial sanctions on North Korea.</p><p>&quot;North Korea is attacking our infrastructure,&quot; Royce said in a statement. &quot;It is also attacking our values. The decision to pull &#39;The Interview&#39; from theatres unfortunately is a North Korean victory in its attack on our freedom. We better quickly respond comprehensively to defend freedom of speech in the face of terrorist threats and cyber attacks.&quot;</p><p>Options, though, are limited. The U.S. could impose new financial sanctions on Pyongyang and boost military support to South Korea. Yet these moves have had little impact on the heavily sanctioned country in the past.</p><p><a href="http://money.cnn.com/2014/12/19/media/insde-sony-hack-interview/index.html?hpt=hp_t1">CNN reported earlier today</a>&nbsp;that the hackers behind the attack issued another statement today, praising Sony for pulling the movie. Removing it from screens, the hackers said in an email to Sony executives, was a &quot;very wise&quot; decision.</p><p>&mdash; <a href="http://www.npr.org/blogs/thetwo-way/2014/12/19/371894427/fbi-formally-accuses-north-korea-in-sony-hacking"><em>via NPR</em></a></p></p> Fri, 19 Dec 2014 14:14:00 -0600 http://www.wbez.org/news/culture/obama-says-sony-should-not-have-pulled-film-over-hacking-111277 With Sony hack, nation-state attacks go from quiet to overt http://www.wbez.org/news/culture/sony-hack-nation-state-attacks-go-quiet-overt-111264 <img typeof="foaf:Image" src="http://llnw.wbez.org//main-images/AP809914660283.jpg" alt="" /><p><p>NPR has confirmed from U.S. intelligence officials that North Korea was centrally involved with the recent attacks against Sony Pictures. And the company says it is pulling its comedy film The Interview from the box office. It was supposed to debut on Christmas. These are major developments in what we may now call cyberwarfare.</p><p>The White House hasn&#39;t come out and said it yet, but intelligence officials tell us that the North Korean government was in fact involved in this hack against Sony, where everything from social security numbers to executive salaries and celebrity gossip got leaked.</p><p>Yes, it&#39;s the confirmation that many people have been waiting for. Though it&#39;s also really important to note that we don&#39;t exactly know what that means &mdash; and I&#39;ve spoken with security experts who remain skeptical.</p><p>That said, if it&#39;s true, it really is extraordinary. North Korea is one of the poorest countries on Earth. Its people don&#39;t go online &mdash; they&#39;re cut off from the Internet. But its government has allegedly launched an overt cyberattack &mdash; and even secured a decisive victory &mdash; against one of the biggest companies on Earth.</p><p>Repeat: overt.</p><p>That&#39;s a key part here &mdash; the fact that you and I and everyone else knows about it.</p><p>I want to compare this with another cyberattack &mdash; one that was carried out by nation-state actors: Stuxnet in 2010. That&#39;s when the U.S. and Israel used some very sophisticated code to dig their way into nuclear facilities in Iran and damage the actual physical centrifuges.</p><p>In that case, the hackers caused physical damage in the real world &mdash; but they did it covertly. While the news eventually broke, it&#39;s not like the U.S. was sending out press releases.</p><p>In this case, the hackers &mdash; who might be North Korean officials or backed by the regime &mdash; have been very vocal from the get. Using the name &quot;Guardians of Peace,&quot; they&#39;ve even threatened to hurt people who go to see the movie in theaters.</p><p>Theater chains that were supposed to screen The Interview decided not to, and Sony canceled the Christmas Day release.</p><p>So, effectively, the hackers grabbed a ton of attention through an online attack &mdash; one that was nowhere near as sophisticated as Stuxnet. And they leveraged all that attention, that power, to pivot &mdash; and make a physical threat that people suddenly felt was credible.</p><p>This whole chain of events has experts inside the cybersecurity industry really concerned. I talked to a few people whose job it is to ward off these kinds of attacks. And they have different takes on whether Sony, by caving, made the right decision for itself.</p><p>But across the board, they&#39;re worried that the company is sending the wrong message by handing off a huge win to a disgruntled state with very limited resources.</p><p>So the concern is that we&#39;re going to see copycats or a new trend on the horizon.</p><p>Cyberattacks happen every day. At this point, they&#39;re nothing new.</p><p>I was talking to this one security expert in Moscow, who pointed out that during the height of tensions between Russia and Ukraine, there were plenty of cyberattacks &mdash; online skirmishes with one side taking down the other side&#39;s media outlet or defacing websites.</p><p>Now this Sony episode is showing what a disproportionate impact a small, angry entity can have &mdash; and how an attack online can spill over to physical-world consequences.</p><p>&mdash; <a href="http://www.npr.org/blogs/alltechconsidered/2014/12/18/371581401/with-sony-hack-nation-state-attacks-go-from-quiet-to-overt" target="_blank"><em>via NPR</em></a></p></p> Thu, 18 Dec 2014 14:34:00 -0600 http://www.wbez.org/news/culture/sony-hack-nation-state-attacks-go-quiet-overt-111264 Protests continue in Venezuela http://www.wbez.org/programs/worldview/2014-02-24/protests-continue-venezuela-109757 <img typeof="foaf:Image" src="http://llnw.wbez.org//main-images/(AP PhotoRodrigo Abd)_0.jpg" alt="" /><p><p>Opposition forces took to the streets again today in Venezuela.Reuters reports that at least 12 people have died in violence related to the ongoing protests. We&#39;ll take a look at what&#39;s behind the recent unrest.</p><div class="storify"><iframe allowtransparency="true" frameborder="no" height="750" src="//storify.com/WBEZ/worldview-protests-continue-in-venezuela/embed?header=false" width="100%"></iframe><script src="//storify.com/WBEZ/worldview-protests-continue-in-venezuela.js?header=false"></script><noscript>[<a href="//storify.com/WBEZ/worldview-protests-continue-in-venezuela" target="_blank">View the story "Worldview: Protests continue in Venezuela" on Storify</a>]</noscript></div></p> Mon, 24 Feb 2014 11:52:00 -0600 http://www.wbez.org/programs/worldview/2014-02-24/protests-continue-venezuela-109757 Chicagoans prep for massive 'civic hackathon' http://www.wbez.org/news/chicagoans-prep-massive-civic-hackathon-107327 <img typeof="foaf:Image" src="http://llnw.wbez.org//main-images/hackathon11.jpg" alt="" /><p></p> Thu, 23 May 2013 11:27:00 -0500 http://www.wbez.org/news/chicagoans-prep-massive-civic-hackathon-107327 Should concealed guns be allowed on the CTA? http://www.wbez.org/blogs/charlie-meyerson/2013-02/should-concealed-guns-be-allowed-cta-105622 <img typeof="foaf:Image" src="http://llnw.wbez.org//main-images/CTA riders.jpg" alt="" /><p><div><strong>&#39;YES, THAT WOULD SOLVE SO MANY PROBLEMS,&#39; SAID <em>NO ONE WHO ACTUALLY RIDES THE CTA.&nbsp;</em></strong><a href="http://www.suntimes.com/18341703-761/nra-let-bus-and-l-riders-pack-heat.html" target="_blank">The&nbsp;National Rifle Association wants public transit riders allowed to carry concealed guns on buses and trains</a>. A lobbyist tells the <em>Sun-Times</em> it&#39;s only fair for those who can&#39;t afford their own cars: &quot;They don&rsquo;t get the right to self-defense? They&rsquo;re supposed to roam around defenseless?&quot;<br />* From WBEZ&#39;s Tony Arnold: NRA lobbyist says &quot;<a href="http://soundcloud.com/wbez/from-springfield-conceal-carry" target="_blank">There will be no ... local rules about where you can or cannot carry</a>.&quot;<br />* And yet,&nbsp;<a href="http://www.chicagotribune.com/news/local/ct-met-illinois-gun-control-debate-0220-20130220,0,2603985.story" target="_blank">time&#39;s running out for the state to draft a concealed weapons law</a>.<br /><iframe align="right" allowfullscreen="" frameborder="0" height="169" longdesc="&quot;Buy a shotgun. Buy a shotgun.&quot;" name="Biden's gun advice" scrolling="no" src="http://www.youtube.com/embed/EDU2LWwDNcs?rel=0" width="300"></iframe>* Emanuel&#39;s solution to Chicago&#39;s violence includes&nbsp;<a href="http://www.suntimes.com/18338217-761/emanuel-launches-plan-to-raise-50-million-to-help-at-risk-kids.html" target="_blank">new $50 million fundraising drive for city&#39;s poorest kids</a>.<br />* The <em>Tribune</em>&#39;s John Kass: Why <em>is</em> New York&#39;s pro-gun-control Mayor Bloomberg &quot;<a href="http://www.chicagotribune.com/news/columnists/ct-met-kass-0220-20130220,0,810480.column" target="_blank">butting his way into Chicago politics</a>&quot;?<br />*&nbsp;<strong>Vice President Biden</strong>: Want to protect yourself? &quot;<a href="http://thehill.com/blogs/blog-briefing-room/news/283837-biden-buy-a-shotgun-buy-a-shotgun-" target="_blank">Get a double-barrel shotgun</a>.&quot;<br />* <a href="http://www.pbs.org/mediashift/2013/02/10-social-media-moments-that-shaped-the-gun-control-debate051.html" target="_blank">10 social media moments that shaped the gun-control debate</a>.</div><div>&nbsp;</div><div><strong>DE-SIGNING DAY.</strong>&nbsp;<a href="http://www.dnainfo.com/chicago/20130219/river-north/racy-billboard-above-river-north-portillos-removed" target="_blank">A billboard a residents group found offensive</a>&nbsp;has been removed from a River North neighborhood whose restaurants are popular as family destinations,&nbsp;<em>DNAinfo.com Chicago</em>&nbsp;reports.</div><div>* <a href="http://www.chicagotribune.com/news/local/ct-met-taste-of-chicago-0220-20130220,0,419501.story" target="_blank">Taste of Chicago lost $1.3 million</a> last year.</div><div>&nbsp;</div><div><strong>THE GUY WHO HACKED BURGER KING?</strong> <em>Gizmodo</em> says it&#39;s figured out <a href="http://gizmodo.com/5985353/exclusive-the-burger-king-and-jeep-hacker-is-probably-this-dj-from-new-england" target="_blank">who took over the @BurgerKing account on Twitter</a>.<br />* <a href="http://gizmodo.com/5985385/jeeps-twitter-account-has-been-hacked" target="_blank">@Jeep jacked</a>, too.<br />* MTV and BET <a href="http://www.chicagotribune.com/business/ct-jeep-twitter-hack-0221-20130219,0,1949915.story">fake their own twitjackings</a>.<br />* Twitter&#39;s blog:&nbsp;<a href="http://blog.twitter.com/2013/02/a-friendly-reminder-about-password.html" target="_blank">&quot;Best practices&quot; for passwords</a>.</div><div>&nbsp;</div><div><strong>&#39;DO NOT VISIT THIS SITE IN ANY WAY, SHAPE, OR FORM.&#39;&nbsp;</strong>That&#39;s ZDNet&#39;s advice about the Web address linked to compromise of computers at Facebook and Apple.&nbsp;<a href="http://www.zdnet.com/facebook-apple-hacks-could-affect-anyone-heres-what-you-can-do-7000011520/" target="_blank">Here&#39;s what it says you&nbsp;<em>should</em>&nbsp;do</a>.<br />* All Things D: &quot;... And&nbsp;<a href="http://allthingsd.com/20130219/this-is-the-site-likely-responsible-for-the-recent-major-tech-company-hacks/" target="_blank">there&rsquo;s probably more to come</a>.&quot;<br />* Andy Ihnatko: &quot;If any of you is driving a vintage Ford Pinto ...&nbsp;<a href="http://www.suntimes.com/technology/ihnatko/18340857-452/apple-hacked-and-java-is-the-weak-spot.html" target="_blank">get a Java bumper sticker for it</a>.&quot;<br />* What is a &quot;<a href="http://en.wikipedia.org/wiki/Zero-day_attack" target="_blank">zero-day attack</a>&quot;?</div><div>&nbsp;</div><div><strong>SEN. McCONNELL, IS YOUR REFRIGERATOR RUNNING?&nbsp;</strong>The military&#39;s answer to&nbsp;<em>The Onion</em>,&nbsp;<em><a href="http://www.duffelblog.com/" target="_blank">The Duffel Blog</a></em>, fooled the U.S. Senate Republican leader into taking seriously a report that&nbsp;<a href="http://www.wired.com/dangerroom/2013/02/mcconnell-duffel-blog/" target="_blank">Guantanamo Bay prisoners have been getting post-Sept. 11 GI Bill of Rights benefits</a>.<br />* Columbia University prof under review&nbsp;<a href="http://www.cbsnews.com/8301-201_162-57570198/columbia-professor-strips-shows-9-11-tape-during-class/" target="_blank">after stripping, showing 9/11 video</a>&nbsp;during quantum mechanics class, where student <a href="http://bwog.com/2013/02/18/frosci-gone-wil/" target="_blank">catches it on video</a>.</div><div>&nbsp;</div><div><strong>CUBS STRETCH INTO THE 21st CENTURY.&nbsp;</strong>Among the <a href="http://www.chicagotribune.com/sports/baseball/cubs/chi-stretch-20130219,0,7801200.story" target="_blank">changes coming to Wrigley Field and on-air broadcasts this year</a>, the <em>Tribune</em> reports: During the seventh-inning stretch, more focus on ex-Cubs and Chicago natives; and more songs recorded <em>after</em> the 1980s. And the Cubs want your music suggestions,&nbsp;<a href="http://chicago.cubs.mlb.com/help/email.jsp?c_id=chc&amp;prim" target="_blank">emailed to in-game programming director Jim Oboikowitch or&nbsp;senior marketing director Alison Miller</a>.<br />* Website <a href="http://www.chicagotribune.com/sports/breaking/chi-snafu-in-chicago-marathon-registration-20130219,0,6085495.story" target="_blank">glitches suspend Chicago Marathon online registration</a> until at least Thursday.<br />* <a href="http://www.chicagotribune.com/sports/breaking/chi-usoc-sounding-out-25-cities-on-2024-summer-games-bid-20130219,0,2561812.story" target="_blank">Chicago passes on 2024 Olympics</a> candidacy.</div><hr /><p><em><strong>ANNOUNCEMENTS.</strong></em><br /><em>* Suggestions for this blog?&nbsp;<a href="mailto:cmeyerson@wbez.org?subject=Things%20and%20stuff">Email anytime</a>.<br />* Get this blog by email, free. <a href="http://feedburner.google.com/fb/a/mailverify?uri=feedburner/AELk&amp;amp;loc=en_US" target="_blank">Sign up here</a>.</em><br /><em>* Follow us on Twitter:&nbsp;<a href="https://twitter.com/wbez" target="_blank">@WBEZ</a>&nbsp;and&nbsp;<a href="https://twitter.com/meyerson" target="_blank">@Meyerson</a>.<br />* Looking for the most recent WBEZ Meyerson News Quiz? <a href="http://www.wbez.org/blogs/charlie-meyerson/2013-02/are-you-news-quiz-whiz-105548" target="_blank">Here you go</a>.</em></p></p> Wed, 20 Feb 2013 05:00:00 -0600 http://www.wbez.org/blogs/charlie-meyerson/2013-02/should-concealed-guns-be-allowed-cta-105622