WTF - We already have problem with our personal data and the internet, and now we are looking into a technology that may be abused by government and outlaws?
SUMMARY:An intense debate is underway over the benefits and drawbacks of using microchips, typically relied upon to identify ranch animals and pets, on humans. Advantages include fast communication of critical patient data to medical teams, seamless payment, and automatically opened doors. But skeptics warn of dire implications for privacy and ethics. Special correspondent Malcolm Brabant reports.
SUMMARY:In the past 48 hours, findings have been released regarding attempts by hackers to influence the midterm elections. Now, the Democratic National Committee has reportedly asked the FBI to investigate an attempt to infiltrate its voter database. Nick Schifrin joins Amna Nawaz to discuss what groups might be responsible for hacking and what preventive measures are being deployed.
SUMMARY: As more people consume video online, "streaming" is the internet's version of live TV, but with instant feedback from fans. How have star streamers turned activities like taping themselves playing video games into profitable careers? Economics correspondent Paul Solman reports from DreamHack, a gaming convention in Austin, Texas.
Editor's Note: In this report on streaming, we point out police are sometimes called to a streamer’s house after a hoax call. In some cases, SWAT teams arrive in response. A previous version of this story mistakenly identified a man killed by police in one such case as a streamer. In fact, the victim was not a streamer. We regret the error.
SUMMARY: A year ago, Google’s Gmail said it stopped its practice of scanning users’ inboxes to personalize ads. But it still allows outside app developers to scan inboxes, according to a Wall Street Journal report. John Yang talks with tech reporter Douglas MacMillan, who broke that story.
SUMMARY:Long before the Cambridge Analytica scandal, new rules were being established by the European Union to give consumers greater control over their data. Starting in May, every company, big or small, that keeps your information online or elsewhere must comply. Special correspondent Malcolm Brabant reports.
SUMMARY:Facebook’s news feed algorithm learns in great detail what we like, and then strives to give us more of the same -- and it's that technology that can be taken advantage of to spread junk news like a virus. Science correspondent Miles O'Brien begins a four-part series on Facebook’s battle against misinformation that began after the 2016 Presidential election.
SUMMARY:Nine days ago, a cyberattack brought Atlanta to a virtual standstill. Now the city says it is slowly making progress restoring its computer network. Officials have not said whether they paid a $51,000 ransom to a group known as SamSam, which is thought to be behind the hack. Hari Sreenivasan learns more from Allan Liska of the security firm Recorded Future.
SUMMARY:A Supreme Court case centering around a piece of technology that most of us have in hand's reach has the potential to transform privacy law in the digital age. John Yang sits down with Marcia Coyle of the National Law Journal to explain the details and the potential effects of the case.
SUMMARY: The Wall Street Journal reported that Russia obtained classified information about how the U.S. military protects its computer networks and conducts electronic spying. The breach occurred when data was stolen by an NSA contractor, then hacked by Russia. Hari Sreenivasan speaks with The Wall Street Journal's Shane Harris.
SUMMARY: Nearly 100 countries around the world worked to restore services after a massive cyber attack on Friday. The ransomware attack appeared to exploit a vulnerability in Microsoft Windows, which was identified by the U.S. National Security Agency and later leaked to the internet. Former Assistant Attorney General for National Security John Carlin joins Hari Sreenivasan for more on the attack.
SUMMARY: A startup no longer, Instagram boasts 700 million monthly active users and counting. As it grows, the free, photo-sharing mobile app is grappling with how to innovate and stay relevant, as well as how to foster a safe community. But with 95 million uploads a day, monitoring is a tall order. Judy Woodruff reports from California.
WILLIAM BRANGHAM (NewsHour): The rapid rise of one of the world's biggest social media networks, Instagram.
It's building up steam, with 700 million people now using it each month, and it just took four months to pick up its latest 100 million new accounts.
But along the way, the company has faced concerns over how it can be used, and even some criticism for the way it essentially copied ideas from its rival, Snapchat.
Judy Woodruff recently got an inside look during her trip to Silicon Valley.
JUDY WOODRUFF (NewsHour): One of the first things that greets you inside Instagram is, no surprise, a place to take pictures. The free photo-sharing mobile app was born in 2010 with its first post, a foot in a flip-flop alongside a stray dog.
Turns out it was taken in Mexico by co-founder Kevin Systrom.
KEVIN SYSTROM, CEO and Co-Founder, Instagram: It's a mixture of teams. So, we have got design teams, we have got partnership teams, we have got a community team, and then a bunch of engineers. We don't really have an organization.
JUDY WOODRUFF: Systrom showed us around Instagram's new offices in Menlo Park, California, designed to accommodate an ever-expanding staff.
You moved here six months ago; is that right?
KEVIN SYSTROM: Yes, six months ago, we moved from the original campus. And we designed this entire experience inside here to be cleaner, and a little bit more Instagrammy. So we have got the hip wood walls, and the polished concrete floors. It's very start-uppy, but it's in an Instagram way.
JUDY WOODRUFF: A start-up no longer, Instagram was acquired by Facebook in 2012 for a cool billion dollars. Then, the company had 13 employees. Now it has more than 600 to keep up with a rapidly growing user base, 700 million monthly active users and counting, 80 percent of them outside the United States.
How do you explain the phenomenal, rapid growth of this?
KEVIN SYSTROM: On Instagram, very early on, you would post an image, and anyone anywhere in the world could see that image, and understand what you were trying to say without speaking your language.
So, we like to say that Instagram was one of the first truly international networks in the world. And I think that's what's allowed it to scale to the hundreds of millions of people that use it every day today.
First, as a retired Computer and IT Technician I understand the internet. I support 'NET Neutrality' because the internet delivery businesses WILL eventually give in to greed, to wanting bigger profits, at internet users expense.
Also, the Trump Administration LIES!
Excerpt
SUMMARY: Ajit Pai, President Trump's new FCC chairman, has plans to do away with net neutrality rules that have been in place for the last three years. Pai argues the rules are too burdensome and that they stifle innovation and competition. William Brangham discusses the changes in oversight with Pai.
JUDY WOODRUFF (NewsHour): A political fight is brewing about access to the Internet. The new head of the FCC, the Federal Communications Commission, wants to clear away regulations about who controls and polices the flow of content on the Internet.
William Brangham has that.
WILLIAM BRANGHAM (NewsHour): We're talking here about what's known as net neutrality, not the easiest concept to grasp, so bear with me.
Almost all of us in America get our Internet access via one main provider. These are the telecom and cable giants like Verizon, Comcast, Charter, Time Warner. They provide the infrastructure that delivers the bounty of the Web to our homes and phones; sites and apps like Google, Netflix, Facebook, Instagram, you name it.
The telecoms build the highway. The others guys are like the cars traveling that highway.
The idea of net neutrality is that the telecoms have to treat that highway as an open road. They can't pick and choose which Web sites or services get to you faster or slower. The fear is that, if they do have that power, they will be tempted to favor their content, their sites, their own videos over a competitor's.
But the telecoms argue that's not fair, they should be able to control that flow, and be able to charge more for faster access.
In 2014, the Federal Communications Commission under President Obama wanted to lock in these net neutrality rules, but it faced intense pushback by the industry.
The fight even spilled into pop culture, with this from HBO's John Oliver:
JOHN OLIVER, Host, “Last Week Tonight With John Oliver”: If we let cable companies offer two speeds of service, they won't be Usain Bolt and Usain Bolt on a motorbike. They will be Usain Bolt, and Usain bolted to an anchor.
(LAUGHTER)
WILLIAM BRANGHAM: But those net neutrality rules did pass and have been in place for the last three years.
But Ajit Pai, President Trump's new FCC chairman, now wants to get rid of those rules, arguing they're too burdensome. And this week, he began the process of rolling them back.
And FCC Commissioner Ajit Pai joins me now.
Welcome to the NewsHour.
AJIT PAI, Chairman, Federal Communications Commission: Thank you for having me.
WILLIAM BRANGHAM: So, you, I understand, are not a fan of these net neutrality rules from a few years ago. What is your principal concern?
AJIT PAI: Well, I favor a free and open Internet, as I think most consumers do.
My concern is with the particular regulations that the FCC adopted two years ago. They are what is called Title II regulations developed in the 1930s to regulate the Ma Bell telephone monopoly.
And my concern is that, by imposing those heavy-handed economic regulations on Internet service providers big and small, we could end up disincentivizing companies from wanting to build out Internet access to a lot of parts of the country, in low-income, urban and rural areas, for example.
And that, I think, is something that nobody would benefit from.
WILLIAM BRANGHAM: Is there evidence, though, that these rules have disincentivized those companies? There are — businesses are doing very, very well. They're spending billions on the spectrum.
AJIT PAI: There is significant evidence that investment in infrastructure has gone down since the adoption of these rules.
For example, there is a study by a highly respected economist that says that among the top 12 Internet service providers in terms of size, investment is down by 5.6 percent, or several billion dollars, over the last two years.
And amongst smaller providers as well, just literally this week, 22 Internet service providers with 1,000 customers or less told us that these Title II regulations have kept them from getting the financing that they need to build out their networks. And, as they put it, these net neutrality regulations hang like a black cloud over our businesses.
And so what we're trying to do going forward is figure out a way that we can preserve that free and open Internet that consumers want and need and preserve that incentive to invest in the network that will ultimately benefit even more consumers going forward.
SUMMARY: There are new rules for broadband providers when it comes to collecting and sharing consumer data. On Thursday, the Federal Communications Commission voted for the first time to create protections on the transmission of personal information for broadband providers. Hari Sreenivasan speaks with Tom Wheeler, chairman of the FCC.
HARI SREENIVASAN (NewsHour): New rules for broadband providers when it comes to collecting and sharing customer data.
The Federal Communications Commission voted for the first time today to create protections on the transmission of personal information from broadband providers.
Tom Wheeler is the chairman of the FCC. And he joins me now.
What is a provider going to have to do under these new rules?
TOM WHEELER, Chairman, Federal Communications Commission: Well, the key thing is that it is the consumers' information. It's not the network's information.
And the consumer now has the choice to say how they want that information to be used and if they want it to be used. So, there are really three key things. One, there has to be transparency, that the consumers have to be told, here's what we're doing with your information. Two, they have to have choice. So, do you want to opt in or opt out of this kind of service?
And, three, that data, when it's stored someplace, has to be stored securely and consumers have to know if there is some kind of data breach.
HARI SREENIVASAN: So, you have also expanded the definition of what is sensitive data. And some businesses have pushed back, saying, the browsing history, the app usage, Internet companies like Facebook and Google, they already have all that, and you're placing undue burdens on companies like Verizon, AT&T, et cetera.
TOM WHEELER: But what we're talking about is not the fact that you may go to a dozen sites that each will get a little bit of information.
We're talking about the network that takes you to every site and knows everything you're doing. And that's the big difference. You hire the network to deliver you to those sites. You don't hire the network to take your information without your permission and turn around and resell it.
SUMMARY: On Saturday, programming code for National Security Agency hacking tools was shared online. The content appears to be legitimate, but it is not clear if it was intentionally hacked or accidentally leaked. Hari Sreenivasan speaks with The Washington Post's Ellen Nakashima and Paul Vixie of Farsight Security about where this development fits in the context of other recent cybersecurity breaches.
HARI SREENIVASAN (NewsHour):The National Security Agency's primary mission is to spy on the electronic communications of countries and people overseas.
Over the weekend, though, sophisticated code the NSA developed to penetrate computer security systems was posted online. This serious breach comes amid the ongoing revelations of the hacking of the Democratic National Committee and other organizations, allegedly by groups linked to Russian intelligence.
For more on this, we turn to The Washington Post national security correspondent Ellen Nakashima, and Paul Vixie. He designed and built some of the software that is the backbone of the Internet today. He is now chairman and CEO of Farsight Security, a computer security firm.
Ellen Nakashima, what happened this weekend? What got released?
ELLEN NAKASHIMA, The Washington Post:Over the weekend, apparently on Saturday, mysteriously, a cache of NSA hacking tools was released online through file-sharing sites such as BitTorrent and Dropbox.
It really wasn't noticed until about Monday, when the computer security community started commenting on it and questions arose as to whether or not the NSA had been hacked.
HARI SREENIVASAN: So, Paul Vixie, if these lock picks, these digital tools to try break into different systems out are out in the open now, these are the tools that the American government was using, what is the consequence, if it is in the public sphere?
PAUL VIXIE, Farsight Security:Well, I think, every day, everybody is trying to hack everybody. So, this is not huge news.
What's big news about it is that these tools were built by the U.S. government. Some of the lock picks, as you call them, are now obsolete. They are relying on vulnerabilities that have since been closed, because the files are about 3 years old.
But at least one of them is active against a very current piece of equipment from Cisco. And it is going to lead to a lot of break-ins while the patches are prepared and shipped and then applied.
SUMMARY: In the 30 years since Steve Case co-founded AOL, the global tech landscape has seen immense growth and change. What new developments wait in the near future, and what does the rapidly expanding online world mean for human life? Case explores those issues in his new book, “The Third Wave.” Case joins Judy Woodruff to discuss his vision of the future.
JUDY WOODRUFF (NewsHour): Back in 1985, when Steve Case co-founded America Online, only 3 percent of Americans were actually online. Fast-forward some 30 years, and we can see the global change brought about by the Internet and an ever-growing array of devices and social media.
So, what is next?
Well, we get a glimpse from Steve Case himself. He is the author of a new book, “The Third Wave: An Entrepreneur’s Vision of the Future.”
Steve Case, it is good to see you.
STEVE CASE, Author, “The Third Wave”: It’s good to see you again.
JUDY WOODRUFF: So you borrowed that term the third wave from the futurist Alvin Toffler.
STEVE CASE: Yes.
When I was in college in the 1980, I read Toffler “Third Wave.” It completely mesmerized me inspired me. I spent the last almost four decades pursuing some of the ideas he talked about.
So, when I was writing a book, I wanted to pay respect to him. I open the book with talking about my experience reading Toffler. And I hope others will similarly be inspired by my book, and because the future once again is going to change, and the path forward is going to be different than what we saw in the last two waves. And that’s what I was trying to lay out in this book.
JUDY WOODRUFF: So, in a thumbnail, first wave was the creation of the Internet, which you were involved in. Second wave was building on that, you describe, social media devices and so forth.
What is the next wave?
STEVE CASE: It’s really integrating the Internet seamlessly throughout our lives.
And there is a lot of things that haven’t changed that much in the first wave or the second wave. How we learn, our kids learn is about the same. How we stay healthy is about the same. How we manage energy is about the same. Even how we think about food is about the same.
And work itself is starting to change in the third wave because of the freelance economy, what some call the gig economy. So, I think it’s important for everybody, not just businesspeople or technologists, to understand what is happening next. And that is what I try to lay out in this book with sort of a — a little bit of a road map forward and a little bit of a playbook in terms of how you can think about orchestrating your career and your life, and how you think about maybe your kids and even your grandkids. What world are they going to be inheriting?
This highlights the need to use good Anti-Virus utility AND do an image backup of your entire system AFTER running a virus scan (the only backup you can use to recover your entire system) . I do my backup monthly using O&O DiskImage to a USB External Drive that I disconnect after backup.
Excerpt
SUMMARY: One of the greatest threats to private cybersecurity today is ransomware -- a cyberattack that blocks access to a computer until the hacker is paid a ransom. The problem recently took on new urgency when a hospital in Los Angeles had its entire network shut down for hours, putting hundreds at risk; another high-profile breach hit L.A.’s health department last week. William Brangham reports.
GWEN IFILL (NewsHour): But, first, a look at what’s become the latest threat to our cyber-security.
The problem took on new urgency recently when a hospital in Los Angeles had its entire computer network, including all its digital medical records, locked up by hackers. They demanded a ransom before they’d release the computers. It was the second such attack this month. L.A.’s Health Department was hit last week.
These types of computer attacks, which usually target individual computer users, are on the rise.
The “NewsHour's” William Brangham reported on this threat last year, and now he brings us an update.
WILLIAM BRANGHAM (NewsHour): Inna Simone is retired. She’s a mother and grandmother from Russia who now lives outside of Boston. In the fall of 2014, her home computer started acting strangely.
INNA SIMONE, Retiree: My computer was working terribly. It was not working. I mean, it was so slow.
WILLIAM BRANGHAM: A few days later, while searching through her computer files, Inna saw dozens of these messages — they were all the same. They read: “Your files are encrypted. To get the key to decrypt them, you have to pay $500.”
Her exact deadline, December 2 at 12:48 p.m., was just a few days away.
All her files were locked , tax returns, financial papers, letters, even the precious photos of her granddaughter Zoe. Inna couldn’t open any of them.
INNA SIMONE: It says, “If you won’t pay, your fine will double. If you won’t pay by then, all your files will be deleted and you will lose them forever and never will get back.”
WILLIAM BRANGHAM: Inna Simone, like thousands of others, had been victimized by what’s known as a ransomware attack. Hackers — who law enforcement believe come mainly from Eastern Europe or Russia — manage to implant malicious software onto your computer, usually when you mistakenly open an infected e-mail attachment, or visit a compromised Web site.
That software then allows the hackers to lock up your files, or your entire computer, until you pay them a ransom to give it back.
Justin Cappos is a computer security expert at New York University.
JUSTIN CAPPOS, New York University: It will actually lock you out of the files, the data on your computer.
So, you’d be able to use the computer but those files have been encrypted by the attacker with a key that only they possess. It’s frustrating because you know the data is there. You know the files are there. You know your photos and everything is there and could be accessible to you. But you have no way of being able to get at it because of this encryption that the attackers are using.
WILLIAM BRANGHAM:This is exactly what happened at Hollywood Presbyterian Hospital in Los Angeles. According to officials, about a month ago, their computerized medical records were locked up by one of these malicious programs, and a hacker demanded $17,000 in ransom to unlock them.
During this time, medical staff were forced to use paper and pen for their record-keeping, but they say no patient files were compromised. The hospital decided to pay the ransom. Their computers were unlocked, and the FBI is now investigating.
An artificial intelligence program developed by researchers at Google can beat a human at the board game GO, which some consider to be the most complicated board game in existence. And this AI program — dubbed AlphaGo — didn’t defeat any ol’ human, but the European Go champion Fan Hui in a tournament last October by five games to nil. The findings, published today in the journal Nature, represent a major coup for machine learning algorithms.
“In a nutshell, by publishing this work as peer-reviewed research, we at Nature want to stimulate the debate about transparency in artificial intelligence,” senior editor Tanguy Chouard said at a press briefing yesterday. “And this paper seems like the best occasion for this, as it goes- should I say, right at the heart of the mystery of what intelligence is.”
“So Go is probably the most complex game ever devised by man. It has 10^170 (that's 10 followed by 170 zeros) possible board configurations, which is more than the numbers of atoms in the universe,” said study author and AlphaGo co-developer Demis Hassabis of Google DeepMind.
SUMMARY: Folded into the massive spending and tax cut bill was a significant and controversial new law on cybersecurity. The act encourages private companies to share data about hacks with the government, but it's raising questions among security advocates and privacy groups alike. Jeffrey Brown talks to James Lewis of the Center for Strategic and International Studies and Elissa Shevinsky of JeKuDo.
GWEN IFILL (NewsHour): Before the president and Congress left town for the holidays, they managed to enact a massive 2,000-page package of spending and tax cuts. Typically, these laws draw attention only for the chaos they create, like shutting down the government.
But there’s a lot more deep inside, in this case, a significant and controversial new law governing cyber-security and Internet data. The new law encourages private companies to share data about cyber-hacks with the government. It protects companies from liability, and it also allows data to shared with other companies and with the Department of Homeland Security.
Lawmakers from both parties said it was a good deal.
SEN. DIANNE FEINSTEIN, D-Calif.: If someone sees a particular virus or harmful cyber-signature, they should tell others, so they can protect themselves. That’s what this bill does.
REP. DEVIN NUNES, R-Calif.: We believe that sharing is an area where you really can’t do any harm. It doesn’t hurt anybody to have a way to talk. But, right now, they can’t even talk.
SEN. SUSAN COLLINS, R-Maine:Does it make sense that we require one case of measles to be reported to a federal government agency, but not a cyber-attack?
GWEN IFILL: But there are some security advocates and privacy groups who say the law manages to go too far and not quite far enough.
Jeffrey Brown has that debate.
JEFFREY BROWN (NewsHour): To understand more, we’re joined by James Lewis, senior fellow for the Center for Strategic and International Studies, and Elissa Shevinsky, founder of JeKuDo, a tech start-up designed to provide private communications to customers.
SUMMARY: For years, the British government has reportedly tracked and stored billions of records of Internet use by British citizens and those outside the UK in an effort to track every visible user on the Internet. Ryan Gallagher of "The Intercept" joins Hari Sreenivasan via Skype from Brighton, England, with more on UK cyber surveillance.
HARI SREENIVASAN (NewsHour): For years, the British government has reportedly tracked and stored billions of records of Internet use by British citizens and people outside the U.K., in an effort to track every visible user on the internet. That finding comes from “The Intercept” Web site, which is publishing findings from National Security Agency contractor (traitor) Edward Snowden’s leak on government surveillance practices.
“Intercept” reporter Ryan Gallagher wrote the story and joins me now via Skype from Brighton, England.
First of all, explain the scale of surveillance that was happening from the British equivalent of the NSA, the GCHQ.
RYAN GALLAGHER, THE INTERCEPT: Well, the skill is quite phenomenal. I mean, it’s hard to translate it when you just see the numbers. But you’re talking about 50 (ph) to 100 billion metadata records of phone calls and e-mails every single day. So vast, vast quantities of information they’re sweeping up. And they were talking by 2030 having in place the world’s largest surveillance system, so, a system that surpasses even what the NSA and U.S. has built itself.
HARI SREENIVASAN: OK, when somebody hears that there’s millions and billions and possibly trillions of pieces of data, they’re going to say, you know, what, how do you actually identify this is specifically me that’s doing this, or going to the site, or saying this thing in a chat room?
RYAN GALLAGHER: Uh-huh. Well, I mean, we have — we don’t actually — one of the interesting parts of the story is that we had a bunch of specific cases where, for example, we had monitored something like 200,000 people from something like 185 different countries, so almost every country in the world, they have listened to radio source (ph) through their computer. In one case, they decided to pick out just one of these people. It seems like at random, and what web site he had been viewing.
So, it’s kind of an all-seeing system. When you’re gathering that amount of information, it’s going to be something that does have an impact and effect in all of us really.
SUMMARY: The U.S. government wants to be able to read certain data that's inaccessible to intelligence agencies due to encryption. At a Senate hearing, FBI director James Comey said the privacy technology can be a double-edged sword, detrimental to public safety. Gwen Ifill speaks to former Homeland Security Department official Stewart Baker and Susan Landau of the Worcester Polytechnic Institute.
GWEN IFILL (NewsHour): Earlier in the day, the Obama administration went to Capitol Hill to make its case to allow government great access to encrypted information. Essentially, the government wants to be able to read certain data that intelligence agencies cannot get now because it’s been protected with special codes. That’s at the heart of an ongoing battle with tech companies.
JAMES COMEY, FBI Director: Encryption is a great thing. It keeps us all safe. It protects innovation.
GWEN IFILL: But, FBI Director James Comey warned at Senate hearings today, it’s also a double-edged sword. That’s because the technologies that seal off smartphones from surveillance also impede efforts to track criminals and terrorists.
JAMES COMEY: We are moving inexorably to a place where all of our lives, all of our papers and effects, all of our communications will be covered by universal strong encryption. And that is a world that in some ways is wonderful and in some ways has serious public safety ramifications.
GWEN IFILL: Google, Apple and other tech firms have ramped up data encryption in the wake of Edward Snowden’s revelations of sweeping government surveillance. They’re also responding to stepped-up hacking coming from Russia and China.
But, at the same time, Islamic State followers and other militants are now using encrypted communications to recruit at a rapid pace. Deputy Attorney General Sally Yates underscored that point today.
SALLY YATES, Deputy Attorney General: ISIL currently communicates on Twitter, sending communications to thousands of would-be followers right here in our country. When someone responds and the conversations begin, they are then directed to encrypted platforms for further communication.
And even with a court order, we can’t see those communications. This is a serious threat. And our inability to access these communications with valid court orders is a real national security problem.
GWEN IFILL: And the FBI’s Comey suggested it’s just a matter of time before that leads to a terror attack.
JAMES COMEY: We are stopping these things so far through tremendous hard work, the use of sources, the use of online undercovers, but it is incredibly difficult. I cannot see me stopping these indefinitely.
I make no guarantee that any advice given on these pages will work as expected. There are just too many variables depending on Operator Systems and hardware configurations to give any advice that will always work.
Where possible, I will provide links to my source.
I have over 30yrs experience in electronics, computers, and software. I have served as an IT Technician. So I have created this blog to pass on my experience on these subjects.
Note that I do not have any Certifications nor degrees. All I know is from hands-on.
My experience in electronics comes from 22yrs in the Navy (retired) in Avionics, including as an instructor.
Note that I monitor the support forums under "Recommended Links."
There is no guarantee that any link provided in this blog will always work, especially for older links. The validity of any link is governed by the source-site policies. Some sites will archive articles and require subscription to access. Very small sites, such as a local town newspaper, may not archive at all.