IRS Tells Couple With $7 Million in Bitcoin to Liquidate Crypto Assets and Pay off Tax Debt | Taxes – Bitcoin News

The Internal Revenue Service (IRS) has won a case in which it demanded that a Maryland couple liquidate their bitcoin to pay-off a $1.1 million tax debt.

Alexander and Laura Strashny proposed to the IRS to pay their 2017 tax liability, generated from non-crypto activities, in installments over a six-year period.

But after seeing the Strashnys $7 million cryptocurrency fortune, the tax collector rejected the proposal, insisting that the couple sell a part of their bitcoin and immediately settle the debt in full.

The case was heard in a tax court in the state of Maryland on June 11. More taxes await the couple in the likely event it sells crypto to pay-off the debt. Bitcoin investors in the U.S. are taxed on profits generated from buying and selling of digital financial assets.

The ruling shows how your cryptocurrency holdings could work against you in applying for an installment plan with the IRS and how contrary to popular belief regulators have oversight over your cryptocurrency portfolio, said Shehan Chandrasekera, tax expert at Cointracker.

According to court papers, the Strashnys filed a 2017 tax return on time, but did not pay the $1.1 million tax charge, inclusive of penalties. In July 2018, the couple proposed to the IRS to pay-off their huge tax bill over six years.

To qualify for the installment plan, a taxpayer must also furnish the IRS with details about their source of income, personal assets, including cryptocurrency, as well as monthly expenses. So, the Strashnys filed a Collection Information Statement, also known as Form 433-A, for this purpose.

It is on this Form that the couple revealed its $7 million crypto cache. In addition to annual wages of $200,000, the Strashnys were also pocketing $19,000 each month from their digital assets investment. Now the IRS hit the family with a formal threat of seizure of wages and properties, as it waited for a response on the installment proposal The tax collector demanded full payment on time.

Eventually, the Strashnys requested a hearing. The tax court ruled that the couple was in a good financial position to pay off the $1.1 million tax debt by liquidating the crypto stash or borrowing U.S. dollars against the virtual currency.

The outcome of this court case shows how cryptocurrency is not immune from regulatory oversight, explained Chandrasekera.

One might question why the cryptocurrency holdings were reported on Form 433-A in the first place. This IRS form is signed by the taxpayer under penalty and perjury. If the large holding of cryptocurrency were omitted from the form, this would have been a fraudulent filing and the consequences could have been much harsher, he added.

What do you think about the IRS crypto liquidation tax demand? Let us know in the comments section below.

Image Credits: Shutterstock, Pixabay, Wiki Commons

Disclaimer: This article is for informational purposes only. It is not a direct offer or solicitation of an offer to buy or sell, or a recommendation or endorsement of any products, services, or companies. Bitcoin.com does not provide investment, tax, legal, or accounting advice. Neither the company nor the author is responsible, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with the use of or reliance on any content, goods or services mentioned in this article.

Read disclaimer

Continued here:
IRS Tells Couple With $7 Million in Bitcoin to Liquidate Crypto Assets and Pay off Tax Debt | Taxes - Bitcoin News

1904labs and Bayer Crop Science Develop Open Source Geospatial Mapping Software to Help Business & Community Solve Real-World Problems -…

1904labs, a digital transformation consulting firm, andBayer Crop Science, a division of German life sciences company Bayer AG, jointly released a new geospatial mapping framework to the open source community. The framework,ol-kit, is a free, easy-to-use, map component toolkit built with React andOpenLayersand is compatible with many popular open source tools in thegeospatialcommunity.

Geospatial technology has captured the attention of the public eye in the current crisis with mapsbeing created to track COVID-19 cases, essential supplies, and more. However, many existing mapping frameworks are costly or not robust enough to meet these crucial challenges. While geospatial tools are some of the most expensive and complex software, ol-kit gives anyone these comprehensive capabilities at no cost.

Bayer and 1904labs started working on this mapping framework four years ago. Internally, the ol-kit is a backbone for many of Bayers applications for managing fields, research experiments, monitoring yields, and more. These applications gather a huge amount of data. Without the interactive map, driven by ol-kit, it would be impossible to interpret the data.

Shaun Diltz, Principal Product Manager at Bayer Crop Science said, This is an important piece of functionality from which small businesses, governments, and community organizations would see tremendous benefit. Contributing to the open source community wasnt something that our group had done before, but it was well worth the effort, and I cant wait to see how ol-kit is used.

With open source software,its core code is availablefor anyone to view, change, or use in their own way free of charge. Typically more cost effective than proprietary software, open source software also benefits from community collaboration to make it better, more secure, and stable.

Robin Carnahan, Fellow at Georgetown University, and previous director of the state and local practice at the federal General Services Administrations tech consultancy team, 18F said, Its great to see a big international enterprise and a small business collaborating to create something really valuable for the larger community and to make it freely available to them. Thats the power of open source.

As the use of location plays an ever-increasing role in our global economy, open sourcing ol-kit will enable small business and community organizations alike to leverage its geospatial capabilities to study and solve critical challenges that they previously may not have been able to afford to tackle. During the pandemic, smaller municipalities with minimal IT budgets can use ol-kits fully customizable toolkit to analyze patterns within their communities to better contain the virus. It can also be applied to provide helpful insights and chart trends in areas like census tracking, election mapping, and combating natural disasters such as wildfires.

Continue reading here:
1904labs and Bayer Crop Science Develop Open Source Geospatial Mapping Software to Help Business & Community Solve Real-World Problems -...

How CIOs deal with the trials and triumphs of open source projects – ETCIO.com

Enterprises are in the middle of digital transformation, with demand for agile business models and customer-centric services. This in turn raises the demand and necessity for innovative, responsive and low cost software products. Open source therefore is making its way from high tech firms and startups to the enterprises.

Open source gives CIOs architectural control by avoiding vendor lock-in, this helps create a digital backbone to deploy hybrid cloud environments and new operating models while leveraging their existing IT infrastructure and applications seamlessly.

Cost center to innovation essential

According to Forrester data, a third of global enterprise infrastructure decision makers see expanding the use of open source as a critical or high priority.

Open source technology is strategically crucial as part of the enterprise software strategy especially because it helps drive a collaborative approach to innovation as well as having a significant impact in domains like artificial intelligence, machine learning, cloud computing, etc, says Harnath Babu, CIO, KPMG.

More than 50 percent of the Fortune 100 use OpenStack, and over 50 percent of the Fortune 500 use Cloud Foundry, states Danny Mu, Principal Analyst, Forrester. From the operating system to the latest responsive design framework, many open source technologies are stable and ready for prime time. Open source solutions offer rapidly evolving ecosystems, credibility for digital startups through strong communities, easier customization and disposability, said Mu.

Vetting open source projects

Open source is a development model, not a business model. Enterprise customers need products, not projects and its incumbent on vendors to know the difference.

Too often, we see open source companies who dont understand the difference between projects and products. In a rush to deliver the latest and greatest innovations, as packaged software or public cloud services, these companies end up delivering solutions that lack the stability, reliability, scalability, compatibility and all the other non-functional requirements that enterprise customers rely on to run their mission-critical applications, said Marshal Correia, Vice President and General Manager, India, South Asia at Red Hat.

While the motivation of companies to sponsor an open source project might be for marketing and branding or development recruitment purposes, maintaining a consistent revenue stream is a struggle.

Atul Mangla, VP-Technology, Digit Insurance agrees with the market sentiment of the non-evolution of OS sans active sponsor and developer community. Young organizations should choose projects which are well established in the market and being used by multiple other companies whereas big organizations can sponsor new open source projects and reap the benefits of crowdsourcing of ideas and skills, he said.

And as sponsorship is required from business as it's one of the biggest bets for them, CIOs also need to create comfort with the businesses by developing skill sets, continuously evolving the platform as well as looking for support options through subscription models, opined Babu.

Community participation

One of the best ways to mitigate the risks associated with open source projects is to ensure community participation. Organizations primary focus should remain on building great offerings with great customer experience. However, once the initial stage is passed, it is a good time for an organization to start contributing to open source communities of its choice.

This helps in not only giving back to projects/communities where you gained in the past, but also it fuels the next level of innovation within the organization, says Mangla.

What customers pay for is the support to help manage lifecycle management and interoperability, opines Correia. "If you have made any changes or additions to the code, you need to share that knowledge and intelligence back with the community," he says.

The source code for open source software is free. However that does not necessarily mean that executable software is given away for free. For instance, the source code for Red Hat Enterprise Linux is freely available to anyone, but converting that source code into runnable code requires expertise, time, and servers, Correia says.

Harnath Babu believes that as enterprises leverage on the innovation driven by open source communities, it is only fair to give back with code improvements and enhancements. CIOs can have a clear-cut strategy to Code Commit back to the communities to ensure that the software gets enriched as well as other enterprises can leverage on it to solve business problems, he concludes.

Follow this link:
How CIOs deal with the trials and triumphs of open source projects - ETCIO.com

Nokia and AT&T run successful trial of the RAN Intelligent Controller over commercial 5G – GlobeNewswire

Press Release

Nokia and AT&T run successful trial of the RAN Intelligent Controller over commercial 5G

18 June 2020

Espoo, Finland Nokia and AT&T today announced a successful limited live trial of the RAN Intelligent Controller (RIC) over AT&Ts commercial 5G mmWave network in New York City. Once fully implemented into the network, the RIC platform will enable increased network optimization capabilities through policy-guided, closed loop automation.

Last year, AT&T and Nokia announced their collaboration to co-develop the RIC software platform, in alignment with the O-RAN Alliance target architecture, to accelerate the creation of open source software for the 5G RAN. The intent is to create open interfaces and an open ecosystem of interoperable components that will enable rapid, flexible service deployments and programmability within the RAN. The RIC software is available at the O-RAN Software Community.

For the recent trial, AT&T and Nokia ran a series of external applications, called xApps, at the edge of AT&Ts live 5G mmWave network on an Akraino-based Open Cloud Platform. The xApps used in the trial were designed to improve spectrum efficiency, as well as offer geographical and use case-based customization and rapid feature onboarding.

Ultimately, the trial achieved its test goals. Both companies tested the RAN E2 interface and xApp management and control, collected live network data using the Measurement Campaign xApp, the neighbor relation management using Automated Neighbor Relation (ANR) xApp, and tested RAN control via the Admission Control xApp all with zero interruption to the live commercial network.

Mazin Gilbert, VP of Technology and Innovation at AT&T, said: This successful trial is a testament to what we can achieve through openness and collaboration. Together with the O-RAN Alliance, AT&T and Nokia will continue to develop and contribute to the E2 interface and the RIC platform to help enable an intelligent and flexible 5G network.

Michael Clever, Head of Edge Cloud Platforms at Nokia, said: We are excited about the success achieved by the joint AT&T and Nokia team in proving out the RIC over AT&T's 5G network in such a great city. This represents a major milestone toward the advancement of RAN network intelligence, openness and programmability, with the ultimate goal of improving wireless networks efficiency and end user experience.

Resources:

*About AT&T CommunicationsWe help family, friends and neighbors connect in meaningful ways every day. From the first phone call 140+ years ago to mobile video streaming, we innovate to improve lives. We have the nations fastest wireless network.** And according to Americas biggest test, we have the nations best wireless network.*** Were buildingFirstNetjust for first responders and creating next-generation mobile 5G. With a range of TV and video products, we deliver entertainment people love to talk about. Our smart, highly secure solutions serve nearly 3 million global businesses nearly all of the Fortune 1000. And worldwide, our spirit of service drives employees to give back to their communities.

AT&T Communications is part of AT&T Inc. (NYSE:T). Learn more atatt.com/CommunicationsNews.

AT&T products and services are provided or offered by subsidiaries and affiliates of AT&T Inc. under the AT&T brand and not by AT&T Inc. Additional information about AT&T products and services is available atabout.att.com. Follow our news on Twitter at @ATT, on Facebook atfacebook.com/attand on YouTube atyoutube.com/att.

2020 AT&T Intellectual Property. All rights reserved. AT&T, the Globe logo and other marks are trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners.

**Based on analysis by Ookla of Speedtest Intelligence data median download speeds for Q1 2020. Ookla trademarks used under license and reprinted with permission.

***GWS OneScore, September 2019.

About NokiaWe create the technology to connect the world. Only Nokia offers a comprehensive portfolio of network equipment, software, services and licensing opportunities across the globe. With our commitment to innovation, driven by the award-winning Nokia Bell Labs, we are a leader in the development and deployment of 5G networks.

Our communications service provider customers support more than 6.4 billion subscriptions with our radio networks, and our enterprise customers have deployed over 1,300 industrial networks worldwide. Adhering to the highest ethical standards, we transform how people live, work and communicate. For our latest updates, please visit us online http://www.nokia.com and follow us on Twitter @nokia.

Media Inquiries:NokiaCommunicationsPhone:+358 10 448 4900Email:press.services@nokia.com

Read the original here:
Nokia and AT&T run successful trial of the RAN Intelligent Controller over commercial 5G - GlobeNewswire

Tag: Business Analytics and Enterprise Software Market Types And Applications – Cole of Duty

The report Business Analytics and Enterprise Software Market will be useful to get a stronger and effective Business Outlook. It provides an in-depth analysis of different attributes of industries such as trends, SWOT analysis, policies and clients operating in several regions. The Qualitative and Quantitative Analysis Techniques have been used by analysts to provide accurate and applicable data to the readers, business owners and industry experts.

The global business analytics & enterprise software market is expected to grow from $255.8 billion in 2019 to $260.4 billion in 2020 at a compound annual growth rate (CAGR) of 1.9%. The low growth is mainly due to economic slowdown across countries owing to the COVID-19 outbreak and the measures to contain it. The market is then expected to recover and grow at a CAGR of 13% from 2021 and reach $362.3 billion in 2023.

Top Companies in the global Business Analytics & Enterprise Software Market areSAP SE ADR(NYSE:SAP); SAS Institute; International Business Machines Corp.(NYSE:IBM); Oracle Corp.(NYSE:ORCL); Tableau Software Inc and Others.

Click here to get the latest sample PDF copy of updated research 2020https://www.marketinsightsreports.com/reports/06022059068/business-analytics-enterprise-software-global-market-report-2020-30-covid-19-impact-and-recovery-including-1-by-type-erp-software-bi-software-crm-software-scm-software-other-software-2-by-end-user-industry-it-and-telecommunications-bfsi-manufacturing-retail-healthcare-education-media-others-3-by-deployment-model-on-demand-cloud-on-premise-covering-sap-sas-institute-ibm-corporation-oracle-corporation-tableau-software-inc/inquiry?mode=72&source=coleofduty

Asia Pacific was the largest region in the global business analytics & enterprise software market, accounting for 38% of the market in 2019. North America was the second largest region accounting for 37% of the global business analytics & enterprise software market. Africa was the smallest region in the global business analytics & enterprise software market.

Over the past five years there has been an increasing prevalence of low cost open source alternatives. Open source has become a preferred platform for developing new technology. In the past, software product companies would open source software that was not making money, but now companies are open sourcing software to increase its presence and share in the market. According to Allison Randal, President, Open Source Initiative, 78% of companies use open source solutions and 64% participate in open source projects indicating an increase in open source software platforms to build applications in 2015.

ScopeMarkets Covered:1) By Type: ERP Software; BI Software; CRM Software; SCM Software; Other Software2) By End-User Industry: IT and Telecommunications; BFSI; Manufacturing; Retail; Healthcare; Education; Media; Others3) By Deployment Model: On-Demand/Cloud; On-Premise

Subsegments Covered: Construction Business Analytics & Enterprise Software; Agricultural Implement; Mining And Oil And Gas Field Business Analytics & Enterprise Software; Woodworking And Paper Business Analytics & Enterprise Software; Other Industrial Business Analytics & Enterprise Software; Printing Business Analytics & Enterprise Software And Equipment; Semiconductor Business Analytics & Enterprise Software; Food Product Business Analytics & Enterprise Software; Other Commercial And Service Industry Business Analytics & Enterprise Software; Photographic And Photocopying Equipment; Optical Instrument And Lens; HVAC And Commercial And Industrial Refrigeration Equipment; Commercial Fan And Air Purification Equipment; Heating Equipment (except Warm Air Furnaces); Special Die And Tool, Die Set, Jig, And Fixture; Machine Tool; Industrial Mold; Rolling Mill And Other Metalworking Business Analytics & Enterprise Software; Cutting Tool And Machine Tool Accessory; Commercial Internal Combustion Engines; Turbine And Turbine Generator Set Units; Mechanical Power Transmission Equipment; Speed Changer, Industrial High-Speed Drive, And Gear

Browse full report description with TOChttps://www.marketinsightsreports.com/reports/06022059068/business-analytics-enterprise-software-global-market-report-2020-30-covid-19-impact-and-recovery-including-1-by-type-erp-software-bi-software-crm-software-scm-software-other-software-2-by-end-user-industry-it-and-telecommunications-bfsi-manufacturing-retail-healthcare-education-media-others-3-by-deployment-model-on-demand-cloud-on-premise-covering-sap-sas-institute-ibm-corporation-oracle-corporation-tableau-software-inc?mode=72&source=coleofduty

Regions covered By Business Analytics & Enterprise Software Market Report 2020 To 2030 areNorth America (The United States, Canada, and Mexico), Asia-Pacific (China, India, Japan, South Korea, Australia, Indonesia, Malaysia, and Others), Europe (Germany, France, UK, Italy, Russia, and Rest of Europe), Central & South America (Brazil, and Rest of South America), and Middle East & Africa (GCC Countries, Turkey, Egypt, South Africa and Other)

Effect of the Business Analytics & Enterprise Software market report is A comprehensive evaluation of all opportunities and risks in the market. Business Analytics & Enterprise Software market current developments and significant occasions. A deep study of business techniques for the development of the market-driving players. Conclusive study about the improvement plot of the market for approaching years. Top to the bottom approach of market-express drivers, targets, and major littler scale markets. Favorable impressions inside imperative mechanical and publicize the latest examples striking the market.

Contact UsIrfan Tamboli (Sales Manager) Market Insights ReportsPhone: + 1704 266 3234 | +91-750-707-8687[emailprotected]|[emailprotected]

Read more here:
Tag: Business Analytics and Enterprise Software Market Types And Applications - Cole of Duty

Information Technology Market To Witness the Highest Growth Globally in Coming Years 2020-2030 – Cole of Duty

The Global Information Technology Market Perspective, Comprehensive Analysis along with Major Segments and Forecast, 2020-2030. The Information Technology Market report is a valuable source of insightful data for business strategists. It offers the industry overview with growth analysis and historical & futuristic cost, revenue, demand, and supply data (as applicable). The report explores the current outlook in global and key regions from the perspective of players, countries, product types, and end industries. This Information Technology Market study provides comprehensive data that enhances the understanding, scope, and application of this report.

The global information technology market is expected to decline from $8010.9 billion in 2019 to $7948.8 billion in 2020 at a compound annual growth rate (CAGR) of -0.8%. The decline is mainly due to economic slowdown across countries owing to the COVID-19 outbreak and the measures to contain it. The market is then expected to recover and grow at a CAGR of 9% from 2021 and reach $10189.3 billion in 2023.

Ask for a detailed report sample:https://www.marketinsightsreports.com/reports/06022059193/information-technology-global-market-report-2020-30-covid-19-impact-and-recovery-including-1-by-type-it-services-computer-hardware-telecom-software-products-2-by-end-user-industry-financial-services-retail-wholesale-manufacturing-healthcare-others-covering-at-t-apple-verizon-communications-inc-china-mobile-ltd-microsoft/inquiry?Mode=19&Source=COD

Scope

Markets Covered:1) By Type: IT Services; Computer Hardware; Telecom; Software Products2) By End-User Industry: Financial Services; Retail & Wholesale; Manufacturing; Healthcare; Others

Subsegments Covered: Hardware Support Services; Software And BPO Services; Cloud Services; Computer Peripheral Equipment; Computer Storage Devices And Servers; Computers; Wireless Telecommunication Carriers; Wired Telecommunication Carriers; Communications Hardware; Satellite & Telecommunication Resellers; Operating Systems & Productivity Software Publishing; Database, Storage & Backup Software Publishing; Business Analytics & Enterprise Software; Video Game Software; Design, Editing & Rendering Software

Companies Mentioned: AT&T; Apple; Verizon Communications Inc.; China Mobile Ltd; Microsoft

Countries: Argentina; Australia; Austria; Belgium; Brazil; Canada; Chile; China; Colombia; Czech Republic; Denmark; Egypt; Finland; France; Germany; Hong Kong; India; Indonesia; Ireland; Israel; Italy; Japan; Malaysia; Mexico; Netherlands; New Zealand; Nigeria; Norway; Peru; Philippines; Poland; Portugal; Romania; Russia; Saudi Arabia; Singapore; South Africa; South Korea; Spain; Sweden; Switzerland; Thailand; Turkey; UAE; UK; USA; Venezuela; Vietnam.

Regions: Asia-Pacific; Western Europe; Eastern Europe; North America; South America; Middle East; Africa.

Time series: Five years historic and forecast.

Data: Ratios of market size and growth to related markets, GDP, Expenditure Per Capita, The Information Technology Indicators Comparison.

Data segmentations: country and regional historic and forecast data, market share of competitors, market segments.

Sourcing and Referencing: Data and analysis throughout the report is sourced using end notes.

This study mainly helps understand which Information Technology market segments or Region or Country they should focus in coming years to channelize their efforts and investments to maximize Growth and profitability. The report presents the market competitive landscape and a consistent in depth analysis of the major vendor/key players in the market.

Market OverviewNorth America was the largest region in the global information technology market, accounting for 34% of the market in 2019. Asia Pacific was the second largest region accounting for 32% of the global information technology market. Africa was the smallest region in the global information technology market.

Over the past five years there has been an increasing prevalence of low cost open source alternatives. Open source has become a preferred platform for developing new technology. In the past, software publishers would open source software that was not making money, but now companies are open sourcing software to increase its presence and share in the market. According to Allison Randal, President, Open Source Initiative, 78% of companies use open source solutions and 64% participate in open source projects indicating an increase in open source software platforms to build applications in 2015.

Get up to 20% Discount on Information Technology Market Report:https://www.marketinsightsreports.com/reports/06022059193/information-technology-global-market-report-2020-30-covid-19-impact-and-recovery-including-1-by-type-it-services-computer-hardware-telecom-software-products-2-by-end-user-industry-financial-services-retail-wholesale-manufacturing-healthcare-others-covering-at-t-apple-verizon-communications-inc-china-mobile-ltd-microsoft/discount?Mode=19&Source=COD

What are the market factors that are explained in the report?

-Key Strategic Developments:The study also includes the key strategic developments of the market, comprising R&D, new product launch, M&A, agreements, collaborations, partnerships, joint ventures, and regional growth of the leading competitors operating in the market on a global and regional scale.

-Key Market Features:The report evaluated key market features, including revenue, price, capacity, capacity utilization rate, gross, production, production rate, consumption, import/export, supply/demand, cost, market share, CAGR, and gross margin. In addition, the study offers a comprehensive study of the key market dynamics and their latest trends, along with pertinent market segments and sub-segments.

-Analytical Tools:The Global Information Technology Market report includes the accurately studied and assessed data of the key industry players and their scope in the market by means of a number of analytical tools. The analytical tools such as Porters five forces analysis, feasibility study, and investment return analysis have been used to analyze the growth of the key players operating in the market.

The research includes historic data from 2015 to 2020 and forecasts until 2030 which makes the reports an invaluable resource for industry executives, marketing, sales and product managers, consultants, analysts, and other people looking for key industry data in readily accessible documents with clearly presented tables and graphs.

Contact Us:

Irfan Tamboli (Head of Sales) Market Insights ReportsPhone: + 1704 266 3234 | +91-750-707-8687[emailprotected]|[emailprotected]

Originally posted here:
Information Technology Market To Witness the Highest Growth Globally in Coming Years 2020-2030 - Cole of Duty

Chelsea Manning out of jail, back in NYC after suicide attempt

Chelsea Manning is back in the Big Apple sharing the first photo of herself since she attempted suicide in jail.

Hi all been staying safe inside a lot, Manning wrote on Twitter, flashing a peace sign alongside a friend in the street in Brooklyn as they say they were delivering personal protective gear to some of those most in need.

It was the first time the Army intelligence officer-turned-leaker had been seen since she tried to kill herself in Virginias Alexandria Detention Center last month, where she was being held for refusing to testify to a grand jury about WikiLeaks founder Julian Assange. The next day, a federal district judge ordered her released, NPR noted at the time.

Manning, 32, was wearing a sky blue top, mask and gloves as she posed for her Brooklyn photo late Tuesday afternoon.

Doing what i can to help collect & distribute PPE to some of those most in need, she wrote. Thankful for all your wonderful love and support! we will get through this together, she said, with a string of emojis, including a heart, a rainbow and a masked face.

She was photographed with Janus Rose, a senior editor at Motherboard and a Post-Apocalyptic Delivery Dyke, according to Roses Twitter profile.

THANK YOU @xychelsea for donating PPE to mutual aid volunteers in brooklyn!! its pretty bleak out there and im so relieved to see her safe and out of jail, Rose wrote.

Fun fact: i teased @xychelsea relentlessly when she bought boxes of masks and nitrile gloves in 2017 i now humbly rescind my remarks and recognize our Quarantine Prepper Queen, Rose added.

Manning previously spent seven years in military prison for leaking thousands of sensitive and classified documents to WikiLeaks.

President Barack Obama commuted the remainder of her 35-year sentence just days before handing the White House over to President Trump.

Read the original here:
Chelsea Manning out of jail, back in NYC after suicide attempt

Chelsea Manning | Facts, Biography, & WikiLeaks | Britannica

Chelsea Manning, original name Bradley Edward Manning, (born December 17, 1987, Crescent, Oklahoma, U.S.), U.S. Army intelligence analyst who provided the Web site WikiLeaks with hundreds of thousands of classified documents in what was believed to be the largest unauthorized release of state secrets in U.S. history.

Britannica Quiz

Famous American Faces: Fact or Fiction?

There was a real person called Johnny Appleseed.

Manning was a precocious child, demonstrating an aptitude for computers and excelling in academics. Manning was raised as a boy, and, as a young teenager, he told his mother and close friends that he was gay. Mannings parents divorced in 2000. As relations soured with Mannings father, the teen and his mother moved to Wales. In 2005 Manning returned to the United States to live with Mannings father in Oklahoma City and worked at a software company. Manning displayed talent as a programmer but also behaviour that was becoming increasingly detached, and coworkers found it difficult to communicate with Manning. Manning was eventually fired from the job and kicked out of Mannings fathers home. Manning drifted across the country, settling with a relative in Maryland before joining the army in 2007.

Manning finished basic training in April 2008 and then attended intelligence school at Fort Huachuca in Arizona. Manning received a top-secret security clearance and, upon graduating from the course in August 2008, was assigned to the 2nd Brigade, 10th Mountain Division at Fort Drum in New York. Although aware of the constraints of the militarys Dont Ask, Dont Tell (DADT) policy, Manning was open about sexuality, discussing DADT with local media and posting about a relationship on Facebook. Manning deployed to Iraq in October 2009 and was stationed at a forward operating base east of Baghdad and was privy to a wealth of top-secret documents. It was alleged that the following month Manning contacted WikiLeaks founder Julian Assange with the intention of releasing classified information to the public.

In February 2010 WikiLeaks posted a classified diplomatic cable that had been dispatched by the U.S. embassy in Reykjavk, Iceland. It marked the beginning of a flood of classified documents, including the April 2010 release of a video that showed a U.S. helicopter crew firing on a group of people that included two Reuters employees. About that time, Mannings job performance became erratic, and Manning was demoted pending an early discharge. Manning contacted former hacker Adrian Lamo in May 2010, and the two began an online correspondence. Manning told Lamo of having downloaded hundreds of thousands of documents from secure government computers and forwarding them to WikiLeaks. Within days Lamo notified the army, and Manning was arrested later that month. Manning was confined pending trial by court-martial and ultimately was charged with more than two dozen offenses, including the capital offense of aiding the enemy.

Beginning in July 2010, Manning was held for nine months at a U.S. Marine Corps brig in Quantico, Virginia. During that time, Manning was subjected to treatment that was ruled to be excessively harsh, and Manning was awarded a small sentence reduction as compensation. After more than 1,000 days of pretrial incarceration, in February 2013 Manning pleaded guilty to 10 of the lesser counts that were pending. Although those charges carried a potential maximum sentence of 20 years in prison, military prosecutors chose to continue with the court-martial and pursue the additional charges against Manning. In July 2013 Manning was found not guilty of the most serious of those offensesaiding the enemybut was convicted of numerous other counts, including espionage and theft. The following month Manning was sentenced to 35 years in prison.

The day after the sentence was announced, Manning said in a statement that I am a female and asked to be referred to as Chelsea Manning. While imprisoned, Manning sought treatment for gender dysphoria, but the Department of Defense refused the request, and in 2014 the American Civil Liberties Union filed a lawsuit on her behalf. In 2016 Manning staged a hunger strike, and, after 10 days, army officials agreed to allow her to pursue treatment, including gender reassignment surgery. In January 2017 U.S. Pres. Barack Obama, as one of his final acts in office, commuted the bulk of Mannings remaining sentence, and she was released from prison on May 17, 2017. In January 2018 Manning announced that she was seeking the Democratic nomination for the U.S. Senate in Maryland. However, she lost in the primary.

In February 2019 Manning publicly disclosed that she had received a subpoena to testify before a grand jury. Although granted immunity, she refused to answer questions about WikiLeaks, and in March she was jailed for contempt of court. Manning was released upon the expiration of the grand jurys term in May 2019, but she was served with another subpoena while she was still in custody. This raised the possibility of a second contempt finding, and Manning was, in fact, returned to jail just a week later. She remained incarcerated until March 2020, when Mannings attorneys reported that she had attempted suicide. Manning was transferred to a hospital, and a judge ruled that she was no longer required to testify.

Read this article:
Chelsea Manning | Facts, Biography, & WikiLeaks | Britannica

C.I.A. Failed to Defend Against Theft of Secrets by Insider, Report Says – The New York Times

WASHINGTON The 2016 theft of secret C.I.A. hacking tools by an agency officer, one of the largest breaches in agency history, was partly because of failures to install safeguards and officials who ignored the lessons of other government agencies that saw large breaches when employees stole secrets, according to an internal C.I.A. report released on Tuesday.

The C.I.A. fostered an innovative culture within its hacking team, which took great risks to create untraceable tools to steal secrets from foreign governments. But that team and its overseers were focused on building cutting-edge cyberweapons and spent too little energy protecting those tools, failing to put in place even common security standards like basic monitoring of who had access to its information, the report said.

The agency should have known better, the report concluded, given that the theft came years after highly public disclosures by the former Army intelligence analyst Chelsea Manning, who stole data from the Pentagon and State Department, and the former contractor Edward Snowden, who took information from the National Security Agency. Both helped expose those secrets.

In March 2017, WikiLeaks published some of the C.I.A.s most valuable hacking tools, which it called Vault 7. The WikiLeaks disclosure revealed some of the ways that the C.I.A. could break into foreign computer networks or activate the camera or microphone on electronic devices to eavesdrop on adversaries.

In the wake of that breach, Mike Pompeo, then the C.I.A. director, ordered a secret review of the leak and why the agency had not detected it. The report said that because of a lack of safeguards or activity monitoring, the agency could not determine the precise scope of the loss.

The C.I.A.s WikiLeaks task force, not the agencys independent inspector general, compiled the report. The task force was assembled to examine the theft of the hacking tools and develop procedures to prevent future leaks.

The report had been partially declassified for the trial this year of Joshua Schulte, a former C.I.A. officer accused of giving the information to WikiLeaks. During the trial, defense lawyers read excerpts from the report but were not allowed to release even the redacted pages. Senator Ron Wyden, Democrat of Oregon and a member of the Senate Intelligence Committee, made the report public on Tuesday, and The Washington Post first reported a fuller version of its findings.

The C.I.A. declined to comment directly on the report. Timothy L. Barrett, the agency spokesman, said the C.I.A. was working to incorporate best-in-class technologies to keep ahead of and defend against ever-evolving threats.

An agency employee was to blame for the theft of the data, the report said, without naming Mr. Schulte in the portions released publicly. Mr. Schultes trial ended with the jury divided on whether to convict him of the most serious crimes he was charged with, including illegal gathering and transmission of defense information. Mr. Schulte was convicted of contempt of court and making false statements to the F.B.I.

The government has said it intends to retry Mr. Schulte.

The report said the theft was the greatest data loss in the agencys history. As much as 34 terabytes of information up to 2.2 billion pages were stolen, revealing the C.I.A.s secret hacking methods.

Security on the elite hacking team was lax. Team members shared administrator passwords, and blocks on removable media, like thumb drives or writable discs, were ineffective. Those vulnerabilities made it easier for an insider to steal the C.I.A.s data.

The loss to the agency was enormous. When WikiLeaks released the information, foreign governments were able to quickly fix vulnerabilities, kicking the C.I.A. out of their networks and cutting off its ability to listen surreptitiously to some devices.

But it is difficult to assess the precise loss to the C.I.A.s hacking team. The report did say that the agency had moderate confidence that WikiLeaks did not get all of its hacking tools. Some were better protected on a so-called Gold folder.

The report was heavily redacted and had at least 30 missing pages. Mr. Schultes defense had to fight the government to see even a portion of the report and was not allowed to release the document during the trial, said Sabrina Shroff, his lawyer. Ultimately, she said, she saw only about a quarter of the report.

From the beginning of this case, the government sought to hide this report, she said. We had to litigate and claw our way to get an extra word made available to the defense. To this day, I have not seen the entirety of the report.

Insider threats are almost impossible to eliminate. But security measures can make it more difficult for disgruntled employees to steal classified information. By 2017, the threat of WikiLeaks should have been plain to anyone in an intelligence agency, the report said.

For nearly a decade WikiLeaks has exploited the digital realm to profoundly reshape opportunities for individuals sworn to protect our nations secrets to leak classified or sensitive information, the report said.

The report outlined a system where different arms of the agency developed their own information technology capabilities and systems of policing themselves. That culture of shadow I.T. created unacceptable risk for the C.I.A.

The hacking teams tools were on computer systems that lacked the ability to audit the information stored on them. The C.I.A., according to the report, did not learn about the loss until a year after it occurred, when WikiLeaks announced in March 2017 that it had the Vault 7 data.

In a letter to John Ratcliffe, the director of national intelligence, Mr. Wyden said the report suggested that Congresss decision to exempt intelligence agencies from federal cybersecurity requirements was a mistake.

Mr. Wyden said that vulnerabilities remained within the intelligence communitys information technology.

The lax cybersecurity practices documented in the C.I.A.s WikiLeaks task force report do not appear limited to just one part of the intelligence community, Mr. Wyden wrote.

David E. Sanger contributed reporting.

View original post here:
C.I.A. Failed to Defend Against Theft of Secrets by Insider, Report Says - The New York Times

Gladwell: COVID-19 should push healthcare to consider its ‘weak links’ – FierceHealthcare

The coronavirus pandemic has shown the healthcare industry that it needs to decide whether its playing basketball or soccer, journalist and author Malcolm Gladwell said.

Gladwell, the opening keynote speaker at Americas Health Insurance Plans annual Institute & Expo, said the two sports exemplify the differences in thinking when one tackles problems using a strong link approach versus a weak link approach.

In basketball, he said, the team is as strong as its strongest, most high-profile players. In soccer, by contrast, the team is only as strong as its weakest players.

Fierce Innovation Awards : Healthcare Edition 2020

Submit your entry to demonstrate innovative solutions that have the greatest potential to save money, engage patients, or revolutionize the industry.

For healthcare organizations, that means making investments in the weakest linkssuch as harried clinicians who may need more trainingandlow-income communities that cannot affordor accesscoverageratherthanthe stronger links, like building out teaching hospitals and physician specializations.

In healthcare, this is a chance for us to turn the ship around and say we canbenefitfar more from making health insurance moreplentifuland more affordable, Gladwell said.

RELATED:CDC releases new safety advice saying the pandemic is not over as states reopen

Gladwell emphasized that healthcare is far from the only industry to largely followa strong link approach to improvement. In higher education, for example, much of the investment and funding goes to Ivy Leagueinstitutionsandotherwealthy, top-performing universities.

Meanwhile, the education system could see significant benefits if it invested in the weak links like community colleges and bringing down tuition, Gladwell said.

Its a similar story in national securityand that strong link thinking led to two of the largest security breaches in American history, Gladwell said. Both Edward Snowden and Chelsea Manning were relatively low-ranking people within the security apparatus, but they were able toaccess critical files and release them.

I wouldarguethat strong linkparadigm has dominated every part of American society, Gladwell said. We have really put our chips down on the 'strong link' paradigm.

RELATED:Trump administration pushes for healthcarefacilitiesto reopen

How could a weak link approach have impacted the response to the COVID-19 pandemic? Gladwell argues that, for instance, widespread testing is hampered by a lack of supplies like nasal swabs. Investment in the supply chain could have mitigated that challenge, he said.

The virus also disproportionately impacts people with certain conditions, notably diabetes. A broader focus on preventing and treating obesity could have had a large impact on how the pandemic played out, he said.

With this particular pandemic, I think were having a wake-up call, Gladwell said.

Originally posted here:
Gladwell: COVID-19 should push healthcare to consider its 'weak links' - FierceHealthcare