Wednesday, April 24, 2019
Below are some of the late W.C. Fields’ best one-liners:
I cook with wine. Sometimes I even add it to the food.
If you can’t dazzle them with brilliance, baffle them with bullshit.
It ain’t what they call you, it’s what you answer to.
I never vote for anyone. I always vote against.
If at first you don’t succeed, try, try again. Then quit. There’s no point in being a damn fool about it.
No doubt exists that all women are crazy; it’s only a question of degree.
Women are like elephants. I like to look at ’em, but I wouldn’t want to own one.
I drink therefore I am.
I am free of all prejudices. I hate everyone equally.
It’s morally wrong to allow a sucker to keep his money.
A man’s got to believe in something. I believe I’ll have another drink.
A woman drove me to drink and I didn’t even have the decency to thank her.
Start every day off with a smile and get it over with.
I spent half my money on gambling, alcohol and wild women. The Other half I wasted.
In My Little Chickadee, a man came up to W,C. Fields as he was shuffling a deck of cards.
"Is this a game of chance?” the man asked.
W.C. Fields replied, “Not the way I play it.”
You can also watch a TCM video on W.C. Fields, narrated by John Cleese, via the below link:
Tuesday, April 23, 2019
Former GE Engineer And Chinese Businessman Charged With Economic Espionage And Theft Of GE’s Trade Secrets
An indictment unsealed today charges Xiaoqing Zheng, 56, of Niskayuna, New York, and Zhaoxi Zhang, 47, of Liaoning Province, China, with economic espionage and conspiring to steal General Electric’s (GE’s) trade secrets surrounding turbine technologies, knowing and intending that those stolen trade secrets would be used to benefit the People’s Republic of China. Assistant Attorney General for National Security John C. Demers, U.S. Attorney Grant C. Jaquith for the Northern District of New York, Assistant Director John Brown of the FBI’s Counterintelligence Division and Special Agent in Charge James N. Hendricks of the FBI’s Albany Field Office made the announcement.
According to the 14-count indictment, Zheng, while employed at GE Power & Water in Schenectady, New York as an engineer specializing in sealing technology, exploited his access to GE’s files by stealing multiple electronic files, including proprietary files involving design models, engineering drawings, configuration files, and material specifications having to do with various components and testing systems associated with GE gas and steam turbines. Zheng e-mailed and transferred many of the stolen GE files to his business partner, Chinese businessman Zhaoxi Zhang, who was located in China. Zheng and Zhang used the stolen GE trade secrets to advance their own business interests in two Chinese companies - Liaoning Tianyi Aviation Technology Co., Ltd. (LTAT) and Nanjing Tianyi Avi Tech Co. Ltd. (NTAT), companies which research, develop, and manufacture parts for turbines.
The indictment also alleges that Zheng and Zhang conspired to commit economic espionage, as the thefts of GE’s trade secrets surrounding various turbine technologies were done knowing and intending that the thefts would benefit the People’s Republic of China and one or more foreign instrumentalities, including LTAT, NTAT, Shenyang Aerospace University, Shenyang Aeroengine Research Institute, and Huaihai Institute of Technology. The defendants, through LTAT and NTAT, received financial and other support from the Chinese government and coordinated with Chinese government officials to enter into research agreements with Chinese state-owned institutions to develop turbine technologies.
“The indictment alleges a textbook example of the Chinese government’s strategy to rob American companies of their intellectual property and to replicate their products in Chinese factories, enabling Chinese companies to replace the American company first in the Chinese market and later worldwide,” said Assistant Attorney General Demers. “We will not stand idly by while the world’s second-largest economy engages in state-sponsored theft. As part of the Attorney General’s China Initiative, we will partner with the private sector to hold responsible those who violate our laws, and we urge China’s leaders to join responsible nations and to act with honesty and integrity when competing in the global marketplace.”
“As alleged, the thefts of trade secrets to benefit the People’s Republic of China are serious crimes against the victimized company and our country,” said U.S. Attorney Jaquith. “Both fair competition and incentivized innovation require that American companies be able to rely on the secrecy of technological advances forged through their talent and tenacity. When technology is taken through treachery, we will continue to work with the National Security Division and the FBI to prosecute the perpetrators.”
“American businesses spend many hours and large amounts of money developing unique technology. When such technology is stolen it can be devastating to U.S. businesses and can result in American workers losing jobs,” said FBI Assistant Director Brown. “China continues to support behavior that violates the rule of law. This case demonstrates the FBI will continue to pursue China's efforts to steal American technology.”
“Economic espionage and the theft of trade secrets have a profound impact on our companies and communities,” said FBI Special Agent in Charge Hendricks. “We view this as a grave threat to our economic and national security and the FBI will work tirelessly to prevent the loss of American technology and American jobs.”
Zheng was arraigned today in Albany, New York, before United States Magistrate Judge Christian F. Hummel, and released with conditions pending a trial before United States District Judge Mae A. D’Agostino.
The economic espionage counts (Counts One, Three, Four, Seven, Eight and Eleven) carry a maximum sentence of 15 years in prison, a fine of up to $5,000,000, and a term of supervised release of up to three years. The trade secrets theft counts (Counts Two, Five, Six, Nine, Ten, Twelve and Thirteen) carry a maximum sentence of 10 years in prison, a fine of up to $250,000, and a term of supervised release of up to three years. Count Fourteen of the indictment, which charges Zheng with making false statements to the FBI during a voluntary interview, carries a maximum sentence of 5 years in prison, a fine of up to $250,000, and a term of supervised release of up to three years.The charges in the indictment are merely accusations. The defendants are presumed innocent unless and until proven guilty.
This case is being investigated by the Federal Bureau of Investigation, and is being prosecuted by Assistant U.S. Attorney Rick Belliss, and National Security Division Trial Attorneys Jason McCullough and Matthew Chang.
A little Night Music: A Song That Will Never Die - Kate Smith Sings God Bless America At Flyers Game
Although the Philadelphia Flyers have pulled down Kate Smith's statue and stopped playing her recording of Irving Berlin's classic song, God Bless America, you can still watch and listen to her at a Flyers game from 1974 via the below link:
You can also listen to her 1938 recording of the song via the below link:
And you can watch a Philadelphia news video about the removal of her statute via the below link:
A Zen master decides to pursue earthly pursuits and pleasures while visiting Philadelphia.
He walked up to a hot dog vendor’s cart in South Philadelphia and asked for a “hot dog with everything.”
The hot dog vendor took a hot dog from his cart, slopped everything on it, and handed it to the Zen master.
The Zen master pulled out a $20 bill from his robes and handed it to the hot dog vendor.
The hot dog vendor pocketed the bill and then waited on another customer.
“Where’s my change?” asked the Zen master.
The hot dog vendor responded, “Change must come from within.”
Veteran national security reporter Bill Gertz offers a piece at the Washington Free Beacon on how Russia’s GRU fooled the Clinton 2016 campaign.
Russia's GRU military intelligence service used fraudulent emails to gain access to large amounts of sensitive emails and documents that were then disseminated via covert GRU websites during the 2016 presidential election campaign influence operation, according to the report by Special Counsel Robert Mueller.
Two GRU intelligence units worked together in the spring of 2016 to first identify email servers for Democratic staff member Gmail accounts, and then a special cyber unit sent spearphishing emails that produced the implantation of special software inside Democratic computer networks.
The Mueller report provided new details of the cyber attacks carried out by two numbered GRU groups: Military Unit 74455, in charge of influence and disinformation operations, and Military Unit 26165, the main cyberattack group.
"The GRU spearphishing operation enabled it to gain access to numerous email accounts of Clinton campaign employees and volunteers, including campaign chairman John Podesta, junior volunteers assigned to the Clinton campaign's advance team, informal [Hillary] Clinton campaign advisors, and a DNC employee," the report said.
You can read the rest of the piece via the below link:
The FBI released the below information:
The statistics gathered by the FBI’s Internet Crime Complaint Center (IC3) for 2018 show Internet-enabled theft, fraud, and exploitation remain pervasive and were responsible for a staggering $2.7 billion in financial losses in 2018.
In its annual Internet Crime Report, the FBI reports the IC3 received 351,936 complaints in 2018—an average of more than 900 every day. The most frequently reported complaints were for non-payment/non-delivery scams, extortion, and personal data breaches. The most financially costly complaints involved business email compromise, romance or confidence fraud, and investment scams, which can include Ponzi and pyramid schemes.
Reports came in from every U.S. state and territory and involved victims of every age. There was a concentration of victims and financial losses, however, among individuals over the age of 50.
“The 2018 report shows how prevalent these crimes are,” said Donna Gregory, chief of the IC3. “It also shows that the financial toll is substantial and a victim can be anyone who uses a connected device. Awareness is one powerful tool in efforts to combat and prevent these crimes. Reporting is another. The more information that comes into the IC3, the better law enforcement is able to respond.”
The bright spots reported by the IC3 include the establishment in February 2018 of the Recovery Asset Team and its success in recovering funds lost in business email compromise scams. These sophisticated scams involve perpetrators infiltrating businesses’ email accounts and requesting fraudulent wire transfers or gift card purchases.
The Recovery Asset Team has helped streamline communication with financial institutions and assist FBI field offices in the recovery of funds for businesses that report a fraudulent domestic transfer. The team was able to successfully recover more than $192 million in funds—a recovery rate of 75 percent.
One recovery success came in Colorado, where a victim wired $56,179.27 for a home purchase to a thief after receiving a spoofed email request from the lending agent. The Recovery Asset Team worked with the Denver Field Office and the victim’s bank to freeze the funds transfer and return $54,000 of the stolen money.
To improve the chances of a successful recovery, it is imperative that victims contact their bank immediately upon discovering a fraudulent transaction as well as report the crime to the IC3.
The large number of complaints captured by the IC3 in 2018 also helped improve the data available to all law enforcement entities as they search for connections among cases and look for trends and patterns in crimes and victims. In addition, the IC3’s Operation Wellspring Initiative helps build the cyber investigative capability and capacity of state and local law enforcement by linking them to the FBI’s field offices for support on identifying and responding to malicious cyber activity.
In 2018, the IC3 also worked with the FBI’s Victim Services Division to add staff to help better serve the victims of cyber-enabled crime. The victim specialist-Internet crimes position helps provide crisis intervention services, assess victim needs, and refer victims to additional resources.
The IC3 website provides a list of common and current scams as well as tips on how to avoid being a victim of an Internet-enabled crime. The most important prevention tips include keeping hardware and software updated and protected by anti-virus programs and strong passwords. The other steps include learning how to recognize suspicious messages and requests and researching and verifying the legitimacy of every offer, person, message, or opportunity encountered online.
The IC3 was created in 2000 to provide the public with a reliable and convenient reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity and to develop effective alliances with industry partners. Learn more at ic3.gov.
Monday, April 22, 2019
Below are some of the late Groucho Marx’s best lines:
Who are you going to believe, me or your own eyes?
I have nothing but respect for you, and not much of that.
Time flies like an arrow. Fruit flies like a banana.
Room service? Send up a larger room.
He may look like an idiot and talk like an idiot but don't let that fool you. He really is an idiot.
I never forget a face, but in your case I'll be glad to make an exception.
A child of five could understand this. Fetch me a child of five.
One morning I shot an elephant in my pajamas. How he got into my pajamas I'll never know.
If I held you any closer I would be on the other side of you.
I was married by a judge. I should have asked for a jury.
I married your mother because I wanted children. Imagine my disappointment when you came along.
Outside of a dog, a book is man's best friend. Inside of a dog, it's too dark to read.
While at dinner with a woman, Groucho picked up the check and glanced at it. "This price is outrageous," he said angrily as he passed her the check. "I wouldn't pay this if I were you."