Page 3,837«..1020..3,8363,8373,8383,839..3,8503,860..»

Letter: It’s an election year why isn’t cybercrime on voters’ minds? – Greenville News

Share This Story!

Let friends in your social network know what you are reading about

Letter writer says that in light of recent hacking into Greenville Water System computers, voters should be concerned about cybercrime.

A link has been sent to your friend's email address.

A link has been posted to your Facebook feed.

OPINION

Jim Clark, Letter to the Editor Published 9:11 a.m. ET Feb. 23, 2020

Now that the Greenville Water System has been hacked and the state IRS (SC Department of Revenue) years ago, it is time to get serious about fixing this problem.

It is almost certain that your personal Social Security number and birth date are in cyberspace.So bank accounts, 401Ks and even home equity is at risk for cybercrime.

It is obvious the internet needs to be re-engineered for security.I have read that internet security is an illusion.All a hacker has to do is insert a line or two of code into a computer program. But banks are advertising the convenience of accessing personal accounts on cell phones.Is this making hacking easier?

The FDIC (Federal Deposit Insurance Corp.) does not cover hacking losses. Wire fraud laws need to berewritten to determine who is responsible, or insure these losses.

Hacking and ID theft has become a lucrative profession.These criminals are a growing parasite on responsible and productive Americans.It is long past timeto demand an end to these crimes or go back to pre-internet banking.

This is an election year.One would think cybercrime would an issue.

Jim Clark

Easley

Read or Share this story: https://www.greenvilleonline.com/story/opinion/2020/02/23/letter-its-election-year-why-isnt-cybercrime-voters-minds/4806833002/

Feb. 23, 2020, 9:06 a.m.

Feb. 23, 2020, 9:01 a.m.

Feb. 22, 2020, 10:37 a.m.

Feb. 22, 2020, 10:24 a.m.

Feb. 22, 2020, 10:19 a.m.

Feb. 22, 2020, 9:54 a.m.

Go here to see the original:
Letter: It's an election year why isn't cybercrime on voters' minds? - Greenville News

Read More..

Vigilantes and private security are policing the internet where governments have failed – The South African

Every time we switch on a computer, open an email, view a website or make an online payment, there are multiple new opportunities for crimes to occur.

In fact,almost halfof all crimes against individuals in England and Wales now involve or are enabled by the internet.

These technological changes have fuelled a substantialnew private policing sectorthat includes commercial companies but also online vigilantes.

This change is comparable to the quiet revolution seen in the 1970s when conventional private policing, particularly the use of uniformed security officers, emerged on an industrial scale.

Despite its scale, online private policing activity has been largely ignored by researchers and politicians. Yet it is already creating somesignificant issuesthat need addressing.

This new online private policing sector exists most obviously in the numerous companies providing services.

These include designing, testing and maintaining security systems, responding to cyber-attacks and moderating websites for harmful or illegal content.

But many other organisations have also developed their own cybersecurity structures to better protect themselves from online crime.

In most large organisations, these structures are led by what are generally called chief information security officers (CISO) but there are also many other new cybersecurity roles such as security architects and ethical hackers.

Globally, this new sector is estimated to support around6 million jobsand is predicted to be worth$248 billion (R3.7 trillion) by 2023.

This is much more than the traditional private security industry, which is only predicted to be worth around$167 billion (R2.5 trillion) by 2025.

One of the most interesting roles to emerge in this new sector is that of the moderators who police the content published on the internet.

They play an important role in preventing thepublication of undesirable material, from hardcore pornography and footage from war zones through to abusive and inappropriate language.

There has been virtually no academic research of these important operatives. Butmedia reportshaveraised concernsover the welfare of these staff, who often have to view large amounts of distressing content, including images.

So their conditions of employment and capabilities should be more of a priority for researchers and regulators.

The internet hasnt just stimulated new forms of commercial private policing but has also enabled a new type of vigilantism to flourish.

For example, the limited law enforcement response to the masses of scam emails and bogus websites were at risk from everyday has led to the growth of scambaitors.

These are private individuals who try to engage with scammers andwaste their timeor simplyraise awarenessof their scams. One of the problems with scambaiting is thehumiliation and racismoften involved.

For example some scammers have been encouraged to do repetitive tasks such as draw street maps and rewrite books, paint themselves or pose naked in humiliating positions, all of which have then been publicised.

Sometimes this is done with explicit or implicit racist commentaries, relating to the fact that many of the scammers areblack West Africans.

Perhaps the most controversial area of online vigilantism that has emerged ispaedophile hunting. Organised groups of internet users pose as children in online chatrooms to lure and expose paedophiles.

The actions of these groups have clearly helped the police and led to the exposure of real paedophiles who have subsequently been charged and convicted.

In 2018,at least 150 peoplein England and Wales were charged using evidence provided by paedophile hunters. But some groups have made their exposures and confrontations public, in some cases even live-streaming them online.

This has ledto innocent people being falsely and publicly condemned, while others have killed themselves after the exposure.

It has also been revealed that some of the people enacting this justice arethemselves convicted criminals whereas police forces themselves often bar people with criminal records from joining.

The rapid growth of both commercial and amateur attempts at policing the internet shows there is a demand that is not being met by the traditional provider of law enforcement, the state.

But the problems that are emerging from this private security activity demonstrate why it isnt enough to leave such significant operations to the market or volunteers.

The first quiet revolution eventually resulted in many jurisdictions introducing regulations to better control the activities of private security.

This new shift at least warrants further research and investigation to determine if the controls are adequate. The suspicion is that they are not.

Mark Button, Professor of Security and Fraud, University of Portsmouth. This article is republished from The Conversation under a Creative Commons license. Read the original article.

See more here:
Vigilantes and private security are policing the internet where governments have failed - The South African

Read More..

Straight Talk: That voicemail from the boss might be fake – Canton Repository

Better Business Bureau serving Canton Region and Greater West Virginia offers tips and advice for consumers to avoid fraudulent practices.

THE CONCERN Everyone knows to be on the lookout for phony emails, especially at work. Scammers can easily make messages that appear to come from anywhere, from your bosss account to the office printer. But what about voicemail? New voice-mimicking software is now being used by scammers to create convincing voicemail messages.

HOW THE SCAM WORKS:

You get a voicemail from your boss. They are instructing you to wire thousands of dollars to a vendor for a rush project. The request is out of the blue. But its the bosss orders, so you make the transfer.

A few hours later, you see your boss and confirm that you sent the payment. But theres one big problem; your manager has no idea what you are talking about! It turns out that the message was a fake. Scammers used new technology to mimic your bosss voice and create the recording. This voice cloning technology has recently advanced to the place where anyone with the right software can clone a voice from a very small audio sample.

Businesses may be the first places to see this con, but it likely wont stop there. The technology could also be used for emergency scams, which prey on peoples willingness to send money to a friend or relative in need. Also, with the US now in the midst of the 2020 election season, scammers could use the technology to mimic candidates voices and drum up donations.

TIPS TO AVOID A THIS SCAM:

Secure accounts: Set up multifactor authentication for email logins and other changes in email settings. Be sure to verify changes in information about customers, employees, or vendors.

Train staff: Create a secure culture at your office by training employees on internet security. Make it a policy to confirm all change and payment requests before making a transfer. Dont rely on email or voicemail.

FOR MORE INFORMATION To learn about other kinds of scams, go to BBB.org/ScamTips. If you have been the victim of a scam, make others aware by filing a report on BBB.org/ScamTracker.

FOR BBB INFORMATION Visit bbb.org/canton or call 330-454-9401 to look up a business, file a complaint, write a customer review, read tips, follow us on social media, and more!

Read the original post:
Straight Talk: That voicemail from the boss might be fake - Canton Repository

Read More..

The cannabis industry’s next big threat: Hacks and fraud – WICZ

By Alicia Wallace, CNN Business

Cannabis is an emerging industry with stratospheric growth expectations. Like the California Gold Rush, the dot-com boom and every other new market with boundless potential, the cannabis industry also has the tendency to attract some sketchy characters with dubious motives.

Security experts have long warned that the cannabis industry is susceptible to both cybercriminal and fraudulent activities. It's not exactly the Wild West anymore: Businesses and state-legal markets have matured. But risks and concerns about criminal activity and fraud haven't waned.

Just weeks into 2020, the cannabis industry has been the subject of several high-profile incidents: a reported dispensary point-of-sale system hack that potentially exposed the data of 30,000 people; the US Securities and Exchange Commission charging two men who allegedly used a fake cannabis company as a front for a Ponzi scheme; and the conviction of a former Colorado cannabis entrepreneur in one of the state's largest fraud cases.

"These industries are targets just because they're new and there is lots of controversy -- whether it's political or social -- with some of the things they're doing," Michael Bruemmer, the vice president of data breach resolution and consumer protection for consumer credit reporting company Experian, told CNN Business.

Experts are cautioning companies to shore up their security practices and for consumers to be mindful of opportunities that seem too good to be true.

Cannabis' emerging market status makes it a prime target fraud, said Jodi Avergun, a former federal prosecutor and DEA chief who now heads law firm Cadwalader, Wickersham & Taft's white-collar defense and investigations group.

"Consumer and retail investors are not taking appropriate precautions," she said.

The cannabis industry is teeming with interest and speculation, she said. Most cases brought by the US Securities and Exchange Commission involve operations that purport to be cannabis businesses but instead are schemes -- typically of the Ponzi and pump-and-dump variety, she said.

The recent cannabis cases include allegations of a Ponzi scheme tied to a fictitious cannabis company and charges of securities fraud tied to an alleged criminal ring in Colorado.

"The unscrupulous people who have always existed -- the out-and-out fraudsters -- take advantage of investors who want to make a buck quickly," Avergun said.

Although cannabis remains illegal under federal law and largely unregulated, some federal agencies continue to keep a close watch for potential nefarious activity. The US Federal Bureau of Investigation last year warned that it saw a "public corruption threat emerge in the expanding cannabis industry," and agencies such as the SEC have sought criminal charges.

In 2014, when Colorado and Washington State started selling recreational cannabis, the SEC suspended several cannabis stocks and issued an investor alert to warn of questionable practices, alleged illegal stock sales and market manipulation. The agency issued yet another investor alert in 2018 highlighting past enforcement actions and continued warnings.

The SEC Office of Investor Education and Advocacy "regularly receives complaints about marijuana-related investments, and the SEC continues to bring enforcement actions in this area," the SEC warned then. "If you are thinking about investing in a marijuana-related company, you should beware of the risks of investment fraud and market manipulation."

The hype -- and potential for fraudulent investing schemes -- may have abated in recent months as valuations have sunk and companies have restructured to ensure near- and long-term stability.

"But as soon as demand returns, so will the opportunistic fraudsters who seek to take advantage of those who see dollar signs in the cannabis industry," Avergun said.

Experian's "Data Breach Industry Forecast" for 2020 predicted that emerging industries such as cannabis, green energy and cryptocurrency would be increasingly become targets for cyberattacks. In 2019, these industries accounted for fewer than 10% of the breaches tracked by Experian, but they remain vulnerable because they're emerging industries, Experian's Bruemmer said.

"These controversial industries make great targets because they're more focused on growing their business and starting up than they are necessarily putting the appropriate focus on cybersecurity," he said.

Three years ago, a leading seed-to-sale tracking software provider was hit with two cyberhacks in a six-month period. The incidents consisted of a "sophisticated sequence of malicious attacks directed against the company," an attorney for the targeted company MJ Freeway, now named Akerna, said at the time.

The company spent at least $200,000 to upgrade its cybersecurity and enterprise software capabilities following the 2017 breaches, according to financial filings made with the SEC.

Jessica Billingsley, chief executive officer of Akerna, told CNN Business in December that the company no longer uses the software targeted in the attack and the next generation program is far more robust.

In January, internet security researchers for vpnMentor reported a breach at THSuite, a cannabis point-of-sale provider. The vpnMentor researchers said that more than 30,000 individuals had their information exposed, including photo IDs, addresses and protected health information.

Officials for THSuite did not return multiple calls and emails for comment. Some of the dispensary clients identified in the vpnMentor report told CNN Business that they were quickly taking action to determine how much of their customers' information might have been affected.

RJ Starr, compliance director for Bloom Medicinals, said he was aware that his company's technology vendor experienced a data breach and was conducting a thorough investigation.

"Once we've identified any affected patients, we will notify each individual patient and follow HIPAA breach notification protocols," Starr said. "Bloom Medicinals serves tens of thousands of patients in multiple states, and we take patient privacy very seriously. Rest assured, we will implement any corrective action necessary to both remedy and ensure that this doesn't happen again."

Consumers and companies can be proactive in protecting themselves from fraud and cybercriminal activity, Avergun and Bruemmer said.

Avergun said that consumers should check the price history of companies' stocks and research the background of the advisers and executives who are selling shares and running the company.

"If it sounds too good to be true, it probably is -- as with any investment," she said.

As for business investors, it comes down to due diligence.

"There is nothing to substitute for adequate research into company financials, its state compliance policies and processes, and its management before investing in an emerging cannabis company," she said, noting to be aware of special state-specific risks. "If a manager or owner of a cannabis company was previously operating before cannabis was state legal, that causes problems with licensing in state and may raise the risk of federal prosecutions."

Bruemmer highlighted three key tips for companies to button-up their security: Ensure that everyone -- not just the information technology experts -- keeps data security in mind and not make simple mistakes such as clicking on a nefarious link; research and employ credible security technology but don't be reliant on solely the software; have a proactive plan in place if a security breach occurs.

"A lot of businesses think about it as an after-thought," he said. But they should pre-plan."

Go here to read the rest:
The cannabis industry's next big threat: Hacks and fraud - WICZ

Read More..

Best Protection Against File Less Malware and Advanced Threats: Kaspersky Scores Most Top Three Places in 2019 Test Results – Al-Bawaba

As competition intensifies, Kaspersky remains at the top of the TOP3 metric for consumer and corporate cybersecurity. In 2019, Kaspersky products helped the company to achieve podium places (first, second or third) in 70 of 86 different independent tests in which it took part.

The TOP3 metric represents the aggregate scores achieved by more than 80 well-known vendors in the most respected, independent tests and reviews in the cybersecurity industry. Each vendor receives a score based on the number of top three places its products achieved in independent testing, relative to the number of tests the products were examined in. Sustained performance across multiple tests and products provides customers, industry analysts and experts with a more comprehensive overview of the vendors capabilities than a one-off result in a single test.

As of 2019, Kaspersky gained a podium place in 70 of the tests that it entered, with first place finishes in 64 of them.

Kaspersky Anti Targeted Attack, the companys flagship offering against advanced threats, brought in some of the most remarkable results. It was the only solution in its class that demonstrated 100% detection and zero false positives in Advanced Threat Defense test run by ICSA Labs in Q3 2019.

Kaspersky Anti Targeted Attack also successfully passed the Breach Response Test by SE Labs, which emulated 85 various attacks in order to check whether the solution can prevent and remediate any real harm, not just detect them. As a result, Kaspersky scored a Total Accuracy Rating of 95% with zero false positives.

Probing real-life protection capabilities of security products have been the focus of testing approaches in 2019, as opposed to more formal and simpler detection tests. Last year, AV-Comparatives invited 16 anti-virus vendors to enter their new Enhanced Real-World Test. Kaspersky Internet Security was one of the two products among all six participants to achieve a perfect score in all 15 scenarios which involved exploits, fileless malware and other advanced cyberthreats while Kaspersky Endpoint Security for Business was one of the three corporate products with such a score.

Furthermore, Kaspersky once again proved its expertise in protecting against undetectable fileless malware in Advanced Endpoint Protection: Fileless Threat Protection Test by AV-TEST. As a result, Kaspersky Endpoint Security for Business scored detection rating of 100% (with 68% on average among competitors) and 94% for protection (with 59% on average among other vendors).

Were honored to continue setting the highest protection standards in the cybersecurity industry. Despite the growing competition in 2019, we were able to maintain the reputation of our technologies that help protect millions of our customers against the most complex and the most evasive cyberthreats, says Anton Ivanov, VP of Threat Research, Kaspersky.

To find out more about the methodology and testing process, and to see the full list of vendor participants, in the TOP3 rating please visit the website.

See original here:
Best Protection Against File Less Malware and Advanced Threats: Kaspersky Scores Most Top Three Places in 2019 Test Results - Al-Bawaba

Read More..

Microsoft patches IE vulnerability being exploited in the wild – SC Magazine

Home > Security News > Vulnerabilities

Microsoft issued a patchfor an Internet Explorer scripting engine memory corruption vulnerability thatcould lead remote code execution and that has been detected in the wild.

The vulnerability, CVE-2020-0674,carries a CVSS rating of 7.5 and since it has been detected being abused in thewild requires users to update their systems as soon as possible.

The problem itself isdue to a scripting engine in IE, which handles execution of scripting languagessuch as VBScript and Jscript, with the JScript component containing anunspecified memory corruption vulnerability. Any application that supportsembedding IE or its scripting engine component may be used as an attack vector toexploit this flaw.

To actually put this vulnerabilityto use a malicious actor would have to convince a user to click on and view aspecially crafted HTML document, such as an attached document or PDF file, orany type of document that supports embedded Internet Explorer scripting enginecontent, an attacker may be able to execute arbitrary code.

To mitigate this issue Microsoftis recommending that users updatetheir current system or as a workaround restrict access to the jscript.dlllibrary.

Please login or register first to view this content.

LoginRegister

Next post in VulnerabilitiesClose

Visit link:
Microsoft patches IE vulnerability being exploited in the wild - SC Magazine

Read More..

Letter to the Editor: Deep state exists only in Trump’s mind – Fairfield Daily Republic

After the Senates impeachment charade, President Donald Trump has been braying like a donkey about how the deep state and its swampy inhabitants tried and failed to take him down, and hes out for revenge.

Trumps self-defined swamp crawls with slithering creatures like James Comey, Robert Mueller, Andrew McCabe, John Bolton, Rex Tillerson, John Kelly, Tim Morrison, William Taylor, Gordon Sondland, James Mattis, Jeff Sessions and Rod Rosenstein. Oh, and there are dozens more just like them.

But wait a second; arent all of these swamp creatures Republicans most of whom appointed by The Donald? This cant be. There must be a group of swampy Democrats surreptitiously scheming to take the president down, sloshing around somewhere. Theres always Congress, full of agitated anti-Trump Democrats lurking in the corridors of the Capitol building. But thats a given. No deep state there.

So, what is the deep state? The closest thing we have to a definition was offered by Trumps excommunicated ideological Svengali, Steve Bannon. By Bannons account, the deep state consists of a Tom Clancy-esque cabal of political deviants planted deep within the bowels of government by (most likely) Bill and Hillary Clinton whose primary motivation was to thwart the interests of real Americans (presumably like Bannon).

The problem with the deep state theory is that there are approximately 2 million people who work for the federal government, and all but a handful of presidential appointees have pledged loyalty to the Constitution, not to Donald Trump, and not to a political party. The proposition that somehow a nefarious and well-orchestrated network of deep state operatives is subverting the government is absurd no, insane.

The irony is that Trump, in a cannibalistic rage, has been purging a deep state that consists primarily of his Republican acolytes. Nevertheless, I suppose Trump has had the last laugh. After all, he is not and never has been a true Republican. Whackadoo tin pot dictator is the term that comes to mind.

Stephen Davis

Fairfield

Related

Follow this link:
Letter to the Editor: Deep state exists only in Trump's mind - Fairfield Daily Republic

Read More..

Camden takes tech crown as it leads UK for new business creation – City A.M.

Camden has topped the UK rankings for new business creations as Londons booming tech scene continues to drive growth in the capital.

A total of 2,110 net new businesses were created in Camden in 2018, according to figures published today by private equity investment firm Growthdeck.

Read more: British tech startups retain crown as European fintech capital

This was closely followed by Westminster with 2,100, while Hackney ranked fourth with 1,410. This is compared to a UK average of just 115 new companies per local authority.

The figures mark the continued success of the capitals tech and fintech sectors, with areas such as Silicon Roundabout and East London Tech City in Hackney now well established as startup incubators.

Tech unicorns Transferwise and Monzo both valued at more than $1bn have recently set up their first offices in the area.

Kings Cross in Camden has also emerged as a thriving tech hub and is now home to fast growing fintech firms such as Monese and Google-owned AI company Deep Mind.

Gaining access to vital investment to fuel growth is a big attraction for tech startups in Camden and Hackney, said Ian Zant-Boer, chief executive of Growthdeck.

The presence of big private equity and venture capital investors in the area means entrepreneurs there are part of a broader network, not just purely a tech cluster.

While the top 10 was dominated by London boroughs, Liverpool came in third place with 1,495 new businesses. Birmingham, Brighton and Manchester also made it onto the leader board.

Read more: Tech jobs advertised in the UK plunged by half in 2019

By contrast, Aberdeen was the worst performing area in the UK, with a net loss of 3,195 businesses in 2018. The North Sea oil industry transformed the citys fortunes, but a gradual decline in oil prices since 2014 has taken its toll on the economy.

Zant-Boer added: The government should also consider following the Silicon Roundabout model to create tech hubs in other areas of the country, to ensure tech business creation is more evenly distributed rather than being concentrated in the south east.

Original post:
Camden takes tech crown as it leads UK for new business creation - City A.M.

Read More..

To Change Voters Sympathies, Its Time to Go Deep – The American Prospect

I spent a recent Sunday in Croydon, Pennsylvania, a working-class town along Neshaminy Creek in the southeastern corner of the state, learning and practicing deep canvassing, a promising method for persuading voters to change their minds about politics.

I was there as a volunteer with Changing the Conversation Together (CTC), an independent group that first experimented with deep canvassing in 2018, training several hundred volunteers who fanned out across Staten Island and helped tip that usually Republican House seat into the hands of Democrat Max Rose.

As several studies have shown, deep canvassing, which involves deliberately developing a nonjudgmental, empathetic connection with a voter through 10 to 15 minutes of authentic conversation, canif done properlylead to persistent changes in peoples attitudes on issues like immigration and transgender rights. A new peer-reviewed study by academics David Broockman and Josh Kalla, soon to be published in American Political Science Review, replicates those findings and suggests that it is precisely by focusing on having a nonjudgmental attitude and working to make a real connection that canvassers can effectively move the people they talk to.

So far, no one has figured out for sure if deep canvassing can change a voters mind about their choice for president, particularly in this polarized age. Thats what I, along with about 80 other volunteers from a couple of Indivisible groups, was there to try.

First, we were asked to talk about love.

In a pre-training before that Sunday led by Adam Barbanel-Fried of CTC and Dave Fleischer of the Leadership Lab, we sat in small circles and went through a series of exercises. First, we spent a minute talking about things I love. Then, another minute on people I love. We were forbidden to use the word like. Then we practiced telling a longer story about one person in our lives whom we love, and why.

Why love? For multiple reasons. First, people respond to stories far more easily than they respond to factual arguments. Studies indicate that if you confront a voter with facts that challenge their views, you will most likely just reinforce their views. No one wants to admit they are wrong; we resist anything that might undermine our self-image.

Second, we told the stories about love because stories are more powerful than facts. And I saw this as I talked to voters whose doors I knocked on that afternoon. I told them about my love for my 30-year-old daughter and how she has always shown a fierce determination to conquer lifes challenges. How at the age of five she first picked up a baseball mitt, and after resisting our entreaties that she put it on her left hand (shes a righty), she rapidly became a star Little Leaguer. How as a fourth-grade pitcher she was sent in to protect a one-run lead with the bases loaded and no one out, and showed no fear as she struck out the side. How, when she told us at the age of 12 that she wanted to play varsity softball in college, and we said it would be a huge commitment to become that competitive, she didnt flinch. And how she ultimately helped lead her Tufts University softball team to the national Division III finals.

What deep canvassing is challenging us to consider is that people are movable if we connect with them emotionally, specifically by talking very concretely about a person in our lives whom we love.

Each time, after I shared a version of that story, bubbling with pride, and asked, How about you? Is there anyone in your life who is special to you, who you think about as you think about the world? I got an amazing story back. A 75-year-old grandfather talked about the five-year-old grandson he was teaching to play chess and the drums, and how he worried about his future. A 62-year-old grandmother who admitted that she had given up on voting told me about how one of her granddaughters, a teenager, was really smart but was getting bullied in school so badly that she had pulled out and was homeschooling herself.

Talking about people you love is irresistible, once you get past the awkwardness. And when you ask people to contrast how they feel when they think about the people they love with how they feel about Donald Trumps cruelty and lack of basic decency, it moves them.

In two hours walking the streets of Croydon, my canvass partner and I knocked on ten doors. Four opened, and each voter happily stood and chatted with us for 10, even 15 minutes. One even thanked us for the lovely conversation and didnt seem to want us to leave! Two of the people I engaged in conversation moved strongly toward voting Democratic. A third, the 62-year-old grandma with the teenage granddaughter, went from telling us that she had given up on voting because none of the underdog candidates she voted for ever won, to saying ruefully that she didnt think she was allowed to vote because she hadnt voted for governor in the previous election, to elation when I looked up her registration and showed her she was still registered. Ill take the fact that she went from saying she had given up on voting, to saying she was in the middle about which candidate she would vote for, as a victory.

The underlying presumption of so much political debate is that people are persuaded by rational argument. A corollary to that presumption is that people are persuaded by policy positions and advertising that reinforces those distinctions.

What deep canvassing is challenging us to consider is the possibility that this is largely wrong, and that people are movable if we connect with them emotionally, specifically by talking very concretely about a person in our lives whom we love.

Its important to note here that lots of field organizers are starting to use the term deep canvassing to mean things slightly different than what we were trained to do. Some canvassers are being trained to use storytelling as they talk to voters (Obama canvassers were asked to tell their story of self at the doors). Others are being taught to listen more. But in most cases, these approaches are being grafted onto the more conventional door-knocking work of engaging voters with an issue in mind and a pitch aimed at convincing people to think about how that issue affects them personally, rather than this more open and empathetic approach.

The research into deep canvassing says the shift in attitudes that we obtained will stick months later. But all of the people being targeted in Bucks County, Pennsylvania, where Changing the Conversation Together is focused, are going to be re-canvassed and called. Every voter I talked to willingly gave me their phone number when I asked for it to stay in touch.

Policy is obviously important in governing. But imagine if thousands of well-trained Democratic volunteers were doing lots of this deep-canvassing work, instead of thinking that finely calibrated policy positions and symbolic statements meant to appeal to various demographics was the way to win.

Read more:
To Change Voters Sympathies, Its Time to Go Deep - The American Prospect

Read More..

These Fevered Days a fresh exploration of the wild terrain of Emily Dickinsons mind – The Boston Globe

Encased for decades in Victorian stereotype as a wispy recluse in a white dress, Emily Dickinson was claimed by pop culture last year as a raging rebel against the patriarchy (Dickinson on television) and a liberated lesbian (Wild Nights with Emily on film), portraits in some ways just as reductive. Martha Ackmann, the author of two previous books about women ahead of their time (Curveball and The Mercury 13), takes a more nuanced approach in her fine new work, which reminds us that whats important about Emily Dickinson is that she wrote some of the greatest poetry in the English language.

Ackmann, who has taught a seminar on Dickinson at Mount Holyoke, makes good use of scholarship that has long recognized her as an unconventional, formally inventive artist. The subtitles Ten Pivotal Moments prove a useful organizing principle. Each chapter opens by identifying a particular date, complete with a weather report from a local meteorological journal, a nice way to underscore Dickinsons immersion in the physical world around her hometown of Amherst. Granted, Ackmann often has to provide substantial background before she can elucidate the significance of the letter 14-year-old Emily Dickinson wrote on Aug. 3, 1845, to her friend Abiah Root (in Chapter One), or her fateful meeting with Mount Holyoke principal Mary Lyon on Feb. 6, 1848 (in Chapter Two). But she provides it with panache in a lucid narrative grounded in solid research colored by appreciative warmth.

Drawing on Dickinsons 1845 letter and the history of her friendship with Abiah, Ackmann concludes that Emily was coming to understand how to make ideas visible (italics added). Having nailed a crucial aspect of her poetry in three pithy words, Ackmann closes Chapter One with a lovely passage pointing toward the polite confrontation with Mary Lyons. Dickinsons goal for her writing, she argues, was to understand the particles of moments that others could not see or grasped with a faith she found too easy. Her friend Abiah and principal Lyons were among the many swept up in the evangelical Great Awakening, but Emily refused in 1848 and throughout her life to make a profession of faith she did not feel. Amherst, her family, and the deep mud of March were more sacred to her than any religious doctrine, Ackmann states, It was the here and now she lived for, not the possibility of eternal salvation.

While its unlikely that Dickinson ever uttered such thoughts so explicitly, they are resonant subtexts in her poems and correspondence. Ackmann discerns a joy in domesticity and nature that fed the central drama of Dickinsons life: She wanted her poems to translate all she saw and heard and felt, and not to be any earthly thing. This drama, Ackmann reminds us, was almost entirely internal, a fact that makes Dickinsons increasing withdrawal from society more explicable. Striving to bring her students to God, Mary Lyons sent Dickinson a different message when she warned about interruptions to their thinking and drains on their time, adding, it requires more discipline of mind and more grace to meet a ladys duties than gentlemens. Despite the famous bread-baking and unquestionable devotion to her parents, Dickinsons primary commitment was to her poetry; anything that interfered with it was evaded or ignored.

A particularly good chapter takes the March 1, 1862, publication of a Dickinson poem in the Springfield Republican as a springboard to examine her relationship with her sister-in-law Sue and her uncompromising commitment to poetry so radical even those who felt its power were disconcerted by it. Ackmann doesnt care whether Dickinson and Sue were lovers (a topic of ongoing debate); she stresses Sues role as a trusted reader, recipient of more of Dickinsons poems than anyone else, who nonetheless pressed for more conventional verse than Dickinson wanted to provide. The version of Safe in their alabaster chambers that Sue slipped to editor Samuel Bowles had the more conventional second stanza she preferred. But Ackmann believes that Dickinson, who frequently wrote and kept multiple drafts, favored another:

Grand go the Yearsto the Crescentabove them

Worlds scoop their Arcs

And Firmamentsrow

Diademsdropand Dogessurrender

Soundless as dotson a Disc of snow

The second stanza read as if the poet were standing on the edge of the universe and looking back at Earth, Ackmann writes. The planet was nothing more than a molecule and the dead merely atoms. It was the final image that encompassed everything Dickinson was coming to understand abstract and astonishing and as cold as ice.

Ackmanns insights are unfailingly fresh and vivid, evidence of a profound personal affinity for her subject. Subsequent chapters offer shrewd discussions of Dickinsons interactions with literary lion Thomas Wentworth Higginson, the impact of the Civil War on Dickinsons equivocal attitude toward being published, and many other topics. But Ackmanns focus, always, is on Dickinsons growth as a poet, and her cogent exegesis of the second stanza of Safe in their alabaster chambers foreshadows the books eloquent, elegiac conclusion on May 15, 1886, the day of Dickinsons death.

She died in the family homestead she loved and rarely left, but Ackmann locates her true home elsewhere: the wild terrain of her mind to Emily Dickinson, home was consciousness itself a continent of language where metaphor was her native tongue. These Fevered Days makes Dickinsons exploration of that wild terrain and that continent of language palpable, exciting, and accessible.

THESE FEVERED DAYS: TEN PIVOTAL MOMENTS IN THE MAKING OF EMILY DICKINSON

By Martha Ackmann

Norton, 278 pp., $26.95

Wendy Smith, a contributing editor at The American Scholar and Publishers Weekly, reviews books for The Washington Post and was a finalist for the 2018 National Book Critics Circles citation for excellence in reviewing.

Originally posted here:
These Fevered Days a fresh exploration of the wild terrain of Emily Dickinsons mind - The Boston Globe

Read More..