Manitoba FN organization hosting AFN election facing financial political turmoil

first_img(Pictured: Manitoba Keeewatinowi Okimakanak Grand Chief David Harper)By Jorge Barrera APTN National NewsWhen Assembly of First Nations chiefs on Tuesday decided to hold the election for national chief in Winnipeg this coming December, Manitoba Keeewatinowi Okimakanak Grand Chief David Harper, who will be the host, told the Halifax gathering his organization was “financially ready” to hold the event.Harper’s claim, however, is disputed by chiefs within his own organization.They paint a picture of MKO as a financially troubled organization run by a grand chief who is rapidly losing the confidence of the chiefs who elected him to the job.According to documents obtained by APTN National News and interviews with three MKO member chiefs, the organization is swimming in red ink and there is a move to oust the sitting grand chief.MKO chiefs are set to meet in Norway House, Man., next week from July 22 to 23.All three chiefs interviewed by APTN National News requested anonymity for now. The chiefs will be identified as first, second and third MKO-member chiefs.“I don’t have any confidence in Grand Chief Harper, especially in telling the truth,” said the first MKO-member chief.APTN National News requested an interview with Harper, who is Halifax at the AFN’s annual general assembly, but he declined the offer.MKO represents 30 northern Manitoba First Nation communities and some are among the poorest in the country. The organization handles about $17 million in program revenues.The chiefs interviewed by APTN National News said they questioned Harper’s claim MKO is financially ready to host the event.“That was pretty bold of him to say that…We don’t have any documentation to back up that statement that he made publicly,” said the second MKO-member chief.“I don’t think MKO is in a good financial position to host the AFN assembly,” said the third MKO-member chief.MKO spokesperson Brennan Manoakeesick said MKO would be relying on “third-party” dollars to fund the AFN election event. He said Manitoba and Tourism Winnipeg had already promised to put in $200,000 toward hosting the December gathering.“MKO has very little liability,” said Manoakeesick.Manoakeesick, however, said only Harper could answer questions about the organization’s finances.The chiefs interviewed by APTN National News said it’s difficult for them to get any accurate information on the current state of MKO’s finances.“Some of the chiefs who have asked about these improper authorizations are being vilified. We are made out to be the bad buys, basically, for trying to do the right thing,” said the second MKO-member chief.MKO is in the midst of an internal forensic audit of all its books and those of its subsidiaries by Winnipeg-based firm Lazer Grant. The audit was requested by MKO’s executive council of chiefs.The last phase of the audit, however, is being held up until MKO pays Lazer Grant for work done during the earlier stages of the audit.According to a timeline of events distributed among a select group of chiefs and obtained by APTN National News, Lazer Grant reported in January of this year that its mandate had been “severely restricted.” The timeline alleged Harper was behind efforts to curb the audit.“The mandate of Lazer Grant was arbitrarily changed by Grand Chief David Harper without a proper executive approval or a proper notice to all executive members,” said the timeline.The seeds of the forensic audit date back to an MKO executive meeting in June 2013, following the resignation of financial officer Glen Buchko. During this meeting, chiefs were able to see Buchko’s contract for the first time and it was later revealed he was making about $250,000 annually.“They were contracts that were authorized without the knowledge of the executive council,” said the second MKO-member chief. “There are serious transactions that are in question and we are very concerned.”Lazer Grant was formally engaged to launch the forensic audit in August 2013, the same month MKO received a report from an independent accountant that determined the organization faced a significant “risk” as a result of its finances.APTN National News has obtained the report sent by Bernie Shore, a Winnipeg-based accountant, to MKO that month stating he could not conduct an audit on the organization’s books because he had “not been able to obtain sufficient appropriate audit evidence to provide a basis for an audit opinion on the March 31, 2013, and March 31, 2012 financial statements.”Shore’s report noted MKO’s accumulated deficit for the fiscal year ending on March 31, 2013, had ballooned to $976, 025. The report said MKO had accumulated an operating deficit of $609,058 by March 31, 2013. The report said this was a 71 per cent increase over the previous year’s operating deficit of $356,108.“There is a risk that Aboriginal Affairs and Northern Development Canada may put the organization in co-management or worse still, the organization may be placed in a third-party administration,” stated Shore.Shore’s report recommended a major curtailing of travel costs, which rang in at $336,374 in 2013.“I would recommend that in the future travel must be on budget and that controls be put in place to ensure this doesn’t exceed budget. This is the second fiscal year where travel has consecutively been over budget. This is a critical point for the organization as MKO cannot sustain these operational losses,” stated Shore.He also recommended MKO cut the money it spends on outside consultants, which reached $178, 944 in 2013 and $255,724 in 2012.He said MKO hired consultants with “no budget lines being identified for a funding source.”Shore stated MKO’s chiefs needed to set hard guidelines on both matters.“This is bordering on a critical situation,” stated Shore.Shore also highlighted problems with the use of MKO’s Visa credit card.“There were several payments and charges on MKO Visa made during the year that were not supported by actual invoices or evidence of the purpose,” stated Shore. “Without an actual invoice and details of the purpose, evidence does not exist that the amount paid was a legitimate expenditure relating to MKO business.”The third MKO-member chief interviewed by APTN National News said the financial irregularities are especially troubling given the level of poverty faced by many of the organization’s member communities.“It is despicable, especially when he is not doing the advocacy he is supposed to do,” he [email protected]@JorgeBarreralast_img read more

Sacred Games 2 Nawaz Saifs series demands a complete balidan of viewers

first_imgJo baat 1:30 gantey mein ki ja sakti thi us ko 8 gantey tak drag kiya gaya. Highly disappointed. #SacredGames — Ahmed Ali (@AhmedAliShabbir) August 16, 2019 GOT: I’m the biggest disappointment of the yearSacred Games: Aham Brahmasmi #SacredGames #SacredGamesS2 #SacredGamesS02— Akash Patil (@patilakashh) August 16, 2019 Sacred Games 2TwitterNetflix’s Sacred Games had its viewers on their edge of their seats after they binge-watched the entire season 1 on their screens. After a long wait, the makers are back with Sacred Games season 2, but unfortunately, the web series failed to live up to the expectations, this time around.In season 1, viewers were introduced to Mumbai’s dreaded don Ganesh Gaitonde, played by Nawazuddin Siddiqui, who spares no one when it comes to his survival. But in season 2, the same Ganesh Gaitonde, is being controlled by many people and even his foul mouth couldn’t save him from his draining life.Apart from Nawaz, Jatin Sarna as Bunty, Saif Ali Khan as Sartaj, Pankaj Tripathi as Guruji, Kalki Koechlin, Saurabh Sachdeva as Suleiman Isa and others try to lift the series with their performances, but the screenplay becomes a drag even after watching three episodes and makes you feel lost somewhere in the chaos.You may want to finish the series just the sake of it to know how Sartaj will save Mumbai from a nuclear attack and unfold Gaitonde mysterious life. But in the end, you may feel why the makers invested so much of their time turning their favourite web series into a complete disaster.Viewers have been expressing their disappointment with Sacred Games 2 and had been flooding the social media with memes that perfectly decribes their current state of mind.Take a look at some of the reactions on Twitter.Is Sacred Games web series Completed????? Or incomplete Is Sartaj succeed to deactivate bomb?? Very Suspense ending of Sacred Games 2 Why Gaitonde told in Last that meri kahani adhuri reh gai?? Is Season 3 coming?? #SacredGames @NetflixIndia pic.twitter.com/jHUbcVzvsX— Devang Chauhan (@DevangC36386210) August 16, 2019 Sachi mai chutiya [email protected] #sacredgames #SacredGamesS2 #netflixindia #Netflix pic.twitter.com/dQWGjTWxA5 — Ajinkya Pathare (@AjinkyaPathare9) August 16, 2019 #SacredGames season 1 and 2 pic.twitter.com/3NPjrHvubU— सच™’ (@LUVguru19_) August 16, 2019last_img read more

6 artificial intelligence cybersecurity tools you need to know

first_imgRecently, most of the organizations experienced severe downfall due to an undetected malware, Deeplocker, which secretly evaded even the stringent cyber security mechanisms. Deeplocker leverages the AI model to attack the target host by using indicators such as facial recognition, geolocation and voice recognition. This incidence speaks volumes about the big role AI plays in the cybersecurity domain. In fact, some may even go on to say that AI for cybersecurity is no longer a nice to have tech rather a necessity. Large and small organizations and even startups are hugely investing in building AI systems to analyze the huge data trove and in turn, help their cybersecurity professionals to identify possible threats and take precautions or immediate actions to solve it. If AI can be used in getting the systems protected, it can also harm it. How? The hackers and intruders can also use it to launch an attack–this would be a much smarter attack–which would be difficult to combat. Phishing, one of the most common and simple social engineering cyber attack is now easy for attackers to master. There are a plethora of tools on the dark web that can help anyone to get their hands on phishing. In such trying conditions, it is only imperative that organizations take necessary precautions to guard their information castles. What better than AI? How 6 tools are using artificial intelligence for cybersecurity Symantec’s Targeted attack analytics (TAA) tool This tool was developed by Symantec and is used to uncover stealthy and targeted attacks. It applies AI and machine learning on the processes, knowledge, and capabilities of the Symantec’s security experts and researchers. The TAA tool was used by Symantec to counter the Dragonfly 2.0 attack last year. This attack targeted multiple energy companies and tried to gain access to operational networks. Eric Chein, Technical Director of Symantec Security says, “ With TAA, we’re taking the intelligence generated from our leading research teams and uniting it with the power of advanced machine learning to help customers automatically identify these dangerous threats and take action.” The TAA tools analyze incidents within the network against the incidents found in their Symantec threat data lake. TAA unveils suspicious activity in individual endpoints and collates that information to determine whether each action indicate hidden malicious activity. The TAA tools are now available for Symantec Advanced Threat Protection (ATP) customers. Sophos’ Intercept X tool Sophos is a British security software and hardware company. Its tool, Intercept X, uses a deep learning neural network that works similar to a human brain. In 2010, the US Defense Advanced Research Projects Agency (DARPA) created their first Cyber Genome Program to uncover the ‘DNA’ of malware and other cyber threats, which led to the creation of algorithm present in the Intercept X. Before a file executes, the Intercept X is able to extract millions of features from a file, conduct a deep analysis, and determine if a file is benign or malicious in 20 milliseconds. The model is trained on real-world feedback and bi-directional sharing of threat intelligence via an access to millions of samples provided by the data scientists. This results in high accuracy rate for both existing and zero-day malware, and a lower false positive rate. Intercept X utilizes behavioral analysis to restrict new ransomware and boot-record attacks.  The Intercept X has been tested on several third parties such as NSS labs and received high-scores. It is also proven on VirusTotal since August of 2016. Maik Morgenstern, CTO, AV-TEST said, “One of the best performance scores we have ever seen in our tests.” Darktrace Antigena Darktrace Antigena is Darktrace’s active self-defense product. Antigena expands Darktrace’s core capabilities to detect and replicate the function of digital antibodies that identify and neutralize threats and viruses. Antigena makes use of Darktrace’s Enterprise Immune System to identify suspicious activity and responds to them in real-time, depending on the severity of the threat. With the help of underlying machine learning technology, Darktrace Antigena identifies and protects against unknown threats as they develop. It does this without the need for human intervention, prior knowledge of attacks, rules or signatures. With such automated response capability, organizations can respond to threats quickly, without disrupting the normal pattern of business activity. Darktrace Antigena modules help to regulate user and machine access to the internet, message protocols and machine and network connectivity via various products such as Antigena Internet, Antigena Communication, and Antigena network. IBM QRadar Advisor IBM’s QRadar Advisor uses the IBM Watson technology to fight against cyber attacks. It uses AI to auto-investigate indicators of any compromise or exploit. QRadar Advisor uses cognitive reasoning to give critical insights and further accelerates the response cycle. With the help of IBM’s QRadar Advisor, security analysts can assess threat incidents and reduce the risk of missing them. Features of the IBM QRadar Advisor Automatic investigations of incidents QRadar Advisor with Watson investigates threat incidents by mining local data using observables in the incident to gather broader local context. It later quickly assesses the threats regarding whether they have bypassed layered defenses or were blocked. Provides Intelligent reasoning QRadar identifies the likely threat by applying cognitive reasoning. It connects threat entities related to the original incident such as malicious files, suspicious IP addresses, and rogue entities to draw relationships among these entities. Identifies high priority risks With this tool, one can get critical insights on an incident, such as whether or not a malware has executed, with supporting evidence to focus your time on the higher risk threats. Then make a decision quickly on the best response method for your business. Key insights on users and critical assets IBM’s QRadar can detect suspicious behavior from insiders through integration with the User Behavior Analytics (UBA) App and understands how certain activities or profiles impact systems. Vectra’s Cognito Vectra’s Cognito platform uses AI to detect attackers in real-time. It automates threat detection and hunts for covert attackers. Cognito uses behavioral detection algorithms to collect network metadata, logs and cloud events. It further analyzes these events and stores them to reveal hidden attackers in workloads and user/ IoT devices. Cognito platform consists of Cognito Detect and Cognito Recall. Cognito Detect reveals hidden attackers in real time using machine learning, data science, and behavioral analytics. It automatically triggers responses from existing security enforcement points by driving dynamic incident response rules. Cognito Recall determines exploits that exist in historical data. It further speeds up detection of incident investigations with actionable context about compromised devices and workloads over time. It’s a quick and easy fix to find all devices or workloads accessed by compromised accounts and identify files involved in exfiltration. Just as diamond cuts diamond, AI cuts AI. By using AI to attack and to prevent on either side, AI systems will learn different and newer patterns and also identify unique deviations to security analysts. This provides organizations to resolve an attack on the way much before it reaches to the core. Given the rate at which AI and machine learning are expanding, the days when AI will redefine the entire cybersecurity ecosystem are not that far. Read Next DeepMind AI can spot over 50 sight-threatening eye diseases with expert accuracy IBM’s DeepLocker: The Artificial Intelligence powered sneaky new breed of Malware 7 Black Hat USA 2018 conference cybersecurity training highlights Top 5 cybersecurity trends you should be aware of in 2018last_img read more