Jenna McLaughlin
๐ค SpeakerAppearances Over Time
Podcast Appearances
It has witness testimony in ongoing cases. It lists union organizers and leadership. And, you know, even if there's a possibility that that information was out in the wrong hands, we spoke to a It could scare people from forming unions or coming to the NLRB with concerns or testifying if they feel like that information isn't going to be secure.
It has witness testimony in ongoing cases. It lists union organizers and leadership. And, you know, even if there's a possibility that that information was out in the wrong hands, we spoke to a It could scare people from forming unions or coming to the NLRB with concerns or testifying if they feel like that information isn't going to be secure.
It has witness testimony in ongoing cases. It lists union organizers and leadership. And, you know, even if there's a possibility that that information was out in the wrong hands, we spoke to a It could scare people from forming unions or coming to the NLRB with concerns or testifying if they feel like that information isn't going to be secure.
But, you know, even if you're not the biggest fan of unions, this agency also has sensitive business information. Companies sometimes cooperate with investigations, whether it's an investigation into potential trade secrets or something along those lines. So it's possible that companies will have shared a lot of information about their internal workings that they also would not want exposed.
But, you know, even if you're not the biggest fan of unions, this agency also has sensitive business information. Companies sometimes cooperate with investigations, whether it's an investigation into potential trade secrets or something along those lines. So it's possible that companies will have shared a lot of information about their internal workings that they also would not want exposed.
But, you know, even if you're not the biggest fan of unions, this agency also has sensitive business information. Companies sometimes cooperate with investigations, whether it's an investigation into potential trade secrets or something along those lines. So it's possible that companies will have shared a lot of information about their internal workings that they also would not want exposed.
I think, firstly, if someone had this data, they could use it to create blacklists of union organizers, fire a bunch of people, target harassment and intimidation tactics at individuals involved in union activism. It could even give a company an advantage in an ongoing legal battle with the NLRB.
I think, firstly, if someone had this data, they could use it to create blacklists of union organizers, fire a bunch of people, target harassment and intimidation tactics at individuals involved in union activism. It could even give a company an advantage in an ongoing legal battle with the NLRB.
I think, firstly, if someone had this data, they could use it to create blacklists of union organizers, fire a bunch of people, target harassment and intimidation tactics at individuals involved in union activism. It could even give a company an advantage in an ongoing legal battle with the NLRB.
If you've got insight into the opposing counsel's notes, you can probably come up with a pretty good response. Meanwhile, a foreign adversary or criminal hacker might be really interested in that data, too. They might hold it for ransom. They might learn more about their competitors' businesses or innovations.
If you've got insight into the opposing counsel's notes, you can probably come up with a pretty good response. Meanwhile, a foreign adversary or criminal hacker might be really interested in that data, too. They might hold it for ransom. They might learn more about their competitors' businesses or innovations.
If you've got insight into the opposing counsel's notes, you can probably come up with a pretty good response. Meanwhile, a foreign adversary or criminal hacker might be really interested in that data, too. They might hold it for ransom. They might learn more about their competitors' businesses or innovations.
And it's also possible that this data could be combined with some of the other sensitive sources of data that Stephen's been talking about to build a larger dossier on American citizens.
And it's also possible that this data could be combined with some of the other sensitive sources of data that Stephen's been talking about to build a larger dossier on American citizens.
And it's also possible that this data could be combined with some of the other sensitive sources of data that Stephen's been talking about to build a larger dossier on American citizens.
Yeah, there were some really weird stuff going on that any IT specialist that you talk to is going to kind of scratch their head about. He saw them using what's called a container. It's kind of like a little bubble that exists inside of a computer where everything that you're doing inside of it is invisible to the rest of the system. So you can execute code.
Yeah, there were some really weird stuff going on that any IT specialist that you talk to is going to kind of scratch their head about. He saw them using what's called a container. It's kind of like a little bubble that exists inside of a computer where everything that you're doing inside of it is invisible to the rest of the system. So you can execute code.
Yeah, there were some really weird stuff going on that any IT specialist that you talk to is going to kind of scratch their head about. He saw them using what's called a container. It's kind of like a little bubble that exists inside of a computer where everything that you're doing inside of it is invisible to the rest of the system. So you can execute code.
You can have it run a bunch of automated programs. And then when it's deleted, when you're done with it, nobody really knows it was ever there or what it was up to. In his disclosure to Congress, Berulis also said that they turned off multi-factor authentication, deleted logs, turned off security requirements for mobile access.
You can have it run a bunch of automated programs. And then when it's deleted, when you're done with it, nobody really knows it was ever there or what it was up to. In his disclosure to Congress, Berulis also said that they turned off multi-factor authentication, deleted logs, turned off security requirements for mobile access.