Wednesday, May 12, 2021

ONE BILLIONAIRE EXITS ANOTHER ENTERS

Facebook’s Mark Zuckerberg Might Have Just Made A Grand Entrance Into The Bitcoin Market

By Olivia Brooke
-May 12, 2021




The CEO of Facebook might have just dropped subtle hints on his “Bitcoin holdings.” In a post that has left the cryptocurrency space confused, for the most part, Zuckerberg posted a picture of two of his goats, named Max and Bitcoin.
What is cooking at the Zuckerberg mansion?

While a lot of Bitcoin proponents have asserted and concluded that the billionaire may have been hoping to spite the cryptocurrency community with the “offensive post” others are reading a deeper meaning to it; a more bullish one that is.

Entrepreneur and founder of Skybridge Anthony Scaramucci is a prominent Bitcoiner who believes that Zuckerberg is cooking something. He implies that Mark Zuckerberg’s move to recruit David Marcus, a former PayPal staff, to manage Facebook’s Cryptocurrency project was the first hint that Zuckerberg was paying attention to Bitcoin. It is possible that the media magnate may have plans to either buy the asset for himself or his companies.

“I knew Mark Zuckerberg would become a Bitcoin-er when he hired David Marcus from PayPal to run Facebook’s crypto business. It’s been a long and winding road, but welcome to Bitcoin. Great job Zuck and David. Excited for what comes next.” Wrote Scaramucci.
BTCUSD Chart By TradingView

Meanwhile, analyst CryptoWhale is also just as optimistic as Scaramucci, as he interprets Zuckerberg’s tweet as a pointer to the Billionaire finally entering the Bitcoin market.
Advertisement

Mark Zuckerberg rumored to have bought $10 billion worth of Bitcoin

Scaramucci’s views are not just mere guesses. The rumors about Facebook buying Bitcoin have been circulating since the year began. Last month, prior to Facebook revealing its first-quarter earnings report, news broke that the company bought a large amount of Bitcoin for its reserve. However, not a single Bitcoin was in sight after the earnings reports were made. Zuckerberg, who revealed that he intended to invest in other fields of emerging technologies in the future, did not include cryptocurrencies as one of the options.

Despite this, the rumors have resurfaced yet again, this time claiming that Zuckerberg may be buying Bitcoin for his family and not Facebook as was earlier speculated. Implying that the Billionaire might just be imitating the steps of the Winklevoss twins, whom he lost a court case to.

However, a fair share of the Bitcoin community continues to insist that Zuckerberg might be making a mockery of Bitcoin and its holders as a whole. “he’s calling us (bitcoin maxis) jackasses lol. Either way Bitcoin doesn’t need Zuck. Zuck needs bitcoin.” one user wrote.



Olivia Brooke
Hi, I'm Olivia. When I'm not stressing about my multicolored Chihuahua, I'm reading up on the next big thing that Cryptocurrency has to offer. Contact: Olivia.Brooke@zycrypto.com




THAT DIDN'T TAKE LONG
Never Mind: Elon Musk Says Tesla Won't Accept Bitcoin For Car Purchases Any More

By CAMILA DOMONOSKE • NPR
12/5/2021

Tesla CEO Elon Musk delivers his opening monologue on "Saturday Night Live" last week in an image released by NBC. Musk tweeted on Wednesday that Tesla would no longer accept cryptocurrency Bitcoin for car purchases.

WILL HEATH / NBC VIA AP

Tesla is executing a rapid U-turn on Bitcoin.

Months after Tesla embraced Bitcoin, CEO Elon Musk said on Wednesday the auto maker would no longer accept the cryptocurrency for car purchases due to its environmental impact.

Bitcoin is very energy-intensive. The "coins" are created through a process called "mining," in which powerful computers solve difficult math problems. That requires electricity — a mind-boggling amount of it.

"We are concerned about rapidly increasing use of fossil fuels for Bitcoin mining and transactions," Musk explained in a tweet, "especially coal, which has the worst emissions of any fuel."

The tweet comes just three months after Tesla surprised many by saying it would allow customers to pay for their electric vehicles with Bitcoin. Not only that, the company said at the time it also invested $1.5 billion in the cryptocurrency.

It was a good investment. In its most recently quarterly statement, Tesla's bitcoin holdings contributed substantially to its net profits.

But on Wednesday, Musk also said Tesla would no longer sell the cryptocurrency.

From the start, the company came under fire for embracing a currency with a substantial carbon footprint even though Musk has said that Tesla is dedicated to fighting climate change,

Bitcoin enthusiasts point out that renewable energy can power that mining. But critics point out that doesn't mean there's no impact.

And in some cases, Bitcoin mining has actually kept fossil fuel power plants in production when they would otherwise be inactive, adding to the world's carbon footprint.

"Cryptocurrency is a good idea on many levels and we believe it has a promising future, but this cannot come at great cost to the environment," Musk also said on Twitter, a platform he frequently uses to comment on his companies.

Bitcoin values fell by thousands of dollars in the minutes immediately after Musk's tweet. But the price is still north of $50,000 per Bitcoin — 100 times what they were trading for five years ago.

In his tweet, Musk added the company is open to other cryptocurrencies with significantly fewer energy requirements.

The announcement comes days after Musk led to a plunge in another cryptocurrency, Dogecoin, after calling it a "hustle" while hosting Saturday Night Live.

Dogecoin, which started as a joke but became backed with real money, had previously surged in value after Musk expressed support for the cryptocurrency.
Biden issues executive order to increase U.S. cybersecurity defenses

By Lawrence Abrams
May 12, 2021



President Biden signed an executive order Wednesday to modernize the country's defenses against cyberattacks and give more timely access to information necessary for law enforcement to conduct investigations.

This executive order follows the numerous cyberattacks targeting US interests this year, including the SolarWinds supply chain attacks in December and the more recent DarkSide ransomware attack against the largest US fuel pipeline, Colonial Pipeline.

The 34-page 'Executive Order on Improving the Nation's Cybersecurity' is designed to modernize the cybersecurity defenses of the federal government's infrastructure, created a standardized incident response playbook, and increase communication between service providers and law enforcement.


In summary, the executive order will direct the government to perform the following actions:

Require IT (information technology) and OT (operational technology) service providers, including cloud hosting providers, to share information about cybersecurity threats and breaches that they become aware of and to remove contractual issues that prevent the sharing of such information.

Modernize the federal government IT services, including moving towards a Zero Trust Architecture, require multi-factor authentication, encryption for data at rest and in transit, and develop strict security guidelines on the use of cloud services.

Improve supply-chain security by developing guidelines, tools, and best practices to audit and assure that critical software is not tampered with by malicious actors in supply-chain attacks. As part of this initiative, the Federal government will create an "energy star" type of program that shows software was developed securely.

Establish a "Cyber Safety Review Board" that includes Federal and private-sector members who will convene after a significant cyber incident to assess the attack, provide recommendations, and share relevant confidential information with law enforcement.

Create a standardized playbook across all government agencies for responding to breaches and cyberattacks.

Improve the detection and remediation of cybersecurity vulnerabilities and breaches on government networks by deploying a centralized Endpoint Detection and Response (EDR) solution and intra-governmental information sharing.


These initiatives will be conducting in rolling phrases ranging between 30 days from the executive order, to in some cases, 360 days.

"This is one of the most detailed and deadline-driven EOs I’ve seen from any administration. In the wake of a seismic attack, like SolarWinds, this is incredibly encouraging to see," Amit Yoran, CEO of Tenable and founding director of US-CERT, shared in a statement to BleepingComputer.

The White House has also released a summarized version of the executive order that provides a good overview of the upcoming changes being made to increase the country's cybersecurity posture.

Related Articles:

Malware attack is preventing car inspections in eight US states

Brown University hit by cyberattack, some systems still offline

City of Tulsa's online services disrupted in ransomware incident

Largest U.S. pipeline shuts down operations after ransomware attack

DarkSide ransomware will now vet targets after pipeline cyberattack
Ransomware Group Leaks Info on Some D.C. Cops as Retribution for Demands Going Unmet

Maggie Gile 
NEWSWEEK

A Russian-speaking ransomware syndicate that stole data from the Washington, D.C., police department said it rejected an initial offer of a $100,000 payment and that if more money is not offered, it will release sensitive information that could put lives at risk, the Associated Press reported.

© Alex Brandon/Associated Press FILE - In this April 2, 2021, file photo, Washington Metropolitan Police Department chief Robert Contee speaks during a news conference in Washington. Political hand-wringing in Washington over Russia's hacking of federal agencies and meddling in U.S. politics has mostly overshadowed a worsening digital scourge with a far broader wallop: crippling and dispiriting extortionary ransomware attacks by cybercriminal mafias. All the while, ransomware gangsters have become more brazen and cocky as they put more and more lives and livelihoods at risk. This week, one syndicate threatened to make available to local criminal gangs data they say they stole from the Washington, D.C., metro police on informants.

The Babuk group said on its website late Monday that it would release "all the data" if the D.C. police didn't "raise the price."

"The negotiations reached a dead end, the amount we were offered does not suit us," the group said.

A day after the initial threat, the gang leaked personal information of some police officers taken from background checks, including details of officers' past drug use, finances and of past sexual abuse.

For more reporting from the Associated Press, see below.

The extortion threat comes amid a separate ransomware attack on the Colonial Pipeline that's affected part of the nation's fuel supply, highlighting the power of internet-savvy criminal gangs to sow mayhem from a half a world away with impunity.

D.C. police did not immediately comment and has not said whether it's negotiated any possible payment.

On Tuesday, the gang released screenshots that appear to be negotiations with the department. They show the gang asked for $4 million and received a counter-offer of $100,000. The authenticity of the screenshots could not be independently confirmed.

If true, it's an example how complex the ransomware problem is when even police find themselves forced to consider making payments to criminal gangs.

Late last month, the group said it had hacked into the network of the city's police department and threatened to leak the identities of confidential informants unless an unspecified ransom was paid. Experts said such a release could endanger the lives of the informants.

Babuk leaked similar background files on Monday with its threat to release more, said Brett Callow, a threat analyst and ransomware expert at the security firm Emsisoft.

"This is far worse than any hack of other police departments previously," Callow said, adding that he's never seen a law enforcement agency pay a ransom before.

Ransomware gangs have been leaking sensitive data from victims for well over a year, but experts said they've not seen such aggressive new tactics used before against police departments. The cybercriminal mafias mostly operate in foreign safe havens out of the reach of Western law enforcement.

The average ransom payments last year were $310,000, up 171% from 2019, according to Palo Alto Networks.

Related Articles
Gab CEO Andrew Torba Condemns Threats of Violence Against Social Network's Hackers
What is DarkSide? Russia-Linked Hacker Group Behind Colonial Pipeline Shutdown
Gas Shortages, Long Lines Across Southeast After Colonial Pipeline Cyberattack
Russian Ransomware Group Claims Credit for Cyber Attack on D.C. Metro Police
'Principled' ransomware hackers who took down the Colonial Pipeline: We regret it

The cybercriminals who caused an energy crisis on the U.S. East Coast said they had no hard feelings on Monday and expressed regret for causing trouble.

Provided by National Post Oil infrastructure stands at the Colonial Pipeline Co. Pelham junction and tank farm in Pelham, Alabama, U.S., Sept. 2016.

Colonial Pipeline Co. halted operations on May 7 after hackers stole almost 100 gigabytes of data and locked the company’s computers in a ransomware attack the FBI attributed to the DarkSide hacking ring.

The company has said the pipeline, the nation’s biggest, will be substantially back in operation by the end of the week. In the meantime, service stations from Virginia to Florida have sold out of gasoline as supplies dwindled and panic buying set in.

The 5,500-mile energy artery, extending from Texas to New Jersey, connects refineries along the Gulf Coast to population centres from Atlanta to New York and beyond. Each day, it carries about 2.5 million barrels, an amount that exceeds the entire oil consumption of Germany.

In a statement on Monday DarkSide expressed regret for the disruption, saying its intention was to “make money” — “not creating problems for society.”
Cyberattack shuts down America’s largest fuel pipeline, gasoline prices to spike
Colonial Pipeline says corporate website back online

The group also tried to shift the blame to its collaborators, adding that going forward DarkSide would “check each company that our partners want to encrypt to avoid social consequences.” It maintains that the targeted companies can afford the ransom, sometimes ranging in the millions, which it demands in return for encrypted data.

“We do not want to kill your business,” the group has previously said.

DarkSide’s site on the dark web hints at their hackers’ past crimes, claims they previously made millions from extortion and that just because their software was new “that does not mean that we have no experience and we came from nowhere.”

The site also features a Hall of Shame-style gallery of leaked data from victims who haven’t paid up, advertising stolen documents from more than 80 companies across the United States and Europe.

In a screenshot of one of its attacks posted on Bleeping Computer , the group reveals some of its stolen data to the company and threatens to release the entirety online.

In some ways DarkSide is hard to distinguish from the increasingly crowded field of internet extortionists. Like many others it seems to spare Russian, Kazakh and Ukrainian-speaking companies, suggesting a link to the former Soviet republics.

Since coming into the limelight last year, Canadian companies have also been a victim of DarkSide’s attacks. Earlier this year, it seized 120 gb of data from Discount Car and Truck Rentals, the Canadian division of U.S.-based Enterprise Holdings. Most recently, corporate data from Home Hardware has been pilfered and, last year, an unnamed billion dollar company was subject to its demands, IT World Canada reported .

According to news reports of DarkSide’s website, the group spares funeral services, hospitals, universities, non-profits or government bodies from attacks, “based on our principles.”

“I assume the attack on Colonial was carried out by an affiliate and the group is concerned about the level of attention it has attracted,” an analyst told Financial Times .

National Post Staff
With files from Reuters and Bloomberg
NATIONALIZE PIPELINES
Tech audit of Colonial Pipeline found 'glaring' problems

BOSTON (AP) — An outside audit three years ago of the major East Coast pipeline company hit by a cyberattack found “atrocious” information management practices and “a patchwork of poorly connected and secured systems,” its author told The Associated Press.

“We found glaring deficiencies and big problems,” said Robert F. Smallwood, whose consulting firm delivered an 89-page report in January 2018 after a six-month audit. “I mean an eighth-grader could have hacked into that system.”

How far the company, Colonial Pipeline, went to address the vulnerabilities isn't clear. Colonial said Wednesday that since 2017, it has hired four independent firms for cybersecurity risk assessments and increased its overall IT spending by more than 50%. While it did not specify an amount, it said it has spent tens of millions of dollars.

"We are constantly assessing and improving our security practices — both physical and digital,” the privately held Georgia company said in response to questions from the AP about the audit's findings. It did not name the firms who did cybersecurity work but one firm, Rausch Advisory Services, located in Atlanta near Colonial's headquarters, acknowledged being among them. Colonial's chief information officer sits on Rausch's advisory board.

Colonial has not said how the hackers penetrated its network. How vulnerable it was to compromise is sure to be intensely scrutinized by federal authorities and cybersecurity experts as they consider how the most damaging cyberattack on U.S. critical infrastructure might have been prevented.

Friday's pipeline shutdown has led to distribution problems and panic-buying, draining supplies at thousands of gas stations in the Southeast. Colonial said it initiated the restart of pipeline operations on Wednesday afternoon and that it would take several days for supply delivery to return to normal.

Ransomware attacks have reached epidemic levels as foreign criminal gangs paralyze computer networks at state and local governments, police departments, hospitals and universities — demanding large sums to decrypt the data. Many organizations have failed to invest in the safeguards needed to fend off such attacks, though U.S. officials worry even more about state-backed foreign hackers doing more serious damage.

Any shortcomings by Colonial would be especially egregious given its critical role in the U.S. energy system, providing the East Coast with 45% of its gasoline, jet fuel and other petroleum products.

Smallwood, a partner at iMERGE and managing director of the Institute for Information Governance, said he prepared a 24-month, $1.3 million plan for Colonial. While iMERGE’s audit was not directly focused on cybersecurity “we found many security issues, and that was put in the report.”

Colonial’s statements Wednesday suggest it may have heeded a number of Smallwood’s recommendations. In addition, it says it has active monitoring and overlapping threat-detection systems on its network and identified the ransomware attack “as soon as we learned of it.” Colonial said its IT network is strictly segregated from pipeline control systems, which were not affected by the ransomware.

Unlike electrical utilities, the pipeline industry is not subject to mandatory cybersecurity standards, which the Federal Energy Regulatory Commission chair, Richard Glick, called for in a statement Tuesday.

Smallwood’s study was not a cybersecurity audit. It focused on ensuring smooth operations and preventing data theft, which is exactly what Colonial suffered last week. Colonial is not saying what the cybercriminals took before activating the ransomware.

The hackers, from a Russian-speaking syndicate called DarkSide, steal data before locking up networks to doubly extort victims. If a victim refuses to pay, they not only refuse to unscramble the data, they threaten to release sensitive material online. Colonial has not said whether it paid DarkSide.

Smallwood read portions of his report to the AP but would not share it because he said some of the content is confidential. He said he was paid about $50,000 for it.

He cited, for example, Colonial's inability to locate a particular maintenance document. "You’re supposed to be able to find it within 15 minutes. It took them three weeks.”

Locating such a document could be crucial in responding to an accident or keeping up-to-date pipeline inspection records to prevent leaks, Smallwood said.

Colonial experienced one of the worst gasoline spills in U.S. history last August, contaminating a nature preserve north of Charlotte . After it was discovered by two teenagers, the spill's severity was not immediately clear as Colonial's initial reports indicated a far lower volume. North Carolina environmental regulators angrily called the company's failure to promptly provide reliable data unacceptable. Colonial says it released the best available data on spill volume as the discovery progressed.

Separately, shippers have complained to the Federal Energy Regulatory Commission that Colonial inflated what it spends on pipeline integrity to deflect accusations it overcharges them. Colonial rejects this, citing the rising costs of safely maintaining its system.

Bill Caram, executive director of the nonprofit watchdog Pipeline Safety Trust, called worrisome the allegations of deficient IT management, piecemeal spill reporting and pipeline integrity issues.

“I think all these things just could paint a picture of the culture at Colonial maybe not taking risks seriously enough,” he said.

Smallwood said he was reluctant to go public about the Colonial audit for fear of alienating future clients “but the gravity of the situation demands that the public know just how fragile some of these systems within our infrastructure are.”

One of his main recommendations was that Colonial hire a chief information security officer, a position that cybersecurity experts consider essential in any company with infrastructure vital to national security. Colonial said it instead assigned those responsibilities to a subordinate of chief information officer Marie Mouchet.

Mouchet was on the advisory board of Rausch when it did a cybersecurity study for Colonial concurrent to Smallwood’s audit. Asked if that might present a conflict of interest, Rausch CEO Michael Lisenby said Mochet's advisory board seat is an unpaid, voluntary position.

Smallwood’s recommendations included a data loss prevention program to ensure highly confidential, marketable data — such as details on how the pipeline is used — could not be easily removed.

Colonial says it has strengthened data-loss-prevention defenses with three different software tools that provide alerts when data leaves the network.

Smallwood said he found no security-awareness training, which mostly teaches employees not to fall victim to phishing, the cause of more than 90% of cyber-intrusions. But Colonial said its expanded cybersecurity regime includes regular simulated phishing campaigns for employees.

The audit “covered environmental procurement, legal risk, business development, asset integrity, accounting and tax safety operations, information technology, (Microsoft) SharePoint and human resources. And so it was a very comprehensive assessment,” said Smallwood.

Originally founded by nine oil companies in 1962, Colonial is privately held. It's owners include a pair of private equity firms, a Canadian fund manager, a Koch Industries subsidiary and a subsidiary of Shell Midstream Partners. The company does not release earnings or revenue figures.

___

This story has been updated to correct reference to one of the owners of Colonial. It is a Koch Industries subsidiary, not a Koch Brothers subsidiary.

Frank Bajak, The Associated Press
Biden: White House in 'very close contact' with Colonial Pipeline on shutdown, fuel shortage

Courtney Subramanian
USA TODAY

WASHINGTON – President Joe Biden said Wednesday his administration is in "very close contact" with Colonial Pipeline after a cyberattack disrupted fuel deliveries and threatened a gas shortage across the Southeast and Mid-Atlantic regions in recent days.

"We have been in very, very close contact with Colonial Pipeline, which is the one area you’re talking about - one of the reasons gasoline prices are going up," Biden told reporters during remarks on the COVID-19 vaccine campaign.

Colonial Pipeline issued a statement following the president's remarks announcing that it restarted its pipeline operations after temporarily closing it for six days. The company said it would take several days before its supply chain could return to normal.

Biden's comments came as officials urged Americans not to hoard gas, including advising against filling up plastic bags of gasoline, and the administration worked to find alternative ways to deliver gas amid the temporary shutdown of Colonial Pipeline, a major system that delivers fuel across the East Coast.

The FBI announced last Friday that hackers known as DarkSide hit the Colonial Pipeline system with a ransomware attack, which takes computerized systems hostage until a payment is made.

The incident,along with the SolarWinds hack on U.S. federal agencies last year and a cyber breach of Microsoft Exchange, raised fresh questions about the vulnerability of the U.S. infrastructure system.

In response, Biden signed an executive order Wednesday to modernize the nation's cyber defense, according to a senior administration official.

The order includes removing contractual barriers to allow IT service providers to share breach information with government officials, establishing baseline security standards for commercial software sold to the government, creating a standard playbook for cyber incident responses and establishing a cybersecurity safety review board led by government and private sector officials.

The official said the order was the first of many steps the government would take to confront cybersecurity threats but reflected a shift in the administration's mindset from incident response to prevention.
Your stories live here.
Fuel your hometown passion and plug into the stories that define it.
Create Account

More:Colonial Pipeline restarted operations, owners say 'it will take several days' for supply chain to return to normal

More:Continued gas shortages? Panic buying after Colonial Pipeline cyberattack won't solve the problem, experts say.

Panicked drivers rushed to fill up their tanks, fearing a gas shortage, even though pipeline officials have said they expect to "substantially" restore service by the end of the week, likely limiting most of the fallout.

According to AAA Gas Prices, which conducts a daily survey, the national average price for gas rose 8 cents from a week ago to $3.01, marking the first time national prices have topped $3 since 2014. The impact is largely concentrated in the Southeast, with station outages occurring throughout the region.

Biden and other White House officials have sought to allay concerns by issuing emergency waivers to ease restrictions on the distribution of fuel and assist in supply challenges

"I have in the meantime made it easier for us to have lifted some of the restrictions on the transportation of fuel, as well as access to the United States military providing fuel and with vehicles to get it there, places where it's badly needed," Biden told reporters.



Transportation Secretary Pete Buttigieg told reporters earlier on Wednesday the administration was "working around the clock" to tackle the delays caused by the pipeline shutdown.

Buttigieg, who appeared alongside Michael Regan, Administrator of the Environmental Protection Agency, outlined the steps the administration has taken in recent days, including surveying the availability of vessels that are qualified to carry petroleum in the Gulf of Mexico and up the eastern seaboard and issuing waivers to extend the hours during which drivers can transport fuel.


He also said the White House determined that 10 states can use existing federal major debt disaster declarations to issue permits that allow drivers to temporarily carry additional gasoline that would ordinarily exceed existing weight limits on federal highways in their state.

Buttigieg, who is among the administration officials pushing Biden's $2 trillion infrastructure proposal, said the incident was a reminder that the U.S. infrastructure needed to be more resilient.

"This is not an extra, this is not a luxury, this is not an option,” he said. “This has to be core to how we secure critical infrastructure.”

Contributing: Brett Molina, Nathan Bomey, USA TODAY

Internet Subsidy Gives $50 A Month Discounts For Low-Income Americans



The pandemic has underscored the importance of having a reliable internet connection, with adults dependent on it for work and young people reliant on it for their education.Nam Y. Huh/AP

Financially strapped American families are now eligible for an emergency discount on their internet service under a COVID-19 relief program that went into effect on Wednesday.

The Emergency Broadband Benefit program from the Federal Communications Commission provides a discount of up to $50 per month toward broadband service for eligible households and up to $75 per month for households on qualifying Tribal lands. It also gives low-income families a $100 discount for the purchase of a laptop or desktop computer, or a tablet. However, the FCC reports, Cox and Windstream are the only providers participating in this benefit so far.

The pandemic has underscored the importance of having a reliable internet connection, with adults dependent on it for work and young people reliant on it for their education. Expanding high-speed internet access is a priority for the Biden administration which has placed Vice President Harris in charge of the endeavor. The White House has asked Congress for $100 billion to make broadband more affordable and to carry it to rural areas that have been left behind by the tech advances.
Article continues after sponsor message

"High-speed internet service is vital for families to take advantage of today's health, education, and workplace opportunities," Jessica Rosenworcel, the acting chair of the FCC, said in a statement. "And the discount for laptops and desktop computers will continue to have positive impact even after this temporary discount program wraps up."

The $3.2 billion temporary pandemic subsidy was approved by Congress late last year but it's taken months for the FCC to finalize the rules of the program.

Only those Americans who already qualify for free and reduced-price school lunch programs, are recipients of a federal Pell Grant, experienced a substantial loss of income since early 2020, or meet eligibility criteria for participating providers' existing low-income or COVID-19 programs are eligible to apply for the benefits. People can access the funds until the money runs out or up to six months after the Department of Health and Human Services declares an end to the pandemic.

Earlier this week the FCC approved the Emergency Connectivity Fund, which sets aside nearly $7.2 billion to help schools and libraries provide devices and connectivity to students, school staff, and library patrons during the pandemic.
NATIONALIZE BIG PHARMA
Private equity group swoops on pharma services provider UDG Healthcare with a £2.6bn bid


By MATT OLIVER FOR THE DAILY MAIL

PUBLISHED: 12 May 2021

Private equity buyers have swooped on pharmaceuticals services provider UDG Healthcare with a £2.6billion bid.

The London-listed firm urged shareholders to back the cash offer from Clayton, Dubilier & Rice (CD&R), which is worth 1023p per share. That is a 21.5 per cent premium on UDG’s closing price on Tuesday.

It is the latest British company to fall into private equity hands after a string of deals, including approaches which were made for John Laing and St Modwen last week.


Pharmaceuticals services provider UDG Healthcare has urged shareholders to back a £2.6bn cash offer from private equity group Clayton, Dubilier & Rice

Analysts say the bonanza is being fuelled by a perception that UK firms appear ‘cheap’, due to the weak pound and the knock to share prices in the pandemic.

UDG’s shares leapt more than 20 per cent in response to the takeover bid.

They closed up 20.7 per cent, or 174p, at 1016p.

Shane Cooke, chairman of Dublin-based UDG, insisted the board was ‘confident’ in its future prospects but that the takeover bid was ‘an attractive offer for shareholders’.

‘The offer reflects the quality, strength and long-term performance of UDG’s businesses and its future growth potential,’ he added.


‘We believe that our people, our clients and our businesses will continue to prosper under the stewardship of CD&R.’

Eric Rouzier, partner at CD&R, said: ‘UDG has long established itself as a leading provider of high-value services to pharma and biotech companies globally, supported by a highly skilled workforce.’

UDG, which has its headquarters in Dublin, specialises in healthcare advisory, communications, commercial, clinical and packaging services.

Its manufacturing services include making placebos used in clinical trials.

However, the offer premium of 21.5 per cent is lower than the average of 36 per cent that has been offered in a string of other recent deals, according to AJ Bell.

Russ Mould, AJ Bell’s investment director, said that the avalanche of bids ‘suggests that someone, somewhere feels UK companies are still going cheap’.

He said overseas buyers were attracted by the weak pound, which still sits below levels reached ahead of the EU referendum in 2016, giving them improved buying power.

UDG also reported for the six months the end of March, showing that revenues fell 5 per cent to £469million but profits rose 5 per cent to £46million
APARTHEID ISRAEL
Mob 'lynching of Arab' aired live on Israeli TV

By AFP - May 13,2021 - 

This video grab obtained from a footage released by Kan 11 Public broadcaster on Wednesday, shows a far-right Israeli mob attacking who they considered an Arab man, on the seafront promenade of Bat Yam, a town south of Israel's commercial capital Tel Aviv (AFP photo)

OCCUPIED JERUSALEM — Fooage of a far-right Israeli mob attacking a man near Tel Aviv they believed to be an Arab was aired live on television Wednesday night, as the Israel-Palestinian conflict raged on.

The shocking images show a man being forcibly removed from his car and beaten by a crowd of dozens until he lost consciousness.

The attack, broadcast by public broadcaster Kan, took place on the seafront promenade of Bat Yam, south of Israel's commercial capital Tel Aviv.

Police and emergency services did not arrive on the scene until 15 minutes later, while the victim lay motionless on his back in the middle of the street.

Those in the crowd justified the attack by saying the man was an Arab who had tried to ram the far-right nationalists, but the footage shows a motorist trying to avoid the demonstration.

"The victim of the lynching is seriously injured but stable," Tel Aviv's Ichilov hospital said in a statement, without revealing his identity.



Issawi Fredj, an Arab deputy from the left-wing Meretz party, said the images were a sign that the country was heading towards "civil war".

Demonstrations by far-right activists broke out Wednesday night in several cities, leading to clashes with police and sometimes Arab Israelis.

Police said they were responding to violent incidents in cities including Acre, Haifa and Lod.

In Acre, a mixed Arab-Jewish town in northwest Israel, a Jew was seriously injured by stone throwers, police said.

"The rioters in Lod and Acre do not represent Israeli Arabs, the rioters in Bat Yam... do not represent Israeli Jews, violence will not dictate our lives," said opposition leader Yair Lapid, who is currently tasked with forming a government after March elections.

Palestinian militants in Gaza have launched hundreds of rockets since Monday at Israel, which has carried out air strikes on the crowded coastal enclave.

The most intense hostilities in seven years between Israel and Gaza's armed groups were triggered by weekend unrest at Jerusalem's Al-Aqsa mosque compound.