Anonymous ID: d691af March 3, 2023, 9:27 p.m. No.18443343   🗄️.is đź”—kun   >>3360 >>3390 >>3420 >>3489 >>3597 >>3696

>>18443316

EXCLUSIVE: Kellyanne Conway and George Conway to divorce after 22 years of marriage

 

https://twitter.com/nypost/status/1631798671984451586

 

Kellyanne Conway and George Conway to divorce after 22 years of marriage

By Oli Coleman and Ian MohrMarch 3, 2023 | 6:22pm

D.C’s weirdest marriage is over.

 

Page Six hears that Kellyanne Conway, the longtime advisor to President Donald Trump, and George Conway, the longtime tormentor of President Trump, have decided to divorce after 22 years of marriage.

 

Beltway insiders tell us that they’ve both lawyered up and that the two sides are hashing out the details of the split.

 

Enlarge ImageThe conways

Kellyanne and George Conway, who did public battle over the Trump administration, are getting a divorce.

Gregory P. Mango

During the 2016 elections, Kellyanne served first as a campaign advisor to candidate Trump and then as his campaign manager, while her husband co-founded the Lincoln Project with the express purpose of keeping Trump out of the White House.

 

After the inauguration, she became senior counselor to the president, while George continued to lambast Trump at every opportunity on social media.

 

Enlarge ImageDonald Trump and Kellyanne Conway

Kellyanne called her husband’s online criticism of her boss, Donald Trump, “cheating by tweeting.”

Getty Images

In 2022, Vanity Fair wrote that, “One of the greatest mysteries of the 21st century is the marriage of Kellyanne Conway and her husband, George — specifically, if they hate each other as much as their public commentary would suggest, or if the whole thing is some kind of three-dimensional chess designed to further their own interests.”

 

The mystery appears to have been solved.

 

Enlarge Image

The Conways were married for 22 years before deciding to split.

REUTERS

The pair wed in 2001 and share four children, but their political differences during the Trump administration took a toll on their relationship.

 

In her 2022 memoir “Here’s the Deal,” Kellyanne said that she considered George’s steady barrage of criticism of the then-president a betrayal of their marriage, calling it “cheating by tweeting.” She also said that Ivanka Trump had suggested couples therapy.

 

The Conways have four kids including Claudia Conway, who exposed the family’s tension on TikTok.

Courtesy of Kellyanne Conway

 

Trump himself tweeted of George, “I barely know him but just take a look, a stone cold LOSER & husband from hell!” Kellyanne defended the post, saying that it was part of Trump’s famous flair for “punching back,” and that her husband had suggested her boss was mentally ill without justification.

 

Meanwhile, the relationship faced a major curveball last year when their daughter, “American Idol” contestant Claudia Conway, began posting troubling videos about their family life online.

 

Both parents resigned from their positions to spend time with the family in the wake of the odd online activity.

 

Claudia has since said that she stepped back from the media after her viral experience “because of the way that my words were being misconstrued.”

She also said that she and Kellyanne started going to therapy together, and, according to the site, “Claudia says those sessions helped them understand and make peace with each other.”

 

Insiders say that the pair have attempted to repair the marriage, but have now decided the call it.

 

Another source told us that the split has been buzzed about inside the Beltway for months.

 

https://pagesix.com/2023/03/03/kellyanne-conway-and-george-conway-to-divorce/?utm_campaign=SocialFlow&utm_source=NYPTwitter&utm_medium=SocialFlow

Anonymous ID: d691af March 3, 2023, 9:36 p.m. No.18443385   🗄️.is đź”—kun   >>3393 >>3394 >>3489 >>3597 >>3696

>>18443347

>Pretty sure somewhere in the chain Walmart funded antifa and blm.

Oh yea…big time…

 

Walmart donates $14 million as part of broader pledge to advance racial equity

 

PUBLISHED MON, FEB 1 2021 12:01 AM ESTUPDATED MON, FEB 1 20218:56 AM EST

 

In the wake of the George Floyd protests, Walmart

pledged to boost diversity within its own ranks and contribute $100 million over five years to help fight systemic racism across the country.

 

On Monday, the company gave an update on that effort. Walmart and its foundation will distribute the first $14.3 million to 16 nonprofit organizations. The grants will go toward groups that are tackling racial inequities in various ways, such as educating communities of color about the Covid-19 vaccines, reducing debt for students at historically Black colleges and universities and providing internet access and technology to children who are attending school remotely.

 

Walmart is one of many companies that promised to throw its money and weight behind addressing racial disparities after Floyd’s killing on Memorial Day. Yet as the country’s largest employer and retailer, its actions have additional significance. CEO Doug McMillon also leads the Business Roundtable, a powerful corporate voice made up of many of the country’s most prominent chief executives.

 

When the company made its initial pledge in June, McMillon acknowledged that corporations — including Walmart — must do more than simply write checks. He said the company would do better within its four walls, too, by recruiting and supporting diverse talent.

 

Black employees make up about 21% of Walmart’s 1.5 million U.S. workforce, according the company’s most recent diversity and inclusion report. However, that diversity fades in the top ranks of Walmart. About 12% of the company’s managers and 7% of its officers are Black.

 

Walmart tapped longtime employee Kirstie Sims to lead the company’s Center for Racial Equity, which will focus on inequities in four key areas: finance, health care, education and criminal justice.

 

''article continues, but it's making me vomit.''

 

https://www.cnbc.com/2021/02/01/walmart-donates-14-million-dollars-as-part-of-pledge-to-advance-racial-equity.html

Anonymous ID: d691af March 3, 2023, 9:47 p.m. No.18443429   🗄️.is đź”—kun   >>3432 >>3457 >>3489 >>3597 >>3696

>>18443371

>That means the water is next target.

 

Yes, recall, they did stress testing 2 years ago.

 

https://www.natlawreview.com/article/florida-water-system-hack-highlights-challenges-public-utility-cybersecurity

 

Florida Water System Hack Highlights Challenges for Public Utility Cybersecurity

Wednesday, February 24, 2021

Earlier this month, fears usually confined to dystopian novels and Hollywood movies were realized in Oldsmar, Florida ''when an unknown hacker breached the city’s water treatment system by successfully accessing its control systems and ''increasing sodium hydroxide to deadly levels. Fortunately, the employee whose desktop was accessed quickly noticed the intrusion. Immediately after the mysterious intruder left, the employee re-adjusted the controls to safe levels before any contaminated water reached the community.

 

The hacker ''gained access though a widely-used commercial application that allows team members to access each other’s desktops.'' (MS Teams?…slack is too edgy for a water utility) These types of applications give users wide-ranging access to internal networks from the internet, making them useful for remote troubleshooting but ripe for abuse. Oldsmar’s personnel hadn’t used this particular software in months, but it remained installed on computers used to monitor and adjust chemical levels in the water system. In addition, the computers reportedly all shared one password to access the software and the computers ran on an outdated operating system. This incident highlighted multiple security risks in systems connected to critical infrastructure, but Oldsmar is not an outlier.

 

While many are calling this hack a “wake up call,” it really shouldn’t be – this attack is far from the first of its kind. We have previously warned of the increase in cyber threats against municipal and other public entities as hackers have accessed dozens of water utilities, including an intrusion of a system controlling a dam in New York State.

 

Responsibility for the Oldsmar incident remains unclear, but an increase in cyber threats from foreign actors remains a serious concern for public utilities and entities.1 This is especially true in the wake of the SolarWinds hack, which began in March 2020 and was not discovered until December. Russian hackers are suspected of compromising widely used network management software to gain access to hundreds of local, state, and federal agencies as well as private companies’ networks.

 

Government agencies and lawmakers continue to highlight the risks posed by cyberattacks, and understandably so. Last month, the Government Accountability Office released a report detailing concerns about gaps in the government’s cybersecurity approach across several sectors of critical infrastructure. The report concluded by recommending further communication between the Department of Homeland Security’s Cybersecurity & Infrastructure Security Agency (CISA) and the Environmental Protection Agency, specifically instructing the agencies to coordinate on how to close gaps in security at water and wastewater facilities.

 

Anne Neuberger, the top White House cybersecurity advisor, told a federal advisory board this month that a national cyber strategy is in the works; citing the Oldsmar hack in particular, Neuberger said to “[w]atch this space for more of an explicit focus on control systems cybersecurity from the administration.” Last week, Senate Intelligence Committee Chairman Mark Warner wrote to the FBI and EPA regarding the Oldsmar hack, requesting that the FBI provide updates on the investigation into the hack, that the EPA review Oldsmar’s compliance with EPA security guidelines, and confirmation that the Federal Government is sharing threat information with similar facilities.

Anonymous ID: d691af March 3, 2023, 9:48 p.m. No.18443432   🗄️.is đź”—kun   >>3489 >>3501 >>3597 >>3696

>>18443429 - Part 1

 

part 2

 

Public entities should keep an eye on changes in cybersecurity regulation and guidance, but in the meantime, there are a number of things they should do to proactively protect against cyberattacks. CISA recommends (1) segmenting and segregating networks and functions; (2) limiting unnecessary lateral communications; (3) hardening network devices; (4) securing access to infrastructure devices; (5) performing out-of-band network management, which limits access to infrastructure networks and separates user traffic from network management traffic; and (6) validating the integrity of hardware and software.

 

Remote work poses additional risks that warrant additional precautions. CISA recommends changing default passwords, restricting network access, encrypting data, installing firewalls, maintaining antivirus software, file sharing with caution, and connecting using VPNs. In its official alert about the Oldsmar hack, CISA also outlined recommendations to secure remote access software like the one used to access Oldsmar’s system.

 

Public entities should also have an incident response plan, including a list of law enforcement and cybersecurity professionals to call in the event of an attack. Municipal issuers should make sure they comply with Security and Exchange Commission reporting and disclosure guidance. Some state laws mandate disclosure, meaning that public entities should also ensure their incident response plan includes any applicable state reporting. Having, and following, an incident response plan as well as taking robust preventative measures is critical to minimize the likelihood and impact of an attack on an entity’s credit rating.

 

Additionally, cyber insurance policies can financially insulate policyholders by insuring against destruction of and loss of access to computer networks, including response costs and other damages caused by cyberattacks. In the case of public entities, insurance can be particularly important to protect against liability. However, compliance with best-practices is still necessary, as coverage under such policies often requires the insured to comply with robust security standards.

 

Additional cybersecurity resources for the water sector are available through the American Water Works Association, which provides free Cybersecurity workshops for small systems as well as a number of guides to assist water utility professionals in securing their systems. The EPA has also created a centralized page on their website with “Cyber Resilience Resources,” including a Cybersecurity Incident Action Checklist and self-assessment tools. The Department of Homeland Security provides guidelines for reporting cyber incidents.

 

As cyber threats continue to increase in frequency and severity, it is critical to have a thoughtful, coordinated approach to cybersecurity. Organizations’ risk management, IT, and legal departments, as well as outside counsel, should work together to identify vulnerabilities in existing cybersecurity measures and take corrective measures, when necessary, to protect against cyberattacks and maximize coverage under cyber insurance policies.

 

As the Oldsmar water supply attack demonstrates, public entities need to maintain focus on cyber threats and their potential impact. If your systems oversee utilities, the worst-case scenario of a cyberattack can be much more than just losing data. Taking proactive steps to secure systems is crucial to avoiding the most severe consequences of cyberattacks.

 

_______

 

1 Ransomware attacks present particular concerns to public entities by holding important systems hostage in demand for payment, causing these systems to be offline for extended periods of time and compromising the data they held. For example, Baltimore was hit with ransomware attacks twice – once in 2018, when ransomware affected the city’s phones and shut down automatic 911 and 311 dispatches, and again in 2019, when it immobilized the city’s voice mail, email, and bill-paying systems, ultimately costing an estimated $18 million.