Thank You Messages for Doctors: Write a note of thanks for your doctor if care, concern, personal attention and professional services have played a vital role in your recovery. Doctors, nurses and staff work night and day to perform life saving acts which are nothing short of miracles. A short letter, a few sweet quotes on a greeting card or a touching patient testimonial to show appreciation for their thankless efforts will go a long way.
This is no surprise, because harder evidence of a technical nature points to an inside leak, not hacking — by Russians or anyone else. James Lankford, R-Oklahoma, a member of the Senate Intelligence Committee, has joined other senators in calling for a bipartisan investigation of suspected cyber-intrusion by Russia.
Reading our short memo could save the Senate from endemic partisanship, expense and unnecessary delay. In what follows, we draw on decades of senior-level experience — with emphasis on cyber-intelligence and security — to cut through uninformed, largely partisan fog.
Far from hiding behind anonymity, we are proud to speak out with the hope of gaining an audience appropriate to what we merit — given our long labors in government and other areas of technology.
And corny though it may sound these days, our ethos as intelligence professionals remains, simply, to tell it like it is — without fear or favor. We have gone through the various claims about hacking. The email disclosures in question are the result of a leak, not a hack.
When someone physically takes data out of an organization and gives it to some other person or organization, as Edward Snowden and Chelsea Manning did. When someone in a remote location electronically penetrates operating systems, firewalls or any other cyber-protection system and then extracts data.
All signs point to leaking, not hacking. If hacking were involved, the National Security Agency would know it — and know both sender and recipient. In short, since leaking requires physically removing data — on a thumb drive, for example — the only way such data can be copied and removed, with no electronic trace of what has left the server, is via a physical storage device.
These include at least 30 companies in the U. This gives NSA unparalleled access to data flowing within the U. These data transfers carry destination addresses in what are called packets, which enable the transfer to be traced and followed through the network.
Emails being passed across the World Wide Web are broken down into smaller segments called packets. These packets are passed into the network to be delivered to a recipient. This means the packets need to be reassembled at the receiving end. To accomplish this, all the packets that form a message are assigned an identifying number that enables the receiving end to collect them for reassembly.
Moreover, each packet carries the originator and ultimate receiver Internet protocol number either IPV4 or IPV6 that enables the network to route data.
When email packets leave the U. These collection resources are extensive [see attached NSA slides 12345 ]; they include hundreds of trace route programs that trace the path of packets going across the network and tens of thousands of hardware and software implants in switches and servers that manage the network.
Any emails being extracted from one server going to another would be, at least in part, recognizable and traceable by all these resources. This process can sometimes require a closer look into the routing to sort out intermediate clients, but in the end sender and recipient can be traced across the network.
The various ways in which usually anonymous spokespeople for U. The evidence that should be there is absent; otherwise, it would surely be brought forward, since this could be done without any danger to sources and methods. Thus, we conclude that the emails were leaked by an insider — as was the case with Edward Snowden and Chelsea Manning.
Such an insider could be anyone in a government department or agency with access to NSA databases, or perhaps someone within the DNC. Thus, it remains something of a mystery why the media is being fed strange stories about hacking that have no basis in fact.OBJECTIVE OF THIS WEB SITE: In anticipation of your questions and your need to validate my skills, knowledge, and proficiencies, this is an expanded resume, which includes examples of my actual work product (documents, graphics, photos, audio, video, web content, brochures, policies, analysis, etc.).
Most importantly, this expanded resume DOES NOT REPLACE THE TRADITIONAL ONE-PAGE . Welcome to Expert Handwriting Analysis. As an independent document examiner, I work with private citizens, attorneys, corporations, and law enforcement throughout the United States and abroad.
While designing Intellark (Intellaren's Arabic keyboard layout), the new keyboard layout that allows you to type in Arabic using your typing knowledge in English, we naturally and badly needed Arabic letter frequency analysis to make enlightened decisions about some key mappings.
Strangely, no resources on the Internet with the expected table of frequencies of Arabic letters could be found as. One of the many physicists who came under official FBI scrutiny during the Cold War was Richard Feynman. 1 Feynman’s work on the bomb at Los Alamos, combined with his fame, penchant for telling stories about safe-cracking, and occasional consideration for being on government committees led him to be investigated a few times, to see where is loyalties lay.
Analysis of an actual thank you note. In this post, I will provide an analysis of an actual thank-you note. This is the note I wrote to my boss for the merit increase I received in April I will focus on 4 points to show what is good about it and what I could have done better. The post ends with a bonus point about stickers.
Oct 22, · Even on the difficult days, remember that you are never forgotten. Students who read this letter will think of you. They think of you all the time.