A Capital Idea!

Explore the picturesque town that once was Arizona’s territorial seat of government.

By Kristen Almquist

 

As the temperatures begin to rise throughout Southern Arizona, locals start setting their sights on cooler climates.

Many will travel a few hours north to where towering pines and comfortable temperatures transport visitors to what seems like another state altogether.

Nestled at an elevation of 5,200 feet above sea level, Prescott, Arizona, sits among the largest stand of ponderosa pine forests in the United States. Prescott’s perfect weather provides an average temperature of 70 degrees, with four beautiful and distinct seasons, and breathtaking landscapes complete with granite mountains, lakes, streams, and rolling meadows filled with wildlife.

Prescott is rich with history embodied in its world-famous Whiskey Row and abundant historical landmarks. Whether folks are seeking to relax in a natural environment filled with beauty and wildlife, or the history of cowboy forays in the most famous saloons of the Old West, there’s something for every visitor.

The town was established in 1864, one year after President Lincoln made Arizona a territory. Immediately designated the capital, Prescott was named for Harvard-educated historian/author William H. Prescott, who was widely viewed as one of the great intellectual minds of his era. His book, The History of the Conquest of Mexico, was utilized in naming several downtown streets.

With scenery so appealing, visitors will be sure to discover something new and exciting. Activities include horseback riding, golfing, kayaking, fishing, hiking, camping, mountain biking, and exploring local breweries, restaurants, shopping, festivals and more! Prescott has a hometown feel that keeps out-of-towners, young and old, coming back year after year.

People: Q&A

Michael McDonald / CEO of Community Food Bank of Southern Arizona

Photo by Thomas Veneklasen

Q: How did you become interested in your career field?

Like so many important and worthwhile gifts that come along in a life, I kind of fell into nonprofit leadership. As a teenager I wanted to be priest, that is until I fully understood what celibacy meant (or wouldn’t mean). So I sort of wandered part-time through too long an undergraduate program at the UA while being a stay-at-home dad and working nights and weekends as a janitor at St. Joseph’s Hospital. Each evening I ran into the same little old nun who crept down the long corridors. She’d always chime out, “Michael, Pray for Admissions. Because without margin, there is no mission.” In well over a century of their healing ministry here in Southern Arizona, those nuns were more successful capitalists than any high-profile businessman I’ve ever come to know. Eventually I’d get a business management degree, work in a for-profit, and when I got laid off, stumble into my first “profit-with-a-purpose” (nonprofit) gig.

Q: What is the biggest challenge of your job?

When a peer of mine at another organization was struggling with the challenging role of being their organization’s titular leader, I thought of how much I enjoy playing the piano, teasing melodies and harmonics out of the instrument while hammering away at some fun and funky rhythms. All of this made possible by the great pressure placed upon the piano’s unseen workaday bridge, over which the sparkling strings are strung pitch-perfect and furiously hammered away at. An effective nonprofit leader should be that bridge.

Q: What is the greatest reward of your job?

The reward is that someone enjoys and benefits from the instrument’s (nonprofit’s) beautiful music. The greatest reward is when other instruments join in. Now that becomes the making of quite the community pachanga!

Q: Do you have any family members in Tucson?

My beloved spouse of 40 years and I are very thankful that our three children and five grandchildren live in Tucson, as well as other extended family across Southern Arizona.

Q: What’s your favorite food indulgence?

Along with an ever-present side of medium-heat salsa, my go-tos — brought to you today by the letter “B” — are beans, beer, and brownies.

Virtual Entertainment

At press time, due to federal, state and local regulations to control the spread of COVID-19, regular events, festivals and activities had been canceled, postponed, or rescheduled until later in the year, or even into 2021. Some May events were still slated, but the situation changes daily, so you should check websites and/or phone numbers to ensure that they are still a go.

In the interest of providing our readers with possible options for entertainment and engagement in May, we present the following sample list of virtual tours, live cams, and other online resources. Please note — some of these websites will redirect you to the organization’s Facebook page or other social media site in order to stream content. For reasons of space, we’ve left out many of the major streaming services (i.e., Amazon, Hulu, Netflix, etc.). For up-to-date information, please check the listed websites, as well as visit TucsonLifestyle.com.

Streaming Concerts, Films & Other Events

Fox Tucson Theatre
Foxtucson.com

The Loft Cinema
Loftcinema.org

Tucson Helping Tucson
Tucsonhelpingtucson.com

Startup Tucson
Startuptucson.com

NPR
Npr.org

Arizona Attractions with Webcams and/ or Virtual Tours

Tucson Botanical Gardens/Butterfly Magic
Tucsonbotanical.org

Tohono Chul
Tohonochul.org

Reid Park Zoo
Reidparkzoo.org

Tucson Museum of Art
Tucsonmuseumofart.org

Fourth Avenue
Livefrom4th.com

Musical Instrument Museum (Phoenix)
Mim.org

Phoenix Art Museum (Phoenix)
Phxart.org

Mission San Xavier del Bac
Sanxaviermission.org

U.S. Sites With Webcams, Virtual Tours or Streaming Content

Metropolitan Opera
Metopera.org

Georgia O’Keeffe Museum
Okeeffemuseum.org

American Museum of Natural History
Amnh.org

New England Aquarium
Neaq.org

San Diego Zoo
Zoo.sandiegozoo.org

The Huntington
Emuseum.huntington.org

Albuquerque Visitalbuquerque.org/plan-my-trip/ virtual-tour

International Sites With Webcams, Virtual Tours or Streaming Content

Vatican Museums & The Sistine Chapel
M.museivaticani.va

Musée d’Orsay
Musee-orsay.fr

Louvre
Louvre.fr

Tate Galleries Tate.org.uk

Abbey Road Studios Crosswalk
Abbeyroad.com/crossing

Regional Artisan

A Posse of Painted Peccaries

One of Arizona’s most famous critters is honored with an outdoor sculptural exhibit.

Tubac is wild about their local “painted” wildlife!

Javelinas de Tubac is an eye-catching outdoor exhibit coordinated by the Tubac Center of the Arts.

This community-wide endeavor began as an idea developed by two local artists: Virginia Hall and Nicholas Wilson, who also designed these Southwest-inspired peccaries once the project was approved. Wilson has been a painter, sculptor and printmaker for more than 50 years, with his main career focus on wildlife art. Wilson was curator of exhibits at the Arizona-Sonora Desert Museum from 1970 to1972. This led to a professional career as an artist being represented in many galleries.

“The Javelinas de Tubac project is an opportunity for visitors to enjoy the beauty, uniqueness and variety of talent exhibited by Tubac’s many artists,” according to Karin Topping, executive director of the Tubac Center of the Arts.

More than 40 adults and six sets of baby javelinas have been designed by local artists and displayed in Tubac and various Southern Arizona locations, such as Tucson International Airport, Arizona-Sonora Desert Museum, Mesquite Valley Growers Nursery, Wisdom’s Café, Santa Cruz Chili & Spice Company and Tumacacori National Historical Park.

The javelinas will be on display until the end of March. A live auction will be held on April 4, with funds that are raised benefiting the Tubac Center of the Arts and several local charities.

Note: More information about the project and the individual artists can found at Javelinasdetubac.com.

Clockwise from top left: “Starry Night in Tubac,” by Michaelin Otis; #A10-J by Tige Reeve; “Javelina de Tubac Road Trip,” by Roberta Rogers; Noel Daniels (left) and Fred Collins with “Tubac Tootsie.”

Live help

Gone Phishing

Criminals can attack you from thousands of miles away just using a computer. It’s happening to both individuals and institutions large and small at an alarming rate. Here’s how some local experts define the problem and describe the solutions.

Elena Acoba

In December 2019, the FBI announced charges against two Russian nationals in a long-running cybercrime spree.

Their malicious code, known as “Bugat” and several other names, as well as the separate “Zeus” malware, invaded tens of thousands of computers, according to law enforcement authorities. By allegedly gaining access to the computers and their contents, the pair and several co-conspirators stole banking credentials and moved money out of victims’ accounts. They also are accused of extorting tens of millions of dollars from victims by holding data or denying computer access for ransom.

The two are believed to have victimized cities, banks, companies and nonprofit organizations in 13 states. Arizona wasn’t one of them, but it doesn’t mean the state is immune to cybercrime.

“They’re
being targeted
because of the
vulnerabilities
that exist in
their network.”
— Michael Foster

According to the FBI, Arizona ranked 13th in the United States in the number of cybercrime victims in 2018. It ranked 16th in total victim financial loss for the same year.

Arizona businesses and individuals lost more than $19 million in 2018 in email scams alone, according to the FBI’s annual report on cybercrime. This is the type of scam that the Russian nationals are alleged to have used for their criminal activities.

Known as business email compromise (BEC) scams, crooks use legitimate-looking emails to get people to send payments or money transfers to fake entities. Other email scams also cause employees to unwittingly send vital data to criminals.

The Better Business Bureau Serving Southern Arizona alerted small-business owners in mid- 2019 about an email scam involving RFPs, or request for proposals. The fake email invites the owner to fill out an online RFP for goods or services. By opening the form, the victim unwittingly downloads a malware-infected file. The victim also might select a link to a seemingly valid website asking for sensitive banking information, which is retrieved by crooks.

Other cyberattacks are costly, too. Corporate data breaches cost Arizona businesses $908,000 in 2018, according to the FBI’s annual report.

Ransomware, when a cyberattack can lock out businesses and individuals from their computer systems unless they pay ransom, has been decreasing since 2016, but still victimized 14 Arizona systems in 2018.

Companies in Tucson aren’t immune to these and many other cybercrimes. “In Arizona and Tucson, we’re seeing the same sort of thing that is playing out nationally,” says Michael Foster, a special agent with the FBI Phoenix division’s Tucson resident agency.

Although hackers will attack any vulnerability, businesses provide an attractive trove of information that can be stolen. “With consumers your personal information is at risk,” explains Denisse Alvarez, director of operations for the Better Business Bureau office in Tucson. “With businesses, they have a database they’re tapping into,” putting businesses and their customers, vendors and other relationships at risk.

University of Arizona Professor Salim Hariri says the problem is huge and getting

“The digital
world has two
billion websites,
2.5 to 3
billion users
and 40 to 50
billion internet
of things.”
— Salim Hariri

bigger. “There are statistics that nearly half of all cyberattacks in 2019 were targeting small businesses,” says Hariri, who also is director of UArizona’s National Science Foundation Center for Cloud and Autonomic Computing. “That is going to increase.”

That’s particularly troubling because many smaller businesses usually don’t have the money or personnel to robustly fight internet crime. “They’re being targeted because of the vulnerabilities that exist in their network,” comments Foster.

Slow Your Roll

Vulnerabilities include people as well as hardware and software. “The biggest problem in cybersecurity is the human side,” says Hariri. “That’s the weakest link.”

For instance, he says, employees can be easily duped into opening email attachments or selecting website links that cause malware to be installed on company computers.

They respond to fake emails that appear to be from co-workers, and end up inadvertently sending funds or crucial data to crooks. Called social engineering, these scams also can take the form of seemingly legitimate vendors or suppliers requesting payment. In reality, the emailed requests are fake and the receiving accounts illegal.

Even in a fast-paced work environment, one of the best ways for someone to avoid falling victim to an email scam is to slow down, Hariri advises. Often, a cybercrime starts with “you getting distracted by a well-constructed message,” he notes.

Employees may see a phishing email, which is an unsolicited message that asks for sensitive information. Providing that information can give criminals access to company computers. From there, they can take control of the email host and issue seemingly legitimate messages that are really vehicles for theft.

Experts suggest that employees not quickly respond to seemingly urgent email, especially if something feels off. “Take the time to think about what the situation is, what they’re asking for,” advises Foster.

One way to check an email’s legitimacy is to call the email sender with a phone number that exists outside of the suspicious email. Another way is to send an email to the purported sender using an address from a separate source, not by merely hitting “reply,” then following up with a phone call.

Business owners would do well to train their employees to recognize phishing and other illegitimate messages, as well as create and share policies that help flag suspicious emails.

For instance, employees should know what types of company business are not conducted by email, such as requesting or sharing certain sensitive information. They should understand their responsibilities so that they are suspicious of requests for action outside of their job description.

There are other strategies to keep criminals from getting protected data. Experts suggest that information that is shared on a website is encrypted so it cannot be read by hackers. A website address that starts with “https” does this.

Other good practices include immediately installing confirmed legitimate software patches, especially those regarding security, and always logging out of public WiFi connections so crooks can’t highjack a session.

Another strategy to reduce cyberattacks is to insist that employees report cyberscams and hacks to designated company departments, whether or not damage has been done. Sharing these experiences companywide put people on alert.

In Short: Report

The FBI and Better Business Bureau encourage individuals and businesses to report cybercrime and cyberscams to their organizations. For BBB, it helps inform others about potential threats.

“If we see a pattern, then we start alerting the media,” says Alvarez. “Our threshold is very small.” Two or three reports of the same cyberscam will trigger cautions to the public.

The FBI uses reports to hone its crimefighting strategies that can lead to arrests and recovery of lost funds. The bureau runs the Internet Crime Complaint Center (IC3) where victims can make an online report. Complaints may be referred to the appropriate international, federal, state or local law enforcement or regulatory agency for possible investigation.

In a partnership between the FBI and the private sector, information about cyberthreats is shared. Arizona Infragard, which is, according to its website, an “alliance between the Arizona Office of the Federal Bureau of Investigation and individuals committed to protecting the nation’s infrastructure and its people,” also holds public meetings on cybersecurity issues.

Have a Plan, Stan

Reporting cyberattacks to the right organizations and businesses is crucial to protect assets and possibly recover losses. Businesses that know when to call financial institutions, technical support and law enforcement have a better chance of recovering from an attack than those that have no plan at all.

Cybercrime recovery plans need not be fancy or expensive to create, Foster says. “It gives you a starting place where you don’t feel lost or out to sea,” he observes. “The most important thing is you know where to start.”

The Better Business Bureau has a cybercrime initiative to help businesses plan for protection and response. Alvarez outlined a five-step process that can lead to a comprehensive plan to fight against, and recover from, cybercrime.

  1. Take inventory of the business’ technology. Understand how information is collected and where it is stored.
  2. Assess policies and procedures that are used to guard against cybercrime. Train employees on these.
  3. Have systems in place to detect cyberscams and to alert employees of them.
  4. Create an incident response plan, such as how to continue providing service if computers are compromised and to whom the incident should be reported.
  5. Establish systems that will recover and restore data that might have been hacked. Have a plan to maintain your business reputation during the crisis.

School It!

Cybersecurity firms exist to help companies harden their systems and assist in responding to an attack. For companies that can’t afford a service, local resources can help train employees.

Foster and other FBI agents can speak to organizations and companies about cybercrime protection.

The Better Business Bureau’s Tucson office is expanding its workshop schedule for 2020, including offering at least one that focuses on cybercrime protection. “Definitely, education is probably the most important thing” a company can do to protect itself in cyberspace, offers Alvarez.

Pima Community College’s East Campus houses one of five cyber warfare ranges around the United States. They help companies and cybersecurity workers hone their skills and their action plans.

Run by volunteers and equipped with extensive hardware and software, the range provides team war games, attack simulations and forensics methods to test the strength of a company’s response to cybercrime. Its learning modules help individuals understand the intricacies of an attack and how to respond.

The University of Arizona offers an online master’s degree program on cybersecurity for working professionals. Students learn to assess, prevent and manage cyber risks to information and physical systems.

Winning By Degrees

More than 3.5 million cybersecurity positions will be needed by 2021. Developing a local cybersecurity workforce is crucial to reducing the effects of cybercrime.

To that end, UArizona runs a Center of Academic Excellence in Cyber Operations designated by the National Security Agency. That makes the university one of only 20 cyber programs in the nation that meet demanding academic and technical standards.

The program operates out of the university’s College of Applied Science and Technology, formerly UA South, headquartered in Sierra Vista. It offers a bachelor of applied science and an undergraduate certificate in cyberoperations, as well as an undergraduate certificate in cybersecurity.

Pima Community College is readying a program to offer an associate’s degree in cybersecurity. Currently under review by the Higher Learning Commission, Pima’s accreditation agency, the degree program will cover the use of cyber tools and event analysis to reduce threats. Graduates will be able to respond to crises and resolve incidents.

The Tucson Metro Chamber plans to focus on cybersecurity workforce development this year. “We want to know how we can try to assist companies,” says Michael Guymon, the chamber’s vice president. “Our focus is more on the workforce development side and we will talk about those issues.”

He reveals that the chamber wants to work closely with the Greater Phoenix Chamber, which has a Cybersecurity Workforce Collaborative to find employees for Phoenixarea companies. A partnership would extend those efforts into Tucson.

“We may go beyond workforce development issues because we know how much of a challenge cybercrime can be on companies,” Guymon adds.

Professor Hariri is heading a UArizona research team that is collaborating with Howard University, the Navajo Technical University and the Argonne National Laboratory on a twoprong approach against cybercrime.

Armed with a $5 million grant from the National Nuclear Security Administration, the partnership is training students from minority groups that are underrepresented in the cybersecurity industry, as well as women.

The grant additionally funds research in ways for machines to automatically detect cybercrime activities and take defensive measures to counteract the threat. Think of it as the cybersecurity plan working in real time without human involvement.

Artificial intelligence and machine learning could create systems software that detects and blocks an attack within the microseconds it takes for a hacker to gain access to a system. Such machine learning also could make systems adapt as cybercrooks tweak their attack methods.

UArizona’s Wireless Network and Cyber Security Research Lab is exploring how to incorporate cybersecurity in the early design of products (everything from refrigerators to baby monitors) that are connected to the internet, known as the internet of things (IoT). This effort would reduce the need to patch security holes that are inherent in new products.

Hariri likens the scope of cybersecurity to protecting a home, which might have a few doors and windows that criminals could try to break through in order to gain access. Today, a variety of networks — clouds and wireless systems among them — connect computers, phones, home appliances, cars, medical devices and business equipment. These represent many doors and windows that criminals can try to breach.

“The digital world has two billion websites, 2.5 to 3 billion users and 40 to 50 billion internet of things,” Hariri says. “Any one of them is vulnerable. That’s why it’s challenging.”

He would like to see a future where cybercrime reaches a manageable level. Just like stores tolerate a certain amount of shoplifting or product damage, businesses could find a point where they can accept a certain level of loss from attacks.

That vision would require continued research and development to build strategies that frustrate more criminals and create systems where recovery is less traumatic.

“We just need to figure out how we can identify the problems and come up with solutions,” remarks Hariri. “Eventually the next paradigm is cybercrime tolerance.”

It may be the best that commerce and consumers can hope for in exchange for the convenience of using the internet.

Hariri observes that a criminal doesn’t need to walk into a bank with a gun to rob it anymore. “All it takes is a guy on a computer somewhere in China or Russia to move millions of dollars from banks or personal accounts.”


Online Resources

To file a complaint with the FBI and for cybersecurity tips and alerts: www.ic3.gov

To request speaker from the FBI: www.fbi.gov/phoenix, select “Community Outreach,” then “Speaker Request.”

For information on FBI-private sector partnerships: azinfragard.org

To file a scam alert with the Better Business Bureau: www.bbb.org/us/az/tucson and select “ScamTracker.”

For information on the Better Business Bureau’s cybersecurity initiative: www.bbb. org/council/for-businesses/cybersecurity

For information on the Cyber Warfare Range: www.azcwr.org or 206-7777.

Live help

About Us

Tucson Lifestyle

Tucson Lifestyle Magazine is Tucson's only glossy, monthly city magazine, targeting Southern Arizona’s affluent residents. With over 35 years of publishing experience, Tucson Lifestyle is committed to showcasing the people, places, local flavors, and attractions that make our city unique.

Copyright © 2020 - tucsonlifestyle.com
Website by CS Design Studios

Contact

Phone: 520-721-2929
Address: 7000 E Tanque Verde Rd # 11,
Tucson, AZ 85715

* indicates required