Wednesday, September 30, 2015

Fight the Power: Day 273

Fight the Power: Day 273

Day 273






Deep State America

Democracy is often subverted by special interests operating behind the scenes.

by Philip Giraldi

As originally posted: The American Conservative
July 30, 2015


It has frequently been alleged that the modern Turkish Republic operates on two levels. It has a parliamentary democracy complete with a constitution and regular elections, but there also exists a secret government that has been referred to as the "deep state," in Turkish "Derin Devlet."

The concept of "deep state" has recently become fashionable to a certain extent, particularly to explain the persistence of traditional political alignments when confronted by the recent revolutions in parts of the Middle East and Eastern Europe. For those who believe in the existence of the deep state, there are a number of institutional as well as extralegal relationships that might suggest its presence.

Some believe that this deep state arose out of a secret NATO operation called "Gladio," which created an infrastructure for so-called "stay behind operations" if Western Europe were to be overrun by the Soviet Union and its allies. There is a certain logic to that assumption, as a deep state has to be organized around a center of official and publicly accepted power, which means it normally includes senior officials of the police and intelligence services as well as the military. For the police and intelligence agencies, the propensity to operate in secret is a sine qua non for the deep state, as it provides cover for the maintenance of relationships that under other circumstances would be considered suspect or even illegal.

In Turkey, the notion that there has to be an outside force restraining dissent from political norms was, until recently, even given a legal fig leaf through the Constitution of 1982, which granted to the military's National Security Council authority to intervene in developing political situations to "protect" the state. There have, in fact, been four military coups in Turkey. But deep state goes far beyond those overt interventions. It has been claimed that deep state activities in Turkey are frequently conducted through connivance with politicians who provide cover for the activity, with corporate interests and with criminal groups who can operate across borders and help in the mundane tasks of political corruption, including drug trafficking and money laundering.

A number of senior Turkish politicians have spoken openly of the existence of the deep state. Prime Minister Bulent Ecevit tried to learn more about the organization and, for his pains, endured an assassination attempt in 1977. Tansu Ciller eulogized "those who died for the state and those who killed for the state," referring to the assassinations of communists and Kurds. There have been several significant exposures of Turkish deep state activities, most notably an automobile accident in 1996 in Susurluk that killed the Deputy Chief of the Istanbul Police and the leader of the Grey Wolves extreme right wing nationalist group. A member of parliament was also in the car and a fake passport was discovered, tying together a criminal group that had operated death squads with a senior security official and an elected member of the legislature. A subsequent investigation determined that the police had been using the criminals to support their operations against leftist groups and other dissidents. Deep state operatives have also been linked to assassinations of a judge, Kurds, leftists, potential state witnesses, and an Armenian journalist. They have also bombed a Kurdish bookstore and the offices of a leading newspaper.

As all governments—sometimes for good reasons—engage in concealment of their more questionable activities, or even resort to out and out deception, one must ask how the deep state differs. While an elected government might sometimes engage in activity that is legally questionable, there is normally some plausible pretext employed to cover up or explain the act.

But for players in the deep state, there is no accountability and no legal limit. Everything is based on self-interest, justified through an assertion of patriotism and the national interest. In Turkey, there is a belief amongst senior officials who consider themselves to be parts of the status in statu that they are guardians of the constitution and the true interests of the nation. In their own minds, they are thereby not bound by the normal rules. Engagement in criminal activity is fine as long as it is done to protect the Turkish people and to covertly address errors made by the citizenry, which can easily be led astray by political fads and charismatic leaders. When things go too far in a certain direction, the deep state steps in to correct course.

And deep state players are to be rewarded for their patriotism. They benefit materially from the criminal activity that they engage in, including protecting Turkey's role as a conduit for drugs heading to Europe from Central Asia, but more recently involving the movement of weapons and people to and from Syria. This has meant collaborating with groups like ISIS, enabling militants to ignore borders and sell their stolen archeological artifacts while also negotiating deals for the oil from the fields in the areas that they occupy. All the transactions include a large cut for the deep state.

If all this sounds familiar to an American reader, it should, and given some local idiosyncrasies, it invites the question whether the United States of America has its own deep state.

First of all, one should note that for the deep state to be effective, it must be intimately associated with the development or pre-existence of a national security state. There must also be a perception that the nation is in peril, justifying extraordinary measures undertaken by brave patriots to preserve life and property of the citizenry. Those measures are generically conservative in nature, intended to protect the status quo with the implication that change is dangerous.

Those requirements certainly prevail in post 9/11 America, and also feed the other essential component of the deep state: that the intervening should work secretly or at least under the radar. Consider for a moment how Washington operates. There is gridlock in Congress and the legislature opposes nearly everything that the White House supports. Nevertheless, certain things happen seemingly without any discussion: Banks are bailed out and corporate interests are protected by law. Huge multi-year defense contracts are approved. Citizens are assassinated by drones, the public is routinely surveilled, people are imprisoned without be charged, military action against "rogue" regimes is authorized, and whistleblowers are punished with prison. The war crimes committed by U.S. troops and contractors on far-flung battlefields, as well as torture and rendition, are rarely investigated and punishment of any kind is rare. America, the warlike predatory capitalist, might be considered a virtual definition of deep state.

One critic describes deep state as driven by the "Washington Consensus," a subset of the "American exceptionalism" meme. It is plausible to consider it a post-World War II creation, the end result of the "military industrial complex" that Dwight Eisenhower warned about, but some believe its infrastructure was actually put in place through the passage of the Federal Reserve Act prior to the First World War. Several years after signing the bill, Woodrow Wilson reportedly lamented, "We have come to be one of the worst ruled, one of the most completely controlled and dominated governments in the civilized world, no longer a government by conviction and the vote of the majority, but a government by the opinion and duress of a small group of dominant men."





In truth America's deep state is, not unlike Turkey's, a hybrid creature that operates along a New York to Washington axis. Where the Turks engage in criminal activity to fund themselves, the Washington elite instead turns to banksters, lobbyists, and defense contractors, operating much more in the open and, ostensibly, legally. U.S.-style deep state includes all the obvious parties, both public and private, who benefit from the status quo: including key players in the police and intelligence agencies, the military, the treasury and justice departments, and the judiciary. It is structured to materially reward those who play along with the charade, and the glue to accomplish that ultimately comes from Wall Street. "Financial services" might well be considered the epicenter of the entire process. Even though government is needed to implement desired policies, the banksters comprise the truly essential element, capable of providing genuine rewards for compliance. As corporate interests increasingly own the media, little dissent comes from the Fourth Estate as the process plays out, while many of the proliferating Washington think tanks that provide deep state "intellectual" credibility are similarly funded by defense contractors.

The cross fertilization that is essential to making the system work takes place through the famous revolving door whereby senior government officials enter the private sector at a high level. In some cases the door revolves a number of times, with officials leaving government before returning to an even more elevated position. Along the way, those select individuals are protected, promoted, and groomed for bigger things. And bigger things do occur that justify the considerable costs, to include bank bailouts, tax breaks, and resistance to legislation that would regulate Wall Street, political donors, and lobbyists. The senior government officials, ex-generals, and high level intelligence operatives who participate find themselves with multi-million dollar homes in which to spend their retirement years, cushioned by a tidy pile of investments.





America's deep state is completely corrupt: it exists to sell out the public interest, and includes both major political parties as well as government officials. Politicians like the Clintons who leave the White House "broke" and accumulate $100 million in a few years exemplify how it rewards. A bloated Pentagon churns out hundreds of unneeded flag officers who receive munificent pensions and benefits for the rest of their lives. And no one is punished, ever. Disgraced former general and CIA Director David Petraeus is now a partner at the KKR private equity firm, even though he knows nothing about financial services. More recently, former Acting CIA Director Michael Morell has become a Senior Counselor at Beacon Global Strategies. Both are being rewarded for their loyalty to the system and for providing current access to their replacements in government.

What makes the deep state so successful? It wins no matter who is in power, by creating bipartisan-supported money pits within the system. Monetizing the completely unnecessary and hideously expensive global war on terror benefits the senior government officials, beltway industries, and financial services that feed off it. Because it is essential to keep the money flowing, the deep state persists in promoting policies that make no sense, to include the unwinnable wars currently enjoying marquee status in Iraq/Syria and Afghanistan. The deep state knows that a fearful public will buy its product and does not even have to make much of an effort to sell it.

Of course I know that the United States of America is not Turkey. But there are lessons to be learned from its example of how a democracy can be subverted by particular interests hiding behind the mask of patriotism. Ordinary Americans frequently ask why politicians and government officials appear to be so obtuse, rarely recognizing what is actually occurring in the country. That is partly due to the fact that the political class lives in a bubble of its own creation, but it might also be because many of America's leaders actually accept that there is an unelected, unappointed, and unaccountable presence within the system that actually manages what is taking place behind the scenes. That would be the American deep state.

Philip Giraldi, a former CIA officer, is executive director of the Council for the National Interest.


DailyDDoSe 

Reality Bytes by @ELyssaD™: Part II: Duplication of Benefits: Medicaid to the Rescue

Reality Bytes by @ELyssaD™: Part II: Duplication of Benefits: Medicaid to the Rescue
Part II: Duplication of Benefits: Medicaid to the Rescue

The Application and Appeal for Disability Benefits

I remember how difficult it was for me to obtain benefits when I first applied several years ago. I am deeply concerned about how the most recent decision to eradicate yet another class of TennCare / Medicaid recipients (the Daniels class made up of SSI recipients by way of a pending federal waiver) will affect the poor and disabled residents in Tennessee. Without my current level of benefits, I simply do not function.

Before my benefits were stabilized, learning to navigate the system consumed every waking moment of my life. I was unable to work or attend school on any substantial level and I am frightened to see at might happen if I were to stray from my established, stabilized, treatment plan. If I lose my benefits, will I still be able to work? To function? To be productive?

Any new public program requires careful planning if it is to be effective. Recent discussions have not focused on the true impact these changes will have on the "street-level."

Has anyone asked recipients how they feel the new program (safety- net) should be designed, implemented, or evaluated? How will this impact the community and other social service or welfare agencies??? I want access, quality, and outcomes. I want... I want... I want!!!

The massive number of people being disenrolled or limited in their access to medical care and other social services will no doubt create significant anxiety, confusion, and chaos for everyone involved in the social service and health care industries.

I remember when Mr. Brian Lapps was somewhere very high up on the corporate TennCare ladder in 1999 when they adjusted the prescription formulary over Memorial Day in 1999. I see Mr. Lapps quite frequently since he now works at the local gas station down the street from where I live.

To this day, he insists that cell phones and TennCare are somehow contraindicated. Perhaps he knows nothing of the population he claims to know just all-too-well... housing conditions that may or may not have electricity, broken families-some riddled with community violence and domestic disturbances. In the hood, your cell phone is your very best friend. 9-1-1.

These people plagued by domestic violence and community instability makes a cell phone the only logical option. How can you find a job with out a phone? How can you find a home with out a job? Yet even 6 years later, Mr. Lapps uses cellular phones as an example how the TennCare program is being abused by lazy, cheap, and unscrupulous second hand citizens who are just shiftless lazy bums waiting around for their next free hand-out.

Anyone who has EVER applied for or relied upon any kind of government subsidy to have their basic needs met, e.g., food, shelter, medical care, dental treatment, etc... Let me personally assure you that there has never been a single time where I felt I was "pulling one over" on the government. I am not just one of the poor saps who believed what they told me they in school, I bought it hook, line, and sinker for the mere price of $152,718.130 and not a shred of financial security to show for it.

Even after consolidating my student loans, the interest alone is $10 less than my monthly income from social security.

Tennessee is in the process of applying for yet ANOTHER federal waiver to eliminate the "Daniels" class of Medicaid recipients—the poorest and sickest of all. Social Security Recipients. Can you live on $623.00 / month? Can anyone?

So what happens now that the state of Tennessee will begin to cut off social security recipients from TennCare? I honestly do not think I can survive yet another re-certification process—God knows the first one almost killed me. After three years of appeals, my condition had deteriorated so severely that I was forced to drop out of school, lost my home, lost my sanity, and lost hope. In short—I lost my dignity and my belief in the social welfare system.

By the time my benefits were approved, I had already checked myself in to NYU Psych Ward because simply could not cope with the reality of what my life I had become. I weighed 94 pounds and suffered in excruciating pain that has only gotten worse with time. My extremities were ice cold, and my hands were numb since I went without medical treatment for the spinal injury that was first discovered when I was 22.

I am now 36 years old. My spinal cord is now damaged from years of delayed, sub-standard medical treatment. I owe the federal government $152,000 in student loans and when I am able to work, I make $10.46 / hour as a substitute teacher in an urban school district. That job comes with no security and no benefits. It does however offer the flexibility I need to receive the bi-monthly epidural injections and other procedures necessary to manage my pain and alleviate the numbness I feel because of the damage to my nerves. And even though I cannot afford the gas money to get my appointments, pay for all of my medication, or even to get back and forth to work, it does allow me a few weeks of mobility so I can drive, use my mouse or hold a pen.

I have an advanced master's degree from an Ivy League Institution. I am eight credits shy of completing PhD in public policy. And despite maintaining a 3.83 grade point average while completing an advanced masters in social and educational policy at an, "Ivy League" institution; a 3.2 GPA during the 3 years I spent working on my doctorate at a not-quite-so-prestigious Graduate School; The Powers That Beat in that damn Ivory Tower don't will not grant me any leniency by extending the amount or time permitted to complete my degree—a rule that was changed while I was on a formal leave of absence tending to my health (and my Medicaid appeals!). 

Not only did they decide 8 years was the rule instead of the 10 it had been previously, I was also told that I could not even transfer the credits I had earned toward a different degree towards another program at the same institution. It has been just over ten years since I first enrolled. What a mistake that was!

The "Harvard of the South" no longer officers the degree to which I was admitted—and enrolled so they actually suggested that I pay for a 3rd application to the school (I was admitted into two degrees—the MPP as well as the PhD program in a separate college) requiring two independent applications, fees, official transcripts, graduate test scores, even way back when I was still considered a promising candidate. Now "they" think it is reasonable to ask that I do it all over again??? It goes without saying that I do not have the financial resources available to finish my last semester, take the GREs or GMATs one more time, or even the money to release my transcripts from the Graduate School into any other program at the same University, I guess I am just shit out of luck.

To be clear, WE ARE ALL PAYING for that student debt because I can assure you that their endowment is far greater than any income or earning potential I have given my current financial status and student loan debt! To be clear, YOU ARE ALL PAYING to keep me on Welfare. Yes, all of us are paying some price... I want to work. I want to be productive. I want to be a part of something greater than myself. I want to share what I have learned.

So throughout the years I struggled to stay in school, believing somehow that social justice would prevail, and my heart and dedication towards the greater good would show through to whomever, wherever, or whatever that could make my degree worth while—the Medicaid and disability applications managed to take front seat. So as I filed appeal after appeal after appeal, I managed to acquire well over ¼ million (yes—MILLION) dollars in debt due to uninsured medical expenses and student loans. 

Despite having three Major Medical insurance policies, I still went bankrupt applying for Medicaid. Morally Bankrupt.

My life will never be the same. My heart will never be the same. I want to pay my bills on time. I want to get off welfare, but no one ever taught me how to be poor.

So after all this—now I face losing my healthcare once again. Where is the safety net? Where is the American Dream that I so diligently chased after for so many years? What was the point spending so much on an education that will never be utilized? I understand the how; I just don't understand why.

Maybe one of these days Vanderbilt University or and the Department of Education will realize it might just be cheaper to hire me that harass me, because unless I find a real paying job soon, their collections department will no longer be able to reach me on that extravagant lifeline my friend, Brian Lapps, refers to as a luxury.

If anyone on your staff would like to "trade places" with me for one month-I will gladly assume his/her responsibilities for that position if you can find a writer who is willing to endure and write about the reality of social services in our fine state. I do not want a paycheck from your organization; I just want the opportunity to put the myth of freeloading welfare mother s to rest. Live in my shoes for 30 days. Can you find the out? Can you balance my budget and make it work? Can you get the bill collectors of my back? Can you afford Internet service to file state job applications and apply for services online? Can you maintain pride and dignity without feeling the least bit sorry for yourself and the choices you have made?

When I go to the pharmacy, I am humiliated that I do not have the $3.00 necessary for the co-pay on my covered TennCare prescriptions. At least when it was $40 dollars, I was not so damn embarrassed by my lack of funds.

Remind me again why I went to school. Remind me once more, why I bother to speak out. Then remind me right now that that there is somebody listening. I cannot be the only one who actually gives a crap. My contact information is listed below.


Elyssa D. Durant © 2007-2015

What Makes Me Feel Beautiful

Reality Bytes by @ELyssaD™: What Makes Me Feel Beautiful

What Makes Me Feel Beautiful
Elyssa D. Durant © 1995

I was in danger of falling in love with being in love.

This love is the shallow conditional "love" I grew up with as a child. The kind of love that I came to believe was for other children. Children less difficult or better behaved than I could ever be. The kind of love that used to scare me because it was so unfamiliar.

It existed only in titles and words; is dependent upon an ideal that can never be met.

The additional danger in that for me, is that even the ideal ideal is so incredibly foreign, that I can not seem to grasp.

I needed a self worth in and of its self so that I can go into a relationship knowing that I bring as much if not more than I can take. In my loneliness, the thing I "need" and feel tempted to take, is time.

This is the time where I can find myself lost in my words, or in their absence. I find myself needing something, anything, from anyone capable of diverting my attention from the realities I would rather not see.

In my work, I can forget about everything else. I can feel strong, and I can feel whole, I can feel beautiful, and I can feel love.

You once asked me what makes me feel beautiful.

I don't know what the "right" answer was to that question, though I remember the clear
distinction of the physical, external beauty we see in magazines and soap operas, as opposed to the inner-beauty we hear of on Oprah. I told you that I feel most beautiful in the Theatre class I TA'd for last spring.

We discussed the association between beauty, knowledge, and power. And although I am unsure if I could express the sentiments at the time, I can now clearly see that sitting in front of that Theatre, I didn't need to rely on the external.

"This is what a grad student looks like" Our first acquaintance at lunch during the summer of 94. you commented how the boys would eat me up at law school. Isn't that the point.

I do not wish to compromise your peace in any way. Whether you realize this or not, 1 write these words mostly for myself, as they clearly reflect my self I have tried not to define myself through and by my relationships with others, since 1 believe that reality and identity is something that comes from within. Perhaps that is why I am so intrigued by the social context of evaluation, since it is in perpetual conflict with the belief in subjective reality.

So to learn of your incredible distaste for me, which from my understanding is quite strong, is the exact same reasons you were drawn to me in the fist place.
in the relationship we may have had at one point, and your subjective interpretation of events.

Though I need no clarification, I will not pretend as though there is no motive beneath this contact. So in the world of business where there ain't no such thing as a free lunch, you have something I need, I am willing to pay for your time, but not your love.

[note pgs 3-300 may show up someday... or maybe not]


Third Circuit Finds FTC Has Authority to Sue for Inadequate CyberSecurity

Third Circuit Finds that the FTC Has Authority to Sue Companies for Inadequate Cybersecurity Practices as an "Unfair" Practice
by Janet M. Johnson, natlawreview.com
September 6


In addition to multi-party or class action lawsuits,1 companies that have their computer networks hacked may also be subject to investigations and enforcement actions by the Federal Trade Commission ("FTC"). This week the Third Circuit Court of Appeals decided in Federal Trade Commission v. Wyndham Worldwide Corp. that the FTC has authority to regulate the way companies safeguard personal information not simply for "deceptive" acts, but as an "unfair" business practice. This decision highlights the need for companies to familiarize themselves with the FTC's guidance on cybersecurity measures.

In Wyndham, the FTC sued the international hotel chain after Wyndham's computer network was hacked on three different occasions in 2008 and 2009. Wyndham's customer privacy policy stated that, among other things, Wyndham safeguarded its customers' personal information "by using industry standards" and being "consistent with all applicable laws and regulations." Nevertheless, the personal information for hundreds of thousands of customers was stolen, including payment card information allegedly exported to a domain registered in Russia and used to incur over $10 million in fraudulent charges. The FTC filed suit in U.S. District Court claiming that Wyndham engaged in "unfair" and "deceptive" practices in violation of 15 U.S.C. § 45(a). Wyndham filed a motion to dismiss both the unfair and deceptive practice claims. The motion was denied, but the trial court certified its decision on the unfair practices claim for interlocutory appeal.

Under Section 5 of the Federal Trade Commission Act (the "Act"), the FTC has authority to act against companies that have engaged in "unfair or deceptive acts or practices in or affecting commerce." The Act codifies an unfair act as one that, "causes or is likely to cause substantial injury to consumers which is not reasonably avoidable by consumers themselves and not outweighed by countervailing benefits to consumers or to competition." 15 U.S.C. § 45(n).

On appeal, Wyndham made several arguments, including: (1) an "unfair" practice required a finding that such practice was inequitable or characterized by injustice, partiality, or deception; (2) the FTC's authority in the cybersecurity context was limited by "less-extensive" legislation such as the Children's Online Privacy Protection Act, the Gramm-Leach-Bliley Act, and the Fair Credit Reporting Act; (3) as a victim of its computer network being hacked, its practices could not be deemed "unfair"; and (4) that Wyndham did not have fair notice of the specific cybersecurity standards that the FTC expected it to follow.

In affirming the trial court's decision that the FTC has authority to regulate companies' cybersecurity practices, the Third Circuit rejected Wyndham's arguments and held: that (1) the "unfair" prong of 45(a) does not require any deceptive acts or inequitable conduct; (2) cybersecurity practices could fall into the category of "unfair acts," (3) there was no supporting authority for the notion that just because Wyndham was also a victim of cyber-attacks Wyndham could not be liable to the FTC, and (4) since it was foreseeable that Wyndham's customers could be harmed by its failure to implement reasonable and appropriate cybersecurity practices, Wyndham was on notice that the FTC could bring an enforcement action.

Given the FTC's authority to regulate cybersecurity practices, companies should strive to understand the FTC's expectations as a regulator. The FTC's website publishes complaints, settlements, and guidelines that are helpful. In particular, last month the FTC published "Start With Security, a Guide for Business,"2 which distills facts from more than 50 enforcement actions into ten lessons "that touch on vulnerabilities that could affect your company, along with practical guidance on how to reduce the risks they pose." Included in these guidelines are practices the FTC asserts are not reasonable and appropriate, with specific reference to the companies the FTC took action against for such practices.

Notably, it was Wyndham's alleged failure to implement reasonable and appropriate standards that contributed to the FTC's decision to file suit. The FTC alleges Wyndham didn't use a firewall, didn't change default passwords, didn't encrypt credit card information, didn't monitor its network for its customers' personal information, and did not limit third-party access to the company's networks and computers. Although not raised on appeal, the FTC asserted a deceptive practices claim against Wyndham in the trial court proceeding based on Wyndham's failure to comply with its own privacy policy. As a result of the Third Circuit's decision the trial court will move forward to consider the merits of all of the FTC's claims against Wyndham.

One consumer advocacy group estimates that cyber-attacks caused more than $500 million in damages in 2014 alone. While federal legislation is still being developed, and a patchwork of legislation relating to data breaches still evolves,3 companies should be mindful of the FTC's authority to regulate cybersecurity practices, implement reasonable and appropriate industry standards, and familiarize themselves with the FTC's guidelines.


Elyssa D. Durant, Ed.M.
DailyDDoSe © 2007-2015

GCHQ and police team up to hunt down child abusers on the darknet | Naked Security

GCHQ and police team up to hunt down child abusers on the darknet | Naked Security

GCHQ and police team up to hunt down child abusers on the darknet

Image of laptop courtesy of ShutterstockUK intelligence experts and organised crime specialists are joining forces to root out child abuse images hidden on the "dark net", Prime Minister David Cameron said on Thursday.

Speaking at a summit in London, Cameron announced a new, as yet unnamed, joint unit that will pair the National Crime Agency (NCA) with GCHQ specialists to tackle the most prolific offenders to be found in the internet's shadowy corners:

those who use increasingly sophisticated techniques to disguise their identities and encrypt the horrific images of children that they are sharing with peers.

The new unit will combine the NCA's investigative techniques with GCHQ's technical expertise to develop new capabilities to handle the challenges of analysing the vast volumes of child abuse images hidden on the "dark web".

There are terms that are used somewhat interchangeably to describe the underbelly of the internet, including the dark internet, where computers are found that can no longer be reached via the internet.

The Deep Web strata of the internet contains subsurface web content that's not indexed by standard search engines. The Darknet is a distributed filesharing network that makes up a smaller part of the Deep Web.

It's considered a haven for thieves, child abuse imagery offenders, human traffickers, forgers, assassins and peddlers of state secrets and loose nukes.

The government said in a release that they became aware of one such prolific child abuse imagery offender who was using his tech smarts to run chat services and websites in the Far East and Eastern Europe, to share child abuse material across the world.

He also served as a mentor, offering advice to other paedophiles about how to hide their behaviour online.

The government said that he was using software and a nickname to disguise his real identity.

Whatever that software was, GCHQ and NCA analysis managed to peel it apart to get at the offender's identity. He was sentenced to three years in prison after being charged with making and distributing indecent images of children.

David Cameron gave another example: a gang in the Philippines that was arranging the sexual abuse of children, filming it, and then live streaming it to paying customers across the world.

He said police found out about the gang when a British police officer examined a sex offender's computer and found indecent images, the BBC reports.

The police's discovery led to an investigation that resulted in 29 arrests and the rescue of 15 children, some as young as six, from their "living nightmare", Cameron said.

Speaking at the two-day We Protect Children Online summit, Cameron also announced a new UK law making it illegal for an adult to send a sexual communication to a child.

As it is, abusers have used Facebook, texting and other digital means to groom vulnerable children.

Online, paedophiles flatter their targets, lie about their ages and/or identities, pretend to be young and/or wealthy and/or celebrities, gain children's trust, and then abuse them by cajoling them into taking lewd photos of themselves, creating Skype accounts and then talking them into stripping, sextorting them by threatening to tell parents or share images publicly, or even meeting the predators in real life, where they've been raped.

According to the BBC, the new law against sexual communication sent to a child would apply in England and Wales and is expected to be included in the Serious Crime Bill currently going through Parliament.

Cameron said that the possession of material offering guidance on abusing children - what he called "paedophile training manuals" - is also going to be made illegal.

The summit brought together representatives from more than 50 countries, 26 leading technology companies and 10 non-governmental organisations.

The delegates signed up to a range of actions and unveiled technological initiatives to deal with the problem of how to make it much more difficult for criminals to exploit digital means to abuse children for sexual purposes.

The Prime Minister's call to action over child abuse image proliferation last year has already resulted in technology companies stepping up to the plate.

Google and Microsoft have introduced a number of changes to their search functions, including tweaking algorithms to prevent images and videos of child abuse material from appearing in search results.

Microsoft is increasing the size of its search term blacklist, while Google's algorithm has now rolled out around the world, in all 40 languages supported by Google search, and automatically checks against millions of search terms.

The UK government said in its release that Google has seen a fivefold reduction in the number of searches for child abuse images since these changes were made.

Building on those efforts, these new technological approaches were announced at the summit:

    • The digital fingerprints (hash values) of thousands of known child sex abuse images identified by the Internet Watch Foundation (IWF) will be used by the major tech companies (Facebook, Microsoft, Google, Twitter and Yahoo) to prevent these images being shared on their services, so they can no longer be viewed.
    • Google has developed hashing technology that allows known child abuse videos to be identified and blocked from being shared. The company plans to share it with the wider industry. Yahoo will be the first industry partner to pilot it.
    • Microsoft, Google and Mozilla have committed to investigate the feasibility of implementing browser-level blocking restrictions designed to prevent people getting access to URLs of known child abuse material via internet Explorer, Chrome and Firefox.

Microsoft, Google and Mozilla are "working together to look at" having "built-in restrictions to block access" to child abuse material: something that Cameron said would be a "game changer".

Google said its "aggressive" removal of child abuse images via algorithm changes and other means have translated into a five-fold reduction in the number of child sexual abuse image-related queries in search over the past 12 months.

Other measures announced by Cameron:

  • An extra £10 million ($15.7 million) next year to create further specialist online child sexual abuse teams within the NCA, focusing on the worst offenders.
  • The establishment of a single secure database of indecent images of children - the Child Abuse Image Database (CAID) - which will help UK law enforcement improve and speed up investigations.
  • A £50 million ($78.6 million) pledge over five years contributing to a newly established global child protection fund, being administered by UNICEF.

Cameron called the package a "watershed moment in reducing the volume of child abuse images online" - one that "marks significant progress in delivering a truly world-leading response to a global problem."

The so-called "dark-net" is increasingly used by paedophiles to view sickening images. I want them to hear loud and clear, we are shining a light on the web's darkest corners; if you are thinking of offending, there will be nowhere for you to hide.

But shadow home secretary Yvette Cooper noted that there were still "very serious gaps" in the government's plans because "thousands of cases of abuse are not being followed up by the police".

The BBC quotes her:

We know the National Crime Agency has details of over 20,000 suspected of accessing images of child abuse under Operation Notarise, and yet they have only investigated a tiny proportion of these - and arrested fewer than 1,000.

Hopefully, putting more money, more technology, and more investigatory power into pursuing, investigating and then bringing to justice offenders, will result in all abuse cases being followed up on by police, and as many abusers being taken offline and off the streets as possible - the sooner, the better.

Image of laptop courtesy of Shutterstock.



DailyDDoSe 

Protect Yourself from Identity Theft | Columbia University Information Technology

Protect Yourself from Identity Theft | Columbia University Information Technology

Protect Yourself from Identity Theft | Columbia University Information Technology

Protect Yourself from Identity Theft

Based on material furnished by EDUCAUSE.


Introduction

This site contains information on how to protect yourself from identity theft as well as what to do to if your personal information becomes exposed or if you actually become a victim of identity theft. Links to additional information can be found under the Resources.

What is Identify Theft?

Identity theft occurs when someone uses another person's personal information such as name, Social Security number, driver's license number, credit card number or other identifying information to take on that person's identity in order to commit fraud or other crimes.



How to Protect Yourself from Identity Theft

The following tips can help lower your risk of becoming a victim of identity theft.
  1. Protect your Social Security number. Don't carry your Social Security card or other cards that show your SSN. Read, "Your Social Security Number: Controlling the Key to Identity Theft" (http://www.socialsecurity.gov/pubs/10064.html)
  2. Use caution when giving out your personal information. Scam artists "phish" for victims by pretending to be banks, stores or government agencies. They do this over the phone, in e-mails and in postal mail.
  3. Treat your trash carefully. Shred or destroy papers containing your personal information including credit card offers and "convenience checks" that you don't use.
  4. Secure your wallet or purse at all times.
  5. Do not share passwords with friends or family.
  6. Protect your postal mail. Retrieve mail promptly. Discontinue delivery while out of town.
  7. Check your bills and bank statements. Open your credit card bills and bank statements right away. Check carefully for any unauthorized charges or withdrawals and report them immediately. Call if bills don't arrive on time. It may mean that someone has changed contact information to hide fraudulent charges.
  8. Check your credit reports. Review your credit report at least once a year. Check for changed addresses and fraudulent charges.
  9. Stop pre-approved credit offers. Pre-approved credit card offers are a target for identity thieves who steal your mail. Have your name removed from credit bureau marketing lists. Call toll-free 888-5OPTOUT (888-567-8688).
  10. Ask questions. Ask questions whenever you are asked for personal information that seems inappropriate for the transaction. Ask how the information will be used and if it will be shared. Ask how it will be protected. If you're not satisfied with the answers, don't give your personal information.
  11. Protect your computer. Protect personal information on your computer by following good security practices.
    • Use strong, non-easily guessed passwords.
    • Use firewall, anti-virus, and anti-spyware software that you update regularly.
    • Download software only from sites you know and trust and only after reading all the terms and conditions.
    • Don't click on links in pop-up windows or in spam e-mail.
  12. Use caution on the Web. When shopping online, check out a Web site before entering your credit card number or other personal information. Read the privacy policy and take opportunities to opt out of information sharing. Only enter personal information on secure Web pages that encrypt your data in transit. You can often tell if a page is secure if "https" is in URL or if there is a padlock icon on the browser window.


Steps to Take if Your Data Becomes Compromised or Stolen

When you become aware of an identity breach, it's important to immediately close any accounts that were opened in your name as soon as possible. Also, check on your legitimate accounts to make sure that details like mailing addresses have not been changed by someone else.

Credit Reporting Agencies

If you have reason to believe your personal information has been compromised or stolen, contact the Fraud Department of one of the three major credit bureaus listed below.
When contacting the Credit Reporting Agency, you should request the following:
  1. Instruct them to flag your file with a fraud alert including a statement that creditors should get your permission before opening any new accounts in your name.
  2. Ask them for copies of your credit report(s). (Credit bureaus must give you a free copy of your report if it is inaccurate because of suspected fraud.) Review your reports carefully to make sure no additional fraudulent accounts have been opened in your name or unauthorized changes made to your existing accounts.
    NOTE: In order to ensure that you are issued free credit reports, we strongly encourage you to contact the agencies DIRECT LINE (listed above) for reporting fraud. We do not recommend that you order your credit report online.
  3. Be diligent in following up on your accounts. In the months following an incident, order new copies of your reports to verify your corrections and changes, and to make sure no new fraudulent activity has occurred.
  4. If you find that any accounts have been tampered with or opened fraudulently, close them immediately. To ensure that you do not become responsible for any debts or charges, use the ID Theft Affidavit Form developed by the Federal Trade Commission to help make your case with creditors.
Social Security Administration
SSA Fraud Hotline: 800-269-0271
http://www.ssa.gov/

If you are the victim of a stolen Social Security number, the SSA can provide information on how to report the fraudulent use of your number and how to correct your earnings record. We encourage you to contact the Fraud Hotline immediately once you suspect identity theft.

The website also provides tips on using and securing your Social Security number. Visit the SSA website for advice on keeping your number safe.

ID Theft Clearinghouse
1-877-ID-THEFT (1-877-438-4338)

Call the ID Theft Clearinghouse toll free at to report identity theft. Counselors will take your complaint and advise you how to deal with the credit-related problems that could result from identity theft.

Local Law Enforcement

It is important that you report identity theft to your local police department as soon as you become aware that you are a victim. Get a copy of the police report which will assist you when notifying creditors, credit reporting agencies and if necessary, the Social Security Administration (SSA).



Resources

The following links provide detailed information related to identity theft and protecting yourself.

Identity Theft Resource Center
http://www.idtheftcenter.org/

Department of Justice
http://www.justice.gov/criminal/fraud/websites/idtheft.html

Federal Trade Commission
http://www.consumer.gov/idtheft/

Social Security Administration
http://www.socialsecurity.gov/pubs/10064.html

Privacy Rights Clearinghouse - Identity Theft Resources
http://www.privacyrights.org/identity.htm

Pennsylvania Commission on Crime and Delinquency - Identity Theft Action Plan
http://www.identitytheftactionplan.com

What to Do if Someone Has Already Filed Taxes Using Your Social Security Number
http://turbotax.intuit.com/tax-tools/tax-tips/General-Tax-Tips/Identity-Theft--What-to-Do-if-Someone-Has-Already-Filed-Taxes-Using-Your-Social-Security-Number/INF23035.html

List of Identification Theft Protection Service Providers
Columbia Univesity does not endorse or recommend any services listed at the page linked below. It is provided purely on an informational basis.
http://www.reviews.com/identity-theft-protection-services/


National Fraud Information Center Hotline: 800-876-7060

Identity Theft Resource Center: 858-693-7935
 



Reporting Security Problems

Send reports of security incidents, attacks, or questions to security@columbia.edu


DailyDDoSe 

Frequently asked questions about Apple ID - Apple Support

Frequently asked questions about Apple ID - Apple Support

Frequently asked questions about Apple ID

Get started

  • How do I get started with Apple ID?
  • How do I get an Apple ID?
  • How do I sign in?

Update your Apple ID

  • Can I update or change my Apple ID?
  • How do I verify my Apple ID email address?
  • How can I increase the security of my account?
  • Can I share my Apple ID with someone else?

Get help with your Apple ID

  • What if I can't sign in?
  • Why can't I change my Apple ID email address?
  • Can I merge multiple Apple IDs into one?
  • If I purchased music, apps, or books with multiple Apple IDs, how do I move my content onto my iOS device?
  • What if I can't access the email address that I used for my Apple ID?

How do I get started with Apple ID?

Your Apple ID is the personal account you use to access Apple services like the App Store, iTunes Store, iCloud, iMessage, the Apple Online Store, FaceTime, and more. Use the same Apple ID everywhere you sign in to make sure that all your Apple services and devices work together seamlessly and you can access your personal content from all your devices.

How do I get an Apple ID?

If you've used the iTunes Store, iCloud, or any Apple service, you might already have an Apple ID. If you don't remember it, use these steps to find your Apple ID

If you don't have an Apple ID, you can create one now

How do I sign in?

Any time you set up a new device or access an Apple service, you'll be asked to sign in with your Apple ID and password. After you sign in, you'll gain access to the service and all the personal information in your account. Services that use Apple ID include iCloud, iTunes, iBooks, the App Store, FaceTime, MessagesGame CenteriCloud.comand more

You can also use the steps below to sign in on your iPhone, iPad, iPod touch, or Mac. You can also sign in to iCloud for Windows, your Apple TV, and your Time Capsule or Airport Base Station. 

iPhone, iPad, or iPod touch

  • Tap Settings > iCloud
  • Tap Settings > iTunes & App Store
  • Tap Settings > Mail, Contacts, Calendars
  • Tap Settings > FaceTime
  • Tap Settings > Messages > Send & Receive

Use these steps to sign in with a different Apple ID on your iPhone, iPad, or iPod touch.

Mac

  • Select Apple menu > System Preferences > iCloud
  • Open iTunes, then select Store > Sign In
  • Open Mail, then select Mail > Preferences > Accounts
  • Open Calendar, then select Calendar > Preferences > Accounts
  • Open FaceTime, then select FaceTime > Preferences  > Settings
  • Open Messages, then select Messages > Preferences > Accounts

Can I update or change my Apple ID?

To manage your Apple ID, just sign in to My Apple ID at any time:

How do I verify my Apple ID email address?

When you create a new Apple ID or make certain changes to your account, we'll send you an email to help you complete the update. This helps protect your identity and ensures you can receive important account notifications from Apple, such as password reset emails. Several Apple services, such as iCloud, iTunes, iMessage, and FaceTime, require you to use a verified email address as your Apple ID.

To verify your email address, click the Verify Now link in the verification email. Sign in with your Apple ID and password, then click Verify Address. Use these steps if you didn't get the email. You might be asked to verify your email using a 6-digit code. 

How can I increase the security of my account?

Security and privacy are very important to Apple and we provide a number of ways to secure your Apple ID and protect your privacy. Here are some things you can do to make sure your account remains private and secure:

For more information or help, visit Apple Support.

Can I share my Apple ID with someone else?

You shouldn't share your Apple ID with anyone else. It provides access to personal information including contacts, photos, device backups, and more. Sharing your Apple ID with someone else means you're giving them access to all your personal content, and it may lead to confusion about who actually owns the account. 

To share photos, a calendar, iTunes purchases and more with someone else, try these sharing features

Can I get help with my Apple ID?

See if your question is listed below, or go to Apple ID support for more help.

What if I can't sign in?

If you can't sign in, check your Apple ID to make sure that you're signing in with the correct Apple ID. Then try the steps below:

If you're repeatedly asked to sign in to a service, sign out, then sign back in

Why can't I change my Apple ID email address?

You might not be able to change your email address for one of these reasons:

  • The email address you chose is already in use as an Apple ID. All email addresses that end in @icloud.com, @me.com, or @mac.com are already Apple IDs.
  • You're already using an @icloud.com, @me.com, or @mac.com email address as your Apple ID. In this case, the Apple ID can't be changed to another email address. 

Can I merge multiple Apple IDs into one?

Apple IDs can't be merged. We recommend that you use the same Apple ID in the iTunes Store and iCloud. Using multiple Apple IDs might be confusing and might cause issues with accessing purchased content or using some services. 

If you need more than one Apple ID, you can still access your purchased items (such as music, movies, or software) using your other Apple IDs. Learn how to use multiple Apple IDs with iTunes and iCloud.

If I purchased music, apps, or books with multiple Apple IDs, how do I move my content onto my iOS device?

First, make sure that all your content is on the same computer. This computer should be the one you sync your device with. Use these steps to copy content from your Mac or PC

Then authorize your computer to play content with each Apple ID in iTunes. After your computer is authorized for all of your content, you can sync it to your iPhone, iPad, or iPod touch.

What if I can't access the email address that I used for my Apple ID?

It's important to keep your Apple ID information up to date. If you no longer have access to the email address you currently use for your Apple ID, simply change it to your current, working email address. This will allow you to continue using your account and will ensure you can receive important account-related emails, reset your password, and more.

You can change your Apple ID to any other email address you control, as long as it's not already in use as an Apple ID.



DailyDDoSe 

No Security At All

The Powers That Beat: Security Through Obscurity Is No Security At All

Security Through Obscurity Is No Security At All

Do I Really Need to Worry About Security When I'm Using Public Wi-Fi?

by Alan Henry, lifehacker.com
April 30th 2012 10:00 AM

Dear Lifehacker,
I'm no idiot when it comes to security, and you guys have often mentioned how easily Wi-Fi networks can be cracked or how anyone can sniff out passwords and cookies. My question, though: How dangerous is it really when I'm sitting and checking my email at the coffee shop on the corner? I don't have anything that special or private in my email, and I'm usually only surfing the web. Do I really need to load up on VPNs and other tools when I'm all alone in the coffee shop or logged in at the library?

Sincerely, Slightly Paranoid

Dear Slightly Paranoid, You've brought up a great question. We do frequently discuss privacy and security, especially when it comes to public Wi-Fi networks, but is protecting yourself worth all of the fuss? We think so, and while we understand that VPNs and other security tools can slow down your system or be buggy and quirky at times, we have to fall back on the old adage, "Security through obscurity is no security at all."

Protecting Yourself Doesn't Have to Be Complicated

It only takes one lost email or online banking password, or one hacked Facebook account to turn your world upside down—or at least be a serious inconvenience for months. So ultimately, the real question is: Why tempt fate? It may be a bit of an inconvenience to use a VPN while you're trying to browse, or to use a password management tool so you don't use the same password in multiple places, but in the end, the real question you should ask yourself is whether or not you'd prefer the alternative if you go without any security at all. Photo by Laschon Maximilian (Shutterstock).

Considering that all of the essential security tools—including password management, antivirus and anti-malware, and even VPNs that can encrypt your web browsing—all come in free varieties, there's really no reason to not use them.

Want to keep your passwords safe, strong, and varied? We love LastPass, but KeePass is an alternative free, open-source option.

Microsoft Security Essentials will cover you from an antivirus perspective if you're looking for something great and free, and MalwareBytes does a great job at anti-malware.

As for VPNs, we've shown you how to build your own for top-flight security, or you can always opt for a free third-party VPN service like Hotspot Shield or CyberGhost. You have choices, and if one option isn't working well on your system, or seems to slow you down, there are plenty of others to try—so "it makes my computer slow" or "it crashes all the time" isn't a good excuse for surfing on public networks with no protection.

Sure, You May Be Alone, But That Doesn't Mean No One's Watching

If you're the only one in the coffee shop and you live in a small town, you're probably the only person on that network. That said, there's nothing stopping someone in the parking lot from pulling up to use the free Wi-Fi, or anyone in any of the buildings nearby hopping on to the coffee shop wireless to save some bandwidth or see what other people are doing. Just because it seems like you're the only person in the area doesn't mean you're the only person on the network, and this is especially true for larger places like libraries, airports, hotels, or convention centers with one large network that spans the entire area. Is your local coffee shop or favorite bookstore a haunt for black hats? Probably not—but it doesn't take a skilled hand to sit on a wireless network for giggles and pull down as many packets as they have time to collect. After all, we've shown you how it's done, and it's easy. Photo by Ed Yourdon.

Again, this is one of those "why tempt fate" kind of scenarios. The coffee shop on the corner is one thing. The library may be a more tempting target. The airport's "free public Wi-Fi" almost definitely has someone on it looking for juicy data, as does your hotel's network—you know, the one with FREE OPEN WI-FI as the SSID? Whether or not someone is riding that open network in order to steal passwords or because they're just curious, there's no reason for you to take the chance when you don't have to, especially when a good VPN will foil most—if not all—of their efforts. Rest assured though, there's someone nosing around that network, guaranteed.

Better Safe than Sorry

As we mentioned, protecting yourself doesn't have to be complicated, and if you have a layer of security software on your computer that's so thick you can barely use the system without it slowing down, it's time to take a look at the products you're using and see if you can find more lightweight options. They're out there, you just have to try a few and pick one that works best for you. The real likelihood that you'll personally be hacked or have a password stolen or have your identity spoofed and used for nefarious purposes is low, we understand that, but as long as it's not zero and as long as there are easy ways to protect yourself, we can't advise against it. Hiding in a crowd and hoping you're not the one to get caught is no substitution for learning to defend yourself. Photo by Gunnar Pippel (Shutterstock).

Are we probably a little paranoid? Yep. Do security analysts and experts often overstate the real risk of being hacked or having your information stolen in order to encourage good, secure behavior? Absolutely. But remember—no one ever talks about how often you won't get hit by a car when you walk out into the street without looking, or how often your house won't be burglarized if you leave the front door unlocked. You protect yourself because it makes sense to do so, and technology is no different. After all, it only takes once.

If you know what you're doing, know the risks, don't plan on sending or receiving anything sensitive while you're sitting at the coffee shop, and don't mind the idea of someone looking over your shoulder while you work, go nuts. We'd rather be safe than sorry, but ultimately it's your call.

Love, Lifehacker

P.S. How do you keep your system protected when you're using open Wi-Fi networks? Do you bother? Share your tips for Slightly Paranoid in the comments below.

Have a question or suggestion for Ask Lifehacker? Send it to tips+asklh@lifehacker.com.

Title photo by Ed Yourdon.

Original Page: http://pocket.co/sh3Is


Session Start: Wed Jun 22 23:45:53 2011

This summary is not available. Please click here to view the post.