HACK ATTACK: U.S. Says Office of Personnel Management Hacked … the Records & Info of 4 Million Federal Emplyees, China Suspected
The Office of Personnel Management has been hacked and the records of 4 million past and current federal employees has had their records breached. US officials suspect China was behind the cyber attack. It is being called one of the largest thefts of government data in history. In the video below it is being reported that any federal employees who were victims of identity theft will be notified and will receive free credit monitoring. Free? Its not free, the America tax payers will be paying for that service because the federal government could not properly allocate monies to cyber security. It was just last month that we learned the IRS had been hacked.
U.S. officials suspect that hackers in China stole the personal records of as many as four million people in one of the most far-reaching breaches of government computers.
The Federal Bureau of Investigation is probing the breach, detected in April at the Office of Personnel Management. The agency essentially functions as the federal government’s human resources department, managing background checks, pension payments and job training across dozens of federal agencies.
Investigators suspect that hackers based in China are responsible for the attack, though the probe is continuing, according to people familiar with the matter. On Thursday, several U.S. officials described the breach as among the largest known thefts of government data in history.
It isn’t clear exactly what was stolen in the hack attack, but officials said the information can be used to facilitate identity theft or fraud. The Department of Homeland Security said it “concluded at the beginning of May” that the records had been taken.
At a Chinese Foreign Ministry briefing on Friday, ministry spokesman Hong Lei said, “Cyberattacks are anonymous, cross-border and hard to trace. If you keep using the words “maybe” or “perhaps” without making a thorough study, this is irresponsible and unscientific.” He said China opposes all forms of cyberattacks. “We hope the U.S. side will shed its suspicions.”
I hate to say it, maybe Hillary Clinton had the right idea by using a private server housed at her home to store her State Department government emails on as the cyber protections performed by the US government do not seem to work.
It Begins, Obamacare Enrollees Info Compromised … 400 Connecticut Health-Exchange Enrollees’ Information May Be Compromised
And so it begins … 400 Connecticut Obamacare health-exchange enrollees’ information may have been compromised. A backpack was recovered in Hartford, Connecticut that held “four notepads with personal information for approximately 400 individuals. The backpack also contained Access Health CT paperwork and it appears as though some of that personal information may be associated with Access Health CT accounts. According to the New Haven Register, Hartford Police spokesman Lt. Brian Foley said an officer responded at about 2:15 p.m. to 280 Trumbull St. to meet with an Access Health CT employee regarding an employee possibly taking customer’s personal information. Centers for Medicare and Medicaid Services spokesman Aaron Albright said in a statement, “This situation does not involve consumers who have used HealthCare.gov.” Of course those words are about as reputable as the Obamacare, Healthcare.gov website roll-out. These are exactly the concerns many individuals warned of with the use and potential abuse by counselors for the exchanges known as “navigators.”
The personal information of around 400 health-exchange enrollees may be compromised, according to a statement issued today by Access Health CT CEO Kevin Counihan.
The statement notes that a backpack was recovered in Hartford that held “four notepads with personal information for approximately 400 individuals. The backpack also contained Access Health CT paperwork and it appears as though some of that personal information may be associated with Access Health CT accounts. It is still unclear where the backpack came from, and we are working [with] the Hartford Police Department to investigate, and contact the individuals whose information may be compromised. … Let me be clear: we are sorry this happened. This is a very serious situation and we will hold the person or persons who are responsible to account.”
Kathleen Tallarita, the government and public affairs outreach manager for Access Health CT, told National Review Online by phone that the health exchange does not know yet whether identity theft has occurred, but “we’re diligently looking into what’s happened.”
“Earlier today, we received a report that an individual in Hartford discovered a backpack on Trumbull Street containing four notepads with personal information for approximately 400
individuals. The backpack also contained Access Health CT paperwork and it appears as though some of that personal information may be associated with Access Health CT accounts.
It is still unclear where the backpack came from, and we are working the Hartford Police Department to investigate, and contact the individuals whose information may be compromised.
Makes you wonder how many backpacks have made it out of these health-exchanges that were not found, doesn’t it?
ARE YOU KIDDING ME … REMEMBER WHEN LAWS USED TO PROTECT OR PROVIDE JUSTICE FOR THE VICTIM?
How can it be that a man who took cellphone photos up the skirts of women riding the Boston subway did not violate state law? Massachusetts highest court ruled the following on Wednesday, “A female passenger on a MBTA trolley who is wearing a skirt, dress, or the like covering these parts of her body is not a person who is ‘partially nude,’ no matter what is or is not underneath the skirt by way of underwear or other clothing.” The Court overruled a lower court and stated that the State law “does not apply to photographing (or videotaping or electronically surveilling) persons who are fully clothed and, in particular, does not reach the type of upskirting that the defendant is charged with attempting to accomplish on the MBTA.” Unbelievable! What ever happened to intent? Hell, what ever happened to Justice?
Just curious, what would have happened if he was doing this on a play ground?
A man who took cellphone photos up the skirts of women riding the Boston subway did not violate state law because the women were not nude or partially nude, Massachusetts’ highest court ruled Wednesday.
The Supreme Judicial Court overruled a lower court that had upheld charges against Michael Robertson, who was arrested in August 2010 by transit police who set up a sting after getting reports that he was using his cellphone to take photos and video up female riders’ skirts and dresses.
The ruling immediately prompted top Beacon Hill lawmakers to pledge to update state law.
The Massachusetts Supreme Court’s justice is not only blind, it’s stupid as well.
Sextortion: Jared James Abrahams Pleads Guilty to 4 Counts of Extortion & 1 Count Unauthorized Access of a Computer … Victims Include Miss Teen USA Cassidy Wolf & Teen, 20′s and Minor Girls From Southern California, Maryland, Ireland, Canada, Russia and Moldova
SICK, CREEPY SOB PLEADS GUILTY IN SEXTORTION CASE.
19 year old Jared James Abrahams has pleaded guilty to four counts of extortion and one could of an unauthorized access of a computer. Abrahams s facing federal prison time for hacking the webcams of Miss Teen USA Cassidy Wolf and a dozen other young women worldwide and trying to blackmail them by going public with naked photos in the widely publicized “sextortion” case. Jared Abrahams is a former class mate of Cassidy Wolf. Under the plea agreement, Abrahams faces up to 11 years in federal prison and fines of up to $1 million.
A 19-year-old Southern California computer student is facing federal prison for hacking the webcams of Miss Teen USA Cassidy Wolf and a dozen other young women worldwide and trying to blackmail them by going public with naked photos he secretly took.
Jared James Abrahams of Temecula pleaded guilty Tuesday to four counts of extortion and one count of unauthorized access of a computer.
Court records show the victims ranged from their late teens to early 20s, including some minors, and were located in Southern California, Maryland, Ireland, Canada, Russia and Moldova. The plot lasted from early 2012 until June 2013.
Abrahams threatened to post the illegally obtained photos if his targets did not send him more nude images or strip for him on camera. At least two complied with his demands.
“I hacked several girls’ computers and, using their webcams, took photos of them when they weren’t aware,” Abrahams said in court, admitting that he was aware that he was extorting them.
UNREAL … HHS Sec. Sebelius Admits to Senate Panel that Obamacare Navigators Don’t Need Criminal Background Checks … A Convicted Felon Could be a Navigator
ARE YOU KIDDING ME … THIS SHOULD BE CONSIDERED A CRIME AGAINST THE AMERICAN PEOPLE.
The Obamacare “Navigators,” the very people who Americans give their person information to and are supposed to help navigate individuals through Obamacare are not required under federal guidelines are not required to undergo criminal background checks. How on earth could the government open Americans up to such identity theft and fraud? Isn’t there enough fraud in healthcare without Obama and his minions opening up more individuals to more? How could this possibly be considered HIPAA compliant?
HHS Secretary Kathleen Sebelius admits in a Senate hearing on Obamacare that a felon could be a navigator. And you think the worst part of Obamacare is the website. It would appear your biggest problems may occur once you log on. Good grief, is there any aspect of Obama care that is worth a damn! How could anything this poorly constructed ever get out of the planing stage of project management?
“So I want to ask you about the navigators,” said Senator John Cornyn at a hearing today on Capitol Hill. “The president is in Dallas, Texas today, touting the navigator program, which, as you know, are people who are hired to help people navigate the Affordable Care Act. But I would just like to ask you this question, if you would answer it: Isn’t it true that there is no federal requirement for navigators to undergo a criminal background check, even though they will receive personal — sensitive personal — information from the individuals they help to sign-up for the Affordable Care Act?”
“That is true,” said Sebelius. “States could add an additional background checks and other features, but it is not part of the federal requirement”
“So a convicted felon could be a navigator and could acquire sensitive personal information from an individual unbeknownst to them?”
“That is possible,” said Sebelius.
This must be a part of Obama’s felon jobs program.
Posted November 7, 2013 by Scared Monkeys
Barack Obama, Crime, Democrats, Epic Fail, Felony, Fraud, Government, Healthcare, Healthcare.gov, HHS, HIPAA, Invassion of Privacy, Kathleen Sebelius, Liberals, Misleader, Misrepresentation, Obamacare, Obamanation, Partisan hack, Progressives, Senate, The Lying King, Transparency, WTF, You Tube - VIDEO | 9 comments
What else could this disastrous web site possibly do wrong?
Obamacare’s Healthcare.gov website discloses eligibility letters written to other applicants. Hmm, thanks for the break of privacy of unsuspecting individuals who signed onto Healthcare.gov. The security flaw disclosed eligibility letters addressed to individuals from another state. Just curious, was a data disclosure made to HHS in compliance with HIPAA privacy rules like many healthcare government contractors are supposed to do within a specified amount of time? Or do your own rules not apply to yourself?
As reported at The Weekly Standard, below is a screen shot of one of the “eligibility letters” he wasn’t supposed to receive.
Justin Hadley logged on to HealthCare.gov to evaluate his insurance options after his health plan was canceled. What he discovered was an apparent security flaw that disclosed eligibility letters addressed to individuals from another state.
“I was in complete shock,” said Hadley, who contacted Heritage after becoming alarmed at the breach of privacy.
Hadley, a North Carolina father, buys his insurance on the individual market. His insurance company, Blue Cross Blue Shield of North Carolina, directed him to HealthCare.gov in a cancellation letter he received in September.
After multiple attempts to access the problem-plagued website, Hadley finally made it past the registration page Thursday. That’s when he was greeted with downloadable letters about eligibility — for two people in South Carolina.
The document shows that administration officials at the Centers for Medicare and Medicaid Services were concerned that a lack of testing posed a potentially “high” security risk for the HealthCare.gov website serving 36 states.
Last week, the Associated Press disclosed a government memo revealing the “high” security risk for HealthCare.gov. Those concerns surfaced at Wednesday’s hearing with HHS Secretary Kathleen Sebelius, who claimed the system was secure.
HHS spokeswoman Joanne Peters told the AP, “When consumers fill out their online … applications, they can trust that the information they’re providing is protected by stringent security standards and that the technology underlying the application process has been tested and is secure.”
However, that didn’t stop members of Congress from voicing alarm.
“You accepted a risk on behalf of every user … that put their personal financial information at risk,” Representative Mike Rogers (R-MI) told Sebelius. “Amazon would never do this. ProFlowers would never do this. Kayak would never do this. This is completely an unacceptable level of security.”
NSA Collecting Hundreds of Millions of Contact Lists from Personal E-mail & IM Accounts, Including Americans
The government may be shut down, but the NSA is not …
Nothing is off limits to the NSA and so much for anything personal privacy. According to the NSA and their collection techniques, we are guilty until proven innocent. According to the WAPO, “Each day, the presentation said, the NSA collects contacts from an estimated 500,000 buddy lists on live-chat services as well as from the inbox displays of Web-based e-mail accounts.” But don’t worry, President Barack Obama previously stated that the NSA’s email collecting program “does not apply to U.S. citizens.” Of course this is the same individual who says that the Obamacare website is a success, it is just “glitchy”.
The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world, many of them belonging to Americans, according to senior intelligence officials and top-secret documents provided by former NSA contractor Edward Snowden.
The collection program, which has not been disclosed before, intercepts e-mail address books and “buddy lists” from instant messaging services as they move across global data links. Online services often transmit those contacts when a user logs on, composes a message, or synchronizes a computer or mobile device with information stored on remote servers.
Rather than targeting individual users, the NSA is gathering contact lists in large numbers that amount to a sizable fraction of the world’s e-mail and instant messaging accounts. Analysis of that data enables the agency to search for hidden connections and to map relationships within a much smaller universe of foreign intelligence targets.
During a single day last year, the NSA’s Special Source Operations branch collected 444,743 e-mail address books from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail and 22,881 from unspecified other providers, according to an internal NSA PowerPoint presentation. Those figures, described as a typical daily intake in the document, correspond to a rate of more than 250?million a year.
From The Hill … Maybe some one might want to define and quantify what “required to minimize the ‘acquisition, use and dissemination’ of contacts of U.S. citizens” is!
Shawn Turner, a spokesman for the Office of the Director of National Intelligence, said the program is aimed at “valid foreign intelligence targets,” including terrorists, drug smugglers and human traffickers. He added that the NSA is required to minimize the “acquisition, use and dissemination” of contacts of U.S. citizens.
But of course because of media bias, we hear really nothing of this invasion of privacy. However, as the Lonely Conservative states, image if a Republican was in the White House?
Does this give those that need to sign up for Obamacare a warm fuzzy …
As reported at the The Weekly Standard, a portion of the website of the Substance Abuse and Mental Health Services Administration (SAMHSA), an agency of HHS, was apparently hacked as long as two months ago. Makes you want to trust the Healthcare.gov web page and give the government your personal information, doesn’t it?
A portion of the website of the Substance Abuse and Mental Health Services Administration (SAMHSA) was apparently hacked as long as two months ago. SAMHSA is an agency of the Department of Health and Human Services (HHS). HHS also runs the new Obamacare insurance marketplace, Healthcare.gov.
Dozens of pages hawking retail merchandise have been uploaded to the SAMHSA site, ranging from NFL jerseys to Ugg shoes to Armani fragrances. Screen captures of the various pages are shown here:
UPDATE: Shortly after this story was posted, the site nace.samhsa.gov returned an error message saying that the site could not be found. Later, the following message appeared on the site (misspelling included): “This site is undgoing maintenance. We are sorry for any inconvenience this has caused you.” Here’s a current screen capture:
Liberal Super PAC ‘Progress Kentucky’ Who Made Racist Comments About Mitch McConnell’s Asian Wife Responsible For Illegal Secretly Recording Opposition Meeting On Ashley Judd
WATERGATE II in the “Blue Grass” State …
It turns out that a liberal super PAC group, “Progress Kentucky,” was responsible for the illegal recordings of Republican Kentucky Senator Mitch McConnell and his campaign staffers. The secretly and illegally recorded meeting was an opposition discussion on one time Democrat opponent, actor Ashley Judd. As reported at WFPL News, Jacob Conway, an executive committee member of the Jefferson County Democratic Party said the founders of Progressive Kentucky Shawn Reilly and Curtis Morrison were responsible for the illegal recording and bragged about recording the meeting.
A secret recording of a campaign strategy session between U.S. Senator Mitch McConnell and his advisors was taped by leaders of the Progress Kentucky super PAC, says a longtime local Democratic operative.
Mother Jones Magazine released the tape this week. The meeting itself took place on Feb. 2.
Jacob Conway, who is on the executive committee of the Jefferson County Democratic Party, says that day, Shawn Reilly and Curtis Morrison, who founded and volunteered for Progress Kentucky, respectively, bragged to him about how they recorded the meeting.
Much More from Mary Catherine Hamm at Hot Air and the “Water-Gating” of Mitch McConnell. Jacob Conway, who is on the executive committee of the Jefferson County Democratic Party outed ‘Progress Kentucky’ for the good of the party. Sounds more like a the rats fleeing the sinking ship and all individuals for themselves.
Dem Outed Liberal Group On McConnell Recordings For Good Of The Party
As stated at Legal Insurrection, “Mother Jones, who obtained and disseminated the tape as an exclusive, and David Corn better start lawyering up (which I assume they already have), because the question will become What did Mother Jones know about alleged McConnell bugging, and when did it know it?”
More from the illegal taping of the McConnell opposition meeting:
On Feb. 2, McConnell opened his campaign headquarters in the Watterson Office Park in Louisville and invited trusted GOP activists and select media outlets to an open house. The event lasted roughly two hours. Afterward, McConnell and several campaign advisors held a strategy session in an office meeting room.
Morrison and Reilly did not attend the open house, but they told Conway they arrived later and were able to hear the meeting from the hallway.
“They were in the hallway after the, I guess after the celebration and hoopla ended, apparently these people broke for lunch and had a strategy meeting, which is, in every campaign I’ve been affiliated with, makes perfect sense,” says Conway. “One of them held the elevator, the other one did the recording and they left. That was what they told to me from them directly.”
Posted April 12, 2013 by Scared Monkeys
Corruption, Crime, Democrat/Obama Propaganda, Democrats, Ethics, Gutter Politics, Invassion of Privacy, Liberals, Media, Media Bias, Mitch McConnell (R-KY), Moonbats, Partisan hack, Politics, Progressives, Scandal, Senate, Senate Elections, Super PAC ads | 3 comments
IRS Read Your Emails Without Warrants … Also, IRS Conducting Audits Based on FACEBOOK and TWITTER Info
Let this be a warning to “We the People” … be very careful what you put in emails, on Facebook or Twitter.
Badges, we don’t need no stinking badges, or in this case it is the IRS who claim they Don’t Need No Stinking Warrants. According to a FOIA from the ACLU, the IRS does not need a warrant to read your private emails. Isn’t that special that the Internal Revenue Service (IRS) claims that their agents do not need warrants to read people’s emails, text messages and other private electronic communications. What every happened to privacy and freedoms and the following of the US Constitution in America? In a word, TYRANNY.
Everyone knows the IRS is our nation’s tax collector, but it is also a law enforcement organization tasked with investigating criminal violations of the tax laws. New documents released to the ACLU under the Freedom of Information Act reveal that the IRS Criminal Tax Division has long taken the position that the IRS can read your emails without a warrant—a practice that one appeals court has said violates the Fourth Amendment (and we think most Americans would agree).
Last year, the ACLU sent a FOIA request to the IRS seeking records regarding whether it gets a warrant before reading people’s email, text messages and other private electronic communications. The IRS has now responded by sending us 247 pages of records describing the policies and practices of its criminal investigative arm when seeking the contents of emails and other electronic communications.
So does the IRS always get a warrant? Unfortunately, while the documents we have obtained do not answer this question point blank, they suggest otherwise. This question is too important for the IRS not to be completely forthright with the American public. The IRS should tell the public whether it always gets a warrant to access email and other private communications in the course of criminal investigations. And if the agency does not get a warrant, it should change its policy to always require one.
But emails are not enough, the IRS is looking at Facebook and Twitter too.