Sunday, January 28, 2018

Processes 11:41 pm

'mobile' user processes (39):
- name: MobileCal
  runtime: 11m 22s
  priority: 17
  PID: 385
  PPID: 1
  PGID: 385
  UID: 501
- name: calaccessd
  runtime: 11m 23s
  priority: 17
  PID: 384
  PPID: 1
  PGID: 384
  UID: 501
- name: xpcd
  runtime: 11m 31s
  priority: 40
  PID: 383
  PPID: 1
  PGID: 383
  UID: 501
- name: IMDPersistenceAg
  runtime: 11m 32s
  priority: 17
  PID: 382
  PPID: 1
  PGID: 382
  UID: 501
- name: recentsd
  runtime: 21m 43s
  priority: 17
  PID: 377
  PPID: 1
  PGID: 377
  UID: 501
- name: MailCompositionS
  runtime: 26m 18s
  priority: 17
  PID: 374
  PPID: 1
  PGID: 374
  UID: 501
- name: medialibraryd
  runtime: 26m 53s
  priority: 17
  PID: 373
  PPID: 1
  PGID: 373
  UID: 501
- name: geod
  runtime: 31m 54s
  priority: 17
  PID: 371
  PPID: 1
  PGID: 371
  UID: 501
- name: System Status
  runtime: 32m 59s
  priority: 24
  PID: 367
  PPID: 1
  PGID: 367
  UID: 501
- name: lsd
  runtime: 33m 21s
  priority: 17
  PID: 365
  PPID: 1
  PGID: 365
  UID: 501
- name: assetsd
  runtime: 34m 15s
  priority: 17
  PID: 364
  PPID: 1
  PGID: 364
  UID: 501
- name: touchsetupd
  runtime: 34m 39s
  priority: 17
  PID: 362
  PPID: 1
  PGID: 362
  UID: 501
- name: timed
  runtime: 35m 28s
  priority: 17
  PID: 359
  PPID: 1
  PGID: 359
  UID: 501
- name: nsnetworkd
  runtime: 43m 52s
  priority: 17
  PID: 354
  PPID: 1
  PGID: 354
  UID: 501
- name: MobileGestaltHel
  runtime: 55m 40s
  priority: 17
  PID: 341
  PPID: 1
  PGID: 341
  UID: 501
- name: DuetLST
  runtime: 55m 41s
  priority: 17
  PID: 340
  PPID: 1
  PGID: 340
  UID: 501
- name: accountsd
  runtime: 58m 9s
  priority: 17
  PID: 337
  PPID: 1
  PGID: 337
  UID: 501
- name: FaceTime
  runtime: 4h 9m 27s
  priority: 17
  PID: 174
  PPID: 1
  PGID: 174
  UID: 501
- name: MobileSMS
  runtime: 4h 26m 0s
  priority: 17
  PID: 156
  PPID: 1
  PGID: 156
  UID: 501
- name: librariand
  runtime: 5h 33m 23s
  priority: 17
  PID: 134
  PPID: 1
  PGID: 134
  UID: 501
- name: MobileMail
  runtime: 5h 33m 47s
  priority: 17
  PID: 127
  PPID: 1
  PGID: 127
  UID: 501
- name: kbd
  runtime: 5h 34m 15s
  priority: 17
  PID: 121
  PPID: 1
  PGID: 121
  UID: 501
- name: itunesstored
  runtime: 5h 34m 40s
  priority: 17
  PID: 109
  PPID: 1
  PGID: 109
  UID: 501
- name: dataaccessd
  runtime: 5h 34m 52s
  priority: 24
  PID: 103
  PPID: 1
  PGID: 103
  UID: 501
- name: tccd
  runtime: 5h 34m 52s
  priority: 17
  PID: 102
  PPID: 1
  PGID: 102
  UID: 501
- name: EscrowSecurityAl
  runtime: 5h 34m 53s
  priority: 17
  PID: 101
  PPID: 1
  PGID: 101
  UID: 501
- name: apsd
  runtime: 5h 35m 16s
  priority: 17
  PID: 84
  PPID: 1
  PGID: 84
  UID: 501
- name: BTServer
  runtime: 5h 35m 27s
  priority: 17
  PID: 61
  PPID: 1
  PGID: 61
  UID: 501
- name: vmd
  runtime: 5h 35m 27s
  priority: 17
  PID: 59
  PPID: 1
  PGID: 59
  UID: 501
- name: imagent
  runtime: 5h 35m 27s
  priority: 17
  PID: 57
  PPID: 1
  PGID: 57
  UID: 501
- name: identityservices
  runtime: 5h 35m 27s
  priority: 17
  PID: 55
  PPID: 1
  PGID: 55
  UID: 501
- name: ubd
  runtime: 5h 35m 27s
  priority: 17
  PID: 49
  PPID: 1
  PGID: 49
  UID: 501
- name: mediaserverd
  runtime: 5h 35m 27s
  priority: 17
  PID: 46
  PPID: 1
  PGID: 46
  UID: 501
- name: aggregated
  runtime: 5h 35m 28s
  priority: 17
  PID: 38
  PPID: 1
  PGID: 38
  UID: 501
- name: SpringBoard
  runtime: 5h 35m 28s
  priority: 17
  PID: 34
  PPID: 1
  PGID: 34
  UID: 501
- name: fairplayd.H1
  runtime: 5h 35m 28s
  priority: 17
  PID: 31
  PPID: 1
  PGID: 31
  UID: 501
- name: backboardd
  runtime: 5h 35m 28s
  priority: 24
  PID: 28
  PPID: 1
  PGID: 28
  UID: 501
- name: iaptransportd
  runtime: 5h 35m 28s
  priority: 17
  PID: 24
  PPID: 1
  PGID: 24
  UID: 501
- name: mediaremoted
  runtime: 5h 35m 28s
  priority: 17
  PID: 21
  PPID: 1
  PGID: 21
  UID: 501

'root' user processes (17):
- name: mobileassetd
  runtime: 22m 56s
  priority: 17
  PID: 375
  PPID: 1
  PGID: 375
  UID: 0
- name: keybagd
  runtime: 31m 57s
  priority: 17
  PID: 370
  PPID: 1
  PGID: 370
  UID: 0
- name: sandboxd
  runtime: 33m 15s
  priority: 40
  PID: 366
  PPID: 1
  PGID: 366
  UID: 0
- name: networkd_privile
  runtime: 34m 36s
  priority: 40
  PID: 363
  PPID: 1
  PGID: 363
  UID: 0
- name: filecoordination
  runtime: 5h 34m 46s
  priority: 17
  PID: 105
  PPID: 1
  PGID: 105
  UID: 0
- name: distnoted
  runtime: 5h 35m 20s
  priority: 17
  PID: 78
  PPID: 1
  PGID: 78
  UID: 0
- name: notifyd
  runtime: 5h 35m 26s
  priority: 17
  PID: 71
  PPID: 1
  PGID: 71
  UID: 0
- name: fseventsd
  runtime: 5h 35m 27s
  priority: 50
  PID: 63
  PPID: 1
  PGID: 63
  UID: 0
- name: configd
  runtime: 5h 35m 27s
  priority: 24
  PID: 56
  PPID: 1
  PGID: 56
  UID: 0
- name: locationd
  runtime: 5h 35m 27s
  priority: 17
  PID: 53
  PPID: 1
  PGID: 53
  UID: 0
- name: lockdownd
  runtime: 5h 35m 27s
  priority: 24
  PID: 52
  PPID: 1
  PGID: 52
  UID: 0
- name: powerd
  runtime: 5h 35m 27s
  priority: 17
  PID: 47
  PPID: 1
  PGID: 47
  UID: 0
- name: syslogd
  runtime: 5h 35m 28s
  priority: 24
  PID: 42
  PPID: 1
  PGID: 42
  UID: 0
- name: wifid
  runtime: 5h 35m 28s
  priority: 24
  PID: 15
  PPID: 1
  PGID: 15
  UID: 0
- name: UserEventAgent
  runtime: 5h 35m 28s
  priority: 24
  PID: 14
  PPID: 1
  PGID: 14
  UID: 0
- name: launchd
  runtime: 5h 35m 35s
  priority: 24
  PID: 1
  PPID: 0
  PGID: 1
  UID: 0
- name: kernel_task
  runtime: 5h 35m 35s
  priority: 24
  PID: 0
  PPID: 0
  PGID: 0
  UID: 0

'_mdnsresponder' user processes (1):
- name: mDNSResponder
  runtime: 5h 35m 28s
  priority: 17
  PID: 33
  PPID: 1
  PGID: 33
  UID: 65

'_networkd' user processes (1):
- name: networkd
  runtime: 5h 35m 18s
  priority: 17
  PID: 79
  PPID: 1
  PGID: 79
  UID: 24

'_securityd' user processes (1):
- name: securityd
  runtime: 57m 58s
  priority: 17
  PID: 338
  PPID: 1
  PGID: 338
  UID: 64

'_wireless' user processes (1):
- name: CommCenter
  runtime: 5h 35m 27s
  priority: 24
  PID: 67
  PPID: 1
  PGID: 67
  UID: 25



Elyssa D. Durant 
Research &  Policy Analyst
 '

anonymous not so tough. irrelevant

'mobile' user processes (34):
- name: medialibraryd
runtime: 0m 23s
priority: 17
PID: 373
PPID: 1
PGID: 373
UID: 501
- name: pasteboardd
runtime: 0m 57s
priority: 24
PID: 372
PPID: 1
PGID: 372
UID: 501
- name: geod
runtime: 5m 24s
priority: 17
PID: 371
PPID: 1
PGID: 371
UID: 501
- name: System Status
runtime: 6m 29s
priority: 17
PID: 367
PPID: 1
PGID: 367
UID: 501
- name: lsd
runtime: 6m 51s
priority: 17
PID: 365
PPID: 1
PGID: 365
UID: 501
- name: assetsd
runtime: 7m 45s
priority: 17
PID: 364
PPID: 1
PGID: 364
UID: 501
- name: touchsetupd
runtime: 8m 9s
priority: 17
PID: 362
PPID: 1
PGID: 362
UID: 501
- name: timed
runtime: 8m 58s
priority: 17
PID: 359
PPID: 1
PGID: 359
UID: 501
- name: nsnetworkd
runtime: 17m 22s
priority: 17
PID: 354
PPID: 1
PGID: 354
UID: 501
- name: MobileGestaltHel
runtime: 29m 10s
priority: 17
PID: 341
PPID: 1
PGID: 341
UID: 501
- name: DuetLST
runtime: 29m 11s
priority: 17
PID: 340
PPID: 1
PGID: 340
UID: 501
- name: accountsd
runtime: 31m 39s
priority: 17
PID: 337
PPID: 1
PGID: 337
UID: 501
- name: FaceTime
runtime: 3h 42m 57s
priority: 17
PID: 174
PPID: 1
PGID: 174
UID: 501
- name: MobileSMS
runtime: 3h 59m 30s
priority: 17
PID: 156
PPID: 1
PGID: 156
UID: 501
- name: librariand
runtime: 5h 6m 53s
priority: 17
PID: 134
PPID: 1
PGID: 134
UID: 501
- name: MobileMail
runtime: 5h 7m 17s
priority: 24
PID: 127
PPID: 1
PGID: 127
UID: 501
- name: kbd
runtime: 5h 7m 45s
priority: 17
PID: 121
PPID: 1
PGID: 121
UID: 501
- name: itunesstored
runtime: 5h 8m 10s
priority: 17
PID: 109
PPID: 1
PGID: 109
UID: 501
- name: dataaccessd
runtime: 5h 8m 22s
priority: 17
PID: 103
PPID: 1
PGID: 103
UID: 501
- name: tccd
runtime: 5h 8m 22s
priority: 17
PID: 102
PPID: 1
PGID: 102
UID: 501
- name: EscrowSecurityAl
runtime: 5h 8m 23s
priority: 17
PID: 101
PPID: 1
PGID: 101
UID: 501
- name: apsd
runtime: 5h 8m 46s
priority: 24
PID: 84
PPID: 1
PGID: 84
UID: 501
- name: BTServer
runtime: 5h 8m 57s
priority: 17
PID: 61
PPID: 1
PGID: 61
UID: 501
- name: vmd
runtime: 5h 8m 57s
priority: 17
PID: 59
PPID: 1
PGID: 59
UID: 501
- name: imagent
runtime: 5h 8m 57s
priority: 17
PID: 57
PPID: 1
PGID: 57
UID: 501
- name: identityservices
runtime: 5h 8m 57s
priority: 17
PID: 55
PPID: 1
PGID: 55
UID: 501
- name: ubd
runtime: 5h 8m 57s
priority: 17
PID: 49
PPID: 1
PGID: 49
UID: 501
- name: mediaserverd
runtime: 5h 8m 57s
priority: 17
PID: 46
PPID: 1
PGID: 46
UID: 501
- name: aggregated
runtime: 5h 8m 58s
priority: 17
PID: 38
PPID: 1
PGID: 38
UID: 501
- name: SpringBoard
runtime: 5h 8m 58s
priority: 17
PID: 34
PPID: 1
PGID: 34
UID: 501
- name: fairplayd.H1
runtime: 5h 8m 58s
priority: 17
PID: 31
PPID: 1
PGID: 31
UID: 501
- name: backboardd
runtime: 5h 8m 58s
priority: 24
PID: 28
PPID: 1
PGID: 28
UID: 501
- name: iaptransportd
runtime: 5h 8m 58s
priority: 17
PID: 24
PPID: 1
PGID: 24
UID: 501
- name: mediaremoted
runtime: 5h 8m 58s
priority: 17
PID: 21
PPID: 1
PGID: 21
UID: 501

'root' user processes (16):
- name: keybagd
runtime: 5m 27s
priority: 17
PID: 370
PPID: 1
PGID: 370
UID: 0
- name: sandboxd
runtime: 6m 45s
priority: 40
PID: 366
PPID: 1
PGID: 366
UID: 0
- name: networkd_privile
runtime: 8m 6s
priority: 40
PID: 363
PPID: 1
PGID: 363
UID: 0
- name: filecoordination
runtime: 5h 8m 16s
priority: 17
PID: 105
PPID: 1
PGID: 105
UID: 0
- name: distnoted
runtime: 5h 8m 50s
priority: 17
PID: 78
PPID: 1
PGID: 78
UID: 0
- name: notifyd
runtime: 5h 8m 56s
priority: 17
PID: 71
PPID: 1
PGID: 71
UID: 0
- name: fseventsd
runtime: 5h 8m 57s
priority: 50
PID: 63
PPID: 1
PGID: 63
UID: 0
- name: configd
runtime: 5h 8m 57s
priority: 24
PID: 56
PPID: 1
PGID: 56
UID: 0
- name: locationd
runtime: 5h 8m 57s
priority: 17
PID: 53
PPID: 1
PGID: 53
UID: 0
- name: lockdownd
runtime: 5h 8m 57s
priority: 24
PID: 52
PPID: 1
PGID: 52
UID: 0
- name: powerd
runtime: 5h 8m 57s
priority: 17
PID: 47
PPID: 1
PGID: 47
UID: 0
- name: syslogd
runtime: 5h 8m 58s
priority: 24
PID: 42
PPID: 1
PGID: 42
UID: 0
- name: wifid
runtime: 5h 8m 58s
priority: 24
PID: 15
PPID: 1
PGID: 15
UID: 0
- name: UserEventAgent
runtime: 5h 8m 58s
priority: 24
PID: 14
PPID: 1
PGID: 14
UID: 0
- name: launchd
runtime: 5h 9m 5s
priority: 24
PID: 1
PPID: 0
PGID: 1
UID: 0
- name: kernel_task
runtime: 5h 9m 5s
priority: 21
PID: 0
PPID: 0
PGID: 0
UID: 0

'_mdnsresponder' user processes (1):
- name: mDNSResponder
runtime: 5h 8m 58s
priority: 17
PID: 33
PPID: 1
PGID: 33
UID: 65

'_networkd' user processes (1):
- name: networkd
runtime: 5h 8m 48s
priority: 17
PID: 79
PPID: 1
PGID: 79
UID: 24

'_securityd' user processes (1):
- name: securityd
runtime: 31m 28s
priority: 17
PID: 338
PPID: 1
PGID: 338
UID: 64

'_wireless' user processes (1):
- name: CommCenter
runtime: 5h 8m 57s
priority: 24
PID: 67
PPID: 1
PGID: 67
UID: 25

Saturday, January 27, 2018

Community Apathy: A Public Health Issue

Monday, July 27, 2009

Community Apathy in Nashville, Tennessee
April 13, 2009

Can you please tell me who I could speak with (preferably informally) about a situation with Section 8 and MDHA.

I have already spoken with Pat Clark, director of MDHA, and she has been an unsympathetic to the fact that there has been an ongoing problem with drugs and violence with children in the same complex.


Legal Aid / or pro-bono refused to will represent me since my parents are attorneys. They told me I would have to get the money for court fees and a court reporter from them. That just ain't gonna happen.


I am 36 years old.

I don't mean to be rude or disrespectful in any way-- you have been extremely kind and gracious towards me, I am just exhausted by this process and I think it is pretty easy to see that I am stuck between a rock and a hard place.

If there is someone in particular who works closely with the housing authority and utilities, kindly ask them if you can release their name to me(or vice versa) so I can make sure it on the record before I loose my section 8. The landlord is paid in full, but I still have to move by the 22nd.
.

Thanks so much. If there is anyone you can think please let me know. There is stigma and judgment that comes long with a person who lives in public housing, but can assure you it would not be my first choice.

Thank your discretion and assistance.

Sincerely yours,

Elyssa Durant
[redacted]





UPDATE July 2009:

This has yet to bet settled. I received no response to my last inquiry received no response. I have lost my apartment and my section 8 coverage will end on the first of the month yet I cannot find an apartment due to the negative reference from the last landlord.

After spending 4 days in court, judges insisted that I hire (and pay for) a court reporter since they would not accept an affidavit from my an attorney in Pennsylvania.

The landlord did a "garnishment execution" without my knowledge for several hundreds of dollars which included attorneys fees, however the attorney refused to speak with me directly throughout the entire process, and told me if I wanted any information about my account, I would have to have an attorney contact him.

I have received no response from anyone in Metro despite multiple communications with virtually every office ranging from the Metro City Council, the Mayors Office of Neighbourhoods, Metro Social Services, my Congressman, my state representative. I am truly disgusted by the apathy and lack of human decency and courtesy that I have received from a city I have thought of as home for the last fourteen years. In fact, the only time I received any calls or emails from people I once respected and supported, were in reference to campaign contributions asking me to support them at upcoming events and elections.

That makes me sick. I have volunteered my time and money even when I didn't have it. I have decided to leave this place, however I don't even have enough money to do that. I do not have an address so I cannot even update my drivers license or voter registration.

I spend my nights sitting outside CyberSquatting since the temporary housing facility I have been staying at removed the modem to prevent me from filing complaints. The other residents have destroyed my property, disposed of my food and became violent with me. One came within inches of hitting me with a waffle iron simply because I asked where I could place my food since it keeps getting thrown out or moved. I have been told by instructed not to call mobile crisis since they do not want to neighbours to know that this place is really just a nut house in disguise.

My personal items including paperwork that is necessary to appeal my Social Security disability scheduled to be terminated on the 1st as well as other benefits I receive such as food stamps to help me scape by on $606.00 per month.

I had to pay substantial fees to obtain certified documents from Court in order to verify that the account had in fact been settled, yet I still cannot find a single person to assist me in resolving this horrific situation and face homelessness, yet even homeless prevention services is unable to assist me.

Welcome to my city: Nashville, Tennessee.

We Are Nashville... Not so much.

You #fail

Posted June 2, 2016


Elyssa D. Durant, Ed.M.
Research & Policy Analyst

Anywhere but there...
TN-05 Nashville, TN USA

Friday, January 26, 2018

Yahoo! Just Exposed One of the FBI's Most Secretive Tricks to Unethically Obtain Your Info

Yahoo! Just Exposed One of the FBI's Most Secretive Tricks to Unethically Obtain Your Info

In my experience, Yahoo has the best privacy and TOS probably after Sarah Palin Hack. 

I have news for you. It was the Russians. They hit in 2012 and let everything percolate. 

The good news is you can sue them. The bad news is nobody gives a fuck about any of this; until it's too late.

It's already too late for me. 







Yahoo! Just Exposed One of the FBI's Most Secretive Tricks to Unethically Obtain Your Info

For the first time since the implementation of the USA Freedom Act, Yahoo published three National Security Letters — perhaps the most secretive and contentious method the FBI has for obtaining information on individuals — after the lifting of repressive and equally-contentious gag orders.

Mainstays of the USA PATRIOT Act, National Security Letters (NSLs) generally request customer data information from businesses such as banks, internet service providers, travel agencies, and phone and telecommunications companies — without a warrant required. Worse, NSLs include onerous, mandatory orders prohibiting their recipients from disclosing to anyone — including coworkers, friends, and family — that they even received the letter.

Advertisment

"Yahoo has always maintained a strong commitment to protecting our users' safety, security and privacy," the company said in an announcement of the disclosure. "The release of these documents and information regarding NSLs today is consistent with our commitment to share as much information as we legally can regarding government data requests. We believe there is value in making these documents available to the public to promote an informed discussion about the legal authorities available to law enforcement."

"Each NSL included a nondisclosure provision that prevented Yahoo from previously notifying its users or the public of their existence," the company ominously stated.

Largely due to these mandatory nondisclosure orders, gauging exactly how many NSLs have been issued remains impossible — though as of 2013, the Obama administration admitted an average of 60 per day were being issued. Alarmingly, in its latest transparency report, Apple claimed the number of "national security orders" — including NSLs — had doubled in just six months. Yahoo said it plans updates to its own transparency report as additional nondisclosure orders are lifted.

Though they haven't received quite the notoriety of more sweeping surveillance programs — perhaps due to the extensive reporting after revelations from Edward Snowden — NSLs are at least equally troubling. As EFF previously noted, "in march 2007 the Department of Justice's inspector general released a report confirming extensive misuse of NSLs in a sample of four FBI field offices. An internal audit by the FBI confirmed that the problem was far more extensive than first thought."

So insidious are NSLs, the Electronic Frontier Foundation (EFF) once described them as "one of the most frightening and invasive" facets of the PATRIOT Act.

Essentially anything surrounding the account of the user targeted by the FBI must be disclosed, except for the actual content of communications. But plenty of information can be derived, without having to delve into the content, Vocativ noted, as metadata could include "the dates when an account was opened, IP addresses used to log in, any physical address or phone number associated with the account, the credit card number it used to pay for any service, any listed aliases — pretty much anything a user gives when they create an account."

"Our understanding is that the vast majority of NSLs of these kind that are issued go to tech companies, and that it's a basic tool that the FBI uses to start investigations involving people's communications," Andrew Cocker, staff attorney at EFF, told Vocativ in discussing NSLs specific to companies like Yahoo.

Yahoo's decision to disclose these NSLs marks the company's "ongoing commitment to transparency." A minor concession in the Freedom Act requires the FBI to periodically assess whether gag orders should remain in place. In the case of Yahoo's three NSLs, the termination of ongoing nondisclosure indicates the FBI completed those investigations.

"We believe this is an important step toward enriching a more open and transparent discussion about the legal authorities law enforcement can leverage to access user data," Yahoo stated.

While the Freedom Act basically continued many of the same programs from the PATRIOT Act that had expired, minor changes like the requirement to review FBI nondisclosure arrangements provide a degree of transparency desperately needed. Now, thanks to Yahoo, NSLs became a little less secretive.








^ed 

SEC.gov | Audit Firm Charged With Fraud Relating to Auditing of Penny Stock Companies

SEC.gov | Audit Firm Charged With Fraud Relating to Auditing of Penny Stock Companies

$15,000 fine? 

Absurd n

Audit Firm Charged With Fraud Relating to Auditing of Penny Stock Companies

A California-based audit firm is being charged with conducting flawed audits and reviews of financial statements, which are critical sources of information for investors. 

The SEC's Enforcement Division alleges that Anton & Chia LLP and its accountants ignored numerous indications of fraudulent financial reporting by three of the firm's audit clients – microcap companies Accelera Innovations Inc., Premier Holding Corp., and CannaVEST Corp.  For example, Accelera's public filings allegedly included revenue, assets, and liabilities from an entirely different company.  The Enforcement Division alleges that instead of standing in the way of Accelera's fraud, Anton & Chia facilitated it. 

Accelera Innovations Inc., Premier Holding Corp., and CannaVEST Corp. have been charged with fraud by the SEC.  The Enforcement Division is alleging that certain conduct by Anton & Chia in connection with the audits was fraudulent, charging the firm with violations of Section 10(b) of the Securities Exchange Act.

Anton & Chia's co-owners Gregory A. Wahl and Georgia Chung as well as former partner Michael Deutchman and former audit manager Tommy Shek are being charged along with the firm for their roles in the audits and/or interim reviews.  The case will be scheduled for a public hearing before an administrative law judge, who will prepare an initial decision stating what, if any, remedial actions are appropriate. 

"Auditors are crucial gatekeepers whose careful oversight of financial statements helps ensure that public companies provide accurate information to investors," said Stephanie Avakian, Co-Director of the SEC's Enforcement Division.

Steven Peikin, Co-Director of the SEC's Enforcement Division, added, "As alleged in the order, Anton & Chia and its accountants left investors with false assurances that financial information for three microcap companies had been properly audited or reviewed.  They had the opportunity to stop multiple frauds in their tracks but failed to do so."

Anton & Chia partner Richard J. Koch and former partner Rahuldev Gandhi settled SEC charges for their roles in the audits and interim reviews.  They each agreed to pay $15,000 penalties and be suspended from appearing and practicing before the SEC as an accountant, which includes not participating in the financial reporting or audits of public companies.  Gandhi is permitted to apply for possible reinstatement after three years and Koch can apply for possible reinstatement after two years.

The charges announced today are the product of multiple SEC investigations.  The investigations were conducted by Ariella O. Guardi, Christopher H. White, Pesach Glaser, Leslie Kazon, Bennett Ellenbogen, James Addison, Jennifer T. Calabrese, and Christopher Conte, and were supervised by Charles J. Kerstetter, Michael Paley, Rhoda Chang, and Victoria A. Levin.

The Enforcement Division's litigation will be conducted by Alyssa A. Qualls, Steven C. Seeger, David J. VanHavermaat, Leslie Kazon, Ariella O. Guardi, and John E. Birkenheier.   



^ed 

Thursday, January 25, 2018

DHS Looks to Collect Social Media Info for All Immigrants - Law and Daily Life

DHS Looks to Collect Social Media Info for All Immigrants - Law and Daily Life



DHS Looks to Collect Social Media Info for All Immigrants

A new rule will allow the Department of Homeland Security to gather social media information for immigrants, including "social media handles, aliases, associated identifiable information, and search results." While this might seem like a normal update to the vetting process for incoming visitors or visa applications, the rule would reportedly also apply to people who have already obtained a green card or completed the naturalization process.

Update Your Status

Buzzfeed first reported on the new rule, which was published in the Federal Register last week, and will go into effect October 18. DHS at that point will expand the categories of information it collects under its Alien File, Index, and National File Tracking System of Records to include "social media handles, aliases, associated identifiable information, and search results." And there are concerns as to the privacy implications of the new rule as well as its efficacy.

"We see this as part of a larger process of high-tech surveillance of immigrants and more and more people being subjected to social media screening," Adam Schwartz, an attorney with the Electronic Frontier Foundation told BuzzFeed News. "There's a growing trend at the Department of Homeland Security to be snooping on the social media of immigrants and foreigners and we think it's an invasion of privacy and deters freedom of speech."

Buzzfeed also reports that an Office of Inspector General report published in February found DHS pilot programs for using social media to screen applicants for immigration benefits "lack criteria for measuring performance to ensure they meet their objectives."

Like This Page

In May, the Trump administration authorized a new questionnaire for U.S. visa applicants that requests social media handles going back five years. So while we may know what information immigration officials want and how they will access it, how that information will be used in making immigration decisions remains to be seen.

Related Resources:



^ed 

Top 5 Dumb Crimes of 2017 - Legally Weird

Top 5 Dumb Crimes of 2017 - Legally Weird

Top 5 Dumb Crimes of 2017

Legally Weird - The FindLaw Legal Curiosities Blog

We cover some strange and stupid crimes here on Legally Weird, so it's always nice to have an opportunity to look back on the strangest and the stupidest. And the year-end gives us just that opportunity.

So here are five of the dumbest crimes and criminals we've written about this year, for your reading pleasure.

1. Arrested After Accidentally Texting Cops About Meth Delivery

The first rule about doing crime is to avoid police detection. And it's pretty hard to avoid detection if you're the one texting the cops offering to sell them crystal meth. The 37th rule of doing crime, coincidentally, is don't exchange phone numbers with the police officer that arrested you, just to avoid texting him offering to sell him crystal meth years later.

2. Baby Announcement Bomb Gets Future Father Charged With Crime

We all get excited when we're expecting. Not all of us build a binary, color powder-filled explosive target that we fire a bullet into to reveal the gender of our coming children. We also don't all call the cops to confess to exploding said target without a permit, either.

3. No Laughing Matter: Woman Inhales Laughing Gas in Front of Police, Gets Arrested

Do we need to revisit rule number one? Doing "Whip-its" in a hospital parking lot with a gun in the car is certainly not avoiding police detection. But the real dumb part of this crime is inhaling nitrous oxide in the first place.

4. Men Arrested for Snapchatting Abuse of Baby Alligator, Feeding It Beer

The cops are on social media. Don't put your crimes on social media. First rule of doing crime, people. And yes, capturing a baby gator, blowing smoke into its face, feeding it beer, and drinking beers off its tail is a crime.

5. Ah Yes, the Old Fake Home Invasion, Shoot Yourself Scam; a Classic

If I asked where two people who shot themselves and faked a home invasion in order to sue their property manager were from, your first guess would be Florida, right? And if I asked who undercut their claim of having $7,000 stolen from a safe by saying the pair don't have "two pennies to rub together," your first guess would be one of their dads, right:? Good guesses, both.

Related Resources:



^ed 

Wednesday, January 24, 2018

Casualties of War: Hired Guns in American Schools

Reality Bytes by @ELyssaD™: Casualties of War: Hired Guns in American Schools

Casualties of War: Hired Guns in American Schools

Casualties of War: Hired Guns in American Schools ©️ 1996 

 @ElyssaD


aka Chillieh Penguin 



Over the last decade, there has been mounting concern for the safety of teachers and students in the American public school system. This is particularly true of urban high schools, where students must walk through a metal detector before entering the building. School violence has become epidemic, and educational researchers have looked long and hard for a solution to the problem.

School administrators and elected officials bear the responsibility of keeping students safe during school hours, and a number of districts have implemented violence prevention programs. School security has become a top priority, and while improved security measures may have contributed to a decline in school related deaths, it has not been without significant changes in the school environment.

The added security has effected the traditional school environment by disrupting the chain of command within public institutions. The presence of school security guards appears to have a negative impact on the overall school climate. The presence of security guards disrupts traditional roles within the schools, and teachers report feeling at odds with security personnel. Increased security tends to fragment the school environment, and teachers report feeling a false sense of security. The secured environment is an indication of how students are expected to behave.

Under these conditions, it is not surprising to learn that students also report pervasive feelings of fear and do not feel secure despite the added presence of security personnel on school grounds. For these students, school is a mere extension of the violent communities in which they live.

Studies consistently report lower academic achievement in these neighborhoods. Children growing up in urban neighborhoods have a much higher incidence of posttraumatic stress disorder (PTSD). Most researchers believe this to be the direct result of living in stressed communities plagued with street crime and violence.

Despite the severe implications of this realization, there is virtually no research on how pervasive fear affects the academic performance of urban adolescents. Previous research has found that people who suffer from acute stress process information differently (Sapolsky, 1996; McNally, 1995; Metcalfe & Jacobs, 1996). Individuals who feel threatened by their environment are acutely aware of their surroundings and have a heightened sensitivity to visual cues. As a result, they tend to hyper-focus on potential sources of threat, and shift into a different cognitive gear.

Individuals under stress not only store information differently, but their ability to retrieve information is also largely dependent upon emotional states (Metcalfe & Jacobs, 1996; Sapolsky, 1996; Perry, et al, 1996). Interestingly enough, information learned in song, rhyme, or rap is more easily retrieved in a state of high arousal. If this is in fact true, then popular culture may affect adolescents considerably more than previously believed. In addition to helping us understand the cognitive framework of individuals under stress, this can help us to find alternatives teaching methods to help urban schoolchildren who have not responded to traditional teaching methods.

Research has found the school climate to be a critical factor in reduction of school violence (Walker, 1995; Sabo, 1993). Disruptions in the traditional organization structure places additional stress on the school climate. The effect of school violence on teacher relationships is not known. In response to the public outcry for action, school boards implemented violence prevention programs and zero tolerance policies long before there was a chance to evaluate the severity and prevalence of the problem. The literature tends to focus on classroom management and violence prevention programs (Ascher, 1994; Walker, 1995).

Literature on school violence tends to focus on statistics and incident reports that do not provide an adequate understanding of school related violence. The research on school violence fails to address the importance of the organizational culture and the various components that are critical to effective schools. It is not surprising that students are unable to learn in this environment.

Teachers have become fearful of their students, and students fear each other. The presence of school security will certainly affect the organizational balance of American public schools, and sensitizes all members of the school environment to the roles they are expected to play. Many teachers feel a social responsibility and commitment to their schools, and feel they have a direct impact on the livelihood of their student body.

Together, the urban public school and the community it serves are a constant reminder of the poor living conditions and social reality of urban America. Students understand what is expected of them, and teachers are sensitized to conduct which reinforces their experience. Since urban communities have many different sources of stress, it is important to examine how school policies contribute to the learning environment in public schools.


Time stamp: 1996 


edd, edm


^ed 

Sunday, January 21, 2018

12 Penguin Portraits Show Personality - Penguin Awareness Day 2018

12 Penguin Portraits Show Personality

January 20, 2018


Penguin Awareness Day


All you need to know about this Frisky Penguin is that there's a lot more beneath the surface, and you will never know me from a few random tweets or a random pic here and there. 


If I want your opinion, I'll ask. If I respect you you'll know. 


If you think I was angry before I went into the hospital? You should see me now! 


#HealthCareForAll


Love, 


Chilly, The Frisky Penguin 🐧 


https://news.nationalgeographic.com/2017/04/photo-ark-penguin-pictures/?utm_source=Twitter&utm_medium=Social&utm_content=link_tw20180120news-penguingallery&utm_campaign=Content&sf179752333=1

12 Penguin Portraits Show Personality

Picture of two penguins
Picture of a penguin
South Georgian King Penguin

A pair of South Georgia king penguins, Aptenodytes patagonicus patagonicus, show off their brilliant plumage. King penguins have four layers of feathers and huddle together for warmth.

Macaroni Penguin

The macaroni penguin, Eudyptes chrysolophus, gets its name from its trademark yellow and black crest, which resembles a style of hat from 18th-century England.

Little Blue Penguin

Two baby little blue penguins, Eudyptula minor, sport brown fuzzy feathers. The nocturnal species nests on land, often near human settlements.

King Penguin

The king penguin, Aptenodytes patagonicus, is an excellent diver, going as deep as a thousand feet in search of prey.

African Penguin

Also known as the jackass or black-footed penguin, the African penguin (pictured at the Bramble Park Zoo) live in large colonies along Africa's southwestern coast, from Namibia to South Africa.

Chinstrap Penguin

Five chinstrap penguins, Pygoscelis antarctica, gather at the Newport Aquarium. Named for the distinctive black band under their chins, chinstraps are the most abundant Antarctic penguin, breeding in huge colonies on the continent and islands in the South Atlantic.

Fiordland Crested Penguin

Considered endangered in New Zealand, the Fiordland crested penguin (pictured at the Taronga Zoo) is often preyed upon by introduced predators, such as the stoat.

Little Blue Penguin

A little blue penguin seems to pose at SPCA Bird Wing, a bird rehab center in Auckland, New Zealand.

Southern Rockhopper Penguin

Rockhoppers are found bounding—rather than waddling, as most other penguins do—among the craggy, windswept shorelines of the islands north of Antarctica, from Chile to New Zealand.

Humboldt Penguin

Found off Peru and Chile, this species has been steadily declining and is now considered vulnerable to extinction by the International Union for Conservation of Nature. Extreme weather and shifts in prey seem to be driving the decline.

Adélie Penguin

An Adélie penguin poses at the Faunia Zoo in Madrid, Spain. Both male and female penguins help rear the young and, without close inspection, the two sexes are nearly indistinguishable.

Gentoo Penguin

The long-tailed gentoo penguin, Pygoscelis papua, is most easily distinguished by the white, bonnet-like marking on its head.

With their charismatic nature, signature tuxedo look, and unique mating rituals, penguins are among Earth's most beloved creatures.

The 18 species differ greatly in size, from the four-foot-tall emperor penguins, regal birds native to the rugged coastlines of Antarctica, to the little blue penguin of southern Australia and New Zealand, which grow to just 13 inches tall. (See "On World Penguin Day, Could There Be a More Adorable Bird?")

Many penguins thrive in harsh climates, such as the Adélie, which has survived in Antarctica for nearly 45,000 years. Flightless and aquatic, penguins live almost entirely in the Southern Hemipshere, where they chase after small prey with expert diving and swimming skills.

Penguins are known for their remarkable relationship habits—for instance, the birds are largely monogamous despite spending most the year apart. During mating season, males will seek out the same female every year, despite the crowds of hundreds or even thousands of other birds that live in their colony.

Unfortunately, some penguins have fallen victim to the effects of climate change. Antarctic researchers believe that climate change will reduce their nesting habitat and supply of food, particularly krill.

Warming seas and rising regional air temperatures have already caused penguin populations to plunge by as much as 50 percent in the past three decades in the West Antarctic Peninsula and Scotia Sea.

Related Stories

For January 20, Penguin Awareness Day (not to be confused with World Penguin Day on April 25), we put together our best photographs of these gorgeous, comical birds.



^ed 

Wednesday, January 17, 2018

Pentagon Suggests Countering Devastating Cyberattacks With Nuclear Arms - The New York Times

Pentagon Suggests Countering Devastating Cyberattacks With Nuclear Arms - The New York Times

This stopped me dead in my tracks





Pentagon Suggests Countering Devastating Cyberattacks With Nuclear Arms

The Nuclear Posture Review was written at the Pentagon and is being reviewed by the White House.Charles Dharapak/Associated Press

WASHINGTON — A newly drafted United States nuclear strategy that has been sent to President Trump for approval would permit the use of nuclear weapons to respond to a wide range of devastating but non-nuclear attacks on American infrastructure, including what current and former government officials described as the most crippling kind of cyberattacks.

For decades, American presidents have threatened "first use" of nuclear weapons against enemies in only very narrow and limited circumstances, such as in response to the use of biological weapons against the United States. But the new document is the first to expand that to include attempts to destroy wide-reaching infrastructure, like a country's power grid or communications, that would be most vulnerable to cyberweapons.

The draft document, called the Nuclear Posture Review, was written at the Pentagon and is being reviewed by the White House. Its final release is expected in the coming weeks and represents a new look at the United States' nuclear strategy. The draft was first published last week by HuffPost.

It called the strategic picture facing the United States quite bleak, citing not only Russian and Chinese nuclear advances but advances made by North Korea and, potentially, Iran.

"We must look reality in the eye and see the world as it is, not as we wish it to be," the draft document said. The Trump administration's new initiative, it continued, "realigns our nuclear policy with a realistic assessment of the threats we face today and the uncertainties regarding the future security environment."

The Pentagon declined to comment on the draft assessment because Mr. Trump has not yet approved it. The White House also declined to comment.

But three current and former senior government officials said large cyberattacks against the United States and its interests would be included in the kinds of foreign aggression that could justify a nuclear response — though they stressed there would be other, more conventional options for retaliation. The officials spoke on the condition of anonymity because they are not authorized to discuss the proposed policy.

Gary Samore, who was a top nuclear adviser to President Barack Obama, said much of the draft strategy "repeats the essential elements of Obama declaratory policy word for word" — including its declaration that the United States would "only consider the use of nuclear weapons in extreme circumstances to defend the vital interests of the United States or its allies and partners."

But the biggest difference lies in new wording about what constitutes "extreme circumstances."

In the Trump administration's draft, those "circumstances could include significant non-nuclear strategic attacks." It said that could include "attacks on the U.S., allied, or partner civilian population or infrastructure, and attacks on U.S. or allied nuclear forces, their command and control, or warning and attack assessment capabilities."

The draft does not explicitly say that a crippling cyberattack against the United States would be among the extreme circumstances. But experts called a cyberattack one of the most efficient ways to paralyze systems like the power grid, cellphone networks and the backbone of the internet without using nuclear weapons.

"In 2001, we struggled with how to establish deterrence for terrorism because terrorists don't have populations or territory to hold at risk. Cyber poses a similar quandary," said Kori Schake, a senior National Security Council and State Department official during President George W. Bush's administration, who is now the deputy director general of the International Institute for Strategic Studies in London.

"So if cyber can cause physical malfunction of major infrastructure resulting in deaths," Ms. Schake said, the Pentagon has now found a way "to establish a deterrent dynamic."

The draft review also cites "particular concern" about "expanding threats in space and cyberspace" to the command-and-control systems of the American nuclear arsenal that the review identifies as a "legacy of the Cold War." It was the latest warning in a growing chorus that the nuclear response networks could themselves be disabled or fed false data in a cyberattack.

So far, all of the United States' leading adversaries — including Russia, China, North Korea and Iran — have stopped well short of the kind of cyberattacks that could prompt a larger, and more violent response.

The Russians have placed malware called "Black Energy" in American utility systems, but never tried to cause a major blackout. They have sent cable-cutting submarines along the path of undersea fiber optic lines that connect the continents, but not cut them. North Korea has attacked companies like Sony, and used cyberweapons to cause chaos in the British health care system, but never directly taken on the United States.

Still, the document recognizes that American, Russian and Chinese strategies have all been updated in recent years to reflect the reality that any conflict would begin with a lightning strike on space and communications systems. During the Obama administration, for example, a secret program, code-named "Nitro Zeus," called for a blinding cyberattack on Iran in the event negotiations over its nuclear program failed and Washington found itself going to war with Tehran.

There are other differences with the Obama administration policy.

The draft strategy embraces the American production of a new generation of small, low-yield nuclear weapons — some of which were under development during the Obama administration. Some experts warn that such smaller weapons can blur the distinction between nuclear and non-nuclear weapons, and, as a result, be more tempting to use.

And it states outright that Russia is testing its first autonomous nuclear torpedo, one that American officials believe would be guided largely by artificial intelligence to strike the United States even if communications with Moscow were terminated. It was Washington's first public acknowledgment of such an undersea weapon, a prototype of which was first envisioned in the 1960s by Andrei Sakharov, the physicist who later ranked among the Soviet Union's most famous dissidents.

The torpedo's development was detected by the Obama administration and has been widely discussed in defense circles, but never publicly referred to by the Pentagon as a significant future threat.

Mr. Trump has rarely publicly criticized President Vladimir V. Putin of Russia for Russia's aggressions around the world. But the Pentagon document describes Moscow's actions as so destabilizing that the United States may be forced to reverse Mr. Obama's commitment to reduce the role and size of the American nuclear arsenal.

Russia is adopting "military strategies and capabilities that rely on nuclear escalation for their success," Defense Secretary Jim Mattis wrote in an introduction to the report. "These developments, coupled with Russia's invasion of Crimea and nuclear threats against our allies, mark Moscow's unabashed return to Great Power competition."

In most cases, the Trump administration plan would simply move forward nuclear weapons that Mr. Obama had endorsed, such as a new generation of nuclear cruise missiles — low-flying weapons with stubby wings that, when dropped from a bomber, hug the ground to avoid enemy radars and air defenses.

But the strategy envisions other new nuclear weapons. The draft policy calls for "the rapid development" of a cruise missile to be fired from submarines. Mr. Obama had retired that class. It also calls for the development of a low-yield warhead for ballistic missiles fired from submarines.

It is relatively easy for presidents to change the country's declaratory policy on the use of nuclear arms and quite difficult for them to reshape its nuclear arsenal, which takes not only vast sums of money but many years and sometimes decades of planning and implementation.

The price tag for a 30-year makeover of the United States' nuclear arsenal was put last year at $1.2 trillion. Analysts said the expanded Trump administration plan would push the bill much higher, noting that firm estimates will have to wait until the proposed federal budget for the 2019 fiscal year is made public.

"Almost everything about this radical new policy will blur the line between nuclear and conventional," said Andrew C. Weber, an assistant defense secretary during the Obama administration who directed an interagency panel that oversaw the country's nuclear arsenal.

If adopted, he added, the new policy "will make nuclear war a lot more likely."

One of the document's edgiest conclusions involves the existence of a deadly new class of Russian nuclear torpedo — a cigar-shaped underwater missile meant to be fired from a submarine.

Torpedoes tipped with nuclear arms were common during the Cold War, with the Soviet Union pioneering the weapons and developing them most vigorously. One Soviet model had a range of miles and a large warhead.

Mr. Sakharov, a famous Russian dissident in the 1970s and 1980s, envisioned a giant torpedo able to travel several hundred miles and incur heavy casualties with a warhead thousands of times more powerful than the Hiroshima bomb. Though his vision was rejected at the time, the new review discloses that Moscow has resurrected a weapon along the same lines.

The document calls it "a new intercontinental, nuclear-armed undersea autonomous torpedo." In a diagram labeled "New Nuclear Delivery Vehicles over the Past Decade," it identifies the torpedo by its code name, Status-6.

News stories have reported the possible existence of such a weapon since at least 2015, but the document's reference appears to be the first time the federal government has confirmed its existence. The long-range torpedo with a monster warhead is apparently meant to shower coastal regions with deadly radioactivity, leaving cities uninhabitable.



^ed