pastebin - collaborative debugging

pastebin is a collaborative debugging tool allowing you to share and modify code snippets while chatting on IRC, IM or a message board.

This site is developed to XHTML and CSS2 W3C standards. If you see this paragraph, your browser does not support those standards and you need to upgrade. Visit WaSP for a variety of options.

n3tBin / Home / Archive

Copyright © 2007-2011, n3t-t3z Team

Posted by Electronic Healt on August Tue 19th 6:38 PM - Never Expires
download | new post

  1. Electronic Health Record Theft 08
  2.  
  3.    
  4. EYEBALLING AMERICA�S NEW MEDICAL DICTATORSHIP.
  5.  
  6.  
  7. � Hospital Hacked! Community Health Systems Says Personal Data
  8. Stolen in Cyber Attack, UPDATE: 4.5 Million Records Stolen ::
  9.  
  10.  US hospital operator Community Health Systems Inc said on Monday
  11. personal data, including patient names and addresses, of about 4.5
  12. million people were stolen by hackers from its computer network,
  13. likely in April and June.
  14.  
  15.  The company said the data, considered protected under the Health
  16. Insurance Portability and Accountability Act, included patient names,
  17. addresses, birth dates, telephone numbers and Social Security numbers.
  18. It did not include patient credit card or medical information (bull),
  19. Community Health Systems said in a regulatory filing.
  20.  
  21.  It said the security breach had affected about 4.5 million people who
  22. were referred for or received services from doctors affiliated with
  23. the hospital group in the last five years.
  24.  
  25.  The FBI warned healthcare providers in April that their cybersecurity
  26. systems were lax compared to other sectors, making them vulnerable to
  27. hackers looking for details that could be used to access bank accounts
  28. or obtain prescriptions, Reuters previously reported.
  29.  
  30.  The company said it and its security contractor, FireEye Inc unit
  31. Mandiant, believed the attackers originated from China. They did not
  32. provide further information about why they believed this was the case.
  33. They said they used malware and other technology to copy and transfer
  34. this data and information from its system.
  35.  
  36.  Community Health, which is one of the largest hospital operators in the
  37. country with 206 hospitals in 29 states, said it was working with federal
  38. law enforcement authorities in connection with their investigation into
  39. the attack. It said federal authorities said these attacks are typically
  40. aimed at gathering intellectual property, such as medical device and
  41. equipment development data.
  42.  
  43.  It said that prior to filing the regulatory document, it had eradicated
  44. the malware from its systems and finalized the implementation of remediation
  45. efforts. It is notifying patients and regulatory agencies as required by
  46. law, it said.
  47.  
  48.  It also said it is insured against such losses and does not at this time
  49. expect a material adverse effect on financial results.
  50.  
  51. http://www.reuters.com/article/2014/08/18/us-community-health-cybersecurity-idUSKBN0GI16N20140818
  52.  
  53. http://money.cnn.com/2014/08/18/technology/security/hospital-chs-hack/index.html
  54.  
  55.  
  56. � 400 Connecticut Health-Exchange Enrollees� Information
  57. May Be Compromised ::
  58.  
  59.  The personal information of around 400 health-exchange
  60. enrollees may be compromised, according to a statement
  61. issued today by Access Health CT CEO Kevin Counihan.
  62.  
  63.  The statement notes that a backpack was recovered in
  64. Hartford that held �four notepads with personal information
  65. for approximately 400 individuals. The backpack also
  66. contained Access Health CT paperwork and it appears as
  67. though some of that personal information may be associated
  68. with Access Health CT accounts. It is still unclear where
  69. the backpack came from, and we are working [with] the
  70. Hartford Police Department to investigate, and contact
  71. the individuals whose information may be compromised.
  72. � Let me be clear: we are sorry this happened. This is
  73. a very serious situation and we will hold the person or
  74. persons who are responsible to account.�
  75.  
  76.  Kathleen Tallarita, the government and public affairs
  77. outreach manager for Access Health CT, told National
  78. Review Online by phone that the health exchange does
  79. not know yet whether identity theft has occurred, but
  80. �we�re diligently looking into what�s happened.�
  81.  
  82.  The Connecticut health exchange conducts a background
  83. check on all navigators. While prior arrests or convictions
  84. do not necessarily disqualify an applicant from becoming a
  85. navigator, the health exchange has a policy against
  86. approving anyone who has falsified their criminal-history
  87. information or has committed a serious felony like fraud
  88. or larceny.
  89.  
  90.  According to records obtained by NRO in January, 21
  91. prospective navigators were flagged after their background
  92. check. Though most were dropped from the program, one was
  93. approved despite a class-B felony conviction 19 years
  94. earlier, and three were approved despite misdemeanors
  95. within the last decade. None of these four flagged
  96. navigators had convictions since, according to the
  97. records.
  98.  
  99. http://www.nationalreview.com/corner/379784/400-connecticut-health-exchange-enrollees-information-may-be-compromised-jillian-kay
  100.  
  101. � Control Freak Government Wants to Re-engineer Humans
  102. With Biometric Nanotechnologies ::
  103.  
  104.  Nanotechnology is probably not the reading material
  105. sitting on the coffee tables of most people. Yet, it
  106. is already beginning to have an impact on everything
  107. from electronics to alternative energy to food, cosmetics
  108. and clothing. In fact, several hundred common products
  109. contain nanomaterials, which has prompted lawsuits against
  110. the FDA for failure to properly regulate them.
  111.  
  112.  For futurists and Transhumanists, the human body is the
  113. final frontier.
  114.  
  115.  The nanotech revolution has been heavily invested in by
  116. the US government, as outlined in their National Nanotechnology
  117. Initiative Strategic Plan, which involves 20 federal agencies
  118. and partners. This must-read document lays out a projected
  119. future to understand and control matter for the management
  120. of every facet of the environment, health and safety.
  121.  
  122. http://nano.gov/sites/default/files/pub_resource/2014_nni_strategic_plan.pdf
  123.  
  124. http://www.activistpost.com/2014/05/nanotechnology-are-you-ready-to-be.html
  125. ??????????????????????????????????????
  126. � Federal Biosurveillance Plan Seeking Direct Access to
  127. Americans� Private Medical Records and Authority for
  128. �Nonpharmaceutical Interventions� �
  129.  
  130.  The federal government is piecing together a national
  131. �biosurveillance� system that will give bureaucrats
  132. near real-time access to Americans� private medical
  133. information in the name of �national security.�
  134.  
  135. These bureaucracies are noted within the document below.
  136.  
  137.  PHEMCE (Public Health Emergency Medical Countermeasures
  138. Enterprise), DHS (Department of Homeland Security), DoD
  139. (Department of Defense), USDA (Department of Agriculture),
  140. VA (Department of Veterans� Affairs), HHS (Department of
  141. Health and Human Services), ASPR (Assistant Secretary for
  142. Prepardness and Response), BARDA (Biomedical Advanced
  143. Research & Development Authority), CDC (Center for Disease
  144. and Control), FDA (Food and Drug Administration) and NIH
  145. (National Institutes of Health).
  146.  
  147. �Nonpharmaceutical Intervention� noted,
  148.  
  149.  �The term countermeasures refers to medical countermeasures
  150. (MCMs) and nonpharmaceutical interventions (NPIs) that may
  151. be used to limit the adverse health impacts of incidents.
  152. MCMs include vaccines, antimicrobials, diagnostics, and
  153. ventilators, while NPIs include personal interventions,
  154. such as hand hygiene and respiratory etiquette, as well as
  155. community-level interventions for social distancing, such
  156. as school closures and promoting telework.�
  157.  
  158.  �Effective implementation of NPIs requires planning and
  159. preparation to identify effective interventions, the
  160. situations in which they should be deployed, and methods
  161. for monitoring their effects. � � More research is needed
  162. to inform decisions regarding which interventions are most
  163. effective under specific circumstances; to identify, understand,
  164. and plan to mitigate the potential secondary effects of the
  165. interventions; and to determine their feasibility.�
  166.  
  167.  (As most people now know, vaccines often contain mercury and
  168. other toxic chemicals and in some cases live viruses (yes, live)
  169. have been identified ie GlaxoSmithKline�s flu vaccines. Those
  170. vaccines are far more dangerous than risk of catching disease.
  171. http://www.naturalnews.com/vaccines.html)
  172.  
  173. http://cnsnews.com/sites/default/files/documents/Draft%20National%20Health%20Security%20Strategy%202015-2018.pdf
  174.  
  175. http://cnsnews.com/news/article/barbara-hollingsworth/federal-biosurveillance-plan-seeking-direct-access-americans
  176.  
  177. � Propublica Peddles Electronic Health Records �
  178.  
  179. https://projects.propublica.org/data-store/
  180.  
  181. � Man�s Personal Information Stolen After Using
  182. Healthcare.gov ::
  183.  
  184.  A Virginia man�s personal information has been
  185. stolen after he signed up for Obamacare on the
  186. healthcare.gov website. Now, he�s questioning if
  187. the website is the reason why.
  188.  
  189. http://www.youtube.com/watch?v=wsSCxT_rv1M
  190.  
  191. http://capitolcityproject.com/mans-personal-info-stolen-using-obamacare-website/
  192.  
  193. � Obamacare Computers Vulnerable to Espionage �
  194.  
  195.  Healthcare dot gov has a new problem. The Obama
  196. regime gave a contract to Belarus to build
  197. software into the system. Belarus, a close ally
  198. of Vladimir Putin, is a communist dictatorship
  199. that is known for global theft operations through
  200. cyber attacks. Our intelligence agencies didn�t
  201. even find out until they heard a radio show in
  202. Belarus.
  203.  
  204.  The Obama regime used developers with ties to
  205. Belarus in the making of the healthcare network
  206. causing concern at US intelligence agencies,
  207. who are urging the Administration to scan the
  208. sites for malicious software.
  209.  
  210.  Millions of Americans and more than 300 medial
  211. facilities and providers might have had their
  212. personal information compromised.
  213.  
  214.  Belarus is closely allied with Russia and they
  215. are suspected of inserting malicious code that
  216. could be used for cyber attacks.
  217.  
  218.  Last year, Belarus, a repressive dictatorship,
  219. diverted massive amounts of US traffic to Belarus.
  220. They stole $1.8M from 20,000 people across the
  221. globe-with 80% of the thefts coming from Americans
  222. in the US.
  223.  
  224. Oh, and Belarus� President Likashenko hates us.
  225.  
  226. http://freebeacon.com/the-belarusian-connection/
  227.  
  228. http://www.independentsentinel.com/us-gave-belarus-the-opportunity-to-build-malware-into-healthcare-gov/
  229.  
  230. � Hacker Breaks Into HealthCare.gov in 4 Minutes �
  231.  
  232.  The man who appeared before Congress last week
  233. to explain the security pitfalls of HealthCare.gov
  234. took to Fox News on Sunday to explain just how easy
  235. it was to penetrate the website.
  236.  
  237.  Hacking expert David Kennedy told Fox�s Chris
  238. Wallace that gaining access to 70,000 personal
  239. records of Obamacare enrollees via HealthCare.gov
  240. took about 4 minutes and required nothing more
  241. than a standard browser, the Daily Caller reported.
  242.  
  243.  �And 70,000 was just one of the numbers that I
  244. was able to go up to and I stopped after that,�
  245. he said. �You know, I�m sure it�s hundreds of
  246. thousands, if not more, and it was done within
  247. about a 4 minute timeframe. So, it�s just wide
  248. open.�
  249.  
  250.  �You can literally just open up your browser,
  251. go to this, and extract all this information
  252. without actually having to hack the website
  253. itself,� he said.
  254.  
  255. http://dailycaller.com/2014/01/19/top-hacker-reveals-how-he-cracked-obamacare-site-in-under-4-minutes/
  256.  
  257. http://www.washingtontimes.com/news/2014/jan/19/hacking-expert-david-kennedy-says-he-cracked-healt/
  258.  
  259. � Obamacare Website Plagued �
  260.  
  261. http://www.infowars.com/obamacare-website-plagued-by-security-problems/
  262.  
  263. � No Security Ever Built Into Obamacare Site �
  264.  
  265.  It could take a year to secure the risk of
  266. high exposures of personal information on
  267. the federal Obamacare online exchange, a
  268. cybersecurity expert told CNBC on Monday.
  269.  
  270.  �When you develop a website, you develop
  271. it with security in mind. And it doesn�t
  272. appear to have happened this time,� said
  273. David Kennedy, a so-called �white hat hacker
  274. who tests online security by breaching websites.
  275. He testified on Capitol Hill about the flaws
  276. of HealthCare.gov last week.
  277.  
  278.  �It�s really hard to go back and fix the
  279. security around it because security wasn�t
  280. built into it,� said Kennedy, chief executive
  281. of TrustedSec. �We�re talking multiple months
  282. to over a year to at least address some of
  283. the critical-to-high exposures on the website
  284. itself.�
  285.  
  286. http://www.cnbc.com/id/101225308
  287.  
  288.  Last month, a Sept. 27 government memorandum
  289. surfaced in which two HHS officials said the
  290. security of the site had not been properly
  291. tested before it opened, creating a high risk.
  292.  
  293. http://www.reuters.com/article/2013/11/19/usa-healthcare-security-idUSL2N0J40W320131119
  294.  
  295. � New Health Care Gestapo in California Raises
  296. Privacy Concerns �
  297.  
  298.  The government wants almost everything they
  299. do to be secret (including spying on people) -
  300. but they care less about jeopardizing personal
  301. information from countless amounts of innocent
  302. civilians. This is yet another eye-opener.
  303.  
  304. http://www.sacbee.com/2013/12/01/5959979/in-california-efforts-to-reduce.html
  305. http://www.dailybinarynews.com/covered-calif-seeks-consumer-data-triggers-privacy-concerns/
  306. http://www.californiahealthline.org/articles/2013/12/2/covered-calif-seeks-consumer-data-triggers-privacy-concerns
  307.  
  308. � Digital Medical Devices Next Frontier
  309. in Cybercrime �
  310.  
  311.  If you think it�s enough of a chore
  312. trying to stop thieves stealing your
  313. credit card details and hacking your
  314. Facebook, imagine trying to stop them
  315. getting into your pancreas.
  316.  
  317.  Advances in healthcare mean that in-body
  318. devices to treat chronic conditions or
  319. even just make you perform better as a
  320. human being are not as far away as you
  321. might imagine.
  322.  
  323. http://qz.com/130226/your-body-is-the-next-frontier-in-cybercrime/
  324.  
  325. � HealthCare.gov Third Party Spying �
  326.  
  327.  Here�s more evidence of cutting corners
  328. during the development of the Healthcare.gov
  329. insurance marketplace: the website appears
  330. to be violating its own privacy policy
  331. by sending private user information to
  332. third parties.
  333.  
  334.  Security researcher Ben Simo noticed
  335. that Healthcare.gov was sending his user
  336. name and password reset code to third
  337. party partners including the analytics
  338. services Pingdom, DoubleClick, and
  339. Google Analytics.
  340.  
  341. http://www.theverge.com/2013/10/31/5047932/healthcare-gov-transferring-private-user-information-third-parties
  342.  
  343. http://www.dailybinarynews.com/healthcare-gov-sends-user-information-to-third-parties-violating-its-own/
  344.  
  345. � HealthCare.gov Breach of Privacy �
  346.  
  347. http://www.dailybinarynews.com/healthcare-gov-users-see-breach-of-privacy
  348.  
  349. http://www.wnd.com/2013/11/healthcare-gov-users-see-breach-of-privacy/?cat_orig=us
  350.  
  351. � HealthCare.gov Users Warn of Security
  352. Risk, Breach of Privacy �
  353.  
  354. http://blog.heritage.org/2013/11/02/exclusive-healthcare-gov-users-warn-of-security-risk-breach-of-privacy/
  355.  
  356. � Medical Privacy Rights are Violated �
  357.  
  358.  Obama�s signature program is rife with
  359. inequities. It makes a dysfunctional
  360. system worse.
  361.  
  362.  It rations healthcare. It�s unaffordable.
  363. It leaves millions uninsured. It leaves
  364. millions more underinsured. It compromises
  365. privacy. A little noticed disclaimer states:
  366.  
  367.  �You have no reasonable expectation of
  368. privacy regarding any communication or
  369. data transmitting or stored on this
  370. information system.�
  371.  
  372. http://www.globalresearch.ca/obamacare-fallout-medical-privacy-rights-are-violated/5355694
  373.  
  374. http://www.dailybinarynews.com/obamacare-fallout-medical-privacy-rights-are-violated/
  375.  
  376. � Mike Rogers Admits Healthcare.gov Has
  377. No Security From Data Theft �
  378.  
  379.  �It was very clear to me in the hearing
  380. that they don�t have an overarching
  381. solid cybersecurity plan to prevent
  382. the loss of private information,� he
  383. said Sunday morning on CNN�s �State
  384. of the Union.�
  385.  
  386. http://thehill.com/video/sunday-shows/330797-rep-rogers-worried-healthcaregov-doesnt-have-solid-cybersecurity-plan
  387.  
  388. � Obamacare ; a Massive Privacy Breach
  389. Waiting to Happen �
  390.  
  391.  We already know that, thanks to the law,
  392. health care premiums are rising. Jobs
  393. are being lost. And the quality of health
  394. care itself will decline. But it�s only
  395. a matter of time before the law causes
  396. another crisis: a national breach of
  397. individual privacy.
  398.  
  399.  Fears of data breaches are real; the
  400. health and financial information of
  401. millions of Americans are housed in a
  402. massive federal government database
  403. called the �Data Hub.� That database
  404. will provide information to each state�s
  405. health care exchange, where individuals
  406. and small businesses are expected to
  407. purchase insurance plans online.
  408.  
  409. http://dailycaller.com/2013/10/15/obamacare-a-massive-privacy-breach-waiting-to-happen/
  410.  
  411. http://www.dailybinarynews.com/obamacare-a-massive-privacy-breach-waiting-to-happen/
  412.  
  413. � Obamacare Market ; Personal Data Can
  414. Be Used for Law Enforcement and to Audit
  415. Users� Online Activities �
  416.  
  417.  �The only exception to this policy is
  418. that we may share information provided
  419. in your application with the appropriate
  420. authorities for law enforcement and audit
  421. activities.�
  422.  
  423.  �If you send us an e-mail, we use the
  424. information you send us to respond to
  425. your inquiry. E-mail correspondence may
  426. become a public record. As a public
  427. record, your correspondence could be
  428. disclosed to other parties upon their
  429. request in accordance with Maryland�s
  430. Public Information Act.�
  431.  
  432. http://www.weeklystandard.com/blogs/obamacare-marketplace-personal-data-can-be-used-law-enforcement-and-audit-activities_762237.html
  433.  
  434. � Warning! Enrolling in Obamacare Allows
  435. Government to Link You�re IP Address With
  436. You�re Name and Personal Information �
  437.  
  438.  We have already established that
  439. Healthcare.gov is not a functioning
  440. database application that allows people
  441. to shop for competing health plans. It
  442. is actually a government-run Trojan Horse
  443. that suckers people into creating accounts
  444. where they hand over ;
  445.  
  446. � Name and address
  447. � Email address and password
  448. � Social Security number
  449. � Private bank account details
  450. � Employer details and other information
  451.  
  452.  This IP address is then handed over to
  453. the NSA (and many others) where your IP
  454. is cross-referenced with all website
  455. visits, including ;
  456.  
  457. � �Anti-government� websites (news)
  458. � Porn sites
  459. � Gambling sites
  460. � File sharing sites
  461. � �Terrorism� support sites
  462. � Encryption service sites like Hushmail
  463. � Chat rooms, message boards and more
  464.  
  465.  This includes access to all system
  466. and web browser logs, cache, cookies.
  467.  
  468. � We Are Living In Orwell�s Nightmare �
  469.  
  470.  If the IRS or NSA scandals involving
  471. misuse of private data were troubling,
  472. consider the implications of the new
  473. information databases created in the
  474. name of health care. The newly-launched
  475. Affordable Care Act creates a massive
  476. electronic registry of private information
  477. that is accessible to bureaucrats in
  478. agencies ranging from the IRS to the
  479. Department of Homeland Security. Its
  480. a wonder how Americans who are becoming
  481. increasingly concerned with federal
  482. surveillance and domestic spying programs
  483. could in any way approve of the so-called
  484. Obamacare law.
  485.  
  486. http://warforourmind.com/obamacare-law-creates-data-services-hub-and-tracks-social-and-behavioral-data/
  487.  
  488. � Javascript Code From healthcare.gov �
  489.  
  490. https://www.healthcare.gov/marketplace/global/en_US/registration.js
  491.  
  492.  Javascript code reveals details of
  493. what kind of information is requested
  494. from corporate third-parties ;
  495.  
  496. � Driver�s license
  497. � Zip code
  498. � State ID
  499. � Mortgage payment receipt
  500. � Mortgage deed showing primary residency
  501. � Lease agreement
  502. � School enrollment documentation
  503. � Utility bills
  504. � Social Security card
  505. � Social Security statement, SSA 1099
  506. � US passport
  507. � US public birth record
  508. � Certification of Report of Birth
  509. � Consular Report of Birth Abroad
  510. � Certification of Birth Abroad
  511. � US Citizen Identification Card
  512. � American Indian Card (I-872)
  513. � Certificate of Naturalization
  514. � Certificate of Citizenship
  515. � Cost of living verification
  516. � Military identification card
  517. � Letter from Veterans Administration
  518. � Email accounts
  519. � Tax form(s)
  520. � Wages and tax statements (W-2)
  521.  
  522. Questions they ask you include ;
  523.  
  524. � What is the first name of your oldest
  525. niece?
  526.  
  527. � What is a relative�s telephone number
  528. that is not your own?
  529.  
  530. � What is the name of your favorite pet?
  531.  
  532. � Type a significant date in your life?
  533.  
  534. � In what city was your mother born?
  535.  
  536. � What is the name of your favorite
  537. childhood friend?
  538.  
  539. � What is your parents� wedding
  540. anniversary date?
  541.  
  542. � What is the name of the manager at
  543. your first job?
  544.  
  545. � What is the nick name of your
  546. grandmother?
  547.  
  548. � What is your favorite radio station?
  549.  
  550. � What is your favorite cuisine?
  551.  
  552. � What was your favorite toy when you
  553. were a child?
  554.  
  555. ? Javascript Code All Fucked Up �
  556.  
  557. http://www.cbsnews.com/8301-505269_162-57606633/obamacare-website-looks-like-nobody-tested-it-programmer-says/
  558.  
  559. � Obamacare�s Privacy Nightmare �
  560.  
  561. http://www.nationalreview.com/article/360249/obamacares-privacy-nightmare-sean-riley-ed-walton
  562.  
  563. � Public Waking Up to Threat of Digital
  564. Health Records �
  565.  
  566.  �Like any other kind of customer data,
  567. it gets bought and sold and you have
  568. no idea where it went.�
  569.  
  570. http://www.foxnews.com/politics/2013/10/02/obamacare-reg-on-digital-patient-records-raises-security-concerns/
  571.  
  572.  As more health-related data is digitized,
  573. �the privacy violations are going to
  574. be incalculable,� Jim Pyles, an expert
  575. in health law who co-founded the law
  576. firm Powers Pyles Sutter & Verville,
  577. told CBSNews.com.
  578.  
  579. http://www.cbsnews.com/8301-250_162-57605564/obamacare-marketplaces-raise-data-security-concerns/
  580.  
  581. � HHS Data Hub is by NO Means Secure �
  582.  
  583. http://blog.heritage.org/2013/10/02/cyber-failures-in-obamacare-exchanges-dangerous-to-your-wallet-and-privacy/
  584.  
  585. http://www.dailybinarynews.com/cyber-failures-in-obamacare-exchanges-dangerous-to-your-wallet-and-privacy/
  586.  
  587. � HHS-Run Website Hacked Again �
  588.  
  589. http://www.weeklystandard.com/blogs/hhs-run-website-hacked-now-selling-nfl-jerseys-ugg-boots-armani-fragrances_759213.html
  590.  
  591. � McAfee Anti-virus ; Beware of ObamaCare
  592. Phishing Scams, Data Theft �
  593.  
  594.  Security firm McAfee warned Tuesday
  595. that hackers are likely to take advantage
  596. of the rollout of ObamaCare exchanges
  597. this week by launching phishing attacks
  598. aimed at stealing personal information.
  599.  
  600.  Both Democrats and Republicans have
  601. chosen to keep their mouths shut about
  602. the problems regarding personal data
  603. theft due to digitized insurance laws.
  604.  
  605.  Not so surprising though, considering
  606. both parties have engaged in efforts
  607. to enforce massive secret surveillance.
  608.  
  609.  Of course, this may be the reason behind
  610. a so-called �shutdown� - so politicians
  611. can take their vacations and let the
  612. public deal with this mess they created.
  613.  
  614. http://www.foxbusiness.com/industries/2013/10/01/mcafee-warns-phishing-scams-tied-to-obamacare-launch/
  615.  
  616. http://www.newsmax.com/Newsfront/Obamacare-exchanges-hackers-phishing/2013/10/01/id/528788
  617.  
  618. � Welcome to An Era of ZERO Privacy �
  619.  
  620.  Obamacare not only opens up all Americans
  621. to obvious cyber threats nationally, but
  622. also globally. Welcome to a world where
  623. anyone can find out ANYTHING about you.
  624.  
  625. http://www.infowars.com/obamacare-the-identity-thief-wolves-are-at-the-door/
  626.  
  627. � Obamacare Rolling Out Medical Gestapo
  628. as Social Workers Go Door-to-Door With
  629. Access to All Our Personal Information �
  630.  
  631.  Even �users of tobacco products in the
  632. home� will be targeted for �assessment.�
  633.  
  634. http://www.pakalertpress.com/2013/09/30/are-you-ready-for-obamacare-home-visits/
  635.  
  636.  Under Obamacare, the Department of
  637. Health and Human Services (HHS) is
  638. implementing a �Navigator� program,
  639. which provides millions of dollars
  640. to non-profit groups nationwide to
  641. hire �Navigators� who will advise
  642. Americans on their Obamacare health
  643. �options� based on the sensitive
  644. information provided.
  645.  
  646.  This sensitive information includes
  647. social security numbers, income levels,
  648. employment history and home addresses,
  649. all of which are more than enough to
  650. steal Americans� identities for complete
  651. access to their credit and financial
  652. resources.
  653.  
  654. http://www.infowars.com/door-to-door-identity-theft-likely-under-obamacare/
  655.  
  656.  In a Sept. 20 letter to HHS, the US
  657. House Committee on Energy and Commerce
  658. asked the department to respond to its
  659. concerns over the �rushed implementation�
  660. of its Navigator program, including
  661. plans by non-profit groups to �engage
  662. in enrollment activities that increase
  663. the likelihood of fraud or abuse,
  664. including door-to-door contacts.�
  665.  
  666. http://energycommerce.house.gov/sites/republicans.energycommerce.house.gov/files/letters/20130920CCIIO.pdf
  667.  
  668.  �The recipient of one of the largest
  669. Navigator grants explained in their
  670. application that they expected a
  671. substantial portion of their program
  672. to involve door-to-door contacts,� the
  673. letter stated. �Another described their
  674. work plan as involving �door-to-door
  675. outreach to 10,000 households per week.��
  676.  
  677. � DEA Gestapo Brags Electronic Health
  678. Records Are Given to Third-parties and
  679. Slaves Should Not Expect Privacy �
  680.  
  681.  In response to a lawsuit, the Drug
  682. Enforcement Agency brags that patients
  683. should have �no expectation of privacy�
  684. regarding their health information once
  685. it is given to a pharmacy or any third
  686. party, United Press International reports.
  687.  
  688.  In the lawsuit, the American Civil
  689. Liberties Union represents a doctor
  690. and four patients in Oregon whose medical
  691. records are located in a state database
  692. used by physicians to help curb prescription
  693. drug misuse.
  694.  
  695.  According to UPI, personal health information
  696. stored in the database might include Gender
  697. identity, HIV status and mental illness.
  698.  
  699.  DEA has requested information from the
  700. database through subpoenas rather than
  701. probable cause warrants as required by
  702. state law.
  703.  
  704. http://www.upi.com/blog/2013/09/24/DEA-Medical-records-sent-to-pharmacies-have-no-protected-privacy/7221380050479/
  705. http://www.ihealthbeat.org/articles/2013/9/27/dea-no-privacy-protections-for-rx-records-given-to-third-parties
  706. https://www.aclu.org/technology-and-liberty/oregon-prescription-drug-monitoring-program-v-drug-enforcement-administrat-26
  707.  
  708. � HHS Data Hub Brokers Hacked �
  709.  
  710.  A service that sells personal data to
  711. identity thieves has been getting its
  712. wares from hacked data brokers storing
  713. information similar to what Obamacare
  714. marketplaces plan to use, setting the
  715. scene for fraudsters to collect government
  716. subsidies.
  717.  
  718.  According to a new investigative report
  719. by cybersecurity researcher Brian Krebs,
  720. the service, known as SSNDOB, hacked
  721. LexisNexis and other large data aggregators
  722. that supply ID check information.
  723.  
  724.  The certification site �is constantly
  725. crashing. It�s been a complete pain,�
  726. said Wes Bissett, senior counsel for
  727. state government affairs at the Independent
  728. Insurance Agents and Brokers of America.
  729.  
  730.  Criminals can get their hands on anyone�s
  731. �identity information through the black
  732. market exchanges that Krebs writes about.
  733. Frankly, it�s another ominous and bad
  734. sign for Obamacare, since as I understand
  735. it, the new health care insurance exchanges
  736. will be using the same [knowledge-based
  737. authentication] to verify applicants for
  738. healthcare insurance,� Litan wrote in
  739. her blog post.
  740.  
  741. http://krebsonsecurity.com/2013/09/data-broker-giants-hacked-by-id-theft-service/
  742. http://www.nextgov.com/health/2013/09/hacked-data-brokers-could-spell-trouble-obamacare/70958/
  743. http://blogs.gartner.com/avivah-litan/2013/09/25/knowledge-based-authentication-breached-big-time-another-dagger-for-obamacare-the-banks-and-many-others/
  744. http://www.washingtonpost.com/national/health-science/reports-of-computer-problems-and-logistical-glitches-proceed-launch-of-obamacare/2013/09/27/4ca18dcc-2792-11e3-b3e9-d97fb087acd6_print.html
  745.  
  746. � Patient Privacy Goes Out the Window
  747. and Into the HHS Data Hub �
  748.  
  749. http://www.dailybinarynews.com/patient-privacy-goes-out-the-window-and-into-the-obamacare-data-hub/
  750.  
  751. � Start Shunning the Doctors, Providers �
  752.  
  753.  Of course electronic health records are
  754. involved in this latest information grab.
  755. For those who don�t know, as part of Prez
  756. Obama�s stimulus bill, The American Recovery
  757. and Reinvestment Act of 2009, he included
  758. the Health Information Technology and
  759. Economic and Clinical Health (HITECH) Act,
  760. which attempts to get every doctor and
  761. hospital to use electronic health records
  762. instead of paper records through the use
  763. of incentives (read government funding)
  764. and penalties for non-compliance.
  765.  
  766.  Senators Alexander, Burr, Coburn, Enzi,
  767. Roberts, and Thune produced a report about
  768. the difficulties involved in implementing
  769. the HITECH Act. The top five problems they
  770. found are: lack of a clear path toward
  771. interoperability, increased costs, lack
  772. of oversight, putting patient privacy at
  773. risk, and program sustainability.
  774.  
  775. http://www.thune.senate.gov/public/index.cfm/files/serve?File_id=0cf0490e-76af-4934-b534-83f5613c7370
  776.  
  777. � Hows You�re Sex Life? �
  778.  
  779. http://nypost.com/2013/09/15/obamacare-will-question-your-sex-life/
  780.  
  781. � Obamacare Federal Exchanges Will NOT
  782. Be Protected �
  783.  
  784. http://www.weeklystandard.com/blogs/mcconnell-dont-open-obamacare-exchanges-if-privacy-isnt-protected_745961.html
  785.  
  786. � Obamacare IT Lacks Data Security �
  787.  
  788.  The most likely serious security breach
  789. would be identity theft, in which a hacker
  790. steals the social security numbers and
  791. other information people provide when
  792. signing up for insurance.
  793.  
  794. http://www.reuters.com/article/2013/08/06/us-usa-healthcare-security-idUSBRE9750YH20130806
  795.  
  796. � MEDICAL DICTATORSHIP ; Here Comes
  797. Obamacare Big Brother Database �
  798.  
  799.  Would you trust thousands of low-level
  800. Federal bureaucrats and contractors
  801. with one-touch access to your private
  802. financial and medical information?
  803. Under Obamacare you won�t have any
  804. choice.
  805.  
  806.  As the Obamacare train-wreck begins
  807. to gather steam, there is increasing
  808. concern in Congress over something
  809. called the Federal Data Services Hub.
  810. The Data Hub is a comprehensive
  811. database of personal information
  812. being established by the Department
  813. of Health and Human Services (HHS)
  814. to implement the federally facilitated
  815. health insurance exchanges. The
  816. purpose of the Data Hub, according
  817. to a June 2013 Government Accountability
  818. Office (GAO) report, is to provide
  819. �electronic, near real-time access
  820. to federal data� and �access to state
  821. and third party data sources needed
  822. to verify consumer-eligibility
  823. information.� In these days of secret
  824. domestic surveillance by the intelligence
  825. community, rogue IRS officials and state
  826. tax agencies using private information
  827. for political purposes, and police
  828. electronically logging every license
  829. plate that passes by, the idea of the
  830. centralized Data Hub is making lawmakers
  831. and citizens nervous.
  832.  
  833. http://rare.us/story/move-over-nsa-here-comes-the-obamacare-big-brother-database/
  834. http://www.wric.com/story/22641990/federal-data-services-hub-does-exist-aishealthcom-blog-post-reports
  835. http://www.nationalreview.com/article/354031/obamacares-branch-nsa-john-fund
  836.  
  837. � Federal Requirements to Exchange Information
  838. to/from the HHS Federal Data Services Hub �
  839.  
  840. http://www.nescies.org/sites/www.nescies.org/files/HHS%20-%20Hub%20Statement%20of%20Work%20.pdf
  841.  
  842. � Implantable Medical Devices Planned for
  843. Data Theft Markets, 2008 �
  844.  
  845. https://spqr.eecs.umich.edu/papers/b1kohFINAL2.pdf
  846.  
  847. � NO PRIVACY ; 94 Percent of Healthcare
  848. Organizations Breached �
  849.  
  850. http://threatpost.com/en_us/blogs/study-94-percent-healthcare-organizations-breached-010313
  851.  
  852. http://www2.idexpertscorp.com/assets/uploads/ponemon2012/Third_Annual_Study_on_Patient_Privacy_FINAL.pdf
  853.  
  854. � FDA Provides $50,000,000 Healthcare
  855. Contact for Scientific Computing �
  856.  
  857. http://washingtontechnology.com/articles/2013/01/04/drc-fda-work.aspx
  858.  
  859. � FDA Seeks Unique ID to Spy Medical Devices �
  860.  
  861. http://cryptome.org/2012/07/fda071012.pdf
  862.  
  863. � Electronic Health Records Implementation �
  864.  
  865. http://cryptome.org/0002/hhs072810.htm
  866.  
  867. � Accenture Corporation Explores Medical
  868. Smart Grid Technocracy �
  869.  
  870. http://www.accenture.com/NR/rdonlyres/350E5873-836E-4592-BC49-FDFF6B79065E/0/Accenture_Innovation_Center_Health_How_Technology_Will_Transform_Future_of_Chronic_Care.pdf
  871. ????????????????????????????????????????
  872. ????????????????????????????????????????

Submit a correction or amendment below. (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.
Syntax Highlighting:
To highlight particular lines, prefix each line with @@
Pressing TAB inserts 3 spaces