pastebin - collaborative debugging

pastebin is a collaborative debugging tool allowing you to share and modify code snippets while chatting on IRC, IM or a message board.

This site is developed to XHTML and CSS2 W3C standards. If you see this paragraph, your browser does not support those standards and you need to upgrade. Visit WaSP for a variety of options.

n3tBin / Home / Archive

Copyright © 2007-2011, n3t-t3z Team

Posted by Electronic Healt on September Fri 5th 4:11 AM - Never Expires
download | new post

  1.    
  2. EYEBALLING AMERICA�S NEW MEDICAL DICTATORSHIP.
  3.  
  4.  
  5. � HealthCare.gov Hacked Again! ::
  6.  
  7.  A computer server hosting information for Healthcare.gov, the flagship
  8. Obamacare website that millions of Americans have trusted with their social
  9. security numbers, income totals and other sensitive personal information,
  10. was the subject of a hacker attack earlier this summer, officials said Thursday.
  11.  
  12.  The federal government wasn�t aware it had been hacked on July 8 until
  13. just ten days ago.
  14.  
  15.  The powerful House Oversight and Government Reform Committee announced
  16. Thursday afternoon that it has ordered Centers for Medicare and Medicaid
  17. Services (CMS) chief Marilyn Tavenner to testify in a September 18 hearing
  18. about the Obamacare website�s security lapses.
  19.  
  20. Likely nothing is going to happen and Americans will still be getting hacked.
  21.  
  22. The only solution would be a national boycott.
  23.  
  24. http://www.marketwatch.com/story/hacker-breached-healthcaregov-insurance-site-2014-09-04-161031834
  25.  
  26. http://www.dailymail.co.uk/news/article-2744241/Foreigners-hacked-Obamacare-website-July-HHS-just-discovered-10-days-ago-claims-no-consumer-data-stolen.html
  27. ??????????????????????????????????????
  28. � Hospital Hacked! Community Health Systems Says Personal Data
  29. Stolen in Cyber Attack, UPDATE: 4.5 Million Records Stolen �
  30.  
  31.  US hospital operator Community Health Systems Inc said on Monday
  32. personal data, including patient names and addresses, of about 4.5
  33. million people were stolen by hackers from its computer network,
  34. likely in April and June.
  35.  
  36.  The company said the data, considered protected under the Health
  37. Insurance Portability and Accountability Act, included patient names,
  38. addresses, birth dates, telephone numbers and Social Security numbers.
  39. It did not include patient credit card or medical information (bull),
  40. Community Health Systems said in a regulatory filing.
  41.  
  42.  It said the security breach had affected about 4.5 million people who
  43. were referred for or received services from doctors affiliated with
  44. the hospital group in the last five years.
  45.  
  46.  The FBI warned healthcare providers in April that their cybersecurity
  47. systems were lax compared to other sectors, making them vulnerable to
  48. hackers looking for details that could be used to access bank accounts
  49. or obtain prescriptions, Reuters previously reported.
  50.  
  51.  The company said it and its security contractor, FireEye Inc unit
  52. Mandiant, believed the attackers originated from China. They did not
  53. provide further information about why they believed this was the case.
  54. They said they used malware and other technology to copy and transfer
  55. this data and information from its system.
  56.  
  57.  Community Health, which is one of the largest hospital operators in the
  58. country with 206 hospitals in 29 states, said it was working with federal
  59. law enforcement authorities in connection with their investigation into
  60. the attack. It said federal authorities said these attacks are typically
  61. aimed at gathering intellectual property, such as medical device and
  62. equipment development data.
  63.  
  64.  It said that prior to filing the regulatory document, it had eradicated
  65. the malware from its systems and finalized the implementation of remediation
  66. efforts. It is notifying patients and regulatory agencies as required by
  67. law, it said.
  68.  
  69.  It also said it is insured against such losses and does not at this time
  70. expect a material adverse effect on financial results.
  71.  
  72. http://www.reuters.com/article/2014/08/18/us-community-health-cybersecurity-idUSKBN0GI16N20140818
  73.  
  74. http://money.cnn.com/2014/08/18/technology/security/hospital-chs-hack/index.html
  75.  
  76. � 400 Connecticut Health-Exchange Enrollees� Information
  77. May Be Compromised �
  78.  
  79.  The personal information of around 400 health-exchange
  80. enrollees may be compromised, according to a statement
  81. issued today by Access Health CT CEO Kevin Counihan.
  82.  
  83.  The statement notes that a backpack was recovered in
  84. Hartford that held �four notepads with personal information
  85. for approximately 400 individuals. The backpack also
  86. contained Access Health CT paperwork and it appears as
  87. though some of that personal information may be associated
  88. with Access Health CT accounts. It is still unclear where
  89. the backpack came from, and we are working [with] the
  90. Hartford Police Department to investigate, and contact
  91. the individuals whose information may be compromised.
  92. � Let me be clear: we are sorry this happened. This is
  93. a very serious situation and we will hold the person or
  94. persons who are responsible to account.�
  95.  
  96.  Kathleen Tallarita, the government and public affairs
  97. outreach manager for Access Health CT, told National
  98. Review Online by phone that the health exchange does
  99. not know yet whether identity theft has occurred, but
  100. �we�re diligently looking into what�s happened.�
  101.  
  102.  The Connecticut health exchange conducts a background
  103. check on all navigators. While prior arrests or convictions
  104. do not necessarily disqualify an applicant from becoming a
  105. navigator, the health exchange has a policy against
  106. approving anyone who has falsified their criminal-history
  107. information or has committed a serious felony like fraud
  108. or larceny.
  109.  
  110.  According to records obtained by NRO in January, 21
  111. prospective navigators were flagged after their background
  112. check. Though most were dropped from the program, one was
  113. approved despite a class-B felony conviction 19 years
  114. earlier, and three were approved despite misdemeanors
  115. within the last decade. None of these four flagged
  116. navigators had convictions since, according to the
  117. records.
  118.  
  119. http://www.nationalreview.com/corner/379784/400-connecticut-health-exchange-enrollees-information-may-be-compromised-jillian-kay
  120.  
  121. � Control Freak Government Wants to Re-engineer Humans
  122. With Biometric Nanotechnologies �
  123.  
  124.  Nanotechnology is probably not the reading material
  125. sitting on the coffee tables of most people. Yet, it
  126. is already beginning to have an impact on everything
  127. from electronics to alternative energy to food, cosmetics
  128. and clothing. In fact, several hundred common products
  129. contain nanomaterials, which has prompted lawsuits against
  130. the FDA for failure to properly regulate them.
  131.  
  132.  For futurists and Transhumanists, the human body is the
  133. final frontier.
  134.  
  135.  The nanotech revolution has been heavily invested in by
  136. the US government, as outlined in their National Nanotechnology
  137. Initiative Strategic Plan, which involves 20 federal agencies
  138. and partners. This must-read document lays out a projected
  139. future to understand and control matter for the management
  140. of every facet of the environment, health and safety.
  141.  
  142. http://nano.gov/sites/default/files/pub_resource/2014_nni_strategic_plan.pdf
  143.  
  144. http://www.activistpost.com/2014/05/nanotechnology-are-you-ready-to-be.html
  145.  
  146. � Federal Biosurveillance Plan Seeking Direct Access to
  147. Americans� Private Medical Records and Authority for
  148. �Nonpharmaceutical Interventions� �
  149.  
  150.  The federal government is piecing together a national
  151. �biosurveillance� system that will give bureaucrats
  152. near real-time access to Americans� private medical
  153. information in the name of �national security.�
  154.  
  155. These bureaucracies are noted within the document below.
  156.  
  157.  PHEMCE (Public Health Emergency Medical Countermeasures
  158. Enterprise), DHS (Department of Homeland Security), DoD
  159. (Department of Defense), USDA (Department of Agriculture),
  160. VA (Department of Veterans� Affairs), HHS (Department of
  161. Health and Human Services), ASPR (Assistant Secretary for
  162. Prepardness and Response), BARDA (Biomedical Advanced
  163. Research & Development Authority), CDC (Center for Disease
  164. and Control), FDA (Food and Drug Administration) and NIH
  165. (National Institutes of Health).
  166.  
  167. �Nonpharmaceutical Intervention� noted,
  168.  
  169.  �The term countermeasures refers to medical countermeasures
  170. (MCMs) and nonpharmaceutical interventions (NPIs) that may
  171. be used to limit the adverse health impacts of incidents.
  172. MCMs include vaccines, antimicrobials, diagnostics, and
  173. ventilators, while NPIs include personal interventions,
  174. such as hand hygiene and respiratory etiquette, as well as
  175. community-level interventions for social distancing, such
  176. as school closures and promoting telework.�
  177.  
  178.  �Effective implementation of NPIs requires planning and
  179. preparation to identify effective interventions, the
  180. situations in which they should be deployed, and methods
  181. for monitoring their effects. � � More research is needed
  182. to inform decisions regarding which interventions are most
  183. effective under specific circumstances; to identify, understand,
  184. and plan to mitigate the potential secondary effects of the
  185. interventions; and to determine their feasibility.�
  186.  
  187.  (As most people now know, vaccines often contain mercury and
  188. other toxic chemicals and in some cases live viruses (yes, live)
  189. have been identified ie GlaxoSmithKline�s flu vaccines. Those
  190. vaccines are far more dangerous than risk of catching disease.
  191. http://www.naturalnews.com/vaccines.html)
  192.  
  193. http://cnsnews.com/sites/default/files/documents/Draft%20National%20Health%20Security%20Strategy%202015-2018.pdf
  194.  
  195. http://cnsnews.com/news/article/barbara-hollingsworth/federal-biosurveillance-plan-seeking-direct-access-americans
  196.  
  197. � Propublica Peddles Electronic Health Records �
  198.  
  199. https://projects.propublica.org/data-store/
  200.  
  201. � Man�s Personal Information Stolen After Using Healthcare.gov ::
  202.  
  203.  A Virginia man�s personal information has been stolen after he signed
  204. up for Obamacare on the healthcare.gov website. Now, he�s questioning
  205. if the website is the reason why.
  206.  
  207. http://www.youtube.com/watch?v=wsSCxT_rv1M
  208.  
  209. http://capitolcityproject.com/mans-personal-info-stolen-using-obamacare-website/
  210.  
  211. � Obamacare Computers Vulnerable to Espionage �
  212.  
  213.  Healthcare dot gov has a new problem. The Obama regime gave a contract
  214. to Belarus to build software into the system. Belarus, a close ally
  215. of Vladimir Putin, is a communist dictatorship that is known for global
  216. theft operations through cyber attacks. Our intelligence agencies didn�t
  217. even find out until they heard a radio show in Belarus.
  218.  
  219.  The Obama regime used developers with ties to Belarus in the making of
  220. the healthcare network causing concern at US intelligence agencies, who
  221. are urging the Administration to scan the sites for malicious software.
  222.  
  223.  Millions of Americans and more than 300 medial facilities and providers
  224. might have had their personal information compromised.
  225.  
  226.  Belarus is closely allied with Russia and they are suspected of inserting
  227. malicious code that could be used for cyber attacks.
  228.  
  229.  Last year, Belarus, a repressive dictatorship, diverted massive amounts
  230. of US traffic to Belarus. They stole $1.8M from 20,000 people across the
  231. globe-with 80% of the thefts coming from Americans in the US.
  232.  
  233. Oh, and Belarus� President Likashenko hates us.
  234.  
  235. http://freebeacon.com/the-belarusian-connection/
  236.  
  237. http://www.independentsentinel.com/us-gave-belarus-the-opportunity-to-build-malware-into-healthcare-gov/
  238.  
  239. � Hacker Breaks Into HealthCare.gov in 4 Minutes �
  240.  
  241.  The man who appeared before Congress last week to explain the
  242. security pitfalls of HealthCare.gov took to Fox News on Sunday
  243. to explain just how easy it was to penetrate the website.
  244.  
  245.  Hacking expert David Kennedy told Fox�s Chris Wallace that gaining
  246. access to 70,000 personal records of Obamacare enrollees via
  247. HealthCare.gov took about 4 minutes and required nothing more
  248. than a standard browser, the Daily Caller reported.
  249.  
  250.  �And 70,000 was just one of the numbers that I was able to go up
  251. to and I stopped after that,� he said. �You know, I�m sure it�s
  252. hundreds of thousands, if not more, and it was done within about a
  253. 4 minute timeframe. So, it�s just wide open.�
  254.  
  255.  �You can literally just open up your browser, go to this, and extract
  256. all this information without actually having to hack the website
  257. itself,� he said.
  258.  
  259. http://dailycaller.com/2014/01/19/top-hacker-reveals-how-he-cracked-obamacare-site-in-under-4-minutes/
  260.  
  261. http://www.washingtontimes.com/news/2014/jan/19/hacking-expert-david-kennedy-says-he-cracked-healt/
  262.  
  263. � Obamacare Website Plagued �
  264.  
  265. http://www.infowars.com/obamacare-website-plagued-by-security-problems/
  266.  
  267. � No Security Ever Built Into Obamacare Site �
  268.  
  269.  It could take a year to secure the risk of high exposures of
  270. personal information on the federal Obamacare online exchange, a
  271. cybersecurity expert told CNBC on Monday.
  272.  
  273.  �When you develop a website, you develop it with security in mind.
  274. And it doesn�t appear to have happened this time,� said David Kennedy,
  275. a so-called �white hat hacker who tests online security by breaching
  276. websites. He testified on Capitol Hill about the flaws of HealthCare.gov
  277. last week.
  278.  
  279.  �It�s really hard to go back and fix the security around it because
  280. security wasn�t built into it,� said Kennedy, chief executive of
  281. TrustedSec. �We�re talking multiple months to over a year to at least
  282. address some of the critical-to-high exposures on the website itself.�
  283.  
  284. http://www.cnbc.com/id/101225308
  285.  
  286.  Last month, a Sept. 27 government memorandum surfaced in which two HHS
  287. officials said the security of the site had not been properly tested
  288. before it opened, creating a high risk.
  289.  
  290. http://www.reuters.com/article/2013/11/19/usa-healthcare-security-idUSL2N0J40W320131119
  291.  
  292. � New Health Care Gestapo in California Raises Privacy Concerns �
  293.  
  294.  The government wants almost everything they do to be secret (including
  295. spying on people) - but they care less about jeopardizing personal
  296. information from countless amounts of innocent civilians. This is yet
  297. another eye-opener.
  298.  
  299. http://www.sacbee.com/2013/12/01/5959979/in-california-efforts-to-reduce.html
  300. http://www.dailybinarynews.com/covered-calif-seeks-consumer-data-triggers-privacy-concerns/
  301. http://www.californiahealthline.org/articles/2013/12/2/covered-calif-seeks-consumer-data-triggers-privacy-concerns
  302.  
  303. � Digital Medical Devices Next Frontier in Cybercrime �
  304.  
  305.  If you think it�s enough of a chore trying to stop thieves stealing
  306. your credit card details and hacking your Facebook, imagine trying to
  307. stop them getting into your pancreas.
  308.  
  309.  Advances in healthcare mean that in-body devices to treat chronic
  310. conditions or even just make you perform better as a human being are
  311. not as far away as you might imagine.
  312.  
  313. http://qz.com/130226/your-body-is-the-next-frontier-in-cybercrime/
  314.  
  315. � HealthCare.gov Third Party Spying �
  316.  
  317.  Here�s more evidence of cutting corners during the development of the
  318. Healthcare.gov insurance marketplace: the website appears to be violating
  319. its own privacy policy by sending private user information to third parties.
  320.  
  321.  Security researcher Ben Simo noticed that Healthcare.gov was sending his
  322. user name and password reset code to third party partners including the
  323. analytics services Pingdom, DoubleClick, and Google Analytics.
  324.  
  325. http://www.theverge.com/2013/10/31/5047932/healthcare-gov-transferring-private-user-information-third-parties
  326.  
  327. http://www.dailybinarynews.com/healthcare-gov-sends-user-information-to-third-parties-violating-its-own/
  328.  
  329. � HealthCare.gov Breach of Privacy �
  330.  
  331. http://www.dailybinarynews.com/healthcare-gov-users-see-breach-of-privacy
  332.  
  333. http://www.wnd.com/2013/11/healthcare-gov-users-see-breach-of-privacy/?cat_orig=us
  334.  
  335. � HealthCare.gov Users Warn of Security
  336. Risk, Breach of Privacy �
  337.  
  338. http://blog.heritage.org/2013/11/02/exclusive-healthcare-gov-users-warn-of-security-risk-breach-of-privacy/
  339.  
  340. � Medical Privacy Rights are Violated �
  341.  
  342.  Obama�s signature program is rife with inequities. It makes a
  343. dysfunctional system worse.
  344.  
  345.  It rations healthcare. It�s unaffordable. It leaves millions uninsured.
  346. It leaves millions more underinsured. It compromises privacy. A little
  347. noticed disclaimer states:
  348.  
  349.  �You have no reasonable expectation of privacy regarding any communication
  350. or data transmitting or stored on this information system.�
  351.  
  352. http://www.globalresearch.ca/obamacare-fallout-medical-privacy-rights-are-violated/5355694
  353.  
  354. http://www.dailybinarynews.com/obamacare-fallout-medical-privacy-rights-are-violated/
  355.  
  356. � Mike Rogers Admits Healthcare.gov Has No Security From Data Theft �
  357.  
  358.  �It was very clear to me in the hearing that they don�t have an
  359. overarching solid cybersecurity plan to prevent the loss of private
  360. information,� he said Sunday morning on CNN�s �State of the Union.�
  361.  
  362. http://thehill.com/video/sunday-shows/330797-rep-rogers-worried-healthcaregov-doesnt-have-solid-cybersecurity-plan
  363.  
  364. � Obamacare ; a Massive Privacy Breach Waiting to Happen �
  365.  
  366.  We already know that, thanks to the law, health care premiums are rising.
  367. Jobs are being lost. And the quality of health care itself will decline.
  368. But it�s only a matter of time before the law causes another crisis: a
  369. national breach of individual privacy.
  370.  
  371.  Fears of data breaches are real; the health and financial information of
  372. millions of Americans are housed in a massive federal government database
  373. called the �Data Hub.� That database will provide information to each state�s
  374. health care exchange, where individuals and small businesses are expected to
  375. purchase insurance plans online.
  376.  
  377. http://dailycaller.com/2013/10/15/obamacare-a-massive-privacy-breach-waiting-to-happen/
  378.  
  379. http://www.dailybinarynews.com/obamacare-a-massive-privacy-breach-waiting-to-happen/
  380.  
  381. � Obamacare Market ; Personal Data Can Be Used for Law Enforcement and
  382. to Audit Users� Online Activities �
  383.  
  384.  �The only exception to this policy is that we may share information
  385. provided in your application with the appropriate authorities for law
  386. enforcement and audit activities.�
  387.  
  388.  �If you send us an e-mail, we use the information you send us to respond
  389. to your inquiry. E-mail correspondence may become a public record. As a
  390. public record, your correspondence could be disclosed to other parties upon
  391. their request in accordance with Maryland�s Public Information Act.�
  392.  
  393. http://www.weeklystandard.com/blogs/obamacare-marketplace-personal-data-can-be-used-law-enforcement-and-audit-activities_762237.html
  394.  
  395. � Warning! Enrolling in Obamacare Allows Government to Link You�re IP
  396. Address With You�re Name and Personal Information �
  397.  
  398.  We have already established that Healthcare.gov is not a functioning
  399. database application that allows people to shop for competing health plans.
  400. It is actually a government-run Trojan Horse that suckers people into
  401. creating accounts where they hand over ;
  402.  
  403. � Name and address
  404. � Email address and password
  405. � Social Security number
  406. � Private bank account details
  407. � Employer details and other information
  408.  
  409.  This IP address is then handed over to
  410. the NSA (and many others) where your IP
  411. is cross-referenced with all website
  412. visits, including ;
  413.  
  414. � �Anti-government� websites (news)
  415. � Porn sites
  416. � Gambling sites
  417. � File sharing sites
  418. � �Terrorism� support sites
  419. � Encryption service sites like Hushmail
  420. � Chat rooms, message boards and more
  421.  
  422. This includes access to all system and web browser logs, cache, cookies.
  423.  
  424. � We Are Living In Orwell�s Nightmare �
  425.  
  426.  If the IRS or NSA scandals involving misuse of private data were troubling,
  427. consider the implications of the new information databases created in the
  428. name of health care. The newly-launched Affordable Care Act creates a massive
  429. electronic registry of private information that is accessible to bureaucrats
  430. in agencies ranging from the IRS to the Department of Homeland Security. Its
  431. a wonder how Americans who are becoming increasingly concerned with federal
  432. surveillance and domestic spying programs could in any way approve of the
  433. so-called Obamacare law.
  434.  
  435. http://warforourmind.com/obamacare-law-creates-data-services-hub-and-tracks-social-and-behavioral-data/
  436.  
  437. � Javascript Code From healthcare.gov �
  438.  
  439. https://www.healthcare.gov/marketplace/global/en_US/registration.js
  440.  
  441.  Javascript code reveals details of
  442. what kind of information is requested
  443. from corporate third-parties ;
  444.  
  445. � Driver�s license
  446. � Zip code
  447. � State ID
  448. � Mortgage payment receipt
  449. � Mortgage deed showing primary residency
  450. � Lease agreement
  451. � School enrollment documentation
  452. � Utility bills
  453. � Social Security card
  454. � Social Security statement, SSA 1099
  455. � US passport
  456. � US public birth record
  457. � Certification of Report of Birth
  458. � Consular Report of Birth Abroad
  459. � Certification of Birth Abroad
  460. � US Citizen Identification Card
  461. � American Indian Card (I-872)
  462. � Certificate of Naturalization
  463. � Certificate of Citizenship
  464. � Cost of living verification
  465. � Military identification card
  466. � Letter from Veterans Administration
  467. � Email accounts
  468. � Tax form(s)
  469. � Wages and tax statements (W-2)
  470.  
  471. Questions they ask you include ;
  472.  
  473. � What is the first name of your oldest
  474. niece?
  475.  
  476. � What is a relative�s telephone number
  477. that is not your own?
  478.  
  479. � What is the name of your favorite pet?
  480.  
  481. � Type a significant date in your life?
  482.  
  483. � In what city was your mother born?
  484.  
  485. � What is the name of your favorite
  486. childhood friend?
  487.  
  488. � What is your parents� wedding
  489. anniversary date?
  490.  
  491. � What is the name of the manager at
  492. your first job?
  493.  
  494. � What is the nick name of your
  495. grandmother?
  496.  
  497. � What is your favorite radio station?
  498.  
  499. � What is your favorite cuisine?
  500.  
  501. � What was your favorite toy when you
  502. were a child?
  503.  
  504. ? Javascript Code All Fucked Up �
  505.  
  506. http://www.cbsnews.com/8301-505269_162-57606633/obamacare-website-looks-like-nobody-tested-it-programmer-says/
  507.  
  508. � Obamacare�s Privacy Nightmare �
  509.  
  510. http://www.nationalreview.com/article/360249/obamacares-privacy-nightmare-sean-riley-ed-walton
  511.  
  512. � Public Waking Up to Threat of Digital Health Records �
  513.  
  514.  �Like any other kind of customer data, it gets bought and sold
  515. and you have no idea where it went.�
  516.  
  517. http://www.foxnews.com/politics/2013/10/02/obamacare-reg-on-digital-patient-records-raises-security-concerns/
  518.  
  519.  As more health-related data is digitized, �the privacy violations are
  520. going to be incalculable,� Jim Pyles, an expert in health law who
  521. co-founded the law firm Powers Pyles Sutter & Verville, told CBSNews.com.
  522.  
  523. http://www.cbsnews.com/8301-250_162-57605564/obamacare-marketplaces-raise-data-security-concerns/
  524.  
  525. � HHS Data Hub is by NO Means Secure �
  526.  
  527. http://blog.heritage.org/2013/10/02/cyber-failures-in-obamacare-exchanges-dangerous-to-your-wallet-and-privacy/
  528.  
  529. http://www.dailybinarynews.com/cyber-failures-in-obamacare-exchanges-dangerous-to-your-wallet-and-privacy/
  530.  
  531. � HHS-Run Website Hacked Again �
  532.  
  533. http://www.weeklystandard.com/blogs/hhs-run-website-hacked-now-selling-nfl-jerseys-ugg-boots-armani-fragrances_759213.html
  534.  
  535. � McAfee ; Beware of ObamaCare Phishing Scams, Data Theft �
  536.  
  537.  Security firm McAfee warned Tuesday that hackers are likely to
  538. take advantage of the rollout of ObamaCare exchanges this week by
  539. launching phishing attacks aimed at stealing personal information.
  540.  
  541.  Both Democrats and Republicans have chosen to keep their mouths shut
  542. about the problems regarding personal data theft due to digitized
  543. insurance laws.
  544.  
  545.  Not so surprising though, considering both parties have engaged in
  546. efforts to enforce massive secret surveillance.
  547.  
  548.  Of course, this may be the reason behind a so-called �shutdown� -
  549. so politicians can take their vacations and let the public deal with
  550. this mess they created.
  551.  
  552. http://www.foxbusiness.com/industries/2013/10/01/mcafee-warns-phishing-scams-tied-to-obamacare-launch/
  553.  
  554. http://www.newsmax.com/Newsfront/Obamacare-exchanges-hackers-phishing/2013/10/01/id/528788
  555.  
  556. � Welcome to An Era of ZERO Privacy �
  557.  
  558.  Obamacare not only opens up all Americans to obvious cyber threats
  559. nationally, but also globally. Welcome to a world where anyone can find
  560. out ANYTHING about you.
  561.  
  562. http://www.infowars.com/obamacare-the-identity-thief-wolves-are-at-the-door/
  563.  
  564. � Obamacare Rolling Out Medical Gestapo as Social Workers Go Door-to-Door
  565. With Access to All Our Personal Information �
  566.  
  567.  Even �users of tobacco products in the home� will be targeted for
  568. �assessment.�
  569.  
  570. http://www.pakalertpress.com/2013/09/30/are-you-ready-for-obamacare-home-visits/
  571.  
  572.  Under Obamacare, the Department of Health and Human Services (HHS) is
  573. implementing a �Navigator� program, which provides millions of dollars
  574. to non-profit groups nationwide to hire �Navigators� who will advise
  575. Americans on their Obamacare health �options� based on the sensitive
  576. information provided.
  577.  
  578.  This sensitive information includes social security numbers, income levels,
  579. employment history and home addresses, all of which are more than enough to
  580. steal Americans� identities for complete access to their credit and financial
  581. resources.
  582.  
  583. http://www.infowars.com/door-to-door-identity-theft-likely-under-obamacare/
  584.  
  585.  In a Sept. 20 letter to HHS, the US House Committee on Energy and Commerce
  586. asked the department to respond to its concerns over the �rushed implementation�
  587. of its Navigator program, including plans by non-profit groups to �engage
  588. in enrollment activities that increase the likelihood of fraud or abuse,
  589. including door-to-door contacts.�
  590.  
  591. http://energycommerce.house.gov/sites/republicans.energycommerce.house.gov/files/letters/20130920CCIIO.pdf
  592.  
  593.  �The recipient of one of the largest Navigator grants explained in their
  594. application that they expected a substantial portion of their program
  595. to involve door-to-door contacts,� the letter stated. �Another described
  596. their work plan as involving �door-to-door outreach to 10,000 households
  597. per week.��
  598.  
  599. � DEA Gestapo Brags Electronic Health Records Are Given to Third-parties
  600. and Slaves Should Not Expect Privacy �
  601.  
  602.  In response to a lawsuit, the Drug Enforcement Agency brags that patients
  603. should have �no expectation of privacy� regarding their health information
  604. once it is given to a pharmacy or any third party, United Press International
  605. reports.
  606.  
  607.  In the lawsuit, the American Civil Liberties Union represents a doctor
  608. and four patients in Oregon whose medical records are located in a state
  609. database used by physicians to help curb prescription drug misuse.
  610.  
  611.  According to UPI, personal health information stored in the database might
  612. include Gender identity, HIV status and mental illness.
  613.  
  614.  DEA has requested information from the database through subpoenas rather
  615. than probable cause warrants as required by state law.
  616.  
  617. http://www.upi.com/blog/2013/09/24/DEA-Medical-records-sent-to-pharmacies-have-no-protected-privacy/7221380050479/
  618. http://www.ihealthbeat.org/articles/2013/9/27/dea-no-privacy-protections-for-rx-records-given-to-third-parties
  619. https://www.aclu.org/technology-and-liberty/oregon-prescription-drug-monitoring-program-v-drug-enforcement-administrat-26
  620.  
  621. � HHS Data Hub Brokers Hacked �
  622.  
  623.  A service that sells personal data to identity thieves has been getting
  624. its wares from hacked data brokers storing information similar to what
  625. Obamacare marketplaces plan to use, setting the scene for fraudsters to
  626. collect government subsidies.
  627.  
  628.  According to a new investigative report by cybersecurity researcher
  629. Brian Krebs, the service, known as SSNDOB, hacked LexisNexis and other
  630. large data aggregators that supply ID check information.
  631.  
  632.  The certification site �is constantly crashing. It�s been a complete pain,�
  633. said Wes Bissett, senior counsel for state government affairs at the
  634. Independent Insurance Agents and Brokers of America.
  635.  
  636.  Criminals can get their hands on anyone�s �identity information through
  637. the black market exchanges that Krebs writes about. Frankly, it�s another
  638. ominous and bad sign for Obamacare, since as I understand it, the new health
  639. care insurance exchanges will be using the same [knowledge-based authentication]
  640. to verify applicants for healthcare insurance,� Litan wrote in her blog post.
  641.  
  642. http://krebsonsecurity.com/2013/09/data-broker-giants-hacked-by-id-theft-service/
  643. http://www.nextgov.com/health/2013/09/hacked-data-brokers-could-spell-trouble-obamacare/70958/
  644. http://blogs.gartner.com/avivah-litan/2013/09/25/knowledge-based-authentication-breached-big-time-another-dagger-for-obamacare-the-banks-and-many-others/
  645. http://www.washingtonpost.com/national/health-science/reports-of-computer-problems-and-logistical-glitches-proceed-launch-of-obamacare/2013/09/27/4ca18dcc-2792-11e3-b3e9-d97fb087acd6_print.html
  646.  
  647. � Patient Privacy Goes Out the Window and Into the HHS Data Hub �
  648.  
  649. http://www.dailybinarynews.com/patient-privacy-goes-out-the-window-and-into-the-obamacare-data-hub/
  650.  
  651. � Start Shunning the Doctors, Providers �
  652.  
  653.  Of course electronic health records are involved in this latest
  654. information grab. For those who don�t know, as part of Prez
  655. Obama�s stimulus bill, The American Recovery and Reinvestment Act
  656. of 2009, he included the Health Information Technology and
  657. Economic and Clinical Health (HITECH) Act, which attempts to get
  658. every doctor and hospital to use electronic health records instead
  659. of paper records through the use of incentives (read government funding)
  660. and penalties for non-compliance.
  661.  
  662.  Senators Alexander, Burr, Coburn, Enzi, Roberts, and Thune produced
  663. a report about the difficulties involved in implementing the HITECH Act.
  664. The top five problems they found are: lack of a clear path toward
  665. interoperability, increased costs, lack of oversight, putting patient
  666. privacy at risk, and program sustainability.
  667.  
  668. http://www.thune.senate.gov/public/index.cfm/files/serve?File_id=0cf0490e-76af-4934-b534-83f5613c7370
  669.  
  670. � Hows You�re Sex Life? �
  671.  
  672. http://nypost.com/2013/09/15/obamacare-will-question-your-sex-life/
  673.  
  674. � Obamacare Federal Exchanges Will NOT Be Protected �
  675.  
  676. http://www.weeklystandard.com/blogs/mcconnell-dont-open-obamacare-exchanges-if-privacy-isnt-protected_745961.html
  677.  
  678. � Obamacare IT Lacks Data Security �
  679.  
  680.  The most likely serious security breach would be identity theft,
  681. in which a hacker steals the social security numbers and other
  682. information people provide when signing up for insurance.
  683.  
  684. http://www.reuters.com/article/2013/08/06/us-usa-healthcare-security-idUSBRE9750YH20130806
  685.  
  686. � MEDICAL DICTATORSHIP ; Here Comes Obamacare Big Brother Database �
  687.  
  688.  Would you trust thousands of low-level Federal bureaucrats and
  689. contractors with one-touch access to your private financial and medical
  690. information? Under Obamacare you won�t have any choice.
  691.  
  692.  As the Obamacare train-wreck begins to gather steam, there is increasing
  693. concern in Congress over something called the Federal Data Services Hub.
  694. The Data Hub is a comprehensive database of personal information being
  695. established by the Department of Health and Human Services (HHS) to
  696. implement the federally facilitated health insurance exchanges. The
  697. purpose of the Data Hub, according to a June 2013 Government Accountability
  698. Office (GAO) report, is to provide �electronic, near real-time access
  699. to federal data� and �access to state and third party data sources needed
  700. to verify consumer-eligibility information.� In these days of secret domestic
  701. surveillance by the intelligence community, rogue IRS officials and state
  702. tax agencies using private information for political purposes, and police
  703. electronically logging every license plate that passes by, the idea of the
  704. centralized Data Hub is making lawmakers and citizens nervous.
  705.  
  706. http://rare.us/story/move-over-nsa-here-comes-the-obamacare-big-brother-database/
  707. http://www.wric.com/story/22641990/federal-data-services-hub-does-exist-aishealthcom-blog-post-reports
  708. http://www.nationalreview.com/article/354031/obamacares-branch-nsa-john-fund
  709.  
  710. � Federal Requirements to Exchange Information to/from the
  711. HHS Federal Data Services Hub �
  712.  
  713. http://www.nescies.org/sites/www.nescies.org/files/HHS%20-%20Hub%20Statement%20of%20Work%20.pdf
  714.  
  715. � Implantable Medical Devices Planned for Data Theft Markets, 2008 �
  716.  
  717. https://spqr.eecs.umich.edu/papers/b1kohFINAL2.pdf
  718.  
  719. � NO PRIVACY ; 94 Percent of Healthcare Organizations Breached �
  720.  
  721. http://threatpost.com/en_us/blogs/study-94-percent-healthcare-organizations-breached-010313
  722.  
  723. http://www2.idexpertscorp.com/assets/uploads/ponemon2012/Third_Annual_Study_on_Patient_Privacy_FINAL.pdf
  724.  
  725. � FDA Provides $50,000,000 Healthcare Contact for Scientific Computing �
  726.  
  727. http://washingtontechnology.com/articles/2013/01/04/drc-fda-work.aspx
  728.  
  729. � FDA Seeks Unique ID to Spy Medical Devices �
  730.  
  731. http://cryptome.org/2012/07/fda071012.pdf
  732.  
  733. � Electronic Health Records Implementation �
  734.  
  735. http://cryptome.org/0002/hhs072810.htm
  736.  
  737. � Accenture Corporation Explores Medical Smart Grid Technocracy �
  738.  
  739. http://www.accenture.com/NR/rdonlyres/350E5873-836E-4592-BC49-FDFF6B79065E/0/Accenture_Innovation_Center_Health_How_Technology_Will_Transform_Future_of_Chronic_Care.pdf
  740. ????????????????????????????????????????
  741. ????????????????????????????????????????

Submit a correction or amendment below. (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.
Syntax Highlighting:
To highlight particular lines, prefix each line with @@
Pressing TAB inserts 3 spaces