pastebin - collaborative debugging

pastebin is a collaborative debugging tool allowing you to share and modify code snippets while chatting on IRC, IM or a message board.

This site is developed to XHTML and CSS2 W3C standards. If you see this paragraph, your browser does not support those standards and you need to upgrade. Visit WaSP for a variety of options.

n3tBin / Home / Archive

Copyright © 2007-2011, n3t-t3z Team

Posted by Electronic Healt on September Fri 26th 6:12 PM - Never Expires
download | new post

  1.    
  2. EYEBALLING AMERICA�S NEW MEDICAL DICTATORSHIP.
  3.  
  4.  
  5. � Healthcare.gov Entry to Hack US Government Agencies ::
  6.  
  7.  CMS is also responsible for overseeing state-based marketplaces, which vary
  8. in the extent to which they exchange information with CMS. Other federal
  9. agencies, including the Department of Defense, Department of Homeland Security,
  10. Internal Revenue Service, Office of Personnel Management, Peace Corps,
  11. Social Security Administration, and the Department of Veterans Affairs also
  12. play key roles in maintaining systems that connect with CMS systems to
  13. perform eligibility-checking functions.
  14.  
  15. http://cryptome.org/2014/09/gao-14-730.pdf
  16.  
  17. � Healthcare.gov Is A Security Disaster, And Those Working On It Knew It ::
  18.  
  19. https://www.documentcloud.org/documents/1303246-665840.html
  20.  
  21. https://www.techdirt.com/articles/20140919/16092528585/healthcaregov-is-security-disaster-those-working-it-knew-it-tried-to-stop-independent-security-review-to-hide-it.shtml
  22. ??????????????????????????????????????
  23. � HealthCare.gov Hacked Again! �
  24.  
  25.  A computer server hosting information for Healthcare.gov, the flagship
  26. Obamacare website that millions of Americans have trusted with their social
  27. security numbers, income totals and other sensitive personal information,
  28. was the subject of a hacker attack earlier this summer, officials said Thursday.
  29.  
  30.  The federal government wasn�t aware it had been hacked on July 8 until
  31. just ten days ago.
  32.  
  33.  The powerful House Oversight and Government Reform Committee announced
  34. Thursday afternoon that it has ordered Centers for Medicare and Medicaid
  35. Services (CMS) chief Marilyn Tavenner to testify in a September 18 hearing
  36. about the Obamacare website�s security lapses.
  37.  
  38. Likely nothing is going to happen and Americans will still be getting hacked.
  39.  
  40. The only solution would be a national boycott.
  41.  
  42. http://www.marketwatch.com/story/hacker-breached-healthcaregov-insurance-site-2014-09-04-161031834
  43.  
  44. http://www.dailymail.co.uk/news/article-2744241/Foreigners-hacked-Obamacare-website-July-HHS-just-discovered-10-days-ago-claims-no-consumer-data-stolen.html
  45.  
  46. � Hospital Hacked! Community Health Systems Says Personal Data
  47. Stolen in Cyber Attack, UPDATE: 4.5 Million Records Stolen �
  48.  
  49.  US hospital operator Community Health Systems Inc said on Monday
  50. personal data, including patient names and addresses, of about 4.5
  51. million people were stolen by hackers from its computer network,
  52. likely in April and June.
  53.  
  54.  The company said the data, considered protected under the Health
  55. Insurance Portability and Accountability Act, included patient names,
  56. addresses, birth dates, telephone numbers and Social Security numbers.
  57. It did not include patient credit card or medical information (bull),
  58. Community Health Systems said in a regulatory filing.
  59.  
  60.  It said the security breach had affected about 4.5 million people who
  61. were referred for or received services from doctors affiliated with
  62. the hospital group in the last five years.
  63.  
  64.  The FBI warned healthcare providers in April that their cybersecurity
  65. systems were lax compared to other sectors, making them vulnerable to
  66. hackers looking for details that could be used to access bank accounts
  67. or obtain prescriptions, Reuters previously reported.
  68.  
  69.  The company said it and its security contractor, FireEye Inc unit
  70. Mandiant, believed the attackers originated from China. They did not
  71. provide further information about why they believed this was the case.
  72. They said they used malware and other technology to copy and transfer
  73. this data and information from its system.
  74.  
  75.  Community Health, which is one of the largest hospital operators in the
  76. country with 206 hospitals in 29 states, said it was working with federal
  77. law enforcement authorities in connection with their investigation into
  78. the attack. It said federal authorities said these attacks are typically
  79. aimed at gathering intellectual property, such as medical device and
  80. equipment development data.
  81.  
  82.  It said that prior to filing the regulatory document, it had eradicated
  83. the malware from its systems and finalized the implementation of remediation
  84. efforts. It is notifying patients and regulatory agencies as required by
  85. law, it said.
  86.  
  87.  It also said it is insured against such losses and does not at this time
  88. expect a material adverse effect on financial results.
  89.  
  90. http://www.reuters.com/article/2014/08/18/us-community-health-cybersecurity-idUSKBN0GI16N20140818
  91.  
  92. http://money.cnn.com/2014/08/18/technology/security/hospital-chs-hack/index.html
  93.  
  94. � 400 Connecticut Health-Exchange Enrollees� Information
  95. May Be Compromised �
  96.  
  97.  The personal information of around 400 health-exchange
  98. enrollees may be compromised, according to a statement
  99. issued today by Access Health CT CEO Kevin Counihan.
  100.  
  101.  The statement notes that a backpack was recovered in
  102. Hartford that held �four notepads with personal information
  103. for approximately 400 individuals. The backpack also
  104. contained Access Health CT paperwork and it appears as
  105. though some of that personal information may be associated
  106. with Access Health CT accounts. It is still unclear where
  107. the backpack came from, and we are working [with] the
  108. Hartford Police Department to investigate, and contact
  109. the individuals whose information may be compromised.
  110. � Let me be clear: we are sorry this happened. This is
  111. a very serious situation and we will hold the person or
  112. persons who are responsible to account.�
  113.  
  114.  Kathleen Tallarita, the government and public affairs
  115. outreach manager for Access Health CT, told National
  116. Review Online by phone that the health exchange does
  117. not know yet whether identity theft has occurred, but
  118. �we�re diligently looking into what�s happened.�
  119.  
  120.  The Connecticut health exchange conducts a background
  121. check on all navigators. While prior arrests or convictions
  122. do not necessarily disqualify an applicant from becoming a
  123. navigator, the health exchange has a policy against
  124. approving anyone who has falsified their criminal-history
  125. information or has committed a serious felony like fraud
  126. or larceny.
  127.  
  128.  According to records obtained by NRO in January, 21
  129. prospective navigators were flagged after their background
  130. check. Though most were dropped from the program, one was
  131. approved despite a class-B felony conviction 19 years
  132. earlier, and three were approved despite misdemeanors
  133. within the last decade. None of these four flagged
  134. navigators had convictions since, according to the
  135. records.
  136.  
  137. http://www.nationalreview.com/corner/379784/400-connecticut-health-exchange-enrollees-information-may-be-compromised-jillian-kay
  138.  
  139. � Control Freak Government Wants to Re-engineer Humans
  140. With Biometric Nanotechnologies �
  141.  
  142.  Nanotechnology is probably not the reading material
  143. sitting on the coffee tables of most people. Yet, it
  144. is already beginning to have an impact on everything
  145. from electronics to alternative energy to food, cosmetics
  146. and clothing. In fact, several hundred common products
  147. contain nanomaterials, which has prompted lawsuits against
  148. the FDA for failure to properly regulate them.
  149.  
  150.  For futurists and Transhumanists, the human body is the
  151. final frontier.
  152.  
  153.  The nanotech revolution has been heavily invested in by
  154. the US government, as outlined in their National Nanotechnology
  155. Initiative Strategic Plan, which involves 20 federal agencies
  156. and partners. This must-read document lays out a projected
  157. future to understand and control matter for the management
  158. of every facet of the environment, health and safety.
  159.  
  160. http://nano.gov/sites/default/files/pub_resource/2014_nni_strategic_plan.pdf
  161.  
  162. http://www.activistpost.com/2014/05/nanotechnology-are-you-ready-to-be.html
  163.  
  164. � Federal Biosurveillance Plan Seeking Direct Access to
  165. Americans� Private Medical Records and Authority for
  166. �Nonpharmaceutical Interventions� �
  167.  
  168.  The federal government is piecing together a national
  169. �biosurveillance� system that will give bureaucrats
  170. near real-time access to Americans� private medical
  171. information in the name of �national security.�
  172.  
  173. These bureaucracies are noted within the document below.
  174.  
  175.  PHEMCE (Public Health Emergency Medical Countermeasures
  176. Enterprise), DHS (Department of Homeland Security), DoD
  177. (Department of Defense), USDA (Department of Agriculture),
  178. VA (Department of Veterans� Affairs), HHS (Department of
  179. Health and Human Services), ASPR (Assistant Secretary for
  180. Prepardness and Response), BARDA (Biomedical Advanced
  181. Research & Development Authority), CDC (Center for Disease
  182. and Control), FDA (Food and Drug Administration) and NIH
  183. (National Institutes of Health).
  184.  
  185. �Nonpharmaceutical Intervention� noted,
  186.  
  187.  �The term countermeasures refers to medical countermeasures
  188. (MCMs) and nonpharmaceutical interventions (NPIs) that may
  189. be used to limit the adverse health impacts of incidents.
  190. MCMs include vaccines, antimicrobials, diagnostics, and
  191. ventilators, while NPIs include personal interventions,
  192. such as hand hygiene and respiratory etiquette, as well as
  193. community-level interventions for social distancing, such
  194. as school closures and promoting telework.�
  195.  
  196.  �Effective implementation of NPIs requires planning and
  197. preparation to identify effective interventions, the
  198. situations in which they should be deployed, and methods
  199. for monitoring their effects. � � More research is needed
  200. to inform decisions regarding which interventions are most
  201. effective under specific circumstances; to identify, understand,
  202. and plan to mitigate the potential secondary effects of the
  203. interventions; and to determine their feasibility.�
  204.  
  205.  (As most people now know, vaccines often contain mercury and
  206. other toxic chemicals and in some cases live viruses (yes, live)
  207. have been identified ie GlaxoSmithKline�s flu vaccines. Those
  208. vaccines are far more dangerous than risk of catching disease.
  209. http://www.naturalnews.com/vaccines.html)
  210.  
  211. http://cnsnews.com/sites/default/files/documents/Draft%20National%20Health%20Security%20Strategy%202015-2018.pdf
  212.  
  213. http://cnsnews.com/news/article/barbara-hollingsworth/federal-biosurveillance-plan-seeking-direct-access-americans
  214.  
  215. � Propublica Peddles Electronic Health Records �
  216.  
  217. https://projects.propublica.org/data-store/
  218.  
  219. � Man�s Personal Information Stolen After Using Healthcare.gov ::
  220.  
  221.  A Virginia man�s personal information has been stolen after he signed
  222. up for Obamacare on the healthcare.gov website. Now, he�s questioning
  223. if the website is the reason why.
  224.  
  225. http://www.youtube.com/watch?v=wsSCxT_rv1M
  226.  
  227. http://capitolcityproject.com/mans-personal-info-stolen-using-obamacare-website/
  228.  
  229. � Obamacare Computers Vulnerable to Espionage �
  230.  
  231.  Healthcare dot gov has a new problem. The Obama regime gave a contract
  232. to Belarus to build software into the system. Belarus, a close ally
  233. of Vladimir Putin, is a communist dictatorship that is known for global
  234. theft operations through cyber attacks. Our intelligence agencies didn�t
  235. even find out until they heard a radio show in Belarus.
  236.  
  237.  The Obama regime used developers with ties to Belarus in the making of
  238. the healthcare network causing concern at US intelligence agencies, who
  239. are urging the Administration to scan the sites for malicious software.
  240.  
  241.  Millions of Americans and more than 300 medial facilities and providers
  242. might have had their personal information compromised.
  243.  
  244.  Belarus is closely allied with Russia and they are suspected of inserting
  245. malicious code that could be used for cyber attacks.
  246.  
  247.  Last year, Belarus, a repressive dictatorship, diverted massive amounts
  248. of US traffic to Belarus. They stole $1.8M from 20,000 people across the
  249. globe-with 80% of the thefts coming from Americans in the US.
  250.  
  251. Oh, and Belarus� President Likashenko hates us.
  252.  
  253. http://freebeacon.com/the-belarusian-connection/
  254.  
  255. http://www.independentsentinel.com/us-gave-belarus-the-opportunity-to-build-malware-into-healthcare-gov/
  256.  
  257. � Hacker Breaks Into HealthCare.gov in 4 Minutes �
  258.  
  259.  The man who appeared before Congress last week to explain the
  260. security pitfalls of HealthCare.gov took to Fox News on Sunday
  261. to explain just how easy it was to penetrate the website.
  262.  
  263.  Hacking expert David Kennedy told Fox�s Chris Wallace that gaining
  264. access to 70,000 personal records of Obamacare enrollees via
  265. HealthCare.gov took about 4 minutes and required nothing more
  266. than a standard browser, the Daily Caller reported.
  267.  
  268.  �And 70,000 was just one of the numbers that I was able to go up
  269. to and I stopped after that,� he said. �You know, I�m sure it�s
  270. hundreds of thousands, if not more, and it was done within about a
  271. 4 minute timeframe. So, it�s just wide open.�
  272.  
  273.  �You can literally just open up your browser, go to this, and extract
  274. all this information without actually having to hack the website
  275. itself,� he said.
  276.  
  277. http://dailycaller.com/2014/01/19/top-hacker-reveals-how-he-cracked-obamacare-site-in-under-4-minutes/
  278.  
  279. http://www.washingtontimes.com/news/2014/jan/19/hacking-expert-david-kennedy-says-he-cracked-healt/
  280.  
  281. � Obamacare Website Plagued �
  282.  
  283. http://www.infowars.com/obamacare-website-plagued-by-security-problems/
  284.  
  285. � No Security Ever Built Into Obamacare Site �
  286.  
  287.  It could take a year to secure the risk of high exposures of
  288. personal information on the federal Obamacare online exchange, a
  289. cybersecurity expert told CNBC on Monday.
  290.  
  291.  �When you develop a website, you develop it with security in mind.
  292. And it doesn�t appear to have happened this time,� said David Kennedy,
  293. a so-called �white hat hacker who tests online security by breaching
  294. websites. He testified on Capitol Hill about the flaws of HealthCare.gov
  295. last week.
  296.  
  297.  �It�s really hard to go back and fix the security around it because
  298. security wasn�t built into it,� said Kennedy, chief executive of
  299. TrustedSec. �We�re talking multiple months to over a year to at least
  300. address some of the critical-to-high exposures on the website itself.�
  301.  
  302. http://www.cnbc.com/id/101225308
  303.  
  304.  Last month, a Sept. 27 government memorandum surfaced in which two HHS
  305. officials said the security of the site had not been properly tested
  306. before it opened, creating a high risk.
  307.  
  308. http://www.reuters.com/article/2013/11/19/usa-healthcare-security-idUSL2N0J40W320131119
  309.  
  310. � New Health Care Gestapo in California Raises Privacy Concerns �
  311.  
  312.  The government wants almost everything they do to be secret (including
  313. spying on people) - but they care less about jeopardizing personal
  314. information from countless amounts of innocent civilians. This is yet
  315. another eye-opener.
  316.  
  317. http://www.sacbee.com/2013/12/01/5959979/in-california-efforts-to-reduce.html
  318. http://www.dailybinarynews.com/covered-calif-seeks-consumer-data-triggers-privacy-concerns/
  319. http://www.californiahealthline.org/articles/2013/12/2/covered-calif-seeks-consumer-data-triggers-privacy-concerns
  320.  
  321. � Digital Medical Devices Next Frontier in Cybercrime �
  322.  
  323.  If you think it�s enough of a chore trying to stop thieves stealing
  324. your credit card details and hacking your Facebook, imagine trying to
  325. stop them getting into your pancreas.
  326.  
  327.  Advances in healthcare mean that in-body devices to treat chronic
  328. conditions or even just make you perform better as a human being are
  329. not as far away as you might imagine.
  330.  
  331. http://qz.com/130226/your-body-is-the-next-frontier-in-cybercrime/
  332.  
  333. � HealthCare.gov Third Party Spying �
  334.  
  335.  Here�s more evidence of cutting corners during the development of the
  336. Healthcare.gov insurance marketplace: the website appears to be violating
  337. its own privacy policy by sending private user information to third parties.
  338.  
  339.  Security researcher Ben Simo noticed that Healthcare.gov was sending his
  340. user name and password reset code to third party partners including the
  341. analytics services Pingdom, DoubleClick, and Google Analytics.
  342.  
  343. http://www.theverge.com/2013/10/31/5047932/healthcare-gov-transferring-private-user-information-third-parties
  344.  
  345. http://www.dailybinarynews.com/healthcare-gov-sends-user-information-to-third-parties-violating-its-own/
  346.  
  347. � HealthCare.gov Breach of Privacy �
  348.  
  349. http://www.dailybinarynews.com/healthcare-gov-users-see-breach-of-privacy
  350.  
  351. http://www.wnd.com/2013/11/healthcare-gov-users-see-breach-of-privacy/?cat_orig=us
  352.  
  353. � HealthCare.gov Users Warn of Security
  354. Risk, Breach of Privacy �
  355.  
  356. http://blog.heritage.org/2013/11/02/exclusive-healthcare-gov-users-warn-of-security-risk-breach-of-privacy/
  357.  
  358. � Medical Privacy Rights are Violated �
  359.  
  360.  Obama�s signature program is rife with inequities. It makes a
  361. dysfunctional system worse.
  362.  
  363.  It rations healthcare. It�s unaffordable. It leaves millions uninsured.
  364. It leaves millions more underinsured. It compromises privacy. A little
  365. noticed disclaimer states:
  366.  
  367.  �You have no reasonable expectation of privacy regarding any communication
  368. or data transmitting or stored on this information system.�
  369.  
  370. http://www.globalresearch.ca/obamacare-fallout-medical-privacy-rights-are-violated/5355694
  371.  
  372. http://www.dailybinarynews.com/obamacare-fallout-medical-privacy-rights-are-violated/
  373.  
  374. � Mike Rogers Admits Healthcare.gov Has No Security From Data Theft �
  375.  
  376.  �It was very clear to me in the hearing that they don�t have an
  377. overarching solid cybersecurity plan to prevent the loss of private
  378. information,� he said Sunday morning on CNN�s �State of the Union.�
  379.  
  380. http://thehill.com/video/sunday-shows/330797-rep-rogers-worried-healthcaregov-doesnt-have-solid-cybersecurity-plan
  381.  
  382. � Obamacare ; a Massive Privacy Breach Waiting to Happen �
  383.  
  384.  We already know that, thanks to the law, health care premiums are rising.
  385. Jobs are being lost. And the quality of health care itself will decline.
  386. But it�s only a matter of time before the law causes another crisis: a
  387. national breach of individual privacy.
  388.  
  389.  Fears of data breaches are real; the health and financial information of
  390. millions of Americans are housed in a massive federal government database
  391. called the �Data Hub.� That database will provide information to each state�s
  392. health care exchange, where individuals and small businesses are expected to
  393. purchase insurance plans online.
  394.  
  395. http://dailycaller.com/2013/10/15/obamacare-a-massive-privacy-breach-waiting-to-happen/
  396.  
  397. http://www.dailybinarynews.com/obamacare-a-massive-privacy-breach-waiting-to-happen/
  398.  
  399. � Obamacare Market ; Personal Data Can Be Used for Law Enforcement and
  400. to Audit Users� Online Activities �
  401.  
  402.  �The only exception to this policy is that we may share information
  403. provided in your application with the appropriate authorities for law
  404. enforcement and audit activities.�
  405.  
  406.  �If you send us an e-mail, we use the information you send us to respond
  407. to your inquiry. E-mail correspondence may become a public record. As a
  408. public record, your correspondence could be disclosed to other parties upon
  409. their request in accordance with Maryland�s Public Information Act.�
  410.  
  411. http://www.weeklystandard.com/blogs/obamacare-marketplace-personal-data-can-be-used-law-enforcement-and-audit-activities_762237.html
  412.  
  413. � Warning! Enrolling in Obamacare Allows Government to Link You�re IP
  414. Address With You�re Name and Personal Information �
  415.  
  416.  We have already established that Healthcare.gov is not a functioning
  417. database application that allows people to shop for competing health plans.
  418. It is actually a government-run Trojan Horse that suckers people into
  419. creating accounts where they hand over ;
  420.  
  421. � Name and address
  422. � Email address and password
  423. � Social Security number
  424. � Private bank account details
  425. � Employer details and other information
  426.  
  427.  This IP address is then handed over to
  428. the NSA (and many others) where your IP
  429. is cross-referenced with all website
  430. visits, including ;
  431.  
  432. � �Anti-government� websites (news)
  433. � Porn sites
  434. � Gambling sites
  435. � File sharing sites
  436. � �Terrorism� support sites
  437. � Encryption service sites like Hushmail
  438. � Chat rooms, message boards and more
  439.  
  440. This includes access to all system and web browser logs, cache, cookies.
  441.  
  442. � We Are Living In Orwell�s Nightmare �
  443.  
  444.  If the IRS or NSA scandals involving misuse of private data were troubling,
  445. consider the implications of the new information databases created in the
  446. name of health care. The newly-launched Affordable Care Act creates a massive
  447. electronic registry of private information that is accessible to bureaucrats
  448. in agencies ranging from the IRS to the Department of Homeland Security. Its
  449. a wonder how Americans who are becoming increasingly concerned with federal
  450. surveillance and domestic spying programs could in any way approve of the
  451. so-called Obamacare law.
  452.  
  453. http://warforourmind.com/obamacare-law-creates-data-services-hub-and-tracks-social-and-behavioral-data/
  454.  
  455. � Javascript Code From healthcare.gov �
  456.  
  457. https://www.healthcare.gov/marketplace/global/en_US/registration.js
  458.  
  459.  Javascript code reveals details of
  460. what kind of information is requested
  461. from corporate third-parties ;
  462.  
  463. � Driver�s license
  464. � Zip code
  465. � State ID
  466. � Mortgage payment receipt
  467. � Mortgage deed showing primary residency
  468. � Lease agreement
  469. � School enrollment documentation
  470. � Utility bills
  471. � Social Security card
  472. � Social Security statement, SSA 1099
  473. � US passport
  474. � US public birth record
  475. � Certification of Report of Birth
  476. � Consular Report of Birth Abroad
  477. � Certification of Birth Abroad
  478. � US Citizen Identification Card
  479. � American Indian Card (I-872)
  480. � Certificate of Naturalization
  481. � Certificate of Citizenship
  482. � Cost of living verification
  483. � Military identification card
  484. � Letter from Veterans Administration
  485. � Email accounts
  486. � Tax form(s)
  487. � Wages and tax statements (W-2)
  488.  
  489. Questions they ask you include ;
  490.  
  491. � What is the first name of your oldest
  492. niece?
  493.  
  494. � What is a relative�s telephone number
  495. that is not your own?
  496.  
  497. � What is the name of your favorite pet?
  498.  
  499. � Type a significant date in your life?
  500.  
  501. � In what city was your mother born?
  502.  
  503. � What is the name of your favorite
  504. childhood friend?
  505.  
  506. � What is your parents� wedding
  507. anniversary date?
  508.  
  509. � What is the name of the manager at
  510. your first job?
  511.  
  512. � What is the nick name of your
  513. grandmother?
  514.  
  515. � What is your favorite radio station?
  516.  
  517. � What is your favorite cuisine?
  518.  
  519. � What was your favorite toy when you
  520. were a child?
  521.  
  522. ? Javascript Code All Fucked Up �
  523.  
  524. http://www.cbsnews.com/8301-505269_162-57606633/obamacare-website-looks-like-nobody-tested-it-programmer-says/
  525.  
  526. � Obamacare�s Privacy Nightmare �
  527.  
  528. http://www.nationalreview.com/article/360249/obamacares-privacy-nightmare-sean-riley-ed-walton
  529.  
  530. � Public Waking Up to Threat of Digital Health Records �
  531.  
  532.  �Like any other kind of customer data, it gets bought and sold
  533. and you have no idea where it went.�
  534.  
  535. http://www.foxnews.com/politics/2013/10/02/obamacare-reg-on-digital-patient-records-raises-security-concerns/
  536.  
  537.  As more health-related data is digitized, �the privacy violations are
  538. going to be incalculable,� Jim Pyles, an expert in health law who
  539. co-founded the law firm Powers Pyles Sutter & Verville, told CBSNews.com.
  540.  
  541. http://www.cbsnews.com/8301-250_162-57605564/obamacare-marketplaces-raise-data-security-concerns/
  542.  
  543. � HHS Data Hub is by NO Means Secure �
  544.  
  545. http://blog.heritage.org/2013/10/02/cyber-failures-in-obamacare-exchanges-dangerous-to-your-wallet-and-privacy/
  546.  
  547. http://www.dailybinarynews.com/cyber-failures-in-obamacare-exchanges-dangerous-to-your-wallet-and-privacy/
  548.  
  549. � HHS-Run Website Hacked Again �
  550.  
  551. http://www.weeklystandard.com/blogs/hhs-run-website-hacked-now-selling-nfl-jerseys-ugg-boots-armani-fragrances_759213.html
  552.  
  553. � McAfee ; Beware of ObamaCare Phishing Scams, Data Theft �
  554.  
  555.  Security firm McAfee warned Tuesday that hackers are likely to
  556. take advantage of the rollout of ObamaCare exchanges this week by
  557. launching phishing attacks aimed at stealing personal information.
  558.  
  559.  Both Democrats and Republicans have chosen to keep their mouths shut
  560. about the problems regarding personal data theft due to digitized
  561. insurance laws.
  562.  
  563.  Not so surprising though, considering both parties have engaged in
  564. efforts to enforce massive secret surveillance.
  565.  
  566.  Of course, this may be the reason behind a so-called �shutdown� -
  567. so politicians can take their vacations and let the public deal with
  568. this mess they created.
  569.  
  570. http://www.foxbusiness.com/industries/2013/10/01/mcafee-warns-phishing-scams-tied-to-obamacare-launch/
  571.  
  572. http://www.newsmax.com/Newsfront/Obamacare-exchanges-hackers-phishing/2013/10/01/id/528788
  573.  
  574. � Welcome to An Era of ZERO Privacy �
  575.  
  576.  Obamacare not only opens up all Americans to obvious cyber threats
  577. nationally, but also globally. Welcome to a world where anyone can find
  578. out ANYTHING about you.
  579.  
  580. http://www.infowars.com/obamacare-the-identity-thief-wolves-are-at-the-door/
  581.  
  582. � Obamacare Rolling Out Medical Gestapo as Social Workers Go Door-to-Door
  583. With Access to All Our Personal Information �
  584.  
  585.  Even �users of tobacco products in the home� will be targeted for
  586. �assessment.�
  587.  
  588. http://www.pakalertpress.com/2013/09/30/are-you-ready-for-obamacare-home-visits/
  589.  
  590.  Under Obamacare, the Department of Health and Human Services (HHS) is
  591. implementing a �Navigator� program, which provides millions of dollars
  592. to non-profit groups nationwide to hire �Navigators� who will advise
  593. Americans on their Obamacare health �options� based on the sensitive
  594. information provided.
  595.  
  596.  This sensitive information includes social security numbers, income levels,
  597. employment history and home addresses, all of which are more than enough to
  598. steal Americans� identities for complete access to their credit and financial
  599. resources.
  600.  
  601. http://www.infowars.com/door-to-door-identity-theft-likely-under-obamacare/
  602.  
  603.  In a Sept. 20 letter to HHS, the US House Committee on Energy and Commerce
  604. asked the department to respond to its concerns over the �rushed implementation�
  605. of its Navigator program, including plans by non-profit groups to �engage
  606. in enrollment activities that increase the likelihood of fraud or abuse,
  607. including door-to-door contacts.�
  608.  
  609. http://energycommerce.house.gov/sites/republicans.energycommerce.house.gov/files/letters/20130920CCIIO.pdf
  610.  
  611.  �The recipient of one of the largest Navigator grants explained in their
  612. application that they expected a substantial portion of their program
  613. to involve door-to-door contacts,� the letter stated. �Another described
  614. their work plan as involving �door-to-door outreach to 10,000 households
  615. per week.��
  616.  
  617. � DEA Gestapo Brags Electronic Health Records Are Given to Third-parties
  618. and Slaves Should Not Expect Privacy �
  619.  
  620.  In response to a lawsuit, the Drug Enforcement Agency brags that patients
  621. should have �no expectation of privacy� regarding their health information
  622. once it is given to a pharmacy or any third party, United Press International
  623. reports.
  624.  
  625.  In the lawsuit, the American Civil Liberties Union represents a doctor
  626. and four patients in Oregon whose medical records are located in a state
  627. database used by physicians to help curb prescription drug misuse.
  628.  
  629.  According to UPI, personal health information stored in the database might
  630. include Gender identity, HIV status and mental illness.
  631.  
  632.  DEA has requested information from the database through subpoenas rather
  633. than probable cause warrants as required by state law.
  634.  
  635. http://www.upi.com/blog/2013/09/24/DEA-Medical-records-sent-to-pharmacies-have-no-protected-privacy/7221380050479/
  636. http://www.ihealthbeat.org/articles/2013/9/27/dea-no-privacy-protections-for-rx-records-given-to-third-parties
  637. https://www.aclu.org/technology-and-liberty/oregon-prescription-drug-monitoring-program-v-drug-enforcement-administrat-26
  638.  
  639. � HHS Data Hub Brokers Hacked �
  640.  
  641.  A service that sells personal data to identity thieves has been getting
  642. its wares from hacked data brokers storing information similar to what
  643. Obamacare marketplaces plan to use, setting the scene for fraudsters to
  644. collect government subsidies.
  645.  
  646.  According to a new investigative report by cybersecurity researcher
  647. Brian Krebs, the service, known as SSNDOB, hacked LexisNexis and other
  648. large data aggregators that supply ID check information.
  649.  
  650.  The certification site �is constantly crashing. It�s been a complete pain,�
  651. said Wes Bissett, senior counsel for state government affairs at the
  652. Independent Insurance Agents and Brokers of America.
  653.  
  654.  Criminals can get their hands on anyone�s �identity information through
  655. the black market exchanges that Krebs writes about. Frankly, it�s another
  656. ominous and bad sign for Obamacare, since as I understand it, the new health
  657. care insurance exchanges will be using the same [knowledge-based authentication]
  658. to verify applicants for healthcare insurance,� Litan wrote in her blog post.
  659.  
  660. http://krebsonsecurity.com/2013/09/data-broker-giants-hacked-by-id-theft-service/
  661. http://www.nextgov.com/health/2013/09/hacked-data-brokers-could-spell-trouble-obamacare/70958/
  662. http://blogs.gartner.com/avivah-litan/2013/09/25/knowledge-based-authentication-breached-big-time-another-dagger-for-obamacare-the-banks-and-many-others/
  663. http://www.washingtonpost.com/national/health-science/reports-of-computer-problems-and-logistical-glitches-proceed-launch-of-obamacare/2013/09/27/4ca18dcc-2792-11e3-b3e9-d97fb087acd6_print.html
  664.  
  665. � Patient Privacy Goes Out the Window and Into the HHS Data Hub �
  666.  
  667. http://www.dailybinarynews.com/patient-privacy-goes-out-the-window-and-into-the-obamacare-data-hub/
  668.  
  669. � Start Shunning the Doctors, Providers �
  670.  
  671.  Of course electronic health records are involved in this latest
  672. information grab. For those who don�t know, as part of Prez
  673. Obama�s stimulus bill, The American Recovery and Reinvestment Act
  674. of 2009, he included the Health Information Technology and
  675. Economic and Clinical Health (HITECH) Act, which attempts to get
  676. every doctor and hospital to use electronic health records instead
  677. of paper records through the use of incentives (read government funding)
  678. and penalties for non-compliance.
  679.  
  680.  Senators Alexander, Burr, Coburn, Enzi, Roberts, and Thune produced
  681. a report about the difficulties involved in implementing the HITECH Act.
  682. The top five problems they found are: lack of a clear path toward
  683. interoperability, increased costs, lack of oversight, putting patient
  684. privacy at risk, and program sustainability.
  685.  
  686. http://www.thune.senate.gov/public/index.cfm/files/serve?File_id=0cf0490e-76af-4934-b534-83f5613c7370
  687.  
  688. � Hows You�re Sex Life? �
  689.  
  690. http://nypost.com/2013/09/15/obamacare-will-question-your-sex-life/
  691.  
  692. � Obamacare Federal Exchanges Will NOT Be Protected �
  693.  
  694. http://www.weeklystandard.com/blogs/mcconnell-dont-open-obamacare-exchanges-if-privacy-isnt-protected_745961.html
  695.  
  696. � Obamacare IT Lacks Data Security �
  697.  
  698.  The most likely serious security breach would be identity theft,
  699. in which a hacker steals the social security numbers and other
  700. information people provide when signing up for insurance.
  701.  
  702. http://www.reuters.com/article/2013/08/06/us-usa-healthcare-security-idUSBRE9750YH20130806
  703.  
  704. � MEDICAL DICTATORSHIP ; Here Comes Obamacare Big Brother Database �
  705.  
  706.  Would you trust thousands of low-level Federal bureaucrats and
  707. contractors with one-touch access to your private financial and medical
  708. information? Under Obamacare you won�t have any choice.
  709.  
  710.  As the Obamacare train-wreck begins to gather steam, there is increasing
  711. concern in Congress over something called the Federal Data Services Hub.
  712. The Data Hub is a comprehensive database of personal information being
  713. established by the Department of Health and Human Services (HHS) to
  714. implement the federally facilitated health insurance exchanges. The
  715. purpose of the Data Hub, according to a June 2013 Government Accountability
  716. Office (GAO) report, is to provide �electronic, near real-time access
  717. to federal data� and �access to state and third party data sources needed
  718. to verify consumer-eligibility information.� In these days of secret domestic
  719. surveillance by the intelligence community, rogue IRS officials and state
  720. tax agencies using private information for political purposes, and police
  721. electronically logging every license plate that passes by, the idea of the
  722. centralized Data Hub is making lawmakers and citizens nervous.
  723.  
  724. http://rare.us/story/move-over-nsa-here-comes-the-obamacare-big-brother-database/
  725. http://www.wric.com/story/22641990/federal-data-services-hub-does-exist-aishealthcom-blog-post-reports
  726. http://www.nationalreview.com/article/354031/obamacares-branch-nsa-john-fund
  727.  
  728. � Federal Requirements to Exchange Information to/from the
  729. HHS Federal Data Services Hub �
  730.  
  731. http://www.nescies.org/sites/www.nescies.org/files/HHS%20-%20Hub%20Statement%20of%20Work%20.pdf
  732.  
  733. � Implantable Medical Devices Planned for Data Theft Markets, 2008 �
  734.  
  735. https://spqr.eecs.umich.edu/papers/b1kohFINAL2.pdf
  736.  
  737. � NO PRIVACY ; 94 Percent of Healthcare Organizations Breached �
  738.  
  739. http://threatpost.com/en_us/blogs/study-94-percent-healthcare-organizations-breached-010313
  740.  
  741. http://www2.idexpertscorp.com/assets/uploads/ponemon2012/Third_Annual_Study_on_Patient_Privacy_FINAL.pdf
  742.  
  743. � FDA Provides $50,000,000 Healthcare Contact for Scientific Computing �
  744.  
  745. http://washingtontechnology.com/articles/2013/01/04/drc-fda-work.aspx
  746.  
  747. � FDA Seeks Unique ID to Spy Medical Devices �
  748.  
  749. http://cryptome.org/2012/07/fda071012.pdf
  750.  
  751. � Electronic Health Records Implementation �
  752.  
  753. http://cryptome.org/0002/hhs072810.htm
  754.  
  755. � Accenture Corporation Explores Medical Smart Grid Technocracy �
  756.  
  757. http://www.accenture.com/NR/rdonlyres/350E5873-836E-4592-BC49-FDFF6B79065E/0/Accenture_Innovation_Center_Health_How_Technology_Will_Transform_Future_of_Chronic_Care.pdf
  758. ????????????????????????????????????????
  759. ????????????????????????????????????????

Submit a correction or amendment below. (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.
Syntax Highlighting:
To highlight particular lines, prefix each line with @@
Pressing TAB inserts 3 spaces