Identity Theft: Protection and Prevention © 2017

Total Page:16

File Type:pdf, Size:1020Kb

Identity Theft: Protection and Prevention © 2017 Computer Security: Data and Identity Management Data Security - Identity Theft: Protection and Prevention www.RobertSiciliano.com © 2017 9/18/2017 www.IDTheftSecurity.com 9/18/2017 www.IDTheftSecurity.com www.IDTheftSecurity.comID Theft Security 1 9/18/2017 www.IDTheftSecurity.com www.IDTheftSecurity.comID Theft Security 2 Awareness . A lack of security appreciation contributes directly to poor security awareness, most notably at the personnel level. – This is one of the leading contributors to the human error factor with most security breaches. – Security needs to be everyone’s business. – Corporations and government agencies are directly responsible for protecting personal information entrusted to them by their consumers, so measures must be taken to increase awareness in the everyday IT environment. – The most critical step to changing user behavior is to build a secure-minded culture from the ground up. – To create this culture, all employees need to be educated and tested on security threats and how their day-to-day computer use behavior can affect their organization’s security posture. 9/18/2017 www.IDTheftSecurity.com CIO Magazine Social Engineering . Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery for information gathering or computer system access and in most cases the attacker never comes face-to-face with the victim. THERE IS NO PATCH FOR HUMAN GULLIBILITY . Lose something . Thieves pose as You . Gain something . Spouse . Fear/greed . Bill collector . “Principles of Influence and Persuasion . Bank . email . Utility . telephone . Merchant / Organization . in person . Fellow employee . Trojan horse/Watering holes . Government agency 9/18/2017 www.IDTheftSecurity.comID Theft Security 3 9/18/2017 www.IDTheftSecurity.com 9/18/2017 www.IDTheftSecurity.com www.IDTheftSecurity.comID Theft Security 4 9/18/2017 www.IDTheftSecurity.com 9/18/2017 www.IDTheftSecurity.com www.IDTheftSecurity.comID Theft Security 5 9/18/2017 Hack a Company w/… . Scour all of the social networking sites for employees of target company like LinkedIn, Twitter , and Facebook.com . Find numerous people who openly discussed what they did for a living . Create a Facebook group site identified as “Employees of” the company. Using a fictitious identity proceed to “friend,” or invite, employees to our “company” Facebook site. Membership grows exponentially each day. By creating a group, you access to employees profiles. The “group” is a place where those who you know, like and trust are your “Friends” and in this case fellow employees who you have no reason to distrust. Chose to use the identity of one of our Facebook-friended employees to gain access to the building. Relative to as companies size you may be able to recreate the identity of an employee that’s not known to the branch office to breach. But the name needs to be in the system. A little creativity, a fake business card and enough information gleaned off of Facebook, you’re in. www.IDTheftSecurity.comID Theft Security 6 9/18/2017 www.IDTheftSecurity.com www.IDTheftSecurity.comID Theft Security 7 9/18/2017 www.IDTheftSecurity.com www.IDTheftSecurity.comID Theft Security 8 9/18/2017 www.IDTheftSecurity.com Malicious insider Attacks A malicious insider is; a current or former employee, contractor, or business partner who has or had authorized access to an organization’s network system or data and intentionally exceeded or misused that access in a manner that negatively affected the confidentiality, integrity, or availability of the organization’s information. CERT. Methods/tactics: Recruiting: • System admins • New hires • Disgruntled; sabotage • Friends/relations • Opportunists: fraud • Unknowingly contribute • Theft of intellectual property • Money/incentives • Social engineering • Threats/violence “Our whole system is based on personal trust,” James Clapper, director of national intelligence said adding that there were no “mousetraps” in place to guarantee there wouldn’t be another Edward Snowden. 9/18/2017 www.IDTheftSecurity.com www.IDTheftSecurity.comID Theft Security 9 Data Breaches . Irresponsible/malicious insiders . 3rd party fault . Laptop theft . Physical security vulnerabilities . Loss st .9/18/2017Hacking : 21 century burglarywww.IDTheftSecurity.com 9/18/2017 www.IDTheftSecurity.comID Theft Security 10 Criminal Hackers • Albert Gonzalez 170 million records • Buried $1 Million • Doing 20 years 9/18/2017 www.IDTheftSecurity.com www.IDTheftSecurity.comID Theft Security 11 9/18/2017 www.IDTheftSecurity.com www.IDTheftSecurity.comID Theft Security 12 9/18/2017 www.IDTheftSecurity.com Password Manager . Dictionary attacks: These rely on software that automatically plugs common words into password fields. Password cracking becomes almost effortless with a tool like John the Ripper or similar programs. Cracking security questions: When you click the “forgot password” link within a webmail service or other site, you’re asked to answer a question or series of questions. The answers can often be found on your social media profile. This is how Sarah Palin’s Yahoo account was hacked. Simple passwords: When 32 million passwords were exposed in a breach last year, almost 1% of victims were using “123456.” The next most popular password was “12345.” Other common choices are “111111,” “1234567,” “12345678,” “123456789,” “princess,” “qwerty,” and “abc123.” Many people use first names as passwords, usually the names of spouses, kids, other relatives, or pets, all of which can be deduced with a little research. Reuse of passwords across multiple sites: Reusing passwords for email, banking, and social media accounts can lead to identity theft. Two recent breaches revealed a password reuse rate of 31% among victims. Social engineering: Social engineering is an elaborate type of lying. An alternative to traditional hacking, it is the act of manipulating others into performing certain actions or divulging confidential information. There are a number of ways to create more secure passwords. One option is to create passwords based on a formula, using a familiar name or word, plus a familiar number, plus the first four words of the website where that password will be used. Mix in a combination of upper and lowercase letters, and you have a secure password. Using this formula, your Bank of America password could be “Dog7Bank,” for example. (Add one capital letter and an asterisk to your password, and it can add a couple of centuries to the time it would take for a password cracking program to come up with it.) 9/18/2017 www.IDTheftSecurity.com www.IDTheftSecurity.comID Theft Security 13 9/18/2017 www.IDTheftSecurity.com Hacking for Money . Social engineering . Phishing . Weak credentials . Insecure passwords . Unpatched OS . Vera . NO PASSWORDs 9/18/2017 www.IDTheftSecurity.com www.IDTheftSecurity.comID Theft Security 14 9/18/2017 www.IDTheftSecurity.com www.IDTheftSecurity.comID Theft Security 15 Identity Theft Identity Theft Definition; Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for9/18/2017 economic gain. www.IDTheftSecurity.com Perpetrators 9/18/2017 www.IDTheftSecurity.comID Theft Security 16 Perpetrators 9/18/2017 Perpetrators 9/18/2017 www.IDTheftSecurity.comID Theft Security 17 PerpetratorsPerpetrators 9/18/2017 PerpetratorsPerpetrators 9/18/2017 www.IDTheftSecurity.comID Theft Security 18 Perpetrators 9/18/2017 Perpetrators 9/18/2017 www.IDTheftSecurity.comID Theft Security 19 Perpetrators 9/18/2017 Perpetrators 9/18/2017 www.IDTheftSecurity.comID Theft Security 20 Perpetrators 9/18/2017 Perpetrators 9/18/2017 www.IDTheftSecurity.comID Theft Security 21 Perpetrators 9/18/2017 Perpetrators Perpetrators 9/18/2017 www.IDTheftSecurity.comID Theft Security 22 Perpetrators 9/18/2017 Perpetrators 9/18/2017 www.IDTheftSecurity.comID Theft Security 23 Victims Story • I have been a victim of Identity Theft. Without making this E-mail 10 pages long, this all started in 1983, with a warrant for my arrest, it escalated to my drivers license being suspended in the state of Minnesota in 1986, and an arrest warrant in the State Of Kansas. I had a criminal history report run by the Minnesota Bureau of Criminal Apprehension, which came back with a 10 page report linked to my name, with various felonies including Criminal Sexual Conduct and Grand Theft. The person who has been using my name and date of birth is someone that I was “friends” with as a child. Over the course of the past 20 odd years, I have had my drivers license flagged with the DMV, so that picture ID must be provided if someone gives my name, as well as carrying a file folder with me, in the off chance that I get stopped by the police. I also have my driving record checked once a year to make sure that everything on it is accurate. Paul G. January 20 9/18/2017 Flawed System SSN + Credit + Fake ID www.IDTheftSecurity.comID Theft Security 24 Identity Theft Types . New Account Fraud Using another's personal identifying information (SSN) to obtain products and services using that person’s good credit standing . Account Takeover Fraud Using another persons account numbers such as a credit card number to obtain products and services using that person’s existing accounts or extracting funds from a persons bank account. • Tax Identity Theft Tax-related scams have increased by over 700% since 2008. Two million fraudulent tax returns were filed in 2011 alone, at a cost of two billion dollars. Child Identity Theft Studies show child identity theft is affecting over 500,000 kids every year. Identity Theft Types . Medical Identity Theft The deadliest form of identity theft. 1.5 Million victims every year. The motivation of the thief is medical procedures or any form of attention regarding healthcare . Criminal Identity Theft Someone commits a crime and uses the assumed name another person.
Recommended publications
  • NOMINEES for the 32Nd ANNUAL NEWS & DOCUMENTARY EMMY
    NOMINEES FOR THE 32 nd ANNUAL NEWS & DOCUMENTARY EMMY ® AWARDS ANNOUNCED BY THE NATIONAL ACADEMY OF TELEVISION ARTS & SCIENCES Winners to be announced on September 26th at Frederick P. Rose Hall, Home of Jazz at Lincoln Center Larry King to Receive Lifetime Achievement Award New York, N.Y. – July 18, 2011 (revised 8.24.11) – Nominations for the 32nd Annual News and Documentary Emmy ® Awards were announced today by the National Academy of Television Arts & Sciences (NATAS). The News & Documentary Emmy® Awards will be presented on Monday, September 26 at a ceremony at Frederick P. Rose Hall, Home of Jazz at Lincoln Center, located in the Time Warner Center in New York City. The event will be attended by more than 1,000 television and news media industry executives, news and documentary producers and journalists. Emmy ® Awards will be presented in 42 categories, including Breaking News, Investigative Reporting, Outstanding Interview, and Best Documentary, among others. This year’s prestigious Lifetime Achievement Award will be given to broadcasting legend and cable news icon Larry King. “Larry King is one of the most notable figures in the history of cable news, and the National Academy of Television Arts and Sciences is delighted to present him with this year’s lifetime achievement award,” said Malachy Wienges, Chairman, NATAS. “Over the course of his career Larry King has interviewed an enormous number of public figures on a remarkable range of topics. In his 25 years at CNN he helped build an audience for cable news and hosted more than a few history making broadcasts.
    [Show full text]
  • Protecting Colleges & Universities Against Real Losses in a Virtual World, 33 J. Marshall J. Info. Tech. & Privacy L. 10
    The John Marshall Journal of Information Technology & Privacy Law Volume 33 | Issue 2 Article 3 2017 Protecting Colleges & Universities Against Real Losses in a Virtual World, 33 J. Marshall J. Info. Tech. & Privacy L. 101 (2017) Gregory Demers Seth Harrington Mark Cianci Nicholas Green Follow this and additional works at: https://repository.jmls.edu/jitpl Part of the Computer Law Commons, Education Law Commons, Internet Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Gregory Demers, Seth Harrington, Mark Cianci, & Nicholas Green, Protecting Colleges & Universities Against Real Losses in a Virtual World, 33 J. Marshall J. Info. Tech. & Privacy L. 101 (2017) https://repository.jmls.edu/jitpl/vol33/iss2/3 This Article is brought to you for free and open access by The oJ hn Marshall Institutional Repository. It has been accepted for inclusion in The oJ hn Marshall Journal of Information Technology & Privacy Law by an authorized administrator of The oJ hn Marshall Institutional Repository. 2017] Protecting Colleges & Universities 101 ARTICLE PROTECTING COLLEGES & UNIVERSITIES AGAINST REAL LOSSES IN A VIRTUAL WORLD GREGORY L. DEMERS, SETH C. HARRINGTON, MARK A. CIANCI, AND NICHOLAS R. GREEN, – ROPES & GRAY LLP * SUMMARY: Colleges and universities are prime targets for cyberattacks. Au- thors Gregory L. Demers, Seth C. Harrington, Mark A. Cianci, and Nicholas R. Green explore emerging data security risks and litigation trends on college campuses, and offer ways to manage these risks through a comprehensive insurance plan. Given the increasing variety and complexity of plans available, it is incumbent upon universities to regularly reassess the coverage afforded by their existing policies.
    [Show full text]
  • Cybersecurity for Connected Cars Exploring Risks in 5G, Cloud, and Other Connected Technologies
    Cybersecurity for Connected Cars Exploring Risks in 5G, Cloud, and Other Connected Technologies Numaan Huq, Craig Gibson, Vladimir Kropotov, Rainer Vosseler TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information Contents and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. 4 Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing The Concept of Connected Cars herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. 7 Translations of any material into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise Research on Remote Vehicle related to the accuracy of a translation, please refer to Attacks the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. 13 Although Trend Micro uses reasonable efforts to include Cybersecurity Risks of Connected accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as Cars to its accuracy, currency, or completeness. You agree that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied.
    [Show full text]
  • Identity Theft: the Aftermath 2017 1
    Identity Theft: The Aftermath 2017 1 PRESIDENT & CEO IDENTITY THEFT RESOURCE CENTER (ITRC) Eva Velasquez CONTRIBUTORS Eva Velasquez, ITRC President & CEO Julie Ferguson, ITRC Board of Directors Chair, Industry Expert Matt Cullina, ITRC Board of Directors Vice Chair, Industry Expert Terri Beck, ITRC Board of Directors, Secretary, Industry Expert Paul Bond, ITRC Board of Directors, Industry Expert Matthew Donahue, ITRC Board of Directors, Industry Expert Susan Grant, ITRC Board of Directors, Industry Expert Stew Roberts, ITRC Board of Directors, Industry Expert Paige Schaffer, ITRC Board of Directors, Industry Expert Robert Siciliano, ITRC Board of Directors, Industry Expert Mona Terry, ITRC Karen Barney, ITRC Kelly Dwyer, ITRC Alex Hamilton, ITRC CONTACT Kelly Dwyer Director of Communications [email protected] (858) 634-6385 Identity Theft: The Aftermath 2017 2 TABLE OF CONTENTS Executive Summary and Highlights ..................................................................................................... 4 Introduction / Methodology ................................................................................................................... 6 Key Findings A. Victims’ actions following identity theft .............................................................................. 7 B. Significant number of ways identity theft impacts victims ................................................ 8 C. Victims’ relationships with others ........................................................................................ 9 D.
    [Show full text]
  • Growing up to Meet the Times
    WWW.MIREALTORS.COM 13 SEPTEMBER 20 SEPTEMBER GROWING UP TO meET THE TImeS PLUS: The Myth of Multi-tasking Working To Get Listings Green Renovations The EMD Hot Potato Protection from Scams Volume 12 | Number 5 Volume Who Says You Can’t Have It All? Free yourself, and discover an innovative, smart and portable way to increase productivity and efficiency in your real estate business with EXIT Realty’s Total Office Resource Center. Your business. Your life. All in one place. CONNECT WITH ME TO LEARN MORE Craig Witt, President - North Central Division 1-877-669-3948, [email protected] www.exitrealty.com/michigan Forget game-changer, let’s talk about life-changer! EXITRealtyMichigan_September2013.indd 2 7/4/2013 1:11:07 PM 09.13 Who Says You Can’t Have It All? OF TABLE Features 07 Keeping Scammers at Bay Here are a lot of ways to protect yourself by Robert Siciliano 10 How Green is Your Renovation Project? CONTENTS Smart makeovers can save you money in the long run by Brent Wayne COVER STORY 14 Michigan’s MLSs Coming of Age Changing with the times helps everybody 18 It is Time to Forsake Multi-tasking Often the more you do, the less you accomplish by Jeff Davidson 21 Earning the Business! Give customers good reasons to hire you by Marcus Wally 24 Appraisers Must Understand Michigan’s Appraisal License Laws There’s more to them than meets the eye by Micheal R. Lohmeier Departments 02 President’s Report Keys to a commercial lease by Bill Milliken 04 Capitol Report Seeing the trees for the forest Free yourself, and discover an innovative, smart and by Brad Ward 26 Legal Lines portable way to increase productivity and efficiency in your real estate EMDs: It never stops by Gregory L.
    [Show full text]
  • Print Profile
    ROBERT SICILIANO, CSP is a #1 Best Selling Amazon.com author of 5 books, CEO, and the architect of the CSI Protection certification; a Cyber Social and Identity Robert Siciliano Protection security awareness training program. Robert is a security expert and private investigator fiercely committed to informing, educating and empowering people so they can protect themselves and their loved ones from violence and Speech Topics crime in their everyday lives, both in their physical and virtual interactions. Robert is accessible, professional, and ready to weigh in and comment with down- to-earth insights at a moment’s notice on breaking news that affects us all. He has Technology worked with such companies as ExxonMobil, Intel, McAfee, MasterCard, Morgan Social Media Stanley, Merrill Lynch, KPMG, MIT, Transamerica, and UPS, and almost every Cyber Security major media outlet has turned to him for information on identity theft, internet Crisis Management safety, crime prevention, and security. Robert has been featured on the Dr. Oz Show, Anderson Cooper, John Stossel, CNN, Fox News, Inside Edition, EXTRA, Tyra Banks, Sally Jessie, Montel, Maury, Howard Stern, CNBC, MSNBC, ABC World News Tonight, NBC Nightline, CBS Early Show, Today Show, Good Morning America and in the NY Times, Wall Street Journal, TIME Magazine, Fortune, Forbes, Entrepreneur and many more. His personal mission is to inform, educate and empower people so they can protect themselves and their loved ones from violence and crime in their everyday lives, both in their physical and virtual interactions. Testimonials Robert was our keynote speaker at NAR’s Annual Risk Management Forum. He was fantastic.
    [Show full text]
  • Online •Œbotâ•Š Use Under the Computer Fraud and Abuse
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Seton Hall University eRepository Seton Hall University eRepository @ Seton Hall Law School Student Scholarship Seton Hall Law 2016 No Need to Fear Robots: Online “Bot” Use under the Computer Fraud and Abuse Act Peter F. Bariso III Follow this and additional works at: https://scholarship.shu.edu/student_scholarship Part of the Law Commons Recommended Citation Bariso III, Peter F., "No Need to Fear Robots: Online “Bot” Use under the Computer Fraud and Abuse Act" (2016). Law School Student Scholarship. 757. https://scholarship.shu.edu/student_scholarship/757 No Need to Fear Robots: Online “Bot” Use under the Computer Fraud and Abuse Act Peter F. Bariso III* I. Introduction The Computer Fraud and Abuse Act (CFAA) is a powerful statute that can combat online theft and protect digital information.1 Congress originally discussed these objectives in the early 1980s and enacted the CFAA in 1986 in the midst of the Digital Revolution.2 As digital machinery began to quickly replace analog and mechanical devices, Congress needed a statute with the ability to grow alongside this new technology.3 The CFAA was meant to be malleable and adapt over time with ever-changing innovation.4 At inception in 1986, however, the idea of a global internet, not to mention numerous other online technologies that now exist, was not even conceivable. Congress designed the CFAA to be flexible because digital technology was new, but this flexibility has been misused. If courts can freely expand the statute as broadly as they please, prosecutors will arguably be incentivized to exploit the CFAA and seek criminal sanctions based on untenable statutory interpretations.5 The Committee on the Judiciary expressly recognized that deterring unwanted computer actions begins with the private website owners and not federal law * J.D.
    [Show full text]
  • Into the Gray Zone: the Private Sector and Active Defense Against Cyber Threats
    Into the Gray Zone The Private Sector and Active Defense Against Cyber Threats Project Report October 2016 Some rights reserved. Printed in the United States of America. This report carries a Creative Commons Attribution 4.0 International license, which permits re-use of George Washington University Center for Cyber and Homeland Security’s content when proper attribution is provided. This means you are free to share and adapt Center for Cyber and Homeland Security’s work, or include our content in derivative works, under the following condition: You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This work is licensed under CC-BY version 4.0 https://creativecommons.org/licenses/by/4.0 © 2016 by Center for Cyber and Homeland Security Center for Cyber and Homeland Security 2000 Pennsylvania Avenue NW Washington, DC 20052 www.cchs.gwu.edu Table of Contents Foreword and Acknowledgements ......................................................................................................v Participants ................................................................................................................................................... ix Executive Summary .................................................................................................................................. xi Into the Gray Zone: The Private Sector and Active Defense Against Cyber Threats 1. Background
    [Show full text]
  • Unorthodox Hacking: Addressing Sexism in Hacktivist Communities to Expand Options for Electronic Civil Disobedience
    Unorthodox Hacking: Addressing Sexism in Hacktivist Communities to Expand Options for Electronic Civil Disobedience Giulia Curcelli Honors Thesis Curriculum in Peace, War, and Defense University of North Carolina at Chapel Hill Spring 2017 Approved: _____________________________________ Sara Bush Castro Advisor Curriculum in Peace, War, and Defense _____________________________________ Kenneth Andrews Reader Department of Sociology Table of Contents Introduction .........................................................................................................................3 Literature Review ...................................................................................................................... 14 Case 1: Mr. Robot Season 1 ..............................................................................................24 Case 2: Aaron Swartz and Freedom of Information .........................................................48 Case 3: The Transborder Immigrant Tool ........................................................................71 Conclusion: A Future Direction for Electronic Civil Disobedience .................................94 Appendix One: Graph of DDoS Attack ............................................................................99 Appendix Two: The Political Compass ..........................................................................100 Appendix Three: Diagram of Research Aims .................................................................101 Bibliography ...................................................................................................................102
    [Show full text]
  • Back to the Drawing Board: Student Privacy in Massachusetts K-12 Schools
    Back to the Drawing Board: Student Privacy in Massachusetts K-12 Schools Art by Hallie Jay Pope © 2015 ACLU Foundation of Massachusetts Staff from the ACLU Foundation of Massachusetts compiled this report. Authors: Kade Crockford, director, Technology for Liberty Program Jessie J. Rossman, staff attorney Press date: October 28, 2015 American Civil Liberties Union Foundation of Massachusetts 211 Congress Street Boston, MA 02110 617-482-3170 x344 www.aclum.org THANK YOU to the following people, without whom this report never would have seen the light of day: Margaret A. Hazuka Ariel G.E. Kong Brandon Levey Nancy MacDonald Hallie Jay Pope Raquel Ronzone TABLE OF CONTENTS I. INTRODUCTION: Student Privacy is about Control, not Secrecy .................................... 2 II. EXECUTIVE SUMMARY ................................................................................................ 4 III. RECOMMENDATIONS ................................................................................................... 6 • STUDENTS: Practice digital self-defense and understand school policies • PARENTS: Ask school administrators for basic transparency and look for these policy technology details • ADMINISTRATORS: Adopt best practices for technology acquisitions and policies • LEGISLATORS: Pass comprehensive 21st century student privacy law IV. METHODOLOGY & A CALL TO REFORM THE MASSACHUSETTS PUBLIC RECORDS LAW ............................................................................................... 9 V. UNDERSTANDING STUDENT PRIVACY LAW IN MASSACHUSETTS
    [Show full text]
  • The Financial Impact of Breached Protected Health Information
    THE FINANCIAL IMPACT OF BREACHED PROTECTED HEALTH INFORMATION A Business Case for Enhanced PHI Security Licensed to Mary Chaput. ANSI order Free_Document. Downloaded 3/11/2012 3:09 PM. Single user license only. Copying and networking prohibited. © 2012 American National Standards Institute (ANSI) / The Santa Fe Group /Internet Security Alliance All rights reserved. Published by ANSI. Printed in the United States of America. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, except as permitted under Sections 107 or 108 of the U.S. Copyright Act, without prior written permission of the publisher. Material in this publication is for educational purposes. Neither the publisher nor the authors assume any liability for any errors or omissions or for how this publication or its contents are used or interpreted or for any consequences resulting directly or indirectly from the use of this publication. For legal advice or any other, please consult your personal lawyer or the appropriate professional. The views expressed by the individuals in this publication do not necessarily reflect the views shared by the companies they are employed by (or the companies mentioned in this publication). The employment status and affiliations of authors with the companies referenced are subject to change. Licensed to Mary Chaput. ANSI order Free_Document. Downloaded 3/11/2012 3:09 PM. Single user license only. Copying and networking prohibited. The Progression of the Health Care
    [Show full text]
  • Boston Patients
    ---------------------------------------------------------------------------------------- MEDIA COVERAGE Boston patients July 2013 – January 2014 ---------------------------------------------------------------------------------------- Summary PART 1: July 2013 Wire Reuters……………………………………………………………………………………………………………… 5 Asian News International (ANI)…………..…………………………………………………………….. 6 Associated Press (AP)………………………………………………………………………………………... 7 Associated Press (AP)………………………………………………………………………………………... 8 Associated Press (AP)………………………………………………………………………………………... 9 Agence France Press (AFP)………………………………………………………………………………… 10 Bloomberg………………………………………………………………………………………………………… 12 United Press International (UPI)……………………………………………………………………….. 14 EFE……………………………………………………………………………………………………………………. 15 Broadcasting NBC-2……………………………………………………………………………………………………………….. 17 BBC…………………………………………………………………………………………………………………… 19 ABC RADIO………………………………………………………………………………………………………… 22 ABC RADIO………………………………………………………………………………………………………… 23 NBC…………………………………………………………………………………………………………………… 24 ForexTV…………………………………………………………………………………………………………….. 27 CBN…………………………………………………………………………………………………………………… 28 CBS……………………………………………………………………………………………………………………. 29 Al Jazeera………………………………………………………………………………………………………….. 31 CNN………………………………………………………………………………………………………………….. 32 NBC…………………………………………………………………………………………………………………… 35 Newspapers, magazines and blogs The New York Times…………………………………………………………………………………………. 37 The Wall Street Journal…………………………………………………………………………………….. 40 Financial Times………………………………………………………………………………………………….
    [Show full text]