Priority Development Assistance Fund Scam

Total Page:16

File Type:pdf, Size:1020Kb

Priority Development Assistance Fund Scam Priority Development Assistance Fund scam From Wikipedia, the free encyclopedia The Priority Development Assistance Fund scam, also called the PDAF scam or the pork barrel scam, is a political scandal involving the alleged misuse by several members of the Congress of the Philippines of their Priority Development Assistance Fund (PDAF, popularly called "pork barrel"), a lump-sum discretionary fund granted to each member of Congress for spending on priority development projects of the Philippine government, mostly on the local level. The scam was first exposed in the Philippine Daily Inquirer on July 12, 2013,[1] with the six-part exposé of the Inquireron the scam pointing to businesswoman Janet Lim-Napoles as the scam's mastermind after Benhur K. Luy, her second cousin and former personal assistant, was rescued by agents of theNational Bureau of Investigation on March 22, 2013, four months after he was detained by Napoles at her unit at the Pacific Plaza Towers in Fort Bonifacio.[2] Initially centering on Napoles' involvement in the 2004 Fertilizer Fund scam, the government investigation on Luy's testimony has since expanded to cover Napoles' involvement in a wider scam involving the misuse of PDAF funds from 2003 to 2013. It is estimated that the Philippine government was defrauded of some ₱10 billion in the course of the scam,[1] having been diverted to Napoles, participating members of Congress and other government officials. Aside from the PDAF and the fertilizer fund maintained by the Department of Agriculture, around ₱900 million in royalties earned from the Malampaya gas field were also lost to the scam.[3] The scam has provoked public outrage, with calls being made on the Internet for popular protests to demand the abolition of the PDAF,[4] and the order for Napoles' arrest sparking serious discussion online.[5] Contents [hide] 1 Background 2 Modus operandi 3 Accused parties 4 Investigation 5 Reactions 6 Protests 7 References Background[edit] Two infographs on the PDAF produced by the Assembly, the Political Science Organization of the Ateneo de Manila University. Main article: Priority Development Assistance Fund Although the history of pork barrel-like discretionary funds in the Philippines dates back to 1922,[6] during the American colonial period, the PDAF in its current form was only established during the administration of Corazon Aquino with the creation of the Countryside Development Fund (CDF) in 1990. With ₱2.3 billion in initial funding, the CDF was designed to allow legislators to fund small-scale infrastructure or community projects which fell outside the scope of the national infrastructure program, which was often restricted to large infrastructure items. The CDF was later renamed the PDAF in 2000, during the administration of Joseph Estrada.[7] Since 2008, every member of the House of Representatives usually receives an annual PDAF allocation of ₱70 million, while every senator receives an annual allocation of ₱200 million.[8] The President also benefits from a PDAF-like allocation, the President's Social Fund (PSF), worth around ₱1 billion.[9] Contrary to public belief, however, PDAF allocations are not actually released to members of Congress. Rather, disbursements under the PDAF are coursed via implementing agencies of the Philippine government, and are limited to "soft" and "hard" projects: the former largely referring to non-infrastructure projects (such as scholarships and financial assistance programs, although small infrastructure projects are also considered "soft" projects), and the latter referring to infrastructure projects which would be coursed via the Department of Public Works and Highways.[7] Because presidential systems are often prone to political gridlock, the PDAF is often used as a means to generate majority legislative support for the programs of the executive.[10] Furthermore, because PDAF allocations are released by the Department of Budget and Management (DBM), PDAF allocations are often dependent on the relationship a legislator has with the sitting President.[10] For example, during the latter years of the Gloria Macapagal-Arroyoadministration, she was more generous in allocating PDAF funds in the annual national budget in order to win the favor of legislators.[8] PDAF allocation has gradually increased over the years.[10]For example, before Arroyo stepped down, the last PDAF allocated was for the year 2010 at ₱10.86 billion, but when the Benigno Aquino III administration passed its first budget for 2011, the allocation more than doubled to ₱24.62 billion.[11] The PDAF has proven to be very unpopular, with numerous calls for its abolition. In 1996, the Philippine Daily Inquirer published an exposé on systematic corruption in the CDF, with an anonymous congressman (since identified as Romeo D. Candazo of Marikina) elaborating how legislators and other government officials earned from overpricing projects in order to receive large commissions. Public outrage over the misuse of the CDF was instrumental in the enactment of reforms which led to the formation of the PDAF.[12] The constitutionality of the PDAF has also been challenged in the Supreme Court. In 1994, the constitutionality of the CDF was challenged by the Philippine Constitution Association, arguing that the CDF's mechanisms encroach on the executive's power of implementing the budget passed by the legislature, but the Court ruled the CDF constitutional under the legislative's "power of the purse".[13] This ruling was reaffirmed in 2001, when the PDAF was challenged again in the Supreme Court.[7] Legislators themselves are torn on the abolition of the PDAF, with some supporting total abolition, others supporting increased regulation to minimize abuse of PDAF disbursements, and others opposed to it.[14] Modus operandi[edit] A graphic representation of the PDAF scam's modus operandi produced by the Assembly. The PDAF scam involved the funding of "ghost projects" that were funded using the PDAF funds of participating lawmakers.[15] These projects were in turn "implemented" through Napoles' companies, with the projects producing no tangible output. According to testimony provided by Benhur Luy's brother, Arthur, funds would be processed through fake foundations and non-governmental organizations (NGOs) established under the wing of the JLN Group of Companies, the holding company of Janet Lim-Napoles, with Napoles' employees—even a nanny—named as incorporators or directors.[16]Each foundation or NGO served as an official recipient of a particular legislator's PDAF funds, and each organization had a number of bank accounts where PDAF funds would be deposited for the implementation of these projects.[15] Napoles, who specialized in trading agricultural products, frequently used the procurement of agricultural inputs in the propagation of the scam. Either her employees would write to legislators requesting for funds for the implementation of a particular project (e.g. farm inputs), or a legislator would indicate to the DBM a particular recipient agency for his or her PDAF funds that would be pre-selected by Napoles.[17] Once received, this is forwarded to the DBM, which would then issue a Special Allotment Release Order (SARO) indicating the amount deducted from the legislator's PDAF allocation, and later a Notice of Cash Allocation (NCA) given to the recipient agency. The NCA would then be deposited in one of the foundation's accounts, and the funds withdrawn in favor of the JLN Group of Companies.[16] The funds would then be split between Napoles, the lawmaker, the official of the DA responsible for facilitating the transfer of funds and, for good measure, the local mayor or governor.[15] The JLN Group of Companies offered a commission of 10-15% against funds released to local government units and recipient agencies of PDAF funds, while a legislator would receive a commission of between 40-50% against the total value of his/her PDAF.[17] Letters sent by Napoles' employees to participating legislators would also include a letter from a local government unit requesting for funding, bearing the forged signature of the local mayor or governor. All documents involving local government units were prepared by Napoles' staff, and Benhur Luy would forge the signature of the local mayor or governor. Local government officials who were used by Napoles were often unaware that they were participating in the scam.[16] In other instances, however, Napoles would use emissaries to establish contact with local mayors in exchange for commissions that would come from the implementation of these projects.[15] Every recipient agency participating in the scam had employees or officials that maintained contact with Napoles, allowing for the smooth processing of transactions and the expedient release of PDAF funds to her organizations. Most importantly, Napoles was in regular contact with the DBM through Undersecretary for Operations Mario L. Relampagos,[18] who had three employees (identified as Leah, Malou and Lalaine) responsible for the processing of SAROs destined for Napoles' organizations.[17] Accused parties[edit] In the initial report published by the Philippine Daily Inquirer, 28 members of Congress (five senators and 23 representatives) were named as participants in the PDAF scam. Twelve of these legislators were identified by the newspaper, and close to ₱3 billion in PDAF funds coming from these legislators alone were exposed to the scam. Notably, the Inquirer named Bong Revilla, Juan Ponce Enrile, Jinggoy Estrada, Ferdinand
Recommended publications
  • Office of the Attorney -General
    OFFICE- OF THE,, ATTORNEY- - ---- -GENERAL I -- ' . Department of Law , . - I - Fi~cal ,Year 1993 Annual Report Grant Woods - -A!torney Genera_} Grant Woods Attorney General Robert B. Carey J.M. Howard First Assistant Attorney General Special Counsel Civil Division · Criminal Division H. Leslie Hall Michael C. Cudahy Chief Counsel Chief Counsel Human Services Division Management Services Cecil B. Patterson Thomas G. Augherton Chief Counsel Chief of Administration TRANSMITTAL LETTER STATE OF ARIZONA OFFICE OF THE ATTORNEY GENERAL GRANT WOODS MAIN PHONE: 542-5025 ATTORNEY GENERAL 1275 WEST WASHINGTON, PHOENIX 85007-2926 TELECOPIER : 542-4085 November 5, 1993 The Honorable J. Fife Symington Governor of Arizona State Capitol, Executive Tower 1700 W. Washington Phoenix, Arizona 85007 Dear Governor Symington: I am pleased to submit to you the annual report of the Office of the Attorney General, as required by ARS § 41-194(B). During the past fiscal . year, this administration continued its focus of protecting Arizona's citizens through aggressive enforcement of state laws and providing quality legal representation to state agencies. We have vigorously defended Arizona's environment by prosecuting those that destroy our natural resources, pursued dozens of companies and individuals who prey on unsuspecting consumers, and convicted many notorious criminals for the heinous crimes they perpetrated. We concentrated our administrative efforts into implementing cost-saving measures that allow us to prioritize our resources into retaining and compensating top-quality \egal staff. Loss of well-trained, experienced attorneys from the Attorney General's Office to higher paying private and public sector positions continues to be a problem that requires close scrutiny by the Legislature.
    [Show full text]
  • IYIR for HTML
    INFOSEC UPDATE 2006 Student Workbook Norwich University June 19-20, 2006 M. E. Kabay, PhD, CISSP-ISSMP Assoc. Prof. Information Assurance Program Director, MSIA BSIA Division of Business Management Norwich University [email protected] Copyright © 2006 M. E. Kabay. All rights reserved. Page 1 INFOSEC UPDATE 2006 -- June 19-20, 2006 01 Introduction Category 01 Introduction 2006-06-12 Introduction M. E. Kabay, PhD, CISSP WELCOME Welcome to the 2005 edition of the Information Security Year in Review (IYIR) project. In 1993 and 1994, I was an adjunct professor in the Institute for Government Informatics Professionals in Ottawa, Canada under the aegis of the University of Ottawa. I taught a one-semester course introducting information security to government personnel and enjoyed the experience immensely. Many of the chapters of my 1996 textbook, _The NCSA Guide to Enterprise Security_ published by McGraw-Hill were field-tested by my students. In 1995, I was asked if I could run a seminar for graduates of my courses to bring them up to date on developments across the entire field of information security. Our course had twenty students and I so enjoyed it that I continued to develop the material and teach the course with the NCSA (National Computer Security Association; later called ICSA and then eventually renamed TruSecure Corporation and finally CyberTrust, its current name) all over the United States, Canada, Europe, Asia and the Caribbean. After a few years of working on this project, it became obvious that saving abstracts in a WordPerfect file was not going to cut it as an orderly method for organizing the increasing mass of information that I was encountering in my research.
    [Show full text]
  • RSVP: Register, Support, Vote, Participate
    RE LEADER WINTER 2016_LAY1 1/4/16 1:09 PM Page 1 Winter 2016 RSVP: Register, Support, Vote, Participate 2015 Convention in the Hub City 2015 Shining Stars 2016 Legislative Priorities RE LEADER WINTER 2016_LAY1 1/4/16 1:09 PM Page 2 RE LEADER WINTER 2016_LAY1 1/4/16 1:09 PM Page 3 Real Estate LEADER is the official publication Winter 2016 of the Mississippi REALTORS®. The quarterly magazine provides Mississippi real estate professionals with timely information on trends and best practices, tools and resources departments: for professional development, and news about features: innovative business and community leaders. Cover Story: 4 President’s Perspective 20 4 Word on the Street Editor 6 Legal Ease Beth Hansen RSVP: Register, Support, Vote, Participate [email protected] 8 Headliners Managing Editor 12 8 Association News Kathy Whitfield 9 Capitol Watch [email protected] 2015 MAR Convention Photo Gallery 10 Course of Your Career Graphic Designer Steve Nowak 14 23 For the Tech of IT [email protected] 2015 MAR Awards and Recognition 24 MARPAC Photographer Gib Ford Gil Ford Photography 16 Thank you MAR Convention Sponsors REALTOR® Editorial Board Dorothy Thompson, Chair, Jackson Megan Hall, Vice Chair, Jackson Chris Adcock, Staff Liaison Trudy Bounds, AE Liaison, Hattiesburg Barry Clemmer, Jackson Cynthiadora Creel, Gulfport Michael Davis, Columbus Patricia Fleming, McComb Keith Henley, Tupelo Jonathan Hester, Greenville Jere’ Jabour, Vicksburg Stephen Jones, Columbus Kevin Knight, Tupelo Ashley McAdory, Brandon Carol McElroy, Meridian On the cover: Barry Monday, Hattiesburg 2016 MAR President Lisa Hollister Crystina Moran, Gulfport shares an invitation to MAR mem- Ann Marie Pate, Cleveland bers to RSVP: Register, Support, Penny Stettinius, Carriere Vote, Participate.
    [Show full text]
  • Acid-H1-2021-Report.Pdf
    AGARI CYBER INTELLIGENCE DIVISION REPORT H1 2021 Email Fraud & Identity Deception Trends Global Insights from the Agari Identity Graph™ © Copyright 2021 Agari Data, Inc. Executive Summary Call it a case of locking the back window while leaving the front door wide open. A year into the pandemic and amid successful attacks on GoDaddy1, Magellan Health², and a continuous stream of revelations about the SolarWinds “hack of the decade,” cyber-attackers are proving all too successful at circumventing the elaborate defenses erected against them³. But despite billions spent on perimeter and endpoint security, phishing and business email compromise (BEC) scams continue to be the primary attack vectors into organizations, often giving threat actors the toehold they need to wreak havoc. In addition to nearly $7.5 billion in direct losses each year, advanced email threats like the kind implicated in the SolarWinds case⁴ suggest the price tag could be much higher. As corroborated in this analysis from the Agari Cyber Intelligence Division (ACID), the success of these attacks is growing far less reliant on complex technology than on savvy social engineering ploys that easily evade most of the email defenses in use today. Sophisticated New BEC Actors Signal Serious Consequences Credential phishing accounted for 63% of all phishing attacks during the second half of 2020 as schemes related to COVID-19 gave way to a sharp rise in payroll diversion scams, as well as fraudulent Zoom, Microsoft and Amazon alerts targeting millions of corporate employees working from home. Meanwhile, the state- sponsored operatives behind the SolarWinds hack were just a few of the more sophisticated threat actors moving into vendor email compromise (VEC) and other forms of BEC.
    [Show full text]
  • Sok: Fraud in Telephony Networks
    SoK: Fraud in Telephony Networks Merve Sahin∗y, Aurelien´ Francillon∗, Payas Guptaz, Mustaque Ahamadx ∗Eurecom, Sophia Antipolis, France fmerve.sahin, [email protected] yMonaco Digital Security Agency zPindrop, Atlanta, USA [email protected] xGeorgia Institute of Technology, USA [email protected] Abstract—Telephone networks first appeared more than a future research, increase cooperation between researchers hundred years ago, long before transistors were invented. They, and industry and finally help in fighting such fraud. therefore, form the oldest large scale network that has grown Although, we focus on telephony fraud, our work has to touch over 7 billion people. Telephony is now merging broader implications. For example, a recent work shows many complex technologies and because numerous services how telephony fraud can negatively impact secure creation enabled by these technologies can be monetized, telephony of online accounts [1]. Also, online account takeovers by attracts a lot of fraud. In 2015, a telecom fraud association making a phone call to a call center agent have been reported study estimated that the loss of revenue due to global telecom in the past [2], [3]. Telephony is considered as a trusted fraud was worth 38 billion US dollars per year. Because of the medium, but it is not always. A better understanding of convergence of telephony with the Internet, fraud in telephony telephony vulnerabilities and fraud will therefore help us networks can also have a negative impact on security of online understand potential Internet attacks as well. services. However, there is little academic work on this topic, in part because of the complexity of such networks and their 1.1.
    [Show full text]
  • The Nutshell Studies of Unexplained Death Stephanie Witt
    School of Graduate and Professional Studies 100 Campus Circle, Owings Mills, Maryland 21117 1-877-468-6852 accelerate.stevenson.edu STEVENSON UNIVERSITY FORENSICS JOURNAL VOLUME 4 EDITORIAL BOARD EDITOR-IN-CHIEF Carolyn Hess Johnson, Esq. PUBLISHER Carolyn Hess Johnson, Esq. EDITORS Abigail Howell Stephanie Witt COVER PHOTO Bruce Goldfarb Assistant to the Chief Medical Examiner, Maryland DESIGN & LAYOUT Chip Burkey Cassandra Bates Stevenson University Marketing and Public Relations Office Copyright © 2013, author(s) and Stevenson University Forensics Journal. No permission is given to copy, distribute or reproduce this article in any format without prior explicit written permission from the article’s author(s) who hold exclusive rights to impose usage fee or royalties. FORENSICS JOURNAL Welcome to our fourth annual Stevenson University Forensics Journal. This year, as always, we bring fresh voices and perspectives from all aspects and areas of the field. I am pleased to note that a new section has been added this year, highlighting the process of library research in the vast field of Forensic Studies. Our Stevenson University librarians bring the research pro- cess into the twenty-first century by showcasing a variety of on-line resources available to researchers. Also of note is the connection between our cover photo and the interview conducted with Dr. David Fowler, Chief Medical Examiner for the State of Maryland. Assistant Editor Stephanie Witt joins the Journal as a contributor to explain the fascinating Nutshell Series of Unexplained Deaths. We are privileged this year to have the Honorable Lynne A. Battaglia providing her insights into the Court’s perspective on the prominent role of forensic evidence in modern litigation.
    [Show full text]
  • Behind the “From” Lines: Email Fraud on a Global Scale Ten Cybercriminal Organizations Unmasked
    AGARI CYBER INTELLIGENCE DIVISION REPORT Behind the “From” Lines: Email Fraud on a Global Scale Ten Cybercriminal Organizations Unmasked © Copyright 2019 AGARI Data, Inc. Executive Summary Nigerian Scammers Target American Businesses Over the course of the past 10 months, using responsible active defense “ Since I can't send techniques, Agari captured 78 criminal email accounts, belonging to 10 criminal more money, maybe organizations, and containing 59,652 unique email messages. Agari analyzed the I'm of no use to you contents of these email accounts to investigate the tactics, targets and identities now. I certainly feel of the criminals. And now, that analysis enables stronger defensive strategies and like that could be measures. the deal here...A realtor is coming over What’s more, Agari has used this analysis to warn financial institutions about tomorrow to help accounts being used for criminal activity, and to provide evidence to law me list my house for enforcement. Agari has also warned victims, and in at least once case, quick action sale. I'm talking to an helped a company recover its money. attorney now about how to keep the One of the more interesting findings from this analysis was that while much of the collection agencies high-profile cybersecurity news of the past year has involved state sponsors like away and protect my Russia and North Korea, American businesses and individuals are far more likely to kids. All this time, I'm be targeted by Nigerian scam artists. wondering if I've heard Nigerian scam artists, traditionally associated with implausible get-rich-quick from you for the last schemes and other scams of individuals, have become more sophisticated and time.
    [Show full text]
  • PARTIES of RECORD in R.00-02-004 Decision 06-03-013 Is Being Mailed Without the Written Dissent of Commiss
    STATE OF CALIFORNIA ARNOLD SCHWARZENEGGER, Governor PUBLIC UTILITIES COMMISSION 505 VAN NESS AVENUE SAN FRANCISCO, CA 94102-3298 March 9, 2006 TO: ALL PARTIES OF RECORD IN R.00-02-004 Decision 06-03-013 is being mailed without the written dissent of Commissioner Grueneich. The dissent will be mailed separately. Very truly yours, /s/ Angela K. Minkin Angela K. Minkin, Chief Administrative Law Judge ANG:mal Attachment 226372 COM/MP1/mal MAILED 3/9/2006 DECISION 06-03-013 March 2, 2006 BEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA Order Instituting Rulemaking on Rulemaking 00-02-004 the Commission’s Own Motion to (Filed February 3, 2000) establish Consumer Rights and Protection Rules Applicable to All Telecommunications Utilities. DECISION ISSUING REVISED GENERAL ORDER 168, MARKET RULES TO EMPOWER TELECOMMUNICATIONS CONSUMERS AND TO PREVENT FRAUD 226372 - 1 - R.00-02-004 COM/MP1/mal TABLE OF CONTENTS 1. SUMMARY ............................................................................................................2 2. PROCEDURAL HISTORY...................................................................................7 3. REVIEW OF RECORD EVIDENCE..................................................................16 3.1 EVIDENCE PRESENTED IN SUPPORT OF NEW RULES....................................17 3.1.1 Consumer Complaint Records.....................................................17 3.1.2 Survey Data.....................................................................................25 3.1.3 Enforcement Actions .....................................................................28
    [Show full text]
  • Is the Mafia Taking Over Cybercrime?*
    Is the Mafia Taking Over Cybercrime?* Jonathan Lusthaus Director of the Human Cybercriminal Project Department of Sociology University of Oxford * This paper is adapted from Jonathan Lusthaus, Industry of Anonymity: Inside the Business of Cybercrime (Cambridge, Mass. & London: Harvard University Press, 2018). 1. Introduction Claims abound that the Mafia is not only getting involved in cybercrime, but taking a leading role in the enterprise. One can find such arguments regularly in media articles and on blogs, with a number of broad quotes on this subject, including that: the “Mafia, which has been using the internet as a communication vehicle for some time, is using it increasingly as a resource for carrying out mass identity theft and financial fraud”.1 Others prescribe a central role to the Russian mafia in particular: “The Russian Mafia are the most prolific cybercriminals in the world”.2 Discussions and interviews with members of the information security industry suggest such views are commonly held. But strong empirical evidence is rarely provided on these points. Unfortunately, the issue is not dealt with in a much better fashion by the academic literature with a distinct lack of data.3 In some sense, the view that mafias and organised crime groups (OCGs) play an important role in cybercrime has become a relatively mainstream position. But what evidence actually exists to support such claims? Drawing on a broader 7-year study into the organisation of cybercrime, this paper evaluates whether the Mafia is in fact taking over cybercrime, or whether the structure of the cybercriminal underground is something new. It brings serious empirical rigor to a question where such evidence is often lacking.
    [Show full text]
  • Stages of Postmortem Decomposition
    METHODS FOR ESTIMATION OF TIME OF DEATH RATE METHODS (i.e. estimation of tree’s age by height / rate of growth) - Rate of drying or discoloration of blood pools - Rigor Mortis - Livor Mortis - Algor Mortis - Decomposition - Flora (plants) around body - Fauna (insects) around body CONCURRENCE METHODS (i.e. estimation of tree’s age by counting rings) - Bloodstain vs. tire - Time of last know meal - Stopping of watch - Depth of footprint in snow - Depth of rainwater collected EVIDENCE FOR ESTIMATION OF TIME OF DEATH 1. CORPORAL EVIDENCE - In the body 2. ENVIRONMENTAL AND ASSOCIATED EVIDENCE - In the vicinity and general surroundings 3. ANAMNESTIC EVIDENCE - Based on the decedent’s ordinary habits and daily activities Envir. and Assoc. Corporal Evidence Evidence Anamnestic Evidence - stage of decomp of organs - uncollected milk, mail, - usual activities vs. exterior newspapers - soot in airway - lights on / off - walking and sleeping patterns - medical conditions (ASCVD, pre surgery) - alarm clock set - eating habits, times, type of foods - alcohol / drug levels - food on stove / in refrig - appointment - beard, nails, hair - type of clothing day / night indoors / outdoor seasonal (remote deaths) condition of clothing (mold, leached dyes) - sales slips, receipts - animals in house Use a combination of all evidence available to you, giving weight to the more reliable / documentable. Be suspicious when some factors seem to vary considerably from the others. STAGES OF POSTMORTEM DECOMPOSITION 1. Blue-green discoloration of skin RLQ and LLQ abdomen 24 hrs Entire abdomen 36 hrs 2. Marbling (Green-black discoloration in blood vessel distribution- hemolyzed blood reacts with hydrogen sulfide. Extravasation diffusion (leads to generalized dark purple-black skin 3.
    [Show full text]
  • Pizzagate / Pedogate, a No-Nonsense Fact-Filled Reader
    Pizzagate / Pedogate A No-nonsense Fact-filled reader Preface I therefore determine that serious human rights abuse and corruption around the world constitute an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States, and I hereby declare a national emergency to deal with that threat. —Trump Executive Order 13818, Dec. 20, 2017 Pizzagate means many things to many people, the angle of the lens may be different, but the focus zeros in on a common body of incontestable facts. The fruit of top researchers collected in this reader allows you to compare, correlate and derive a flexible synthesis to suit your needs. An era of wild contradiction is upon us in the press. The psychopathic rumblings that pass for political discourse bring the artform of infotainment to a golden blossoming. A bookstore display table featuring The Fixers; The Bottom-Feeders, Crooked Lawyers, Gossipmongers, and Porn Stars Who Created the 45th President versus Witch Hunt; The Story of the Greatest Mass Delusion in American Political History are both talking about the same man, someone who paid for his campaign out of his own pocket. There were no big donors from China and the traditional bank of puppeteers. This created a HUGE problem, one whose solution threatened the money holders and influence peddlers. New leadership and a presidential order that threw down the gauntlet, a state of emergency, seeded the storm clouds. The starting gun was fired, all systems were go, the race had begun. FISAs and covert operations sprang into action. The envelopes are being delivered, the career decisions are being made, should I move on or stay the course.
    [Show full text]
  • Cybercrime-As-A-Service: Identifying Control Points to Disrupt Keman Huang Michael Siegel Stuart Madnick
    Cybercrime-as-a-Service: Identifying Control Points to Disrupt Keman Huang Michael Siegel Stuart Madnick Working Paper CISL# 2017-17 November 2017 Cybersecurity Interdisciplinary Systems Laboratory (CISL) Sloan School of Management, Room E62-422 Massachusetts Institute of Technology Cambridge, MA 02142 Cybercrime-as-a-Service: Identifying Control Points to Disrupt KEMAN HUANG, MICHAEL SIEGEL, and STUART MADNICK, Massachusetts Institute of Technology Cyber attacks are increasingly menacing businesses. Based on literature review and publicly available reports, this paper analyses the growing cybercrime business and some of the reasons for its rapid growth. A value chain model is constructed and used to describe 25 key value-added activities, which can be offered on the Dark Web as a service, i.e., “cybercrime-as-a-service,” for use in a cyber attack. Understanding the specialization, commercialization, and cooperation of these services for cyber attacks helps to anticipate emerging cyber attack services. Finally, this paper identifies cybercrime control-points that could be disrupted and strategies for assigning defense responsibilities to encourage collaboration. CCS Concepts: • General and reference Surveys and overviews; • Social and professional topics Computing and business; Socio-technical systems; Computer crime; • Security and privacy Social aspects of security and privacy; → → → Additional Key Words and Phrases: Cyber Attack Business; Value Chain Model; Cyber-crime-as-a-Service; Hacking Innovation; Control Point; Sharing Responsibility 1 INTRODUCTION “Where there is commerce, there is also the risk for cybercrime”[139]. Cybercrime is a tremendous threat to today’s digital society. It is extimated that the cost of cybercrime will grow from an annual sum of $3 trillion in 2015 to $6 trillion by the year 2021 [115].
    [Show full text]