Wednesday, November 25, 2009

The Respondent


Some teachers never emotionally grow beyond their high school day.Some of these guys relate to their students at a high school level. They groom these kids by acting like them, through their lack of emotional maturity.,and being immature these teachers also would always do the same thing to their co-teachers and to other persons. They treat the individual as their student that will always follow their wants and needs..and when they will be charged of a criminal case at the court of justice, they will plead and beg you to desist the case for the sake of the school's name..what a pathetic move indeed.,and you know who the teacher was..make a wild guess..his name starts with a letter M as in M as Music.

The Lecture




I had the honor this past week of delivering a presentation during E-learning combined public safety discipline expo in Makati City. My presentation had to do with school attacks and how much of law enforcement’s patrol protocols had evolved in response to such through the last century. From 1891 we really didn’t do anything different. In the late ’60s, due to riots and snipers, SWAT was developed and grew nationwide. The development of SWAT changed how patrol did business.

During one part of the presentation though I discuss School Resource Officers (SROs) and how their function is unique in the public safety arena. After all, we task them NOT with keeping the peace in our schools, but with protecting our children. Think about it… their job in keeping the peace involves every task that might be required to keep our children safe while in that school environment. What I often discuss is what type of person that requires. It is, after all, a special job and does take a special outlook. What is that outlook? Prevention is better than cure,.look after the behavior of the student, a sudden change of behavior can lead to a casualty or fatalities, as an educator, we must be sensible to the special needs of the student,their emotional and psychological needs.

I am very happy also, that my friends were there,..

PASSWORD


Someone can obtain most of this information much easier than you think, then he might just be able to get into your e-mail, computer, or online banking. After all, if he can get into one he probably get into all of them.

1. Your partner, child, or pet’s name, possibly followed by a 0 or 1 (because they’re always making you use a number, aren’t they?)
2. The last 4 digits of your social security number.
3. 123 or 1234 or 123456.
4. “password”
5. Your city, or college, football team name.
6. Date of birth – yours, your partner’s or your child’s.
7. “god”
8. “letmein”
9. “money”
10. “love”

SPIES


They say social media websites offer a powerful opportunity for "open source" intelligence – publicly available data that can be mined for information. Terrorist networks are increasingly using the internet as it allows people to communicate anonymously and across borders. A number of terrorist plots have involved the use of chat rooms for recruiting, discussion or the passing of messages. And these messages which were fish by these cyber bully will be used against you..

I've been a victim of these illegal doings,.my photo's were extracted and then manufactured again to make it believe that I'm at another place with a certain person however such photo shoots never happened.Much worst that this photos were uploaded at the internet and distributed at my friends friendster and facebook accounts,.it's like a virus that penetrated my privacy.

A friend of mine, a social engineer in the cyberworld helped me figure out who the hacker is..and viola, ..she was detected and her activities were monitored without her knowing it...whatever she will do now will always be monitored like a silent spy...how spooky it was to see her activities... it's like living inside her house...and inside her mind...I'm a trojan horse who is sleeping with her without feeling me beside her...Creepy? No, it's just how you feel when you find yourself alone in the dark. Have you played Silent Hill? That's more creepy.

Tuesday, November 24, 2009

DAMAGES

People like me are responsible for the following falling dominoes: filing medical malpractice lawsuits against emergency room physicians, creating litigation paranoia among ER physicians, resulting in the practice of defensive medicine by cover-your-ass ER docs, who order costly medical testing and care.

Emergency physicians are well known in the medical profession to be paranoid about litigation. And well they should be. Emergency medicine docs are among such litigation high risk specialties as obstetricians and neurosurgeons. There is every reason to believe (and some evidence) that this paranoia alters how these physicians practice medicine and not necessarily for the better.

The practice of emergency medicine (among other high risk specialties) has become so regimented and infused with defensive medicine tactics that many ER docs are not even aware of how this has changed the way they think.

I have every intention to continuing filing a lawsuit whenever a patient is seriously injured as a result of improper, unacceptable, substandard medical care.

If they can ignore the surgery of my dog via ceasarian operation what more if the patient is human who needs extra care..well at least the doctor was scared about the civil damages, he performed the operation for free,.after my dog suffered seizure attacks because of the allergy on the antibiotics..well the paranoia is all in the mind..there is no law yet about damages in relation to dogs injury however it works...

Dogs also has a life..

Friday, November 20, 2009

Monday, November 9, 2009

RELEVANCY

As an ordinary civilian employee intrigued by the questions raised by the facts of the current robbery at Greenbelt 5 in Makati, I have questions that deserve an answer on the following:
1. When the robbers enters the mall in fake police uniforms, the car that they were using is a privately owned vehicle, the plate numbers bears the observation that it is privately owned and not an officially marked vehicle of Makati Police Station.
2. The security guards failed to check the contents of the bags of the robbers as well in checking the unmarked vehicle.
3. When asked by the security guards about the long firearms, the robbers explained that they come carrying long firearms because of the reported bomb scare at the mall. What a stupid answer, perhaps the robbers would shoot the bomb.
4. One of the guards should have at least reported the incident to their superior however there is none, the superiors who has a higher level of thinking and education could have prevented the crime if these circumstances were immediately reported to them.
5. As the robbers exiting the mall with their loot, the guards again failed to stop them; perhaps the guards were afraid of the long firearms of the robbers. It took two policemen on civilian clothes, on duty as an agent, exchange shots with the robbers killing one of them on the spot.
The robbers failed to determined the perfect probability of their escape without casualty on their part, the guards on the other hand were in fact inefficient and uneducated of the basic knowledge of the law, The guards could have prevented the crime if they call the Makati Police station on the suspicious acts of the robbers, long firearm, unmarked vehicle and police uniform without I.D is more than a suspicion. If they only performed their duties, the life of the robbers could be preserved whose testimony would have been useful in convicting him and his fellow robbers. What a waste.

PHOTOGRAPHS

PHOTOGRAPHS
Can a photograph be admissible as evidence at the court of justice? Well, it depends on the manner, relevancy and importance of its presentation as evidence. As we all know, photographs like videos can be edited, spliced, diced, copy and then paste to look like a new photograph, in short a manufactured one, it does not constitute the truth that it is trying to conceal. That’s the reason why the court of justice now is wary in accepting photographs as evidence. However there is certain exceptions to that, where photographs no matter how digitized can be admitted as an evidence.
Case No.1
When the photographs show the philandering husband with the mistress in a very compromising position, even if it was taken only on a cell phone, it is proof enough of the illicit affair. Would it stand? Perhaps, it depends on the argument of the counsel.
Case No. 2
When the photographs, on a sequence shots shows the commission of a crime, an ongoing robbery, screen shots of a video of a theft or robbery.
Case No 3.
The worse case, when you are under surveillance by the police agents or operatives, where they tracked your movements, friends and relatives and the information that they get will be used against you. All of the information, videos and photographs came from you. Your cell phone, computers as well as your records were hacked, and then reproduced into something new, a different you. Can these persons be convicted of these illegal actions? Perhaps, if you have proof that your photographs were used in a different way and in an illegal means.
My husband and I has been a victim of these cyber robbers, they grabbed your pictures, copy then paste it into another photos of a person to make it believe that I’m on that photo with that person, however such photo ops never happen. I’m just privileged enough to have friends who knows how to tracked these cyber robbers/hackers. Who else could hacked the hackers but the hackers themselves.

WHY DID I BECOME A PROFESSOR/EDUCATOR

I participated in different NGO’s as a legal aid and researcher for years. Since graduating I have worked in a law office and gov't institution and still volunteering in NGO’s if time permits.
I began to contemplate on going back to school and what course to pursue when I had the chance to volunteer as a mentor to young children. That’s when I knew that my greatest job satisfaction comes from my role as a mentor to children who were victims of abusive parents and to help them understand and invoke their constitutional right, right as a child, and also to let them understand how important it is to know the basic laws of the country. I realized that even as my enthusiasm for tackling new development projects for the sheer challenge of accomplishing the task began to wane, my enthusiasm for helping others never wavered. Being a volunteer helped me to reconnect with my innermost passion; to help others especially those children who are neglected and abused. And clearly asked myself how would I do it? By teaching them the basic educational foundation, to touch their lives and their future; to become a successful person, a law abiding citizen, an asset to the country, and maybe one who would steer the country towards prosperity. The wounds and the pains suffered by these abused children will be their motivating factor to become a stronger and much better person.
There are a number of potential paths I could follow as an educator. First and foremost, I believe that every decision we make no matter how small affects our lives, our future and even those of others. One decision could make or break our future. Motivation is very important in achieving our goals. With the proper motivation from a teacher, the learner no matter how hard life has been for him, aside from the trauma that the child had suffered, the child could still achieve his goals in life with proper motivation. It is what I really wanted to do; my purpose in life is to help these children, and to mould their life and to become a great person someday.

Thursday, November 5, 2009

CYBER CRIMES

ELECTRONIC MONEY LAUNDERING AND TAX EVASION

For some time now, electronic funds transfers have assisted in concealing and in moving the proceeds of crime. Emerging technologies will greatly assist in concealing the origin of ill-gotten gains. Legitimately derived income may also be more easily concealed from taxation authorities. Large financial institutions will no longer be the only ones with the ability to achieve electronic funds transfers transiting numerous jurisdictions at the speed of light. The development of informal banking institutions and parallel banking systems may permit central bank supervision to be bypassed, but can also facilitate the evasion of cash transaction reporting requirements in those nations which have them. Traditional underground banks, which have flourished in Asian countries for centuries, will enjoy even greater capacity through the use of telecommunications.

With the emergence and proliferation of various technologies of electronic commerce, one can easily envisage how traditional countermeasures against money laundering and tax evasion may soon be of limited value. I may soon be able to sell you a quantity of ANYTHING, in return for an untraceable transfer of stored value to my "smart-card", which I then download anonymously to my account in a financial institution situated in an overseas jurisdiction which protects the privacy of banking clients. I can discreetly draw upon these funds as and when I may require, downloading them back to my stored value card.


ILLEGAL INTERCEPTION OF TELECOMMUNICATIONS

Developments in telecommunications provide new opportunities for electronic eavesdropping. From activities as time-honoured as surveillance of an unfaithful spouse, to the newest forms of political and industrial espionage, telecommunications interception has increasing applications. Here again, technological developments create new vulnerabilities. The electromagnetic signals emitted by a computer may themselves be intercepted. Cables may act as broadcast antennas. Existing law does not prevent the remote monitoring of computer radiation.

ELECTRONIC FUNDS TRANSFER FRAUD

Electronic funds transfer systems have begun to proliferate, and so has the risk that such transactions may be intercepted and diverted. Valid credit card numbers can be intercepted electronically, as well as physically; the digital information stored on a card can be counterfeited.

Of course, we don't need Willie Sutton to remind us that banks are where they keep the money. In 1994, a Russian hacker Vladimir Levin, operating from St Petersburg, accessed the computers of Citibank's central wire transfer department, and transferred funds from large corporate accounts to other accounts which had been opened by his accomplices in The United States, the Netherlands, Finland, Germany, and Israel. Officials from one of the corporate victims, located in Argentina, notified the bank, and the suspect accounts, located in San Francisco, were frozen. The accomplice was arrested. Another accomplice was caught attempting to withdraw funds from an account in Rotterdam. Although Russian law precluded Levin's extradition, he was arrested during a visit to the United States and subsequently imprisoned. (Denning 1999, 55).

The above forms of computer-related crime are not necessarily mutually exclusive, and need not occur in isolation. Just as an armed robber might steal an automobile to facilitate a quick getaway, so too can one steal telecommunications services and use them for purposes of vandalism, fraud, or in furtherance of a criminal conspiracy.1 Computer-related crime may be compound in nature, combining two or more of the generic forms outlined above
Spam
1. The most common type of cyber crime is spam. While email spam laws are fairly new, there have been laws on the books regarding "unsolicited electronic communications" for many years.
Fraud
2. Credit fraud is another common form of cyber crime. Certain computer viruses can log keystrokes on your keyboard and send them to hackers, who can then take your Social Security number, credit card number and home address. This information will be used by the hacker for his own means.
Cyber Bullying
3. Harassment, or cyber bullying, is a growing problem among teenagers. Many countries in Europe and several states in the United States have laws to punish those who consistently harass somebody over the Internet.
Drug Trafficking
4. Believe it or not, drug trafficking is happening over the Internet. Many traffickers use encrypted email or password-protected message boards to arrange drug deals.
Cyberterrorism
5. There are many forms of cyberterrorism. Sometimes it's a rather smart hacker breaking into a government website, other times it's just a group of like-minded Internet users who crash a website by flooding it with traffic. No matter how harmless it may seem, it is still illegal.
Piracy
6. Far and away the most talked about form of cyber crime is thievery. Yes, downloading music from peer-to-peer websites is illegal and therefore a form of cyber crime.