Your Ad Here

Wednesday, October 20, 2010



An Increase in Internet Schemes Claiming to be from the FBI
01/04/08—We have increasingly received reports of fraudulent schemes misrepresenting FBI agents, officials, and/or FBI Director Robert S. Mueller, III. The fraudulent e-mails give the appearance of legitimacy due to the usage of pictures of the FBI Director, seal, letterhead, and/or banners. The e-mails may also claim to come from our domestic or overseas offices.
The types of schemes utilizing the names of FBI agents, officials, or the Director’s name are typically lottery endorsements and inheritance notifications. However, other fraudulent schemes include threat and extortion e-mails, website monitoring containing malicious computer program attachments (malware), and online auction scams.
The social engineering technique of utilizing the FBI’s name is to intimidate and convince the recipient the e-mail is legitimate.
The FBI does not send out emails soliciting information from citizens.
Please be cautious of any unsolicited e-mail referencing the FBI, FBI Director Mueller, or any other FBI official endorsing any type of Internet activity.
If you have experienced this situation please notify the IC3 by filing a complaint at www.ic3.gov.

Source: FBI: Not an endorsement

U.S. Customs and Border Protection (CBP) Agents Disrupt Various Maritime Smuggling Attempts Throughout Weekend

U.S. Customs and Border Protection (CBP) Agents Disrupt Various Maritime Smuggling Attempts Throughout Weekend$300,000 Sailboat, Jet Skis, and Panga Used by Smuggler

San Diego, Calif. - U.S. Border Patrol agents stopped three maritime smuggling attempts over the weekend in San Diego County. Agents arrested 26 illegal aliens, seized a panga, a 40-foot sailboat, and more than $63,000 in smuggling proceeds.
A panga style boat used by two smugglers in illegally transporting 11 Mexican nationals.
A panga style boat used by two smugglers in illegally transporting 11 Mexican nationals.

On Sunday evening at approximately 6 p.m., U.S. Border Patrol agents encountered two illegal aliens in a parking lot near Mission Bay. Agents questioned the two subjects who stated that they were smuggled into the country illegally as part of a larger group onboard what was later determined to be a $300,000, 40-foot sailboat. The subjects also stated that the remainder of the group was being held in a nearby hotel room. Agents gained access to the hotel room where five illegal aliens were discovered.
In addition, agents identified the name of the smuggler who rented both the sailboat and the hotel room. The smuggler was taken into custody and is being processed for 8 USC 1324 Alien Smuggling. A total of eight male Mexican nationals and a male Cuban national were arrested. The sailboat and $63,000 in smuggling proceeds were seized.
Two other maritime smuggling attempts were also intercepted over the weekend. The first occurred around 1:00 a.m., early Saturday morning near Imperial Beach, Calif. Agents responded to the coastline and arrested four male Mexican nationals who had been smuggled into the country illegally on two jet skis. The subjects were transported to a local Border Patrol station for processing and interviews.
Another apprehension occurred on Saturday, at about 4 a.m., when California National Guard stationed along the California coastal border spotted a panga style boat approach Torrey Pines State Beach. U.S. Border Patrol agents responded to the scene, where eleven male Mexican nationals were taken into custody. CBP Marine Interdiction agents also responded to the scene and stopped the panga boat from returning to sea. Two additional male Mexican nationals were found onboard and arrested. CBP’s Office of Air and Marine seized the vessel. All subjects arrested over the weekend were transported to a local U.S. Border Patrol station for processing.
CBP maintains a strong enforcement posture on the coastal borders to detect, apprehend, and deter smugglers of humans, drugs and other contraband. CBP is a participating law enforcement agency within the Maritime Unified Command, a collaborative law enforcement effort between local, state and federal agencies operating in the San Diego maritime domain. During Fiscal Year 2010, the Maritime Unified Command was responsible for the arrests of 867 foreign nationals from maritime smuggling attempts in the San Diego region. The San Diego Sector Border Patrol’s strategy is to disrupt, dismantle, and defeat targeted transnational threats operating within the San Diego Sector area of influence to affect increased operational control of the Border.
U.S. Customs and Border Protection is the unified border agency within the Department of Homeland Security charged with the management, control and protection of our nation's borders at and between the official ports of entry. CBP is charged with keeping terrorists and terrorist weapons out of the country while enforcing hundreds of U.S. laws.

Fraudulent E-mail Claiming to be from DHS and the FBI Counterterrorism Division

Fraudulent e-mails containing the subject line “New DHS Report” have been circulating since August 15, 2009. The e-mails claim to be from the Department of Homeland Security (DHS) and the FBI Counterterrorism Division. The e-mail text contains information about “New Usama Bin Ladin Speech Directed to the People of Europe,” and has an attachment titled “audio.exe.” The attachment is purportedly an audio speech from Bin Ladin; however, it actually contains malicious software intended to steal information from the recipient’s system.
DO NOT CLICK ON ANY LINKS ASSOCIATED WITH THIS E-MAIL OR SIMILAR E-MAILS, IT IS A HOAX.
The FBI does not send unsolicited e-mails or e-mail official reports. Consumers should not respond to any unsolicited e-mails or click on any embedded links, as they may contain viruses or malware.
One example of this fraudulent e-mail message is as follows:
Subject: New DHS Report
New Usama Bin Ladin Speech Directed to the People of Europe
Prepared by DHS/I&A Intelligence Watch and Warning Division and the FBI Counter Terrorism Division
(U//FOUO) Media outlets are reporting the release of a new audio tape on Al Jazeera today from Usama Bin Ladin, in which he states that all European countries involved in the Afghanistan war should end their support of American oppression in Afghanistan. In the audio message, Bin Ladin claims direct responsibility for the 11 September 2001 attacks and emphasizes that neither the Afghan people nor the Afghan government had foreknowledge of the attacks.
////Signed////
Charlie Allen
Chief Intelligence Officer
Department of Homeland Security
As with many fraudulent e-mail messages, this message contains multiple spelling errors and poor grammar.
If you have been a victim of Internet crime, please file a complaint at www.IC3.gov. 

Source: FBI Not an endorsement

El Centro Border Patrol’s 'Se Busca Información' Campaign Update

El Centro Border Patrol’s 'Se Busca Información' Campaign Update

Calexico, Calif. – A second individual of interest known to be involved in clandestine activities in the sector’s most violent area just west of the Calexico airport was taken into custody in Mexico. On Friday, the subject was arrested in Mexicali, Baja California. 
To date, two individuals of interest are now in custody.
The arrest was the result of a coordinated law enforcement effort from both sides of the border and enhanced by information sharing by the community.
The “Se Busca Información” campaign was designed to disrupt and displace transnational smuggling organizations and those involved that present a threat to our communities.
The El Centro Sector Border Patrol would like to reiterate that any and all information reported will be investigated to the fullest.
If anyone has information on the individuals remaining on the poster, they are encouraged to continue to call in at 760-335-5868. All calls will remain anonymous.
U.S. Customs and Border Protection is the unified border agency within the Department of Homeland Security charged with the management, control and protection of our nation's borders at and between the official ports of entry. CBP is charged with keeping terrorists and terrorist weapons out of the country while enforcing hundreds of U.S. laws.

Fraudulent E-mail Claiming to Contain FBI "Intelligence Bulletin No. 267"

Fraudulent E-mail Claiming to Contain FBI "Intelligence Bulletin No. 267"
10/05/09—A fraudulent e-mail message claiming to contain a confidential FBI report titled “New Patterns in Al-Qaeda Financing” has been circulating since August 15, 2009. The e-mail has the subject line “Intelligence Bulletin No. 267,” and contains an attachment titled “bulletin.exe.” This message, or similar messages, may contain files that are harmful to the recipient’s system and may try to steal user credentials.
DO NOT CLICK ON ANY LINKS ASSOCIATED WITH THIS E-MAIL OR SIMILAR E-MAILS, IT IS A HOAX.
The FBI does not send unsolicited e-mails or email official reports. Consumers should not respond to any unsolicited e-mails or click on any embedded links, as they may contain viruses or other malicious software.
Below is an example of the fraudulent e-mail message:
INTELLIGENCE BULLETIN No. 267
Title: New Patterns in Al-Qaeda Financing
Date: August 15, 2009
THREAT LEVEL: YELLOW (ELEVATED)
THE INTELLIGENCE BULLETIN PROVIDES LAW ENFORCEMENT AND OTHER PUBLIC SAFET= OFFICIALS WITH SITUATIONAL AWARENESS CONCERNING INTERNATIONAL AND DOMES=IC TERRORIST GROUPS AND TACTICS.
HANDLING NOTICE: Recipients are reminded that FBI Intelligence Bulletins =ontain sensitive terrorism and counterterrorism information meant for us= primarily within the law enforcement community. Such bulletins are not =o be released either in written or oral form to the media, the general p=blic, or other personnel who do not have a valid ?eed-to-know?with=ut prior approval from an authorized FBI official, as such release could jeopardize national security.
As with many fraudulent e-mail messages, this message contains multiple spelling errors and poor grammar.
If you have been a victim of Internet crime, please file a complaint at www.IC3.gov.

Source: FBI - NOT an Endorsement

Senior Executive Service Announcements

Senior Executive Service Announcements

                Secretary of Defense Robert M. Gates announced the following Department of Defense Senior Executive Service appointments and reassignments.
                John B. Allen has been appointed to the Senior Executive Service and is assigned as deputy director, naval warfare, director, Operational Test & Evaluation, Washington, D.C.  Allen previously served as senior associate, New Mexico Institute of Mining and Technology, Socorro, N.M.
                Sajeel Ahmed has been assigned as director, Facilities Services Directorate, Washington Headquarters Services, Washington, D.C.  Ahmed previously served as program manager, Pentagon Renovation/Construction Program Office, Washington Headquarters Services, Washington, D.C.
                James Bexfield has been assigned as director, Joint Analytic Support Division, Cost Assessment and Program Evaluation, Washington, D.C.  Bexfield previously served as director, Study and Analytical Support Division, Cost Assessment and Program Evaluation, Washington, D.C.
                Richard Burke has been assigned as deputy director, cost assessment, Cost Assessment and Program Evaluation, Washington, D.C.  Burke previously served as deputy director (resources analysis), Cost Assessment and Program Evaluation, Washington, D.C.
                Scott Comes has been assigned as deputy director, program evaluation, Cost Assessment and Program Evaluation, Washington, D.C.  Comes previously served as deputy director (strategic, C4 and ISR programs), Cost Assessment and Program Evaluation, Washington, D.C.
               Eric Coulter has been assigned as deputy director, force structure and risk analysis, Cost Assessment and Program Evaluation, Washington, D.C.  Coulter previously served as deputy director, strategic assessment and irregular warfare, Cost Assessment and Program Evaluation, Washington, D.C.
                Malcolm Ewell has been assigned as director, force structure assessments, Cost Assessment and Program Evaluation, Washington, D.C.  Ewell previously served as director, Analytic Integration Division, Cost Assessment and Program Evaluation, Washington, D.C.
                Krystyna Kolesar has been assigned as director, Force and Infrastructure Analysis Division, Cost Assessment and Program Evaluation, Washington, D.C.  Kolesar previously served as director, Force and Infrastructure Cost Analysis Division, Cost Assessment and Program Evaluation, Washington, D.C.

U.S. Department of Defense 
Office of the Assistant Secretary of Defense (Public Affairs) 

Motion Center Welcomes all service people.

Motion Center  Welcomes all service people.

Today this blog was visited by individuals from Fort Jones, California.  Home of US Central Command.

Thanks for your service and your visit. Feel free to offer feedback at
motioncenter@yahoo.com

Spammers Continue to Abuse the Names of Top Government Executives by Misuing the Name of the United States Attorney General



10/27/09—As with previous spam attacks, which have included the names of high-ranking FBI executives and names of various government agencies, a new version misuses the name of the United States Attorney General Eric Holder.
The current spam alleges that the Department of Homeland Security and the Federal Bureau of Investigation were informed the e-mail recipient is allegedly involved in money laundering and terrorist-related activities. To avoid legal prosecution, the recipient must obtain a certificate from the Economic Financial Crimes Commission (EFCC) Chairman at a cost of $370. The spam provides the name of the EFCC Chairman and an e-mail address from which the recipient can obtain the required certificate.
DO NOT RESPOND. THESE E-MAILS ARE A HOAX.
Government agencies do not send unsolicited e-mails of this nature. The FBI, Department of Justice, and other United States government executives are briefed on numerous investigations, but do not personally contact consumers regarding such matters. In addition, United States government agencies use the legal process to contact individuals. These agencies do not send threatening letters/e-mails to consumers demanding payments for Internet crimes.
Consumers should not respond to any unsolicited e-mails or click on any embedded links associated with such e-mails, as they may contain viruses or malware.
It is imperative consumers guard their Personally Identifiable Information (PII). Providing your PII will compromise your identity!
If you have been a victim of Internet crime, please file a complaint at www.IC3.gov.
Source: FBI - Not an endorsement

Family Matters Blog: Blogger Urges Readers to 'Move Forward'



By David Lloyd 
Family Advocacy Program Office
WASHINGTON, Oct. 19, 2010 - David Lloyd is the director of the Family Advocacy Program Office of Military Community and Family Policy. In this guest blog, Mr. Lloyd urges victims of domestic abuse to seek help for both themselves and their children.
Domestic Violence Awareness Month:  Looking Back, Moving Forward
More than 20 years ago, the first federal funds were authorized for the establishment, maintenance and expansion of programs and projects to prevent incidents of family violence and provide shelter and assistance for victims and their children.
Congress formally recognized October as National Domestic Violence Awareness Month through a congressional resolution, citing the frequency of violence against women by their intimate partners, the universal nature of such violence and the associated abuse of children in homes where domestic violence occurs. The resolution also recognized the importance of nationwide efforts to increase public understanding of domestic violence and the work of advocates to help domestic violence victims leave abusive relationships
Over the last two decades, the momentum of the domestic violence movement has continued to build. 
The dedication of tireless advocates has helped increase public understanding of domestic violence as a serious public health issue, and driven public investment in the prevention of domestic violence.
The Defense Department has joined this movement. Established in the early eighties, the Family Advocacy Program addresses domestic violence in military families through prevention efforts, early identification and intervention, support for victims and treatment for abusers. This office works with offices and agencies both on the installation and in the civilian community to provide a coordinated community response to domestic abuse incidents.
As recently as 2004, DOD instituted additional measures  to promote a culture shift within the military environment that prioritizes offender accountability and victim safety. DOD's restricted reporting policy enables victims to seek medical care and safety planning without law enforcement notification. For military communities accustomed to command involvement in almost all matters, this measure, in particular, represents profound progress in the effort to keep victims safe and promote help-seeking behavior.
Despite this progress, there is still work to be done, as men and women remain at risk. Nationally, there are almost 4.8 million intimate partner-related violent incidents each year and some of these victims are in military families.
As President Barack Obama emphasized last year when he designated October as National Domestic Violence Awareness Month, this month is a time to "[R]ededicate ourselves to breaking the cycle of violence. By providing young people with education about healthy relationships, and by changing attitudes that support violence, we recognize that domestic violence can be prevented. We must build the capacity of our nation's victim service providers to reach and serve those in need. Together, we must ensure that, in America, no victim of domestic violence ever struggles alone."
So, what can be done to support the ongoing effort to end domestic violence? What can you do? 
-- (Re) Educate Yourself: As Congress emphasized in 1981, domestic violence is universal. It crosses all demographic lines and can affect men and women in all racial, social, religious, ethnic, and economic groups, and of all ages and physical abilities. No one is immune. Domestic violence, now often referred to as intimate partner violence, includes physical violence, sexual violence, threats and emotional abuse.
-- Become Part of the Solution:  Volunteer with an organization that supports victims and works to end domestic violence. Find out how you can become involved in your local Family Advocacy Program's Domestic Violence Awareness Month efforts. Help those you care about, particularly young people who are just beginning to explore romantic relationships, learn about healthy relationships.
-- Recognize the Signs of Abuse: Understand how to recognize the signs of abuse and help a potential victim access the help he or she needs. If nothing else, remember the number: 1-800-799-SAFE, available to serve victims 24 hours a day, 365 days a year.
If you are in an abusive relationship, or if something about your relationship with your partner scares you, get help now. To find a victim advocate, call the installation operator or Military OneSource at 1-800-342-9647 and ask for the number of the domestic violence victim advocate.  You also can contact the National Domestic Violence Hotline within the United States at 1-800-799-SAFE (7233). If you are outside of the United States, contact the American Domestic Violence Crisis Line by calling the local AT&T operator in your country and asking to be connected to 866-USWOMEN. 
As we look back, we hope you are inspired to help us move forward to promote an end to domestic violence.
For more information on the DOD Family Advocacy Program, visit Military Homefront
To comment on this blog, please visit the Family Matters blog.

Fraudulent Automated Clearing House (ACH) Transfers Connected to Malware and Work-at-Home Scams

Fraudulent Automated Clearing House (ACH) Transfers Connected to Malware and Work-at-Home Scams
11/03/09—Within the last several months, the FBI has seen a significant increase in fraud involving the exploitation of valid online banking credentials belonging to small and medium businesses, municipal governments, and school districts. In a typical scenario, the targeted entity receives a “spear phishing” e-mail which either contains an infected attachment, or directs the recipient to an infected website. Once the recipient opens the attachment or visits the website, malware is installed on their computer. The malware contains a key logger which will harvest the recipients business or corporate bank account log-in information. Shortly thereafter, the perpetrator either creates another user account with the stolen log-in information, or directly initiates funds transfers by masquerading as the legitimate user. These transfers have occurred as both traditional wire transfers and as ACH transfers.
Further reporting has shown that the transfers are directed to the bank accounts of willing or unwitting individuals within the United States. Most of these individuals have been recruited via work-at-home advertisements, or have been contacted after placing resumes on well-known job search websites. These persons are often hired to “process payments”, or “transfer funds”. They are told they will receive wire transfers into their bank accounts. Shortly after funds are received, they are directed to immediately forward most of the money overseas via wire transfer services such as Western Union and Moneygram.
Customers who use online banking services are advised to contact their financial institution to ensure they are employing all the appropriate security and fraud prevention services their institution offers.
The United States Computer Emergency Readiness Team (US-CERT) has made information on banking securely online available at http://www.us-cert.gov/reading_room/Banking_Securely_Online07102006.pdf.
Protecting your computer against malicious software is an ongoing activity and, at minimum, all computer systems need to be regularly patched, have up to date anti-virus software, and a personal firewall installed. Further information is available at http://www.us-cert.gov/nav/nt01/.
If you have experienced unauthorized funds transfers from your bank accounts, or if you have been recruited via a work-at-home opportunity to receive transfers and forward money overseas, please notify the IC3 by filing a complaint at www.ic3.gov.
For a detailed analysis of this scam please visit http://www.ic3.gov/media/2009/091103-1.aspx.

DOD Chosen to Manage Breast Cancer Research


By Cheryl Pellerin
American Forces Press Service

WASHINGTON, Oct. 19, 2010 - Taxpayers with a stake in breast cancer research chose the Army to manage federal funds that are awarded to some of the best breast cancer researchers in the world.

Click photo for screen-resolution image
Air Force Staff Sgt. Erika Haskins uses a ruler to measure a mammogram film to pinpoint areas that are more likely to develop breast cancer at Aviano Air Base, Italy, Nov. 1, 2004. U.S. Air Force photo by Airman Scherrie K. Gates

(Click photo for screen-resolution image);high-resolution image available.
Every year since 1992, Congress has added millions of dollars to the Defense Department's budget so the U.S. Army Medical Research and Materiel Command at Fort Detrick, Md., can help scientists fight breast cancer. The Breast Cancer Research Program is just one of the congressionally directed medical research programs that have managed $6 billion in appropriations through fiscal 2010. Funding covers such afflictions as Gulf War illness, prostate cancer, spinal cord and traumatic brain injuries, autism and genetic studies of food allergies. But the largest share of money -– and the first research to be funded by the program -– goes to scientists whose work targets breast cancer prevention, detection, diagnosis and treatment.
"We don't invest any funds into raising breast cancer awareness or educational outreach," oncologist and Army Capt. (Dr.) E. Melissa Caime told American Forces Press Service. "That isn't the mission given to us by Congress. All of our funds go toward research and management of that research. And we really do try to complement other funding agencies and not compete, and so move the field forward in a unique way."
In 1992, breast cancer patients and survivors marched on Congress with a compelling request for more research, Caime said.
"They wanted research that was innovative, that was willing to take a risk and that was going to have an impact and leapfrog the field forward," she said. To manage the program, the advocates had a choice among the Army Medical Research and Materiel Command and other research institutions.
"When the advocates met with our commanding general at the time, they found a very welcoming organization," Caime said. "This command has done biomedical research for many decades specifically focused on the needs of warfighters, ... [including] military operational medicine, combat casualty care and military infectious disease focus areas."
AMRMC'S commanding general also was enthusiastic about the advocates' desire to have a larger voice in research, Caime said, "so we've had a very happy partnership since that time."
The Army brings to the program "a very organized and efficient way of managing the research," she added.
Any scientist around the world can submit a research proposal for funding, and scientists and consumers work together in a two-tier process to decide which projects receive funding, she said.
"We listen to consumers, who we call the survivor-advocates, because they are the ones living with the disease," Caime said. "They are the acid test for every research project. We ask: 'How is [the research] going to make a difference for them or future generations, and incorporate their viewpoints and passions in all of our programs?'"
The National Cancer Institute estimates that 207,090 women will be diagnosed with breast cancer this year, and nearly 40,000 will die. Also this year, an estimated 2,000 men will be diagnosed, and 390 will die.
The Breast Cancer Research Program tries to focus on leading-edge kinds of research, program manager Dr. Gayle Vaday told American Forces Press Service.
"The bulk of our awards are made in the early stages, where it's harder for researchers to get funding through other federal agencies," she said. "We try to give a new idea that opportunity. It's high-risk, but the potential for gain is there."
For example, Dr. Lance Liotta of George Mason University and Virginia surgeon Dr. Kirsten Edmiston received an early award for research that evolved into an ongoing clinical trial to test the ability of the antimalarial drug chloroquine to reduce the long-term survival and spread of a kind of breast cancer called ductal carcinoma in situ, Vaday said. A standard treatment is to remove a tumor surgically from the breast, but it can take several days after surgery to find out if all the tumor cells are gone, she added.
Dr. Sarah Blair and colleagues at the University of California-San Diego received an award to develop an automated system that examines thousands of cells while a woman is still under anesthesia during surgery and separates cancer from noncancer cells based on the proteins they produce.
In 1993, the program funded an application from Dr. Dennis Slamon, then chief of hematology and oncology division at the University of California-Los Angeles, to develop antibodies against breast cancer –- an idea that was unheard-of at the time, Caime said.
Slamon's genetic studies ultimately led to the development of a drug called Herceptin that helps some of the women who have a fast-growing and deadly form of the disease.
"We don't restrict proposals to specific topics," Caime said. "For this program we allow the good science to come forward. We don't try to tell the scientific field that we must have studies on [specific topics]. We let very excellent science with innovation come to the top."
 

Spear Phishing E-mails Target U.S. Law Firms and Public Relations Firms

Spear Phishing E-mails Target U.S. Law Firms and Public Relations Firms
11/17/09—The FBI assesses with high confidence that hackers are using spear phishing e-mails with malicious payloads to exploit U.S. law firms and public relations firms. During the course of ongoing investigations, the FBI identified noticeable increases in computer exploitation attempts against these entities. The specific intrusion vector used against the firms is a spear phishing or targeted socially engineered e-mail designed to compromise a network by bypassing technological network defenses and exploiting the person at the keyboard. Hackers exploit the ability of end users to launch the malicious payloads from within the network by attaching a file to the message or including a link to the domain housing the file and enticing users to click the attachment or link. Network defense against these attacks is difficult as the subject lines are spoofed, or crafted, in such a way to uniquely engage recipients with content appropriate to their specific business interests. In addition to appearing to originate from a trusted source based on the relevance of the subject line, the attachment name and message body are also crafted to associate with the same specific business interests. Opening a message will not directly compromise the system or network because the malicious payload lies in the attachment or linked domain. Infection occurs once someone opens the attachment or clicks the link, which launches a self-executing file and, through a variety of malicious processes, attempts to download another file.
Indicators are unreliable to flag in-bound messages; however, indicators are available to determine an existing compromise. Once executed, the malicious payload will attempt to download and execute the file ‘srhost.exe’ from the domain ‘http://d.ueopen.com’; e.g. http://d.ueopen.com/srhost.exe. Any traffic associated with ‘ueopen.com’ should be considered as an indication of an existing network compromise and addressed appropriately.
The malicious file does not necessarily appear as an ‘exe’ file in each incident. On occasion, the self-executing file has appeared as other file types, e.g., ‘.zip’, ‘.jpeg’, etc.
Please contact your local field office if you experience this network activity and direct incident response notifications to DHS and U.S. CERT.

Source: FBI Not An Endorsement

Online Ballots Can Help Overseas Votes Count


By Karen Parrish
American Forces Press Service

WASHINGTON, Oct. 19, 2010 - The Defense Department's Federal Voting Assistance Program has a solution for overseas servicemembers and other U.S. citizens living outside the country who haven't received an election ballot: get it online.

With Nov. 2 midterm elections two weeks off, Illinois and New York recently joined the list of states and territories the Justice Department has filed complaints against or investigated for irregularities regarding absentee ballots.
"Department of Justice is working with those states to remedy the situation," Pentagon spokesman Marine Corps Col. Dave Lapan said today. "Obviously, DOD's interest is ... making sure our troops stationed overseas are afforded their rights to vote."
For anxious voters, an alternative to mailed ballots is a few mouse-clicks away. New York and Illinois ballots -- and those of 29 other states -- are available online at the voting assistance program's website, http://www.fvap.gov.
Bob Carey, FVAP director, said today that New York has agreed to count all absentee ballots received by Nov. 24, but New York voters must mail those ballots by Nov. 1. "They can go to FVAP.gov and download that ballot right now," he added.
Carey said some states allow ballots to be returned by fax or online, but the Military Postal Service will express-mail any ballots military members or their spouses submit from overseas.
Additionally, voters from all 55 states and territories can use the FVAP online federal write-in absentee ballot automated assistant to vote for at least all federal candidates.
Carey said the federal absentee ballot can be used for all jurisdictions' federal-level elections.
"You can choose your federal candidates online. It will print out the ballot with your choices already in there, and give you complete instructions including a pre-addressed envelope to send back to your local election officials," he said.
Visitors to the site click once to say whether they are military or civilian. Either answer leads them to an interactive U.S. map. Clicking on their home of record or state of most recent residence will lead to options to register to vote or to request or track a ballot. Each of these options leads to a state-specific page that tells voters what to do next to download or request and to mark and return their ballots.
The Federal Voting Assistance Program website also offers a reference center that provides answers to frequently asked questions, program contact information, and a chat option for voters who need more help.
"It's not too late to get your absentee ballot," Carey said. "You can get your ballot online today, and send it back, and it will get back in time to be counted."

FEMA Says - Get a Kit

        You may need to survive on your own after an emergency. This means having your own food, water, and other supplies in sufficient quantity to last for at least three days. Local officials and relief workers will be on the scene after a disaster, but they cannot reach everyone immediately. You could get help in hours, or it might take days. In addition, basic services such as electricity, gas, water, sewage treatment, and telephones may be cut off for days, or even a week or longer.

Recommended Items to Include in a Basic Emergency Supply Kit:

  • Water, one gallon of water per person per day for at least three days, for drinking and sanitation
  • Food, at least a three-day supply of non-perishable food
  • Battery-powered or hand crank radio and a NOAA Weather Radio with tone alert and extra batteries for both
  • Flashlight and extra batteries
  • First aid kit
  • Whistle to signal for help
  • Dust mask, to help filter contaminated air and plastic sheeting and duct tape to shelter-in-place
  • Moist towelettes, garbage bags and plastic ties for personal sanitation
  • Wrench or pliers to turn off utilities
  • Can opener for food (if kit contains canned food)
  • Local maps
  • Cell phone with chargers, inverter or solar charger

Additional Items to Consider Adding to an Emergency Supply Kit:

  • Prescription medications and glasses
  • Infant formula and diapers
  • Pet food and extra water for your pet
  • Important family documents such as copies of insurance policies, identification and bank account records in a waterproof, portable container
  • Cash or traveler's checks and change
  • Important family documents such as copies of insurance policies, identification and bank account records in a waterproof, portable container. You can use the EFFAK Emergency Financial First Aid Kit - PDF, 277Kb) developed by Operation Hope, FEMA and Citizen Corps to help you organize your information
  • Emergency reference material such as a first aid book or information from www.ready.gov
  • Sleeping bag or warm blanket for each person. Consider additional bedding if you live in a cold-weather climate.
  • Complete change of clothing including a long sleeved shirt, long pants and sturdy shoes. Consider additional clothing if you live in a cold-weather climate.
  • Household chlorine bleach and medicine dropper – When diluted nine parts water to one part bleach, bleach can be used as a disinfectant. Or in an emergency, you can use it to treat water by using 16 drops of regular household liquid bleach per gallon of water. Do not use scented, color safe or bleaches with added cleaners.
  • Fire Extinguisher
  • Matches in a waterproof container
  • Feminine supplies and personal hygiene items
  • Mess kits, paper cups, plates and plastic utensils, paper towels
  • Paper and pencil
  • Books, games, puzzles or other activities for children
Find out how to keep food safe during and after and emergency by visiting: http://www.foodsafety.gov/keep/

FEMA Says - Get a Kit

        You may need to survive on your own after an emergency. This means having your own food, water, and other supplies in sufficient quantity to last for at least three days. Local officials and relief workers will be on the scene after a disaster, but they cannot reach everyone immediately. You could get help in hours, or it might take days. In addition, basic services such as electricity, gas, water, sewage treatment, and telephones may be cut off for days, or even a week or longer.

Recommended Items to Include in a Basic Emergency Supply Kit:

  • Water, one gallon of water per person per day for at least three days, for drinking and sanitation
  • Food, at least a three-day supply of non-perishable food
  • Battery-powered or hand crank radio and a NOAA Weather Radio with tone alert and extra batteries for both
  • Flashlight and extra batteries
  • First aid kit
  • Whistle to signal for help
  • Dust mask, to help filter contaminated air and plastic sheeting and duct tape to shelter-in-place
  • Moist towelettes, garbage bags and plastic ties for personal sanitation
  • Wrench or pliers to turn off utilities
  • Can opener for food (if kit contains canned food)
  • Local maps
  • Cell phone with chargers, inverter or solar charger

Additional Items to Consider Adding to an Emergency Supply Kit:

  • Prescription medications and glasses
  • Infant formula and diapers
  • Pet food and extra water for your pet
  • Important family documents such as copies of insurance policies, identification and bank account records in a waterproof, portable container
  • Cash or traveler's checks and change
  • Important family documents such as copies of insurance policies, identification and bank account records in a waterproof, portable container. You can use the EFFAK Emergency Financial First Aid Kit - PDF, 277Kb) developed by Operation Hope, FEMA and Citizen Corps to help you organize your information
  • Emergency reference material such as a first aid book or information from www.ready.gov
  • Sleeping bag or warm blanket for each person. Consider additional bedding if you live in a cold-weather climate.
  • Complete change of clothing including a long sleeved shirt, long pants and sturdy shoes. Consider additional clothing if you live in a cold-weather climate.
  • Household chlorine bleach and medicine dropper – When diluted nine parts water to one part bleach, bleach can be used as a disinfectant. Or in an emergency, you can use it to treat water by using 16 drops of regular household liquid bleach per gallon of water. Do not use scented, color safe or bleaches with added cleaners.
  • Fire Extinguisher
  • Matches in a waterproof container
  • Feminine supplies and personal hygiene items
  • Mess kits, paper cups, plates and plastic utensils, paper towels
  • Paper and pencil
  • Books, games, puzzles or other activities for children
Find out how to keep food safe during and after and emergency by visiting: http://www.foodsafety.gov/keep/

Phishing and Smishing Schemes

Phishing and Smishing Schemes
Be leery of e-mails or text messages you receive indicating a problem or question regarding your financial accounts. In this scam, you are directed to follow a link or call the number provided in the message to update your account or correct the problem. The link actually directs the individuals to a fraudulent website or message that appears legitimate where any personal information you provide, such as account number and PIN, will be stolen.
Another scam involves victims receiving an e-mail message directing the recipient to a spoofed website. A spoofed website is a fake site or copy of a real website and misleads the recipient into providing personal information, which is routed to the scammer's computers.

Source: FBI Not an endorsement

DHS veteran recruitment events

2010 Events Calendar

The Department of Homeland Security is scheduled to attend the following veteran recruitment events. The events are not hosted by Homeland Security and are not Department-specific. All applicants are encouraged to apply for Department employment consideration by going to USAJOBS.gov or start your job search with our Job Finder.
DateEventLocationVendorComponent
October 20Ft Meade, MD (NSA)Wounded Warrior Internship Hiring FairOffice of Intelligence & Analysis
October 22MOAA/Corporate Gray Job FairSpringfield, Va.Office of Intelligence & Analysis
October 28Northeastern University in Coop w/Senator Coburn, Congressman Boren and Congressman Sullivan Veterans Job FairBroken Arrow, Okla.ICE
October 29Thurgood Marshall Leadership InstituteNew York, N.Y.ICE
November 1UMUC 2010 Fall Job FairAdelphi, Md.Office of Intelligence & Analysis
November 3Veterans Extravaganza 2010Upper Marlboro, Md.Office of Intelligence & Analysis
November 9The Seattle Career FairSeattle, Wash.ICE
November 9Marymount University's Government Job & Internship FairArlington, Va.Office of Intelligence & Analysis
November 12National Career Fair Kansas City Job FairKansas City, Mo.ICE
November 16National Career Fair Chicago Northwest Job FairArlington Heights, Ill.ICE
November 17Fort Meade Veterans Job FairFt Meade, Md.Office of Intelligence & Analysis
November 18San Diego State Univ. Career FairSan Diego, Calif.ICE
November 18National Career Fairs Long Island Job FairMelville, N.Y.ICE
November 19Careers and the DisabledWashington, D.C.Office of Intelligence & Analysis
This page was last reviewed / modified on October 19, 2010.

Toronto - Weather Alert - Environment Canada

City of Toronto news releases, Emergency Medical Services

The Weather Network - St. Catharines, Ontario

Toronto - Weather - Environment Canada

City of Toronto News Releases

City of Toronto Arts and Exhibits Events

City of Toronto Celebrations and Holiday Events

City of Toronto Charity and Cause Events

City of Toronto Consumer Shows Events

Your Ad Here

City of Toronto Dance Events

City of Toronto Environmental Events

City of Toronto Community Events

City of Toronto Family and Children's Events

City of Toronto Film Events

Your Ad Here

City of Toronto Live Performance Events

City of Toronto Farmers' Markets Events

City of Toronto Major Conferences Events

Your Ad Here

City of Toronto Sports Events

City of Toronto Theatre Events

CNW Group | General News