SDC Financial Guide

Learn More About Credit Everyday!

01 November
0Comments

China-Backed Hacking Group Axiom Said To Have Attacked 43000 Computers

American security researchers have identified a group of state-sponsored Chinese hackers that appears to be more sophisticated than other groups targeting American companies and government bodies. Dubbed “Axiom,” the group’s unveiling comes only weeks before US President Obama and Secretary of State John Kerry are scheduled to meet with Chinese leadership in Beijing to discuss a number of issues, including cyber-warfare.

Novetta Solutions, a firm that counts respected cybersecurity watchdogs like FireEye and Cisco among its partners, released a report Tuesday asserting that Axiom poses more of a threat to western interests than the notorious People’s Liberation Army Unit 61398. In targeting over 43,000 computers, the group has infiltrated Fortune 500 companies, pro-democracy groups, academic institutions, journalists, environmental groups and a range of other areas, according to researchers.

“The Axiom threat group is a well-resourced, disciplined, and sophisticated subgroup of a larger cyber espionage group that has been directing operations unfettered for over six years,” the report stated. “Novetta has moderate to high confidence that the organization tasking Axiom is part of Chinese Intelligence Apparatus. This belief has been partially confirmed by a recent FBI flash…stating the actors are affiliated with the Chinese government.”

This report comes after the FBI warned last week that a group of highly skilled Chinese government hackers was operating a costly, worrisome campaign against both the US government and American companies. That advisory differentiated the group in question (now identified as Axiom) with PLA Unit 61398, the cyber warfare unit identified as the group behind the theft of hundreds of terabytes of data from countless American and British organizations.

Chinese representatives have consistently denied that China conducts any kind of cyber warfare, saying its actually American intelligence activity like the National Security Agency’s infiltration of Huawei computer systems that stokes international tension.

The Novetta report is also reminiscent of the US Department of Justice’s name-and-shame strategy, in which attorneys unsealed an indictment against five Chinese hackers accused of infiltrating American retail chains. Unable to apprehend the suspects inside China, though, the strategy inadvertently lionized the suspected hackers, with the Chinese media hailing them as heroes.

President Obama and Secretary Kerry will seek to manage the lingering tension during a visit to Beijing in November. Officials on both sides are already promising to better cooperate on cyber issues while at the same time denying any wrongdoing. The discussion could endure long past the November meetings.

“Dialogue and cooperation between china and the US in the field of cybersecurity is faced with difficulty due to the wrong actions taken by the American side,” Chinese State Counselor Yang Jiechi said last week, as quoted by China Daily. “The American side should take positive actions so as to create conditions for the restart of dialogue and cooperation between the two countries in the field of cyber security.” 

01 November
0Comments

Computers stolen from Rocking Horse during break-in

The Rocking Horse Health Center was burglarized sometime overnight Monday into Tuesday, according to a Springfield Police Division report.

An employee arriving for work Tuesday morning discovered that someone had damaged a window to enter the building at 651 S. Limestone St. and ransacked several offices in the behavioral health section, according to the report.

A police report obtained Wednesday lists three computers as stolen.

Those computers didn’t contain any billing or medical records, Rocking Horse CEO Chris Cook said. Patient records are maintained on a server-based system so nothing can be accessed once the computer is removed from the network.

The Rocking Horse Center, originally opened to offer health care to under-served children, is now a full-service community health center for children and adults.

The fact that someone would steal from a community resource like the Rocking Horse center is frustrating, Cook said.

“We’re just so disappointed,” he said. STAFF REPORT

31 October
0Comments

Vet Your Financial Advisor in 3 Easy Steps

Financial
advice is a field unlike any other. The term, financial advisor, can have different meanings depending on who you ask.
There are also varying degrees of services afinancial advisor can offer. Before
choosing a financial advisor,
do some basic homework by following these easy steps:

1.Find out what your financial advisors qualifications are.There are
many different topics an advisor can choose to focus their business on. Some
individuals are specialized, such as a chartered retirement planning counselor, whereas other individuals have a more generic focus, such as a certified financial planner. The alphabet soup behind a person’s name is validation for
the effort and focus applied to one specific area. Investopedia offers an
understanding of each designation and the steps involved to receive them.

It is
important to realize there are many designations out there, and some of them dont require a lot of work to attain. For instance, an accredited asset management specialist may sound lofty, but in reality, it requires only 28 hours of
curriculum that can be learned through a self-study program.

Once the advisor
is ready to move forward, the advisor can complete an exam and use the designation
if he or she meets further requirements. I’m not saying there is anything wrong with
this designation, but if it were the only one my advisor holds, I would be
reluctant to follow advice he or she would offer on estate planning or another topic
outside of that designation’s curriculum.

Other
designations, such as CFP,are more demanding and require
greater effort to attain. Not only does the candidate have to have
prerequisites of three years of experience and a Bachelor’s degree before using
the designation, they also must pass a 170-question test administered
over two sessions, which each last three hours. The exam covers eight primary domains, ranging from investment management to estate planning. As of 2013, the overall pass rate was 63.3 percent, according to the CFP Board.

The lengthy prerequisites and number of topics the CFP exam covers give
assurance the person who holds the designation has done a significant
amount of work beforehand and is committed to their industry. They
are also better qualified to make recommendations for an overall financial plan. Different
designations can be used for advice on specific topics. As
a consumer, you should understand what qualifies the person advising you to give such
advice, and how much work it took to allow them the ability to do so.

2.Find out which securities licenses
your financial advisor holds.The
Financial Industry Regulatory Authority is an independent regulatory body authorized by Congress to write and enforce rules applied to
securities firms and brokers. Any advisor licensed to deal securities or
financial advice is registered with this authority.

As a result, you have
access through its website to check which licenses your advisor holds. More
importantly, you can check the advisors background and see if there are any infractions
against him or her. This tool does not tell you all you need to know about an
advisor, but it can provide insight into an advisorsbusiness background before you choose to work with the individual.

3.Discuss how your financial advisor is paid. Is your advisor fee-based or
commission-based?The way someone is paid should not dictate the quality of
advice you receive. However, if you have a clear understanding of how
someone is paid, you have a better chance at understanding the persons motivations.
The biggest difference between fee-based compensation versus commission-based compensation is the advisor’s obligation toward his or her client.

Individuals
who are paid commissions must ensure any advice meets a
suitability obligation. This can be defined as making recommendations that are
consistent with the best interests of the customer. Instead of
having to place the advisors interests below that of the client, the
suitability standard only requires the advisor must reasonably believe any
recommendations made are suitable, in terms of the clients financial needs,
objectives and unique circumstances.

Fee-based advisors are bound to a
fiduciary standard that requires them to put their client’s interests above
their own. They must also act with a duty of loyalty and care, meaning the
advisor must always act in the best interest of his or her client. This fiduciary standard is a much higher responsibility than the suitability standard.
Offering this higher level of care can lead to better advice.

The world of retirement planning can
be complicated, yet rewarding. By following the three steps, you will have
a better understanding of who you are working with, and what you should expect
by engaging their services.

31 October
0Comments

Danielson man arrested on motor vehicle break-in charges — again

DANIELSON – A Danielson man charged several months ago with breaking into several motor vehicles was arrested again Friday on larceny charges, state police said.

State police at approximately 1 pm responded to Green Hollow Road in Killingly for a report of a suspicious man walking back-and-forth in front of a house. A witness said the man, later identified as Donald Lefevre, of 273 Main St., Apt. B, then retrieved a black bag from nearby woods before fleeing after being confronted, police said.

The recovered bag contained multiple items stolen from a motor vehicle parked at Squaw Rock Road residence, police said. Police said they investigated numerous complaints of motor vehicle burglaries between Thursday night and Friday morning on Squaw Rock Road.

Lefevre was charged with fourth-degree larceny and was due today in Danielson Superior Court. Lefevre was arrested three months ago in connection with a string of car break-ins in Brooklyn.

31 October
0Comments

TxDOT Commissioner Says New Funding Could Change Reliance On Toll Roads

In addition to the many candidates on the Nov. 4 ballot, Texans are voting on a constitutional amendment known as Proposition 1. If it passes, a portion of oil and gas tax money flowing into the state’s rainy day savings account will be used for transportation.

Officials, however, warn that Proposition 1 will only provide part of the $5 billion needed each year just keep traffic gridlock from getting worse. KERA’s Shelley Kofler talked with Texas Transportation Commissioner Victor Vandergriff of Arlington about other options, including toll roads.

31 October
Comments Off

Parsippany man charged with driving while intoxicated after Randolph motor …

Police said that as medical emergency personnel were attending to one of the drivers, they detected a strong odor of an alcoholic beverage emanating from Philip A. Decaro, 43, of Parsippany who was arrested for alleged DWI. Decaro was also issued several motor vehicle violations, police said.

Sunday, Oct. 5

o Vineta K. Lujan, 55, of Randolph was stopped for a motor vehicle violation and was subsequently arrested on an outstanding warrant issued by the Jersey City Municipal Court, police said.

Lujan posted bail and was released.

o Officer Brian Gallina responded to Morris Turnpike for a report of a car burglary. The victim stated that money had been stolen from a wallet that was inside the vehicle.

Wednesday, Oct. 8

o Officer Robert Coyle responded to the parking lot of the Canfield Mews Apartment complex for a report of a shattered car window. After examining the car and surrounding area, Officer Coyle was unable to determine what caused the damage, police said.

Friday, Oct. 10

o Officer Michael Shoudy took a report of money being stolen from a purse. The victim stated she had left her purse unattended while at a “Job Fair” on Emery Ave. $42 and medication was stolen from the purse, police said.

o Police responded to a residence on Old Shunpike Road for a report of a house burglary.

The dead bolt and latch on the top of the front door had been damaged, police said.

The intruders had ransacked the master bedroom. The Morris County Sheriff’s Office arrived to process the scene.

o Police responded to a residence on Musiker Avenue for a reported burglary.

The homeowner came home and noticed their double front doors had been pushed in. The intruders had ransacked the master bedroom, police said.

The Morris County Sheriff’s Office arrived to process the scene.

o Several residents reported receiving scam phone calls from a person named Steve Martin. Martin states he is from the IRS.

Residents are reminded to never give personal information over the phone.

31 October
Comments Off

Financial Center put in new light

Downtowns skyline is set to get some new southern lights.

The Canadian investment firm that recently bought the Financial Center is installing a lighting system that will more brightly illuminate the 25-story tower and even change colors with a tap of the new owners iPhone.

The Financial Center, 666 Walnut St., is one of three buildings that Lawmark Capital Inc. is renovating in downtown Des Moines. The firm, which entered the metro-area market in 2011, is also working on the Des Moines Partnership Building at 700 Locust St. and the former Keck City Center parking ramp at 500 Grand Ave.

Between the three buildings, the firm plans to invest about $16 million, said CEO Mark Buleziuk.

30 October
Comments Off

FBI demands new powers to hack into computers and carry out surveillance

The FBI is attempting to persuade an obscure regulatory body in Washington to change its rules of engagement in order to seize significant new powers to hack into and carry out surveillance of computers throughout the US and around the world.

Civil liberties groups warn that the proposed rule change amounts to a power grab by the agency that would ride roughshod over strict limits to searches and seizures laid out under the fourth amendment of the US constitution, as well as violate first amendment privacy rights. They have protested that the FBI is seeking to transform its cyber capabilities with minimal public debate and with no congressional oversight.

The regulatory body to which the Department of Justice has applied to make the rule change, the advisory committee on criminal rules, will meet for the first time on November 5 to discuss the issue. The panel will be addressed by a slew of technology experts and privacy advocates concerned about the possible ramifications were the proposals allowed to go into effect next year.

“This is a giant step forward for the FBI’s operational capabilities, without any consideration of the policy implications. To be seeking these powers at a time of heightened international concern about US surveillance is an especially brazen and potentially dangerous move,” said Ahmed Ghappour, an expert in computer law at University of California, Hastings college of the law, who will be addressing next week’s hearing.

The proposed operating changes related to rule 41 of the federal rules of criminal procedure, the terms under which the FBI is allowed to conduct searches under court-approved warrants. Under existing wording, warrants have to be highly focused on specific locations where suspected criminal activity is occurring and approved by judges located in that same district.

But under the proposed amendment, a judge can issue a warrant that would allow the FBI to hack into any computer, no matter where it is located. The change is designed specifically to help federal investigators carry out surveillance on computers that have been “anonymized” – that is, their location has been hidden using tools such as Tor.

The amendment inserts a clause that would allow a judge to issue warrants to gain “remote access” to computers “located within or outside that district” (emphasis added) in cases in which the “district where the media or information is located has been concealed through technological means”. The expanded powers to stray across district boundaries would apply to any criminal investigation, not just to terrorist cases as at present.

Were the amendment to be granted by the regulatory committee, the FBI would have the green light to unleash its capabilities – known as “network investigative techniques” – on computers across America and beyond. The techniques involve clandestinely installing malicious software, or malware, onto a computer that in turn allows federal agents effectively to control the machine, downloading all its digital contents, switching its camera or microphone on or off, and even taking over other computers in its network.

“This is an extremely invasive technique,” said Chris Soghoian, principal technologist of the American Civil Liberties Union, who will also be addressing the hearing. “We are talking here about giving the FBI the green light to hack into any computer in the country or around the world.”

A glimpse into the kinds of operations that could multiply under the new powers was gained this week when Soghoian discovered from documents obtained by the Electronic Frontier Foundation that in 2007 the FBI had faked an Associated Press story as a ruse to insert malware into the computer of a US-based bomb plot suspect. The revelation prompted angry responses from the AP and from the Seattle Times, whose name was also invoked in the documents, though the FBI said it had not in the end imitated the newspaper.

Civil liberties and privacy groups are particularly alarmed that the FBI is seeking such a huge step up in its capabilities through such an apparently backdoor route. Soghoian said of next week’s meeting: “This should not be the first public forum for discussion of an issue of this magnitude.”

Jennifer Granick, director of civil liberties at the Stanford center for internet and society, said that “this is an investigative technique that we haven’t seen before and we haven’t thrashed out the implications. It absolutely should not be done through a rule change – it has to be fully debated publicly, and Congress must be involved.”

Ghappour has also highlighted the potential fall-out internationally were the amendment to be approved. Under current rules, there are no fourth amendment restrictions to US government surveillance activities in other countries as the US constitution only applies to domestic territory.

However, the US government does accept that it should only carry out clandestine searches abroad where the fourth amendment’s “basic requirement of reasonableness” applies. In a letter setting out its case for the rule 41 reform, the department of justice states that new warrants issued to authorise FBI hacking into computers whose location was unknown would “support the reasonableness of the search”.

Ghappour fears that such a statement amounts to “possibly the broadest expansion of extraterritorial surveillance power since the FBI’s inception”. He told the Guardian that “for the first time the courts will be asked to issue warrants allowing searches outside the country”.

He warned that the diplomatic consequences could be serious, with short-term FBI investigations undermining the long-term international relationship building of the US state department. “In the age of cyber attacks, this sort of thing can scale up pretty quickly.”

Another insight into the expansive thrust of US government thinking in terms of its cyber ambitions was gleaned recently in the prosecution of Ross Ulbricht, the alleged founder of the billion-dollar drug site the Silk Road. Experts suspect that the FBI hacked into the Silk Road server, that was located in Reykjavik, Iceland, though the agency denies that.

In recent legal argument, US prosecutors claimed that even if they had hacked into the server without a warrant, it would have been justified as “a search of foreign property known to contain criminal evidence, for which a warrant was not necessary”.

30 October
Comments Off

Financial planning has gotten beyond a joke

When comedian Shaun Micallefs latest episode of Mad as Hell did a spoof on the scandal-ridden financial planning industry it was a signal that the shenanigans had well and truly entered in the public psyche.

It comes as the wind-back of financial planning reforms, the so-called Future of Financial Advice amendments are expected to be debated in the Senate this week.

And it also comes just as the Australian Securities and Investments Commission agreed on Monday to intervene in a court case relating to the collapsed Great Southern managed investment scheme. The regulators involvement based on public interest follows a request from a group of senators, including Bill Heffernan and Sam Dastyari, who last week said they had been inundated with complaints from investors worried about imminent foreclosures and who had lost a fortune when the scheme went belly up.

In other parts of the sector, thousands of Timbercorp victims are getting slapped with writs after the scheme collapsed leaving huge debts that the liquidator is calling in.

30 October
Comments Off

QUIZ: Do you know the answers that could cut your car insurance premium?

The trick to getting the cheapest car insurance

Getting the cheapest car insurance is, sadly, not as simple as just using a price comparison service. These websites – try Moneysupermarkets quote finder – provide an excellent starting point. But some major insurers only deal with customers direct so you will need to enter your details on their websites as well. These include Direct Line and Zurich.

Some insurers also offer special offers that are worth factoring in and are often not included on comparison websites. For instance, the Post Office will guarantee the over-50s that they will beat their renewal premium by £50 [click here].

All those taking car insurance with John Lewis before the end of October are entered into a draw to win a VW Golf Match, plus free insurance for a year. [find out more]