TruthMovement an internet research-guide for students and scholars. Best viewed in Chrome Browser

Blog Search

Friday, August 1, 2014

SEX TRAFFICKING CHARITIES CAUGHT LYING AND STEALING MONEY


SEX TRAFFICKING CHARITIES CAUGHT LYING AND STEALING MONEY

Recently the Village Voice exposed the Schapiro Group, a private consulting firm in Georgia, and the Women’s Funding Network of California, a women’s charity, for knowingly deceiving both congress and the public using false data manufactured through fraudulent research. These groups presented alarming reports of a sudden rise in trafficking and sexual exploitation of girls.


This false data was used to justify funding from private foundations, corporate donors, and potentially the government. No one would deny that the prevention of sexual trafficking of minors is vitally important. The safety of children is a commitment we share.

Unfortunately the false information propagated by the Schapiro Group and anti trafficking non profits does more harm than good.

Fraudulent research negatively impacts the crucial efforts of legitimate organizations that serve exploited and trafficked minors. When these organizations are not able to report that they have reached numbers of youth comparable to the inflated numbers of victims reported by the Schapiro Group, it jeopardizes their credibility and funding. Bogus data misrepresents not only the quantity of trafficked minors, but also their demographics. Boys and transgender youth are not appropriately included in the study. Additionally, we are concerned that increased funding for law enforcement efforts to combat a vastly inflated threat of the trafficking of minors is channeled instead into police actions directed not at traffickers, but rather against consenting adult sex workers, a vulnerable population that already suffers from social stigma, criminalization and unequal access to protection. We reject the concept that criminalizing members of any population is an effective way to rescue them.

Exploitation of children is an important issue that should never be lied about. To do so represents a greedy and cynical funding grab at the expense of frightening the public, deceiving donors, and misdirecting resources. To do so knowing that this effort will undoubtedly result in law enforcement targeting of adult women consensually working in the sex industry would surely not be consistently endorsed by the supporters of a large women’s fund.

Therefore, we, the undersigned, call on the United States Dept. of Justice to investigate the Schapiro Group and the Women’s Funding Network for conspiracy to commit fraud against their donors, the public and the US government. To the degree to which they received public monies, and provided false testimony before congress, we call for an investigation for fraud against federal and state governments as well.

Send a Petition To: 

U.S. Department of Justice

Criminal Division

Fraud Section
Bond Building, 4th Floor
10th and Constitution Ave. NW
Washington, DC 20530-0001
Att: Denis J. McInerney
Chief, Fraud Section
202-514-7023

Here are some links about this:








NO EVIDENCE OF SEX TRAFFICKING AT SPORTING EVENTS:

The Global Alliance Against Traffic in Women (GAATW)

Research report on sorting out the myths and facts about Human Trafficking sex trafficking prostitution sex slavery at sporting events: 

The Global Alliance Against Traffic in Women (GAATW) :

link to research report:




New research papers on sex trafficking:





News night BBC video:




Guardian newspaper:


To: 
John W. Suthers, Colorado Attorney General 
Consumer Protection, Colorado Consumer Protection 
U.S. Department of Justice Criminal Division Fraud Section, Denis J. McInerney Chief, Fraud Section United States Department of Justice
I just signed the following petition addressed to: U.S. Department of Justice Criminal Division Fraud Section.

----------------
Investigate anti sex trafficking groups for conspiracy to commit fraud

Recently the Village Voice exposed the Schapiro Group, a private consulting firm in Georgia, and the Women’s Funding Network of California, a women’s charity, for knowingly deceiving both congress...

and the public using false data manufactured through fraudulent research. These groups presented alarming reports of a sudden rise in trafficking and sexual exploitation of girls. 

This false data was used to justify funding from private foundations, corporate donors, and potentially the government. No one would deny that the prevention of sexual trafficking of minors is vitally important. The safety of children is a commitment we share. 

Unfortunately the false information propagated by the Schapiro Group and anti trafficking non profits does more harm than good.

Fraudulent research negatively impacts the crucial efforts of legitimate organizations that serve exploited and trafficked minors. When these organizations are not able to report that they have reached numbers of youth comparable to the inflated numbers of victims reported by the Schapiro Group, it jeopardizes their credibility and funding. Bogus data misrepresents not only the quantity of trafficked minors, but also their demographics. Boys and transgender youth are not appropriately included in the study. Additionally, we are concerned that increased funding for law enforcement efforts to combat a vastly inflated threat of the trafficking of minors is channeled instead into police actions directed not at traffickers, but rather against consenting adult sex workers, a vulnerable population that already suffers from social stigma, criminalization and unequal access to protection. We reject the concept that criminalizing members of any population is an effective way to rescue them.

Exploitation of children is an important issue that should never be lied about. To do so represents a greedy and cynical funding grab at the expense of frightening the public, deceiving donors, and misdirecting resources. To do so knowing that this effort will undoubtedly result in law enforcement targeting of adult women consensually working in the sex industry would surely not be consistently endorsed by the supporters of a large women’s fund.

Therefore, we, the undersigned, call on the United States Dept. of Justice to investigate the Schapiro Group and the Women’s Funding Network for conspiracy to commit fraud against their donors, the public and the US government. To the degree to which they received public monies, and provided false testimony before congress, we call for an investigation for fraud against federal and state governments as well.

Here are some links about this:

http://www.villagevoice.com/2011-03-23/news/women-s-funding-network-sex-trafficking-study-is-junk-science/

http://www.villagevoice.com/2011-06-29/news/real-men-get-their-facts-straight-sex-trafficking-ashton-kutcher-demi-moore/

http://www.washingtonpost.com/wp-dyn/content/article/2007/09/22/AR2007092201401_pf.html

http://bebopper76.wordpress.com
----------------

Sincerely,


Sincerely, 
[Your name]

USB device viruses could evade all known Security Reuters


USB device viruses could evade all known Security
 Reuters


USB devices such as keyboards, thumb-drives and mice can be used to hack into personal computers in a potential new class of attacks that evade all known security protections, a top computer researcher revealed on Thursday.


Karsten Nohl, chief scientist with Berlin's SR Labs, noted that hackers could load malicious software onto tiny, low-cost computer chips that control functions of USB devices but which have no built-in shields against tampering with their code.

"You cannot tell where the virus came from. It is almost like a magic trick," said Nohl, whose research firm is known for uncovering major flaws in mobile phone technology.
Jeffrey Coolidge | Photodisc | Getty Images


The finding shows that bugs in software used to run tiny electronics components that are invisible to the average computer user can be extremely dangerous when hackers figure out how to exploit them. Security researchers have increasingly turned their attention to uncovering such flaws.

Nohl said his firm has performed attacks by writing malicious code onto USB control chips used in thumb drives and smartphones. Once the USB device is attached to a computer, the malicious software can log keystrokes, spy on communications and destroy data, he said.


Computers do not detect the infections when tainted devices are inserted because anti-virus programs are only designed to scan for software written onto memory and do not scan the "firmware" that controls the functioning of those devices, he said.

Nohl and Jakob Lell, a security researcher at SR Labs, will describe their attack method at next week's Black Hat hacking conference in Las Vegas, in a presentation titled: "Bad USB—On Accessories that Turn Evil."

Thousands of security professionals gather at the annual conference to hear about the latest hacking techniques, including ones that threaten the security of business computers, consumer electronics and critical infrastructure.


Nohl said he would not be surprised if intelligence agencies, like the National Security Agency, have already figured out how to launch attacks using this technique.

Last year, he presented research at Black Hat on breakthrough methods for remotely attacking SIM cards on mobile phones. In December, documents leaked by former NSA contractor Edward Snowden demonstrated that the U.S. spy agency was using a similar technique for surveillance, which it called "Monkey Calendar."

An NSA spokeswoman declined to comment.


SR Labs tested the technique by infecting controller chips made by major Taiwanese manufacturer, Phison Electronics, and placing them in USB memory drives and smartphones running Google Android operating system.

Alex Chiu, an attorney with Phison, told Reuters via email that Nohl had contacted the company about his research in May.


"Mr. Nohl did not offer detailed analysis together with work product to prove his finding," Chiu said. "Phison does not have ground to comment (on) his allegation."

Chiu said that "from Phison's reasonable knowledge and belief, it is hardly possible to rewrite Phison's controller firmware without accessing our confidential information."

Similar chips are made by Silicon Motion Technology and Alcor Micro. Nohl said his firm did not test devices with chips from those manufacturers.


Google did not respond to requests for comment. Officials with Silicon Motion and Alcor Micro could not immediately be reached.

Nohl believed hackers would have a "high chance" of corrupting other kinds of controller chips besides those made by Phison, because their manufacturers are not required to secure software. He said those chips, once infected, could be used to infect mice, keyboards and other devices that connect via USB.

"The sky is the limit. You can do anything at all," he said.


In his tests, Nohl said he was able to gain remote access to a computer by having the USB instruct the computer to download a malicious program with instructions that the PC believed were coming from a keyboard. He was also able to change what are known as DNS network settings on a computer, essentially instructing the machine to route Internet traffic through malicious servers.

Once a computer is infected, it could be programmed to infect all USB devices that are subsequently attached to it, which would then corrupt machines that they contact.

"Now all of your USB devices are infected. It becomes self-propagating and extremely persistent," Nohl said. "You can never remove it."


Christof Paar, a professor of electrical engineering at Germany's University of Bochum who reviewed the findings, said he believed the new research would prompt others to take a closer look at USB technology, and potentially lead to the discovery of more bugs. He urged manufacturers to improve protection of their chips to thwart attacks.

"The manufacturer should make it much harder to change the software that runs on a USB stick," Paar said.

—By Reuters