Sunday, January 26, 2020
Family and Children’s Services of Lanark, Leeds and Grenville suffered another alleged cyberattack.
Decision in alleged Ontario CAS hacking case delayed until May 20/2020.
2016: Police probe leak of IDs of Lanark, Leeds and Grenville children's aid clients over web.
https://ottawacitizen.com/news/local-news/police-probe-leak-of-ids-of-lanark-leeds-and-grenville-childrens-aid-clients-over-web.
2016: Three-month investigation leads to charges in children's services alleged server breach.
https://ottawacitizen.com/news/local-news/three-month-investigation-leads-to-charges-against-two-people-in-childrens-services-server-breach
2016: CAS hacking charges dropped by Crown against Smiths Falls man.
https://www.insideottawavalley.com/news-story/7022350-cas-hacking-charges-dropped-by-crown-against-smiths-falls-man/
2017: Alleged CAS hacking case trial date to be set.
https://www.insideottawavalley.com/news-story/7170259-alleged-cas-hacking-case-trial-date-to-be-set/
:::
2018: Family and Children’s Services of Lanark, Leeds and Grenville suffered another alleged cyberattack.
"Raymond Lemay is back working at his computer, something he wasn’t able to do a few months back. In November, staff of Family and Children’s Services of Lanark, Leeds and Grenville were hit with a “malware” attack that locked them out their systems until they paid a $60,000 ransom."
Lemay says he wants to assure the public that no one’s private or personal data was taken as a result of the attack.
As it turned out, the office caught a lucky break. IT staff were able to restore the system within eight hours — and without having to pay hackers.
Children’s Services of Lanark, Leeds and Grenville, the office might have caught that lucky break, but the malware attack was still a hassle. Lemay says it took cybersecurity experts two to three weeks to eliminate the malware from the office’s computer network.
As for how the malware got on the office’s network in the first place, that remains a mystery.
“It could have been through somebody using a flash drive. It couldn’t have been through an email. It could have been any number of things,” Lemay says. “We really don’t know.”
https://globalnews.ca/news/4054200/leeds-lanark-and-grenville-family-childrens-services-ransomware/
:::
2018: Alleged ransomware attacks hit two Ontario children’s aid societies.
The alleged ransomware attacks at two children’s aid societies have spurred the Ontario government to tighten cybersecurity around a new, $123-million provincial database for children in care.
Officials with the other agency — Family and Children’s Services of Lanark, Leeds and Grenville — claim they saw an English ransom message flash on their computer screens, demanding $60,000, when they tried to access their database in November.
“It encrypted most of our servers,” says the Lanark agency’s executive director, Raymond Lemay. “No data was taken out of our system. It was just an attempt by whatever you call these people to get a ransom.”
Lemay says his agency didn’t pay up. He says it used an offline backup of computer files to get the agency up and running again in about eight hours.
Backup copy or was there two sets of books?
To cook the books is an idiom describing fraudulent activities performed by corporations to falsify their financial statements and God knows what else when it comes to the Ontario CAS..
Lemay says the ransomware attack cost his agency $100,000 to fix, an expense covered by his agency’s “cyber insurance.”
Cybersecurity experts from the province’s Ministry of Children and Youth Services, along with a private internet security firm, swooped into the agency to neutralize the malware in the infected servers.
“It took them about three weeks to find the needle in the haystack,” Lemay says.
The ransomware attack locked the agencies out of local online files that contained private information on the children and families they serve.
The computer virus attacked while the Lanark agency was uploading its data to a centralized database known as CPIN. It will allow societies across Ontario to share information more easily and better track how children in foster care and group homes are doing.
“They might have taken advantage of vulnerabilities that occurred because we were changing over to a new system,” Lemay says of CPIN. That’s one of the hypotheses, but we don’t know for sure.”
https://www.databreaches.net/ransomware-attacks-hit-two-ontario-childrens-aid-societies/
https://www.thestar.com/news/insight/2018/02/22/ransomware-attacks-hit-two-ontario-childrens-aid-societies.html
:::
Obscurantism is the practice of deliberately presenting information in an imprecise and recondite manner, often designed to forestall further inquiry and understanding. There are two historical and intellectual denotations of Obscurantism: (1) the deliberate restriction of knowledge—opposition to disseminating knowledge;[a] and (2) deliberate obscurity—an abstruse style (as in literature and art) characterized by deliberate vagueness.
https://en.wikipedia.org/wiki/Obscurantism
:::
Here are a few of the highlights from the alleged Ontario CAS hacker trial transcript:
PAGE 29/30 - FROM THE TRIAL TRANSCRIPT.
2019: EXECUTIVE DIRECTOR RAYMOND LEMAY. I was just repeating what had been explained to me. That the security features of the website, when it was first installed, had not been turned on. That’s what was explained to me, and I am just repeating what I heard.
Q. So, all you know is whoever C.A.S. retained for you working in your position did something incorrectly with respect to the website that caused this issue?
A. That’s what, that’s what I understand, yes.
READ THE COMPLETE TRIAL TRANSCRIPT HERE: https://www.kelleyandderek.com/
:::
2016: Alleged ‘disgruntled client’ posts names of 285 children’s aid families on Facebook (all 285 names on facebook?). A Brockville-area children’s aid society reels after names of 285 clients were posted on Facebook. (did the alleged hacker copy and paste all 285 names and codes in one post or did she post a picture of a hyperlink?)
Lemay admits the report was on the FCSLLG's website but says it was hidden behind several layers of security including a password given only to the organization's board of directors.
"You have to go through the back door. You have to be looking for this," he says.
A link to the report was obtained by someone — "likely a disgruntled client" — who hacked the secure portal for board members on the society's website, he said. No staff or board members are suspected of the breach, he said.
"Our suspicion, which is a fairly firm suspicion, is that it is a current client who is very disgruntled, very unhappy with us," he said. "We have contacted the police. Our lawyer has sent a letter to the website owner as well as to this individual telling them what they are doing is, we think, illegal."
This is the second time in about three months that the organization has had to take down its website because of security concerns. An outside expert was brought in after a February scare to better secure the website. No sensitive information was revealed or even in danger in the first breach, Lemay says. He says they made the changes and were told the website was secure.
The website has been taken down while experts help the FCSLLG improve its security. This branch of children's aid says it is reviewing its policies when it comes to sensitive information and how it handles such documents.
https://www.thespec.com/news-story/6503453--disgruntled-client-posts-names-of-285-children-s-aid-families-on-facebook/
https://ottawa.ctvnews.ca/names-of-285-people-referred-to-children-s-aid-in-lanark-leeds-and-grenville-posted-online-1.2865944
:::
D. David Rakobowchuk: From the final defense submissions (trial testimony).
-8-
43. Det. Rakobowchuk is himself a member of the above Facebook group. He testified that to join the group, a Facebook user had to request approval from a group administrator.12
44. Det. Rakobowchuk testified that there was no breach of password or anything similar used to gain access to the spreadsheet in question:13
Q. And, just for the purpose of the record, you have referred to — the information you got there was a hack, I guess?
A. Yes.
Q. But, as the investigation went on it was very — it became clear that there was no actual, I guess, a breach of a password, or anything like that used to gain this information?
A. Exactly.
READ THE COMPLETE TRIAL TRANSCRIPT HERE: https://www.kelleyandderek.com/
:::
MARGARET ROW: Affirmed.EXAMINATION IN CHIEF BY: Mr. Corbella.
Q. So, correct me if I am wrong, if I understand correctly, so basically if there is an issue that needs to be dealt with you are asked to deal with it?
A. Correct.
Q. Okay. Now, back in February of 2016, we’ve already heard, and I don’t think there is any issue, that Family and Child Services of Leeds, Lanark and Grenville, became aware there was a potential problem with the website?
A. Correct.
Q. We’ve heard about the – there was a – you became aware, and then you eventually yourself became aware as well that here was a posting of a video by Ms. Denham?
A. Yes.
Q. And that that posting contained certain documents which caused your organization some concern?
A. Yes.
Q. Okay. And, I understand that you reached out to your son-in-law, Mr. David Schmidt?
A. Correct.
Q. And, perhaps for the record, I’ll – Schmidt is S-C-H-M-I-D-I-T.
A. S-C-H-M-I-D-T.
Q. Thank you.
A. You are welcome.
Q. Why did you reach out to Mr. Schmidt?
A. Mr. Schmidt is a subject matter expert in internet and network security.
Q. And, how did you know that?
A. I owned a company, an internet company for five years,and Mr. Schmidt was my systems administrator.
Q. That was before he was your son-in-law?
A. That’s correct.
Q. Okay. Now, so you suggested that he may be a source of information, or help to your agency?
A. That’s correct.
Q. Okay. And, eventually your agency did decide to seek his advice?
A. Correct.
Q. And, it’s my understanding ma’am that – well, maybe you could just tell us. As a result of Mr. Schmidt coming onboard, what did you decide to do with regards to the, I guess,the investigation, or dealing of this first breach.
A. With respect to the dealing with the first breach, my involvement was minimal. I was only involved for the first three days. After Mr. Schmidt had accepted the contract, I voluntarily recused myself from the decision making tree because of the family relationship.
Q. Thank you. Exhibit four. So, here you go. You can refer to it whenever you need to to help you answer your question ma’am.
A. Yes, it was from service from April of 2015 to November of 2015
Q. April to November, of 2015. So, the names on the list would have been clients during that time period?
A. That’s correct.
Q. Okay. And, can you tell us – I mean, I forget the exact number, but I think it was – do you remember an exact number of how many names were on the list?
A. 285, sir.
Q. You’ve answered that question a few times I imagine.
A. Once or twice.
Q. Okay. So, those 285 names, are you able to tell us if any of them were ever a participant, a witness, a party to a hearing, let’s stop with that.
A. Am I directed to answer that question, sir?
THE COURT: Yes.
A. Yes.
Q. Okay. How many of them?
A. Six families and seven children. There was one family with two children.
CROSS EXAMINATION BY: Mr. Mansour
Q. Ms. Row, can you tell me, when did you retain your son-in-law, Mr. Schmidt? Was it before or after the first breach?
A. At the first breach.
Q. And, before or after the second breach?
A. I did not actively retain Mr. Schmidt. That direction came from the manager – the director of corporate services.
Q. Are you talking about Mr. Lemay? Is that who that person is?
A. No, that was Jennifer Eastwood.
Q. Jennifer Eastwood, okay. So, after the first breach,do you know roughly how long after the first breach your organization decides to retain Mr. Schmidt?
A. No, I don’t know.
Q. You don’t know. When do you retain Mr. Schmidt?
A. Initially in February, February the 9th.
Q. Okay. And then, you pass it off to Ms. Eastwood after that?
A. That’s correct.
Q. So, the website only went down after the second breach?
A. Correct.
Q. Okay. How long was it down for?
A. Five and a half months.
Q. At that point did you know what the compromise was?
A. No.
Q. And, whose decision was it to put it back up?
A. Mine.
READ THE COMPLETE TRIAL TRANSCRIPT HERE: https://www.kelleyandderek.com/
:::
FCSLLG'S SELF TAUGHT INTERNET SECURITY EXPERT DAVID SCHMIDT'S TESTIMONY.
Q. So, I think Mr. Schmidt, what we were just covering off before the technical issue was that Ms. Margaret Row, who is your mother in law, contacted you back in February of 2016?
A. Correct.
Q. All right. So, why don’t you just let us know;
what did she tell you that was the concern, and what did you decide to do?
A. Okay. So, I got a call in the early afternoon. Margaret reached out asking if she could discuss their website.I responded and we started to talk about it, and she indicated that there was some concern that material from their website, or from - sensitive material had been accessed
Q. You – in the past – okay, first of all, I don’t think
if you explained, or if you did I don’t remember, you mentioned
WordPress, what’s WordPress?
A. WordPress is something called a content management
system. It is a piece of software that runs on a web server that
people can use to create a website.
Q. Okay.
A. Okay? It’s the most commonly used such tool on the
internet. It commands, I think, thirty five percent of all
internet websites use WordPress.
Q. And, back in February- sorry, yes, February to April
2016, Family and Child Services was using WordPress?
PAGE 103/4
Q. Okay. In the background, the website has to save all
the documents – or the webmaster has to save the documents
somewhere?
A. Correct.
Q. They are saved in the directory?
A. Correct.
Q. Now, if this was properly set up you would have a
directory for the non-confidential information to the public
stuff?
A. Yes.
Q. And, you would have a directory for the confidential
information?
A. Correct.
Q. And, they’d be separate?
A. Yes.
Q. Okay. In this case they were not?
A. That is correct.
Q. Okay. And, if you were going to have a directory for
confidential information, one; it would be password protected?
A. Absolutely.
Q. It would be non-browseable?
A. Correct.
Q. And, nothing in it would be non-confidential?
A. Correct.
Q. Right
A. Unless, unless you were – so, for example, in the case
of a Board Portal, you might have a non-confidential document a
board member could see.
Q. That’s the thing...
A. But, realistically you would want a segregation
between that which should be public, and that which should not be
public.
Q. And, all those things that I listed, all of those
things did not occur back in 2016 when you were retained?
A. That is, that is correct.
105/6
Q. All lot of the time, or some times when information
gets out it gets out because someone has done something – I’m
going to call it dishonest, or nefarious...
A. Mm-hmm.
Q. And, what I mean by that is this, I will define it for
you; it’s like hacking. So, for example, you download a program,
or use certain code, or you do something to get past a username
and a password.
A. Breaching passwords, finding an exploit, or something
like that, yeah.
Q. Right. But, it requires, one; a certain level of
knowledge, right?
A. Mm-hmm.
Q. Yes.
A. Yes.
Q. I know you are nodding, but...
A. Sorry, yes. For the record, yes.
Q. And two; it would require excessive knowledge of a
certain amount of dishonesty on your part to try and get past a
username and password that is clearly intended to block you?
A. Dishonesty, interest in what’s behind it, yes,
absolutely.
Q. I’m not talking from a moral sense...
A. Yep.
Q. ...I’m talking from a computer sense, you are trying
to get past something that’s intended to stop you?
A. That’s intended not to be, not to be accessed, yeah.
Q. Right. In this case the directory had no password,
nothing in it was intended to stop you from getting to it?
A. That’s correct.
PAGE 107
Q. Right. It doesn’t require a special knowledge to use
WordPress?
A. Not particularly.
Q. Right. And, because of that, it’s not actually, as
it’s set out by default, not intended for confidential documents
at all?
A. I guess not.
Q. Well, and the reason I say this is from what you said
which is that by default it has a browseable directory...
A. Yep, absolutely.
Q. ...that you could go to that doesn’t lock. So, by
default, a logical inference is, if you have a directory that’s
browseable where you can get to every document with no password,
that’s the default settings.
A. Absolutely.
Q. By default, it is not intended for confidential
documents?
A. That is true.
From the cross examination Of D. Schmidt:
Q. All right. So, I want to go back to 2016, just in the very beginning, okay? They have a website, okay? There is a website that is intended for the public?
A. Correct.
Q. Correct. On that website there is various public documents, like, forms, things that the public would need?
A. That’s correct.
Q. Okay. There is also a Board Portal?
A. Yes.
Q. And, the Board Portal requires a username and password?
A. Correct.
Q. Okay. And, that’s the front end of what a user sees when they go to fcsllg.ca or .com?
A. Correct.
Q. Okay. In the background, the website has to save all the documents
– or the webmaster has to save the documents somewhere?
A. Correct.
Q. They are saved in the directory?
A. Correct.
-104-
Q. Now, if this was properly set up you would have a directory for the non-confidential information to the publicstuff?
A. Yes.
Q. And, you would have a directory for the confidential information?
A. Correct.
Q. And, they’d be separate?
A. Yes.
Q. Okay. In this case they were not?
A. That is correct.
Q. Okay. And, if you were going to have a directory for confidential information, one; it would be password protected?
A. Absolutely.
Q. It would be non-browseable?
A. Correct.
Q. And, nothing in it would be non-confidential?
A. Correct.
Q. Right
A. Unless, unless you were – so, for example, in the case of a Board Portal, you might have a non-confidential document aboard member could see.
Q. That’s the thing...
A. But, realistically you would want a segregation between that which should be public, and that which should not be public.
Q. And, all those things that I listed, all of those things did not occur back in 2016 when you were retained?
A. That is, that is correct.
Q. ...etcetera. When you were retained in February you made a list of all of the problems with the website, right?
A. Yes.
Q. Okay. So, I am going to go through that list with you, okay?
A. Absolutely.
Q. So, number one; if you are going to put confidential information, like a Board Portal, the most secure way to do it is you don’t even put it online. You put it in an intranet system,like an internal system...
A. Absolutely, that’s right.
Q. Sorry, just let me finish...
A. Sorry.
Q. ...because the transcript becomes really difficult to follow. So, there is an intranet, an internal system, yes?
A. Yes.
Q. And, you then use what’s called a V.P.N to access that intranet if you are not on that network, right?
A. Yes.
Q. So, for example, the intranet would be accessible from your work place only?
A. Typically, yes.
Q. And, if you wanted access from home the board members would then have access via a V.P.N., yes?
A. Correct.
Q. Which requires a username and password, yes?
A. Yes.Q. To get in?
A. Yes.
Q. That’s the most secure?
A. That is.
-110-
Q. Very difficult to hack?
A. Correct.
Q. You don’t come into any of these problems, right?
A. Correct
Q. And, it is very clear, this is confidential, no one can get into it?
A. Absolutely.
Q. Okay. If you are one step worse than that, which is not quite as secure...
A. Yep.
Q. You are going to put it on its own separate website,yes?
A. Yes.
Q. Aside from non-confidential information?
A. Correct.
Q. You are going to require a username and password?
A. For everything.
Q. Well. So the one, you are going to require a username and password for the website?
A. Correct.
Q. Then, you will make sure that the directory is not browseable?
A. Correct.
Q. Then, you would make the documents password protected in the event that for some reason something went wrong, it makes it very clear that you can’t get here?
A. Yes, that is correct.
Q. None of those things happened in this case?
A. My understanding is that you are right.
Q. Right. We are here for your understanding.
READ THE COMPLETE TRIAL TRANSCRIPT HERE: https://www.kelleyandderek.com/
:::
THE FINAL DEFENSE SUBMISSIONS."
Part One: https://www.facebook.com/FamiliesUnitedOntario/photos/a.421920498017720/1244397172436711/
Part Two: https://www.facebook.com/FamiliesUnitedOntario/photos/a.421920498017720/1244397722436656/
Part Three:
https://www.facebook.com/FamiliesUnitedOntario/photos/a.421920498017720/1244398162436612/
Part Four:
https://www.facebook.com/FamiliesUnitedOntario/photos/a.421920498017720/1244398895769872/
2019 Trial Transcript Included Here:
https://www.unpublishedottawa.com/letter/247562/alleged-ontario-cas-hacker-trial-update-190814
:::
Decision in alleged Ontario CAS hacker case delayed until May 20/2020.
The defence argued what Denham did does not constitute publishing. They say the publication occurred when the agency put the information on its website, which they say was accessible to the anybody in the public sphere.
“All she did was tell people they (FCS) published it,” defense lawyer Fady Mansour told the judge on Thursday.
“Reiterating is not publishing.”
They said if anybody has committed an offence, it was FCS since they were the ones that published it originally.
The Crown argued that FCS had no intent to publish the information and that it was always their goal to keep it private.
“They did not publish. It was always their intention to keep it private,” Crown attorney Roberto Corbella said.
“They made a mistake. They did not intend to publish this material and it was not published by them.”
The defence lawyers argued, however, that it doesn’t matter if they intended to publish it, it just matters if they did.
The data could have been reached by anybody, the defence claimed.
They argued simply putting something on Facebook does not constitute publishing, but the Crown said it “makes no sense” to suggest that.
If posting something to Facebook isn’t publishing, nothing is, Corbella said.
---
2011: Hyperlinks not considered ‘publications,’ rules Supreme Court
“A hyperlink, by itself, should never be seen as 'publication' of the content to which it refers. When a person follows a hyperlink to a secondary source that contains defamatory words, the actual creator or poster of the defamatory words in the secondary material is the person who is publishing the libel.
At both the trial and appellate level, the courts ruled the hyperlinks did not constitute publication of the impugned content.
Abella notes in her analysis that hyperlinks are essentially references. “Hyperlinks thus share the same relationship with the content to which they refer as do references. Both communicate that something exists, but do not, by themselves, communicate its content,” she writes.
https://www.canadianlawyermag.com/news/general/hyperlinks-not-considered-publications-rules-supreme-court/271051
---
A lawyer should not express personal opinions or beliefs or assert as a fact anything that is properly subject to legal proof, cross-examination, or challenge.
When engaged as a prosecutor, the lawyer's prime duty is not to seek to convict but to see that justice is done through a fair trial on the merits. The prosecutor exercises a public function involving much discretion and power and must act fairly and dispassionately. The prosecutor should not do anything that might prevent the accused from being represented by counsel or communicating with counsel and, to the extent required by law and accepted practice, should make timely disclosure to defence counsel or directly to an unrepresented accused of all relevant and known facts and witnesses, whether tending to show guilt or innocence.
Knowingly attempt to deceive a tribunal or influence the course of justice by offering false evidence, misstating facts or law, presenting or relying upon a false or deceptive affidavit, suppressing what ought to be disclosed, or otherwise assisting in any fraud, crime, or illegal conduct.
Knowingly misstate the contents of a document, the testimony of a witness, the substance of an argument, or the provisions of a statute or like authority.
Knowingly assert as true a fact when its truth cannot reasonably be supported by the evidence or as a matter of which notice may be taken by the tribunal.
https://lso.ca/about-lso/legislation-rules/rules-of-professional-conduct/complete-rules-of-professional-conduct
:::
M.M. v. Lanark, Leeds and Grenville Children’s Aid Society, 2018 ONSC 5032 (CanLII)
[6] Now before the court are several motions for a diverse mix of procedural and evidentiary orders.
a. M.M. seeks to discontinue her action against Ms. Denham.
b. The Society, which, as noted above, had crossclaimed against Ms. Denham, seeks an Order converting its Crossclaim into a Third Party Claim and converting Ms Denham’s Crossclaim into a Counterclaim in the Third Party Action.
c. The Society seeks an Order that the Third Party Action including its Counterclaim be case managed in Toronto as a part of the class action and be tried together with or immediately following the class action.
d. The Society seeks a sealing order. The sealing Order is said to be required to address confidentiality concerns arising because of s. 87 (8) of the Child Youth and Family Services Act, 2017[3] and s.70(1) of the Children's Law Reform Act.[4]
e. Ms. Denham does not oppose the continuation of the crossclaims within a Third Party Action, but she opposes the request for case management in Toronto and asks the court to transfer the Third Party Action to Perth, where she lives and where apparently she will have a lawyer prepared to act for her in defending the Third Party Action and in prosecuting her Counterclaim.
[7] The request for a sealing order, which was not opposed, should be granted.
https://www.canlii.org/en/on/onsc/doc/2018/2018onsc5032/2018onsc5032.html
:::
According to a separate class-action lawsuit against FCS still before the courts, the personal information of the 285 clients was compiled into an electronic file, prepared for the service’s board of directors on new cases arising between April and November of 2015, but was not properly secured on the agency’s network.
According to court records relating to the civil suit against FCS, Denham said she found and clicked on an unrelated document on the website intended for the public. She deleted a portion of the URL, and she was taken to a directory of folders with documents, within which she found the document with the names of local families.
She said she was never asked a user name or password and was never faced with any security measures that impeded her ability to gain access to the documents.
She said she attempted multiple times to advise the agency the confidential documents were available on the public website, beginning in February 2016, but the documents were still publicly available by late April 2016.
This is when she decided to post the location of the report on the Facebook group where she claims she posted an image of a hyperlink, which was deleted by the group’s administrator within hours.
She did not hack any secure portals, she said, rather the site was completely unsecured and she was able to get to the files unimpeded.
Denham has since been dropped as a defendant in the civil case.
https://www.recorder.ca/news/local-news/decision-in-fcs-breach-expected-next-month
:::
A content management system is a software application that can be used to manage the creation and modification of digital content. CMSs are typically used for enterprise content management and web content management. Wikipedia
2019: 5 INDISPENSABLE TIPS TO KEEP YOUR BUSINESS SECURE ONLINE
Regardless of the size of your business, you will need to take the necessary steps to ensure its safety and security online. The consequences related to a lapse in security or data breaches can break businesses in the long run.
Consider the fact that all associated stakeholders will lose faith in such a business, for which reason it is even more important to keep your business secure online at all costs. If you are looking for ways to make this possible, the following five tips will do just that.
Stay Clear from Malware
Just like you would never want to leave the backdoor to your home unlocked at night, you will not want to leave your business open to cybercriminals. To make this possible, you will need to secure every computer.
Malware is designed to damage or infiltrate a network PC without your consent or knowledge. To protect your business from malware of any kind, here is what you will need to do:
Turn on the onboard firewall on your router. It is not entirely enough to deal with malware, but it will act as your first line of defense.
Get the best security software programs for all your PCs. It would be best if you spent more than expected, but it will be worth every penny.
Employ good security that will automatically adjust itself according to the device being used. The level of protection should change depending on whether or not they are in the office.
Get antispam protection to get rid of unwanted email. It will block distractions and risks for employees, all the while preventing malware from getting into systems.
Tackle Social Media Effectively
In this day and age, the importance of social media cannot be denied. It is here to stay, so you will need to empower your employees regarding guidelines and the best practices they need to adhere to while using social media platforms.
Instead of just anyone, assign an individual or individuals that will speak for your business. Make them responsible for writing about external and internal events.
In your security policy, do not forget to include social media sites like LinkedIn, Twitter, Facebook, and others. The non-disclosure agreement will ensure that confidential information remains intact.
While using any social media platform, be smart:
Only publish the information you are confident about.
No matter what you have in mind, always prepare for the worst, it will save you from many problems later on.
To expand your contact list, don’t just add anyone. Only add people you trust.
Avoid clicking on links from unknown contacts.
Ensure Usage of Strong Passwords
Passwords are vital for business networks, as they prevent unauthorized access to your data. To decrease the chances of success for hackers, cybercriminals and third party agencies, use stronger passwords by incorporating more characters and keystrokes.
Use passwords with at least a minimum of eight characters, not excluding numbers. This will stop simple attacks dead in their tracks. However, do not stop there; request password changes frequently. To ensure employees are changing their password more often than not, time out old passwords.
It is important to note that your employees may even need to be educated about some malpractices while dealing with passwords. Discourage them from writing down passwords, or using guessable passwords that could put your business at high risk.
Be Critical about Internet Security
The latest security threats can be dealt with using top-notch security solutions. Your employees will not think about security nor will they restrict themselves from accessing the internet or the network. To make things easier for them, make security transparent and automate updates.
Apart from providing a guideline for web use, adopt solutions that prevent unacceptable use. One way of making this possible is by using URL filtering to block unproductive or risky sites.
Develop a BYOD Plan
Employees bringing their own devices to work (BYOD) can also put your business at risk. To handle BYOD risks, you will need to develop a BYOD plan. It will serve as a safety net against mobile system costs and legal repercussions. You will need to draft a customizable, clear and comprehensive BYOD policy that covers subjects like location tracking, internet monitoring issues, and data deletion.
To lessen probable pitfalls, anticipate employee usage of mobile devices. Mobile device management solutions and virtualization are effective in controlling access and network bandwidth for employees.
Most businesses adopt the BYOD trend to increase overall productivity, but very few take the time to assess whether the trends if worth their investment. Keeping this in mind, you will have to monitor your use of BYOD to prevent future device security lapses and justify its deployment.
These are just a few of many ways you can go about ensuring your business is secure online. If you want to take things up a notch, you should also consider getting a Business VPN.
With the help of a business VPN, employees can be given new IP addresses, thus masking their original ones. Since their internet traffic will be hidden and encrypted, it is highly unlikely they will be compromised or attacked. At the same time, they will not have to worry about private and confidential information being monitored or recorded by surveillance agencies, or even ISPs for that matter.
Of course, there is more to online security for businesses than meets the eye. What is important is that companies realize that they will need to adapt if they wish to survive. These days, the measure of success for a business is based on factors like internet security, client confidentiality and so on. Believe it or not, it could also give companies the edge they need to stay ahead of their competition.
Remember, all of this will only work if you take the lead. Lead by example so that others follow you without hesitation. Don’t be the reckless one, and if you do come across a way that will improve the overall online security of your business, be sure to let other people know as well. ELISA COLLINS.
Elisa Collins is a tech professional who loves to write on cyber-security related topics. She is currently associated with Ivacy.com as a content strategist and digital content production head.
https://www.colocationamerica.com/blog/5-tips-for-a-secure-business
:::
QuickSilk provides a sensible, solution for developing and maintaining your own secure content management system. Trusted since 2010.
Traditionally, when selecting a content management system (CMS), agencies and organizations like Ontario's Family and Children’s Services of Lanark, Leeds and Grenville have compromise their voluntary, involuntary and suspected clients confidential information security for the simplicity and affordability of Wordpress and it's 14 000 known vulnerabilities.
QuickSilk says, “No more compromising!”
“We’ve been using QuickSilk for a few years and keep acquiring new licenses because it keeps delivering a solid return on investment for us and our clients.”
Sahir Khan
Executive Vice President, IFSD, University of Ottawa
"With QuickSilk we enjoy excellent value and a secure solution that meets our needs today and is scalable for the future. Using their easy ‘drag & drop’ CMS means that our staff team is in control of our website in a way we never thought possible."
Michael Brennan
Executive Director, Canadian Association of Management Consultants
“According to our testers, QuickSilk did a great job with security best practices ......other areas they excelled in included output encoding and configuration management for their web server."
Marc Punzirudu
Vice President of Security Consulting Services, ControlScan
“As a creative branding, marketing and design agency QuickSilk is a game‑changing CMS for us. We are able to quickly design and deploy robust websites that our clients can easily update and maintain on their own.”
Nadine Buckley
Partner, McGill Buckley
https://youtu.be/xw30JU-bY6U
QuickSilk’s CMS provides the drag and drop simplicity of easy-to-use website builders with unrivaled security, at a lower total cost of ownership (TCO) than WordPress, Joomla, and Drupal.
Our simple-to-use drag and drop interface eliminates the need to hire a website designer or developer, and our website monitoring - 24 hours a day, 365 days a year, software updates, and maintenance, eliminates worries about website up-time and security.
Drag, Drop & Deploy
QuickSilk takes the challenge out of website development. Our product is so simple to use, people without website development experience can build, maintain, and update a world-class website. With QuickSilk, you are no longer challenged by technology or access to skilled professionals and resources.
https://www.quicksilk.com/
:::
Here are the top 5 reasons for which you shouldn’t opt for a WordPress site if your part of a government funded multi-billion dollar private corporation with a legal obligation to protect client information:
Website builders are a perfect solution for - individuals and small businesses - to start a website without hiring a developer. However, finding the best website builder can be tricky for beginners.
WordPress is an open source software. It is free in the sense of freedom not in the sense of free beer. ... Open source software comes with the freedom for you to use, modify, build upon, and redistribute the software in any way you like without paying any fees.
What are the disadvantages of using WordPress?
WordPress is the most popular content management system. This fact alone makes WordPress a prime target for hackers everywhere. As a matter of fact, according to a Sucuri report WordPress is the most hacked CMS platform worldwide. (Talk about putting children and clients at risk...)
Disadvantages of A WordPress Website.
Without a doubt, WordPress is the most used Content management system (CMS) in the world. With millions of users, it is widely praised and appreciated for its advantages. But, while the hype is still strong, many people overlook or are not aware that WordPress has certain weak points that might make them reconsider their decisions or options.
1. Vulnerability
Unquestionably the biggest disadvantage of WordPress is its security. WordPress is an Open Source platform, and it relies heavily on plugins and themes for customization. Both the plugins and the themes are developed by different people and companies and since there isn’t anyone monitoring them, they can easily contain bugs or malicious code lines. On top of this, as stated above, today, WordPress is the most popular content management system. This fact alone makes WordPress a prime target for hackers everywhere. As a matter of fact, according to a Sucuri report WordPress is the most hacked CMS platform worldwide.
2. Can be expensive
While the WordPress itself is free, when looking at the whole picture there are significant costs. WordPress relies on plugins and themes for customization, and while there are some that are free, they are not always reliable or safe. Furthermore, if you want your website to stand out and your visitors to have a great you have to buy a theme, as the free ones are overused. With numerous updates coming out constantly, it can become quite expensive to keep your website up to date. Naturally, if you’re a WordPress designer, or have the knowledge you can make a lot of adjustments yourself, but most people need to use a plugin or a well-developed theme.
3. Needs frequent updates
Simply installing WordPress, is going to help you very much as this platform requires a theme and at least several plugins to work properly. WordPress updates can often render parts of your theme or some plugins usable. The more plugins you use, the more likely it is for you to encounter more compatibility problems. The whole maintenance process in WordPress can be quite challenging, and you have to be ready to make adjustments to your plugins and theme in order to have a functional website. If you don’t have the budget or the knowledge (design, programming), giving the fact that in general WordPress doesn’t offer support, and solutions can only be found on WordPress forums, chances are that you should choose another website solution for you.
4. SEO friendliness
WordPress is definitely an SEO friendly platform, but so is virtually any open source CMS. However, for the people with little to no SEO experience and knowledge, WordPress can create quite a few problems. Probably the most known one is caused by the WordPress’ category and tagging system. If the content is over-tagged or marked into many categories, Google will flag it as duplicate content, a fact that will affect your SEO rankings.
5. Customization needs Coding
To make certain change your WordPress site, you have to possess HTML, CSS and PHP knowledge. If you want to personalize in a unique way, or to enhance its design, you may find yourself needing to write numerous complicated code lines. If you’re in the category of people which possess the knowledge, things can go down smoothly, but if you try to write code without having the right expertise — most people in this category, you can make a lot of damage to your website.
https://www.websitetooltester.com/en/blog/wordpress-alternatives/
https://www.wpbeginner.com/beginners-guide/how-to-choose-the-best-website-builder/
:::
IS THERE ANYWAY TO USE WORDPRESS AND GUARANTEE THE INTEGRITY OF THE SECURITY USED BY THE FREE PROGRAM/APP AND WHAT DOES PROPER INTERNET SECURITY ACTUALLY LOOK LIKE?
The ISG Series Integrated Security Gateways.
(estimated cost $40 000 AND UP)
The ISG Series Integrated Security Gateways are ideally suited for securing enterprise, carrier, and data center environments where advanced applications, such as VoIP and streaming media, demand consistent, scalable performance. The Juniper Networks ISG1000 and ISG2000 Integrated Security Gateways are purpose-built security solutions that leverage a fourth-generation security ASIC, along with high speed microprocessors to deliver unmatched firewall and VPN performance. Integrating best-inclass firewall, VPN, and optional Intrusion Detection and Prevention, the ISG1000 and ISG2000 enable secure, reliable connectivity along with network-and application-level protection for critical, high-traffic network segments.
Network segmentation: Security zones, virtual systems, virtual LANS and virtual routers allow administrators to deploy security policies to isolate guests and regional servers or databases.
Optional Integrated IDP:
The ISG Series firewall/VPN with IDP uses the same award-winning software found on Juniper Networks IDP Series appliances.
The IDP security module combines eight detection mechanisms, including stateful signatures and protocol anomaly detection.
The ISG with IDP defends against security threats such as worms, trojans, malware, spyware, unauthorized users and hackers and can provide information on rogue servers and data on applications and operating systems that were inadvertently added to the network. Application signatures enable administrators to maintain compliance and enforce corporate business policies with accurate detection of application traffic.
https://www.terabitsystems.com/juniper/integrated-security-gateways/ns-isg-2000-sk1
https://netpoint-dc.com/blog/wp-content/uploads/2015/11/1100036-en.pdf
Wednesday, January 15, 2020
The autopsy (part 1): What if justice got it wrong? - The Fifth Estate
2016: Dr. Charles Smith, Ex-Forensic Pathologist, Left Trail Of Wrongful Convictions (but was that all he did?).
Dr. Charles Smith stopped practising in 2008 and was finally stripped of his medical licence in 2011.
Colin Perkel, The Canadian PressCP
TORONTO — The trail of devastation left by a once acclaimed forensic pathologist wound its way yet again through Ontario's top court Monday with the exoneration of a mother wrongly convicted of manslaughter on the basis of his evidence.
The brief hearing, which set aside Maria Shepherd's guilty plea in the death of her three-year-old stepdaughter in 1991, came after Crown and defence said Dr. Charles Smith had made numerous errors in the case.
"Charles Smith was like a god," Shepherd said in explaining her plea. "Who am I? I'm just a little person."
Smith was once Ontario's highly regarded chief forensic pathologist. His opinions on the causes of death, considered unassailable, were frequently the underpinning of convictions that, like Shepherd's, were ultimately found to have been a miscarriage of justice.
https://www.huffingtonpost.ca/2016/02/29/like-a-god-dr-charles-smith-left-poisoned-trail-behind-him_n_9350124.html
:::
Dr. Smith often found innocent parents or guardians guilty of harming or causing the deaths of children in or having some contact with Ontario's child welfare system when they were available to place the blame on while never finding any reason to be suspicious or concerned about the large number of deaths in group homes or other official facilities for children labeled "difficult or violent."
What Role Did Disgraced Pathologist Charles Randal Smith Play In Ontario's Deaths Under Five Committee.?
He was the founder and head of the PDRC from its inception and implantation.
Dr. Charles Randal Smith was long regarded as one of Canada's best in forensic child pathology. A public inquiry was called after an Ontario coroner's inquiry questioned Smith's conclusions in 20 of 45 child autopsies.
https://www.thestar.com/news/gta/2019/08/23/province-orders-childrens-aid-societies-to-review-credentials-of-experts-used-in-child-welfare-cases.html
In the wake of calls for an independent review should the Ontario government order all children's aid societies to immediately review the credentials of all experts throughout the child welfare system or should the police open an investigation??
Maybe the review (or investigation) should cover the all the experts employed by the CAS over the last two decades.
https://www.thepeterboroughexaminer.com/news-story/9565809-province-orders-cas-to-review-credentials-of-experts/
In 1992, the Ontario Coroner's Office created a pediatric forensic pathology unit at Hospital for Sick Children and Smith was appointed director. He had become almost solely responsible for investigating suspicious child deaths in Ontario.
In this period he conducted hundreds of autopsies and testified in court multiple times. He conducted training sessions for lawyers on how to examine and cross-examine expert witnesses, and training for law-enforcement and medical staff on detecting child abuse.[5]
While at Sick Children's Hospital, Smith lived on a farm in Newmarket. His marriage collapsed around the time that his pathology work at Sick Children's received heavy scrutiny.[4] Smith was briefly relocated to Saskatoon and since 2007, he has lived in Victoria, British Columbia, with partner Dr. Bonnie Leadbeater, director of the Centre for Youth and Society at the University of Victoria.
In 1999, a Fifth Estate documentary singled him out as one of four Canadians with this rare expertise.
For more than a decade, Mr. Smith enjoyed a stellar reputation as the country's leading pathologist when it came to infant deaths giving lectures to law enforcement, medical students and other coroners. Several complaints about his work had little effect.
A 2008 inquiry on Smith’s work condemned his “flawed approach” and noted the he “lacked the requisite training and qualifications” to work as pediatric forensic pathologist.
Smith’s findings had helped convict more than a dozen people, some of whom spent years in prison and lost access to their children.
For 24 years, Smith worked at Toronto's Hospital for Sick Children. In the hospital's pediatric forensic pathology unit, he conducted more than 1,000 child autopsies.
But Smith no longer practices pathology. An Ontario coroner's inquiry reviewed 45 child autopsies in which Smith had concluded the cause of death was either homicide or criminally suspicious.
The coroner's review found that Smith made questionable conclusions of foul play in 20 of the cases — 13 of which had resulted in criminal convictions. After the review's findings were made public in April 2007, Ontario's government ordered a public inquiry into the doctor's practices.
That inquiry, led by Justice Stephen Goudge and concluding in October 2008, found that Smith "actively misled" his superiors, "made false and misleading statements" in court and exaggerated his expertise in trials.
Far from an expert in forensic child pathology, "Smith lacked basic knowledge about forensic pathology," wrote Goudge in the inquiry report.
"Smith was adamant that his failings were never intentional," Goudge wrote. "I simply cannot accept such a sweeping attempt to escape moral responsibility."
"Dr. Smith expressed opinions ... that were either contrary to, or not supported by, the evidence," Ms. Silver told the hearing Tuesday, reading from an agreed statement of facts.
Smith had been in search of his own personal truths. He was born in a Toronto Salvation Army hospital where he was put up for adoption three months later. After years of looking for his biological mother, he called her on her 65th birthday. But she refused to take his call.
Smith's adoptive family moved often. His father's job in the Canadian Forces took them throughout Canada and to Germany. He attended high school in Ottawa, and graduated from medical school at the University of Saskatchewan in 1975.
https://www.theglobeandmail.com/news/national/disgraced-pathologist-charles-smith-stripped-of-medical-licence/article578634/
https://www.tvo.org/article/death-in-the-family-the-story-of-disgraced-doctor-charles-smith-and-the-families-he-destroyed
:::
Workers found human tissue in disgraced pathologist's office, inquiry told
Tom Blackwell, CanWest News Service Published: Monday, December 17, 2007
TORONTO - A secretary who worked alongside Dr. Charles (The Ghoul) Smith for years says she found a bag of dried human tissue, a dish containing bones and a child's hospital bracelet during one of her frequent searches of the pathologist's ramshackle office.
Maxine Johnson, an administrative co-ordinator at Sick Children's Hospital, told a public inquiry on Monday she once had pictures taken of the chronically messy office to try to prod Smith to keep his quarters neater. It did not work, she said.
It was during a 2005 audit of tissue samples requested by the chief coroner's office that Johnson and a colleague made the unusual discoveries in the pathologist's room.
"We found some dried-out tissue in plastic bags ... skeletal bones in another little dish," she said.
As well, they discovered a bead bracelet of the kind given to young patients at hospital.
https://www.tapatalk.com/groups/porchlightcanada/dr-charles-smith-inquiry-t2479.html
Sunday, January 12, 2020
The Sackler Family – A Secretive Billion Dollar Opioid Empire
2014: Use of 'behaviour-altering' drugs widespread in foster, group homes.
In almost half of children and youth in foster and group home care aged 5 to 17 — 48.6 per cent — are on drugs, such as Ritalin, tranquilizers and anticonvulsants, according to a yearly survey conducted for the provincial government and the Ontario Association of Children’s Aid Societies (OACAS). At ages 16 and 17, fully 57 per cent are on these medications.
https://www.thestar.com/news/canada/2014/12/12/use_of_behaviouraltering_drugs_widespread_in_foster_group_homes.html
:::
2010: Psychologist got degree from U.S. 'diploma mill'
A psychologist with the Durham Children’s Aid Society has pleaded guilty to professional misconduct for misrepresenting himself and for making multiple unqualified diagnoses of mental illness.
Gregory Carter, 63, appeared before the College of Psychologists of Ontario’s disciplinary committee on Tuesday. He and the college agreed on the terms of the penalty, which includes a three-month suspension, a recorded reprimand and one year of supervised practice under an approved practitioner.
In his practice with the Children’s Aid Society, Mr. Carter’s expertise was used to determine child custody cases.
https://nationalpost.com/posted-toronto/psychologist-got-degree-from-u-s-diploma-mill
:::
2012: ADHD drugs suspected of hurting Canadian kids.
https://www.thestar.com/news/canada/2012/09/26/adhd_drugs_suspected_of_hurting_canadian_kids.html
:::
PDRC:
Between 2008/2012 natural causes was listed as the least likely way for a child in care to die at 7% of the total deaths reviewed while "undetermined cause" was listed as the leading cause of death of children in Ontario's child protection system at only 43% of the total deaths reviewed.
92 children equals 43% of the deaths reviewed by the PDRC. 92 mystery deaths and like every other year no further action was taken to determine the cause...
http://www.mcscs.jus.gov.on.ca/sites/default/files/content/mcscs/images/195633-19.jpg
http://www.mcscs.jus.gov.on.ca/english/DeathInvestigations/office_coroner/PublicationsandReports/PDRC/2013Report/PDRC_2013.html (REDACTED?)
:::
2009: Ninety children known to Ontario's child welfare system died in 2007, according to the latest report from the chief coroner's office – a number the province's new child advocate says is shocking and should trouble us all.
https://www.thestar.com/life/health_wellness/2009/02/23/why_did_90_children_die.html
:::
2007: Nearly half of children in Crown care are medicated.
The researchers have found that not only were psychotropic drugs prescribed to a clear majority of the current and former wards interviewed, but most were diagnosed with mental-health disorders by a family doctor, never visited a child psychiatrist or another doctor for a second opinion, and doubted the accuracy of their diagnosis.
A disturbing number, the network's research director, Yolanda Lambe, added, have traded the child-welfare system for a life on the street.
"A lot of people are using drugs now," she said. "There's a lot of homeless young people who have been medicated quite heavily."
https://www.theglobeandmail.com/news/national/nearly-half-of-children-in-crown-care-are-medicated/article687480/
:::
Standards of Care for the Administration of Psychotropic Medications to Children and Youth Living in Licensed Residential Settings.
Summary of Recommendations of the Ontario Expert Panel February 2009.
http://www.children.gov.on.ca/htdocs/English/documents/specialneeds/residential/summary_report.pdf
:::
What’s worse is that the number of children prescribed dangerous drugs is on the rise. Doctors seem to prescribe medication without being concerned with the side-effects.
Worldwide, 17 million children, some as young as five years old, are given a variety of different prescription drugs, including psychiatric drugs that are dangerous enough that regulatory agencies in Europe, Australia, and the US have issued warnings on the side effects that include suicidal thoughts and aggressive behavior.
According to Fight For Kids, an organization that “educates parents worldwide on the facts about today’s widespread practice of labeling children mentally ill and drugging them with heavy, mind-altering, psychiatric drugs,” says over 10 million children in the US are prescribed addictive stimulants, antidepressants and other psychotropic (mind-altering) drugs for alleged educational and behavioral problems.
In fact, according to Foundation for a Drug-Free World, every day, 2,500 youth (12 to 17) will abuse a prescription pain reliever for the first time (4). Even more frightening, prescription medications like depressants, opioids and antidepressants cause more overdose deaths (45 percent) than illicit drugs like cocaine, heroin, methamphetamines and amphetamines (39 percent) combined. Worldwide, prescription drugs are the 4th leading cause of death.
https://dailyhealthpost.com/common-prescription-drugs/
:::
2017: New study suggests link between foster care system and youth homelessness.
OTTAWA -- A first-of-its-kind study in Canada has painted a national picture of homeless youth and drawn a link to the foster care system that researchers say could be playing a more active role in keeping young people off the streets.
The study found nearly three out of every five homeless youth were part of the child welfare system at some point in their lives, a rate almost 200 times greater than that of the general population.
Of those with a history in the child welfare system, almost two of every five respondents eventually "aged out" of provincial or territorial care, losing access to the sort of support that could have kept them from becoming homeless, the study found.
https://www.ctvnews.ca/canada/new-study-suggests-link-between-foster-care-system-and-youth-homelessness-1.3538232
:::
2019: A new study, published in Psychiatry Research, has concluded that psychiatric diagnoses are scientifically worthless as tools to identify discrete mental health disorders. ... Psychiatric diagnoses all use different decision-making rules. There is a huge amount of overlap in symptoms between diagnoses.
The main findings of the research were:
Psychiatric diagnoses all use different decision-making rules
There is a huge amount of overlap in symptoms between diagnoses
Almost all diagnoses mask the role of trauma and adverse events
Diagnoses tell us little about the individual patient and what treatment they need
The authors conclude that diagnostic labelling represents 'a disingenuous categorical system'.
https://www.sciencedaily.com/releases/2019/07/190708131152.htm
:::
2019: Expert who gave more than 100 assessments in Ontario child protection cases lied about credentials for years, judge finds.
https://www.thestar.com/news/gta/2019/07/31/expert-who-gave-more-than-100-assessments-in-ontario-child-protection-cases-lied-about-credentials-for-years-judge-finds.html
:::
2019: Province orders children’s aid societies to review credentials of experts used in child welfare cases
https://www.thestar.com/news/gta/2019/08/23/province-orders-childrens-aid-societies-to-review-credentials-of-experts-used-in-child-welfare-cases.html
:::
Separating kids from parents a 'textbook strategy' of domestic abuse, experts say — and causes irreversible, lifelong damage even when there is no other choice.
“Being separated from parents or having inconsistent living conditions for long periods of time can create changes in thoughts and behavior patterns, and an increase in challenging behavior and stress-related physical symptoms,” such as sleep difficulty, nightmares, flashbacks, crying, and yelling says Amy van Schagen - California State University.
The Science Is Unequivocal: Separating Families Is Harmful to Children
In news stories and opinion pieces, psychological scientists are sharing evidence-based insight from decades of research demonstrating the harmful effects of separating parents and children.
In an op-ed in USA Today, Roberta Michnick Golinkoff (University of Delaware), Mary Dozier (University of Delaware), and Kathy Hirsh-Pasek (Temple University) write:
“Years of research are clear: Children need their parents to feel secure in the world, to explore and learn, and to grow strong emotionally.”
In a Washington Post op-ed, James Coan (University of Virginia) says:
“As a clinical psychologist and neuroscientist at the University of Virginia, I study how the brain transforms social connection into better mental and physical health. My research suggests that maintaining close ties to trusted loved ones is a vital buffer against the external stressors we all face. But not being an expert on how this affects children, I recently invited five internationally recognized developmental scientists to chat with me about the matter on a science podcast I host. As we discussed the border policy’s effect on the children ensnared by it, even I was surprised to learn just how damaging it is likely to be.”
Mia Smith-Bynum (University of Maryland) is quoted in The Cut:
“The science leads to the conclusion that the deprivation of caregiving produces a form of extreme suffering in children. Being separated from a parent isn’t just a trauma — it breaks the relationship that helps children cope with other traumas.
Forceful separation is particularly damaging, explains clinical psychologist Mia Smith-Bynum, a professor of family science at the University of Maryland, when parents feel there’s nothing in their power that can be done to get their child back.
For all the dislocation, strangeness and pain of being separated forcibly from parents, many children can and do recover, said Mary Dozier, a professor of child development at the University of Delaware. “Not all of them — some kids never recover,” Dr. Dozier said. “But I’ve been amazed at how well kids can do after institutionalization if they’re able to have responsive and nurturing care afterward.”
The effects of that harm may evolve over time, says Antonio Puente, a professor of psychology at the University of North Carolina, Wilmington who specializes in cultural neuropsychology. What may begin as acute emotional distress could reemerge later in life as PTSD, behavioral issues and other signs of lasting neuropsychological damage, he says.
“A parent is really in many ways an extension of the child’s biology as that child is developing,” Tottenham said. “That adult who’s routinely been there provides this enormous stress-buffering effect on a child’s brain at a time when we haven’t yet developed that for ourselves. They’re really one organism, in a way.” When the reliable buffering and guidance of a parent is suddenly withdrawn, the riot of learning that molds and shapes the brain can be short-circuited, she said.
In a story from the BBC, Jack Shonkoff (Harvard University) discusses evidence related to long-term impacts:
Jack P Shonkoff, director of the Harvard University Center on the Developing Child, says it is incorrect to assume that some of the youngest children removed from their parents’ care will be too young to remember and therefore relatively unharmed. “When that stress system stays activated for a significant period of time, it can have a wear and tear effect biologically.
:::
2019: More Canadian teens using over-the-counter drugs to overdose, data show. ERIN ANDERSSEN
The number of intentional overdoses involving common over-the-counter and prescription drugs has increased steeply among young people in the last decade, according to new data provided to The Globe and Mail by the Canadian Institute for Health Information.
The number of cases roughly doubled for children and teenagers in Alberta and Ontario, the two provinces for which data were available, in two categories of drugs that include over-the-counter painkiller medications and prescriptions for drugs such as antidepressants and sedatives, according to the CIHI data, which tracked emergency-department visits.
https://www.theglobeandmail.com/canada/article-canadian-teens-overdoses-painkillers-antidepressants-data/
Subscribe to:
Posts (Atom)