Human

now browsing by tag

 
 

#sextrafficking | Advocates say youth shelter in Truro would protect teens from human trafficking | #tinder | #pof | #match | romancescams | #scams

Source: National Cyber Security – Produced By Gregory Evans

The recent case of a man who was unlawfully at large in the Truro, N.S., area and allegedly committed dozens of sex and drug trafficking crimes against children shows the need for a local youth shelter is dire, says a youth advocate.

Michelle Rafuse, a volunteer who supports First Nations youth in court, said a shelter for young people would help prevent at-risk youth from becoming victims of violence and sexual exploitation.

“There’s no place for kids to go in Truro if they need a place to stay,” said Rafuse, who often allows homeless kids to stay at her own home.

“If they have no place to go, they end up in circumstances where they could get led down a path they don’t want to be on.”

Truro and the surrounding Colchester County do not have a youth shelter. The counties of Digby, Yarmouth, Shelburne, Pictou and Halifax all have youth shelters serving their areas.

Youth shelters are usually run by not-for-profit groups and are aimed at ending homelessness for people aged 16 to 24. The youth stay for several months and receive connections and support to help them get their lives on track.

Morgan MacDonald, 31, was living in Truro and unlawfully at large during the time he is alleged to have committed dozens of sex and drug trafficking crimes against children. He communicated over Facebook using the name Kaycee MacDonald, victims say. (CBC)

CBC News spoke to a 22-year-old Indigenous man who said he spent the last several years homeless in Truro. He said he used to walk around the town at night messaging friends and asking for a place to stay, often crashing at the homes of friends on their laundry room floors. If he couldn’t find a place to stay, he kept walking.

“It was weird sleeping outside, so I just stayed awake,” said the young man, who recently found housing because a member of the community offered up her home. “There’s a lot of people in the same boat. There’s a pretty big need for it.”

CBC News is not identifying the man because he has been a participant in the youth criminal justice system, involved in break and enters, which he said he did to get money to support himself. He said he wouldn’t have committed those crimes had he not been so desperate and had a safe home.

He said his troubles started in his teens when his relationship with his father turned volatile. Upset about the fighting, he failed to turn up at his job baking cookies and bread at a local bakery. After losing the job, he said he was kicked out of the house because he could no longer pay the rent.

Truro has emergency shelter, but it’s not just for youth

Truro has a youth centre, which has been closed due to COVID-19, but it’s only open during the day. There is also an overnight emergency shelter open to youth over the age of 16.

Truro, with its population of 12,500 is a hub town, a crossroads where the Trans-Canada Highway joins from three different directions. The town is next door to the Millbrook First Nation, a Mi’kmaw community with many members living off-reserve. 

A 2018 Statistics Canada study found Nova Scotia had the highest rate of human trafficking in the country in 2016.

Joe Pinto, a local developer and businessman, said he’s noticed the growing issue of youth homelessness in Truro.

“There seems to be a lot of kids that the parents are not available to look after them or they’re just on the street, couch-surfing, going from place to place. I feel that there’s a need to house them and give them a bit of guidance,” he said. 

Pinto said he has space available in downtown Truro for a youth shelter if a community group is interested.

Social services and housing are provincial responsibilities. In a joint statement, the Department of Community Services and the Department of Municipal Affairs and Housing described having a place to live as an important piece of the complex problem of human trafficking.

To propose a youth shelter for the town, a community group would first have to submit a proposal, which could include a request for funding, to Nova Scotia’s Department of Municipal Affairs and Housing. So far, no such proposal has come forward.

What the province says it’s doing

The Nova Scotia government earmarked $1.4 million in new funding to combat human trafficking, some of which is trickling down to Truro. In the town, there is one housing support worker and a trustee who can help at-risk youth find secure, stable housing. The province said rent subsidies are available and the Truro Homeless Outreach Society can also connect people to safe and affordable housing.

Truro Mayor Bill Mills said he’s open to the idea of a youth shelter, but it’s going to be a tough sell right now to get funding from the municipality because everyone is being stretched.

“On the surface, if we could pull this off and have a youth shelter and the right people in place… sure, why not,” he said, adding that a letter to council would be the first step.

.  .  .  .  .  .  . .  .  .  .  .  .  .  .  .  .   .   .   .    .    .   .   .   .   .   .  .   .   .   .  .  .   .  .

Source link

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

The post #sextrafficking | Advocates say youth shelter in Truro would protect teens from human trafficking | #tinder | #pof | #match | romancescams | #scams appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | #hackerspace | Coronavirus: The Unexpected Human Element at RSA Conference 2020

Source: National Cyber Security – Produced By Gregory Evans

It was Sunday, February 23, 2020, and I was packing my bags for an early morning flight from Detroit to San Francisco for another week at an RSA Conference covering all things related to cybersecurity. The conference theme this year was “The Human Element,” which became an ironic choice of words.

While reading-up on the best sessions, pre-conference news and other hot cyber headlines, I noticed that several large companies had pulled out of the conference because of coronavirus fears.  

Here’s an excerpt from the Business Insider article that grabbed my attention: “Verizon pulled out of the RSA Conference on Friday, joining competitor AT&T and IBM as large sponsors with coronavirus concerns abandon the cybersecurity trade show that was expected to draw more than 40,000 to San Francisco next week. …”

The RSA Conference website offered this webpage with coronavirus updates; however, the information was sparse and seldom updated. No new updates were added after February 25, which started with this less than comforting news, “Today, the City of San Francisco declared a State of Emergency to begin preparations around any future coronavirus outbreaks. The City stated that residents and visitors remain at low risk for becoming infected with the coronavirus and that the number of cases within the City remains at zero. …”

My Delta flight was overbooked, and the airport seemed packed on Monday morning as I traversed through TSA security lines in Detroit. Several TSA officials wore face masks, and most of them were wearing plastic gloves, which I had not seen before.

Thankfully, my flight arrived early, and I was able to attend most of the RSA Public Sector Day at the San Francisco Hilton by Union Square. There was an excellent agenda of topics and federal, state and local government speakers on issues (Read more…)

Source link

The post #cybersecurity | #hackerspace |<p> Coronavirus: The Unexpected Human Element at RSA Conference 2020 <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#cyberfraud | #cybercriminals | Strengthening the human firewall against cyber attacks

Source: National Cyber Security – Produced By Gregory Evans

An estimated 97% of cyber-attacks originate from or involve email.

This estimate cited by The Wall Street Journal may be a little bit high, according to IT consultant J. Peter Bruzzese, who believes it is between 90% and 95%. But it nevertheless means emails are the biggest threat and employees are typically the weakest point at which an organisation can be attacked.

Speaking at the Armour Expo on Friday, 4 Oct., Bruzzese said gone are the days when hackers would drop infected USB sticks in the parking lot of their target organisation.

Those who picked up the devices and used them would ultimately infect their computers and potentially a whole network. The method was so successful that IT teams started to super glue the USB drives on computers to render them unusable.

“We actually have software for that,” the IT consultant said. “But some people are really extreme. Why? Because that’s where the threat was coming from.”

Nowadays these types of attack have been replaced by sophisticated email scams.

These can take the form of ransomware and other malware attacks, URL links that lead to malicious websites and even impersonation attacks that make heavy use of “social engineering”, the hacker term for manipulating the victim through verbal or written interaction.

Far from the Nigerian email scams, which involved preposterous stories written in bad English, these attacks appeal right to the heart of the victim, said Bruzzese. They are emails using sophisticated language, often imitating a person known to the target, and containing plausible messages or requests.

The IT consultant presented an email that he, although highly sensitised to the threat, fell prey to himself. It was purportedly sent from the CEO of a client company, who informed Bruzzese that the company had changed direction and to continue the collaboration his compensation structure would have to be adjusted. More information was supposedly contained in an attached Excel file. 

Of course, Bruzzese said, he should have noticed that he had never communicated with the CEO about compensation in the past or that an Excel spreadsheet was not really needed in this context.

“I wasn’t thinking. That is what your end-user is like most of the time,” he told local IT professionals at the event hosted by IT and cyber-security firm eShore.

The first thing he therefore recommends is end-user training.

“You have to prevent the end-user from making that click or opening that attachment. If you can stop that just a proportion of the time, you will save the company the frustration of a ransomware attack, the frustration of some form of impersonation attack or URL-based attack where they get password credentials.”

But in some cases, even the best training will not be sufficient. When homoglyphs, different character sets that look like letters, are used to replicate an email domain name, Brazzese said what looks like “apple.com” to the naked eye will actually be “xm00-ak68.com”, adding, “That’s how sneaky these folks are.”

The solution therefore must involve technology on top of user security awareness because most people will not pick up on these attempts. “You have to have the technology in place. An end-user is never going to see a URL that is based on homoglyphs.”

Moving email systems into the cloud will take care of some, but not all, security issues. Most people think that if they use Office365 they will never have a problem with a ransomware attack because their email is in the cloud and on Microsoft servers, Brazzese noted. “That makes sense, except there is a new form of attack called a ‘ransomcloud’ attack.”

In this attack, the end-user is prompted with a fake Microsoft message to opt into certain settings to enhance their security. Once these settings are accepted, the attackers can take control of the Microsoft mailbox online and they can encrypt it.

“They only way you can get your mailbox back is to pay the ransom unless you have a back-up, which in Office365 most people don’t,” the IT consultant added, because most people believe that Microsoft backs up their emails in such a way that they can be easily restored. But with 180 million corporate users across the globe that is impossible, he said.

Source link

The post #cyberfraud | #cybercriminals | Strengthening the human firewall against cyber attacks appeared first on National Cyber Security.

View full post on National Cyber Security

Horrific Human Trafficking Criminal Exposed in Birmingham, UK

To Purchase This Product/Services, Go To The Store Link Above Or Go To http://www.become007.com/store/ Horrific Human Trafficking Criminal Exposed in Birmingham, UK He was name as Zakaria Saqib Mahmood by the Police Zakaria Saqib Mahmood, Pakistani origin 40 years old living in 70 Eversleigh Road, …

The post Horrific Human Trafficking Criminal Exposed in Birmingham, UK appeared first on Become007.com.

View full post on Become007.com

Human nature Is crippling cyber security

Source: National Cyber Security – Produced By Gregory Evans

Human nature Is crippling cyber security

The recent Wannacry ransomware attack could change the current security paradigm to one that embraces human nature. WannaCry, the recent devastating global ransomware attack, is now the largest of its kind in internet history. The attack has breached hundreds of thousands of computers in more than 150 countries, crippling a…

The post Human nature Is crippling cyber security appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Human rights, cyber security to be part of Canada-China free trade consultations

Source: National Cyber Security – Produced By Gregory Evans

The federal government wants Canadians to air their concerns about China’s human rights record as part of broad consultations on a possible free trade deal. Business leaders are also being asked to weigh in on a major cybersecurity issue: how …

The post Human rights, cyber security to be part of Canada-China free trade consultations appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

The H Factor – Why you should be building “human firewalls”

dh4nyDkcPcpAYJNahesEsN

Source: National Cyber Security – Produced By Gregory Evans

The H Factor – Why you should be building “human firewalls”

It is often the illusive “H Factor” – the human element – that ends up being the weakest link that makes cyber-attacks and data breaches possible.
It is often the illusive “H Factor” – the human element – that ends

The post The H Factor – Why you should be building “human firewalls” appeared first on National Cyber Security.

View full post on National Cyber Security

Invitation to the 10th International Symposium on Human Aspects of Information Security & Assurance

fradt_main01

Source: National Cyber Security – Produced By Gregory Evans

We invite you to participate in the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016). The event will be held over the 19-21 July 2016 in the city of Frankfurt, Germany in association with the Eleventh International Network Conference (INC2016). This symposium, the tenth in our series, will bring together leading […]

The post Invitation to the 10th International Symposium on Human Aspects of Information Security & Assurance appeared first on National Cyber Security.

View full post on National Cyber Security

Unbreakable Encryption inspired by Human Biology

When we talk about security, only one thing cames to our mind – ENCRYPTION. Encryption of our online messages, encryption of our emails, encryption of our voice call, encryption of our every personal data and communication that we have to keep away from cybercriminals and, if I am not wrong, also from government intelligence agencies, such as NSA and GCHQ.Eventually, secure encryption is mandatory need of our modern Internet, Mobile communication, financial transactions, network sensors, car keys, and many more. But, government agencies like NSA are trying hard to break every effort that we adopt to secure our personal and confidential data. NSA is trying to develop a futuristic super computer called ‘Quantum computer’ that could be capable of breaking almost every kind of Encryption used to protect banks, medical, business including top-secret information held by government around the world.So, need for new encryption schemes are on demand that is harder, even much harder to break. By keeping this in mind, scientists have come up with the new encryption scheme which is nearly uncrackable to make life tough for cyber criminals and government spying agencies.A team of physicists at Lancaster University in the UK have built up almost unbreakable encryption scheme inspired by the time-varying nature of the cardiorespiratory coupling in humans, like the way our heart and lungs interact, which results in an “endless number of secret encryption key possibilities” shared between the sender and receiver.This very new method of unbreakable encryption came from the interdisciplinary research carried out by the scientists, Dr Tomislav Stankovski, Professor Peter McClintock, and Professor Aneta Stefanovska, and the patent includes Dr Robert Young, from the department of physics.

Despite handling separate jobs to keep us alive, the way our heart and lungs interact with each other is a paradigm of “coupling functions”. Since the two ends of encryption are the sender and the receiver, just like our heart and lungs.

To coordinate their rhythms, they need to communicate back and forth with each other various times, which the researchers called cardio-respiratory interactions. So, the information is encrypted on both the ends and to decrypt using the coupling functions.

Using same biological logic, Scientists have illustrated their new communication framework. “A number of information signals coming from different channels or communications devices (e.g., mobile phone, sensor networks, or wireless broadband) are to be transmitted simultaneously. ”

Source: http://whogothack.blogspot.co.uk/2014/04/unbreakable-encryption-inspired-by.html#.Vk_CA1UrLIU

The post Unbreakable Encryption inspired by Human Biology appeared first on Am I Hacker Proof.

View full post on Am I Hacker Proof

As Jamaica Prepares to Begin Using Drones to Fight Crime, Concerns Emerge Over Human Rights

Untitled43-300x200

Source: National Cyber Security – Produced By Gregory Evans

 Powered by Max Banner Ads As Jamaica gets ready to use drone technology in its crime fighting, the United States has announced new guidelines governing the use of the technology that could influence Jamaica’s approach. Last week, the Jamaica Constabulary Force outlined its timetable for the use of the unmanned aerial vehicles in crime hotspots such as St. James. However, already local human rights advocates have noted that there is need for regulations to ensure that the constitutional rights of Jamaicans are not breached. Yesterday, US President Barack Obama called for more stringent rules on privacy and drone use. The White House issued a presidential memorandum stating that drones should not be used to illegally gather or share private data. It said laws regulating drone use should be evaluated every three years, to ensure that protections and policies keep pace with developments. Civilian drone use has recently surged in popularity, presenting new regulatory challenges. Drones are usually deployed for military and special operation applications, but are also used in a small but growing number of civil applications, such as policing and firefighting. source: http://atlantablackstar.com/2015/02/17/jamaica-prepares-begin-using-drones-fight-crime-concerns-emerge-human-rights/

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post As Jamaica Prepares to Begin Using Drones to Fight Crime, Concerns Emerge Over Human Rights appeared first on National Cyber Security.

View full post on National Cyber Security