Unprecedented Hack: Trial Update: 17/07/31. "Unprecedented Hack Still Unprecedented..."

Unprecedented Hack: Trial Update: 17/07/31. "Unprecedented Hack Still Unprecedented..."
Posted on August 5, 2017 | Derek Flegg | Written on August 1, 2017
Comments
Letter type:
Blog Post

Publisher

Publisher:
KelleyandDerek.com

Author's Note:

Author's Note:

"Did an unprecedented hack put Ontario children's aid info on Facebook or did not so unprecedented incompetence and neglect?"

 

After the Perth Ontario's crown attorney delayed setting a trial date three times while attempting to negotiate a guilty plea with the accused, speculation now abounds at the latest rumors of a trial delay....

The Perth crown requested a months long trial delay so FCSLLG's lawyers can review and edit hundreds of pages of notes requested by former FCSLLG employees who are now unwilling to testify without those notes now in FCSLLG's possession after the accused refused to sign the crown's draft of a "statement of agreed upon facts." He then went on to state the crown would now have to prove their case. The trial has now been delayed indefinitely while FCSLLG takes all the time they need to get their stories straight.

Raymond Lemay, now the head of Family and Children's Services of Lanark, Leeds and Grenville, told CBC News, "The court process will determine whether there was negligence or not. I think that's the ultimate question."

An excerpt from Barbara Kay's "Children's aid societies gone rogue." about another agency's conduct in a real court from April 16, 2014.

It was revealed at trial that mandatory document-sharing was running a year late, and that one CAS supervisor, tasked with providing information to lawyers, had removed 475 pages of notes, records, summaries and emails from the file. (This, by the way, is a criminal offence, although to my knowledge the supervisor has not been charged.) 

.....

Lemay says the report in question is not "typical" of the work FCSLLG does or the documentation it keeps. He also says the organization has no reason to believe any of its other clients had their personal information compromised.

WELL  MR. LEMAY - IT'S TIME TO PUT YOUR MONEY WHERE YOUR MOUTH IS AND JUST HAND THE NOTES OVER - AND WHY WASN'T THE REPORT TYPICAL OF FCSLLG'S WORK?

Had the crown drafted the statement of agreed upon facts and allowed the accused an opportunity to read it before announcing to the court that's how all parties intended to proceed maybe this wouldn't be an issue now.  And though the judge had no problem with another delay on the part of FCSLLG and the hugely expensive waste of the court's time he did seem to have a problem with the accused not signing the statement of agreed upon facts which in my opinion isn't any different than being badgered by police officers to sign a confession during an interrogation. 

Lying takes more cognitive effort than being honest in general, because you have to work harder to keep your facts straight. Once you start down the pathway of lying, you not only have to remember facts, but which facts you changed, and how.

The crown also mentioned a key witness for the crown's case had gone on an extended vacation and was expected to return in about four months.

The crown also feels former director of service for FCSLLG Kim Morrow doesn't have any testimony she might be add about FCSLLG's confidentiality breach in trial that hasn't already been posted online, which is strange considering the videos with Kim Morrow were made least two full months before Kim Morrow became publicly aware of the confidentiality breach. 

Michael A. Crystal lawyer for the accused went on to say in the open courtroom all parties were now aware the tech report that the crown had been "waiting for" stated clearly there had been no hack, no mischief to data, no breach of security, that FCSLLG's website was open to browsing and he was prepared to go trial now. 

The Perth crown was unable to say how long FCSLLG's "internal review process" of the notes made by former FCSLLG staff members will take or when the trial can actually begin.

"In a time of universal deceit - telling the truth is a revolutionary act." George Orwell.

Lemay, who had retired in 2014, said there was a previous breach of the agency in February which did not involve the release of confidential information. The person responsible was a children’s aid client who has been embroiled in a campaign against the agency, including posting hours-long YouTube videos of her interactions with members of the staffLemay said a third party had been called into tighten security on the agency's own website hosted by a US server that deletes all logs every 30 days and not the board portal as had been claimed, but declined to discuss details because the matter is before the courts.

(could this video clip be why the crown would rather keep Kim Morrow out of the trial?)

See Video: "Get to Know Kim Morrow in 50 seconds."

See 2 Hour Video: "Meet Kim Morrow former director of service for FCSLLG." 

See Video: "Final telephone contact with Kim Morrow." 

Is this going to be another 154 day trial? 

See: CAS vows to appeal ruling of ‘bad faith’

See: Children’s Aid Society of London and Middlesex v. C.B.D.: Interests of the Children Lead to Quashing of Appeal in Child Protection Context

In 2013, the former Privacy Commissioner of Ontario, Anne Cavoukian, again called on government to pass new legislation that would require oversight from the privacy commissioners office in order to ensure that the sensitive data being managed by these agencies was being properly handled and secured and was again ignored by Ontario's liberals.

"Ontario's children's aid societies grappling with how to monitor privacy breaches" POSTED July 17, 2017 ARTICLE SOURCE Toronto Star.

Child welfare workers who pry into electronic records of youth in care are difficult to track, critics warn, with an alert system for possible privacy breaches used only on select files.

WHY ISN'T EVERYTHING TRACKED?

IF THE SOCIETY ISN'T TRACKING WHO'S ACCESSING WHAT FILES INTERNALLY HOW DOES THE SOCIETY KNOW WHO'S ACCESSING WHAT FILES EXTERNALLY?

THEY DON'T...

Corporate Internet Security - Is it all just programs, passwords and multiple layers of file folders to protect your business computer and client information or is there real hardware involved?

Why yes, there is real hardware. Here's one of the many devises to protect corporate networks and confidential client information.

Juniper Networks ISG Series Integrated Security Gateways are purpose-built, security solutions.

The ISG Series Integrated Security Gateways are ideally suited for securing enterprise, carrier, and data center environments where advanced applications, such as VoIP and streaming media, demand consistent, scalable performance. The Juniper Networks ISG1000 and ISG2000 Integrated Security Gateways are purpose-built security solutions that leverage a fourth-generation security ASIC, along with highspeed microprocessors to deliver unmatched firewall and VPN performance. Integrating best-inclass firewall, VPN, and optional Intrusion Detection and Prevention, the ISG1000 and ISG2000 enable secure, reliable connectivity along with network-and application-level protection for critical, high-traffic
network segments.

Network segmentation: Security zones, virtual systems, virtual LANS and virtual routers allow administrators to deploy security policies to isolate guests and regional servers or databases.

Optional Integrated IDP:

The ISG Series firewall/VPN with IDP uses the same award-winning software found on Juniper Networks IDP Series appliances.

The IDP security module combines eight detection mechanisms, including stateful signatures and protocol anomaly detection.

The ISG with IDP defends against security threats such as worms, trojans, malware, spyware, unauthorized users and hackers and can provide information on rogue servers and data on applications and operating systems that were inadvertently added to the network. Application signatures enable administrators to maintain compliance and enforce corporate business policies with accurate detection of application traffic.

STAY TUNED FOR ALL THE SHOCKING FACTS TO BE REVEALED IN THE UPCOMING TRIAL.

You know what they say, "If the glove don't fit you must acquit" and the facts don't fit the charges. I can think of $75 million reasons why fcsllg would lie and claim they were hacked, can't you? Only this time they're not in Kansas anymore and they can't just swear an affidavit that they had security and they were hacked. See fcsllg's financial statements March-31-2016 Item #17, they sound less than confident that Miss Denham will be convicted.

ACCUSED HACKER KELLEY DENHAM
VS FCSLLG.

THE CRIME HUMP CHRONICLES: GOING DOWN ON ME

The Crime Hump Chronicles: Obscured By Justice

LEARN MORE:

The Cars-Shake it up

The Cars-Let Good Times Roll

FAMILIES UNITED ONTARIO ON FACEBOOK

Related article

Related article:

About The Author

Advocates for family preservation against unwarranted intervention by government funded non profit agencies.

comments powered by Disqus