Month: November 2008

cps
last word on false allegations

Last Word: False allegations from  CNN.com

In Session’s Jami Floyd has the last word on false allegations and their consequences.

Source: INSESSION
Added On November 17, 2008
cps
Internet Safety For Your Children & Teens

I thought this presentation from Netsmartz.org was pretty neat. I am a strict advocate for online safety against child sex predators, and its hard sometimes to get through to your teenagers; or to watch them all the time.

So teaching them what to watch out for, what dangers there are lurking, and what to do in a situation is key to online safety; this can really make a difference; pass it along.

0025-adobe-id-044asp353590

Netsmartz Brochure In PDF format

Teen Safety On the Information Highway in PDF format

Some of the following are from Netsmartz.org – an awesome site for information on this very important topic to keep our kids safe!

rbkm_10001

Parents PSA: “Family Concern”

Parents PSA You think your children are safe when they are home with you. But have you thought about protecting them from the dangers of the Internet?

Play Parents PSA

“Julie’s Journey”

Julie Get Flash Player Julie left home for three weeks with a convicted murderer she had developed a relationship with online. Play >>

Activity Cards

Related News Articles

Statistical Data courtesy of Netsmartz.org

download full report

Produced in cooperation with the U.S. Department of Justice’s Office of Juvenile Justice and Delinquency Prevention and University of New Hampshire’s Crimes Against Children Research Center, this second groundbreaking national survey of 1,500 youth aged 10 to 17 documented their use of the Internet and experiences while online including unwanted exposure to sexual solicitation, sexual material, and harassment. And it includes recommendations to help make the Internet safer for children. The 2006 report is referred to as YISS-2; YISS-1 refers to the original study released in 1999.

  • In YISS-2, compared to YISS-1, increased proportions of youth Internet users were encountering unwanted exposures to sexual material and online harassment, but decreased proportions were receiving unwanted sexual solicitations.
  • In YISS-2 more than one-third of youth Internet users (34%) saw sexual material online they did not want to see in the past year compared to one quarter (25%) in YISS-1.
  • The increase in exposure to unwanted sexual material occurred despite increased use of filtering, blocking, and monitoring software in households of youth Internet users. More than half of parents and guardians with home Internet access (55%) said there was such software on the computers their children used compared to one-third (33%) in YISS-1.
  • Online harassment also increased to 9% of youth Internet users in YISS-2 from 6% in YISS-1.
  • A smaller proportion of youth Internet users received unwanted sexual solicitations in YISS-2 than in YISS-1. Approximately 1 in 7 (13%) was solicited in YISS-2, compared to approximately 1 in 5 (19%) in YISS-1; however, aggressive solicitations, in which solicitors made or attempted to make offline contact with youth, did not decline. Four (4) percent of youth Internet users received aggressive solicitations — a proportion similar to the 3% who received aggressive solicitations in YISS-1.
  • In YISS-2 there were also declines in the proportions of youth Internet users who communicated online with people they did not know in person (34% down from 40% in YISS-1) or who formed close online relationships with people they met online (11% down from 16%).
  • Four (4) percent of all youth Internet users in YISS-2 said online solicitors asked them for nude or sexually explicit photographs of themselves.
  • As in YISS-1 only a minority of youth who had unwanted sexual solicitations, unwanted exposures to sexual material, or harassment said they were distressed by the incidents. The number of youth with distressing exposures to unwanted sexual material increased to 9% of all youth in YISS-2 from 6% in YISS-1.
  • Acquaintances played a growing role in many of the unwanted solicitation incidents. In YISS-2, 14% of solicitations were from offline friends and acquaintances compared to only 3% in YISS-1. The same was true of harassers. Forty-four (44) percent were offline acquaintances, mostly peers, compared to 28% in YISS-1. In addition a portion of these unwanted incidents happened when youth were using the Internet in the company of peers — 41% of solicitations, 29% of exposures, and 31% of harassment.
  • As in YISS-1 few overall incidents of solicitation or unwanted exposure (5% and 2% respectively in YISS-2 and 9% and 3% respectively in YISS-1) were reported to law enforcement, Internet service providers, or other authorities.

child welfare reform, foster care abuse, cps, domestic violence, family, General, government, system failure
An 8 year old’s childhood deferred… what happened?
I have a serious problem with an 8 year old murdering anyone – 8 year olds aren’t generally of a disposition to shoot anyone with a rifle execution style; i don’t even think i KNEW what a rifle was at that age.  I am not in a position to say what i think might have gone on behind the scenes so i don’t think i will go there; but i did want to share this story; and offer my prayers to this child, who is still – just a child –

8-year-old accused of killing father, another man

FLAGSTAFF, Arizona (AP) — An 8-year-old boy is charged with murder in the shooting of his father and another man in a rural community in eastern Arizona, authorities said Friday.

The boy was charged with two counts of premeditated murder in the death of his father, 29-year-old Vincent Romero, and 39-year-old Timothy Romans, St. Johns Police Chief Roy Melnick said.

Police arrived at the home within minutes of the shooting Wednesday, Melnick said. They found one victim just outside the front door and the other dead in an upstairs room.

The boy, who prosecutors say had never been in trouble before, initially denied involvement in the shooting but later confessed, Melnick said. Read the full story here.

cps
Computer crash hinders Texas Attorney General’s Medicaid fraud case

 Anyone else smell a rat?

Imagine that –

 How in the world could an office so important as the Attorney General’s NOT keep backup?  The work product has to be out there somewhere I’m sure – its not a single copy kinda documentation when you’re dealing with issues such as these!

Or maybe i’m wrong…Either way its horrible news… unless you’re a defendant of course.

sq00011811

Computer crash hinders Texas Attorney General’s Medicaid fraud case

07:00 AM CDT on Thursday, October 23, 2008

By EMILY RAMSHAW and ROBERT T. GARRETT / The Dallas Morning News
eramshaw@dallasnews.com rtgarrett@dallasnews.com

 

AUSTIN – A massive computer crash that destroyed hundreds of the state attorney general’s confidential documents may prevent scores of Medicaid fraud prosecutions and has revealed serious problems with a newly expanded state outsourcing of computer services.

As much as 50 percent of the Tyler Medicaid fraud division’s files were destroyed in July when a server being repaired by a state vendor wouldn’t restart. The scope of the damage is in dispute.

In an apparent oversight, the documents lost were not backed up – meaning that evidence crucial to convicting dishonest health-care providers who ripped off the state’s health insurance program for the poor may never be recovered. E-mails and other records obtained by The Dallas Morning News indicate some Tyler investigators lost up to 90 percent of their open case files.

“In spite of earlier assurances, the destruction of critical data has, in fact, occurred,” First Assistant Attorney General Kent Sullivan wrote Monday in an e-mail to Brian Rawson, chief of the Department of Information Resources. Attorney General Greg Abbott’s office “cannot afford to risk a reoccurrence of this event.”

Lost: 8 months of work

In all, 81 criminal cases and eight months of work in the attorney general’s 13-person Tyler Medicaid fraud office were completely lost, according to an attorney general’s report on the security breach – records that are being painstakingly recovered by the vendor.

IBM, which leads a vendor group selected by the information resources department in the $863 million, seven-year outsourcing deal, said it still is investigating the matter.

“We do take this incident seriously, and we’re taking appropriate steps to ensure that it doesn’t occur again,” company spokesman Jeff Tieszen said.

Mr. Tieszen said IBM-hired data recovery specialists have reassembled 24 of 27 lost gigabytes of information – 88 percent of the lost data.

State officials said that they couldn’t confirm that figure and that their latest estimates remain at 50 percent.

The Medicaid fraud data loss is the worst problem to surface in the first 18 months of the state’s deal with the IBM-led group – and further blemishes a privatization push throughout state government that grew rapidly after Republicans gained control of the Legislature six years ago.

In April 2007, Mr. Abbott’s office was forced to switch to the outsourced system. It gave “Team for Texas,” the vendor group, lead responsibility for the attorney general’s information technology system, including its servers and backup tapes.

The change was supposed to provide better service and save money. But early this year, the attorney general’s office and the IBM-led group had a series of communications breakdowns over whether data was actually being backed up.

In a May e-mail, Sean Peterson, Mr. Abbott’s director of network operations, appeared to have a premonition, raising doubts about whether remote office servers were being properly maintained. He also asked for a list of all the backups that had failed in the last three weeks.

“I am concerned that these are not being backed up properly,” he wrote.

Lag in reporting

On July 21, the Tyler server wouldn’t restart. Alarms weren’t raised immediately; memos in the attorney general’s office say the vendor didn’t notify Mr. Abbott’s office of the problem until 10 p.m. on July 22.

But as initial efforts to retrieve the records failed – and attorney general’s office employees realized that IBM had “not routinely backed up the server as required by contract” – memos show that both the state and the contractor realized the gravity of the situation.

By late July, IBM had to call in a special forensics team from California to try to recover documents. And the data losses were so severe that employees in Mr. Abbott’s office questioned in e-mails to each other whether they should resign for failing to properly oversee IBM, according to records obtained by The News.

Shortly after the Tyler office’s data loss, documents indicate the attorney general’s office determined that servers for three other field offices were not being backed up, either.

In Monday’s e-mail, Mr. Sullivan wrote that he needed a guarantee “that no state agency will again be faced with the situation of having data destroyed and functionally irretrievable.”

There have been other highly publicized problems with big outsourcing pushes by the Health and Human Services Commission – one that created privately run call centers and maintained software to support eligibility screening for public assistance, and another that privatized payroll and hiring at 12 social services agencies.

In 2005, the Legislature and Gov. Rick Perry, building on an earlier outsourcing of state computer services and data backups, approved a measure forcing at least 15 state agencies to join a dozen that already were using an earlier vendor, Northrop Grumman Corp.

A new, expanded outsourcing deal with Team for Texas – the current provider – was struck in November 2006 and took effect in April 2007.

The deal, expected to save the state $153 million by 2013, has attracted little public attention because even though more than 500 state employees lost their jobs, about 40 percent found other state positions and the rest were guaranteed spots with IBM or its subcontractors Unisys, Xerox and Pitney Bowes.

In July, though, state Auditor John Keel criticized the information department for not riding herd on major state agencies. Though agencies were supposed to hand over to IBM their most knowledgeable and experienced computer technicians, many kept those workers by using them to fill other vacancies, Mr. Keel’s audit said.

 

cps
Tuesday’s Busy Days

Its Almost Tuesday wants to thank you for your continued support; and apologize for its slow days lately; please stick with us, as we’re investigating some new information that just came to us, that will prove to be very interesting reading.  However it takes some time to compile everything accurately so in our absence, please enjoy our past posts.

Thank you,

Its Almost Tuesday