Wednesday, October 31, 2012

A 'good guess' but no answers as USS Stennis admiral is sent home to Bremerton


RDML_Gaouette.JPG
The U.S. Navy is investigating the commander of the John C. Stennis Carrier Strike Group, Rear Admiral Charles Gaouette. He has been removed from his ship - mid deployment - and sent back to the homeport in Bremerton. (US Navy photo)

A 'good guess' but no answers as USS Stennis admiral is sent home to Bremerton

 
14
The commander of the John C. Stennis Carrier Strike Group has been removed from his ship - mid deployment - and sent back to the homeport in Bremerton. The Navy won't say why, but a military analyst says he has an informed guess.
It was just two months ago when Defense Secretary Leon Panetta stood on the USS Stennis in Bremerton and gave more than 2,000 sailors a pep talk after he told them they'd be redeployed early.
"I've got a hell of a lot of great weapons in this position," Panetta said. "I've got aircraft carriers. I've got great fighter planes. I've got great technology. I've got great weapons systems of every kind. But none of that, none of that is worth a damn without men and women in uniform who serve this country."
Now one of the top men in uniform, Rear Admiral Charles Gaouette, commander of Stennis Strike Group, has been unceremoniously removed from his command.
He's been sent back to the Stennis homeport in Bremerton pending an internal U.S. Navy investigation.
The Navy released one statement, saying they are conducting an investigation that involves "inappropriate judgment."
Military analysts say it is unusual for the Navy to replace a Strike Group Commander mid deployment.
Retired Army Major Mike Lyons is a CBS News military analyst who says "inappropriate judgment" is likely related to sexual misconduct, or personal misconduct involving alcohol.
His speculation is based on a pattern with the Navy. That branch of the service is on track to fire a record number of commanders this year for bad behavior.
"The Navy this year has had a spike in firings of these kinds of officers. They've fired over a dozen so far with problems related to offenses about sexual misconduct, alcohol, or some other kind of personal misconduct," says Lyons.
"To take a commander out of a combat zone right now is significant. It's not something that's done without significant investigation."
This year 13 commanders have been relieved of duty, which essentially ends their careers.
The most recent was nuclear submarine Commander Michael Ward, who got his walking papers in August for what the Navy described as "allegations of personal misconduct."
Ward was accused of getting a woman pregnant and then ditching her by having a buddy tell her he died in combat. Ward hasn't been found guilty of anything, but he's still out as top officer of the USS Pittsburgh.
Since the change in leadership with the Stennis group was labeled as an issue of "inappropriate judgment" some are wondering if this has anything to do with the latest controversy in Libya.
The Fox News agency says it has sources on the ground in Benghazi who said there was an urgent request from the CIA annex for military back-up during the attack on the U.S. consulate, but the CIA was twice told to "stand down" rather than help the ambassador's team.
Another military source suggests Gaouette might have been moving the fleet closer to Libya during the Benghazi consulate attack and preparing to launch armed aircraft for air support.
Again, this is speculation. Neither the Navy, nor the Pentagon will discuss the case.
"If there was something to do with that stand-down order, he must have done something that threatened the morale or threatened chain of command over that situation," says retired Major Lyons.
"To be physically removed from the deck means that he's perceived to be someone that can no longer maintain the morale and discipline required to run that ship."
Lyons believes liquor is a more likely explanation than Libya.
Other branches of the military haven't been as aggressive with removing questionable officers as the Navy has.
Lyons says the Army tends to think twice unless behavior is "egregious."
"With the Navy, they live in such close quarters that any time personal conduct bleeds over into professional life, the reaction is to remove the officer while they investigate the allegations," he says.
In 2011, 23 Navy officers were fired. The Navy points out with 1,500 command positions, the annual firing rate was about 1.4 percent.
Lyons adds that a commander being relieved of duty isn't necessarily guilty of inappropriate behavior. He can also be let go if there are "an inordinate number of complaints," or a loss of confidence in their abilities.
Gaouette has led the Stennis Strike Group since April.
The Stennis deployed from Bremerton in late August, four months ahead of schedule, to maintain a two-carrier presence in the Middle East. The aircraft carrier made two port visits on its way to the Persian Gulf.
By LINDA THOMAS

h/t MK

Joe The Plumber Dead 2012



 
278,074 
    
Published on Oct 7, 2012 by 
The story of a multi-million dollar plumbing company that could not survive the Obama RECOVERY. Many thanks to Wells Fargo for not being there when we needed them. They were unwilling to pick up the phone and tell us that until it was too late. But then again they only ignored all follow-up attempts for 13 months in all. Too big to do it right or even care.

Thank you to the thousands of good wishes and blessings sent our way because of our story. We will rise again because that's who we are. Our prayers and thoughts are with all those who have shared their story and struggle. May we all do whatever we can to make sure we vote if you haven't already.


h/t RM

Losing Our Sons Full Film


Losing Our Sons Full Film

Losing Our Sons Trailer


h/t SB

lunchbucket joe 'You'll Vote for Me in 2016'..- what does he smoke?


Per , Biden chats w/ a GOP relative of a FL voter, concluding that when insurance rates go down, "you'll vote for me in 2016"

How to report a computer crime: Unauthorised email account access



Join thousands of others, and sign up for Naked Security's newsletter
FILED UNDER: FeaturedLaw & orderPrivacy
Thumbprint, courtesy of ShutterstockDo you know how to report a computer crime? Or even who you would report it to?
Well, there is no one size fits all solution - it depends on the individual circumstances and where you are in the world - but we've drawn up some scenarios that are typical of some of the crimes that any computer user, at home or work, might come across.
In the first of our series of articles on how to report a computer crime, we'll look at unauthorised email access, what offences are committed when a crime like this happens and how you should report it.
Take this scenario:
Abigail is at work. She logs into her personal webmail account during her lunch-break, which she is allowed to do according to her company's computer policy.
A friend had advised her to use a complex password for her personal webmail, but she finds it difficult to remember so she has it written down in her diary.
Abigail logs out of her personal webmail account and leaves the building to make a private phone call, but doesn't take her diary with her.
Barry sits opposite Abigail; he has a secret crush on her. Barry goes to Abigail's desk, searches her diary, finds the webmail account name and password and logs into her webmail account from his smartphone at the office.
Barry reads a number of Abigail's previously read personal emails using his mobile, but does not read any unread mail in case Abigail notices someone has accessed her account.
Abigail later discovers that someone has read her emails after she checks her email account activity and notices the account has been accessed by a mobile web browser. She suspects it was Barry after he made a comment regarding something she had written in a personal email.

What was the offence?

We can break it down like this:
Flower on laptop, courtsy of Shutterstock
  1. Barry deliberately gained access to Abigail’s web-based email account
  2. Barry did not have permission to access the account, nor would he have been given it if Abigail, the genuine account holder, knew what he was doing.
  3. Although Barry did not delete or deliberately alter any data, he has still committed an offence because the access was not authorised

The legal bit

We've focused on the UK, USA, Canada and Australia, but each country has its own legislation, though the relevant statute often exists to accommodate the same offences in each country.
UK
In the UK, most computer crime falls under offences covered by one of three pieces of law:
Other associated crimes could include Conspiracy or Money Laundering offences, but victims of crime are more often than not affected by at least one of the three Acts listed above.
In this case, Barry committed an offence of "Unauthorised Access" in contravention of S1 Computer Misuse Act 1990, committed when the offender causes a computer to perform a function intending to secure access (which Barry did when he gained authentication to Abigail's account).
Gavel, courtesy of ShutterstockUSA
In the USA, most cybercrime offences are covered by Title 18, United States Code (USC) Section 1030 – Fraud and related activity in connection with computers. This is what Barry contravened when he logged into Abigail's account.
Canada
The Criminal Code of Canada contains sections that specifically cater for cybercrime, including:
  • Unauthorised Use of Computer
  • Possession of Device to Obtain Computer
  • Mischief in Relation to Data
  • Identity Theft and Identity Fraud
In this case, Barry contravened Section 342.1 Canadian Criminal Code (CCC) - Unauthorised Use of Computer.
Australia
Both state laws and commonwealth laws exist in Australia. In South Australia, the investigation of cybercrime by police is classified under three tiers and is spread across the organisation depending, mainly, on severity.
The primary legislation for computer offences is the Summary Offences Act, 1953 (SOA) and the Criminal Law Consolidation Act, 1935 (CLCA).
In this case, Barry has contravened Section 44, Summary Offences Act.

Reporting the crime

UK
Police station, courtesy of ShutterstockIn the UK, when a crime has taken place it should be reported to the police, so Abigail should go to her local police station to report it.
A crime allegation may be investigated by a police force or may be referred to the Police Central e-Crime Unit (PCeU) which provides the UK's investigative response to the most serious incidents of cybercrime. The PCeU requests that the routine reporting of computer crime offences are not made directly to them.
There is also an alternative reporting body for internet-enabled crime: Action Fraud.
Action Fraud records and passes on crime reports to the National Fraud Intelligence Bureau, who then decides whether the incident requires further investigation, as not all computer crimes are investigated.
USA
The Department of Justice website contains a Computer Crime and Intellectual Property Section with a contact page for reporting incidents to local, state or Federal Law Enforcement Agencies (LEA).
Two Federal LEAs have a remit to investigate some computer crimes:
  • The Federal Bureau of Investigation (FBI)
  • The United States Secret Service (USSS)
In this case Abigail should report the crime at her FBI Local Office, or US Secret Service or Internet Crime Complaint Centre.
Canada
The Royal Canadian Mounted Police (RCMP) are the main agency with regard to the investigation of federal statutes but also have policing responsibility for a number of the Canadian provinces and all 3 territories, as well as some local police services in towns and cities.
A computer crime victim, like Abigail, should report their incident to their local police service. If appropriate, it will be escalated for the attention of the agency with federal responsibility, the RCMP.
Australia
Abigail should report the crime to the Australian State or Territory Police.
Investigation policy differs from state to state but the Australian Federal Police website offers a guide on whether the crime should be reported to either Australian State or Territory Police.

Preserving the evidence

Woman at computer, courtesy of ShutterstockAbigail may want to consider informing her webmail service provider that she has reported the incident to the authorities.
She should also request that they preserve the web access logs so they can be looked at during the investigations.

Remediation

Abigail should change her webmail password immediately and use a robust password that she can memorise rather than one which she has to write down. She could also consider using password management software (examples include 1Password, LastPass or KeePass) where she only will need to remember one complicated master password.

Conclusion

In general, it's important that all computer crime is reported. Even if no investigation follows, crime report intelligence can be built up and an accurate picture of the levels of computer crime can be produced.
If victims of a particular crime do not come forward to report incidents, then the number stated in crime reporting statistics will be not be a true reflection of the number of crimes taking place.
The scenario above is given as an example to help you in understanding when and what offences have taken place. Please be reminded that no two situations are the same and we have not catered for the “what if” situation.
We have also not included any corporation’s AUP (Acceptable Use Policy) that may be in place and may have been breached.
All of the scenarios are made up and the characters depicted bear no resemblance to any person.
If you've been a victim of computer crime, did you report it?

Acknowledgements

Naked Security gratefully acknowledges the assistance of the following organisations in preparation of this series of articles:
UK Police Central e-Crime Unit
Action Fraud
United States Federal Bureau of Investigation
United States Secret Service
Royal Canadian Mounted Police