An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.

Should Voting Machines be Part of Critical Infrastructure?

At present, there are sixteen critical infrastructure sectors, including twenty subsectors that are eligible to receive prioritized cybersecurity assistance from the Department of Homeland Security. The existing critical infrastructure sectors are:

  • Chemical
  • Commercial Facilities
  • Communications
  • Critical Manufacturing
  • Dams
  • Defense Industrial Base
  • Emergency Services
  • Energy
  • Financial Services
  • Food and Agriculture
  • Government Facilities
  • Healthcare and Public Health
  • Information Technology
  • Nuclear Reactors, Material, and Waste
  • Transportation Systems
  • Water and Wastewater Systems

***

Related reading: Hacker study: Russia could get into U.S. voting machines

WE: op election officials from around the country met this weekend to create the formal organization to hash out what powers and lines of communications the Department of Homeland Security should have after the department designated voting systems in the states and territories as “critical infrastructure” earlier this year.

By voting to adopt a charter for a “Government Coordinating Council,” the secretaries of state now have a group that has an official channel and a single “voice” to communicate with DHS.

The move marks the first major step in the coming together between the nonpartisan National Association of Secretaries of State, or NASS, and DHS, amidst a contentious and sometimes mistrusting year.

“The other importance of the coordinating council actually being formed, is that there is so much activity on the federal level regarding legislation, I think this will give us, hopefully, a venue to help us inform members of the U.S. Senate and House of Representatives that states are taking an active role and we are doing a lot to prepare ourselves for the 2018 elections and beyond,” said NASS President and Indiana Secretary of State Connie Lawson.

Lawson and six other secretaries of state were in Atlanta this weekend for the first real efforts at coordinating between the states and DHS.

Although DHS has insisted from the start their “critical infrastructure” designation doesn’t give them any actual powers or authority over state and local voting systems, local officials have been wary. They say they can’t be sure DHS wasn’t encroaching on authority reserved explicitly to the states until DHS had clearly delineated their mission and what they hoped to accomplish with the critical infrastructure tag.

NASS and even U.S. senators and representatives expressed serious concern that although DHS knew for months about attempted “hacks” around the time of the 2016 elections, the affected states weren’t notified by DHS until this past September.

When the local election officials were finally notified, it immediately generated headlines around the country that “21 states” were the victims of some kind of hacking attempts on their voting systems, or on computer systems that may have been linked to the same offices as the voting systems.

However, in the intervening weeks, at least four states have come forward – California, Texas, Wisconsin, and Arizona – and disputed to some degree the DHS finding that they were the victims of a hack attempt.

Elected officials on Capitol Hill were upset as well when the “21 states” news broke.

“It’s unacceptable that it took almost a year after the election to notify states that their elections systems were targeted, but I’m relieved that DHS has acted upon our numerous requests and is finally informing the top elections officials in all 21 affected states that Russian hackers tried to breach their systems in the run up to the 2016 election,” said Sen. Mark Warner, D-Va., who serves on the Senate Intelligence Committee, which has taken an active role in trying to look at election vulnerabilities from 2016 in order to create more voting security in the future.

Lawson said NASS officials were still concerned about the lack of communication, but were also not trying to harp on the topic at this weekend’s meeting in Atlanta.

“I can’t say we’ve set it [communications issues] aside, but I can say we are just trying to make sure that things like this don’t happen again, that we all use the same terminology, that there’s a chain of communication that needs to take place,” Lawson told the WashingtonExaminer.

“We’re cautiously optimistic that things are going to get better,” she said.

Besides discussing the communications issues and communications chains in the event of problems in the future, Lawson said the coordinating council also discussed goals and deliverables.

“Those are just big, high-level pictures,” Lawson said.

“And then, who’s going to do the work, and how are we going to make sure that DHS has the support they need to stand up this coordinating council.”

“It was a logistical issue just being able to get everybody here because there wasn’t an official council at the time,” Lawson added later.

Secretary of Homeland Security Jeh Johnson originally made the critical infrastructure designation in the last days of the Obama administration. However, not long after, then-DHS Secretary John Kelly said the Trump administration had no plans to rescind the designation.

Apart from DHS, representatives from Election Assistance Commission were in attendance as well.

“State and local officials have already taken a number of steps to improve the security of the nation’s elections, and under the Government Coordinating Council we will be able to further leverage resources and our collective expertise,” said Bob Kolasky, the acting deputy under secretary of the DHS National Protections and Programs Directorate in a statement.

“The security of the nation’s elections are critical to our democracy, and DHS stands ready to support this important mission through exercises, information sharing, and technical cyber analysis and expertise.”

Trump vs. Iran vs. Europe

Primer: From BBC/

Iran has been blamed for a major cyber-attack on Parliamentary email accounts, including those of cabinet ministers.

Whitehall officials say Iran was behind a “sustained” cyber-attack on 23 June with hackers making repeated attempts to guess passwords of 9,000 accounts.

Up to 30 accounts are thought to have been compromised.

Security sources now believe the attackers came from Iran, although none of the information appears to have been used and the motive remains unclear.

BBC security correspondent Gordon Corera described the June attack as “not especially sophisticated” but told BBC Radio 4 it was a sign that Iran was becoming “more aggressive and capable as a cyber power”.

***  photo

And Britain still stands with the JCPOA?

Source: President Trump’s decision to decertify does not withdraw the U.S. from the Joint Comprehensive Plan of Action (JPCOA). Congress will now debate whether the U.S. should continue sanctions relief. Trump’s strategy also promised that the U.S. would focus more broadly on addressing Iran’s destabilizing behavior in the region, among other aspects.

President Hassan Rouhani slammed Trump’s speech and new strategy, and claimed that Trump has only distanced himself from his European allies and unified Iran. UK Prime Minister Theresa May, German Chancellor Angela Merkel, and French President Emmanuel Macron stressed their commitment to upholding the JCPOA in a statement following Trump’s speech.

  • European leaders issue statement following Trump’s speech. UK Prime Minister Theresa May, German Chancellor Angela Merkel, and French President Emmanuel Macron issued a joint statement conveying their commitment to the JCPOA following President Trump’s announcement that he will not certify that the deal is in the national security interests of the U.S. The European leaders cautioned President Donald Trump and U.S. lawmakers to carefully consider the implications of taking actions that could undermine the JCPOA, such as “re-imposing sanctions [that were] lifted under the [JCPOA].” They also expressed their concern about Iran’s ballistic missile program and disruptive regional activities, stating that they “stand ready to take further appropriate measures to address these issues.” European leaders have voiced their continuous support for the JCPOA. Several European countries have signed a myriad of financial deals with Iran since the implementation of the JCPOA in January 2016. The imposition of new sanctions or the reintroduction of previously lifted sanctions could imperil existing and future deals reached between Europe and Iran. (GOV.uk)

 

Drug Czar Nominee, Trump vs. 60 Minutes

photo

Primer: The Drug Enforcement Administration has proposed hiring its own prosecutor corps to bring cases related to drug trafficking, money laundering and asset forfeiture — a move that advocacy groups warn could exceed the DEA’s legal authority and reinvigorate the 1980s-era war on drugs.

Citing the epidemic in opioid-related overdoses, the DEA said it wants to hire as many as 20 prosecutors to enhance its resources and target the biggest offenders. The DEA said the new force of lawyers “would be permitted to represent the United States in criminal and civil proceedings before the courts and apply for various legal orders.” The agency would use money it gets from companies that manufacture and dispense certain kinds of prescription drugs under the federal Controlled Substances Act.

From the Federal Register

Joe Manchin calls Trump to pull drug czar nomination

Sen. Joe Manchin urged President Trump on Monday to withdraw his nomination for drug czar, Rep. Tom Marino, after a report noted he was the chief backer behind legislation that made it more difficult for the federal government to go after prescription drug companies for suspicious narcotic shipments.

Manchin does not mention in his letter that at the time he also had voted in favor of passing the bill, which received unanimous support in the Senate and was signed into law by former President Barack Obama.

“Congressman Marino led the effort in Congress to move through a bill that has made it significantly harder for the Drug Enforcement Agency to enforce our nation’s anti-drug diversion laws,” Manchin, D-W.Va., wrote to Trump in a letter. “For years, wholesale drug distributors were sending millions of pills into small communities – far more than was reasonably medically necessary.”

Manchin was responding to a report published Sunday by the Washington Post and CBS “60 Minutes,” which concluded that the Ensuring Patient Access and Effective Drug Enforcement Act of 2016 made it so the DEA could no longer bring enforcement actions against opioid distributors who give the painkillers to corrupt doctors and pharmacists.

As a result of the legislation one prescription opioid company shipped 20 million doses of oxycodone and hydrocodone to pharmacies in West Virginia between 2007 and 2012, including 11 million doses in a county where 25,000 people lived, according to the news investigation.

Trump tapped Marino, a Pennsylvania Republican, in September to lead the Office of National Drug Control Policy, which administers programs aimed at combating opioid abuse, including through drug monitoring programs or helping people access treatment.

“The head of this office … is a key voice in helping to push and implement strategies to prevent drug abuse, stop drug trafficking, and promote access to substance use disorder treatment,” Machin said, adding that the Washington Post report “calls into question Congressman Marino’s ability to fill this critical role in a manner that will serve the American people and end the epidemic. Congressman Marino no longer has my trust or that of the public that he will aggressively pursue the fight against opioid abuse.”

The opioid epidemic, which started after doctor overprescribing of prescription painkillers, resulted in more than 33,000 deaths in 2015, according to the Centers for Disease Control and Prevention. Because of such CDC reports, lawmakers were aware of the rising death toll and the contribution of the prescription drug industry to the trend when Obama signed the bill in April of 2016.

Many patients who were prescribed the drugs to treat pain then moved onto the drug’s cheaper alternative, heroin, which comprised an increased proportion of such deaths. West Virginia, in particular, has been hit hard, with 700 people dying from opioid overdoses in 700, according to Manchin’s office.

LEOKA Report 2016, 118 Deaths

Officer Down Memorial Page

Law Enforcement Officers Killed and Assaulted

66 Officers Feloniously Killed in 2016

A total of 118 law enforcement officers were killed in the line of duty in 2016, according to the FBI’s annual Law Enforcement Officers Killed and Assaulted (LEOKA) report released today. Of those deaths, 52 were accidental and 66 were felonious.

Additionally, 57,180 officers were assaulted in the line of duty, with nearly 30 percent of those officers being injured in the incidents.

All of these numbers increased from figures reported in 2015, when 45 officers died accidentally and 41 were feloniously killed in the line of duty. There were 50,212 assaults against law enforcement listed in the 2015 LEOKA report.

Through its Uniform Crime Reporting Program, the FBI collects data about the circumstances surrounding assaults against law enforcement and officer deaths. The data is collected from campus, local, state, tribal, and federal law enforcement agencies, as well as FBI field offices and non-profit organizations that track line-of-duty deaths. The LEOKA Program uses the data it collects to provide data-driven officer safety training to law enforcement officers around the country.

Of the 66 officers who were killed in criminal incidents:

  • The average age was 40 years old, with an average of 13 years of law enforcement experience.
  • Sixty-four of the officers feloniously killed were men, and two were women.
  • Nearly all of the officers were killed by firearms—62 out of 66. Of the 62 officers killed by firearms, 51 were wearing body armor at the time they were killed.
  • Four officers were killed intentionally with vehicles.
  • The most common categories of circumstance surrounding officers’ line-of-duty deaths were ambushes (17), followed by answering disturbance calls (13), and investigating suspicious people or circumstances (nine). (For more information on these incidents, see the summaries section of the report.)

Of the 52 officers who were killed in accidents:

  • The average age was 38 years old, with an average of 11 years of law enforcement experience.
  • Fifty of the officers accidentally killed were men, and two were women.
  • Half of the law enforcement officers killed accidentally in 2016 were killed in auto accidents—26 of the 52. Additionally, 12 were struck by vehicles, and seven were killed in motorcycle accidents.

The annual LEOKA report also contains a separate section on federal law enforcement officers who were killed or assaulted in the line of duty last year. According to the 2016 federal data, one federal law enforcement officer was killed and 324 were injured.

LEOKA Resources Page

Although LEOKA is an annual report released each October, the FBI’s Criminal Justice Information Services Division regularly updates the statistics on its LEOKA Resources Page. Visit the page for updated preliminary statistics on law enforcement officer line-of-duty deaths, including the breakdown of accidental and felonious deaths. The LEOKA Resources page also features links to previous LEOKA annual reports and information on law enforcement safety training.

K9 Line of Duty Deaths: 34

view Accidental: 2
Asphyxiation: 1
Assault: 1
Automobile crash: 1
Drowned: 1
Gunfire: 10
Gunfire (Accidental): 2
Heat exhaustion: 12
Stabbed: 1
Struck by vehicle: 3

Tips from FBI on Cyber Security

Protecting Yourself Online in an Interconnected World

As hacks, data breaches, and other cyber-enabled crime become increasingly commonplace, this year’s National Cyber Security Awareness Month is an important reminder of the need to take steps to protect yourself and your family when using the Internet. Launched in 2004 by the Department of Homeland Security and the National Cyber Security Alliance, the annual campaign held every October is designed to help the public stay safe online and to increase national resiliency in the event of a cyber incident. We could all learn a little more about cyber security, which is why the Alpine Security cybersecurity blog is so valuable.

“Cyber risks can seem overwhelming in today’s hyper-connected world, but there are steps you can take to protect yourself and reduce your risk,” said Assistant Director Scott Smith of the FBI’s Cyber Division. “The FBI and our partners are working hard to stop these threats at the source, but everyone has to play a role. Use common sense; for example, don’t click on a link from an unsolicited e-mail, and remember that if an online deal seems too good to be true, it probably is. And overall, remain vigilant to keep yourself and your family safe in the online world, just as you do in the physical world.”

How can you protect yourself?

  • Learn about the IC3—and use it if you’re ever a victim. The Internet Crime Complaint Center (IC3) is a reliable and convenient reporting mechanism for the public to submit complaints about Internet crime and scams to the FBI. The IC3 uses the information from public complaints to refer cases to the appropriate law enforcement agencies and identify trends. The IC3 has received nearly 4 million complaints since it was created in 2000. Anyone who is a victim of an Internet enabled crime, such as an online scam, should file a complaint with IC3 to help the FBI stop hackers and other cyber criminals. Learn more about the lifecycle of a complaint submitted to the IC3.
  • Practice good cyber hygiene at work. When you’re at work, you’re a target. From personal data to financial information to company secrets, company networks are a gold mine for hackers and fraudsters. One common scam that victimizes companies is Business e-mail compromise, in which a hacker will gain access to a company official’s e-mail to defraud the company or access employees’ private information. Additionally, ransomware, in which hackers will place malware in digital files that demands ransom, is a serious threat to companies and other large organizations. If you are conserned about your business being vunerable online then you may need a comprehensive threat intelligence platform to protect you. Learn more about cyber hygiene to protect yourself and your employer.
  • Know the risks of the Internet of Things (IOT). Cyber security goes beyond your computer and phone. Many homes are now filled with Internet-connected devices, such as home security systems, connected baby monitors, smart appliances, and Internet-connected medical devices. All of these devices present opportunities for hackers to spy on you and get your personal information. Using strong passwords and purchasing IOT devices from companies with a good security track record are just a few of the things you can do to protect your family and home. Learn more about IOT devices.
  • Cyber savvy? Uncle Sam wants you. As the cyber threat continues to grow, the FBI is similarly ramping up its efforts to recruit cyber experts to work as special agents, intelligence analysts, computer scientists, and more. The FBI partners with universities and other educational institutions with a science, technology, engineering, and math (STEM) focus to encourage students to pursue an FBI career, whether as an agent investigating hackers, an analyst looking strategically at threats, or a scientist evaluating evidence. The FBI offers a rewarding career in thwarting cyber attacks and bringing hackers and other criminals to justice. Visit FBIjobs.gov to apply.
  • Learn how the FBI and partner agencies are protecting critical infrastructure. Terrorist groups and other adversaries view the U.S. critical infrastructure—ranging from the financial sector to hospitals to electricity grids—as high-value targets that would disrupt American life if attacked. The FBI plays a key role in thwarting these attacks by stopping plots against critical infrastructure and investigating cyber attacks. Protecting these targets is a team effort among federal, state, local, and private sector partners. Three of the key partnership organizations the FBI is a member of are InfraGard, the Domestic Security Alliance Council, and the National Cyber-Forensics and Training Alliance. These strategic relationships promote timely information sharing between the FBI and the private sector, which helps to keep critical infrastructure networks safe from hackers and terrorists. If you’re concerned about Cyber Security, check out managed cyber security, to help you.