An affordable price is probably the major benefit persuading people to buy drugs at www.americanbestpills.com. The cost of medications in Canadian drugstores is considerably lower than anywhere else simply because the medications here are oriented on international customers. In many cases, you will be able to cut your costs to a great extent and probably even save up a big fortune on your prescription drugs. What's more, pharmacies of Canada offer free-of-charge shipping, which is a convenient addition to all other benefits on offer. Cheap price is especially appealing to those users who are tight on a budget
Service Quality and Reputation
Although some believe that buying online is buying a pig in the poke, it is not. Canadian online pharmacies are excellent sources of information and are open for discussions. There one can read tons of users' feedback, where they share their experience of using a particular pharmacy, say what they like or do not like about the drugs and/or service. Reputable online pharmacy canadianrxon.com take this feedback into consideration and rely on it as a kind of expert advice, which helps them constantly improve they service and ensure that their clients buy safe and effective drugs. Last, but not least is their striving to attract professional doctors. As a result, users can directly contact a qualified doctor and ask whatever questions they have about a particular drug. Most likely, a doctor will ask several questions about the condition, for which the drug is going to be used. Based on this information, he or she will advise to use or not to use this medication.
The Brookings Institution is a liberal think tank that covers all policy, foreign and domestic. The officially describe themselves and non-partisan but that is hardly the case. The institution was founded in 1916 and is the president is Strobe Talbott, where he and President Bill Clinton were roommates at the University of Oxford, both there as Rhodes Scholars. In later years, Talbott helped the Clintons in their political campaigns. Now that the table is set:
DailyCaller: Wages for many American workers continue to decline, hitting workers the most in industries where demand for work is increasing, a new study found. One explanation via the Brookings Institution is that immigrants fill a disproportionate share of those jobs.
The New York Times covered the National Employment Law Project study:
“Despite steady gains in hiring, a falling unemployment rate and other signs of an improving economy, take-home pay for many American workers has effectively fallen since the economic recovery began in 2009 …
“The declines were greatest for the lowest-paid workers in sectors where hiring has been strong — home health care, food preparation and retailing — even though wages were already below average to begin with in those service industries.”
The study raises the question: Why would wages be falling the most in industries with greater demand for workers?
The Times notes that “macroeconomic forces like automation, demographics and globalization” are contributing to falling wages, and refers to ongoing slack in the labor market —the labor supply is still outstripping the (increasing) demand for work.
One explanation the Times doesn’t mention directly is that immigrants share a disproportionately high share of these jobs, and are to some extent crowding American workers out of these low-skilled, high in demand industries.
A 2012 Brookings Institution report found that many of the jobs in the occupations deemed fastest and largest growing by the Bureau of Labor Statistics are going to immigrants — in many of the same occupations the Times reports have seen the greatest decline in wages in recent years.
The NELP report lists restaurant cooks, food preparation workers, home and personal care aides and cleaning service jobs as those that have taken the biggest hit in wages. Real wages for restaurant cooks have declined 8.9 percent since 2009.
The Brookings report found immigrants (legal and illegal) are clustered in those same sectors — health care, food prep and service and the accommodations industry. In private households, immigrants were 49 percent of all workers, in the accommodation sector they were 31 percent, and in home and personal care they were more than 20 percent of all workers.
Among the 15 occupations expected to see the largest numerical growth in coming years, eight had high shares of foreign-born workers, and among the 15 fastest growing occupations, seven had high shares of foreign-born workers.
“If current trends continue, we would expect to see these occupations filled disproportionately by immigrants,” the Brookings report stated in 2012.
Here is a New York Times chart based on the NELP report that shows where wages declined the most, followed by a chart from the Brookings report that shows how immigrants share in the largest growing jobs. You can compare the overlap.
In 1970, immigrants made up approximately 5 percent of the population and 5 percent of the civilian labor force, the Brookings report notes. In 2010 that number grew to 23.1 million immigrants in the labor force, making up 16.4 percent of the total.
“As the economy sputters along with some signs of improvement, people often point to the U.S. Bureau of Labor Statistics’s list of fastest-growing occupations as the bright spots in the labor market,” Bloomberg Business reported in a 2012 story about the Brookings report.
“These occupations—in nursing, home health care, and food service—are low-skilled, low-pay jobs, but at least they are market segments that present opportunity. Much of that opportunity, it turns out, is being seized by immigrants.”
Since 1970, the foreign-born population has increased by more than 325 percent, while wages and share of income fell.
The U.S. foreign-born population — legal and illegal immigrants — is at an all-time high of 42.1 million, recent Census Bureau data shows. And by 2023 the foreign-born population will exceed 51 million — the largest share of total population ever recorded in American history.
Nearly one in five U.S. residents will be an immigrant by 2060, largely because of legal immigration, not illegal immigration, a previous Center for Immigration Studies analysis of the Census data found. And immigrants will account for 82 percent of population growth in the U.S. from 2010 through 2060.
If federal law is not changed, the U.S. is on track to issue 10 million green cards over the next decade — a massive new permanent resident bloc larger than the combined populations of Iowa, New Hampshire and South Carolina.
FreeBeacon: provided relief to individuals who received overpayments
The Internal Revenue Service paid out over $572 million in excess Obamacare tax credits and sent incorrect forms to over half a million individuals due to a computer programming error, according a new government report.
The report released by the Treasury Inspector General for Tax Administration on Tuesday inspected the interim results of the IRS’s verification of Obamacare’s Premium Tax Credits, which were created to assist low or medium-income individuals and families to purchase health insurance in the marketplace.
IRS Commissioner
Those who are eligible to receive tax credits under Obamacare can choose to have their credits paid either directly to their health insurance provider as a partial payment towards their monthly premiums—known as the Advance Premium Tax Credit—or can receive the tax credits as one lump sum on their annual income tax return.
According to the IRS, $11 billion worth of tax credits were paid in advance to insurers for fiscal year 2014. By March 26, 2015, the IRS processed around 1.4 million tax returns that showed $4.4 billion in credits, bringing the total to more than $15 billion for 2014. Individuals claimed more than $240 million in additional premium credits and received $572 million in excess advance payments, according to the agency.
The inspection also brought to light a computer programming error that led to more than half a million individuals receiving incorrect health insurance forms.
Incorrect versions of the Health Insurance Marketplace Form, or Form 1095-A, were sent out to 800,000 individuals who participated in Obamacare’s federal exchange.
The forms were sent as a result of a computer programming error that ultimately displayed premium amounts for calendar year 2015 rather than 2014. Taxpayers use the premium amount to determine their allowable Paid Tax Credit.
After the mistake was discovered, the Center for Medicare and Medicaid Services said that it would send corrected 1095-A forms and urged the affected individuals to hold off filling out their forms. However, the Treasury estimated that 50,000 of these individuals had already filled out their tax returns as of February 2015.
Treasury announced in late February that people who had already completed their tax returns did not have to correct the errors by filing an amended tax return and stated that they would not seek to recoup the excess payments.
“On February 24, 2015, Treasury announced that taxpayers enrolled in the Federal Exchange who have already filed their tax return do not need to file an amended tax return to correct errors in their PTC claim resulting from an incorrect Form 1095-A,” the report said. “Treasury stated that the IRS would not pursue action to recoup excess PTC these taxpayers may have received as a result of the error.”
Treasury further said in March that it would extend this relief to every person who filed an incorrect tax return with the wrong premium amounts.
“On March 20, 2015, Treasury expanded relief from filing an amended tax return to all taxpayers who received and filed a tax return based on an incorrect Form 1095-A,” the report states.
The extent to which the incorrect forms contributed to the $572 million in excess payments is unknown and still being evaluated.
The inspection also found that the IRS could not verify nearly 40 percent of enrollees who comprised the more than $15 billion in dispersed tax credits due to lack of information.
“This is par for the course with Obamacare. Even after years of work and billions of tax dollars spent, this law again and again fails to prevent the prodigious waste of Americans’ money,” said Curtis Kalin, a spokesman for the watchdog group Citizens Against Government Waste
“There must be an effective system in place to track where subsidies have been sent and to whom. That is one of the most basic safeguards against waste and fraud. Taxpayers deserve the assurance that their money isn’t being hopelessly squandered, especially when there are commonsense ways to prevent it.”
When the United States as part of the P5+1 negotiated with Iran on a nuclear deal, at no time were demands placed on Iran to stop the tyrannical and militant support of Bashir al Assad’s civil war in Syria. The same holds true, when any diplomatic efforts between Russia and the United States avoids Russian support for the Assad regime. With 11 million Syrians that have fled their home country, the damage, the costs and the deaths coupled with desperation leads to a global crisis, where advanced world leaders shirk their duty to protect.
Nothing is more shameful when refugees fleeing to freedom by any means possible including boats, where passengers are attacked and or drowned such that bodies wash up on shore.
Riot police, who were waiting at the small station of Bicske, ordered the asylum seekers off the train. Many clung to the doors and some wrestled trying to get back on board.
One man threw himself on the tracks with his wife clutching their crying baby in fear of being sent to a camp.
On arriving at the town of Bicske, which has a migrant reception centre, many refugees were shouting “No camp, no camp!”
The train left Budapest’s Keleti station bound for the town Sopron, near the Austrian border, this morning after more than 1,000 people poured into the capital’s main terminal.
Hungary’s rail operator said no direct trains are running to western Europe due to “railway transport” security reasons. Despite this, desperate refugees pushed themselves and their children on to carriages through doors and windows. Many cheered as trains pulled into the station.
Hungary had initially allowed people to travel on Monday, letting more than 1,000 people pack on to westbound trains from Budapest, but then withdrew the option 24 hours later.
The decision to allow people inside the train station today came hours before Hungarian Prime Minister Viktor Orban met European leaders in Brussels to discuss the growing humanitarian crisis.
He said that because so many migrants wanted to reach Germany, it was a “German problem”, however European Parliament President Martin Schulz argued that fair and just distribution of people was needed.
‘A German problem’
“The problem is not a European problem. The problem is a German problem.”
“Nobody would like to stay in Hungary, neither in Slovakia, nor Poland, nor Estonia. All of them would like to go to Germany. Our job is only to register them,” he said.
Mr Orban said EU rules state that countries must protect their boarders and refugees looking to leave the country without registration is “totally against European regulations”.
Under EU regulations, refugees must seek asylum in the first country they arrive in, however this has come into question after Germany said it would accept asylum claims from Syrian refugees regardless of where they entered the EU.
Austrian authorities say refugees arriving in Vienna from Budapest will not be checked or registered and will be allowed to continue their onwards journey.
Police chief Gerhard Puerstl said: “What we certainly can’t do is check all those people coming through, establish all their identities, or possibly even arrest them – we can’t do this, and we have no plans to do this.”
Meanwhile, Czech police announced that they will stop detaining Syrian migrants who have claimed asylum in Hungary but are attempting to travel to Germany, according to local media in the country.
Hungary is the gateway to Europe
More than 150,000 refugees and economic migrants have travelled to Hungary this year as it is the gateway to the EU for those crossing by land through Macedonia and Serbia. Many of those, who have come from Syria or Afghanistan, are looking to travel to western countries such as Germany and Austria.
The mass influx of refugees seeking asylum in Europe are fleeing war-torn countries from the Middle East and parts of Africa.
Eritreans, who are granted refugee status when they reach Germany, make up a large number of those fleeing across the Mediterranean to Europe – around 15 per cent of the total reaching Europe’s sea border are from the country.
Most of the Eritreans arriving in Europe have travelled by sea, initially, via Ethiopia and Sudan.
On the knife’s edge, Americans are threatened by some entity every day. It is the work of government to keep the homeland safe and the methods or tactics used can infringe on our protected rights.
Wonder what words are used in Hillary’s emails….
When it comes to words, the Department of Homeland Security has a list and they have systems to cultivate interactions on the internet where social media platforms such as Facebook and Twitter and YouTube are the top three locations where you are being watched. Have you ever posted something to Facebook and it was removed?
This is not a new circumstance, but often we need to be reminded.
Forbes: If you are thinking about tweeting about clouds, pork, exercise or even Mexico, think again. Doing so may result in a closer look by the U.S. Department of Homeland Security.
In a story appearing earlier today on the U.K’s Daily Mail website, it was reported that the DHS has been forced to release a list of keywords and phrases it uses to monitor various social networking sites. The list provides a glimpse into what DHS describes as “signs of terrorist or other threats against the U.S.”
The list was posted by the Electronic Privacy Information Center who filed a request under the Freedom of Information Act, before suing to obtain the release of the documents. The documents were part of the department’s 2011 ’Analyst’s Desktop Binder‘ used by workers at their National Operations Center which instructs workers to identify ‘media reports that reflect adversely on DHS and response activities’.
The information sheds new light on how government analysts are instructed to patrol the internet searching for domestic and external threats. The Daily Mail’s article noted the Electronic Privacy Information Center wrote a letter to the House Homeland Security Subcommittee on Counter-terrorism and Intelligence, describing it’s choice of words as ‘broad, vague and ambiguous’.
What wasn’t disclosed is how the agency actually gains access to the various search engines and social networks to monitor the specified keywords. My guess is the DHS has a “special arrangement” with companies like GoogleGOOG -1.94%, FacebookFB -1.12%, MicrosoftMSFT +0.00%, Yahoo and Twitter to gain secure direct API access. This type of access would allow it to use distributed cloud technologies to monitor the daily flow of social media and search activity in something close to real time.
I would love to learn more about the technologies used to accomplish this type of social / web monitoring. The applications for monitoring trends and social statics are fascinating when applied to other industry sectors. Given the extent of the monitoring, I’m sure this post itself is now coming up on the DHS radar, so please feel free to leave a comment with any insights.
2014:
(Update 1: Reading through the Desktop Binder, I discovered the DHS Twitter account is @dhsnocmmc1 and DHS appears to be using tweetdeck to monitor the various keywords. See Page 38 – Also interesting to note they seem to be using a Mac Mini as a server, and no password vaults. All Passwords appear to be shared in a plain text word document.)
(Update 2: On page 37, DHS instructs analysts to accept invalid SSL certificates forever without verification. Although invalid SSL warnings often appear in benign situations, they can also signal a man-in-the-middle attack. Not a good practice for the security conscious. Thanks to @obraon twitter for the tip.)
The Army has turned to its own ranks in hopes of satisfying its growing need for talented cybersecurity professionals.
In June, the agency announced that all E-1- through E-8-ranked soldiers, regardless of their technical background, could apply to participate in a yearlong cyber training program, according to a recent Army press release.
Those successful candidates who complete the program would then be reclassified into the 17C military occupational specialty – also known as cyber operations specialist.
As cyber operations specialists, these soldiers will be tasked with supporting the military through offensive and defensive cyber operations.
Foreign spy services, especially in China and Russia, are aggressively aggregating and cross-indexing hacked U.S. computer databases — including security clearance applications, airline records and medical insurance forms — to identify U.S. intelligence officers and agents, U.S. officials said.
At least one clandestine network of American engineers and scientists who provide technical assistance to U.S. undercover operatives and agents overseas has been compromised as a result, according to two U.S. officials.
The Obama administration has scrambled to boost cyberdefenses for federal agencies and crucial infrastructure as foreign-based attacks have penetrated government websites and email systems, social media accounts and, most important, vast data troves containing Social Security numbers, financial information, medical records and other personal data on millions of Americans.
Counterintelligence officials say their adversaries combine those immense data files and then employ sophisticated software to try to isolate disparate clues that can be used to identify and track — or worse, blackmail and recruit — U.S. intelligence operatives.
Digital analysis can reveal “who is an intelligence officer, who travels where, when, who’s got financial difficulties, who’s got medical issues, [to] put together a common picture,” William Evanina, the top counterintelligence official for the U.S. intelligence community, said in an interview.
Asked whether adversaries had used this information against U.S. operatives, Evanina said, “Absolutely.”
Evanina declined to say which nations are involved. Other U.S. officials, speaking on condition of anonymity to discuss internal assessments, say China and Russia are collecting and scrutinizing sensitive U.S. computer files for counterintelligence purposes.
U.S. cyberspying is also extensive, but authorities in Moscow and Beijing frequently work in tandem with criminal hackers and private companies to find and extract sensitive data from U.S. systems, rather than steal it themselves. That limits clear targets for U.S. retaliation.
The Obama administration marked a notable exception last week when a U.S. military drone strike near Raqqah, Syria, killed the British-born leader of the CyberCaliphate, an Islamic State hacking group that has aggressively sought to persuade sympathizers to launch “lone wolf” attacks in the United States and elsewhere.
Junaid Hussain had posted names, addresses and photos of about 1,300 U.S. military and other officials on Twitter and the Internet, and urged his followers to find and kill them, according to U.S. officials. They said he also had been in contact with one of the two heavily armed attackers killed in May outside a prophet Muhammad cartoon contest in Garland, Texas. Hussain is the first known hacker targeted by a U.S. drone.
The Pentagon also is scouring the leaked list of clients and their sexual preferences from the Ashley Madison cheating website to identify service members who may have violated military rules against infidelity and be vulnerable to extortion by foreign intelligence agencies.
Far more worrisome was last year’s cyberlooting — allegedly by China — of U.S. Office of Personnel Management databases holding detailed personnel records and security clearance application files for about 22 million people, including not only current and former federal employees and contractors but also their families and friends.
“A foreign spy agency now has the ability to cross-check who has a security clearance, via the OPM breach, with who was cheating on their wife via the Ashley Madison breach, and thus identify someone to target for blackmail,” said Peter W. Singer, a fellow at the nonprofit New America Foundation in Washington and coauthor of the book “Cybersecurity and Cyberwar.”
The immense data troves can reveal marital problems, health issues and financial distress that foreign intelligence services can use to try to pry secrets from U.S. officials, according to Rep. Adam B. Schiff of Burbank, the top Democrat on the House Intelligence Committee.
“It’s very much a 21st century challenge,” Schiff said. “The whole cyberlandscape has changed.”
U.S. intelligence officials have seen evidence that China’s Ministry of State Security has combined medical data snatched in January from health insurance giant Anthem, passenger records stripped from United Airlines servers in May and the OPM security clearance files.
The Anthem breach, which involved personal data on 80 million current and former customers and employees, used malicious software that U.S. officials say is linked to the Chinese government. The information has not appeared for sale on black market websites, indicating that a foreign government controls it.
U.S. officials have not publicly blamed Beijing for the theft of the OPM and the Anthem files, but privately say both hacks were traced to the Chinese government.
The officials say China’s state security officials tapped criminal hackers to steal the files, and then gave them to private Chinese software companies to help analyze and link the information together. That kept the government’s direct fingerprints off the heist and the data aggregation that followed.
In a similar fashion, officials say, Russia’s powerful Federal Security Service, or FSB, has close connections to programmers and criminal hacking rings in Russia and has used them in a relentless series of cyberattacks.
According to U.S. officials, Russian hackers linked to the Kremlin infiltrated the State Department’s unclassified email system for several months last fall. Russian hackers also stole gigabytes of customer data from several U.S. banks and financial companies, including JPMorgan Chase & Co., last year.
A Chinese Embassy spokesman, Zhu Haiquan, said Friday that his government “firmly opposes and combats all forms of cyberattacks in accordance with the law.” The Russian Embassy did not respond to multiple requests for comment. U.S. intelligence officials want President Obama to press their concerns about Chinese hacking when Chinese President Xi Jinping visits the White House on Sept. 25.
After the recent breaches, U.S. cybersecurity officials saw a dramatic increase in the number of targeted emails sent to U.S. government employees that contain links to malicious software.
In late July, for example, an unclassified email system used by the Joint Chiefs and their staff — 4,000 people in all — was taken down for 12 days after they received sophisticated “spear-phishing” emails that U.S. officials suspect was a Russian hack.
The emails appeared to be from USAA, a bank that serves military members, and each sought to persuade the recipient to click a link that would implant spyware into the system.
Defense Secretary Ashton Carter said the hack shows the military needs to boost its cyberdefenses.
“We’re not doing as well as we need to do in job one in cyber, which is defending our own networks,” Carter said Wednesday. “Our military is dependent upon and empowered by networks for its effective operations…. We have to be better at network defense than we are now.”
Carter spent Friday in Silicon Valley in an effort to expand a partnership between the Pentagon, academia and the private sector that aims to improve the nation’s digital defenses. Carter opened an outreach office in Mountain View this year to try to draw on local expertise.
U.S. intelligence officers are supposed to cover their digital tracks and are trained to look for surveillance. Counterintelligence officials say they worry more about the scientists, engineers and other technical experts who travel abroad to support the career spies, who mostly work in U.S. embassies.
The contractors are more vulnerable to having their covers blown now, and two U.S. officials said some already have been compromised. They refused to say whether any were subject to blackmail or other overtures from foreign intelligence services.
But Evanina’s office, the National Counterintelligence and Security Center, based in Bethesda, Md., has recently updated pamphlets, training videos and desk calendars for government workers to warn them of the increased risk from foreign spy services.
“Travel vulnerabilities are greater than usual,” reads one handout. Take “extra precaution” if people “approach you in a friendly manner and seem to have a lot in common with you.”