AP Dozens of Former Nazies got Millions of U.S Social Security $$$

Millions in social security for expelled nazis
90 suspected Nazi war criminals and SS guards who collected millions of dollars in Social Security payments after being forced out of the United States, an Associated Press investigation found.
Former Auschwitz guard Jakob Denzinger settled in this pleasant town on the Drava River, where he lives comfortably, courtesy of U.S. taxpayers. He collects a Social Security payment of about $1,500 each month, nearly twice the take-home pay of an average Croatian worker.
TO MAKE IT WORSE

once these former Nazis were discovered, payments continued after they were expelled from the country in a bid to encourage them to leave the United States peacefully.
“at least 38 of 66 suspects removed from the country kept their Social Security benefits,”
At least four of these men are said to still be alive and receiving money from American taxpayers.

Justice Department’s Nazi-hunting unit, the OSI Office of Special Investigations never threw them OUT!
Legislation that would have closed the Social Security loophole failed 15 years ago, partly due to opposition from the OSI. Since then, according to the AP’s analysis, at least 10 Nazi suspects kept their benefits after leaving.
legal loophole that has given the U.S. Justice Department leverage to persuade Nazi suspects to leave. If they agreed to go, or simply fled before deportation, they could keep their Social Security, according to interviews and internal government records.
In newly uncovered Social Security Administration records, the AP found that by March 1999, 28 suspected Nazi criminals had collected $1.5 million in Social Security payments after their removal from the U.S.
@RepMaloney New York’s 12th Congressional District – Manhattan, Brooklyn & Queens
Rep. Carolyn Maloney, D-N.Y., demanded Monday that the inspectors general at the Justice Department and Social Security Administration launch an “immediate investigation” of the payments. Maloney is a high-ranking member of the House Oversight and Government Reform Committee.  In letters to the inspectors general at both agencies, Maloney called the payments a “gross misuse of taxpayer dollars.”

Researchers warn of new, meaner ransomware with unbreakable crypto

Researchers warn of new, meaner ransomware with unbreakable crypto
Move over, CryptoLocker. Criminals are talking up more advanced PowerLocker.
By Dan Goodin
Jan 6 2014
<http://arstechnica.com/security/2014/01/researchers-warn-of-new-meaner-ransomware-with-unbreakable-crypto/>
Security researchers have uncovered evidence of a new piece of malware that may be able to take gigabytes’ worth of data hostage unless end users pay a ransom.
Discussions of the new malware, alternately dubbed PrisonLocker and PowerLocker, have been occurring on underground crime forums since November, according to ablog post published Friday by Malware Must Die, a group of researchers dedicated to fighting online crime. The malware appears to be inspired by CryptoLocker, the malicious software that wreaked havoc in October when it used uncrackable encryption to lock up victims’ computer files until they paid hundreds of dollars for the decryption key.
PowerLocker could prove an even more potent threat because it would be sold in underground forums as a DIY malware kit to anyone who can afford the $100 for a license, Friday’s post warned. CryptoLocker, by contrast, was custom built for use by a single crime gang. What’s more, PowerLocker might also offer several advanced features, including the ability to disable the task manager, registry editor, and other administration functions built into the Windows operating system. Screen shots and online discussions also indicate the newer malware may contain protections that prevent it from being reverse engineered when run on virtual machines.
PowerLocker encrypts files using keys based on the Blowfish algorithm. Each key is then encrypted to a file that can only be unlocked by a 2048-bit private RSA key. The Malware Must Die researchers said they had been monitoring the discussions for the past few months. The possibility of a new crypto-based ransomware threat comes as developers continue to make improvements to the older CryptoLocker title. Late last month, for instance, researchers at antivirus provider Trend Micro said newer versions gave the CryptoLocker self-replicating abilities that allowed it to spread through USB thumb drives.

Computer Wonder Woman Stand Strong

 

Computer Wonder Woman

Great ad on women vs. men in power positions.
70% of men think that women need to downplay their personality to be accepted. Double standards hold women back. Because when you stand strong, you shine.

Financial Literacy: federal student loan borrowers repayment options

The Department’s Office of Federal Student Aid (FSA) announced an outreach campaign to groups of federal student loan borrowers to ensure they know and understand all their repayment options.  The new outreach augments the day-to-day communications provided by borrowers’ student loan servicers. FSA’s campaign is aimed at reducing borrower delinquency and default and improving awareness of income-driven repayment plans, which allow borrowers to repay their student loans on a sliding scale that adjusts their payments based on their income and family size.
·         A FSA blog post identifies “Four Things You Need to Know About Repaying Your Student Loans.”
·         A FSA blog post addresses “Which Student Loan Repayment Plan Should You Choose?”