cyber security

justice-500x310

19 Mar Exclusive: DOJ probes allegations that Tiversa lied to FTC about data breaches

Things are finally starting to break through. This is the tip of the iceberg. Stay tuned.

Originally posted Thursday March 17th on Reuters

Federal agents are investigating whether cyber-security firm Tiversa gave the government falsified information about data breaches at companies that declined to purchase its data protection services, according to three people with direct knowledge of the inquiry.

The Federal Bureau of Investigation raided Tiversa’s Pittsburgh headquarters in early March and seized documents, the people said.

The Justice Department’s criminal investigation of Tiversa began after Richard Wallace, a former Tiversa employee, alleged in a 2015 Federal Trade Commission hearing that the cybersecurity firm gave the agency doctored evidence purporting to prove corporate data breaches, the people said.

Wallace testified that Tiversa falsified information to make it appear that sensitive data was being accessed by users across the country.
(more…)

Read More
Screen Shot 2015-12-16 at 7.37.32 PM

26 Dec Steptoe Cyberlaw Podcast, Episode #94: An Interview with Mike Daugherty

The STEPTOE CYBERLAW PODCAST talked about in last week’s post is now live and a great listen!

Reblogged from Lawfare

With Wyndham’s surrender to the FTC after a brutal court of appeals opinion, the last outpost of resistance to the FTC’s cybersecurity agenda is Mike Daugherty, CEO of LabMD.  Daugherty refused to take the easy road and enter into a consent decree with the FTC to settle its claim that the company’s security was insufficient because of a file-sharing program installed on the corporate network.  That decision has cost Daugherty his company.  LabMD has ceased operations.  And it took him on an extraordinary odyssey through Washington that he has described in his book, The Devil Inside the Beltway, and in several speeches.  I caught up with Mike at the Black Hat Executive Summit where we were both speakers, and he kindly agreed to a short interview describing some of that odyssey.

Read More
Security_Breach_lg-300x168

16 Nov International Borders Mean Nothing When it Comes to Computer Hackers

Security_Breach_lg-300x168

Data breaches have become so commonplace that we almost expect them.

Credit cards are compromised when retail stores are hacked. Social Security numbers are at risk when government agencies or physician’s offices fall prey to phishing expeditions.

And those are just the perils the average American faces with domestic hackers. It’s just as easy for people from far-flung countries – some of whom may be working on the behest of their governments – to infiltrate our computer systems and disrupt our way of life.

“The Internet is taking down the borders around countries all over the world,” says Michael Daugherty, a cybersecurity expert and author of the book “The Devil Inside the Beltway: The Shocking Expose of the U.S. Government’s Surveillance and Overreach into Cybersecurity, Medicine and Small Business” (www.michaeljdaugherty.com).

This year, the federal Office of Personnel Management was hacked, putting the data of more than 22 million Americans at risk. That hack reportedly originated in China. In another case, four people were arrested this summer in Israel and Florida in connection with fraud schemes related to a 2014 hack of JPMorgan Chase & Co.

Meanwhile, The Wall Street Journal just recently reported that 29 countries have formal military or intelligence units dedicated to offensive hacking efforts.

“It’s scary what the possibilities are, because this isn’t quite the same as securing our borders against a military attack,” Daugherty says. “Not every country has a powerful military, but it’s so much easier to wage a cyber war.”

He suggests several reasons why this can be a concern for everyone.

• All individuals are at risk. Maybe no one in North Korea or Pakistan is targeting you personally, but that doesn’t keep you from being affected. “The downside of technology is that it pools everything together, and if someone breaks into it, there’s just a whole lot there to take,” Daugherty says. “Your information is there. My information is there. Everyone else’s information is there. That’s the problem from an individual American’s standpoint.”

Advances happen too quickly. The development of technology has moved so fast that government and laws have struggled to keep up. “We are still in a very early stage of an explosive new era of technology, almost like medicine was 150 years ago,” Daugherty says. “So we’re going to have governments behind. Everyone is behind. While on my recent speaking and book tour in Australia, I was saying there that it’s all the more reason why we have to help each other, co-educate and collaborate.”

Cyber attacks don’t need to be sophisticated. A hacker can use the email address of an employee of a federal agency to send emails with a malicious link to other employees. Those employees, thinking the email comes from someone they know and trust, open the email and the link, allowing the breach to occur. “This all boils down to knowledge and training,” Daugherty says. “You are only as strong as your weakest employee.”

About Michael J. Daugherty

Michael J Daugherty is Founder, President & CEO of LabMD, a cancer detection laboratory based in Atlanta, Georgia, as well as the author of the book “The Devil Inside the Beltway, The Shocking Expose of the US Government’s Surveillance and Overreach into Cybersecurity, Medicine and Small Business.” The book details Daugherty’s battle with the Federal Trade Commission over its investigation into LabMD’s data security practices. It is an insider’s look at how agencies exploit the Administrative Procedure Act to grab for power by exploiting the small and weak to control the big and powerful.

Because of his work, Daugherty has testified before the House of Representatives House Oversight Committee and regularly keynotes in front of healthcare, law, business and technology audience educating them on what to expect when the Federal Government investigates you. He spoke at the Gartner Security Summit in Washington, D.C., in June and in August also spoke at a Black Hat USA security gathering in Las Vegas. He holds a BA in Economics from University of Michigan-Ann Arbor, regularly blogs at www.michaeljdaugherty.com and sits on the board of Snoopwall, a privacy company based in Nashua, N.H. He is also a pilot and resides in Atlanta, Ga. He can be followed on Twitter at @DaughertyMJ.

Reblogged from IT Briefcase

 

Read More
Screen Shot 2015-09-21 at 6.51.57 AM

21 Sep The Game Begins. Episode 2: The Devil Inside the Beltway

Screen Shot 2015-09-21 at 6.51.57 AM

 

Welcome back for Episode 2: The Game Begins


The phone rings out of the blue. It’s a company out of Pennsylvania that says they found one file with 9,000 of our patients billing information in it.
Episode Two of an eight part saga based on the book by Michael J. Daugherty, The Devil Inside the Beltway – The Shocking Exposé of the US Government’s Surveillance and Overreach into Cybersecurity, Medicine and Small Business.

Read More
Screen Shot 2015-08-18 at 1.57.16 PM

18 Aug Cybersecurity Expert Michael Daugherty To Speak At Gartner Summit In Australia

 

Screen Shot 2015-08-18 at 1.57.16 PM

 

ATLANTA, Ga. – Michael Daugherty, a cybersecurity expert and author of the book “The Devil in Inside the Beltway” (www.michaeljdaugherty.com), will be a case-study speaker at the Gartner Security & Risk Management Summit in Sydney, Australia.

The summit, scheduled Aug. 24-25, is Daugherty’s first stop on a speaking tour of Australia.

Daugherty’s speech at the Gartner summit is titled “A Matter of Style – How America’s FTC’s Tricks, Tactics and Agenda Impact World Cybersecurity.”

The Gartner summit is designed to equip security and risk managers with the skills, knowledge, strategies and tactics that enable cost-effective security and risk management programs.

Daugherty, speaking on day two of the summit, will discuss the story told in his book of his experience with the Federal Trade Commission. That experience began in 2008 after his company, LabMD, received a call from Tiversa, a technology security firm. Tiversa claimed that LabMD patient-billing information was vulnerable and offered its services, for a fee, to fix the problem, Daugherty says.

He viewed the call as a shakedown and declined. Tiversa turned over its information to the FTC, which launched an investigation. In August 2013, the FTC filed a formal complaint, alleging that LabMD failed to reasonably protect the security of consumers’ personal data, including medical information.

Daugherty scored a significant victory May 5 when a former Tiversa employee testified in the FTC case that Tiversa did not find LabMD patient information on Internet sites, but instead hacked into LabMD’s computer system.

Daugherty recently spoke on cybersecurity and healthcare at a Black Hat USA security gathering in Las Vegas and at the annual DefCon hacking conference.

For more details and an events summary, click here.

Read More
mafia-620x420

30 Jun Cybersecurity Firm Tiversa Accused of Extortion

mafia-620x420

Reblogged from Hacked – written by Neil Sandesai – to view the original post, click HERE

Large corporations and government organizations are often targets for hackers, and as a result, rely on cybersecurity firms to provide security guidance. However, in an ironic twist, one cybersecurity firm may have actually hacked its own clients. Tiversa is a Pittsburgh-based security consultancy, and according to an ex-employee, Tiversa stages data breaches to extort clients.  

Tiversa’s Mafia-Style Tactics

According to Richard Wallace, the whistleblower accusing Tiversa of fraud, Tiversa engages in mafia-style shakedowns to pressure potential clients. Wallace gave his testimony in a federal court in May, and according to a transcript obtained by CNNMoney, Tiversa’s strategy can be summed up as, “Hire us or face the music.”

Wallace describes how Tiversa ruined at least one company – LabMD, a small Georgia-based cancer testing laboratory. While working as an investigator at Tiversa, Wallace hacked LabMD’s servers and obtained a file containing patient data. His then-boss, Tiversa CEO Robert Boback, asked Wallace to make it look as if the breach had originated from IP addresses associated with known identity thieves. Tiversa then approached LabMD, informing the company that it had been hacked, and offered “incident response” services. However, LabMD refused to pay up, and Tiversa threatened to notify the Federal Trade Commission of the (staged) data breach. Soon afterwards, Tiversa carried out the threat, and the FTC ended up taking LabMD to court. LabMD ultimately had to let go of its staff as the long legal battle bankrupted the company. According to Michael Daugherty, CEO of the now-dead cancer lab,

We were a small company…It’s not like we had millions of dollars to fight this and tons of employees.

There was reputation assassination. There was intimidation. We thought we were extorted. My staff and management team was demoralized. My VP left. My lawyer left.

Furthermore, the LabMD incident isn’t the only example of Tiversa making up a hack, says Wallace. Tiversa also made up information pointing to Iran for allegedly stealing blueprints for Marine One, President Obama’s helicopter. If Wallace’s story is true, LabMD and other companies may have been destroyed by fraudulent “evidence.”

Tiversa has firmly denied Wallace’s allegations, dismissing them as “baseless” claims from a disgruntled former employee. Tiversa’s CEO told CNNMoney,

This is an overblown case of a terminated employee seeking revenge…Tiversa has received multiple awards from law enforcement for our continued efforts to help support them in cyber activities.

However, if the allegations against Tiversa are true, they will be very embarrassing for the company and its highly-decorated board members, including Wesley K. Clark, former NATO Supreme Allied Commander in Europe, and Howard Schmidt, former cyber-security coordinator for the Obama administration.

Read More
image

06 May Analyst Backs LabMD In FTC Row, Alleges Fraud At Tiversa

image

Originally posted on Law 360

By Jimmy Hoover

Screen shot 2014-08-22 at 5.55.03 AM

Law360, Washington (May 05, 2015, 9:16 PM ET) — LabMD Inc. on Tuesday scored a major hit in its data security fight with the Federal Trade Commission after a former analyst at the cybersecurity firm Tiversa Inc. testified that his company lied to the agency about the extent of LabMD’s data leaks after the medical testing firm turned down its services.

Richard E. Wallace said in a hearing that during his time as one of the company’s chief forensic analysts from 2007 to 2014, he helped Tiversa and CEO Robert J. Boback spin lies to the FTC about the “proliferation” of LabMD-held insurance records among identity thieves — which LabMD claims is the sole basis for the agency’s 2013 administrative complaint against it for alleged data protection failures.

Wallace said that, rather than a proliferation, he merely downloaded a file off of LabMD’s own server and manufactured those claims per Boback’s orders, who he said wanted to steer LabMD into using Tiversa’s monitoring and remedial services.

According to Wallace, Boback became infuriated that LabMD’s president and CEO, Michael J. Daugherty, rejected their services.

“[Boback] basically said F-him, make sure he’s at the top of the list,” Wallace said at the hearing, describing the Tiversa CEO’s reaction to LabMD’s refusal of services.

Atlanta-based LabMD conducts laboratory tests on samples that physicians obtain from patients and also performs medical testing for consumers around the country.

Tuesday’s proceedings before Administrative Law Judge D. Michael Chappell had stalled for several months after Wallace revealed that Tiversa had emerged as the subject of an investigation from the House Committee on Oversight and Government Reform and that he was pursuing immunity for his testimony in the FTC proceedings — immunity he finally received.

Wallace said that he left the company in February 2014 after Boback had pressured him to lie under oath in a planned deposition from LabMD’s attorneys about the extent of LabMD’s data leaks.

According to LabMD’s attorney Reed Rubinstein of Dinsmore & Shohl LLP, the testimony marked a “remarkable day” in the case and vindicated the company’s assertion that “the FTC action was based on manufactured evidence.” At the close of the hearing Tuesday, Rubenstein announced that LabMD will seek a criminal investigation against the Tiversa.

“Obviously the FTC never checked what came in from Tiversa,” Rubinstein said in an interview with Law360.

Under direct examination from William A. Sherman II of Dinsmore & Shohl, Wallace outlined a pattern of fraud and deception at his former company and said it was “common practice” at Tiversa to deceive companies into believing identity thieves had stolen their files off of peer-to-peer networks in an effort to charge for remedial services.

Wallace said Tiversa carried out the scheme by inserting the IP addresses of known identity thieves into a “data store” and making it appear to the companies that the identity thieves had pilfered their files, despite the fact that they had already been shut down by law enforcement. Because their computers were down, Wallace said, “there was no way to contradict what Tiversa was saying.”

During a re-direct examination Tuesday from his own attorney, Mary Beth Buchanan of Bryan Cave LLP, Wallace also recounted an episode in which Boback allegedly forced him to conjure up a report claiming that trade secrets related to the avionics found in the cockpit of Marine One, the helicopter for presidential transport, had been stolen by Iranian nationals — a fake story later plastered in headlines across major news outlets including, CBS News, NBC News and Fox News.

“It was very big press for Tiversa. And believe it or not, it was not easy to find an active Iranian IP address that law enforcement couldn’t get a hold of,” Wallace said.

The FTC declined an opportunity to depose as well as cross-examine Wallace on Tuesday, though FTC attorney Laura Riposo VanDruff indicated that she may file a motion to introduce a rebuttal witness within the next week.

Counsel for Tiversa and Boback could not be immediately reached Tuesday for comment.

LabMD is represented by William A. Sherman II, Reed Rubinstein and Sunni Harris of Dinsmore & Shohl LLP and Hallee Morgan, Kent Huntington, Daniel Epstein, Patrick Massari and Prashant K. Khetan of Cause of Action.

The FTC is represented by Alain Sheer, Laura Riposo VanDruff, Megan Cox, Ryan Mehm, John Krebs and Jarad Brown.

The case is In the Matter of LabMD Inc., docket number 9357, before the Federal Trade Commission Office of the Administrative Law Judges.

–Editing by Emily Kokoll.

To download your own copy of this article, click here

Read More

17 Oct Cyber-Sleuth or Cyber-Thief? LabMD Case Continues to Expose the Good, the Bad, and the Downright Ugly in Cyber-Security Developments

Screen Shot 2014-10-17 at 9.10.21 AM
header

LabMD and Michael Daughterty made the HIPAA, HITECH & HIT this week!

Elizabeth Litten, esq., of the firm Fox Rothschild, writes in her article dated Oct 15th, about the recent news regarding the FTC vs LabMD case. Read below about allegations that the LabMD file was never anywhere but the LabMD computer until Tiversa took it…and wasn’t after they took it either.

 

LabMD, Inc. CEO Michael J. Daugherty continues to doggedly defend LabMD against an action brought by the Federal Trade Commission (FTC) against LabMD based on Section 5 of the FTC Act.  He now has an opportunity to prove himself the “good guy” following last week’s decision by Chief Administrative Law Judge D. Michael Chappell granting LabMD’s motion that Chappell formally request an order from the U.S. Attorney General to compel testimony from, and provide immunity to, a key witness expected to expose the dirty investigative tactics and tainted facts relied upon by the government in bringing the action against LabMD.  The key witness is a former employee of Tiversa Holding Company, Inc. (“Tiversa”), the company that dredged up a patient data file, leading the FTC to claim LabMD had “unreasonable data security practices” that were “likely to result in unauthorized exposure of data” in violation of Section 5.   So who’s the “bad guy” here?

The witness is expected to testify that, contrary to allegations that form the bedrock of the FTC’s action, Tiversa did not find LabMD’s patient data file on four separate internet addresses as the result of a LabMD employee’s unauthorized download of a peer-to-peer (“P2P”) music-sharing app on a company computer.  Rather, using what Tiversa has referred to as its high-powered, patent-pending search engine technology, Tiversa found the patient data file only on a LabMD computer.

 

To quote the last sentence of the article:

“…this case is ugly and certainly does not create a high level of confidence in the cyber-security investigation and enforcement tactics utilized by the FTC.”

To read more of the article, click  HERE

Read More
The FTC is Suing me...

27 Apr The FTC is Suing Me…..Rerun

Now that I am about one month away from our trial in front of the FTC’s court, I thought it would be a good idea to rerun this blog post. I will be bringing everyone up to date later this week on what has been going on lately. Government Overreach and draining victims dry is not the most effective way to protect consumers. As a matter of fact, it wastes resources and drives healthcare providers away from trusting the government. But nothing ever stopped a lawyer in need of job security and an employee of the month award. Fasten your seatbelts.

This post was originally posted HERE

 

The cat has finally come flying out of the bag. In 2008, someone (and we know exactly who it is) took our file without authorization. We believe it has always been secure and still is. Why do we believe this? Because the people who took it were subsidized by U.S. government agencies.

Since January 2010, the FTC has been sniffing around, wondering if our practices are up to snuff. Notice I say practices and not standards. The Feds have not pointed out any standards! Also, we are quite up to snuff, thanks very much. It’s hard to break a law when there isn’t one. Unfortunately, my MindReader3000 broke just hours before they showed up. Don’t you hate that?

Judging by the FTC’s practices, they seem to have opened their playbook to the page on digging in and driving a good citizen nuts. As houseguests, they are rude, silent, and terrible. Run the other way if you see them in your neighborhood. They hover like a dinner guest who stays for months—the epitome of rude and selfish. Did I mention they are also poor conversationalists? Aside from asking for another helping of whatever they want, the FTC doesn’t say much, but it’s not a pretty picture if you don’t have the steak cooked exactly to their liking. Apparently nothing we’ve served has been to their liking, yet we are positive that we did what they asked.

Are they trying to drive us so nuts that we’ll finally do and say anything necessary to make them leave? They don’t even really have a reason to stick around aside from “just doing their jobs.” Since this administration showed up, it seems like all the government agencies have been “just doing their jobs” in this manner. It’s almost like being cyber-waterboarded.

We’ll never give in! Self-appointed savior of the world or not, the FTC is a rude houseguest, and we won’t make up a lie about our cooking just to get them out. That would be giving them exactly what they want. Why validate such vile behavior from these occupiers?

So, what exactly does one do when big brother is hovering, knocking, poking, not playing nice, and won’t go home? Speaking for myself, I shine a light on how “he” conducts himself and scream from the rooftop to alert the neighbors. Of course, I still mind my manners–go along hoping the growling dog won’t attack or bite. I’ll throw them all the treats they want! We’ve always conducted business in an honest, sincere manner, so there’s nothing to hide. Despite our efforts to get the FTC to laugh and wag its tail, nothing seems to work. Sigh….

This is a LONG story so I am writing a book titled “The Devil Inside the Beltway.” I don’t want to write a book; I HAVE to write a book. There is way too much juicy stuff to cram into a sound bite or two-minute video. A book is a LOT of work. I started in April. Now that the cat is out, I have to finish ASAP, so I am flying to London next week to get it done. Then the editors dig in — developmental, copy, line, and all sorts of prep work prior to launch.

Soooooo…welcome to my website!

As the story unfolds, I will bring to you my experience of just “how they do it;” how our property (a data file with patient information) was taken, how it was presented to the U.S. Congress, how it ended up in the Congressional record without our knowledge or permission, how we were extorted, questioned, investigated, and manipulated. I will tell you how they don’t like it one bit if they have to break a sweat.

Yeah. The bad houseguest sued me last week, so my author page had to turn into a landing page. Spread the word. Turn on the lights. Ask me questions as I unfold the scary and true story of how one fluke after another, combined with an agency of the self-righteous, brought me to this place.

 

I want to tell you so you know. I want to tell you so it won’t happen to you. I want to tell you so, if it does happen to you, you will know what to do. Trust me, when this happens, dialing 911 or 1-800-LAWYER will not summon Superman. However, we are doing well. Our customers support us 100%. We are going to make it, and I look forward to sharing our story with you.

You won’t have to choose to believe me; most of this is in writing.

Until we meet again,

Mike

 

Michael Daugherty is President & CEO of LabMD, an Atlanta-based clinical and anatomic medical laboratory with a national client base. Mike founded LabMD in 1996 after 14 years in surgical device sales with U.S. Surgical Corp. and Mentor Corporation.

Outside of LabMD, enjoys playing tennis, travel, and flying his Cirrus SR22 Turbo single engine aircraft.

Mike can be found:

FacebookTwitter * LinkedIn * Pinterest

Google+ Michael J Daugherty

Read More
lipstickpig

07 Apr Don’t be Seduced by Pigs Wearing Lipstick:

lipstickpig

Graphic credit to Mick Coulas

The FTC Testifies Before Congress Using Fear in Their Thinly Veiled Grab for More Power

On April 2, 2014, FTC Chairwoman Edith Ramirez performed a classic display of Government Agency Contempt of Congress as she attempted to seduce Congress into giving her agency more power. She wants power to further pound companies into submission before they can get to a fair and impartial court, power to mislead the public regarding FTC effectiveness, and power to keep Congress from understanding that bully agencies like the FTC keep the American public exploited by hackers and cybercriminals.

With all the chest beating of the US Government agency complex, I remind you that Edward Snowden walked out with a thumb drive. Hero or traitor is not the issue. The issue is hero or traitor, someone walked out with a thumb drive. In the meantime, Edith Ramirez and her merry band of sheriffs want to keep beating up victims. This may make for great theater, this may allow hollow congressmen to back slap and light cigars, but this will never solve the problem.

The tools that Chairwoman Ramirez employs come straight out of the FTC’s “congressional testimonial strategy handbook”; speak briefly using broad and vague terms, assume Congress approves your powers until restricted otherwise, use Heads on Spikes to show the world all the “good” you are doing while you scare everyone else by implying this could happen to them, and finally, keep your mouth shut about the false confessions extracted by holding guns to the heads of victims.

As the FTC knows all too well, the dead and injured are unable to give their side of the story. And who needs to be bothered by petty annoyances like due process and legal integrity when there is so much to do?

Let’s dig a bit further into a couple of their favorite tricks:

Assume regulatory powers are theirs until stopped by Congress or the Courts

The FTC chants every morning like a drunken yogi that they have “broad powers assigned by Congress”. They think that means they rule the world. Given what we have seen from the IRS when an agency is given “broad powers”, this is nothing to brag about. But Congress, in its infinite laziness and fear of public accountability, tossed away the political hot potato by creating regulatory agencies intent on executing Congress’s dirty work. It’s Congress’s version of outsourcing.

While Congress has never assigned the FTC power to regulate data security, the FTC screams “loophole”. Congress didn’t state the FTC didn’t have the power, so, to the assumptive FTC, that means they do. If you want to climb Justice Mountain to get a federal court to rule otherwise, you are going to have to pony up at least a million dollars while Congress stays asleep at the wheel. In the meantime, the courts may roll their eyes and rule that, yes, it is a terrible law, but it is Congress’s terrible law, not the courts, so if you want change it, go complain to Congress.

This is called “running the prisoner until he drops”. There isn’t a more inefficient and corrupt road to justice that waiting for Congress to get something done. And the FTC knows this. They revel in it. The power that the FTC has stacks the deck dramatically in their favor.

Congress probably doesn’t even realize it lets the FTC:

  • Make their own rules.
  • Police themselves.
  • Oversee their own internal administrative court system (think kangaroos).

This has completely shredded the founding fathers intent in separating government powers. We don’t have to speak in theory now…we are currently experiencing a plethora of government agency overreach under the guise of saving the world. “Trust but verify” has been replaced with “trust us you fool”.

Parade around DC with Heads on Spikes

She makes it sound so sweet, but Ramirez is a hissing snake as she announces her list of consent decrees that she likes to call “settlements”.  It would be more accurate to call them extortions. She repeatedly disparages prior companies that had no idea they would receive this repeatedly public reputation assassination for years to come.  Failing to mention her buried fine print that clearly states no wrongdoing was admitted, here arrives more lying through omission.

Companies blocked from their day in even a lopsided and biased court, because they were forced to choose between settling or draining their bank accounts, then continually assassinating their reputation for years to come in hearings and print is a disgusting display of misleading the public and the companies the FTC “settles” with.

We now observe there is no real settling with the FTC. They have become a chronic disease, at every turn forgetting our foundational right of innocence until proven guilty. Yet the FTC extorts these decrees and then brags like they won a jury verdict. Ramirez plays her poker well. She doesn’t have to act long. Congress will move their attentions to something else in a matter of moments. Mission accomplished.

And are we safer? No.

What the FTC doesn’t want you to know is that so many of the files floating around cyberspace are precisely due to the FTC’s ignorance and incompetence. In my new book, The Devil Inside the Beltway, I specifically lay out how the FTC blew the corrective control of P2P malware. Giving a regulatory agency power over technology is like handing Kathleen Sebelius a scalpel and sending her into surgery. This is a dangerous game.

Keep your mouth shut about the false confessions extracted by holding guns to the heads of victims

Congress has allowed the FTC to play judge, jury and prosecutor in their Administrative court, making their rules so lopsided that their victims are beaten into submission and silence. With silenced victims, Congress stays blissfully ignorant of the medieval tactics their spawn employs.

In these congressionally created star chambers, called administrative court, the FTC has the power to:

  • Rule on motions to dismiss, rather than the judge
  • Rule on motions to quash, rather than the judge
  • Require defendants to get FTC signature approval before sending subpoenas.
  • Reject the judge’s ruling.

I could go on…but you get the point. And what does the media do? Nothing. The power slant is so outrageous yet hidden the media can’t comprehend it. That would involve paying attention for more than five seconds.

As long as the FTC keeps it on the down low, plays circle and confuse but is sweet in front of Congress, and gets the hell out of the hearing as fast as possible, this charade is going to continue. Our safety, however, will continue to erode.

The FTC is a fearsome bully that has made us less safe. Shut down the FTC and any and all other agencies that put their job security in front of the national security. This is the tip of the iceberg and it is even chillier below the surface.

Read More