Ontario CAS Data Breach: Why Won't the Crown set a Trial Date? | Unpublished
Hello!
×

Warning message

  • Last import of users from Drupal Production environment ran more than 7 days ago. Import users by accessing /admin/config/live-importer/drupal-run
  • Last import of nodes from Drupal Production environment ran more than 7 days ago. Import nodes by accessing /admin/config/live-importer/drupal-run

Unpublished Opinions

Derek James Flegg's picture
Smiths Falls, Ontario
About the author

Advocates for family preservation against unwarranted intervention by government funded non profit agencies.

Like it

Ontario CAS Data Breach: Why Won't the Crown set a Trial Date?

March 28, 2017

UPDATE: As of 29/03/17 A trial date has finally been agreed to.

Stay tune for more updates.

 

THE GAME IS AFOOT.

On March 27th, many weeks after offering Kelley a deal to plead guilty with a slap on the wrist which Miss Denham refused to take - the Perth Crown again asked for another delay before setting a trial date in order to bring in an outside judge to preside over the case.

The judge the crown wants is a former CAS lawyer.

Here's an article from the only news agency to actually speak with Kelley Denham about the breach before the allegations.

Names of 285 people referred to children's aid in Lanark, Leeds and Grenville posted online

She was ready to tell all then and still is now despite the many attempts to demonize her actions or pawn her off as just another vengeful disgrunted parent. 

 

CAS ordered to pay my legal costs after Judge rules they unnecessarily brought our family to court, at the cost of Ontario tax-payers. One month later, I have the cheque in hand. Visit kelleyandderek.com

SEE: “Mr. Rogers, It Will Be A Short Retainer”

Or do you want to see the cheque now? 

 

WHAT HAPPENS WHEN THE CHARGES DON'T FIT THE "FACS"

DELAY, DELAY AND MORE DELAYS BY THE CROWN.

Why is it it's the crown wanting a special judge at this late stage in the game and not Miss Denham - and why didn't the crown make the request for special judge 3 months ago considering he's been saying it would be a ten day trial right from the start?

What if the allegations made by FCSLLG are false and Kelley Denham didn't hack FCSLLG's computer because she didn't have to and the document allegedly posted on Facebook wasn't. What will that mean for FCSLLG after trial? 

Did FCSLLG board members really need a password to access confidencial information on FCSLLG's computer system and did FCSLLG actually have any cyber security? Mainstream media seems to assume they did calling it a cyberattack and a hack.

Lemay admits the report was on the FCSLLG's website but says it was hidden behind several layers of security including a password given only to the organization's board of directors.

"You have to go through the back door. You have to be looking for this," he says. Did FCSLLG hide a loaded gun in their digital lobby and assume no one would see it or be extremely shocked to find it without hacking or knowing how to hack? As the statement of claim points out she has no obvious hacking skills and why would that be, because she has none. 

This was the second time in about three months that the organization has had to take down its website because of security concerns. An outside expert was brought in after a February scare to better secure the website. No sensitive information was revealed or even in danger in the first breach, Lemay says. He says they made the changes and were told the website was secure - though and insider has stated not one of the recommendations made by the expert were implemented.

Names of 285 people referred to children's aid in Lanark, Leeds and Grenville posted online

WHAT DID FCSLLG KNOW AND WHEN DID THEY KNOW IT?

Watch the video DENHAM VS FCSLLG to find out.

So what is corporate internet security and is this what Lemay meant when he says FCSLLG had security? 

Corporate Internet Security - Is it all just programs, passwords and multiple layers of file folders to protect your business computer and client information or is there real hardware involved?

Yes there is real hardware and specially designed software and I bet you won't find anything like it in FCSLLG's budget reports.

Here's an older model of one the many devices on the market to protect corporate networks and confidential client information and a little about what it does.

Juniper Networks ISG Series Integrated Security Gateways.

JNISG is a purpose-built, security solution that are ideally suited for securing enterprise, carrier, and data center environments where consistent, scalable performance is required.

Network segmentation: Security zones, virtual systems, virtual LANS and virtual routers allow administrators to deploy security policies to isolate guests and regional servers or databases.

Does anyone think this is what Lemay meant when he said FCSLLG had layers of security?

Optional Integrated IDP:

The ISG Series firewall/VPN with IDP uses the same award-winning software found on Juniper Networks IDP Series appliances.

The IDP security module combines eight detection mechanisms, including stateful signatures and protocol anomaly detection.

The ISG with IDP defends against security threats such as worms, trojans, malware, spyware, unauthorized users and hackers and can provide information on rogue servers and data on applications and operating systems that were inadvertently added to the network. Application signatures enable administrators to maintain compliance and enforce corporate business policies with accurate detection of application traffic.

SEE: Hyperlinks not considered ‘publications,’ rules Supreme Court. Written by Gail J. Cohen Wednesday, 19 October 2011

Justice Rosalie Abella writing for the majority of the nine-judge panel, states: “Hyperlinks are, in essence, references, which are fundamentally different from other acts of ‘publication.’

"A  hyperlink, by itself, should never be seen as ‘publication’ of the content to which it refers." When a person follows a hyperlink to a secondary source that contains the confidential information, the actual creator or poster of the confidential information in the secondary material is the person who is publishing.

Hyperlinks not considered ‘publications,’ rules Supreme Court

WHAT'S MAINSTREAM MEDIA NOT TELLING YOU ABOUT ONTARIO CAS DATA BREACH TRIAL AND WHY WON'T THE CROWN SET A TRIAL DATE?

Find out here: The Crime Hump Chronicles: Blue Balls Of Justice

What's in the funny papers today?