Natural Solutions Foundation
www.GlobalHealthFreedom.org
UPDATED INFORMATION – May 26, 2009
Link to the Emergency Appeal about the attack against the Foundation: http://drrimatruthreports.com/?p=2726
We continue to receive letters of support and help from the members of the Health Freedom Action eAlert team. Here are two letters and my response, giving more details of the cyber attack and what we are doing to stem it.
Letter of Support
Letter from Cyber Expert
Response from Counsel
Report to US CERT (Computer Emergency Response Team)
——————————————————
“> I must ask you a favor, if you are willing, as I know you have quite a few
> readers, and we need as many as possible to respond as quickly as possible.
> If you have friends with their own large readership, please immediately tell
> them too. We have next to NO TIME on this one.
>
> I am writing to you because of what I consider to be a national
> emergency that is real, and in fact in my mind it is a global emergency.
> You are on my growing list of heroes, which I started to keep the attention
> on those that are doing so much good, instead of the spotlight always being
> only on the criminals attempting to run the planet and those below them who
> are aspiring to the same, on their own level. Well, there is a great lady
> who is also on my heroes list. Her name is Rima Laibow. She is a medical
> doctor, one of the small minority that is a real doctor not a drug dealer.
> She had a great practice in natural healing that was doing very well, but
> gave it up to pursue, along with her husband (retired General Bert Stubblebine) the
> defeat of CODEX worldwide. This program is one of the deadliest of attacks
> (among many that are proceeding in parallel against us), and Rima’s work
> worldwide is critical to our current and future well being. To our shame,
> her organization is running on a ridiculously small budget, and now that is
> being attacked because of the amazing work she is doing. I am attaching her
> latest email to all those on her list. It needs to go EVERYWHERE, and it
> needs to go everywhere NOW. She only has about 250,000 on her email list,
> and many many more are needed immediately to prevent her work from being
> stopped according to the wishes of our Rulers.
>
> If you are not already familiar with her work, please catch up on it
> right away, few things are more important, more positive, or more
> inspiring. This is really important. As much money as
> possible needs to be pumped into her account NOW and it needs to continue,
> but far too few are aware of her, or aware of the stakes.
>
> Please help. I am copying and pasting her appeal below. If you need
> a nutshell recap of CODEX, call me, I’ll be pleased to fill you in as
> needed. Thank you very much.”
More on Codex Alimentarius (the World Food Code):
http://drrimatruthreports.com/?page_id=161
About our accomplishments:
http://drrimatruthreports.com/?page_id=195
———————————————————-
And this from a cyber-attack expert:
“> > I work for a company called located in Los Angeles, CA and we have a great
> > deal of experience in fraud, embezzlement, ponzi schemes,
> > etc. I would like to catch the people that have caused you a
> > great deal of harm. My biggest concern is you continuing to use your
> > computer system on a daily basis which makes it a lot harder to track dates
> > and times that emails were sent or payments received or to track when these
> > attacks took place.
> >
> > I would suggest you do a Penetration Test on your system immediately.
> >
> > If you are interested in getting real help with a problem that seems to go
> > on frequently (as I have gathered since reading your emails for the last
> > year) then give me a call. I think it is time to put a stop to this nonsense
> > and make your system stronger and less prone to attacks from outside sources.
> >
> > We charge $325/hour and we can get started right away (as early as next
> > week) to get you on the road to recovery.
> >
> > Please call me and let me know if you would be able to afford our services
> > now or in the near future. I understand that you have lost a lot of money.
> > But you can catch these people and make them pay for their wrongdoing. We
> > are very successful in winning cases.”
——————————————————————————
And here is what I wrote back:
“Thank you for your concern. We are considering all of our options. Your
advice, based on the below, would be appreciated.
Please understand that in the fine print of the authorize.net contract is
language that the company interprets to allow them to charge us for attempts
to “donate” to us even when those attempts are fraudulent. We paid extra for
their fraud protection, but they still wanted to charge us for the cyber
attack.
We asked them to “donate” their charges to us, so they would have a tax
write-off instead and we could tell the world what a public-spirited company
they were. Instead, we got stonewalled and they back-charged our account for
their claimed fees.
The criminal behavior was whoever placed those about one hundred thousand fake
“donations” — authorize.net was just acting as a bad corporate citizen, not
as a criminal. However, their inability to protect us from the attack is
something anyone should consider who might want to use their services.
We told authorize.net about the attack (you would have thought they would have
noticed a hundred thousand transaction attempts…)
Here is what our investigation has shown so far:
1. They allowed huge numbers of fraudulent or suspicious charges through
despite clear indications that they were “bot” activity.
2. They permitted the charges to continue after we notified them.
3. They sold us a “Fraud Detection Suite” which did not detect the obvious
fraud.
4. They continued to allow the charges despite the fact that they had been
notified.
5. They took money from our bank account without notification.
6. They continue to send us settlement statements despite the fact that we
have officially closed the account BUT it is no longer possible to access our
data.
7. Legitimate charges were blocked while over 100,000 suspicious ones were
allowed through.
8. We received no notification of any problem from them – even after we
notified them of the fact that there was a problem, they took no apparent
action.
What authorize.net did drained our account of the funds we needed to catch-up
with Democracy in Action (DiA) – the platform we use for our eblasts. All the
nonprofits are hurting right now and DiA’s members (of which we are one of
several hundred) have all fallen behind, so the people who run that
organization felt they had to get tougher with its members, us included.
The two problems hit at the same time, leaving us at risk of being shut down.
We can recover from the attack. We will not be shut down.
The people on the Health Freedom Action eAlert list have responded with great
generosity, so much so that we can cover the funds taken by authorize.net,
catch up with DiA and Bert and Rima will be able to attend the next Codex
meeting!
We are in deep gratitude for the extraordinary response to the emergency appeal.
Ralph Fucetola JD, Trustee”
And we do need all the support we can get.
Please donate here:
http://drrimatruthreports.com/?page_id=189
—————————————————–
Report to US Computer Emergency Response Team (CERT)
May 26, 2009
Form at: https://forms.us-cert.gov/report/ – Report No. 2009-USCERTv31SJFG6
Phone: +1 888-282-0870 – Email: soc@us-cert.gov – Web: http://www.us-cert.gov/
From: Ralph Fucetola – ralph.fucetola@usa.net
Are you reporting as part of an Information Sharing and Analysis Center (ISAC)?
No, this is not an ISAC report
What type of organization is reporting this incident?
Private Sector
What is the impact to the reporting organization?
High
What type of follow-up action are you requesting at this time?
Contact
Describe the current status or resolution of this incident.
Contained
From what time zone are you making this report?
(GMT-05:00) Eastern Time (US & Canada)
What is the approx time the incident started? (local time)
May 20, 2009 17:57
When was this incident detected? (local time)
May 24, 2009 17:57
Please provide a short description of the incident and impact
Natural Solutions Foundation is a recognized nongovernmental organization in the US and several other countries. Over a several day period some persons unknown to us attempted to \”donate\” $1.00 over 100,000 times. Our merchant banker, authorize.net, charged us for each item in this fraudulent cyber attack — they had no incentive to stop it since they profited from it. Even their \”Fraud Detection Suite\” for which we paid extra did nothing to stop it. Finally we had to cancel the account. We wonder how many other NGOs and companies have been victims of similar cyber attacks not stopped by authorize.net? We believe this cost us over $8,000 in fees. We\’ve posted information about this on our blog:
http://drrimatruthreports.com/?p=2732
Ralph Fucetola JD Natural Solutions Foundation Trustee All rights reserved.