Archive

Category Archives for "BACKGROUND"

History of Labor Day

The wrong reputation

Summer is technically over on the Autumn Solstice (between the 21st and 24th of September) but for many, Labor Day (September 4th) heralds the beginning of the end, causing many to view it through a bittersweet lens. Many forget that Labor Day was not created to signal the end of a season, it was meant to signal the end of worker oppression.

Labor Day honors the long and toiled history of labor in the United States. Before the 8-hour workday, people typically worked 10 to 16 hour days, 6 days a week and -- despite laws being passed -- endured years of poor working conditions and strikes for their rights. Labor Day recognizes the strength and appreciation of the American workforce.

In an effort to spur and support worker’s rights, the first Labor Day celebration was held on September 5, 1882. In 1887, the first state to make Labor Day a holiday was Oregon, with New Jersey, New York, and Colorado following suit. In 1894, after public outcry over the death of workers during the Pullman Strike, President Grover Cleveland made it a national holiday and a symbol of the Labor Movement.

The wrong representative?

There’s still debate over who actually founded Labor Day: Peter J. McGuire (the man with the plan) or Matthew Maguire (the man who acted on the plan).

Peter J. McGuire was the founder of the United Brotherhood of Carpenters and co-founder of the American Federation of Labor (AFL). He led a series of strikes that led to the enforcement of the 8-hour workday law (originally passed in 1868, by the way). On a trip to Toronto, he observed a Canadian Labor Day celebration where 1/10 of the population of Toronto marched for unions and better labor laws. Inspired, he suggested that the Central Labor Union of New York do the same.

Working as Secretary of the Central Labor Union of New York, Matthew Maguire (note the different spelling of the last name) organized that very first Labor Day parade. A machinist and radical figure in the Socialist Labor Party of America, he also led strikes in the 1870s against working conditions and long hours.

Whether a conflict of interest or an interest in avoiding conflict, Samuel Gompers, co-founder of the American Federation of Labor, gave the “founder” title to his other co-founder, Peter J. McGuire.

Regardless, wrong finally goes right

The early hours of the first Labor Day parade saw low attendance due to worried workers losing money - or their jobs. However, it’s said that once the band started playing, an estimated 10,000 to 20,000 people showed up. After the parade ended, some went back to work while others continued the celebration in Wendel’s Elm Park. The party lasted until 9 p.m. and included food, speeches, and a lot of beer.

Parades were the common way to celebrate holidays and were typically followed by festivals around town - after parties if you will. The Labor Day festivals eventually grew so big that they became hard to maintain. To solidify the meaning or simply maintain order, organizers began to focus less on beer and more on speeches about the economic and political significance of worker achievements. Labor Sunday was also established to focus on the spiritual and economic achievements of the Workers Movement.

The beginning of the end

Through the past century, Labor Day has seemed to achieve the opposite of its intended effect. Relaxation has become rushed and an “enjoy it while you can” mindset has taken over (perhaps that mindset was always there, but for a different reason).

  • Many take their vacation days to have one last getaway with family before the school year begins.
  • Less summer means less time off, and so amusement parks and other harbingers of fun close after Labor Day.
  • Somehow Labor Day signifies when people switch to their fall and winter clothes, so hurry up and wear out the white.
  • Fall’s favorite sport, NCAA football, holds its first games during Labor Day weekend, the NFL the weekend after.
  • Recently, Labor Day has become an important weekend for end-of-summer and back-to-school sales - the ultimate rush.

Although the way Labor Day is celebrated has changed, it’s important to take the time to remember and appreciate the fact that we don’t work 12-hour days and have better working conditions, so enjoy that day of rest before it’s back to being “busy.”

[INFOGRAPHIC] How Safe is Uber?

EMBED THIS INFOGRAPHIC ON YOUR SITE

(use this code to ensure proper source attribution)

INFOGRAPHIC: How to Find, Recruit, Hire and Keep the Best Employees

EMBED THIS INFOGRAPHIC ON YOUR SITE

(use this code to ensure proper source attribution)

How Long Does an Employment Background Check Take

With more than 90 percent of employers running background checks on potential candidates, it’s important that you know what they’re looking for before you begin your job hunt. The same applies to banks where you’re seeking a loan and landlords when you’re trying to secure a new place to live. Background checks can make or break your eligibility for all of life’s necessities.

So what do you need to know about the length of your average review? Consider this your guide to understanding background checks.

Types of Background Check

The length of a background check will depend entirely on what kind of check is being run. There are several types:

Criminal Checks

These checks look for arrests, lawsuits, incarceration records and people on the sex offender registry. They typically take anywhere from 3-10 days depending on the agency doing the reporting and the amount of transgressions on record.

Citizenship Checks

More and more employers are requiring citizenship or visa checks to keep themselves from running afoul of Immigrations and Customs Enforcement (ICE). These checks are usually nothing more than a phone call or a Social Security number run through the federal E-Verify program, so they don’t take long at all.

Credit Checks

Checking an applicant’s credit can be a time-consuming process. According to the Fair Credit Reporting Act (FCRA), employers have to get your permission for the review before any digging is done, and even after that you’re looking at a wait of 7-10 days for official processing.

Driving Checks

If you’re applying somewhere as a driver, your employer will need to check your driving record for tickets, accidents and DUIs/DWIs. Don’t expect this to happen any sooner than 48 hours, especially if the employer is having it bundled into an all-purpose background check that can take up to a week to deliver.

Employment Checks

Did you really work at that company? Hiring managers are allowed to check references, employment dates and even performance reviews. Unfortunately, there’s just no way to know how long it will your new employer to speak with your old one.

Education Checks

If you’re applying for an academic or highly technical position, your employer may want verification of your degree. These don’t take long for the schools to fax over, but keep in mind that their offices aren’t open on weekends, and not every request is processed right away.

Tenant Checks

Tenant screening takes place by landlords and homeowners who want to ensure that they’re renting to the right people. These checks look for things like income verification and good rental histories, and they usually take less than 72 hours.

Licensing Checks

Your employer may want to verify that you have the legal certification required for your job. These checks will look at issuance dates, location details and any disciplinary actions taken against you, and they typically take 3-10 days.

Types of Background Checker

In addition to choosing what kind of review to run, employers are often allowed to pick between several different methods of obtaining a background check.

Third-Party Agencies

Third-party agencies are usually the fastest with background checks. They use the Internet to comb through public records, so they typically have results within a matter of days; some agencies even run “instant” background checks that can be done in a matter of hours.

State Agencies

When employers want an official background check, they turn to the state. These reviews are ordered from places like the State Bureau of Identification (SBI) or the Department of Public Safety and Correctional Services (DPSCS), and they typically take 7-10 business days to be mailed out.

Federal Agencies

Occasionally a bank or employer will require a background check from the FBI for the purpose of national security. These reviews take the longest; you won’t see results for 30 days or more.

Speeding Up Your Background Check

If you’re in a hurry for that new job, here are just a few ways to grease the wheels of the system:

– Fill out your forms properly. For example, don’t give your nickname or a shortened version of your name on official job applications. “Joe” isn’t in the state’s records; “Joseph” is.

– Offer as many identifiers as you can. Don’t be shy about giving out your birthday, address history or educational level. According to Security Magazine, this will keep you from being confused with other people of the same name.

– Be honest. This may sound obvious, but there’s no use in lying on a form when you’re going to be scrutinized in a background check anyway. Not only will you lose the job, but it can also slow things down when city officials confuse your records with another persons.

These are just a few things to keep in mind when wondering about the length of a background check. As you can see, it depends on a variety of factors, so be as patient as you can. Anxiety won’t make the results deliver themselves any faster.

MVR Driving Record

In today’s difficult environment, it is important for a company to make a firm commitment to risk management. Employee screening is one essential ingredient in an overall risk management program. By thoroughly screening a prospective hire, a company can ensure that they obtain honest, reliable employees.

A company with employee drivers should take every reasonable measure to make sure that these people are safe drivers to protect their business and reduce risks. Among these steps is the use of Motor Vehicle Records Checks to determine if an applicant has a good driving history. Employee driving records have become an important Fleet Safety Program component and can help protect a company against litigation after an accident.

The Basics

An MVR or Motor Vehicle Check shows a person’s driving history including valuable information about their driver’s license such as special endorsements, license class, current and past license statuses including cancellations, revocations and suspensions and any restrictions on their license.

Aside from that, it will also show valuable information about a person’s traffic violations including but not limited to vehicular crimes, accident reports, traffic citations, DUI convictions and driving record points. MVR checks might also show personal information such as an individual’s gender, date of birth, age, weight, height and hair and eye color.

They can also uncover unanswered or unpaid summons and insurance lapses. Usually, MVR checks only show information for a specific number of years. However, the time frame differs by the state. Additionally, employers should obtain a release from the applicant before an MVR check can be run.

The Statistics Do Not Lie

The importance of an MVR check cannot be denied. Companies should determine if their employee is a safe driver not only to protect their equipment but also their customers, clients and others that their workers may have contact with. This is because motor-vehicle crashes cost companies $60 billion annually in legal expenses, lost productivity, medical care and property damage. The average motor vehicle crash costs an employer approximately $16,500.

When an employee is involved in an on-the-job crash that results in an injury, the cost to their employer is $74,000. What is worse is that it can exceed $500,000 when a fatality is involved. That figure can soar to millions of dollars per incident if punitive damages are awarded. They are also liable for a negligent lawsuit. Such lawsuits also have the potential to destroy the reputation of a company.

The Benefits

It can be hard for a company to predict how an employee will handle their job in a real work setting. If their work requires driving, auto insurance can be involved as well that can significantly affect the operations of their business. Nobody is perfect at driving, but some people are definitely worse than others.

In many cases, driving history repeats itself. Running an MVR check helps a company predict any negative activity that has a higher probability of happening in the near future. At the very least, they can talk to the prospective employee about their driving history after knowing their record and resolving any issues and worries.

However, this does not just equate to peace of mind for business owners. Their insurance company worries about their employees as well. That worry usually translates to money. This is because insurance companies have access to MVR checks, and their premiums may be based on people’s driving history.

Companies may be penalized with higher premiums if their organization reflects poorly in this domain. Insurance is frequently a hazard to operational costs. Fortunately, knowing their employee’s MVR helps companies protect themselves.

Another Hidden Benefit

In addition to companies benefiting from having MVR checks done, prospective job applicants do as well. It prevents them from having unnecessary errors that blemish their identity. Even if their job does not necessarily involve driving, an employer may still want an idea of what is on their driving record.

Having errors on their record can hurt a person’s chances of getting a job. Even if there are no errors, every violation or ticket they have might not show up on record. Knowing what isn’t and what is on their record can help an person prepare for questioning by a prospective employer.

Releasing Time

MVR checks are usually returned within one to three business days from the order date. However, each U.S. state has its own regulations and rules as to how records are released and kept. This affects the turnaround time.

Other reasons for an MVR check to be delayed include name variations and missing or incorrect license numbers. Because motor vehicle licenses are issued by individual states, and each one of them maintains its own database driving records, MVR checks are done per state as there is no national driving record database. Companies should contact the individual Department of Motor Vehicles or comparable department in each state.

A Weakness

Each state has its own regulations and rules as to how Motor Vehicle Records checks are done. Additional forms may be necessary to perform them. What is worse is that some states do not permit a prospective employer to gain access to Motor Vehicle Reports. Because of this, some companies choose to order an MVR check from a reputable third-party company. These companies provide a much faster service. In addition, they perform these checks at a much lower price or sometimes for free.

A Tourist’s Guide to Privacy: Protect Your Information When Crossing Borders

An abundance of online resources and cheap international travel render border-hopping easier than ever for those bitten by the travel bug. While smartphones, external hard drives and cloud storage simplify accessing your personal information on the go.

Unfortunately, this powerful pocket technology also makes it necessary for you to guard your information like a hawk from identity theft, unauthorized transactions and data smugglers. Find out how below.

Tips for before you leave

Image courtesy of Klearchos Kapoutsis on Flickr

  • Make it easy for yourself by only bringing necessary documents and paperwork. Be sure to bring the essentials: your passport, visa, if applicable, and any pertinent medical or health insurance-related documents, such as proof of an immunization, or prescription medication. Your social security card, birth certificate and tax forms are better off safely tucked in the top drawer of your home office bureau, rather than traveling around the world with you. Use common sense: if you don’t have it, you won’t be able to lose it or have it stolen. Protect My ID is a useful app developed by Experian that helps you decide what to take with you and what to leave at home.
  • Back up, back up, back up. Before you depart, don’t forget to make copies or digital scans of all your important documents. This includes passports, driver’s licenses, credit cards and proof of insurance. Therefore, losing the physical copy won’t mean losing private data forever.

  • Take steps to alert your bank and credit card companies you embark on your journey. Prior to travel, call your credit or and debit card companies and alert them that you will be making charges from another country. Otherwise you may be subject to a freeze on your account while the credit company investigates an unusual charge, putting you in a tough position as a tourist.
  • Learn the local currency, exchange rate, and money change options in your destination country. This will protect you from falling prey to unfair exchanges, accepting counterfeit money, or finding yourself without payment options. Make sure to have some traveler’s checks on hand for emergencies, as well.
  • Keep your home country in the loop of about your whereabouts. American citizens can utilize the free-of-charge Smart Travelers Enrollment Program (STEP) to alert the U.S. of their travel plans, location and rough itinerary before they leave the country. In the case of a security breach, emergency or disaster, the Department of State will assist you through the local embassy or consulate. Learn how to stay abreast of travel warning and advisories so that you and your information will not be put in jeopardy should a situation arise.
  • Let your friends and family know your travel itinerary. Make sure your loved ones aware of where you’ll be headed and for how long, in case of emergency. Let them know to be wary of any suspicious messages from your Facebook or email address, which may indicate that your property or passwords have been stolen from you while abroad. With this information, they’ll know to alert the authorities if something happens.
  • Go through these steps with your laptop before you pack it into your carry-on luggage. You will have peace of mind as you’re going through security, checking into your hotel and taking your computer out in a foreign country.
  • Keep your computer – and your hands – to yourself. Certain countries have the right to seize or quarantine a traveler’s laptop that they suspect, for any number of reasons, contains data that they don’t want in their country. Be aware of what you’re bringing in to a country, being especially sensitive to areas like the Middle East, East Asia or Eastern Europe, which are notoriously zealous when it comes to suspect information. Even the US has declared that it has a right to seize laptops, for an indefinite period. Do your best to prevent this from happening by getting rid of all but the files you will need on your trip, keeping a backup of your hard drive at home, and encrypting your data.
  • Get a VPN. A VPN (virtual private networking) reroutes your internet connection through an anonymous server, giving you a new IP address and securing your laptop or mobile device from hackers intent on stealing your private information. Using a VPN is always a good idea for the additional security it provides, but particularly essential when you are traveling and extra vulnerable. Additionally, countries like China block common websites like Facebook and Google, meaning that you’ll need to use a VPN to establish an out-of-country connection in order to access them.
  • Keep your operating system and browser up to date. Contrary to popular opinion, antivirus software doesn’t give your computer a great deal of added security, but having the latest release of your OS and browser does. Security is a huge priority for software developers these days, with additional security features being added on a regular basis, so don’t forget to update to the latest iOS or Windows before you leave for your trip.

Tips for when you're at the hotel

Image courtesy of Rob Pongsajapan on Flickr

  • Be smart when choosing a place to rest your head…and your luggage. The difference between a five-star hotel and a two-star can make all the difference in being confident that your gear will be stored safely and soundly during your trip. “It’s a fact that more serious crime occurs at budget hotels than at major, expensive hotels,” says Peter Greenberg of the LA Times. Security researcher Cody Brocious states hotel locks are not as safe as you might think, remarking that they are “stupidly simple” to open with just about anything. Higher end hotels have heightened security in place to prevent thieves, such as metal detectors, hall guards, and surveillance systems, and--depending on where you’re traveling, might not set you back much.
  • Once you’re at the hotel, secure your belongings before you do anything else. Don’t reach for those mini bar snacks, remote control or hot tub knob before you ensure that your valuables are safely stored. For most hotels, this place will be the safe. Bring your valuables to the lobby and have a hotel official lock them in a private safe where they cannot be tampered with. Any smaller or less important items that you just need to have in your room with you should stay in your locked luggage, or in a theft-proof, slash-proof bag secured to a piece of stable furniture. Don’t scatter important devices like flash drives or folders around the room or stick them in a drawer where they’ll be easily forgotten.
  • Take advantage of the hotel front desk lockbox as your personal safe-zone during your trip. Keep your valuables in it any time they are not actively in use.
  • Beware of over-the-phone scams. A common scam involves someone calling your hotel phone late at night to ask you to reconfirm your credit card information claiming to have a problem at the front desk. Deal with financial or identity issues in person only, and only with qualified authorities.

Tips for when you’re on the go

Image courtesy of M Roach on Flickr

  • Travel intelligently – use a travel carrier when out and about. An organized travel carrier that loops around your neck and contains a clear window able to hold your passport, credit card, emergency cash and/or traveler’s check, is invaluable. These carriers can be situated under clothing, so your most irreplaceable documents are hidden from view and accessible only by you. For ladies, there are Rack Traps, special hidden bra-compartments specifically designed for carrying cash and credit cards
  • Be cognizant of hidden fees, currency change charges and country-specific quirks when traveling with your credit card. Avoid paying an astronomical exchange rate or usage fee by inquiring about them beforehand.
  • Secure your person before you secure your personal belongings. Remember that no matter how valuable your iPad or the contents of your wallet, the value of your body trumps it. In the unlikely event that you are faced with a physical threat, as long as you remain unscathed, the information or cash that you’re trying to protect can always be recovered or replaced. Consider take a self-defense course before you travel abroad so that you feel prepared with an appropriate response if something were to happen. Check out Antor.org‘s guide to self-defense for travelers for more information.
  • Lost your passport? Breathe easy. Passports are no longer just paper booklets filled with handwritten personal information and faded stamps of traveled-to countries. In the last decade, passports have become a high-tech tool: tracking device, information recorder and scan-able data hub, all in one. The US electronic passport, for instance, contains an integrated circuit computer chip embedded with your personal information and a headshot to prevent identity theft and personal crime.

But what if your data is “skimmed” or “eavesdropped” from the passport by a sly tech-savvy criminal? The Department of State has taken several steps against this by encrypting your data and making it unalterable. The biometric properties of modern passports make identity theft virtually impossible. Even in the worst case scenario of losing your passport, it is highly unlikely that a criminal could exploit, thanks to this new technology.

1

10 Political Figures Who Could Not Pass a Modern Background Check

Background checks look at past behavior in attempts to predict what will happen in the future. They are used in all segments of modern society, during business transactions and credit evaluations. Landlords use background checks to investigate applicants for housing, and employers with sensitive job requirements use them to determine whether or not job applicants check-out. Organizations request background checks with specific feedback in mind, focusing on the elements of people’s histories that give them the information they need most. Your criminal history and basic information about where you have lived are included in profiles of your background, as well as your marital status and other details about your history. Political figures, even past Presidents, are not immune to the failings of human nature, landing them in hot water along the way. Would these former United States Presidents and high-profile politicians pass background checks?

Photo courtesy of Library of Congress

Photo courtesy of Library of Congress

  1. Andrew Johnson – Background checks rely on specific points of data to create profiles of people’s lives.  Sometimes the whole picture tells a different story than the snapshot created during a background check, but facts and figures usually don’t lie.  In the case of President Andrew Johnson, the first American President ever to be impeached, the public record might not reflect the reality of our 17thPresident’s character.

    Getting impeached from the United States Presidency ranks right up near the top on a list of things you’d rather not have pop up during your background check.  Johnson was impeached during a divided political period in American history.  The Republican revolution occurring during the time did not bode well for the moderate Johnson, who was bullied politically and impeached without much cause.  The articles of impeachment were drawn up for high crimes and misdemeanors including violation of a recently passed act of Congress with which he did not agree.  The entire proceedings have been hailed as a witch-hunt against Johnson.  In 1868 the House of Representative voted on impeachment, resulting in an acquittal for President Johnson, who was widely seen as the victim of a railroading effort by his political opposition. Learn more at History.com

  2. Photo courtesy of Wikimedia Commons

    Photo courtesy of Wikimedia Commons

  3. David Duke – This would-be political heavy-hitter is most notorious for his role with the Ku Klux Klan. In fact, his government service is limited to his elected role as a member of the Louisiana State Assembly.  His visibility outside the state results from his unsuccessful attempts to gain other political offices.  He ran for President in 1988 and in 1992, and as recently as the twenty-twelve elections was still playing an active role in presidential politics.

    Mr. Duke is unapologetic about his positions regarding voluntary segregation and each man’s right to protect his heritage.  In addition to failed presidential campaigns, Mr. Duke has attempted to gain other positions in government, including United States Senator, United States Congressman, Governor of Louisiana and State Senator.  As a former Grand Wizard of the Ku Klux Klan, Duke is outspoken about race relations and also formed the group National Association for the Advancement of White People (NAAWP).  He posts regularly to online forums associated with white supremacy and has spoken against Jewish control of media outlets.  He was convicted of tax fraud in 2002, and sentenced to 15 months in prison.  It was determined that he had been bilking money from followers, which he eventually spent on himself.  In part, he told followers that he was about to lose his own home to debt and needed money to stay afloat.  After raising hundreds of thousands of dollars’ worth of donations, it was determined he was not in the financial distress described. These Huffington Post stories contain detailed information about Duke.

  4. Photo courtesy of Library of Congress

    Photo courtesy of Library of Congress

  5. William Jefferson Clinton – Until Bill Clinton occupied the office of the presidency, one-hundred thirty years had passes since the impeachment of Andrew Johnson, which stood as the only such action on the United States books.  Unfortunately for President Clinton, he holds the dubious distinction for being the next and only other President to be impeached.

    The exploits of the former President are clearly ingrained people’s memories; in part due to the fact that he is one of the more recent Presidents to get caught in an inappropriate situation.  On the other hand, the details of his indiscretions were particularly salacious, creating significantly greater public interest than the regular output from the oval office.  However you slice it, the 1998 impeachment vote taken by Congress is a background check development that might be looked at as a black mark on the former President’s record.  In Mr. Clinton’s case, the stain on his credibility resulted from lying about his previous activities, rather than the unconventional behavior itself.  In other words, had the President come forth with his wrongdoing, or even owned up to it when it was obviously exposed, he may have been able to preserve his reputation.  The Raw Story Looks at Mr. Clinton here

  6. Photo courtesy of Library of Congress

    Photo courtesy of Library of Congress

  7. Ulysses S. Grant – Extensive background checks, like those conducted by law enforcement agencies at all levels, often include assessment of friends, family and neighbors.  So the crowd you associate with might have an impact on the results of your background profile – for better or worse.  If there was a presidential case for running with the wrong crowd, U.S. Grant might be one of the better examples of a reputation tarnished by association.

    During his presidency, Grant was rocked by several ongoing scandals.  The improprieties ranged across a spectrum of inappropriate patronage and manipulating financial markets.  There were serious implications for the Nation’s most important employee, even when he was not a primary player in the developing scandals.  Keeping the wrong company first got Grant in trouble when he responded to a gold market situation with unapproved measures.  Stock scandals followed, as the President’s Congress and Cabinet became involved in patronage deals giving them access to favorable stock manipulation.  In 1875, Grant’s principles were further questioned when close associates were found to be skimming Whiskey taxes for their own use.  The conditions during his presidency became so outrages that the very notion of political corruptness among his allies and advisors became known as ‘Grantism’.  Having your name tied to immorality and corruption is not a positive background check outcome. The Miller Center provides profiles of Grant and other past Presidents.

  8. Photo courtesy of Wikimedia Commons

    Photo courtesy of Wikimedia Commons

  9. Silvio Berlusconi – Regardless of the prevailing country being governed, certain standards apply.  Silvio Berlusconi is a colorful character in his own right, gifted with great wealth and charisma, but his personal record includes a few legal blemishes that may get in the way during background checks.

    In addition to his convicted role as a tax evader, Mr. Berlusconi has been linked to additional improprieties.  The former Italian Prime Minister has been accused of turning a blind eye toward organized crime, and for filing false accounting reports.  Other accusations of bribery and corruption have followed Mr. Berlusconi through the spotlight, including allegations of influence peddling with judges and police officials.  One of the most problematic legal questions dogging Mr. Berlusconi is his 2013 conviction of soliciting a minor for sex.  He was found guilty of paying for sex with a 17 year old, and is prohibited from holding office during the seven and one-half year sentence he was given.  The case is expected to come up for appeal, so the sentence will not be carried out until the appeal is concluded. The case is one of approximately 20 proceedings aimed at Mr. Berlusconi during his tenure in office. Mr. Berlusconi in the news.

  10. Photo courtesy of Library of Congress

    Photo courtesy of Library of Congress

  11. Richard M. Nixon – Taking a page from the Bill Clinton handbook, long before it was written, President Richard Nixon used his authority for personal pursuits of power.  Long associated with political scandal, the former President gained notoriety for his early-70’s antics and over the top political gamesmanship.

    The central feature of Richard Nixon’s downfall was a scandal which came to be known simply as “Watergate”.  The reference is to the Watergate Hotel and business buildings where the most famous abuse of Presidential power occurred.  In 1972, a group of five men broke-in to the Democratic National Headquarters located within the Watergate complex.  The break-in and the President’s subsequent attachment to the ensuing cover-up effort brought Nixon to the mercy of his political adversaries.  Had he not resigned in 1974, it is almost certain he would have been impeached for the cover-up and lies associated with Watergate.  White House profile of the 37th President.

  12. Photo courtesy of Wikimedia Commons

    Photo courtesy of Wikimedia Commons

  13. Albert Fall – Although not a household name, Albert Fall will live in infamy for his scandal-plagued tenure as Warren Harding’s Secretary of the Interior.  It is not uncommon for politicians to bring their own supporters with them once they gain office.  In the case of the Harding Presidency, prestigious cabinet posts were meted out to friends and supporters of the President.  As a result of hiring associates from back home in Ohio, Warren Harding had an administration uncharacteristically wrought with ethics difficulties.  Multiple cabinet officials were implicated in a variety of improprieties resulting in disciplinary action, the worst of whom was Albert Fall.

    While some of the corrupt cabinet members made their own criminal names, it was the Teapot Dome scandal that brought down Fall and others Harding associates.  Fall was the first-ever cabinet member convicted of a crime, for his role in the Teapot Dome affair.  In exchange for control of the federal oil reserves in Teapot Dome, Wyoming, Albert Fall had taken a bribe from Mr. Harry F. Sinclair.  Mr. Fall served two years in prison as the most famed member of Harding’s “Ohio Gang” Mr. Fall’s interesting role in history is studied here.

  14. Photo Courtesy of Library of Congress

    Photo Courtesy of Library of Congress

  15. Ronald Reagan – Business dealings are regulated in most cases, but certainly subject to transparency in almost all cases.  What Ronald Reagan learned during his tenure as President of the United States is that is does matter who you do business with.  Guilt by association is a powerful elixir for the American public, so if your bedfellows include Contra rebels and Iranian arms dealers you will be held accountable.

    In 1986 it came to light that the Reagan administration was active in a side business unknown to American citizens.  Top players in the administration, it turns out, were selling arms to Iran.  The practice was problematic for several reasons, not the least of which concerned an embargo on Iran strictly prohibiting it.  How much the Commander in Chief knew, and when, is still the subject of debate, but there is another aspect of the illegal activity that disturbs some analysts even more.  Some of the officials involved in the Persian arms deals also advocated for using the money in very specific ways.  Half a world away, arms profits were allegedly targeted for funding Contra rebels in Nicaragua.  Not only was the public left out of the loop, but the Congress had already acted decisively prohibiting further funding for Contras.  The Iran-Contra Affair, or Irangate, as the episode became known, remains a blemish on the former President’s background. For all the facts about the former President, see his profile at the Reagan Library.

  16. Photo Courtesy of Library of Congress

    Photo Courtesy of Library of Congress

  17. Jesse Jackson Jr. – Perhaps no civil rights advocate has shared the podium with more Presidents and influential politicians than the Reverend Jesse Jackson.  Wielding great power across the country, it was in Illinois that his son Jesse Jackson Jr.  was to make a name for himself in politics.  Despite the head-start given him by his family name, and the morality espoused by his father, politics did not work out well for the younger Jackson.

    Convicted felons are not high performers on background checks.  And so it goes for Mr. Jackson, who  was convicted of several crimes in office.  After leading the charge in Congress for the 2nd District of Illinois, the Congressman was investigated for wrongdoing in fall of 2012.  He subsequently resigned, amid bizarre absences and claims of medical disorders ranging from bi-polar disorder to gastrointestinal distress.  As it turns out Mr. Jackson was funding an extravagant lifestyle, along with his wife, using campaign donations from his re-election fund.  As a result, the former co-chairman of President Barrack Obama’s election campaign was sentenced to 30 months in prison.  In addition to the misappropriation of funds, Mr. Jackson was convicted of mail and wire fraud.  For her role in the scheme, which netted about seven-hundred fifty thousand dollars’ worth of illegal spending, Sandi Jackson received 12 months in jail.

  18. Photo Courtesy of Library of Congress

    Photo Courtesy of Library of Congress

  19. George W. Bush – President George Bush had his share of detractors during his time in office.  Sentiment against his father aside, Bush had his own negative impact on people’s perception of him.  The truth is that his legal troubles started long before the whole weapons of mass destruction problem came to light.

    Bush was arrested at the age of 20 for some drunken antics with friends, which resulted in the group stealing some items from a department store.  The charges were dropped.  In 1976, however, Bush was cited for operating a motor vehicle while intoxicated near his family’s Kennebunkport home.  The drunk-driving conviction alone, nor his acknowledgement that he overused alcohol until age 40, are not enough to count the younger Bush out entirely, but there additional concerns about his substance use.  Some sources indicate that the former President may have used drugs like Cocaine, which could be problematic for passing standardized FBI background screenings.

25 Best Privacy Apps

Looking for the best apps to protect yourself and your family on your mobile devices? Check out this list, which brings you the best in anti-spyware, anti-virus, phone trackers, data lockdown, and more.

Educate

  1. Clueful – Applications aren’t often clear about what information they are accessing, nor how they intend to use and distribute it once obtained. Clueful helps illuminate this process by running audits on all your existing applications and providing you with clear cut, no-nonsense reports on what applications are leaking about you. It gives you a quick-look at your app’s security with a score, and alerts you promptly when an app is abusing privacy standards. For a subscription fee, you can upgrade the service to include a constant monitor that will lock, locate, and wipe your phone in the event it gets stolen. Also available for iOS. Price: Free.
  2. Protect My Privacy – This application is being developed by UC San Diego as a way of helping them examine privacy on mobile devices. To that end, they collect anonymous data transmitted securely over SSL. Users can choose to not provide data to the study. For users with cracked iPhones, any application attempting to acces your data must first get approval. A message pops up informing users of what data the app is attempting to access, and allows you to fake credentials in some cases, deny access, or allow it. Some data is scrambled to provide an additional layer of protection. Only available for iOS. Price: Free.

Eraser

  1. History Eraser – This simple application makes it easy to wipe sensitive information from your phone, including browser history, call logs, text messages, market searches, clipboard data, and more. Useful for those interested in protecting privacy, but also for those who want to free up storage on their phone. One quick tap will clear your data. Also available for Chrome. Price: Free.
  2. Last Pass – This application has demonstrated its effectiveness for browsers, its mobile version is equally powerful. It automatically fills in forms for every saved site, generates powerful passwords, allows users to add and alter notes and sites easily. Audio and images can be attached to secure notes as well. Also available for iOS, Windows 8, Mac, Linux, BlackBerry, and most other mobile OS. Price: Free 14 day trial, $1 per month pass afterwards.
  3. Delete Me – While not quite a mobile application, this exceptional service can completely remove your sensitive and personal data from the hands of data brokers online, ensuring that private photographs and personal data stay secured. Price: $129 annually for one person, $229 for two people annually.

Photo courtesy of Flickr user Robbert van der Steeg

AntiVirus

  1. McAfee WaveSecure – Recognized in 2010 for excellence from CNET, The NY Times, PC World, Lifehacker, and others WaveSecure offers a solid mobile security package for a good price. It includes lock and wipe features that give you control over a lost or stolen phone, backup and restore to allow you to store important data on the cloud, even after the phone has gone missing, and recover it when necessary from a web-based application.  Locate and track features help you pinpoint the lost phone on a map, set it screaming to make it easy to snag, and allows you to track calls being made on the phone.  Also available for BlackBerry, Symbian OS, Windows Phone, iOS, and Java. Price: 7 day free trial, after which it costs $19.99 annually.
  2. Lookout Security & Antivirus – This application gained recognition from PC Mag Editor’s Choice for being excellent, from TechCrunch as one of the top 10 best free apps, and PCWorld ranked it 5 out of 5 stars. It offers excellent antivirus and malware protection in apps, email attachments, or files. It scans number for dangers and alerts users to potential hazards, blocks  websites that could potentially be harmful, and offers a Privacy Advisor to alert users to what information their apps are attempting to access. It also features a web-based phone finder that utilizes Google Maps to pin-point your lost phone, lets you make your phone scream to identify it, snap photos of users who attempt to access it while lost, and even remotely lock or wipe your phone. Users also can backup vital phone data and restore it in the event of a wipe. Also available for iOS. Price: A free two-week trial, users can continue using a pared down version for as long as they like after. Premium has a monthly fee.
  3. Webroot Security & Antivirus – Webroot was recognized as one of the best free android apps of 2011 by PCWorld, recognized for its unique features from PC Magazine, for being one fo the best security applications by Tech of Web, and Uberphones said it was ‘a must for Android users.’ It features a powerful antivirus that automatically scans and blocks malware, viruses, spyware, and Trojans and alerts users to settings that put the device at risk. It offers remote access to lock, wipe, scream, or locate your phone when it is lost or stolen. Premier grants the use of App Inspector, which alerts users to apps that access private info, drain money, track location, or drain the battery. It helps maximize battery usage and network access. The program itself is lightweight and not a drain on battery life. Available for iOS and Android devices. Price: $19.99 per device in a year.
  4. NQ Mobile Security & Antivirus – This app offers a powerful antivirus that scans and protects users from all the typical threats, as well as keeping users up to date with security databases. It protects while web browsing against phishing, fraud, and other dangers. A real-time app scanner alerts users to potential problems, and it includes anti-eavesdropping protection designed to detect spyware programs installed on the phone. It features a remote phone locator and offers backup of sensitive data as well as a call and SMS blocker to protect against harassing calls and messages. A system optimizer keeps your device operating smoothly. Only available for Android devices. Price:  Free trial for blah weeks, $19.99 per device, per year after for access to Premium features after.
  5. Norton Mobile Security Lite – As with its competitors, Norton Mobile Security offers a powerful antivirus that keeps users safe when browsing the web, accepting files, or downloading apps. It also offers remote wipe, tracking, and locking capability and SD card scanning.  It continuously scans and alerts users to potentially dangerous apps. Also available for iOS. Price: Free pared down version, and Premium access costs $29.99 for one year on one device (currently on sale for $17.99)

 

Photo courtesy of Flickr user briggz5d

  1. Avast! – This top-rated security app offers both anti-virus and anti-theft capabilities to ensure your phone is well protected against most eventualities.  The software developer has been around for 20 years and the app has been recognized for its excellence by PCAdvisor, Droid-Life, AndroidPolice, AndroidAuthority, and Android and Me. Lost your phone? Use a web-based interface to control your phone remotely, locate it on a map, and lock the device till you can snag it. You can even activate a siren and wipe its memory. Only available for Android devices. Price: Free.
  2. Kaspersky – A fairly straightforward anti-virus and security application that offers its users a powerful defense against viruses, Trojans, malware, and spyware which runs over-the-air to keep the program lightweight. It offers GPS location services to locate the phone if it goes missing or stolen, and remote access to lock and wipe your phone, take a ‘Mugshot’ of anyone who uses it, and remotely activate an alarm. Users can filter incoming calls and text messages to screen unwanted contacts.  In addition, users can conceal calls, contacts, and other data from casual snoopers. Available for Android only. Price: One year subscription costs $14.95.
  3. F-Secure – A European based application that protects mobile devices with a combination of antivirus, anti-theft, and screening tools. Users can filter out adult and other unsuitable content from web content and applications, block unwanted calls and text messages, remote locking and wiping, and remote location detecting. Available for Android and Symbian. Price: 14,95€ for a one year subscription with a free 30 day trial.
  4. Virus Barrier – This Gizmodo app of the day offers iOS users a solid and intuitive antivirus to protect them against intrusions from files, web browsing, and applications. It automatically updates to keep on top of new threats, repairs infected files, and keeps logs of scans, detected threats, and repairs. Only available for iOS. Price:  $0.99

App & Data Lockers

Photo courtesy of Flickr user flakeparadigm

  1. Smart AppLock – Smart Lock is a lightweight application designed to give you greater control over privacy on your mobile device. Set a list of protected applications, then create a lock pattern or password, and your friends and family can no longer access apps you don’t want them in, including SMS, mail, photos, and contacts. Only available for Android devices. Price: Free.
  2. Gallery Lock – Named app of the year by Times Magazine, this handy application makes it easy to keep your private photos away from the eyes of phone snoops. The intuitive program makes it easy to create your own folders and conceal your photos and videos in a beautiful and feature rich application. It has the capacity to run in stealth mode to keep others from being aware of your hidden images. Use a PIN pattern to access your data. Only available on Android. Price:  Lite version is free, Premium unlocks additional features.
  3. App Defender – This straightforward app prevents access to applications. Users can set a unique password for each individual app. After three failed attempts to access an application, it displays the number of failed attempts to alert the owner to the access attempts. Only available for Android. Price:  Free trial, after which it costs $3.13.
  4. Picture Safe –   This application offers advanced protection for your mobile device’s private information. It allows you to create custom folders to organize your data how you wish, decoy icons and screenshots to fool snoopers, a fake calculator entry screen with 8 digit PINs for highly secure access, dual passwords to allow access to ‘safe’ and protected photos, and much more. Hide everything from phone records, photos, and web access. Only available for iOS, including iPhone, iPod Touch, and iPod. iOS 5.0 or later editions, optimized for iPhone 5. Price: $1.99 (currently on sale for $0.99)
  5. Snap Secure – This application offers a range of unique and helpful features designed to make your mobile device a powerful security tool. It features real-time tracking of members that can be viewed on a map from a related mobile device or the web, helpful for keeping track of children or partners. Have teenagers? The motion-activated driver safety feature stops users from texting, calling, or web surfing while on the road. Footprints allows you to track the movement of the device using GPS, giving a clear picture of the movement history for any attached device. It also allows you to create safety zones and sends alerts when a device moves out of that defined territory. Finally, if a user finds themselves in dire circumstances, it offers a panic button that promptly calls 911 or alerts an emergency contact with location information via email, phone, or text. Available for Android, iOS, Windows, or Blackberry. Price: Free basic account, after which it costs $499 a month for a single user and $9.99 a month for a family plan.

 

Other Nifty Apps

Photo courtesy of Flickr user geoffeg

  1. Gibberbot – Recognized by PC Mag as one of the 100 best Android Apps of 2013, this application allows you to securely chat with friends across a range of platforms in one streamlined place, with powerful off-the-record encryption. No ads, easy to use, and available in many languages. Plus the chat program has fun built-in features like custom icons and wallpapers. Also available for iOS, Mac, Linux, and PC. Price: Free.
  2. Anti-Spy Mobile – Homebrewed spies are being blessed with a wide variety of tools to dig into your private and personal information. One growing method is to conceal an application on your mobile device to intercept communication, application use, and web browsing habits.  Stop that in its tracks with this application, which scans for and automatically removes any of these applications. Also available for iOS. Free: This version is completely free, a premium version offers a few additional features.

Locate Lost Phones

Photo courtesy of Flickr user gorbould

  1. SeekDroid: Find My Phone – While many of the antivirus programs offer a basic phone finder program, this one goes above and beyond. In addition to remote location, locking, and wiping, it allows users to create GPS breadcrumbs to track the movement of the lost or stolen phone, access recent calls, retrieve important data, and remotely wipe SD cards. The program itself can be hidden from display and made impossible to remove. It has almost no battery drain. Only available for Android devices. Price: $4.99
  2. Plan B – Many of these applications are focused on preventing loss and damage to your phone. Plan B is for folks who were not quite as proactive. If your phone gets lost or stolen, Plan B helps you locate it after the fact. You can install it remotely and it will start utilizing cell towers and your phone’s GPS to track its location every ten minutes. Users will get an email or text message with the current location of the phone each time it is located. Once the phone is recommended, you can revert back to the preferred ‘plan A’ and download any of the other excellent security apps that include tracking and other security features. Only available for Android devices. Price: $1.99
  3. iHound Software – Utilzing GPS, Wifi, 3G, or Edge signals built into your mobile device, iHound tracks its location every 10 minutes and reports it to a web application. Users can remotely lock and wipe their phone and directly instant message their phone to communicate with anyone who picks it up. Further, users can set it up to automatically alert opted-in programs like Facebook, Foursquare, and Twitter to keep friends up to date on their location. Also available for Android and iOS. Price: They offer a free 7 day trial, after which the program costs $3.99 for an annual subscription.
  4. GadgetTrak – This iOS-focused app will help you keep your phone secure in the unfortunate event it gets lost or stolen. It uses a combination of GPS and WiFi  alongside cell tower triangulation to keep accurate tracking of the phone’s location. Each time the phone is tracked, it will send users a detailed account of its location. Automatic camera captures will let you know who has the phone. Once the tracking has been activated, no software settings can be modified, and all collected data is sent through a secure SSL connection. Only available for iOS. Price: $3.99