Link to: The New Political Revolution

Link to: The New Political Revolution

The New Political Revilotion

Link to an oped for the campus paper I wrote a few weeks ago.


McCain’s “Obamacare Opt-Out Act of 2014”: Dismantling the Affordable Care Act One Piece at a Time

This ought to get the conversation going again.

Can’t strike down President Obama’s signature legislation, the Affordable Care Act (ACA), in its entirety? Dismantle it, piece by piece. One of the most controversial and disliked parts of the ACA is the individual mandate, which imposes a tax penalty on individuals who do not obtain minimal health insurance coverage. Seems a likely target.

Senator John McCain (R – Arizona) introduced a bill called the “Obamacare Opt-Out Act of 2014”
today. It is super short. In fact it is a quick read: download the short PDF file HERE. Simply put, it allows someone who would have otherwise received the tax penalty for not having insurance to simply opt-out and be exempt. It does nothing to change the rules that require insurance companies to offer coverage to those that opt-out, even when they are sick or injured. It provides no alternate incentive for individuals to obtain insurance.

So? Do we all just give a wink and a nod and pretend to like the ACA except for this one little mandate part? What would the effect of this three page bill becoming law actually be? Is this bill a good thing?

I say it’s great! Make no mistake about it, if this bill is somehow passed, the ACA would be mortally wounded. Even the most liberal Obama supporter would check that exemption box on their tax form to avoid being hit with hundreds in taxes. But that is the narrow view.

What happens if the ACA is gutted from within? Millions have obtained insurance through state or federal health insurance exchanges. But how many of these are newly insured? Of those, how many need state and/or federal subsidies to afford their premiums? Why was this legislation passed in the first place?

The American people knew something needed to be done about healthcare. But the ACA was the wrong answer. It doesn’t get everyone covered. It doesn’t stop hard working families (even with insurance) from becoming insolvent because of healthcare bills. And it most certainly hasn’t stopped the debate.

When are we going to face facts and bite the bullet? Healthcare isn’t the same as health insurance, and healthcare isn’t cheap. The only realistic way to ensure everyone has access to care without bankrupting the country is to raise taxes (exactly how and how much in the subject of a totally different debate) to pay for a universal, single-payer healthcare system. Necessary care for those who need it, regardless of their income.

Yes, you heard me correctly. The quicker this AHA abomination dies the faster we can get down to implementing a real solution to the healthcare crisis that is bankrupting our country.

Know why insurance companies are so hated by doctors? They make them take that contractual discount. Why do doctors sign those stupid contracts then? Because the insurance companies have the patients. That’s called leverage. If everyone was under a single payer system in the US, then we (that’s all of us) could negotiate the best rate for the care we receive. That keeps costs as low as possible; which is just above what doctors would stop providing services for. That includes the pharmaceutical companies and medical equipment suppliers too.

Costs being as low as they can will go a long way to making healthcare in the US truly affordable, but it’s not the only benefit to going full commie-pinko on it! Who pays the bulk of insurance premiums today? Employers, that’s who! [Yes yes, I know let’s not consider the government (Medicare/Medicaid) quite yet. I’m trying to shift the cost to them 100% with my argument.] What would happen if the cost of healthcare shifted away from US employers? As long as the free market is allowed to keep competition in the private sector healthy (a different debate, my dear) then prices for goods and services would go down and/or wages would be able to go up. Not to mention, it might begin to make economic sense for US companies to keep jobs in our borders. Yes, our taxes would rise, but the increase would be somewhat offset by the economic benefit of removing this burden from the real job creators.

With these two factors, controlled healthcare costs and a better economy, I believe the net cost of universal healthcare would be much less onerous than the tea-party punch drinkers believe! But regardless of what they believe, I believe they know that you don’t get something of value for free; and healthcare (like freedom) ain’t free sweetheart!

So if you believe that healthcare should only be provided to individuals when they can pay for it, then keep on keeping on; because that’s what we haveand will continue to have with the ACA. However, if you’re like me and believe that, although individual healthcare isn’t a right, there is no reason under God’s green earth why we can’t get together and cooperate to provide necessary care to our citizens who need it, then you’ll pray that the ACA dies a swift death. For as long as the ACA survives, so do health insurance companies, healthcare related bankruptcies, and silly-partisan-piecemeal bills like Senator McCain’s. Pleaselets put them all to a quick death!

Internet Account Security: Keeping Your Accounts and Sanity Under Control

Computer SecurityI’ve been asked a lot recently about keeping internet accounts from getting hacked and I have a few ideas and thoughts I’d like to share with you. Upon reflection I suspect you’ll realize you’ve put a lot of your information on Facebook, Twitter, Google (Drive, Gmail, YouTube, etc.), Apple (iCloud, iTunes, the Mac App Store, etc.), Microsoft (OneDrive, Hotmail,, Office 365, etc.), and many, many others. Perhaps not all, but more than one. Are they secure?

How would you feel if your Facebook account was hacked? If someone used it to spam your friends with ridiculous stuff? If someone changed your password? If someone erased your online pictures? If someone accessed your private e-mail and messages? If it ever happens, help is available but wouldn’t it be better to prevent it? Of course! So here it is … The Token’s prescription for your account security.

First, the common sense steps:

  1. Keep it current!
    • I don’t care if you’re running Windows 7 or Macintosh OS X Lion. Running Linux? Good for you. Keep your operating system (OS), your drivers, and your plug-ins updated. I can’t stress this enough. Yes, sometimes when you update stuff things change. And sometimes you need an update to fix what the last update just changed … but overall you’re going to be thankful you kept it all current. I’m not saying you need to go upgrade to Windows 8. I’m not saying get Yosemite as soon as Apple releases it. I’m saying keep the version of OS you’re on updated. I’m saying when Java says there’s an update available, do it! I’m saying when Adobe Flashplayer has an update, make it so. Get the picture? When the developers of your critical software find a flaw they send the fixes, the countermeasures to newly developed software threats, to you through these updates. Forget the old saying, “if it isn’t broke, don’t fix it,” because while you’re OS and critical applications have not changed the hackers of the world have created threats that make you’re old reliable vulnerable.
  2. Take it seriously.
    • When you create your accounts, don’t leave your recovery e-mail address blank. Use your correct date of birth. When you answer those pesky and burdensome security questions, don’t put some silly nonsense just to get past this step! If the crud hits the fan, and you need to regain control of your hacked account, you’ll thank yourself for putting a little thought into it and taking it seriously. In the rare event the service you’re trying to get back into actually has people to talk to on the phone; they will need to verify who you are somehow. If you can’t answer any of the questions, don’t know what method of payment you used, and put as your recovery e-mail … I feel for you when you’re account is lost forever. If you did this kind of stuff, I highly recommend you correct these “oversights” as soon as possible. Here are links where you can edit account details for many major internet services:
      1. Apple:
      2. Google:
      3. Microsoft:
      4. Facebook:
  3. Change it up a bit.
    • Is your password literally ‘password’ (or a variation like pa55w0rd)? Seriously? Guess what? Hackers know this and the programs they write to hack into accounts try this and a few other known popular password types first. These programs can hack your account in milliseconds. What can you do? If the password is too complex, it will be hard to remember and useless. Too easy and you might as well not have a password at all. Take a little time and come up with a few password types you might recall easily. You’ll find the more frequently you use them the easier you’ll recall them. For example try a combination of and old zip code and a name (45852@Jack). Or try a name of a street you lived on once and an old phone number mixed up with a number series at the end (Main St + 1234567 = M1a2i3n4S5t67#12). This is one of my favorite kinds because when I need to ‘update’ it I can make it M1a2i3n4S5t67#13. You get the picture. Just be sure to use a combination of capital and lower case letters, numbers, and special characters (#$&*!) whenever possible. These make your passwords much harder to hack. Pro Tip: Try to use different passwords for different accounts. If you use the same password for all your accounts and a hacker found it, the creep would have access to all your accounts!
    • Some other great password solutions are available if you’re into tech stuff enough to set it all up. If you’re all Apple and you’ve iOS 7 on your iPhone, iPad, iPod Touch, and OS X 10.9.x Mavericks running on your Macintosh computers you can take advantage of iCloud Keychain. If you’re not, there are other password manager applications that run on all kinds of devices available (I use KeePass myself). These applications can keep your passwords organized and secure (like that old steel ring your dad kept all those keys on). Just make sure the one you select runs on all the kinds of devices you’re likely to use (including tablets and phones).
    • Don’t forget to protect your Wi-Fi signal. If your devices connect to the internet at home using Wi-Fi (or a wireless signal) be sure to have a password set up to connect to it. If you have a lot of nearby neighbors, this is even more important. If you live on or near a college campus – don’t even joke around about this. If you have any questions about your Wi-Fi password or security, contact your Internet Service Provider (ISP) [the people you pay to get on the internet] and ask.
  4. Use Protection! Key loggers are not your friends.
    • Yes, even if you use an Apple Computer, it is a good idea to have a virus or malware scanner running on your computer. Check in the Mac App store for some free scanners. For the Microsoft people out there, Windows Defender comes with Windows … and it is the bare minimum.
    • For better protection on any computer get boxed software available at Best Buy, Office Depot, Fry’s Electronics, etc. If you download your software from the internet make sure you use names you clearly recognize and trust, like Symantec, McAfee, and Kaspersky. Also, once you have an application installed, keep it updated like you keep your Operating System (OS) updated. Every day new viruses are created and just about every day (no joke) you’ll get some updates to your virus detection software.
  5. If you play with fire, you can get burned.
    • Pirate Bay anyone? Think bit torrents are awesome? Love watching free movies and listening to free music? If so, you’re in the danger zone. You’d better know exactly what you’re downloading and what your security settings are or you’ll have unwanted pop-ups (at the very least). I shudder when I try to imagine the worst.
    • Do you know what Tor is? Like scouring the “Dark Web?” If you’re dabbling in this zone your security skills will need to be well beyond mine in order to maintain total control of your security. Get in touch with me and let’s share notes.

Next, the secret weapon that you can use to prevent someone from hacking your account even if they have your username and password. Two-Step Verification! I can’t recommend it enough, but it isn’t for everyone.

“What kind of witchcraft is this!?” you might ask. “How can someone who knows my password be prevented from accessing my account?” Most major services on the web now offer some form of Two-Step Verification. Basically, when logging into your account on a new device (or a different app or browser, even on the same device) for the first time; you’ll be prompted for a special code in addition to your username and password.

Typically this code is sent to you by text or displayed on a code generating application that can run on your phone or mobile device. So if you’re like me, and always have your phone within reach, this is ideal. If you don’t have your phone with you at all times able to receive a text message or generate a code, this feature is likely not for you.

Here’s how it works: After setting up this feature at home I login to Facebook. I have to put in my username, password, and THEN open the code generator application on my phone to type in the current code (which changes every 20 or so seconds). Because I’m at home, the next time I login I don’t have to put in the code because I’ve logged in from home before (I click “Save this browser”). Now, if I’m going to Facebook at the library I will need to do all the above, but click “don’t save this browser” when prompted.

What’s the catch with Two-Step verification? If I don’t have my phone with me; I’m out of luck. And even more importantly, if I lose my phone I will need to login to my account from a computer that I’ve logged in from before in order to update my Two-Step notification settings. What if I don’t have such a device for some reason? Then I have to use a special recovery code that was generated when I set up this feature. If I don’t have my phone *or* a device I’ve previously logged in with before *or* my “special recovery code” then my account is forever locked, truly lost in cyberspace. Not even the tech god’s can get me back into my account. So put a little time and thought into setting up Two-Step verification for each of your accounts.

Here is some more information on what Two-Step Verification is and how to set it up for some popular services:

USA Today Q&A: What is two-step verification?

Frequently asked questions about two-step verification for Apple ID

MS Windows Two-step verification: FAQ

Google 2-Step Verification

Facebook: What are login approvals? How do I turn this setting on?

Twitter: Using login verification

Ok all, I think that is about enough out of me. Enjoy, share, and keep it safe out there.