Solving Extreme Poverty

The video presentation Solving Extreme Poverty and Homelessness in the USA can be seen on YouTube:

Commentary on Quora can be accessed here: https://qr.ae/pG5f5w

PDF of all slides in the presentation:

The text of the presentation with slide titles in bold:

Solving Extreme Poverty and Homelessness in the USA

This presentation describes a potential solution from a big picture perspective. These ideas are being presented as a starting point for discussions on poverty and homelessness. I am inviting fellow poverty survivors – people with lived experience surviving poverty, particularly homelessness – to participate in this discussion. If you have never experience poverty directly, your support is appreciated but please be respectful and allow people with lived experience take the lead in this conversation.

Big Picture, Big Steps

Three (3) different plans with overlapping goals implemented simultaneously. This presentation covers the objectives of all three plans and then looks at the five-year plan in more detail.

5-Year Plan: Objective

The 5-year plan.

The objective is to meet the immediate needs of people currently surviving extreme poverty or homelessness, those in danger of slipping into poverty and people escaping catastrophic events, 

5-Year Plan

To this end, the 5-year plan focuses on providing emergency support to those surviving poverty, universal support to everyone and the establishment of emergency facilities and basic infrastructure to support providing for a large population a catastrophic event.

50-Year Plan: Objective

The 50-year plan.

The objective is to address the root causes of social inequality, financial inequality, global warming and environmental destruction.

50-Year Plan

This requires digging deep into complicated issues like systemic racism, global warming, environmental destruction and crumbling infrastructure.

500-Year Plan:  Objective

The objective is to address long-term problems through multigenerational planning.

500-Year Plan

The 500-year plan lays the groundwork for making changes while fostering a culture of identifying and evaluating potential risks and consequences across many generations.

5 Year Plan

Now for a more detailed look at the five-year plan.

On its own, this is an ambitious band-aid for out-of-control homelessness and poverty in the United States, designed to keeps people alive while facilitating a transition into the 50-year plan.

Emergency Support

Emergency support is a lifeboat, not a final destination.  It consists of an expansion of both the resources available and the number of people eligible, while simplifying the process for accessing necessary resources.

Government Benefits

Food, housing, transportation and childcare make up the most basic benefits already available. They also address some of the most basic necessities.

Government Benefits

Modifying the existing program is simple: 1) increase the amount o all resources made available to each person, 2) increase the annual income requirements to include the middle class,

Government Benefits

3) simplify access – For example: automatically enrolling everyone whose tax returns indicate eligibility

Government Benefits

And 4) Expand benefits to cover more key issues faced by people surviving poverty, such as student loan forgiveness and free legal assistance

Universal Support

As the title implies, these resources would be immediately available to everyone.

Universal Basic Income (UBI)

Universal Basic Income or UBI checks providing a reliable monthly payment to everyone over a certain age, regardless of income, living status or participation in other government assistance programs. Cash in hand goes a long way towards establishing nationwide financial stability and ensuring the basic needs of the population are met.

Universal Health Care

Five (5) years of Universal health care, covering all aspects of mental and physical health care at no cost to the patient, including medical programs normally addressed outside of hospitals, like dental, eye and chiropractic care.

Universal Photo IDs

The universal ID would be designed to be entirely free of charge, reasonably easy to create, centrally managed and regularly updated. To that end, a new ID could be based on anything from standard identification documentation to information provided by the individual verbally or select biometric data types.

Universal Photo IDs

The objective is to get everyone into the official universal photo ID system, including people who already have other forms of government ID, thereby making it commonly available and useful.

Universal Photo IDs

This may require connecting it to a specific purpose, such as voter identification, a centralized medical records system, or the universal medical benefits program.

Emergency Facilities

Emergency facilities are distinctly different from existing resources available to people during a crisis. They are designed to provide refuge to a very large population of people, pets and property during anything from a personal emergency to a catastrophic event or a mass evacuation.

Facility Formats

The resources currently available have three (3) possible formats: 1) a cold site, 2) a warm site, and 3) a hot site.

Cold Site

A cold site takes time and effort to set up and may require additional supplies to get up and running. Examples include bomb shelters, remote summer cabins or an RV only used for vacations.

Warm Site

A warm site is used on a limited basis or has a primary purpose that makes it reasonably easy to modify quickly. Either way it is partially up and running and mostly operational. Examples include schools, community centers, churches and stadiums.

Hot Site

A hot site is fully functioning and continually operating. Examples include hospitals, hotels and homeless shelters. Unfortunately, currently operating hot sites are not equipped to handle a large-scale emergency.

Hot Site

Homeless shelters struggle to meet the needs of people surviving poverty on an average day.

Hot Site

Hospitals and hotels are neither designed nor equipped to handle a large population for an extended time.

Hot Site

Emergency Facilities are hot sites specifically designed to handle the worst-case-scenario by meeting the long-term needs of an extremely large population during a crisis – whether that crisis affects a single person or involves a mass-evacuation.

Basic Requirements

Emergency facilities provide a place to live, a place to die, the resources necessary to live, and the ability to access at least one facility from anywhere in any state in the country.

Handicap Accessible

They are 100% handicap accessible because an evacuation event requires fast and simple processes. Able bodied people can used handicapped accessible housing without modification or difficulty. The same cannot be said about people who are handicapped or injured being placed in standard non-accessible housing.

Handicap Accessible

A facility that is 100% handicapped accessible can provide housing and basic resources to anyone at any time – without delay. Simple. Fast. Efficient.

Known Population

The facilities, supplies and the public transportation connecting them MUST be designed to meet the needs of 150% of the total known population of the entire state.

Known Population

That number includes the housed, unhoused, and temporary residents.

Known Population

Why 150%? First, it’s an emergency facility. During an evacuation, everyone is moved out of the danger zone and into a safe place no questions asked – there MUST NEVER be a moment when people are stopped and evaluated for access.

Known Population

Second, if the entire population is evacuated to these facilities at the same time and the total population count is off by 10%-25% or more, then there’s still plenty of room for everyone, including emergency transfers from other facilities.

Emergency Transfer

Which brings us to Emergency transfers. These are pre-established plans for moving people to different emergency facilities when the local facility is compromised, destroyed or at capacity.

Emergency Transfer

To illustrate, Try to imagine the states of California, Oregon and Washington on a map. All three states share an ocean coastline and problems with regular natural disasters, such as earthquakes, wildfires, floods and drought.

Emergency Transfer

In this fictitious scenario…California has three (3) emergency facilities, Oregon has one (1) and Washington State has two (2). A wildfire rips through Oregon, forcing the evacuation of a large portion of its population to the emergency facility. This works until the fire changes course and starts heading for the facility itself

Emergency Transfer

Despite planning, prevention and firefighting efforts, the fire gets dangerously close, and the Oregon facility must be evacuated. Per the plans already in place, the entire displaced population is sent to emergency facilities in California and Washington State via specially designed public transportation, such as a high-speed rail.

Emergency Transfer

When transfers arrive, they are immediately provided living arrangements and access to all resources. Housing and assistance continues for as long as each person or family needs.

Emergency Transfer

When the Oregon facility re-opens, those who remain at the emergency transfer locations are given the option of being transferred back to Oregon. Transfers are always free of charge and, outside of an emergency evacuation, they are voluntary.

Medical

An emergency facility requires comprehensive medical resources. Because this is a continuously operating facility, those resources are available – free of charge – to anyone who needs them 24 hours a day 7 days a week.

Nursing Homes and Hospice Care

A mass evacuation event is going to generate serious injuries, some of them fatal and others requiring long-term care. Evacuations also include nursing home residents and hospice patients in other regions of the state. Therefore, the emergency facility must be prepared to handle the needs of these patients.

Nursing Homes and Hospice Care

Homelessness among the elderly is becoming more and more common. Serious illness often causes financial ruin that leaves individuals and families at the mercy of the welfare system and homeless shelters. Therefore, facilities must be prepared to continuously accommodate the needs of people dealing with a family or personal crisis.

Political

Catastrophic events do not adhere to a political calendar. Citizens evacuated to an emergency facility still have the right to vote in all elections – local and national. Voting options must, by necessity, be made available to all citizens residing at a facility for any length of time.

Communications

Basic communication resources include reliable high speed internet connections and universal cell phone towers designed to allow the entire population the ability to contact family and friends, or to remotely connect to work and school.

Communications

This facilitates communication between individuals, families and government agencies during a disaster. It also helps to encourage people to leave an area in anticipation of a known pending disaster, like a hurricane.

Education and More

Getting back to normal after a disaster takes time. Most likely, people forced to rely on an emergency facility will live there for several months or even years. Life continues.

Education and More

Children must be educated, and college students need to finish school.

Education and More

There are religious events and cultural holidays to observe.

Education and More

Athletes and arm-chair warriors alike need to continue their training.

Education and More

Opportunities to participate in both sports and the arts relieves stress, builds community and helps people continue living their lives. Which, in turn, helps people recover from a traumatic experience and get their lives back on track.

Legal System

Laws and policies governing emergency facilities must be consistent across the entire network to ensure that a flood of people traveling between facilities during an emergency transfer can complete the move as smoothly as possible. The fewer details people are trying to figure out during an emergency, the better.

Community and Culture

Many people will stay at a facility temporarily. Some will take a job and settle down permanently. There will be students who come seeking a free education and individuals who simply choose to remain long-term – these are all good things.

Community and Culture

Anticipating the establishment of a permanent community and actively working to foster a culture that is conducive to the unique nature of life at an emergency facility will help ensure smooth operation over the long-term.

Big Picture, Big Steps

That’s the basic overview of the primary components of the five-year plan à Emergency support, universal support and emergency facilities.

Solving Extreme Poverty and Homelessness in the USA

Thank you for listening!

Bragging Rights: Social Media Policy Development

This course is designed to help Small Business Owners, Human Resources and Marketing Executives understand some of the legal ramifications in dealing with workplace social media issues. 

I completed The Legal Implications of Social Media in the Workplace Regulatory and Case Law Considerations for Employers’ Social Media Policy Development course on Udemy.com.

It provides a good overview of the laws most commonly relied upon in Social Media policy development.There are several case studies that provide excellent insight into the potential consequences of implementing a poorly written or unenforced policy.

For Information Security policy Analysts who have extensive experience researching and writing security policy, most of this will be review. But an examination of the basics is often useful.

Security Breach Notification Laws

The National Conference of State Legislatures (NCSL) has provided a complete list of security breach notification laws implemented at the state level (USA):

All 50 states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands have enacted legislation requiring private or governmental entities to notify individuals of security breaches of information involving personally identifiable information.

This link provides links to each and every law: Security Breach Notification Laws

 

Nonpublic Personal Information (NPI)

Gramm-Leach-Bliley Act (GLBA), 15 U.S.C. § 6801-6809 (2002). Available at: https://www.law.cornell.edu/uscode/text/15/6809

(4)Nonpublic personal information
(A)The term “nonpublic personal information” means personally identifiable financial information—
(i)provided by a consumer to a financial institution;
(ii)resulting from any transaction with the consumer or any service performed for the consumer; or
(iii)otherwise obtained by the financial institution.
(B)Such term does not include publicly available information, as such term is defined by the regulations prescribed under section 6804 of this title.
(C)Notwithstanding subparagraph (B), such term—
(i)shall include any list, description, or other grouping of consumers (and publicly available information pertaining to them) that is derived using any nonpublic personal information other than publicly available information; but
(ii)shall not include any list, description, or other grouping of consumers (and publicly available information pertaining to them) that is derived without using any nonpublic personal information.

(GLBA, 15 U.S.C. § 6809(4)(B))

 

Personally Identifiable Financial Information (PIFI)

PIFI is defined in Securities and Exchange Commission (SEC), Final Rule: Privacy of Consumer Financial Information (Regulation S-P) 17 CFR Part 248 (2000). Available at: https://www.sec.gov/rules/final/34-42974.htm

Both the GLBA and the regulations define NPI[5] in terms of PIFI.
The GLBA does not define PIFI but the FTC regulations define the term to mean any information:
(i) A consumer provides to you [the financial institution] to obtain a financial product or service from you;
(ii) About a consumer resulting from any transaction involving a financial product or service between you and a consumer; or
(iii) You otherwise obtain about a consumer in connection with providing a financial product or service to that consumer.

Bragging Rights: NITTF Insider Threat Training

The office of the Director of National Intelligence (DNI), National Insider Threat Task Force (NITTF), has provided access to several Insider Threat training resources. I completed the Insider Threat Training Module.

The module just covers the basics, but it’s well made and clearly explains key topics. It’s a good introduction to understanding insider threats and it provides this nifty certificate upon completion:

Radioactive Experiments on Orphans

Vanderbilt University physicians administered radioactive cocktails to pregnant women in Nashville. The University of Chicago fed the radioactive elements strontium and cesium to 102 unwitting patients at state schools. One Dickensian institution, the Fernald School in Waltham, Massachusetts, added radioactive oatmeal to the menus of thirty orphans in a program sponsored by the AEC with the support of the Quaker Oats Company. Old videotapes reveal that some of these Fernald boys were African American, but no records with racial identifiers were ever released. When victims died, government scientists obtained their bodies and autopsied them carefully, measuring the levels of radioactivity and biological damage. To enable large numbers of these grim assessments, at least fifteen thousand bodies were exposed and collected for one project alone: Operation Sunshine. Until the mid-1980s and without the knowledge of patients or their next of kin, this program shipped the bodies and body parts of radiation experiment victims to be dissected at headquarters in Los Alamos, New Mexico.

Medical Apartheid: The Dark History of Medical Experimentation on Black Americans from Colonial Times to the Present by Harriet A. Washington

GDPR: Search Engines and Privacy

Quote 1:

The European Court of Justice set out the general rule for these decisions in 2014: the search engine which lists results leading to information about a person must balance the individual’s right to privacy against Google’s (and the greater public’s) right to display / read publicly available information.

Quote 2:

The bigger issue though is the – almost deliberate – lack of clarity. Each person’s details need to be considered on their own merit, and a decision made based on this balance between the rights of the individual and the rights of the wider society, based on a subjective consideration of the original crime, the persons actions since and the benefit to society as a whole. This is further complicated by the fact that different rules will apply in different countries, even within the EU, as case law diverges. The result: Google is likely to face challenges if it takes anything other than a very obedient approach to those requests to be forgotten which it receives.

Google or Gone: UK Court Rules on ‘Right to be Forgotten,’ Data Protection Representatives (DPR), by Tim Bell, April 16, 2018

Phishing: Setting Traps

Lay traps: When you’ve mastered the basics above, consider setting traps for phishers, scammers and unscrupulous marketers. Some email providers — most notably Gmail — make this especially easy. When you sign up at a site that requires an email address, think of a word or phrase that represents that site for you, and then add that with a “+” sign just to the left of the “@” sign in your email address. For example, if I were signing up at example.com, I might give my email address as krebsonsecurity+example@gmail.com. Then, I simply go back to Gmail and create a folder called “Example,” along with a new filter that sends any email addressed to that variation of my address to the Example folder. That way, if anyone other than the company I gave this custom address to starts spamming or phishing it, that may be a clue that example.com shared my address with others (or that it got hacked, too!). I should note two caveats here. First, although this functionality is part of the email standard, not all email providers will recognize address variations like these. Also, many commercial Web sites freak out if they see anything other than numerals or letters, and may not permit the inclusion of a “+” sign in the email address field.

After Epsilon: Avoiding Phishing Scams & Malware, Krebs on Security, by Brian Krebs, 04/06/2011

Unintentional Insider Threat (UIT)

An unintentional insider threat is (1) a current or former employee, contractor, or business partner (2) who has or had authorized access to an organization’s network system, or data and who, (3) through action or inaction without malicious intent, (4) unwittingly causes harm or substantially increases the probability of future serious harm to the confidentiality, integrity, or availability.

Unintentional Insider Threat and Social Engineering, Insider Threat Blog, Carnegie Mellon University (CMU) Security Engineering Institute (SEI), by David Mundie, 03/31/2014