DealBook: Doubt Is Cast on Firms Hired to Help Banks

Federal authorities are scrutinizing private consultants hired to clean up financial misdeeds like money laundering and foreclosure abuses, taking aim at an industry that is paid billions of dollars by the same banks it is expected to police.

The consultants operate with scant supervision and produce mixed results, according to government documents and interviews with prosecutors and regulators. In one case, the consulting firms enabled the wrongdoing. The deficiencies, officials say, can leave consumers vulnerable and allow tainted money to flow through the financial system.

“How can you be independent if you’re hired by the entity you’re reviewing?” Senator Jack Reed, Democrat of Rhode Island, who sits on the Senate Banking Committee, said.

The pitfalls were exposed last month when federal regulators halted a broad effort to help millions of homeowners in foreclosure. The regulators reached an $8.5 billion settlement with banks, scuttling a flawed foreclosure review run by eight consulting firms. In the end, borrowers hurt by shoddy practices are likely to receive less money than they deserve, regulators said.

On Thursday, Senator Elizabeth Warren, Democrat of Massachusetts, and Representative Elijah Cummings, Democrat of Maryland, announced that they would open an investigation into the foreclosure review, seeking “additional information about the scope of the harms found.”

Critics concede that regulators have little choice but to hire outsiders for certain responsibilities. after they find problems at the banks. The government does not have the resources to ensure that banks follow the rules. Still, consultants like Deloitte & Touche and the Promontory Financial Group can add to regulators’ headaches, the government documents and interviews indicate. Some banks that work with consultants continue to run afoul of the law. At other times, consultants underestimate the extent of the misdeeds or facilitate them, preventing regulators from holding institutions accountable.

Now, regulators and lawmakers are rethinking their relationship with the consultants. Officials at the Federal Reserve, which oversees many large banks, are questioning the prudence of relying on consultants so heavily, said two people with direct knowledge of the matter.

When the Office of the Comptroller of the Currency penalized JPMorgan Chase last month for breakdowns in money-laundering controls, it imposed stricter requirements, ordering the bank to hire a consultant with “specialized experience” in money laundering and to ensure that the firm “not be subject to any conflict of interest.” In a separate action against the bank related to a $6 billion trading loss last year, the agency opted not to mandate an outside consultant at all.

While the comptroller’s office will continue requiring consultants in certain cases, some agency officials are worried about the quality of the work, as well as the consultants’ independence, according to three government officials briefed on the matter.

Since the financial crisis, regulators have increasingly relied on consultants. The comptroller’s office ordered banks to hire consultants in more than 130 enforcement actions since 2008, or nearly 15 percent of the cases.

It can be a lucrative business. In 2011, regulators mandated that 14 banks employ consultants to determine whether homeowners were wrongfully evicted. Over 14 months, the consultants collected about $2 billion in fees, according to regulators and bank officials.

Those fees amounted to more than half of what homeowners will receive under the $8.5 billion settlement that ended the review. As part of the deal, officials will disburse $3.3 billion to 3.8 million borrowers in foreclosure.

According to consultants and regulators, the broad review was plagued with inefficiencies. For example, Promontory initially instructed employees to calculate lawyers’ fees for each loan, to assess if borrowers were overcharged. Later, it scrapped the original procedure, only to reverse the policy again two weeks later, according to two reviewers who worked for Promontory.

“From Day 1, Promontory strove to conduct its review work as thoroughly and independently as possible,” a spokesman for the firm, Christopher Winans, said in a statement. “Our overarching concern at all times was to serve the best interests of borrowers.”

Some lawmakers question whether a consultant’s regulatory connections helped it secure contracts. PricewaterhouseCoopers, which has a stable of former Securities and Exchange Commission officials, won much of the foreclosure review work, signing deals with four banks, including Citigroup. Promontory, the firm examining loans for Wells Fargo, Bank of America and PNC, was founded in 2000 by the former head of the comptroller’s office, Eugene A. Ludwig.

When the contracts were initially awarded, some housing advocates complained that consulting firms could not objectively evaluate banks with which they had pre-existing business relationships. The comptroller’s office said it vetted the firms to spot such potential conflicts, and argued that the process provided swifter relief for homeowners than if the government had hired the companies directly through a lengthy contracting process.

But concerns persisted. Deloitte, which won the contract to review JPMorgan’s loans, had previously audited Washington Mutual and Bear Stearns, two firms JPMorgan acquired during the financial crisis. In May, the comptroller’s office replaced Allonhill, the consultant for Aurora Bank, after the firm disclosed that it had already reviewed some “of the same pool of loans” as part of an earlier contract.

“It’s clear from the foreclosure settlement that oversight over consultants was inadequate and the review process was deeply flawed,” said Representative Carolyn B. Maloney, Democrat of New York, who recently pressed regulators to detail how consultants were paid. People close to the review say consultants relied on a process that the comptroller’s office designed in 2011, under previous leadership.

“This was a very complex process,” a spokesman for the comptroller said. “Throughout the process, regulators provided continuous oversight, guidance and were available to discuss issues.” The agency also performs spot checks on the consultants.

Still, the foreclosure review highlighted broader concerns about the role consultants play.

Since the financial crisis, the comptroller’s office has issued nearly 20 enforcement actions against banks that had already hired consultants to help iron out problems, according to government documents. While consultants cannot be expected to remedy every last issue at the banks, the actions raise questions about the effectiveness of their work.

When HSBC, the British bank, was sanctioned in 2003 over porous money-laundering controls, the bank turned to Deloitte to review its compliance, an official briefed on the matter said. Deloitte also worked for HSBC from 2006 to 2008, the person said, building a system to monitor money flows more effectively. But the bank ran into trouble in 2010 over similar issues, as highlighted in a recent scathing report by the Senate’s Permanent Subcommittee on Investigations.

As part of a regulatory order, HSBC again hired Deloitte, this time to assess the number of times the bank failed to report suspicious transactions. Deloitte, three officials said, generously bundled hundreds of missed transfers into a single report. That helped save the bank from some government fines.

Despite the undercounting, HSBC still paid a record $1.9 billion last year to settle accusations that it enabled drug cartels to move money through its American subsidiaries.

In a statement, a spokesman for the firm said, “Deloitte fully stands behind the quality and integrity of its work on behalf of regulatory authorities.”

Deloitte has also been suspected of helping institutions cloak illicit transfers of money to rogue nations around the globe. In August, New York’s top banking regulator, Benjamin M. Lawsky, accused Deloitte of helping the British bank Standard Chartered flout American sanctions.

The consulting firm was hired to flag suspicious transfers routed through Standard Chartered’s New York branches. Instead, it instructed bankers on how to escape regulatory scrutiny, according to state court documents.

Deloitte turned over “highly confidential information” from which the bank gleaned insight into “regulators’ concerns and strategies,” the court documents said. The firm later doctored its report to regulators, Mr. Lawsky said, deliberately removing some illegal transfers on behalf of Iranian clients. In an e-mail, a Deloitte partner admitted that a report on the transactions was a “watered-down version.”

The authorities never took legal action against Deloitte, and federal officials noted in a separate settlement agreement that Standard Chartered employees withheld critical information from the consulting firm.

Despite these concerns, regulators are turning to a familiar source to help Standard Chartered. As part of a $327 million settlement last year, the bank is required to hire “an independent consultant.”

Read More..

Insurance Industry Report Faults High Fees for Out-of-Network Care


Michael Nagle for The New York Times


Angel Gonzalez, 36, faced huge bills after emergency gallbladder surgery, despite having good insurance coverage. “I was on the hook for more than I made in a year.”







Just over a year ago, Angel Gonzalez, 36, awoke with searing chest pain at 2 a.m. A friend drove him to the closest emergency room.




Though he was living on $18,000 a year as a graduate student, Mr. Gonzalez had good insurance and the hospital, St. Charles in Port Jefferson, N.Y., was in his network. But the surgeon who came in to remove Mr. Gonzalez’s gallbladder that Sunday night was not.


He billed Mr. Gonzalez $30,000, and an assistant billed an additional $30,000. Mr. Gonzalez’s policy covered out-of-network providers, but at a rate it considered appropriate: $2,000. “I was on the hook for more than I made in a year,” Mr. Gonzalez said.


A health insurance industry report to be released on Friday highlights the exorbitant fees charged by some doctors to out-of-network patients like Mr. Gonzalez. The report, by America’s Health Insurance Plans, or AHIP, contrasts some of the highest bills charged by non-network providers in 30 states with Medicare rates for the same services. Some of the charges, the insurers assert, are 30, 40 or nearly 100 times greater than Medicare rates.


Insurers hope to spotlight a vexing problem that they say the Affordable Care Act does little to address. “When you’re out of network, it’s a blank check,” said Karen Ignagni, president and chief executive of AHIP. “The consumer is vulnerable to ‘anything goes.’ ”


“Unless we deal with cost, we won’t have affordability,” she added. “And unless we have affordability, we won’t have people participating” under the Affordable Care Act.


Among the fees on the report’s list are a $6,205 outpatient office visit to a doctor in Massachusetts for which Medicare would have paid $152; a $12,000 bill for examining a tissue specimen in New York for which Medicare would have paid $128; and a $48,983 surgeon’s fee for a total hip replacement in New Jersey that Medicare would have reimbursed at $1,543. Many of the highest billers were in New York, Texas, Florida and New Jersey.


Elisabeth R. Benjamin, co-founder of the Health Care for All New York coalition, who is often at odds with the insurance industry, said that “is one area we totally agree on.” She continued, “Out-of-network billing is just out of control.”


Even when out-of-network fees are compared with average commercial insurance reimbursements, which are usually greater than Medicare, she said, “It’s pretty outrageous.”


Doctors say the report is skewed because it focuses on a few dozen cases of overcharging that are not representative of their billing. In response to the insurers’ report, the American Medical Association noted on Thursday that a recent analysis found that doctors’ services account for just 16 percent of health care costs.


“There are outliers in every profession, in every business,” said Dr. Andrew Y. Kleinman, a plastic surgeon who is vice president of the Medical Society of the State of New York.


Dr. Kleinman also noted that insurers had effectively shifted the costs of out-of-network care onto patients by changing reimbursement formulas. Instead of the rates commercial insurers usually pay doctors, insurers increasingly are basing their out-of-network payments on Medicare rates, usually far lower.


A growing number of high-end, flexible health plans offer policies that cover outside providers at, for example, 140 percent of Medicare. “They’re selling you an insurance product you can’t use,” Dr. Kleinman said. “You’re buying an insurance policy where the out-of-network benefit is worthless.”


The industry’s own report suggests that using Medicare rates as a benchmark will lead to patients’ picking up much more of the cost for out-of-network care, whether they carefully select a specialist or, as in the case of Mr. Gonzalez and many others, have no choice in the matter.


Had Mr. Gonzalez been 65 or older, Medicare would have paid only $958 for the surgery. The average commercial price is $12,292, according to FAIR Health, an independent nonprofit group that tracks information on health care costs.


But Mr. Gonzalez’s health plan, United Healthcare, determined the fee should be $1,273, of which the company paid $838. Mr. Gonzalez filed appeals, which were rejected. He then contacted Community Health Advocates at the Community Service Society of New York for help, and the group’s caseworkers negotiated with the surgeon on his behalf.


After months of wrangling, the surgeon agreed to accept a significantly reduced payment: $340.


Consumer advocates and health insurance executives are calling for greater transparency in health care pricing, including upfront disclosure of prices of medical procedures and services.


“The health care industry can give you an estimate, just like any other industry,” said Carrie H. Colla, an assistant professor at the Dartmouth Institute for Health Policy and Clinical Practice, noting that the Dartmouth-Hitchcock Medical Center has a patient price estimator online.  


“It’s just not current practice right now,” Dr. Colla said. “Sometimes a doctor won’t even know. The patient really has to push for it.”


Read More..

Insurance Industry Report Faults High Fees for Out-of-Network Care


Michael Nagle for The New York Times


Angel Gonzalez, 36, faced huge bills after emergency gallbladder surgery, despite having good insurance coverage. “I was on the hook for more than I made in a year.”







Just over a year ago, Angel Gonzalez, 36, awoke with searing chest pain at 2 a.m. A friend drove him to the closest emergency room.




Though he was living on $18,000 a year as a graduate student, Mr. Gonzalez had good insurance and the hospital, St. Charles in Port Jefferson, N.Y., was in his network. But the surgeon who came in to remove Mr. Gonzalez’s gallbladder that Sunday night was not.


He billed Mr. Gonzalez $30,000, and an assistant billed an additional $30,000. Mr. Gonzalez’s policy covered out-of-network providers, but at a rate it considered appropriate: $2,000. “I was on the hook for more than I made in a year,” Mr. Gonzalez said.


A health insurance industry report to be released on Friday highlights the exorbitant fees charged by some doctors to out-of-network patients like Mr. Gonzalez. The report, by America’s Health Insurance Plans, or AHIP, contrasts some of the highest bills charged by non-network providers in 30 states with Medicare rates for the same services. Some of the charges, the insurers assert, are 30, 40 or nearly 100 times greater than Medicare rates.


Insurers hope to spotlight a vexing problem that they say the Affordable Care Act does little to address. “When you’re out of network, it’s a blank check,” said Karen Ignagni, president and chief executive of AHIP. “The consumer is vulnerable to ‘anything goes.’ ”


“Unless we deal with cost, we won’t have affordability,” she added. “And unless we have affordability, we won’t have people participating” under the Affordable Care Act.


Among the fees on the report’s list are a $6,205 outpatient office visit to a doctor in Massachusetts for which Medicare would have paid $152; a $12,000 bill for examining a tissue specimen in New York for which Medicare would have paid $128; and a $48,983 surgeon’s fee for a total hip replacement in New Jersey that Medicare would have reimbursed at $1,543. Many of the highest billers were in New York, Texas, Florida and New Jersey.


Elisabeth R. Benjamin, co-founder of the Health Care for All New York coalition, who is often at odds with the insurance industry, said that “is one area we totally agree on.” She continued, “Out-of-network billing is just out of control.”


Even when out-of-network fees are compared with average commercial insurance reimbursements, which are usually greater than Medicare, she said, “It’s pretty outrageous.”


Doctors say the report is skewed because it focuses on a few dozen cases of overcharging that are not representative of their billing. In response to the insurers’ report, the American Medical Association noted on Thursday that a recent analysis found that doctors’ services account for just 16 percent of health care costs.


“There are outliers in every profession, in every business,” said Dr. Andrew Y. Kleinman, a plastic surgeon who is vice president of the Medical Society of the State of New York.


Dr. Kleinman also noted that insurers had effectively shifted the costs of out-of-network care onto patients by changing reimbursement formulas. Instead of the rates commercial insurers usually pay doctors, insurers increasingly are basing their out-of-network payments on Medicare rates, usually far lower.


A growing number of high-end, flexible health plans offer policies that cover outside providers at, for example, 140 percent of Medicare. “They’re selling you an insurance product you can’t use,” Dr. Kleinman said. “You’re buying an insurance policy where the out-of-network benefit is worthless.”


The industry’s own report suggests that using Medicare rates as a benchmark will lead to patients’ picking up much more of the cost for out-of-network care, whether they carefully select a specialist or, as in the case of Mr. Gonzalez and many others, have no choice in the matter.


Had Mr. Gonzalez been 65 or older, Medicare would have paid only $958 for the surgery. The average commercial price is $12,292, according to FAIR Health, an independent nonprofit group that tracks information on health care costs.


But Mr. Gonzalez’s health plan, United Healthcare, determined the fee should be $1,273, of which the company paid $838. Mr. Gonzalez filed appeals, which were rejected. He then contacted Community Health Advocates at the Community Service Society of New York for help, and the group’s caseworkers negotiated with the surgeon on his behalf.


After months of wrangling, the surgeon agreed to accept a significantly reduced payment: $340.


Consumer advocates and health insurance executives are calling for greater transparency in health care pricing, including upfront disclosure of prices of medical procedures and services.


“The health care industry can give you an estimate, just like any other industry,” said Carrie H. Colla, an assistant professor at the Dartmouth Institute for Health Policy and Clinical Practice, noting that the Dartmouth-Hitchcock Medical Center has a patient price estimator online.  


“It’s just not current practice right now,” Dr. Colla said. “Sometimes a doctor won’t even know. The patient really has to push for it.”


Read More..

Wall Street Journal Reports Attack by China Hackers





One day after The New York Times reported that Chinese hackers had infiltrated its computers and stolen passwords for its employees, The Wall Street Journal announced that it too had been hacked.




On Thursday, The Journal reported that it had been attacked by Chinese hackers who were trying to monitor the company’s coverage of China. It said hackers had broken into its network through computers in its Beijing bureau.


In a written statement, the business newspaper owned by News Corporation described the attack as an “ongoing issue” and said it was working closely with authorities and security specialists to clean up its systems. It said that it completed a “network overhaul” on Thursday in an effort to rid its systems of hackers.


China’s Ministry of National Defense has denied any involvement in the cyberattack at The Times or any other American corporations.


But security experts said that in 2008, Chinese hackers began targeting American news organizations as part of an effort to monitor coverage of Chinese issues.


In a report for clients in December, Mandiant, a computer security company, said that over the course of several investigations it found evidence that Chinese hackers had stolen e-mails, contacts and files from more than 30 journalists and executives at Western news organizations, and had maintained a “short list” of journalists for repeated attacks. Among those targeted were journalists who had written about Chinese leaders, political and legal issues in China and the telecom giant Huawei.


Bloomberg News, another American news organization, was targeted by Chinese hackers last year, and some computers were infected, according to a person with knowledge of the company’s internal investigation. The attack occurred after Bloomberg published an article on June 29 about the wealth accumulated by relatives of Xi Jinping, a Chinese official who is expected to become president in March.


Bloomberg has confirmed that hackers had made attempts but said that “no computer systems or computers were compromised.”


The timing of the attacks on The New York Times coincided with the reporting for an investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings.


Security experts hired by The Times to detect and block the computer attacks found digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network.


The Associated Press reported Thursday that officials in the Obama administration were considering more assertive action against Beijing to stop Chinese computer espionage campaigns.


The Secretary of State, Hillary Clinton, said Thursday a global effort was needed o establish “rules of the road” for cyber activity.  In her final meeting with reporters at the State Department, Mrs. Clinton addressed a question about China’s efforts to infiltrate computer systems at The New York Times. 


 “We have seen over the last years an increase in not only the hacking attempts on government institutions but also non-governmental ones,” Mrs. Clinton said.


The Chinese, she said, “are not the only people who are hacking us.” 


 “There is a lot that we are working on that will be deployed in the event that we don’t get some kind of international effort under way,” Mrs. Clinton added without elaborating.


The United States has been increasingly vocal about such efforts against government and private industry. In a November 2011 intelligence report, government officials specifically accused China and Russia of stealing intellectual property for economic gain.


Michael Gordon contributed reporting from Washington.



Read More..

Explosion in Mexico City Kills at Least 25


Guillermo Gutierrez/Associated Press


Rescue workers dig for survivors after an explosion Thursday in the basement of an administrative building downtown.







MEXICO CITY — A mysterious explosion at the headquarters of Mexico’s state-owned oil company here on Thursday killed at least 25 people and injured 101, according to government officials, as windows shattered, the ground shook and thousands of employees fled into a panicked downtown.




The cause of the explosion was not immediately known. It occurred just before 4 p.m. in the basement of an administrative building next to the 52-story tower of Petroleos Mexicanos, or Pemex. Company officials said there was significant damage to the first floor and mezzanine of the building, and witnesses said they saw rescue workers helping trapped employees who had been pinned under falling debris, while others dragged out the injured and the dead. Officials said the dead included 17 women and 8 men.


“I saw them take out three people covered in blood,” said Trinidad Díaz, 31, the owner of a restaurant a block from the explosion. “And after that, ambulances started arriving, one after the other.”


The blast — in a highly protected but decaying office complex — comes in the middle of a heated debate over the future of Pemex, a national institution and a corporate behemoth that has been plagued by declining production, theft and an abysmal safety record that includes a major pipeline explosion almost every year, like the one in September that killed 30 workers.


Experts, while cautioning that it was too early to tell what had gone wrong, said the company would inevitably face more severe scrutiny as Mexico’s Congress returned to work in the coming weeks. The country’s new president, Enrique Peña Nieto, has pledged to submit a plan for overhauling Pemex, opening it to more private investment and perhaps greater consolidation. But with the blast, deliberations about the company could become more elemental.


“You pull all of this together and you say, well, if they can’t even guarantee safety in their own building, their own headquarters, what does that tell us about the company?” said Duncan Wood, director of the Mexico Institute at the Woodrow Wilson International Center for Scholars. “It tells us there are things seriously wrong there. It tells you things need to be seriously shaken up.”


George Baker, director of Energia.com, an energy research institute in Houston, said that previous safety scandals at Pemex had been used by Mexican leaders as an argument for making controversial changes. In 1992, he said, a major explosion in a residential Guadalajara neighborhood — caused by gas leaking into the sewers — was followed by calls for change, and a plan to break Pemex into smaller pieces.


“The provocation, the pretext was that we had this terrible thing happen and now we are going to have a response from Pemex,” Mr. Baker said, adding that the explosion on Thursday would also now become part of the political calculations over what to do about the company.


“This may be used, may be manipulated, used as a pretext to do something,” he said. “Who knows what that something is, but they may exploit it to do something they were going to do anyway.”


At the scene, employees who were visibly shaken said the explosion felt like a bomb or an earthquake. After a deep rumble, a plume of smoke rose skyward and people rushed into the streets. Four rescue helicopters landed in the area to remove the dead or injured, while a half-dozen more helicopters hovered overhead. Soldiers, police officers and ambulances filled the area, and streets were quickly cordoned off.


A team of three emergency responders who had entered the building soon after the blast said that it appeared that two basement floors and parts of three upper floors had collapsed. Papers were strewed everywhere, and the scent of dust lingered in the air. Those on the emergency team said another rescue worker who had gone inside told them he saw eight lifeless bodies.


Just before dark, local news outlets reported that President Peña Nieto had arrived. He had already demanded an investigation and expressed remorse, using his Twitter account. “I profoundly lament the death of our fellow workers at Pemex,” he said on Twitter just before arriving. “My condolences to their families.”


Pemex officials, using the company’s official Twitter account to confirm that at least 14 people had died, said around the time of the explosion that its offices were being evacuated because of an electrical problem. Later, the company said forensic teams were investigating the cause, which had not been determined. “Any other explanation with respect to this is speculation.”


Read More..

Chinese Hackers Infiltrate New York Times Computers





SAN FRANCISCO — For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.







The New York Times published an article in October about the wealth of the family of China's prime minister, Wen Jiabao, in both English and Chinese.







After surreptitiously tracking the intruders to study their movements and help erect better defenses to block them, The Times and computer security experts have expelled the attackers and kept them from breaking back in.


The timing of the attacks coincided with the reporting for a Times investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings.


Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network. They broke into the e-mail accounts of its Shanghai bureau chief, David Barboza, who wrote the reports on Mr. Wen’s relatives, and Jim Yardley, The Times’s South Asia bureau chief in India, who previously worked as bureau chief in Beijing.


“Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied,” said Jill Abramson, executive editor of The Times.


The hackers tried to cloak the source of the attacks on The Times by first penetrating computers at United States universities and routing the attacks through them, said computer security experts at Mandiant, the company hired by The Times. This matches the subterfuge used in many other attacks that Mandiant has tracked to China.


The attackers first installed malware — malicious software — that enabled them to gain entry to any computer on The Times’s network. The malware was identified by computer security experts as a specific strain associated with computer attacks originating in China. More evidence of the source, experts said, is that the attacks started from the same university computers used by the Chinese military to attack United States military contractors in the past.


Security experts found evidence that the hackers stole the corporate passwords for every Times employee and used those to gain access to the personal computers of 53 employees, most of them outside The Times’s newsroom. Experts found no evidence that the intruders used the passwords to seek information that was not related to the reporting on the Wen family.


No customer data was stolen from The Times, security experts said.


Asked about evidence that indicated the hacking originated in China, and possibly with the military, China’s Ministry of National Defense said, “Chinese laws prohibit any action including hacking that damages Internet security.” It added that “to accuse the Chinese military of launching cyberattacks without solid proof is unprofessional and baseless.”


The attacks appear to be part of a broader computer espionage campaign against American news media companies that have reported on Chinese leaders and corporations.


Last year, Bloomberg News was targeted by Chinese hackers, and some employees’ computers were infected, according to a person with knowledge of the company’s internal investigation, after Bloomberg published an article on June 29 about the wealth accumulated by relatives of Xi Jinping, China’s vice president at the time. Mr. Xi became general secretary of the Communist Party in November and is expected to become president in March. Ty Trippet, a spokesman for Bloomberg, confirmed that hackers had made attempts but said that “no computer systems or computers were compromised.”


Signs of a Campaign


The mounting number of attacks that have been traced back to China suggest that hackers there are behind a far-reaching spying campaign aimed at an expanding set of targets including corporations, government agencies, activist groups and media organizations inside the United States. The intelligence-gathering campaign, foreign policy experts and computer security researchers say, is as much about trying to control China’s public image, domestically and abroad, as it is about stealing trade secrets.


This article has been revised to reflect the following correction:

Correction: January 31, 2013

An earlier version of this article misstated the year that the United States and Israel were said to have started a cyber attack that caused damage at Iran’s main nuclear enrichment plant, and the article misstated the specific type of attack. The attack was a computer worm, not a virus, and it started around 2008, not 2012.



Read More..

Well: Waiting for Alzheimer's to Begin

My gray matter might be waning. Then again, it might not be. But I swear that I can feel memories — as I’m making them — slide off a neuron and into a tangle of plaque. I steel myself for those moments to come when I won’t remember what just went into my head.

I’m not losing track of my car keys, which is pretty standard in aging minds. Nor have I ever forgotten to turn off the oven after use, common in menopausal women. I can always find my car in the parking lot, although lots of “normal” folk can’t.

Rather, I suddenly can’t remember the name of someone with whom I’ve worked for years. I cover by saying “sir” or “madam” like the Southerner I am, even though I live in Vermont and grown people here don’t use such terms. Better to think I’m quirky than losing my faculties. Sometimes I’ll send myself an e-mail to-do reminder and then, seconds later, find myself thrilled to see a new entry pop into my inbox. Oops, it’s from me. Worse yet, a massage therapist kicked me out of her practice for missing three appointments. I didn’t recall making any of them. There must another Nancy.

Am I losing track of me?

Equally worrisome are the memories increasingly coming to the fore. Magically, these random recollections manage to circumnavigate my imagined build-up of beta-amyloid en route to delivering vivid images of my father’s first steps down his path of forgetting. He was the same age I am now, which is 46.

“How old are you?” I recall him asking me back then. Some years later, he began calling me every Dec. 28 to say, “Happy birthday,” instead of on the correct date, Dec. 27. The 28th had been his grandmother’s birthday.

The chasms were small at first. Explainable. Dismissible. When he crossed the street without looking both ways, we chalked it up to his well-cultivated, absent-minded professor persona. But the chasms grew into sinkholes, and eventually quicksand. When we took him to get new pants one day, he kept trying on the same ones he wore to the store.

“I like these slacks,” he’d say, over and over again, as he repeatedly pulled his pair up and down.

My dad died of Alzheimer’s last April at age 73 — the same age at which his father succumbed to the same disease. My dad ended up choosing neurology as his profession after witnessing the very beginning of his own dad’s forgetting.

Decades later, grandfather’s atrophied brain found its way into a jar on my father’s office desk. Was it meant to be an ever-present reminder of Alzheimer’s effect? Or was it a crystal ball sent to warn of genetic fate? My father the doctor never said, nor did he ever mention, that it was his father’s gray matter floating in that pool of formaldehyde.

Using the jarred brain as a teaching tool, my dad showed my 8-year-old self the difference between frontal and temporal lobes. He also pointed out how brains with Alzheimer’s disease become smaller, and how wide grooves develop in the cerebral cortex. But only after his death — and my mother’s confession about whose brain occupied that jar — did I figure out that my father was quite literally demonstrating how this disease runs through our heads.

Has my forgetting begun?

I called my dad’s neurologist. To find out if I was in the earliest stages of Alzheimer’s, he would have to look for proteins in my blood or spinal fluid and employ expensive neuroimaging tests. If he found any indication of onset, the only option would be experimental trials.

But documented confirmation of a diseased brain would break my still hopeful heart. I’d walk around with the scarlet letter “A” etched on the inside of my forehead — obstructing how I view every situation instead of the intermittent clouding I currently experience.

“You’re still grieving your father,” the doctor said at the end of our call. “Sadness and depression affect the memory, too. Let’s wait and see.”

It certainly didn’t help matters that two people at my father’s funeral made some insensitive remarks.

“Nancy, you must be scared to death.”

“Is it hard knowing the same thing probably will happen to you?”

Maybe the real question is what to do when the forgetting begins. My dad started taking 70 supplements a day in hopes of saving his mind. He begged me to kill him if he wound up like his father. He retired from his practice and spent all day in a chair doing puzzles. He stopped making new memories in an all-out effort to preserve the ones he already had.

Maybe his approach wasn’t the answer.

Just before his death — his brain a fraction of its former self — my father managed to offer up a final lesson. I was visiting him in the memory-care center when he got a strange look on his face. I figured it was gas. But then his eyes lit up and a big grin overtook him, and he looked right at me and said, “Funny how things turn out.”

An unforgettable moment?

I can only hope.



Nancy Stearns Bercaw is a writer in Vermont. Her book, “Brain in a Jar: A Daughter’s Journey Through Her Father’s Memory,” will be published in April 2013 by Broadstone.

Read More..

Well: Waiting for Alzheimer's to Begin

My gray matter might be waning. Then again, it might not be. But I swear that I can feel memories — as I’m making them — slide off a neuron and into a tangle of plaque. I steel myself for those moments to come when I won’t remember what just went into my head.

I’m not losing track of my car keys, which is pretty standard in aging minds. Nor have I ever forgotten to turn off the oven after use, common in menopausal women. I can always find my car in the parking lot, although lots of “normal” folk can’t.

Rather, I suddenly can’t remember the name of someone with whom I’ve worked for years. I cover by saying “sir” or “madam” like the Southerner I am, even though I live in Vermont and grown people here don’t use such terms. Better to think I’m quirky than losing my faculties. Sometimes I’ll send myself an e-mail to-do reminder and then, seconds later, find myself thrilled to see a new entry pop into my inbox. Oops, it’s from me. Worse yet, a massage therapist kicked me out of her practice for missing three appointments. I didn’t recall making any of them. There must another Nancy.

Am I losing track of me?

Equally worrisome are the memories increasingly coming to the fore. Magically, these random recollections manage to circumnavigate my imagined build-up of beta-amyloid en route to delivering vivid images of my father’s first steps down his path of forgetting. He was the same age I am now, which is 46.

“How old are you?” I recall him asking me back then. Some years later, he began calling me every Dec. 28 to say, “Happy birthday,” instead of on the correct date, Dec. 27. The 28th had been his grandmother’s birthday.

The chasms were small at first. Explainable. Dismissible. When he crossed the street without looking both ways, we chalked it up to his well-cultivated, absent-minded professor persona. But the chasms grew into sinkholes, and eventually quicksand. When we took him to get new pants one day, he kept trying on the same ones he wore to the store.

“I like these slacks,” he’d say, over and over again, as he repeatedly pulled his pair up and down.

My dad died of Alzheimer’s last April at age 73 — the same age at which his father succumbed to the same disease. My dad ended up choosing neurology as his profession after witnessing the very beginning of his own dad’s forgetting.

Decades later, grandfather’s atrophied brain found its way into a jar on my father’s office desk. Was it meant to be an ever-present reminder of Alzheimer’s effect? Or was it a crystal ball sent to warn of genetic fate? My father the doctor never said, nor did he ever mention, that it was his father’s gray matter floating in that pool of formaldehyde.

Using the jarred brain as a teaching tool, my dad showed my 8-year-old self the difference between frontal and temporal lobes. He also pointed out how brains with Alzheimer’s disease become smaller, and how wide grooves develop in the cerebral cortex. But only after his death — and my mother’s confession about whose brain occupied that jar — did I figure out that my father was quite literally demonstrating how this disease runs through our heads.

Has my forgetting begun?

I called my dad’s neurologist. To find out if I was in the earliest stages of Alzheimer’s, he would have to look for proteins in my blood or spinal fluid and employ expensive neuroimaging tests. If he found any indication of onset, the only option would be experimental trials.

But documented confirmation of a diseased brain would break my still hopeful heart. I’d walk around with the scarlet letter “A” etched on the inside of my forehead — obstructing how I view every situation instead of the intermittent clouding I currently experience.

“You’re still grieving your father,” the doctor said at the end of our call. “Sadness and depression affect the memory, too. Let’s wait and see.”

It certainly didn’t help matters that two people at my father’s funeral made some insensitive remarks.

“Nancy, you must be scared to death.”

“Is it hard knowing the same thing probably will happen to you?”

Maybe the real question is what to do when the forgetting begins. My dad started taking 70 supplements a day in hopes of saving his mind. He begged me to kill him if he wound up like his father. He retired from his practice and spent all day in a chair doing puzzles. He stopped making new memories in an all-out effort to preserve the ones he already had.

Maybe his approach wasn’t the answer.

Just before his death — his brain a fraction of its former self — my father managed to offer up a final lesson. I was visiting him in the memory-care center when he got a strange look on his face. I figured it was gas. But then his eyes lit up and a big grin overtook him, and he looked right at me and said, “Funny how things turn out.”

An unforgettable moment?

I can only hope.



Nancy Stearns Bercaw is a writer in Vermont. Her book, “Brain in a Jar: A Daughter’s Journey Through Her Father’s Memory,” will be published in April 2013 by Broadstone.

Read More..

Chinese Hackers Infiltrate New York Times Computers





SAN FRANCISCO — For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.







The New York Times published an article in October about the wealth of the family of China's prime minister, Wen Jiabao, in both English and Chinese.







After surreptitiously tracking the intruders to study their movements and help erect better defenses to block them, The Times and computer security experts have expelled the attackers and kept them from breaking back in.


The timing of the attacks coincided with the reporting for a Times investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings.


Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network. They broke into the e-mail accounts of its Shanghai bureau chief, David Barboza, who wrote the reports on Mr. Wen’s relatives, and Jim Yardley, The Times’s South Asia bureau chief in India, who previously worked as bureau chief in Beijing.


“Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied,” said Jill Abramson, executive editor of The Times.


The hackers tried to cloak the source of the attacks on The Times by first penetrating computers at United States universities and routing the attacks through them, said computer security experts at Mandiant, the company hired by The Times. This matches the subterfuge used in many other attacks that Mandiant has tracked to China.


The attackers first installed malware — malicious software — that enabled them to gain entry to any computer on The Times’s network. The malware was identified by computer security experts as a specific strain associated with computer attacks originating in China. More evidence of the source, experts said, is that the attacks started from the same university computers used by the Chinese military to attack United States military contractors in the past.


Security experts found evidence that the hackers stole the corporate passwords for every Times employee and used those to gain access to the personal computers of 53 employees, most of them outside The Times’s newsroom. Experts found no evidence that the intruders used the passwords to seek information that was not related to the reporting on the Wen family.


No customer data was stolen from The Times, security experts said.


Asked about evidence that indicated the hacking originated in China, and possibly with the military, China’s Ministry of National Defense said, “Chinese laws prohibit any action including hacking that damages Internet security.” It added that “to accuse the Chinese military of launching cyberattacks without solid proof is unprofessional and baseless.”


The attacks appear to be part of a broader computer espionage campaign against American news media companies that have reported on Chinese leaders and corporations.


Last year, Bloomberg News was targeted by Chinese hackers, and some employees’ computers were infected, according to a person with knowledge of the company’s internal investigation, after Bloomberg published an article on June 29 about the wealth accumulated by relatives of Xi Jinping, China’s vice president at the time. Mr. Xi became general secretary of the Communist Party in November and is expected to become president in March. Ty Trippet, a spokesman for Bloomberg, confirmed that hackers had made attempts but said that “no computer systems or computers were compromised.”


Signs of a Campaign


The mounting number of attacks that have been traced back to China suggest that hackers there are behind a far-reaching spying campaign aimed at an expanding set of targets including corporations, government agencies, activist groups and media organizations inside the United States. The intelligence-gathering campaign, foreign policy experts and computer security researchers say, is as much about trying to control China’s public image, domestically and abroad, as it is about stealing trade secrets.


This article has been revised to reflect the following correction:

Correction: January 31, 2013

An earlier version of this article misstated the year that the United States and Israel were said to have started a cyber attack that caused damage at Iran’s main nuclear enrichment plant, and the article misstated the specific type of attack. The attack was a computer worm, not a virus, and it started around 2008, not 2012.



Read More..

Chinese Hackers Infiltrate New York Times Computers





SAN FRANCISCO — For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.







The New York Times published an article in October about the wealth of the family of China's prime minister, Wen Jiabao, in both English and Chinese.







After surreptitiously tracking the intruders to study their movements and help erect better defenses to block them, The Times and computer security experts have expelled the attackers and kept them from breaking back in.


The timing of the attacks coincided with the reporting for a Times investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings.


Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network. They broke into the e-mail accounts of its Shanghai bureau chief, David Barboza, who wrote the reports on Mr. Wen’s relatives, and Jim Yardley, The Times’s South Asia bureau chief in India, who previously worked as bureau chief in Beijing.


“Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied,” said Jill Abramson, executive editor of The Times.


The hackers tried to cloak the source of the attacks on The Times by first penetrating computers at United States universities and routing the attacks through them, said computer security experts at Mandiant, the company hired by The Times. This matches the subterfuge used in many other attacks that Mandiant has tracked to China.


The attackers first installed malware — malicious software — that enabled them to gain entry to any computer on The Times’s network. The malware was identified by computer security experts as a specific strain associated with computer attacks originating in China. More evidence of the source, experts said, is that the attacks started from the same university computers used by the Chinese military to attack United States military contractors in the past.


Security experts found evidence that the hackers stole the corporate passwords for every Times employee and used those to gain access to the personal computers of 53 employees, most of them outside The Times’s newsroom. Experts found no evidence that the intruders used the passwords to seek information that was not related to the reporting on the Wen family.


No customer data was stolen from The Times, security experts said.


Asked about evidence that indicated the hacking originated in China, and possibly with the military, China’s Ministry of National Defense said, “Chinese laws prohibit any action including hacking that damages Internet security.” It added that “to accuse the Chinese military of launching cyberattacks without solid proof is unprofessional and baseless.”


The attacks appear to be part of a broader computer espionage campaign against American news media companies that have reported on Chinese leaders and corporations.


Last year, Bloomberg News was targeted by Chinese hackers, and some employees’ computers were infected, according to a person with knowledge of the company’s internal investigation, after Bloomberg published an article on June 29 about the wealth accumulated by relatives of Xi Jinping, China’s vice president at the time. Mr. Xi became general secretary of the Communist Party in November and is expected to become president in March. Ty Trippet, a spokesman for Bloomberg, confirmed that hackers had made attempts but said that “no computer systems or computers were compromised.”


Signs of a Campaign


The mounting number of attacks that have been traced back to China suggest that hackers there are behind a far-reaching spying campaign aimed at an expanding set of targets including corporations, government agencies, activist groups and media organizations inside the United States. The intelligence-gathering campaign, foreign policy experts and computer security researchers say, is as much about trying to control China’s public image, domestically and abroad, as it is about stealing trade secrets.


This article has been revised to reflect the following correction:

Correction: January 31, 2013

An earlier version of this article misstated the year that the United States and Israel were said to have started a cyber attack that caused damage at Iran’s main nuclear enrichment plant, and the article misstated the specific type of attack. The attack was a computer worm, not a virus, and it started around 2008, not 2012.



Read More..