Saturday, August 26, 2017

Sleazy Bastard and Medical Fraudster Philip Esformes Gets Busted

Florida is the epicenter for medical fraud and why wouldn't be in a state that elected super star medical fraudster Slick Rick Scott for their Governor and BTW, fuck you Florida you suck!

Philip Esformes a filthy rich member of America's medical Mafia bribed low paid Florida health care administrator Bertha Blanco. She and Esformes were linked in a long-running $1 billion Medicare ripoff. Keep in mind, Rick Scott's butt buddy Esformes scammed $10 million in just one year while the criminal scumbag state of Florida payed Bertha Blanco $31,281 a year overseeing inspections of the very same kinds of assisted care facilities Esformes owns in Miami-Dade. 

Sleazy Bastard and Medical Fraudster Philip Esformes. Wouldn't you love to knock that cheesy grin off his face with an aluminum baseball bat dipped in dog shit and then douse him is gasoline?
From the Miami Herald:  "Blanco, according to a new criminal case filed against her, was a small cog in the complicated operation, supplying confidential information on patient complaints and unannounced state inspections at Esformes’ facilities.

That inside information helped keep the Medicare tap flowing, according to court records. Esformes would use the information sold by Blanco — the first state AHCA employee ever to be charged with accepting bribes — to “address deficiencies” before state inspectors showed up at his facilities, a Health and Human Services criminal affidavit says. As a result, Esformes avoided the revocation of his licenses and continued to bill Medicare for questionable patient services.
Esformes relied on two trusted business associates — brothers Gabriel and Guillermo Delgado — to obtain the valuable state information, by paying $200 cash for each patient complaint and $3,000 cash for each unannounced inspection schedule over the span of five years. Gabriel Delgado then “personally provided these documents to Philip Esformes,” according to the criminal affidavit.
Two people acted as intermediaries for the Delgados: Isabel Lopez, who also owned several assisted-living facilities, and her son, Gustavo Mustelier. They kept a cut of the cash bribes while delivering the rest to Blanco to obtain patient and inspection records. According to statements filed with their plea deals, they delivered payoffs to the state administrator for the confidential information on two Miami-Dade facilities owned by Esformes: The Nursing Center at Mercy and Fair Havens Center.
Lopez and her son admitted they paid off Blanco for inside information on Lopez’s assisted-living facilities and on those belonging to at least five ALF owners, including Esformes.
At her end, Blanco either provided the confidential documents or called and texted the sensitive information, according to the criminal affidavit. She sometimes made the exchanges at a McDonald’s in Doral, or enlisted her son to make the deliveries."

This clearly indicates that Esformes and his thugs working at his facilities were abusing patients. Also, notice all the Cuban names. When our vile and vulgar president Trump said Mexico wasn't sending it's best people and that Mexico was sending criminals Trump lied but it is true that the Cubans that Castro sent to Miami really were mostly criminals. 






Doctors Are Sleazy Bastards

We all know how bad big pharma is but big pharma would not be so big it is weren't for the pill pushing members of the White Coat Mafia -- the doctors. In addition to the obscenely high salaries American MD receive, they also receive huge kickbacks from big pharma for prescribing big pharma poisons. American doctors are routinely setting up kickback schemes with pharmacies. Some even involve active military. Click Here to read how it works.




Doctor’s office tied to $67Million health care fraud case


A medical practice in Tennessee and a pharmacy in Utah are both implicated in a $67 million healthcare fraud investigation.

The alleged kickback scheme involved Marines in the San Diego, California, area who were used to defraud TRICARE, the military’s health insurance provider, according to the San Diego Union-Tribune.  

The investigation is ongoing and no arrests have been made, the newspaper said. However, the U.S. Attorney’s Office filed a complaint last week as part of a civil asset forfeiture case against a Tennessee couple, who own the medical practice, Choice MD, in Cleveland, Tennessee.




The San Diego-based investigation is part of a national investigation into fraudulent prescriptionsof compound medications, which have led to arrests across the country and changed how TRICARE bills for compound drugs, the newspaper said.

TRICARE beneficiaries were recruited to use their prescription benefits to buy compound drugs for what turned out to be a sham drug study.

Prosecutors with the U.S. Attorney’s office are trying to seize properties bought by the medical practice owners, Jimmy and Ashley Collins, in a civil action. The vast majority of the prescriptions were authorized by emergency room physicians who were medical directors at the practice, according to court documents.

Kick Trump Off Twitter

Image result for Trump twitter

Along with criminal traitor Donald Trump stinking up America and the world, he's stinking up Twitter. Trolls like Trump need to be removed. 

Citizens of the world, sign the petition: Kick Trump off Twitter
Sign the petition

Since Trump kicked off his presidential campaign, activists have noted that his tweets are inflammatory, bigoted, and outright dangerous. After taking office in January, Trump’s social media presence has just gotten worse - and it’s time Twitter did something about it. 

In the past month, Trump’s tweets have gotten out of control, especially those concerning North Korea and the white supremacist riot in Charlottesville. They are blatant violations of Twitter’s terms of service. 

Sign now if you agree that Trump must be removed from Twitter. 

Sign the petition

Trump cannot tweet without consequences. Threatening nuclear war, retweeting images of journalists being gravely injured, and promoting views of white supremacists and Nazis isn’t presidential - it’s horrifying. 

After Heather Heyer’s death at the Charlottesville riot, Twitter has started shutting down some white supremacists’ Twitter accounts. While they’re at it, they should shut down Trump’s account, too. 

Add your name if you believe that Trump’s bigoted, volatile tweets have no place on Twitter. 

Sign the petition

In solidarity, 
Sarah Hogg, Daily Kos


The Twitter Rules


We believe that everyone should have the power to create and share ideas and information instantly, without barriers. In order to protect the experience and safety of people who use Twitter, there are some limitations on the type of content and behavior that we allow. These limitations are set forth in the Twitter Rules below.
The Twitter Rules (along with all incorporated policies), Privacy Policy, and Terms of Service collectively make up the "Twitter User Agreement" that governs a user's access to and use of Twitter's services.
All individuals accessing or using Twitter’s services must adhere to the policies set forth in the Twitter Rules. Failure to do so may result in Twitter taking one or more of the following enforcement actions:
  • requiring you to remove prohibited content before you can again create new posts and interact with other Twitter users;
  • temporarily limiting your ability to create posts or interact with other Twitter users;
  • asking you to verify account ownership with a phone number or email address; or
  • permanently suspending your account(s).
If you attempt to evade a permanent suspension by creating new accounts, we will suspend your new accounts.
Please note that we may need to change these Rules from time to time and reserve the right to do so. The most current version is always available at: https://twitter.com/rules.
The policies set forth in these Twitter Rules govern organic content on our platform. To learn more about the rules which govern ads and promoted content, please review our Ads policies.

Content Boundaries and Use of Twitter

Intellectual property
Trademark: We reserve the right to suspend accounts or take other appropriate action when someone’s brand or trademark, including business name and/or logo, is used in a manner that may mislead or confuse others about your brand affiliation. Read more about our trademark policy and how to report a violation.
Copyright: We will respond to clear and complete notices of alleged copyright infringement. Our copyright procedures are set forth in our Terms of Service. Read more about our copyright policy.

Graphic violence and adult content
We consider graphic violence to be any form of gory media related to death, serious injury, violence, or surgical procedures. We consider adult content to be any media that is pornographic and/or may be intended to cause sexual arousal. 
Twitter allows some forms of graphic violence and/or adult content in Tweets marked as containing sensitive media. However, you may not use such content in live video, your profile, or header images. Additionally, Twitter may sometimes require you to remove excessively graphic violence. Read more about how we define graphic violence and adult content and how to mark your media as sensitive.  
Media depicting deceased individuals: We may require you to remove media that depicts the death of an identifiable individual if we receive a request from their family or an authorized representative. Learn more about how to make such a request.

Unlawful use
Trump breaks this Twitter rule with his lying and attempt to obstruct justice with his false and treasonous statements.
You may not use our service for any unlawful purposes or in furtherance of illegal activities. By using Twitter, you agree to comply with all applicable laws governing your online conduct and content.

Distribution of hacked materials 
We do not permit the use of our services to directly distribute content obtained through hacking that contains personally identifiable information, may put people in imminent harm or danger, or contains trade secrets. Direct distribution of hacked materials includes posting hacked content on Twitter (for instance, in the text of a Tweet, or in an image), or directly linking to hacked content hosted on other websites.
We may suspend accounts which directly distribute hacked materials where the account has made a claim of responsibility for a hack, or where Twitter is able to reliably attribute a hack to the account distributing that content.

Trends
At times, we may prevent certain content from trending. This includes content that violates the Twitter Rules, as well as content that may attempt to manipulate trends. Read more about what we allow and do not allow to trend.
 
Third-party advertising in video content
You may not submit, post, or display any video content on or through our services that includes third-party advertising, such as pre-roll video ads or sponsorship graphics, without our prior consent.

Misuse of Twitter badges
You may not use badges, including but not limited to the “promoted” or “verified” Twitter badges, unless provided by Twitter. Accounts using unauthorized badges as part of their profile photos, header photos, display names, or in any way that falsely implies affiliation with Twitter or authorization from Twitter to display these badges, may be suspended.

Misuse of usernames
Selling usernames: You may not buy or sell Twitter usernames.
Username squatting: You may not engage in username squatting. Some of the factors we take into consideration when determining whether conduct is username squatting include:
  • the number of accounts created;
  • the creation of accounts for the purpose of preventing others from using those account names;
  • the creation of accounts for the purpose of selling those accounts; and
  • the use of third-party content feeds to update and maintain accounts under the names of those third parties.
Please note that Twitter may also remove accounts that are inactive for more than six months. Learn more about username squatting.

Abusive Behavior

Trump continually bashes and libels people on Twitter and lies about them.


We believe in freedom of expression and open dialogue, but that means little as an underlying philosophy if voices are silenced because people are afraid to speak up. In order to ensure that people feel safe expressing diverse opinions and beliefs, we prohibit behavior that crosses the line into abuse, including behavior that harasses, intimidates, or uses fear to silence another user’s voice.
Context matters when evaluating for abusive behavior and determining appropriate enforcement actions. Factors we may take into consideration include, but are not limited to whether:
  • the behavior is targeted at an individual or group of people;
  • the report has been filed by the target of the abuse or a bystander;
  • the behavior is newsworthy and in the legitimate public interest.

Violence and physical harm

Trump is known for his incitement to violence at his rallies.

Trump’s History of Encouraging Violence - Video - NYTimes.com


Violence: You may not make specific threats of violence or wish for the serious physical harm, death, or disease of an individual or group of people. This includes, but is not limited to, threatening or promoting terrorism. You also may not affiliate with organizations that — whether by their own statements or activity both on and off the platform — use or promote violence against civilians to further their causes.
Suicide or self-harm: You may not promote or encourage suicide or self-harm. When we receive reports that a person is threatening suicide or self-harm, we may take a number of steps to assist them, such as reaching out to that person and providing resources such as contact information for our mental health partners.
Child sexual exploitation: You may not promote child sexual exploitation. Learn more about our zero-tolerance child sexual exploitation policy.

Abuse and hateful conduct
Abuse: You may not engage in the targeted harassment of someone, or incite other people to do so. We consider abusive behavior an attempt to harass, intimidate, or silence someone else’s voice.
Trump abuses people on Twitter.
Unwanted sexual advances: You may not direct abuse at someone by sending unwanted sexual content, objectifying them in a sexually explicit manner, or otherwise engaging in sexual misconduct.
Hateful conduct: You may not promote violence against, threaten, or harass other people on the basis of race, ethnicity, national origin, sexual orientation, gender, gender identity, religious affiliation, age, disability, or serious disease. Read more about our hateful conduct policy.
Trump posts hateful content.
Hateful imagery and display names: You may not use hateful images or symbols in your profile image or profile header. You also may not use your username, display name, or profile bio to engage in abusive behavior, such as targeted harassment or expressing hate towards a person, group, or protected category. 

Private information and intimate media
Private information: You may not publish or post other people's private information without their express authorization and permission. Definitions of private information may vary depending on local laws. Read more about our private information policy.
Intimate media: You may not post or share intimate photos or videos of someone that were produced or distributed without their consent. Media depicting sexual violence and/or assault is also not permitted. Note: limited exceptions may apply if there is clear context that the interaction is consensual. Read more about intimate media on Twitter.
Threats to expose / hack: You may not threaten to expose someone’s private information or intimate media. You also may not threaten to hack or break into someone’s digital information or attempt to incentivize others to do so (e.g., through setting a bounty or reward on such actions).
Trump encourages others to hack. 

Impersonation
Trump is impersonating being an American.
You may not impersonate individuals, groups, or organizations in a manner that is intended to or does mislead, confuse, or deceive others. While you may maintain parody, fan, commentary, or newsfeed accounts, you may not do so if the intent of the account is to engage in spamming or abusive behavior. Read more about our impersonation policy.

Spam and Security

We strive to protect people on Twitter from technical abuse and spam.
To promote a stable and secure environment on Twitter, you may not do, or attempt to do, any of the following while accessing or using Twitter:
  • Access, tamper with, or use non-public areas of Twitter, Twitter’s computer systems, or the technical delivery systems of Twitter’s providers (except as expressly permitted by the Twitter Bug Bounty program).
  • Probe, scan, or test the vulnerability of any system or network, or breach or circumvent any security or authentication measures (except as expressly permitted by the Twitter Bug Bounty program).
  • Access or search, or attempt to access or search, Twitter by any means (automated or otherwise) other than through our currently available, published interfaces that are provided by Twitter (and only pursuant to the applicable terms and conditions), unless you have been specifically allowed to do so in a separate agreement with Twitter. Note that crawling Twitter is permissible if done in accordance with the provisions of the robots.txt file; however, scraping Twitter without our prior consent is expressly prohibited.
  • Forge any TCP/IP packet header or any part of the header information in any email or posting, or in any way use Twitter to send altered, deceptive, or false source-identifying information.
  • Interfere with or disrupt the access of any user, host or network, including, without limitation, sending a virus, overloading, flooding, spamming, mail-bombing Twitter’s services, or by scripting the creation of content in such a manner as to interfere with or create an undue burden on Twitter.
Any accounts engaging in the following activities may be temporarily locked or subject to permanent suspension:
  • Malware/Phishing: You may not publish or link to malicious content intended to damage or disrupt another person’s browser or computer or to compromise a person’s privacy. 
Twitter recently got rid of fake pro Trump accounts.
  • Fake accounts: You may not register or create fake and misleading accounts. While you may use Twitter pseudonymously or as a parody, commentary, or fan account, you may not use misleading account information in order to engage in spamming, abusive, or disruptive behavior, including attempts to manipulate the conversations on Twitter. Some of the factors that we take into account when determining whether an account is fake include:
    • Use of stock or stolen avatar photos
    • Use of stolen or copied profile bios
    • Use of intentionally misleading profile information, including profile location
  • Spam: You may not use Twitter’s services for the purpose of spamming anyone. Spam is generally defined on Twitter as bulk or aggressive activity that attempts to manipulate or disrupt Twitter or the experience of users on Twitter to drive traffic or attention to unrelated accounts, products, services, or initiatives. Some of the factors that we take into account when determining what conduct is considered to be spamming include:
    • if you have followed and/or unfollowed a large number of of accounts in a short time period, particularly by automated means (aggressive following or follower churn);
    • if your Tweets or Direct Messages consist mainly of links shared without commentary;
    • if a large number of people have blocked you in response to high volumes of untargeted, unsolicited, or duplicative content or engagements from your account;
    • if a large number of spam complaints have been filed against you;
    • if you post duplicative or substantially similar content, replies, or mentions over multiple accounts or multiple duplicate updates on one account, or create duplicate or substantially similar accounts;
    • if you post multiple updates to a trending or popular topic with an intent to subvert or manipulate the topic to drive traffic or attention to unrelated accounts, products, services, or initiatives;
    • if you send large numbers of unsolicited replies or mentions;
    • if you add users to lists in a bulk or aggressive manner;
    • if you are randomly or aggressively engaging with Tweets (e.g., likes, Retweets, etc.) or users (e.g., following, adding to lists or Moments, etc.) to drive traffic or attention to unrelated accounts, products, services, or initiatives;
    • if you repeatedly post other people’s account information as your own (e.g., bio, Tweets, profile URL, etc.);
    • if you post misleading, deceptive, or malicious links (e.g., affiliate links, links to malware/clickjacking pages, etc.);
    • if you sell, purchase, or attempt to artificially inflate account interactions (such as followers, Retweets, likes, etc.); and
    • if you use or promote third-party services or apps that claim to get you more followers, Retweets, or likes (such as follower trains, sites promising "more followers fast", or any other site that offers to automatically add followers or engagements to your account or Tweets).
Please see our support articles on following rules and best practicesand automation rules and best practices for more detailed information about how the Rules apply to those particular account behaviors.
Accounts created to replace or mimic suspended accounts may be permanently suspended. We may also remove accounts which Twitter is able to reliably attribute to entities known to violate the Twitter Rules.

Content Visibility

Accounts under investigation or which have been detected as sharing content in violation of these Rules may have their account or Tweet visibility limited in various parts of Twitter, including search. To learn more about situations in which content may be restricted on Twitter, please see our support article on search rules and restrictions.




Friday, August 25, 2017

End Corporate Rule

Teddy Roosevelt knew that corporations would destroy democracy and they have. The time has come to destroy corporations and in the case of corporations which are for all intents and purposes legalized crime, the ends justify the means.

Related image

If Teddy Roosevelt were alive today he would be taking a flame thrower to the greedy criminal corporations and he would put a whole lot of CEOs and boards of directors in prison where they belong.

Related image

Friday, August 11, 2017

Denounce Trump

The 2016 election had to be the most brazen attempt at election tampering in our history. We now have an opportunity to block hacking in our elections and promote and protect the vote with the Vote by Mail Act! 

Sign now to denounce Russia’s tampering with our elections and to take measures to protect the American vote! 

CLICK TO SIGN ON

President Trump’s phoney bologna voting commission is just another sleazy attempt to suppress the vote. And he won’t stop there! That’s why now more than ever we need to solidify and protect fair and equal access to the ballot. The Vote by Mail Act will empower voters, giving them more time to confirm their registration, more time with their ballot in the comfort of their own home, and more security from hacking. 

We must do everything we can to pass the Vote by Mail Act and protect the right to vote!

SIGN THE PETITION

This is urgent. At a time when Trump and his cronies are attempting to place more barriers in front of voters, we need to act now. 

Add your name today to increase voters’ access to the ballot.

SIGN HERE

Keep fighting, 
Candelaria Vargas, Daily Kos


Daily Kos, PO Box 70036, Oakland, CA, 94612.