top of page
  • Abortions, Abortions, Abortions seem to be the only word of topic for the Democratic party to blabber and bring to the table to win the Mid-Term Election.  Without abortions being illegal in only 11 states out of 52 in America what weight of arguments could possibly grab swing voters attention for the Democratic party to win the Mid-Term elections?

  • The FBI Probe of the Russian collusion with former President Donald Trump and his 2016 Campaign has come to an end.  Prosecutor John Durham has lost another trial of providing any evidence which there was some sort of TALK between any Russian official which would prove Russian tampering in the Trump Campaign election.

  •  The Biden Administration is reaching out to young liberal social media influencers in hopes they can turn on young people to vote democrat.  Liberal news media outlets and journalist are taking the new social media influencers as a slap to the face from the Biden Administration.  With all the liberal influencers already plastering every social media platform how much more of an edge does the Biden Administration desperately need to be the loudest voice in the room.

​

  • President Biden last month failed in the Railroad Union strike negotiation even though the White House presented the Railroad strike has come to an end when in reality it never did since none of the Railroad Union Workers had even casted one single vote on President Biden deal at the time. The Railroad Union strike is set for November 19 if President Biden and The White House cannot reach an agreement with the Railroad Workers Union strike before Thanksgiving and approaching Holiday season. 

  • Biden authorizes an additional $725 million in military aid to Ukraine.

  • Immigration activists are angry with New York city lawmakers for false promises of housing migrants while U.S. citizens who are homeless in New York city will not be able to find housing.  New York City is spending $1 Billion dollars on migrants who are voluntarily busing from Texas to New York since New York is a sanctuary city.

  • Texas Governor and Florida Governor Ron DeSantis once again embarrassing the Democratic party with 50 migrants flown to Martha's Vineyard while Maria Cardona democratic strategist for CNN is being called out for 10 minutes on live television for every false statement she makes blabbering any excuse whining & trying to mislead liberal/progressive viewers on Florida and Texas Governor look badly which Maria Cardona has failed to prove to anyone who updated on the immigration crisis always getting worse.  Maria Cardona saying the migrants were trick by Florida Governor Ron DeSantis to go to Martha's Vineyards when the migrants knew exactly where they were going.  Immigration lawyers are pretending to try to sue Governor Ron DeSantis but nobody understands how since the migrants signed waivers knowing where exactly they were going.  The migrants are not suing Governor Ron DeSantis since its just a political stunt by Liberal media and immigration lawyers knowing their just creating a façade to once again use migrants in another political stunt to pretend Democrats are caring of the migrants when in reality Democrats are using migrants to gain viewers & attention to present themselves as a fantastic progressive society.

  • Mayer Eric Adams of New York has been threatened with a lawsuit by the Legal Aid Society for violations of homeless shelters.  Democrats seems to have mainly two words to try to compete against the Republican party which is Racist and Xenophobic but supply no complete sentences of a legitimate argument of all the broken immigration policies and broken processes as the whole world is observing. The only thing the democrats have proven is they care more about giving social services to migrants more than taking care of the homeless epidemic American cities are already battling. 

  • Since February 2022 New York City has received 12,000 migrants who coming from border towns with nowhere to sleep waiting to get on buses to leave from these border towns such as El Paso Texas which New York, Chicago and Washington D.C. has taken in less than 1% of what the town of El Paso alone has handle with migrant population increasing every month and every year. All the migrants in these border towns spreading across multiple states are heading north to Blue states and Blue cities since Democratic politicians advertise their American Dream Sanctuary fantasy. The White House blaming the previous President Donald Trump with no explanation of how this would be ex-President Donald Trump fault since he campaign on Building a Wall to stop the flood of migrants from crossing the border knowing the immigration of migrants is just going to build with massive numbers and become America most expensive failed kindergarten experiment.  The next presidential election of securing the border will with no surprise once again be a huge talking point for the Republican party as they keep embarrassing Democrat Politicians with more planes and buses of migrants delivered to the Democrats liberal sanctuary cities door steps as the Democrats proudly falsely advertise and get angry when their sanctuary cities are proven not be a sanctuary city eutopia of social services and funding for all people but instead Progressive Liberals sanctuary cities are a proving to be a failed kindergarten experiment.

  • The United States also just announced another $600 million dollars in military aid to Ukraine which totals $15 billion dollars since the war began.

  • The U.S. military has record dropping numbers of taking in new military recruits.

  • Sexual Assault in the U.S. military has increased up to 13 percent.

  • Immigration activist threaten in suing New York for not supplying housing for a small portion of immigrants compared to border towns taking in thousands or immigrants everyday.  Immigration activist are accusing Mayor Eric Adams of New York for not doing his job and deflecting mismanagement of a failed homeless shelter system.

Democrats out waying the pro's and con's of the issues ahead with President Biden Student Debt Forgiveness.  Speakers examining President Joe Biden $300 Billion to Half-a-Trillion Dollar Student Debt Forgiveness which in the long term will increase inflation and will have to cut-funding to other programs in the near future such as early childhood education, health-care spending and assistants to poor-low-income people.  The FBI raiding Mar-A-Lago and releasing the redacted findings show no smoking gun to why the FBI raided Mar-A-Lago and no charges have been filed on the former President Donald Trump.

Ukraine being bomb.png

Ukraine
  Hypersonic/Nuclear Missile Highly
Unlikely Will Happen

        Russian President Vladimir Putin and the people living in Russia are highly unlikely going to choose to nuke their next door neighbor Ukraine. Russia has an abundance of other smaller missiles & bombs which can target the region getting the job done just as good without using a nuclear bomb and if you watch what you see in the news the Russian Military is already easily proving the point. What would be the point of Russia sending a nuclear offense when the Russian Military can just easily use smaller advance weapons and missiles. Did he underestimate his military strength moving on the ground? Yes but still likely can proceed to accomplish his goal which is to take back old Soviet Territory which he seems to be obsessed to accomplish. Is it sad what’s happening in Ukraine YES. President Vladimir Putin is an intelligent man and he going to be playing the long game just like every real war out there in modern time.

​

        The shortest war in modern times was Israel 6 day war using their talented fighter pilots and fighter jets to surprise attack their surrounding countries starting to get in motion invading on their land and blocking the Straits of Tiran and using there fighter jets effectively for air supremacy. President Vladimir Putin is not running short on missiles or weapons any time soon and this is not World War 3 yet and its not going to be unless he does choose to invade other countries just like Hitler or use a nuclear bomb which he not. It’s just like when the news media talks about North Korea, but Russia and North Korea are completely two different sizes of true power with North Korea leader Kim trying to flex muscle making people think he going to Nuke America. Now should we be taking the threats seriously from North Korea? As a third world county their technology will be slowly improving over time just like most nations but for now the media will just keep talking about it to have a news story to write. Last time checked Kim Jong Un wants to keep his power and loves to flex his muscle in the spot light so if he wants to keep that power he knows not to do anything which could dethrone him.

       

           Now back to Ukraine, President Volodymyr Zelenskyy is doing an amazing brave job of fighting off Russia but at the same time how long will they have the resources to keep fighting unless America keeps sending them more money and weapons to fight them off. Ukrainians soldiers and citizens are not giving up their land and as of right now writing this article keeping Russia troops not advancing to far and cutting off their pipeline of resources which keep supplying Russian soldiers which is why Russia is having a hard time of advancing further into the country. Accusing Vladimir Putin of war crimes is a bit to soon. Accusing individual groups of soldiers of war crimes does make a little bit more since. President Vladimir Putin not worried about being charge for war crimes or genocide and he could make the reality of the situation much worse if he chose to. Is it sad civilians apartments and homes are being bomb, of course but when has that sadly not been apart of war. Like I said Vladimir Putin could make the situation much worse if he chose to. If I lived in Ukraine I would call him a war criminal to when I see dead people lying in the street but why did these citizens not leave the area in the first place and should have evacuated from the beginning when they know the Russian army is in the region. When citizens stay in the region of the Russian military thinking nothing bad going to happen I’m not sure you can classify it as a war crime. Its not like it’s a surprise attack to the citizens of Ukraine and I’m sure they have the intelligence to know there choosing to be living in a war zone. All of it is sad but that what war is when you choosing to live in a war zone. Every time the news media deliver a report about more sanctions on Russia every week American and other countries have been sanctioning Russia for along time even before the Ukraine War and it never stop Putin. Vladimir Putin is running a war and the media just trying to piss him off to make it worse. The only reason they talk about nuclear war is to get ratings for their own self-serving agenda of capturing the audience. Also the media running their mouths about him pretending Putin unstable. Putin not and every day he proves it. The reality of the situation if even Russia did set off hypersonic missile/warhead to Ukraine, America and the United Nations will not be able to react to any long term offensive goal to avoid and risk a world fallout of society collapse that could come if world leaders do not use common since and play their cards right. The only thing world leaders are doing is bluffing & flexing muscle in the media spotlight knowing behind closed doors their no large scale retaliation that can be made on Russia. The risk of society fall out and trying to keep society as law abiding citizens will never be worth the risk if they retaliated with long range missiles or nuclear offense against Russia when Russia will knowingly retaliate right back.

 

"I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones."

                                                                                            .......Albert Einstein.......

 

Update: 6/27/2022

        300,000 NATO Troops are possibly being sent to Ukraine which is a sign of hope and step in the right direction for more serious defense but the missing keywords no foreign leader has explained or Journalist is with what kind of military equipment will these soldiers be equip with to even out the playing fields. There No mention of gaining air supremacy against bomber jets which was left out of the details. They are however sending more air defense systems but world leaders/NATO new this was missile warfare already which Russia is using effectively. The only thing journalist are taking pictures of is soldiers with assault rifles which would not be of much help in modern day warfare. If this was Afghanistan where you do not have to worry about tanks since the enemy had none this would be fine but once again this is not Afghanistan to where an assault rifle and hand grenade would help in this day in age against a Russian Tank and missile supremacy invasion. Luckily because of the accuracy of guided missiles we have a better understanding armored tanks are in away becoming obsoletely/ineffective in the battle field. Most soldiers in today's modern warfare do not want to be in a tank since drones capability of covert air supremacy and guided missiles which become a threat. Hopefully world leaders will specify in more detail of a better air defense they can offer with the 300,000 soldiers to help them defend themselves against missile warfare.

____________________________________________________

Russian Bomber airstrikes shopping Mall killing 18-20 people in small town of central Ukraine 300 miles past the war zone which is now showing signs of war crime since the mall was located in central Ukraine which is far out of reach of the war zone region claimed by Russian soldiers to advance strategically to more territory. Missile strike on shopping mall far past the war zone shows no strategic reasoning for the decision to bomb and now classified as a war crime.

                                 

                                                                 By: Da Vinci Platform

​

​

​

​

Chinese mobile rocket lauchers.png

World Power and Domination
China & United States

China Missile Stock Pile

Year 2021

​

1000-1,200 SRBM, Launchers: 250, Range: 300-1,000 km=(185-600 miles)

150-450 MRBM, Launchers: 150, Range: 1,000-3,000 km=(600-1,800 miles)

200<=More Than IMRB, Launchers: 80, Range: 3,000-5,500 km=(1,800-3,415 miles) (Basically can Reach from China to Guam in the Second Island Chain)

75-100 ICBM, Reach up to 11,200 km=(Basically almost anywhere in the United States)

300 LACM, 100 ground-launchers

24-48 SLBM (Submarine/Sea Launch Ballistic Missiles): 7,200 km=(4,500 miles)(Chinese Submarines hold JL-2 and there probably more than the 48 counted JL-2, but now the PLA is producing the new generation JL-3 which is the PLAN (People Liberation Army Navy) new upgraded LRBM for their Submarines.  There is no data on how many JL-3 the PLA has produced.)

 

America Missile Stock Pile

Year 2021

​

405 Minute Men lll (Land Based ICBM) located throughout Wyoming, North Dakota, Montana

4,000 Tomahawk Cruise Missiles (Launch from Submarines or Surface Ships)(Tomahawk missiles are set to decline since the Navy is upgrading the Tomahawk to for improved guidance and extension range).

Destroyers can carry up to around 90 Cruise Missiles with 90 cells

Cruisers can Carry around 122 missiles with 61 cells (Cruisers are supposed to be decommission from the USA Navy by 2027)

 

China Navy

​

6 Nuclear Powered Ballistic Missile Submarines (84 days under water)(55mph)

6 Nuclear Power Attack Submarines (which is still small compared to US Navy)(84 days under water)(55 mph)

46 Diesel Power Attack Submarines (Diesel submarines can only last 30 days under water)

China holds and has the greatest Submarine fleet in the world.

China 3 Aircraft Carriers (Two of the smaller Aircraft Carriers the Liaoning and the Shandong hold 35 Fighter Jets)

​

America Navy

​

14 Ohio class submarines Ballistic missile Submarines (Contains Maximum 20 Ballistic Missiles in each Submarine)

4 Ohio class Submarines are Cruise Missile Submarine (Contains Maximum 20 Cruise Missiles in each Submarine)

Each of the 14 Ohio-class SSBNs originally carried up to 24 submarine-launched ballistic missiles (SLBMs) with multiple, independently-targeted warheads. However, under provisions of the New Strategic Arms Reduction Treaty, each submarine has had four of its missile tubes permanently deactivated and now carry a maximum of 20 missiles. 

Which makes no-sense to Da Vinci Platform of why Washington Politicians would agree to such a pointless Arms Reduction Treaty to decommission four missile tubes permanently in all the Ohio-Class-Submarines.

53 Attack Submarines (Design to take out Enemy Submarines and Surface ships)

62 Destroyers

22 Cruisers (Decommission Soon, 2027)

11 Aircraft Carriers (Usually can Hold 65-85 Fighter Jets)

​

Taiwan Missiles

​

       400 Arsenal Harpoons Block 1 RGM-84 (This is the same as Ukraine is using given from Denmark which are reported to be 1st Generation Harpoon Missiles since Denmark has upgraded to a better class Harpoon Missile system which is why Denmark handed over Ukraine Military their older generation Harpoon Missiles.  Block 1 Harpoon Missiles are reported to have a 50%-70% accuracy.  Usually takes 2-3 Harpoon Missiles to destroy a Cruiser or decommission the ship to withdraw to be repaired.  Depending on Generation of Harpoon Missile it could have a range of 80-150 Nautical Miles.  Ukraine was given Harpoon Block 1 since the Ukraine Army does not withhold the Combat experience or Technology to utilize the Harpoon Block ll since its more sophisticated technology which Mass Majority of the Ukraine Military does not have technology & training in deploying these advance GPS targeted missiles and have truck-mounted Harpoon Missiles instead, Denmark handed over these Style of Harpoon Missiles since they were going to dispose/decommission these Bock l missiles anyways due to the missiles expiring shelf-life.)  

​

The maximum detection range of a Destroyer or Cruiser to detect a Harpoon Missile is 22 Miles. For smaller boats its 10 miles of detection range.

​

Taiwan has been sitting to wait a new deal of new upgraded missiles to the Island from the United States but no deal has been established. 

​

400 Missiles Harpoon Missiles could not be enough for Taiwan since not all missiles are direct hits and it takes multiple missiles to sink a Cruiser or Destroyer. 

 

So are submarines becoming to an end?

​

   With bottom-sea sensor technology increasing from military and economic environmental needs to detect and measure the physical property on the ocean floor it will become very hard for submarines to remain invisible on the ocean floor in the coming future.  Extremely cheaper Deep Sea autonomous drones will be able to detect submarines and exterminate or damage the submarines to not be in production of offence capabilities since they will be discovered at a much quicker rate.  A nuclear submarine cost is estimated around $100,000,000,000 Billion Dollars to produce one single submarine when an autonomous sensor drone will be estimated at an astronomically cheaper price-tag depending on the autonomous sensor drone (UUV-Unmanned Underwater Vehicle) design application of use.  Yet there still raised issues among the tested drones which have not been yet proven by the US NAVY to start production of more autonomous drones until UUV technology is proving positive results.  Four of the US Navy Drones will take part in Navy exercises to prove target scouting and other applications.  The Navy is not ready to buy a large wholesale of UUV drones until the technology of autonomous drones improves better results.

​

       The result is a growing “transparency” in the seas surrounding China. China’s ability to detect American submarines at great distances is improving by the day.  China has deployed underwater sensors that allow it to monitor US submarine activity as far as Guam. Last year, a Chinese underwater-drone was washed up and found on the Indonesian island of Selayar close to Northern Australia. 

​

     It will be challenging for a submarine to be able to detect an Autonomous Deep-Sea-Drone (UUV-Unmanned Underwater Vehicles) unknown to the opposition (enemy submarine) during war time until it is probably too late for any chance of survival unless the UUV is used as a decoy for the opposition submarine to detect on purpose to create confusion of enemy targets underwater.  Luckily this technology is not expected to become more popular and advance until 2035-2050 depending on which government wants to lead and hold in counter-detection hierarchy under the ocean.

           This could come at a cost on the marine environment of Autonomous Deep-Sea-Drone (UUV-Unmanned Underwater Vehicles) since sonar radar detection of having thousands of them in the water will have a huge impact on marine life.  The loudest band in the world tops out at 130 decibels and the sound waves of a sonar system tops out at 235 and can retain intensity at 140 decibels from 300 miles from the source. Whales will start to bleed from the eyes and ears and rapidly change their depth to get away from the sonar decibels. 

​

         In January 2005, 34 whales of three different species became stranded and died along North Carolina’s Outer Banks during nearby offshore Navy sonar training. Other sad examples around the coast of the U.S. and elsewhere abound, notably in recent years with more sonar testing going on than ever before. According to the nonprofit Natural Resources Defense Council (NRDC), which has campaigned vigorously to ban use of the technology in waters rich in marine wildlife, recent cases of whale strandings likely represent a small fraction of sonar’s toll, given that severely injured animals rarely make it to shore.

​

         Military submarines will turn off any active SONAR systems when divers are in the water, to avoid injury or death that could occur if that much energy were put into the water with a diver nearby.  At 200 Decibels, the vibrations can rupture your lungs, and above 210 Decibels, the lethal noise can bore straight through your brain until it hemorrhages that delicate tissue. If you're not deaf after this devastating sonar blast, you're dead.

​

            Stealth submarines do not use active-sonar but instead passive-sonar systems so they cannot be detected but still does not mean decoy submarine drones (UUV) will not use active-sonar depending on what kind of application purpose they are supposed to have for using counter-detection and creating confusion for the opposing side (enemy-submarine) other passive-sonar systems not being able to detect where Stealth submarines location could be.  This is somewhat of a concept of ASW (Anti-Submarine Warfare) where the drone submarine is being used to find, track and mislead in confusion to other enemy submarines with where their position could be to the opposing side (submarines). Military ASW employs technologies such as magnetic anomaly detectors (MAD), which detect tiny disturbances to Earth’s magnetic field caused by metallic submarine hulls, passive and active sonar sensors that use sound propagation to detect objects underwater, as well as radar and high-resolution satellite imagery to detect surfaced submarines. Recent advances in commercial tools and technologies now give open-source researchers some ability to monitor submarine fleets. Basically, using Drone submarines (UUV) as decoys, scanning and tracking is an astronomically cheaper price-tag solution to the military than risking a $100 Billion Dollar submarine while also saving and limiting the risk of military men & women lives which are onboard.  The bottom of the ocean is slowly turning into an increasing mass network empire of drone counter-detection of enemy submarines and UUV and the countries who advance in this technology will have the ultimate power of covert operations and counter-detection in the next world war.

​

 

 

 

 

 

 

 

​

​

​
 

 

 

 

 

 

 

 

 

 

​

​

​

​

​

​

​

​

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Foreign Infrastructure USA and G7

​

America is offering a $600,000,000,000 Billion Dollar investment plan Building Physical and Digital Infrastructure in Asia, Africa and Europe to promote creditable alternatives against Chinese investments in their economic foreign policy infrastructure plan. From the U.S. and the G7 the United States is pledging $200 Billion. Germany, France and Italy are raising $300 Billion Euro’s and United Kingdom, Canada and Japan are which possibly could be $100 Billion but still is unknown.  America has a poor reputation for maintaining infrastructure in its own country and infrastructure projects to the rest of the world.  In 2020 Chinese run firms were offered $2.3 Billion Dollar’s worth of contracts outside of China while the United States only gathered $27 Million Dollars worth of contracts from other foreign countries which is a staggering difference of how foreign countries depend on China for infrastructure building and not the United States.  The lowest Chinese firms will take as a contract worth their time is usually at $100 Million Dollars or more to be worth their time in a foreign country when the United States can only gather investors of another foreign country for a $27 Million Dollar infrastructure project since 2020.  The lowest contract on record from Chinese firms was in Angola Africa starting in 2004 at $100 Million Dollars to build more roads.  China is increasingly challenging the roles of America which the United States still holds military, economy and diplomacy but no way to offer infrastructure projects to 3rd world nations and withhold foreign influence.  The United States has not in anyway lock-in one infrastructure deal to foreign countries since the $600 Billion dollar investment agenda on economic foreign infrastructure was established by politicians and legislators in Washington DC.

 

Foreign Infrastructure China

Building Physical and Digital Infrastructure

​

China for the past 20 years has been already building physical and digital infrastructure in Asia, Africa and Europe. 

China Belt and Road initiative and economic and digital infrastructure has been already estimated at $800 Billion Dollars or more since the past 10 years. In total, Morgan Stanley has predicted China's overall expenses over the life of the BRI could reach $1.2–1.3 trillion by 2027, though estimates on total investments vary.  China has already lock-in 170 Cooperation Agreements with 125 countries with 29 agreements with international organizations across Asia, Europe, Africa and South America.  Other ways China gets contracts from other countries is by inheriting oil, energy, natural gas and natural resources to have exported back to China until the debt is paid off.  China will not take an infrastructure project from foreign countries less than $100 Million Dollars since this is not worth Chinese manufacturing firms time while the United States can only establish a $27 Million Dollar infrastructure project in total of all overseas foreign projects combined.  Building American military bases so far is the only application the United States knows how to do but serves no economic positive purpose and an extremely large black hole of spending of tax payers dollars not using military spending wisely such as China foreign economic plan and military spending.  The United States since World War ll and the Cold War of the Soviet Union has roughly 750 military bases worldwide while China has only one in Djibouti, East Africa which makes China military and foreign economic structure spending far more strategically successful than the United States.  While America spends money pretending to police the world and fight the War on Terror China has been giving loans to African Nations since the year 2000 which has been estimated at $160 Billion US Dollars and mostly made loans produced from State owned Chinese Banks.  One of the ways for China to control power from African countries unable to completely pay off their loans on time back to China is by using African leaders Diplomacy with votes from African Diplomats to use support and backup votes for Chinese influence within the United Nations.  China is not stealing anything from other foreign nations such as Africa but offering loans to build shipping ports, airports, hospitals and roads.  While China does this China and Africa uses and shares the shipping ports, airports and growing infrastructure of African countries until the debt is paid off.  Using these tactics of economic development to 3rd world countries without China giving transparency of how much African nations are borrowing causes suspicion to many people in Africa and what promises have been made to China behind closed doors for extended periods of time trading for diplomacy power within the United Nations from African Diplomats and African Nations natural resources.

​

                                                                                                          By: Da Vinci Platform

UUV 1.png
UUV 2.png
Tom Cruise.png

Graduating High School Class of 2022!!!
Cybersecurity/Ethical Hacking Careers

          If you are a part of the Graduating High School class of 2022 and do not know exactly what you want to major in when you go to college cybersecurity is a great career to enter right now, as there is a high demand for professionals with these skills. The U.S. Bureau of Labor Statistics estimates that the employment of information security analysts will grow 31 percent from 2019 to 2029. Please go through and read the description of cybersecurity since most people do not know what it really entails. Also software developers/programmers are in high demand which will also help you with your computer science career and cybersecurity if that’s what you decide to do.

Congratulations Class of 2022 Your the Future!!!

 

SQL injection penetration (Standard Query Language): is to find vulnerabilities in the database server and to gain control over it. By injecting malicious code into the URL quire stream and web application sending the request to the server database, without proper firewall security sensitive data could be exposed and could also lead to negative detrimental effects to a business or organization. SQL attacks can show an internal exception that can be raised by the application running on the web which is a simple SQL injection, if the web server is configured insecurely by the web developers than internal exceptions will be leak and exposed on the web application leading to possibly more attacks. Query string can be change to whatever value the attacker uses. Query string can get specific widget and also change to different widget which then possibly mounts a SQL injection attack. Untrusted data in the URL you can change the quire stream which could pull up improperly handle internal exception from the database which has appear in the browser rather than being encapsulated on the server. Somewhere in the code it does not exist, and somewhere in the code it taking that piece of untrusted data going to the database, not getting a result and then the code is unable to handle the fact that the sequence does not contain an element from the modify URL quire stream. It may show a stack trace which shows detailed internal implementation data about exactly what is going on. In the internal exception page hacker can locate the framework version information, Microsoft .NET and ASP.NET version which can locate more detail information about identifying vulnerabilities.

 

Zombie attacks: are used to disguise the attacker as another computers IP address to send packets to the target to see if ports are open. Drawing out the network is important for a hacker to see what vendors are used and servers are configured with low security administrative password settings and to check to see which product or manufacture could be found which hold known vulnerabilities. Employers, customers or contractors could externally or internally scan your organization network topology and learn about your server operating system in your organization and have the time to take notes to monitor and map out the network. Firewalk will be used to determine which ports are open on a network to trace route to target with determining all open ports. Needing to do scans on your network will need to be done periodically to see if over time administrative settings and server configuration security settings have been changed.

 

DoS attacks (Denial of Service): are going to be one tool you will be using on the Network to make sure the Devices will not slow down the Company uptime in business or fail all together and shutdown. Also while doing DoS attacks you will be sending malicious code to see if IDS system will not pick up your powershell attacks or SQL injections. With these two techniques ill will explain my findings from Nmap a network analyzer and kali linux to see what vulnerabilities could be found. You will comply with all regulations of ethics with Kali Linux and Nmap to stress test the network and devices and to see how their firewalls and IDS system withstand the attacks and what vulnerabilities they could reveal. There are many attacks such as zombie, FTP bounce attack, version detection, and operating system detection are commonly used methods for using and gathering information which could lead to vulnerabilities in the firewall. Is an attempt to make a machine network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host. Also there distributed denial of service (DDoS) is a DoS attack originating from multiple sources in order to increase the effectiveness of the attack due to increased traffic volumes. DoS attacks are effective because you do not require specific software or infrastructure vulnerabilities, very low cost effective, can do many attacks at once, you can utilize Dos attacks with multiple protocols and attack techniques, they can be difficult to trace back to an origin and a perpetrator. DoS attacks can bring a huge financial impact on your company if the proper steps are not set in place. An HTTP flood attack will saturate the web server resources. Need to set up password change verification through email. Need to figure out what infrastructure a DoS attack can run on which could overload the environment. UDP attacks flood random ports on the target and the target consumes responding with “destination unreachable” packets. No initial handshake means source IP can be spoofed for anonymization. A DNS amplification attack can work by making a small query to a DNS server spoofing the IP address of the target the attackers want to take down. Now specifically what the attacker is trying to do is make a DNS query, which is small, but results in a large response. If the attacker requested all the DNS records in a particular zone it would create a large response, which is then sent to the target machine. When using multiple zombie machines to send a DoS attack it will amplify the Gbps when using DNS amplification.

 

Burp suite: will be used to provide forced browsing which can proxy and check to see what intercept Raw request to a link which was made in the browser. Findings could be the result of framework of the web app, and dynamic components of the request which then a hacker can use the sessionID cookies which can give a range SQL attacks on the web app. Forced browsing can be used for substituting the URL with a list of directories which are loaded into the path to see if any data request can enumerate more files which could lead to more foot printing and reconnaissance.

 

Kali Linux: is an open source security distribution built with Linux operating system, this distribution contains large repository of auditing and exploitation tools. SQLMAP is a tool you will utilize for an SQL attack which could list records and retrieve data tables within the database. Kali Linux is a penetration tool which scan for all SQL vulnerabilities by using SQL queries which can pull detail map data tables straight from the database if not properly secured and hashed. By searching for the correct data tables a hacker can find usernames, password, and many other different categories which can be found in the database. Unsalted hashes is where the plain text password is not salted with random bytes to separate the password from other multiple individual user signing up and choose the same password. If not salted hash the hacker will get the password and the possibly all the users who have the same password. In several cases, attackers can perform various operations such as add, modify and delete records in a database. By viewing the SQL injection with Kali Linux you will be able to enumerate table information such as database version, database user name, passwords since they were left on the database and also not properly salted hashed. Kali Linux has a wide range of tools with techniques to use to expose certain vulnerabilities and gathering of information on the target known system for a hacker to find weaknesses within the Network. Using Nmap which is a tool offer by kali Linux to scan to see what information could be expose for a hacker to find useful information on the network. When running Nmap tool it reveals the Domain Controller Operating system and the version of the server, with the software it is running on. After running the scan found is the Operating System Microsoft Windows 7 and the server is Windows Server 2012 and all running open ports. To confuse hackers you can change the display name of the operating system and change name of version software to confuse hackers when they are foot-printing the network. Also need to go to Inbound and Outbound rules on the Firewall and make sure ports that do not need to be running service are turn off or can be covered from a stealth attack and can be avoided by setting up incoming malicious traffic through the displayed open ports which were revealed from network penetration scan by a presumed hacker. A hardware firewall takes the form of a closed proprietary appliance with its own operating system. This is considered faster however a bit expensive. A software firewall is installed on a computer and it utilizes the computer’s operating system. Firewalls either hardware or software use rules to filter incoming and outgoing traffic to the network and must be check on and updated periodically.

​

Firewalking: Establish the ports open through the Firewall. Firewalking first phase going to try and walk through each of the gateways between them and the destination host. Destination host referred to as metric. Running trace routes and manipulating the TTL (Time to Live)value, and incrementing it by one. Every time use increase by one your going to be connecting to a different point in the connection. The sent packet wont get a successful response until the TTL is high enough to hit the destination host. Helps identify the point between the Firewalking Host and the Destination Host and is what as known as hop count ramping. It just keeps bumping up the TTL until they reach the destination host. Phase two Firewalking walking through the available ports and testing each point along the way to see if its going to respond. If that Firewalking host does not receive a response for each one of those requests, and things just time out, then hacker can make assumption that packet was denied by the ACL running on that device. That allows the adversary to work through incrementally, and establish at each point along the way, what are you going to actually support regardless of what may then be further downstream from the device.

 

Intrusion Detection System (IDS): is a device or software application that monitors network or system activities for malicious activities or policy violations and produces electronic reports to a management station.

 

Honeypot: is made to be inside the network and to not be a firewall but to detect a hacker before real data is taken from the company. Honeypot could be open ports, unpatch, payroll, webserver, database server something a hacker might believe to be legitimate target. Could be an isolated subnet containing multiple machines exhibiting standard network behavior. More normal it looks the more the attacker will move around the network and the honeypot records the Hackers activities within the honeypot system.

 

Cryptography: the use of mathematical algorithms to transform information into an encrypted form that is not readable by unauthorized individuals. Cryptography does provide authorized individuals with the ability to transform it back into readable form through decryption.

 

Encryption: Converts information from plaintext form into encrypted ciphertext. Decryption using an algorithm to transform that encrypted ciphertext back into plain text format.

 

Wireshark: is a network protocol analyzer that lets you see what's happening on the network down to the finest detail. It runs Windows, Linux, Mac and most other OSes. It can also deal with most capture file formats. Features include live capture, offline analysis, display filters, VoIP analysis and decryption support. Live data can be read from Ethernet, IEEE 802.11, ATM, Bluetooth, USB, Token Ring. Output can be exported to XML, PostScript, CSV or plain text. Wireshark's packet sniffing, network analysis and protocol analysis capabilities make it useful when assessing traffic vulnerabilities in real time. It can scrutinize connection-level information as well as the various pieces that constitute data packets. By capturing such packets, IT teams can determine their characteristics, see their origin and destination, and what protocol is being used. This helps to flag weaknesses within the network. Ability to analyze network traffic down to a granular level.

 

Nmap: Provides Network data of what has open and closed ports with services displayed. Also could display operating system and version. Nmap is a network scanning program which can scan a target range to see what devices are on the network. Once this step is done the hacker will one by one look at all the servers and devices located on the network and filter out which ports could be advertised open and closed on all the devices, but just because a port says its closed does not always mean the port actually inaccessible.

 

System Resources: Making sure all servers and iCloud services are secure and having a redundancy just incase of system failure such as overloaded traffic on the system or hardware failure. Making sure there always a BCP (Business Contingency Plan) plan automatically available for IT support.

 

• Email server and Web server will also be look over and will need to have cookies set for untrusted data. Also will being using Fiddler as a hacker would also to examine any vulnerabilities in the network system.

                                                                                           

                                                                                             By: Da Vinci Platform

Graduating High School Class of 2022!!!
Cybersecurity/Ethical Hacking Careers

Desert Parkway image.png

Mental Health Employee Using
The "Nigger Card" When Caught

        Most news stories you hear about are negative things on individuals of any race which could and do happen but which at the same time you never hear very many stories put in print of individuals who use racial negative terms to self-serve themselves after trying to avoid getting caught in the act. Da Vinci Platform does not discriminate against anybody under the sun since it just creates long term unethical issues but at the same time printing the truth of the reality of certain situations is what you have to do so people respect you for legitimacy and putting all emotions aside being able to put the words in print. Da Vinci Platform apologizes to all viewers who might feel offended by the article title so if you do not want to read the article then do not choose to do so if you believe emotionally you cannot handle the reality of situations which do in certain cases happen.

 

        If anyone has ever passed by a mental health facility and wonder what goes on inside that place will for Desert Parkway Behavior Health Facility located in Las Vegas their an X-Patient who able to tell his experience and has a witness to what happen to him. The X-patient who got instructions from his therapist to go check himself into the mental health facility because his behavior was a concern of mixing prescribe medications with alcohol and also suffering from anxiety attacks from being unable to drive or walk which worried the therapist and not behaving normally like he usually does, so she (therapist) made the correct call for her client to go check himself in which he did listen to her. On December 8, 2020 the client went to the facility Desert Parkway Behavior Health and check himself in and started to do the entry protocol paper work and mental health check in. After he got check into the facility they place him the patient upstairs on the 2nd floor in a wing of the facility which he does not know exactly what wing it was they were putting him in he just trusted their judgment and complied with what they told him to do. After getting into the wing he was very exhausted and slept. After being woken up to meet with the doctor who was Dr.Singh and sitting down in a room in front of medical workers there was immediately a mix up of who this patient was to Dr.Singh, the doctor was accusing the patient of the police bringing him their telling him the police found him wondering around the streets half naked with no shoes on which the doctor was wrong and then the patient had to stop Dr.Singh to clarify and unfortunately made the doctor look a little stupid in front his whole staff members in the room telling the Doctor "your confusing me with some other patient I guess and that was definitely not me" explaining to the doctor that he uber himself their and check himself in all on his own and their was no police involved so after a minute the doctor found the patient correct mixed up file and then they finally started over with the meeting asking the patient typical questions of why he decided to check himself inside the facility. It was just an honest mix up of files and two different patients at first so it was no big deal really to the patient after the mix up was fixed. Then patient finishing answering his typical mental health questions over hearing Dr.Singh asking a few of the medical staff "why is he placed in this wing?" of the facility? The patient now already on some sort of benzodiazepine is hearing this but not really concerned thinking he was about to be moved to another wing. As the patient casually listens while sitting in the chair the medical staff members had no real answer for Dr.Singh of who really made the call of the decision from the staff member doing the intake questions on the first floor to place him into that wing in the first place so they just decided to keep the patient in that wing which was no big deal to the patient at the time being on benzodiazepine because it look just like a normal hallway with a TV room and two beds in each room. Usually people are brought into this particular wing of the facility are usually for suicidal thoughts, attempted suicide, police submitting an individual, not somebody who just simply uber themself their after a few cocktails playing $10-$20 of Kino packing a bag of change of clothes before checking himself in all on his own. So basically so far day one was just chilling all day and moseying around a hallway and watching shitty cartoon television the whole day and literally for 5-7 minutes meeting the medical staff members for day 1.

 

         Day 2, December 9 once again its around morning time the patient is getting alerted that Dr.Singh is back to meet again which the patient goes to the same private room and answers the doctors normal basic questions with medical staff members for 5-7 minutes once again to just answer typical mental health questions taking more of some sort of benzodiazepine the medical staff was giving him. During mid-day the patient has not made one phone call since he been inside the facility and decides to call his therapist letting her know he doing fine which he had her number written down on a piece of paper. So the patient looks at the phone in the middle of the hallway which is about 50-60 yards long (just his estimation) and notices a young female patient is using the phone so he waits just a minute or two goes by and then the female patient hangs up the phone and walks away so now he goes and picks up the phone he pulls out the piece paper with his therapist phone number on it and starts dialing the number and his therapist picks up the phone not affiliated with Desert Parkways Behavior Health Facility and she says “HELLO” and the patient/client answer back to her “Hey its me your client I'm doing fine”… having just a short couple of words between him and his therapist and then all the sudden the phone line cuts out DEAD, confused thinking their some sort of technical issue with the phone so he turns to look around the hallway and notices a young black hall monitor/medical assistant to be walking out of one of the patients rooms and as he was walking by he stop the hall monitor and explained “I was making a phone call and the phone stop working”. The hall monitor answer back “Oh no problem ill go fix that for you”, which the patient for a split second thought that’s weird what does he mean by fixing the phone line like that normal, its like the phone shutoff for no reason??? So the patient waits and notices the hall monitor he ask to fixed the phone line walking away down the hall and went into one of the doors and then the patient just waited a few more seconds and try the phone again and started dialing his therapist phone number and once again started his conversation with his therapist all over again on the phone. Just a couple seconds go by and all the sudden their another different black hall monitor sneaking up behind the patient not speaking the words to loudly for anyone else to hear him but demanding the patient telling him “YOUR HEARING VOICES GET OFF THE PHONE” as the patient turns around and notices this different black hall monitor/nurse assistant 40-50 years old and is now confused asking him “why do you think I'm hearing voices?” the black hall monitor once again with a aggressively demanding tone BUT NOT LOUD ENOUGH FOR OTHER STAFF MEMEBERS TO NOTICE WHAT HE DOING getting closer into the patients face “GET OFF THE PHONE YOUR HEARING VOICES” and then says it again “YOUR HEARING VOICES GET OFF THE PHONE" YOUR HEARING VOICES”, the patient still confused offers for him to talk to his therapist to verify with the aggressive hall monitor saying "My therapist is on the phone if you would like to speak with her" the aggressive hall monitor does not answer back any response except constantly repeating "GET OFF THE PHONE YOUR HEARING VOICES", "GET OFF THE PHONE YOUR HEARING VOICES" repeating it constantly over and over again saying the same words "GET OFF THE PHONE YOUR HEARING VOICES", "YOUR HEARING VOICES GET OFF THE PHONE" with rapid fire not backing away and giving the patient any space so now the patient CONFUSED and ANGRY and immediately says back to him screaming for other staff members to notice this hall monitor aggressive demanding behavior, the patient answers back to him with the exact words “WHO THE FUCK DO YOU THINK YOU ARE ON PAPER” and as he gets into the patients face the other younger black hall monitor/nurse assistant who was the one who TURN BACK ON THE PHONE LINE for the patient immediately stops the other hall monitor and the patient points at him saying “HE ACCUSING ME OF HEARING VOICES” so the younger hall monitor turns to the aggressive hall monitor and ask him directly “WHY ARE YOU ACCUSING THE PATIENT OF HEARING VOICES”??? And then the patient notices the older hall monitor bickering with the younger hall monitor hearing the angry hall monitor saying "HE CALLED ME A NIGGER" the patient ignores him and immediately starts to turn back to the phone in his hand to try to start speaking with his therapist once again trying to just have a normal conversation without any interruptions now facing the wall with his back facing the hall monitor and all the sudden the aggressive black hall monitor coming up behind him shoving the patient against the phone and the wall grabbing him and launching him straight down to the ground. All the sudden the younger black hall monitor who was confused trying to stop this employee radical behavior of accusing a patient of hearing voices while he on the phone starts getting the attention to the other medical employees and all staff members SIGNALING AN EMERGENCY come quickly all eyes are on this 40-50 year old MANIC AGGRESSIVE BLACK HALL MONITOR/NURSE ASSITANT all the sudden the Manic Hall Monitor starts lifting the patient off the ground screaming “STOP RESISTING, STOP RESISTING, STOP RESISTING” while the patient has no clue what's happening and confused for being slammed against the phone and the wall thrown to the ground now being shoved around the hall way while trying to promote a fight against a white male patient while the manic hall monitor is still SCREAMING “STOP RESISTING, STOP RESISTING” the whole time shoving him down the hallway into a room with no security cameras while other staff members are approaching very fast from down the hallway running inside the room witnessing the manic hall monitor/nurse assistant surprising the whole staff and the patient with a syringe with drugs in his possession and pulling the patient pants partially down inserting the needle in his thigh and injecting him with drugs and now all medical staff members are looking and monitoring the manic hall monitor behavior turning around and realizing all of his coworkers eyes are on him noticing everybody starring at him wondering why does this manic hall monitor/nurse randomly accusing a patient of hearing voices and why is the manic hall monitor walking around the hallways with a syringe with drugs loaded in his pocket??? Not verifying with one medical staff member of what he been up to cutting off the phone lines, accusing a patient of hearing voices and walking around the hallways with a syringe loaded with drugs in his possession. The medical staff members are completely confused with what there observing and witnessing. After the manic hall monitor was followed and escorted out of the room the medical staff following him out through the door while the patient sits there for a short moment and when he notices there no staff members and not seeing the hall monitor who assaulted him in the hallway anymore the patient stayed in the room with complete confusion of everything happening so fast he had to collect his own thoughts of what happen. Shortly after that a older white female kind of social worker comes and invites the now clearly ASSAULTED PATIENT to her office and sits down at her desk and in away apologizes but not using clear words or sentences and ask what he was doing on the phone and he just simply responded to the female social worker “I was on the phone with my therapist” presenting to her the piece of paper he had with her phone number on it. So the social worker had an employee personally bring the assaulted patient cell phone from down stairs back to her office and then the patient look for two more phone numbers of individuals he wanted to call and made two more phone calls. The patient still confused and now drugged up from the manic hall monitor drugging him kind of apologizes to the social worker in her office but does not really even knows why he even doing that since he simply just trying to show he compliant since some manic employee just a short bit ago was screaming “STOP RESISTING, STOP RESISITING” constantly trying to frame the patient for no reason at all but to just to pretend the patient resisting which the manic hall monitor easily failed to convince any of the other staff members the patient was resisting in the first place and witnessing the manic hall monitor shoving a patient against the wall first and then throwing him straight to the ground when medical staff members witnessing, but the social worker now knows what happen and all the staff members witnessing the white male patient being assaulted and drug for no reason at all. The patient now noticing the hall monitor missing since they probably sent him home also noticing they were short staff down to one hall monitor never seeing the hall monitor again.

 

         Day 3, December 10 the patient gets alerted that a Medical staff member is here to speak with him and this time its only one random doctor he never spoken to who was a woman, she was sitting in the room, not Dr.Singh and no other medical staff members, the individual medical staff member an Asian women guessing to be a doctor is letting him know he going to be discharge soon to go home which he already knows he going home after what happen yesterday being assaulted for no reason just telling a hall monitor exactly what he deserved to hear “WHO THE FUCK DO YOU THINK YOU ARE ON PAPER” and the assaulted patient still noticing the hall monitor who assaulted him was nowhere in sight. So obviously that manic hall monitor was sent home or probably suspended for what he did but after that and being discharge the patient went home with just confusion and anger of why a 40-50 year old manic hall monitor/nurse assistant of some sort could just frame a patient using the “Nigger Card” against him inside a mental health facility would be an acceptable answer to other staff members for his behavior after the fact the manic hall monitor was caught lying not telling any other staff members what he was simply doing on his own keeping it a secret of cutting off the phone line, accusing a patient of hearing voices, while walking around the hallways with a needle of drugs in his possession targeting a white male patient and drugging him off security camera is mind boggling how loose that facility is operating. After that a couple days go by and the assaulted X-Patient is home and going back to his normal therapist to meet and tell exactly what happened and to verify what she heard over the phone when he (her client) was talking to her. She the therapist verified that she heard what happen over the phone and heard her client being launched against the wall, the phone falling out of his hand clanging against the wall and thrown to the ground which he (her client) was happy she heard him offering the hall monitor the phone verify he was talking to her and also yelling "WHO THE FUCK DO YOU THINK YOU ARE ON PAPER" and yelling screaming in confusion of being assaulted and slammed to the ground for no reason. Then a period of time goes by and the assaulted past patient goes and checks the mail and gets a Unanticipated Pandemonium Surprise bill opening it up realizing its a medical bill from Guess Whooo!!!? Desert Parkway Behavior Health Facility in the mail for $1,400 co-pay and now just imagine the raging anger racing through this guy body getting a medical bill for 3 days of watching shitty cartoon television shows, walking around a hallway and getting assaulted by a manic employee on the second day & seeing Dr.Singh for maybe 15 minutes tops only meeting with Dr.Singh twice before he was assaulted and never seeing Dr.Singh again after he was assaulted. Now he going to war with this medical facility. If they think they're going to send him a $1,400 medical bill for 3 days of maybe 15 minutes of talking to a medical psychiatrist and being assaulted on the second day then them thinking there going to get $1 out of him its not going to fucking happen much less $1,400 co-pay. First, what would this X-Patient even be paying the facility for in the first place??? Who he even supposed to be paying? Who the money even going to??? Did the staff members working in that particular wing forget to mention to the accounting department to not send this X-Patient a medial bill for being assaulted??? So for 9 months this X-patient was contacting a woman who the Director of Risk Management for Desert Parkway Behavior Health Facility leaving unpleasant messages of the assault and lawsuit on her voicemail harassing her ALMOST EVERYDAY which he knew she not going to call the police because he has a very detail story with a witness of what happen to him so after around 9 months contacting the Director of Risk Management the accounting department finally said don’t worry about paying your medical bill because it’s suspended. For everybody out there if your experiencing mental health issues make sure before checking inside a mental health facility that no random hall monitor/nurse can play GOD and just randomly go and cut off the phone lines all by themselves without telling and alerting any other staff members what he was up to. No medical employee should be able to be walking around a facility with a syringe in his possession and able to cut off the phone lines whenever the individual feels like it targeting a white male patient. Asking the past patient about his experience with the individual employee “does this make you question individuals and it being a one way street to use the Nigger Card”? Reply's, Their will always be bad apple individuals out there who are trying to look like a victim when they get caught in the act and it was a younger black hall monitor who was calling out the older manic hall monitor confused just as I was for why he was accusing me of hearing voices. Am I frustrated with what happen and how it went down YES and I have nothing against that facility for not knowing what the hall monitor was up to in the first place, just the one individual employee playing GOD and the fact they sent me a medical bill after getting assaulted and talking to the doctor for maybe 15 minutes tops, I was not the only patient in the facility and I know the doctor has other patients to see and he does his job of asking me basic mental health question but I did not know 15 minutes of meeting the doctor two times is a bit short, so I don't know what can the doctor even really do for me besides making sure I'm behaving appropriately in that 15 minute total of me meeting with him only twice and answering his normal mental health questions with me, also this was the first time of me checking into a mental health facility and will I ever go back to a mental health facility NO, and never Desert Parkway ever again because it frustrates me every time I think about that manic employee behavior and also the Director of Risk Management at Desert Parkway I'm not sure if I should trust her and if she might have had part within my medical file report when I reported the assault to her. Did the medical staff working in the second floor wing not even report the assault because of confusion and not knowing what the hall monitor was doing all on his own in the first place purposely cutting off the phone line and accusing me of hearing voices over and over repeatedly? Receiving the medical bill is what push me over the edge to report the incident to the Director of Risk Management in the first place, so after I reported the assault to the Director of Risk Management I requested my medical file and after a couple of weeks I receive my medical file from Desert Parkway and there is one issue when I ask for my medical report Desert Parkway never reported the hall monitor name or any ID number in my medical report of the hall monitor drugging me, assaulting me and cutting off the phone line while walking around the facility with a syringe in his possession without any other staff members knowing what he was up to. Viewing the Medical Report also says listed I was HEARING VOICES which is obviously just them choosing to libel my medical file to cover up for an investigation and lawsuit so there still is the question of did they leave the hall monitor name out of my medical report of assaulting me to cover up an embarrassing lawsuit and also did they say I was hearing voices once again to libel my medical file to cover up any investigation or lawsuit??? From what I was told medical facilities by law are supposed to report and document who inserting drugs into a patient especially in such a violent way??? To this day I still have no idea what drugs the hall monitor injected into me and could never report it to the Nevada State Nursing Board but did report it to the Nevada Board of Health which a few months later they finally contacted my therapist letting her know they did contact Desert Parkway and spoke to a representative who confirmed they can cut of the phone lines which we already knew that but since they left out those critical details of the hall monitors name and ID number for accusing me of hearing voices then drugging me then there really nothing they can do. Also, you would have never seen me getting drug anyways by the manic employee because he shoved me into a room with no security cameras which should be completely illegal for a hall monitor to do that. All I have is a witness of me being assaulted and ripped off the phone. Every time I starred at the $1,400 co-pay sitting on my desk it just ate at me more and more everyday because I knew I was not going to pay the $1,400 co-pay, mixing prescribe medication with to much alcohol is what I need to remind myself about but now I do not take medication any more just practicing to control myself of possibly having some sort of anxiety attack just like everybody else in society one day at a time, I'm not saying taking medications is wrong if you need it so will it be the last time I take medication to balance myself out who knows”. Mental Health facilities can print or not print whatever they want in a medical file to cover up a lawsuit especially as embarrassing as this particular case. Last and not least when a mental health facility sends you a medical bill they need to prove what the patient is even paying them for and what services the facility is even providing to bill your insurance company and to bill you $1,400 co-pay, mental health facilities are not bad places but certain individual employees behaviors can make things go bad for people being in a unbalance state of mind already, so now you heard what happened I hope all the readers out there can understand to be cautious when it comes to mental health facilities and individual employees scheming irrational aggressive behavior trying to look like a victim after the manic employee gets caught in the act.

 

                                                                              Fact Story

​

IF YOU ARE ASSAULTED INSIDE A MENTAL HEALTH FACILITY THESE ARE THE BOARDS YOU CONTACT: (YOUR STATE) Nursing Board, Board of Medical Examiners (for Doctors), or the Board of Health.                                                                                                           

                                                                                                                           By: Da Vinci Platform

bottom of page