More than 150 new laws in Illinois

More than 150 NEW Laws in Illinois

While Illinois is facing many difficult situations, Gov Pritzker signed more than 150 bills last week. Included are bills making it illegal to come into contact with a bear or non-human primate, a requirement that newly constructed water fountains include a bottle-filling station, and permission for mortgage loan originators to work from a remote location. The list goes on and on, and you can see more in this article:

Read More Here

Meanwhile, issues like unfunded pension debt, failing public schools, sky-high tax rates, increasing energy dependence and a hostile business climate aren’t receiving any attention in Springfield.


How To Protect Your Information

Malicious actors are people who attempt to access a person’s mobile device or personal information for their own gain. Oftentimes, malicious actors set up ‘honeypots’ or traps that get a user to perform an action that will give the actor greater access to that user’s devices and accounts. Many people think that their phones will be able to stop all attacks, or that these tactics would never be used on them. Unfortunately, they are far more common than expected and can compromise serious information about a person’s accounts, information, and life.

The best way to prevent yourself from becoming a victim of these attacks is to be fully informed about the methods used by malicious actors. Here are a few examples of tactics used by malicious actors, along with ways to protect yourself from these specific attacks.

USB Charging Ports “Juice Jacking” One of the newer tactics used by malicious actors is a process known as ‘Juice Jacking’. This occurs when a person replaces a physical USB charging port with their own hardware that will grant them access to a user’s phone. Unsuspecting people in public locations such as airports may plug their phones into one of the handy USB charging ports but will be unknowingly granting a malicious actor complete access to their device. While this newer form of malicious acting is not common, it does still occur and will often go unnoticed by a user for months or even years.

To keep yourself safe from this tactic:

  1. Never use a charging cord that does not belong to you.
  2. Do not use public USB charging ports or stations.
  3. If you have to charge your devices in a public location, always use your own charging cord and an electrical outlet.

Phishing
Phishing is a practice in which malicious actors send fraudulent emails or texts intended to deceive a user into revealing information or clicking on a corrupted link that installs malware on the user’s device. Phishing is a massive problem online. In 2022 there were over 300,000 reported victims of phishing attacks in the United States alone. The reason this practice is so effective is because of the ever-changing manipulation tactics that allow these attacks to seem more and more authentic.

Email is the most common method for a phishing attack and can be done in a way that looks incredibly real. For example, you may receive an email from your bank telling you that your account was compromised and that you need to click a link to recover your account. Sometimes the attacker will even have your name, your company name, or other information about you that is meant to appear authentic.

Here are some questions to ask when receiving an email to determine if it is a phishing scam:

  1. Are there typos in the email address or in the text of the email?
  2. Is this email claiming to offer a prize, reward, or discount?
  3. Is this communication unexpected or unsolicited, even if it seems like a person or entity you are familiar with?
  4. Does it ask for your username, password, credit card number, or any other sensitive information that you would not normally share?
  5. Is there a sense of urgency in the email claiming something like ‘you only have 24 hours to recover your account’?

In any case, you can always contact the individual or company directly to ask if the email is real. When it comes to phishing attacks, it is always better to air on the side of caution and ignore emails that seem suspicious.

Geotagging
Geotagging is the process of adding metadata to photos or social media posts that can pinpoint the geographic location of the user. Geotagging is not necessarily harmful on its own, but it can become dangerous when malicious actors have access to a person’s location. The process of geotagging can happen in two ways: either through the deliberate action of a user to tag a location on social media, or the unintentional tagging of photos done automatically on mobile devices.

A user can deliberately choose to geotag their location by adding it to a social media post. This is a function that allows them to tag a specific place, such as the restaurant they are eating at in a photo or the location they are visiting for a vacation. This is often harmless and usually poses no threat due to most users tagging a public location. However, it can pose a threat if users tag private locations. Basic Internet safety rules can easily circumvent any danger posed by this form of geotagging.

The second form of geotagging is the automatic tags added to photos taken on a person’s phone. Photos taken on devices with location services enabled will include code in the photo’s metadata that can show the location of where it was taken. Malicious actors are able to access that code and therefore the information that shows your location.

While taking and posting a photo that has been geotagged is often harmless, certain information such as a user’s home or school address could pose a safety concern. Automatic geotagging can be disabled on most mobile devices.

You can protect yourself with geotagging by:

  1. Being aware of where you take photos and being sure to only post ones taken in public spaces.
  2. Limiting what locations you tag on social media posts.
  3. Making your social media accounts private to ensure malicious actors will not have access to what you post.
  4. Disabling geotagging on your device.

Any harmful practices online can be avoided by users who are aware of the risks of being online and the tricks used by malicious actors. This guide, along with practicing basic Internet safety etiquette, is a good way to remain safe while also enjoying social media and the Internet. 


CRAZYTOWN Jut Got Crazier

Illegal non-citizens will now be allowed to arrest American citizens in Illinois.

Yep, you read that right.

The recent passing of Illinois House Bill 3751 amends the Illinois Municipal Code by adding the following language:

‘An individual who is not a citizen but is legally authorized to work in the U.S. under federal law can now apply for the position of police officer.’

Not only that, this non-citizen would also be subject to federal approval to ‘obtain, carry, purchase, or otherwise possess a firearm.’

Really?!?

More insanity brought to you by the party that preaches more gun control:


What Is A ‘Franchise Tax’?

It’s unfair to small businesses. That’s what it is.

The franchise tax was enacted in Illinois in 1872 and is now considered ‘archaic’. Less than two dozen states have a franchise tax, and not all of those are as unfairly structured as the one in Illinois.  There are approximately 1.2 million small businesses in Illinois and the state lost a net 208 single-establishment firms to out-migration in 2021, the 3rd-worst in the country. Pro-growth, pro-business legislation will be necessary if our goal is to encourage people to come to and stay in Illinois.

Click Here For More

Another One Bites the Dust

Walgreens is closing its distribution center in Edwardsville, Illinois, cutting 400 jobs. This comes just six weeks after the drugstore chain announced it would be trimming 504 corporate positions in Chicago and Deerfield.

Businesses have to make difficult decisions all the time, but everyone knows that the state of Illinois stacks the odds against their potential for success.

Read More Here

Remembering Gettysburg

This year marks the 160th anniversary of what is widely thought of as the most important battle of the Civil War- The Battle of Gettysburg. There were an estimated 50,000 Confederate and Union soldier casualties between July 1-3, 1863 in the small town of Pennsylvania, and the massive battle changed the course of the war. The bravery of these soldiers, however, did not bring a swift end to the war, and it dragged on for nearly two more years.

In his Gettysburg Address, a November 1863 speech to dedicate the Soldiers’ National Cemetery, President Abraham Lincoln recast the Civil War as a second American Revolution, a rebirth of freedom.

Read More Here

Around the District

Dream Flights for Veterans.


As your State Representative, my office is available to assist you with any issues you may have when interacting with a state agency.

Please call our office at 217.876.1968 to get help or schedule an appointment to see me.

The office is located at 715 W Imboden Dr, Decatur.