Sunday, May 15, 2016

How might Individual Retirement Account savings impact future disability related income support?

Unexpectedly, #1 is working 20hrs a week in an unsupported employment situation. Not enough to live on, but it makes qualifying for Supplemental Security Income (SSI) as disabled more difficult. Not to mention health insurance. Or financial planning beyond my grave, such as supplemental needs trusts and 529 Able plans.

Life with a cognitive disability is much trickier than it was just a few years ago.

So now he’s paying social security taxes and he could put money in a personal IRA. But how would that impact any future SSI payments? The maximal bank balance on SSI is $2000, but does that include IRA assets?

The best explanation I found online is from the SSA, I think this is the key line: “…anything else you own which could be changed to cash and used for food or shelter …”. Since disability allows early withdrawals from an IRA any savings therein would not be sheltered.

So he probably shouldn’t start an IRA. Looking at the list of things that don’t count as material assets the main exclusions are either a vehicle (he doesn’t drive) or a home that one lives in (talk about a benefit that goes to the relatively wealthy) …

Thursday, April 21, 2016

Passport for adults with guardians -- similar to procedure for passport for minor

We’re redoing #1’s passport renewal — because we followed the adult procedure, not the children’s procedure I wrote about in 2007. We were told since we are #1’s legal guardians we have to repeat the procedure with both of us present. (I’m not sure if we pay again, I wouldn’t be surprised.)

Even knowing about this requirement I’m unable to find anything online about it. I wonder if it’s a recent change.

Monday, April 18, 2016

Google - Accessibility isn't only about vision and touch, cognitive disabilities are neglected.

Google got some good press recently for a $20 million dollar accessibility project developer grant. It’s a good initiative, but Google’s Accessibility site doesn’t consider cognitive issues.

That’s a shame, because there’s a lot Google could do. They could, for example, read my book (not published yet, but I’ll provide preprints). Of course Google isn’t alone, neither Apple nor Microsoft nor Facebook have built in support for teens and adults with cognitive disabilities. Depending on how one defines cognitive disability this is a much larger population than adults with visual and mother disorders.

There’s a lot Google could do, and there are good commercial reasons to address this need. Just as wheelchair sidewalk curb cuts have been a boon to strollers and elder walkers, cognitive adaptations also apply to many elderly and most children.

What kind of adaptations?

The obvious adaptations are scalable interfaces, such as simplified versions of Google Mail or Google Calendar. There are other angles to consider though. In Smartphones for All - Using iPhone and Android to build independence for atypical minds I write about the role of Explorer and Guide. Google, Facebook and Apple could explicitly support the role of the Guide, including delegation of identity. The Big Three could provide a formal way to apply restrictions designed for under 18 to over 18 adults with guardians or delegated Guides.

Some of these adaptations take more work than others, but in many cases we’re more than half-way there. Web services that work with both smartphone apps and a Chrome browser with Profile support enable the Guide role today, they can be extended and formalized.

The first step is for Google, Apple and Facebook to put cognitive disabilities on their roadmap. I like to think they just haven’t known how to start. All they need to do is read this blog post…

Monday, April 11, 2016

Hockey as a guide to behavioral interventions

#1 and I made our first trip to the yearly USA Hockey Disabled Hockey Festival, special hockey division.

Watching two of his hockey issues I realized they mapped well onto behavioral issues.

He’s a strong player, but very weak at passing. He also over-responds to aggression or even accidents, rapidly escalating. (Sometimes, to his credit, the emotional response is so strong he removes himself from play. Which isn’t a great response, but not the worst. Fortunately this is special hockey, a more forgiving place.)

I think both of these match onto more global issues.

Passing is cognitively hard and, unless one has skilled teammates, often unrewarding. Instead of scoring a goal, the puck goes to the opposing team. The only reason a strong player passes to a weaker player is because of social pressure and social rewards. Turn-taking type behavior in other words. #1 is weak at this kind of interaction; he doesn’t “feel” the social pressure.

Handling escalation is also tricky. #1’s sister can set him off with a look. (If she’s in a bad mood this works well to spread the feeling.) He is unable to respond with an equal or lesser action; in part because he mis-remembers the initial provocation. In his memory it is far bigger than it was; though in hockey the aggression is often flagrant*.

Both of these issues will factor into our summer behavioral program goals. Special hockey will give us a concrete way to manage progress. If he passes the puck, and returns an elbow with no more than an elbow, then we’ll have made real progress.

* Parenthetically, we have a bit of a referee problem in special hockey. If they come from regular hockey they overlook the routine illegal roughness that is hard for even neurotypical players to handle (fights!) and is well beyond what special hockey players can manage. Conversely, if they are used to less competitive special hockey they are unprepared to see elbows thrown and sticks slashed. It’s a hard job.

Friday, April 01, 2016

Employment - an unexpected direction for #1

Our #1 has always straddled the borderline between (legal) disability and non-college employment. Much as he has been on the borderline between participating in conventional sports (rec hockey, adult hockey) and assisted sports (special hockey). 

That trend continues. During a work rotation through the first year of his ‘transition program’ he was offered part-time (50%) conventional employment doing warehouse work. Not enough to live on, but perhaps a problem for qualifying for disability, supplemental needs trusts, 529 ABLE plans, housing support, medicaid and more.

He is, of course, quite excited. We have, of course, mixed feelings. We haven’t focused on managed savings, budget training, debit cards and the like. That seemed years away, and likely to involve only trace amounts of money. What happens now to his transition program? Do we now get him his (deferred during transition program as is the peculiar norm) high school diploma? Do we divert his income into “room and board” that we can in turn invest in an S&P index fund for him?

What about transportation? He hasn’t completed transit training and it’s a difficult 1 hr bus ride to his job site. We are fortunate he is a strong cyclist, the weather is decent, and there’s a safe 30 minute route to work.

I suspect he will tire of employment once the novelty wears off. That has been a common pattern with other activities on the far side of disability. He is older though, and we see signs of more executive function. Flexible we remain…

Thursday, March 24, 2016

Smartphone for All: Facebook risks - predators and porn

The Facebook chapter of Smartphone for All keeps growing. I think I’m over the worst of it. I’m hopeful it will be particularly helpful, it’s going to feature in a May presentation I’m doing in the Twin Cities.

 One of the tricky sections was figuring out what to say about Facebook pornography. Here’s my current draft, I may move the “why Facebook anyway” part to a different section …

Social media is risky for everyone. Many professionals either abstain from Facebook, use a pseudonym, or read but never interact. So why am I writing a chapter about Facebook use?

I’m writing about Facebook because many teens and adults want to use Facebook, and it’s much easier to help navigate than, say, Snapchat. Facebook is hard to avoid; it’s the primary way many of us learn about community news, events, and social activities. For many users Facebook is a primary news source.

Facebook is also a social experience. For most neurotypical users it’s only one of many social experiences, but many Explorers have limited social options. For them the social connections is particularly powerful.

Facebook can also be an opportunity to learn about social interactions with a Guide’s help. Especially if an Explorer uses a pseudonym (see below) there’s an opportunity to make social mistakes that a Guide can help with. Many Explorers only learn through experience.

Assuming an Explorer is going to use Facebook, what are the risks to watch for in addition to the social mistakes that every Facebook user experiences?

I know of two related risks that can be a special problem for Explorers and and other vulnerable users: sexual predators and pornography.

I’ve been unable to find any academic or police data on sexual predator activity on Facebook. A 2012 Reuters article⁠1 tells us have read that Facebook uses AI type software to detect predator activity and that “The National Center for Missing and Exploited Children processed 3,638 reports of online "enticement" of children by adults last year, down from 4,053 in 2010 and 5,759 in 2009.” Although only a fraction of incidents are likely reported the downward trend is encouraging. Facebook is probably relatively risky territory for predators, though even one can do a lot of damage⁠2. Every Guide will need to measure this risk for both male and female Explorers, but as social networks go Facebook is likely safer and easier to monitor than most.

Pornography is a more complex problem. Facebook’s March 2016 terms of service⁠3 say “You will not post content that: is hate speech, threatening, or pornographic; incites violence; or contains nudity or graphic or gratuitous violence.” In practice Facebook relies entirely on investigating complaints, it doesn’t actively seek exceptions. I’ve seen Facebook investigators decline to act on (closed) Group content that flagrantly violated the terms of service.

Whatever Facebook may claim, as of 2016 anyone actively seeking pornography on Facebook will find it, either by information exchanged at school or through Facebook itself. Of course most teens and adults won’t bother to look, if they have unrestricted web access they will find a vast array of pornography elsewhere. Facebook pornography is really only a problem for users with Facebook access but restricted web access, including children and many Explorers.

Some Guides will, because of personal values or Explorer issues, want to monitor and block extended access to Facebook pornography regardless of related problems (there’s no way to prevent initial access). Other Guides and Explorers may not be concerned by pornography alone. Unfortunately there are two related problems that favor monitoring and restriction.

One problem is that Facebook shares a lot of data among Friends, including an Explorer’s Friends, Groups⁠4, and Likes — not to mention their posts and comments. An Explorer may unwittingly share Facebook pornography with grandparents, siblings and friends.

Another problem is that nobody creates pornography as a charitable enterprise. Facebook pornography has to make money, and since it’s technically banned it can’t rely on the usual advertising or game revenue. Facebook pornography has only a few ways to make money, including inducing Explorers to install ransomware⁠5 and other forms of malware.

Until an Explorer advances to unrestricted web access, it’s probably a good idea to monitor for pornography delivered through Facebook Groups, Friends, and Pages and to work with an Explorer to remove the offending items. A Guide may choose to report issues to Facebook, but the results can be disappointing.

 

anImage_15.tiff

1 http://www.reuters.com/article/us-usa-internet-predators-idUSBRE86B05G20120712

2 http://www.telegraph.co.uk/news/uknews/crime/9275731/Facebook-sex-predator-jailed-and-banned-from-using-the-site.html

3 https://www.facebook.com/terms

4 In theory only Public Groups. In practice information on closed groups can leak out as well.

5 Ransomware encrypts a user’s storage device and demands cash to make user data available. As of 2016 it’s a very profitable business.

Tuesday, March 22, 2016

Managing Explorer credentials with iOS 9.3 Notes.app and Android alternatives

An updated chapter from my smartphone book, revised with yesterday’s release of iOS 9.3 Notes.app:

An Explorer starts out with a smartphone unlock password (or PIN) and at least one username and password for their Apple iCloud account or their Google account. We call these usernames, passwords and other account information. “credentials”. Over time an Explorer will need credentials for everything from bank accounts to utility bills to social networks. Even if a Guide is conservative about adding new Explorer services it’s not hard to end up with 50 or more sets of credentials to manage.

For each Explorer credential a Guide needs to know the “username” (sometimes it’s your Explorer’s email address), password, site name, and site address. Unfortunately for many sites today you’ll also need to write down what “secret question” responses you provided when registering. This is even more important if you are very careful about security, and treat each secret question response as yet another unique password.

You could make this easier by reusing the same password for every site. Many people do that, but when hackers steal credentials from any site they try them on every site. You really don’t want to use the same password for a local newspaper and for a Guide’s bank account.

Guides need to create “strong” passwords for Explorer email accounts, bank accounts, Amazon accounts and the like. One way to create a strong password is to combine two randomly selected words form a dictionary, capitalize one or two letters, and mix in some numbers and a symbol like $#&:;. Avoid letters and numbers that can be confused with one another, like l and I or O and 0.

There’s no way any of us can keep secure credential information in in our heads. We have to write it down, and, because you really don’t want to lose password information, you need to have two copies.

The two copies also need to be in different places. Why two places? Well, imagine that you’re storing your passwords on your phone. One day you need to unlock your phone, but you don’t remember the phone password. If the passwords are only on your phone you won’t be able to get to them. Even if your phone is backed up the backup won’t help you, because you won’t be able to restore it without the phone password.

There are two approaches to credential management that work on both Apple iPhones and on Android smartphones. One approach is to write them by hand on paper and make a copy of the paper. This approach is approved by security experts, but it’s tedious to keep the list updated and to carry a copy in your wallet. (A Guide can do similar things with a document on a secure computer, but that’s beyond the scope of this book.)

A second, more complicated, approach is to use secure password management smartphone software, like 1Password.app. You can optionally have 1Password data stored “in the cloud” and available through a web browser; most security experts avoid that however. I strongly recommend you print out your 1Password credentials periodically, if you’re phone is lost or destroyed you don’t want to rely on Apple’s backup software. Make sure you print out your 1Password password too!

1Password is too complex for most Guides and Explorers though. What about just keeping credentials in a Note on your smartphone?

If a Guide is using and Android smartphone this can be a risky option. As of early 2015 many lower cost Android smartphones are not truly secure. Google’s Note application, Keep.app, doesn’t support Note encryption. So on an Android device I’d recommend using 1Password.app or one of its competitors — unless you are confident the Android device uses strong encryption and it is secured with a strong password.

If a Guide is using an iPhone with iOS 9.3 or later Apple’s Notes.app is a good, simple way to store an Explorer’s credentials. The iPhone itself has quite good security, and you can create an additional Notes.app password and use it to lock one or more individual Notes. iPhones that support TouchID (fingerprint unlock) make it easy to access locked notes. Just be sure to add the Notes.app password to your document and to print out the Note when it changes.

This approach is simple and secure, and it’s safe as long as a Guide keeps printed copies. It’s easy to accidentally delete critical information when editing a Note, and of course phones get lost and broken. Paper backups are reliable.

There’s another advantage to the use of secure Notes on an iPhone; many Explorers will learn this technique and in time independently maintain their own credentials. In this case the Guide’s role is to be sure that there’s a printed backup!

Saturday, March 12, 2016

Dating and relationships on the spectrum: AUSM presentation and reading list

#2 and I attended the first of a planned series of Autism Society of Minnesota (AUSM) presentations: Dating and Relationships: How Does This Work?

It was awesome.

There were two parallel tracks. A track for spectrum teens 12-19 was led by Jeannie Uhlenkamp, author of  The Guide to Dating for Teenagers with Asperger Syndrome. A session for professionals and parents was led by Sara Pahl and Dawn Brasch. The teen track would have been challenging given the variety of interests and learning features. My track is best summarized as “so we’re not the only ones”; between #1 and #2 I could have spoken to every topic. (And suggested a bunch of additional topics for a future “advanced” track.)

The frank discussion of the legal aspects of spectrum sexuality and choices was particularly appreciated.

This needs to be turned into a video series for wider use. I understand the AUSM has plans in that direction.

For now, here is a reading list from today’s session:

Friday, March 04, 2016

Managed identity for the special needs Explorer: iCloud makes aliasing easy

From Smartphone for all …

When you first begin supporting your Explorer a single address for them to send and receive email is fine. You may find, however, that you want another, secret, address for your Explorer. You might not want to expose their private email address when signing up for Facebook for example. You may not want them to be able to reset their bank account password. With experience you’ll find many occasions where want to use an email address for an Explorer that sends email to a Guide.

There are three ways to create this kind of email address for an Explorer, depending on what the Guide is familiar with.

If the Guide is using iCloud things are very simple. iCloud email has elegant support for up to 3 “aliases”. A guide can create an “alias” for an Explorer; that email becomes the Explorer’s “managed identity”. Here’s an example of an alias created for a famous Explorer - Meriwether Lewis of Lewis and Clark fame:

Meriwether Lewis alias.png

If Meriwether were my Explorer and I configured this alias on my iCloud email then I would receive email sent to mlewis_ident@icloud.com (careful, someone is sure to create this email address, I don’t use it!). I might do this so I can monitor Facebook activity and control password resets for example. (see Facebook Social and Facebook Messenger). See Apple’s support note for more information: https://support.apple.com/kb/ph2622.

If a Guide is using regular Gmail they can’t create an alias. They can, however, open a new Gmail account for the Explorer and set it to forward email. This is awkward and requires yet another password to manage, but it only has to be done once.

Lastly, technically oriented Guides will know of other email redirect options that are beyond the scope of this book. (I don’t recommend using a free redirect service however, there are too many security risks.)

All of these approaches will work to create this extra, secondary, email address. This secondary address doesn’t get entered into your Explorer’s phone, it’s just for use by a Guide, typically though a web browser like Chrome. 

You don’t need to add this second, Guide-use only Explorer email at first, but keep it in mind as you gain more Guide experience.

Why "Smartphone for all" needs to be written (and read) - special needs adults need a pocket AI too.

After reading Everyone needs an AI in their pocket I updated the “why you should read this” introduction to “Smartphones for all”

You’re reading this because your Explorer is seeking independence in a world of ubiquitous technology, technology that’s currently packaged in an Android (Google) or iOS (Apple) smartphone.  We’re growing accustomed to smartphones as our companion computers, but if you step back a bit they should inspire genuine awe, as well as some concern. The personal computer and the internet both had large impacts on society, but the smartphone, an ever present emerging artificial intelligence companion, is kicking everything up a notch. 

It’s already hard to function without a smartphone, but in time it will become almost impossible. In March of 2016 a Washington Post article⁠1 was titled Transit systems are growing too complex for the human mind. That sounds bad, but on the same day Google published an article⁠2 about the latest improvements to the “AI” (artificial intelligence) engine that provides its transit advice. Want to get around London or Manhattan or Minneapolis? No problem, just ask Google.

Everyone will needs an AI in their pocket, including the teen or adult you’re guiding. Since smartphones aren’t made to serve our Explorers I’ve written this book on how you can help them succeed. The goal of this work is to support independent living and mitigate harm that can come to a vulnerable population living with a tool of amazing, sometimes frightening, power and versatility.

anImage_9.tiff

1 https://www.washingtonpost.com/news/wonk/wp/2016/03/03/transit-systems-are-growing-too-complex-for-the-human-mind/.

2 http://googleresearch.blogspot.com/2016/03/an-update-on-fast-transit-routing-with.html