Burglary Raises Fears; Is It Safe to Leave Home?

This is so awfully crazy that I just have a hard time believing someone can be so deceitful and so stupid at the same time.

“A one-time Royal Caribbean sales staffer, who used information about clients’ trips to burglarize their homes while they were cruising, is definitely fodder for chatter. And nothing’s more on topic today than this debate: Should we worry that information about our own travels away from home could fall into the wrong hands? While today’s consumers are well versed in the dangers of “virtual” robberies — identity, credit card numbers — this situation reveals the possibility of more physical theft, in which individuals with access to cruise lines’ reservations systems can match trip dates to home addresses and identify houses to burglarize.

“A Royal Caribbean employee abused her position with the cruise line to identify customers away on cruises and then conspired with her husband to rob their homes during the first nights of their vacations. She was caught, arrested and charged with multiple counts of burglary, and the cruise line has since fired her.

The bad guy is always looking for a way to steal from you. They will stop at nothing to take what’s your and make it theirs.

Contrary to what some might suggest, I’ve never thought it was a good idea to place your name on a “stop mail” list at the post office. Because some crack head postal employee now has a list of opportunities.

It’s the same thing with stopping delivery of your newspaper. Once you are on that list, it is known you are away.

The best case scenario for both issues is to have a trusted friend, family member or neighbor grab your mail and newspaper for you.

Never list your vacation plans on social media. The last thing you need to be doing on Facebook is telling the world you are 2000 miles away.

Do all the fundamentals like invest in a home alarm system that sends an alert to local law enforcement that your house has been broken into. Monitoring is generally a buck a day. I spend more than that on cookies.

Set yourself up with home security cameras. Mine can be accessed from my iPhone and online. It’s kind of addicting, and I’m always checking out the scene at the homestead when I travel.

Put lights on timers to give your home the “lived in look”.

Robert Siciliano personal security expert to ADT Home Security Source discussing Home Security on NBC Boston. Disclosures.

Woman Suspect in Pot Stealing Home Invasion

It’s not often that I see “woman suspect” and “home invasion” in the same sentence. Home invasions are mostly done by Cro-Magnon men who are one step out of a cave and temporarily in society until they go back to jail. Police released a sketch of an armed woman accused of stealing two medicinal marijuana plants while a 19-year-old woman was home.

The report goes on to say it was two woman and two men, which makes a little more sense. All is right with the world again. The Mercury News reports the teen was in the bathroom at the time and was ordered to the ground and briefly held captive while the house was pillaged. They stole the pot plants as well as electronics.

The teen was not harmed. Luckily. The pot plants belonged to the teen’s mother, who is a medicinal marijuana card-holder.

California has led the charge to legalize weed for medical purposes. And many a quack provides medicinal marijuana cards to anyone who has even the slightest ailment.

A side effect of having the law past has led to many such crimes. Even though its semi legal, it’s still worth something substantial on the street. So if you tug on the whacky tabacky to sooth your aching whatever, it would probably be a good idea not to broadcast your prescribed pot.

Home invasions are best prevented by locking your doors all day and night and having a home security system installed and armed. Oh and on another note, if you have pot plants it’s probably not a good idea to have them in the window getting sun.

Robert Siciliano personal security expert to ADT Home Security Source discussing Home Invasions on Montel. Disclosures.

Chicago: Homicides up, Citywide Crime Down 5.8 Percent

Thanks to Al Capone the infamous gangster, The Windy City has long been known for organized crime dating back to the 30’s. In concentrated areas like big cities, crime is often a factor. But as proven in New York City, effective policing can reduce crime. Chicago seems to be making positive strides in managing its crime climate as well.

Law enforcement in Chicago just announced there was an 11.2 percent drop in violent offenses and 4.2 percent decrease in property crimes. However the 164 recorded homicides in 2010 are six more than last year at this time, an increase of 3.8 percent.

The Chicago Suntimes reported “Homicides have continued to challenge us,” their Chief said, adding that the department will continue to deploy officers to areas where there is a probability of violent crime. “The safest place for your children is in your home under your supervision,” he said. Chicago police also seized 3,513 weapons, which were 189 more than last year. It breaks down to an average of nearly one weapon recovered an hour for the entire year so far.

Imagine if they didn’t get those weapons off the streets.

They further reported there were nearly 2,000 fewer property crimes, a drop of more than 4 percent including a drop in theft at 9.8 percent and burglary at just under 1 percent.

Taking into account the small rise in murders, the overall drop in crime is impressive. Whether you are from a little town or a big city the most effective way to reduce crime is to take an individual responsibility in your own personal security by reaching out to local law enforcement and finding out what systems they may have in place and what kind of information you can bring back to your neighborhoods.

Attend neighborhood watch meetings that may be sponsored by the local police. Work to get everyone on the same page in regards to monitoring your neighborhood to seek out suspicious behavior and report incidents that may lead to crime. Take direct responsibility for yourself and your family by installing heavy duty locks, locking your doors, and install a home alarm system.

Robert Siciliano personal security expert to ADT Home Security Source discussing Home Security and Identity Theft on TBS Movie and a Makeover. Disclosures.

Brazen Burglars Broke into the Same House Three Times in a Week

In the first hit they made off with a television and four-figure sum of cash, plus a key to the garden shed.

They came back, let themselves into the shed, and took garden tools but were spotted by the returning home owners.

The GazzetteNews reported the homeowner investigated after noticing the shed door was open, and saw four people in the park behind the house, two of them were holding the tools stolen from the shed and the group ran off.

The burglars then made a third attempt on the house and caused damage to the property.

Local law enforcement well aware of the ongoing break-ins assembled a team of detectives to thwart the property crimes and to try and break the pattern.

Their strategy is to visit well-known suspects, keeping tabs on their whereabouts and doing what they can to “divert these individuals from crime.

“They also work closely with victims, providing them with support and giving them advice on home and personal safety. “Anyone who has had to deal with a burglary will know that it’s not just the financial loss that is difficult; more often than not, items of huge sentimental value are taken, so it also has a huge emotional impact too.

“This is completely unacceptable and the teams will be doing all they can to prevent this from happening to residents in our communities.”

Bravo to all involved in the effort to preserve the sanctity of citizen’s rights to safety and security.

But what’s missing in this story is the homeowner being proactive and doing something to keep the burglars out in the first place. Often a home alarm monitored at a dollar a day will do the trick. In my case, first my cameras see them coming day and night and that notifies me with an audible alert. Second, once they get close enough the German Shepherd lets me and them know she is ready. Third, the doors and windows are all locked. Fourth they need to get through the home alarm system and if they trip it, the local police are called.

If they do make their way in, the Shepherd knows what to do next. Me? If I’m home I’m taking the family out of there as quickly as possible and heading to safety, then pizza.

Robert Siciliano personal security expert to ADT Home Security Source discussing Home Security on NBC Boston. Disclosures.

Data Breaches Persist In Health Care

In September 2009, the Obama administration’s Health Information Technology for Economic and Clinical Health (HITECH) Act went into effect, requiring hospitals and other health care organization to beef up client data protections. Despite this, a recent study found that health care data is still hemorrhaging from peer to peer networks.

A peer-to-peer, commonly abbreviated to P2P, is any distributed network architecture composed of participants that make a portion of their resources (such as processing power, disk storage or network bandwidth) directly available to other network participants, without the need for central coordination instances (such as servers or stable hosts).

In simple terms, P2P is software installed on your PC and others PCs that allows the sharing of data from each others computers.
Computerworld reports, “One of the more than 3,000 files discovered by the researchers was a spreadsheet containing insurance details, personally identifying information, physician names and diagnosis codes on more than 28,000 individuals. Another document contained similar data on more than 7,000 individuals. Many of the documents contained sensitive patient communications, treatment data, medical diagnoses and psychiatric evaluations. At least five files contained enough information to be classified as a major breach under current health-care breach notification rules.”

In my own research, digging through P2P networks, I’ve uncovered tax returns, student loan applications, credit reports and Social Security numbers. I’ve found family rosters which include usernames, passwords and Social Security numbers for entire families. I’ve found Christmas lists, love letters, private photos, videos, and just about anything else that can be saved as a digital file.

It’s no surprise data is still leaking. File sharing technologies are easier and more user friendly than ever. Faster broadband connections coupled with faster PCs and bigger hard drives make downloading files a snap. Insurance companies, doctor’s offices and hospitals all have computers and those computers are operated by people who like things that are free. Any bored employee who wants to listen to that song he heard on the way to work can simply download Limewire, eDonkey, BearShare, or any other P2P network. Within minutes, that song is on playing on the employee’s iPod, and his employer’s clients’ data is being shared with the world. This type of breech resulted in blueprints for President Obama’s private helicopter being leaked online.

The House Committee on Oversight and Government Reform has asked the Department of Justice and the FTC to help prevent illegal use of peer to peer networks, and in the same letter, asked what the government is doing to protect its citizens. But ultimately, it’s up to you to protect yourself.

Don’t install P2P software on your computer. If you aren’t sure whether a family member or employee may have installed P2P software, check for new, unfamiliar applications. A look at your “All Programs Menu” will show nearly every program on your computer. If you see one you don’t recognize, do an online search to see what it is you’ve found. You should also set administrative privileges to prevent the installation of new software without your knowledge.

If you must use P2P software, be sure that you don’t share your hard drive’s data. When you install and configure the software, don’t let the P2P program select data for you.

The Smartcard Alliance has released an in-depth report called “Medical Identity Theft in Healthcare.”

Robert Siciliano, personal security adviser to Just Ask Gemalto, discusses Medical Identity Theft on CBS Early Show. (Disclosures)

Credit Card Data Breaches Cost Big Bucks

Javelin Strategy & Research estimates that credit and debit card issuers spent $252.7 million in 2009 replacing more than 70 million cards compromised by data breaches.

In 2009, an estimated 39 million debit cards and 33.3 million credit cards were reissued due to data breaches, for a total of 72.2 million. An estimated 20% of those affected by the breaches had more than one card replaced. I had my MasterCard replaced twice.

Javelin’s survey shows that 26%, or one out of four U.S. consumers received a data breach notification last year from a company or agency holding their personal data, including credit and debit card or checking account information.

What is very interesting is of those notified (which is required by law in most states), 11.5% were victims of identity fraud compared with only 2.4% who weren’t notified.

I’ll say this again and then explain what I think this means. They say a consumer who has been notified that his credit or debit card number was compromised is five times more likely to become a victim of identity fraud than a person who doesn’t get such a notice.

The report’s reasoning behind this is that data breaches lead to fraud. Okay, yes, I’ll agree that data breaches do lead to fraud, and my belief is that the people who were notified simply took a closer look at their statements and recognized unauthorized charges. If they weren’t notified they are no less susceptible to fraud, they are just blissfully unaware they are paying for an identity thief’s Las Vegas bender, and the fraud goes undetected.

DigitalTransactions explains, “Data breaches are one obvious pathway to fraud, but a breach alone doesn’t mean an affected consumer will become an identity-fraud victim. Banks often give free credit-report monitoring services to customers whose data may have been compromised.”

The flaw here is that credit monitoring only makes the consumer aware of new account fraud, when a Social Security number is used to open a new account. Credit monitoring has nothing to do with credit card fraud in which an existing account is compromised. Furthermore, in my experience credit monitoring is hardly ever provided when a credit card number has been compromised. Credit monitoring doesn’t help when an existing account is taken over.

“There’s a disconnect,” Javelin tells Digital Transactions News. Consumers “should pay attention to your credit reports after you’re notified, because you’re more vulnerable.”

Yes, it’s true that if you are notified that your Social Security number has been compromised, you are more vulnerable to fraud, but not more vulnerable to fraudulent charges on an existing credit card, since the bank will replace a card that is known to have been compromised. And monitoring a credit report does nothing to prevent credit card takeover fraud.

The only way to combat credit card account takeover fraud is to pay close attention to credit card statements, while credit reports and credit monitoring are essential to prevent or detect new account fraud.

I recommend checking your credit card and bank statements every day, or at least once a week, from a secure PC.

Robert Siciliano, personal security and identity theft expert adviser to Just Ask Gemalto, discusses credit and debit card fraud on MSNBC. (Disclosures)

Phishing Scam: Using the U.S. General Commander in Iraq as Phish Food

Fishing of course is the sport of tossing a tasty wormy baited hook connected to a fishing line and patiently waiting for a fish to take the bait.

Phishing is the sport of tossing a wormy baited tasty lie connected to a wormy human and the degenerate patiently waits for a naïve victim to take the bait.

A phisher can send thousands of phish emails a day and eventually someone will get hooked.

Phishing is a $9 billion business. Unlike the ongoing depleting of the oceans fisheries, there are PLENTY of people out there to phish. Many of them today are from developing nations like India and China who are just getting a broadband connection to the internet and are considered fresh meat to the bad guy.

The New York Times reports “if you get an Internet appeal from Gen. Ray Odierno, the senior American commander in Iraq, asking you to pay lots of money to get your son or daughter out of combat duty, don’t believe it. And certainly don’t send the $200,000. General Odierno acknowledged that he is but one more victim of a social networking scheme offering a big — but fake — benefit, if you send big amounts of real money.

“I’ve had several scam artists on Facebook use my Facebook page and then go out asking people for all kinds of money: ‘If you pay $200,000, your son can get sent home early,’” General Odierno said at a Pentagon news conference.

Criminals may seek out military families and target them one by one or send a blast to thousands at a time and use a ruse that pulls at the heart strings of unsuspecting families who simply want their loved-one back home.

The General posted a large warning on his social networking site. “I have this big thing on my Facebook that says, If anybody asks you for money in my name, don’t believe it,” he said. “But it’s a problem.”

Frankly, I don’t like the idea of an American General having a Facebook page. It weird’s me out. Hopefully the high commander isn’t uploading pictures of himself doing shots of tequila while driving a tank.

My guess is there is someone out there who has the money and is probably acutely unaware of this type of scam, then is probably capable of getting hooked.  But more than likely nobody will cough up $200,000. But the scammers know to start high and they will go low. They will take a $1000.00 when it comes down to it. But they also know that people won’t argue with a General and nobody will “discount” the value of their loved-ones life. So overall it’s a pretty good scam. Just don’t take the bait.

Robert Siciliano personal security expert to ADT Home Security Source discussing Facebook scams on CNN. Disclosures.

Summer Heat: Online Dating Scams

Love online. 20 years ago it wasn’t even a thought. 10 years ago it was weird. 5 years ago it was new and exciting. Today it’s as normal as milk and bread. If you are looking for a mate online you will eventually hit pay dirt. Most of my friends who tried it, succeeded at it.

When anything technology gets to the “normal stage” that’s also when scammers are well dug in. Scammers are usually much more ahead of the curve. When it was weird, they paid attention and the ones that had the foresight scammed, but when it was hot, they were figuring out all the different ways to pull the wool over their victim’s eyes and getting good at it. They ramped up and were beginning to perfect their craft.

Today, it’s a full time job for them. They know all the new scams and get better at revisiting the old ones.

Recently I signed up for a particular social network so nobody else would take my name. I was immediately contacted by a woman who enjoyed my profile on the social network. Problem was I hadn’t really set up my profile. But she liked it nonetheless.

So I responded “Thanks!” Then, she started to write me every day, and would put lots,and,lots of commas,in her sentances. Her spelling socked and HER capiTal leTTers were all,over,the,place. Plus,The spacing,    of her,words was weird,and from experience,dealing with scsammers,overseas I could tell,she didn’t really,like,my,profile. She wasn’t really a she, But a he, probably named Zambabooboo.

After communicating with “her” for 2 days she was talking love and marriage. After 4 days she wanted desperately to see me. On the 7th day she asked me for money for a plane ticket so she could come see me. I declined.

Robert Siciliano is a Personal Security Expert and Adviser to Intelius.com. See him discussing Safe Personal Dating on Tyra.

For more information see Intelius at Sex Offender Check and Date Check to reduce your chances of encountering a bad guy. (Disclosures)

Youngsters Put Art into Crime Fight

We’ve heard it a thousand times, “Children are the future.If we hope to solve the world’s major problems — achieving world peace, healthy lives, economic development, and global sustainability — we must provide richer learning opportunities for the world’s children. An educated and creative population is, without a doubt, the best path to global health, wealth, and peace. MIT.

Children have been learning about crime prevention by taking part in a police poster competition. A neighborhood police team fostered an anti-burglary message that will be on display in their community.

Their Sergeant stated: “We launched this competition at the school last month as a way of increasing awareness of the simple measures people can take to protect their home from burglary. We were delighted with the standard of entries and hope that the children will be able to pass on to their parents all the tips they have learnt and used in the posters.”

Brilliant! Children teaching parents. Children often display a very intuitive common sense to issues that parents sometimes complicate. They see things as they are opposed to whatever blinders or filters parents see through due to life experience, or life’s baggage.

“The winning posters will be used in the local community so you will soon see them in places like the library and shops.”

Traveling though Logan Airport in Boston I was drawn to a similar campaign that involved drug and violence prevention education. Children expressed what they viewed in their local communities as penciled and water colored art.

Consider this kind of strategy to bring attention to personal security in your community.

Keep in mind too, children may not always have the answers. Today, a 4 year old I know and love when asked if she wanted a banana for breakfast responded “Its foggy today, I don’t like bananas on foggy days.” Or maybe she knows something I don’t.

Robert Siciliano personal security expert to ADT Home Security Source discussing Home Security on NBC Boston. Disclosures.

Online Dating Liar Liar is 5’4, not 5’10

But who cares? Apparently the dude with the 6 inch height difference did. And he figured the lady he was about to meet via chatting in an online dating service cared as well. Maybe she did, maybe she didn’t. Either way he started out in the relationship lying.

Many single people have been turning to the Internet for dating services. You can meet someone with the same interests, hobbies, and lifestyle. Dating services allow you to browse profile pages to shop for a potential mate while chatting it up with potential dates. In the process you are selling yourself as they are deciding whether to buy. And like a car on a “preowned” lot that was recovered from the waters of hurricane Katrina, the truth is often suppressed. .

But what happens when you decide to meet someone and you begin to discover little white lies? Realize that little white lies are often a front for big darker lies.

What else is this person hiding?   Are they married, have kids? Gone bankrupt, been arrested for violence? Or are they a registered sex offender? Are they unemployed when they said they have a job?

Sometimes the truth hurts and people innocently choose to adopt the “what they don’t know won’t hurt them” philosophy and simply don’t cough up the truth. Nothing good can come of this. This is why it is essential that you do your homework and find out as much about this person as possible to head off any potential heartaches.

Much of what you need to know about your new encounter can be found by doing a quick and easy background check. But don’t stop there. Google them, check out their Facebook page and dig as deep as you need to verify as much as possible to determine if their nose is growing.

Robert Siciliano is a Personal Security Expert and Adviser to Intelius.com. See him discussing Dating Security on E! True Hollywood Stories.

For more information see Intelius at Sex Offender Check and Date Check to reduce your chances of encountering a bad guy. (Disclosures)