Prolific Burglar Shares Tips from Prison

Who better to tell you how to protect your home than a career criminal that began breaking into homes at the tender age of 14. Up until he was finally jailed,  he fed a heroin addiction for almost 30 years by breaking into over 200 homes. That’s an average of breaking into one home every 2 months for 30 years!

How he chose homes:

He randomly chose single level homes that had open shades where he could see inside if anyone was home. He cased the homes over a few days.

Often he would choose a home near the parking lot of a business, church or other establishment where he could park his car unnoticed.

A big attraction was if he saw any degree of mail or newspapers accumulating. One to 2 days worth of mail would prompt him to case the home further. If the home didn’t have that “lived in look” he would knock on the front door, ring the bell, tap on windows and if nobody answered he would jiggle the doorknob.

He also looked at a home’s lighting. If an exterior light was on at 2pm during daylight and still on at 4am, then it was likely the person was away from the home and left the light on to give the false impression they were home at night, not thinking a burglar would notice the light during the day.

What homes he avoided:

Any home with a “Beware of Dog” sign or any pictures of dogs wasn’t worth the risk. If the home had the appearance of a home security system, home security cameras, signage, stickers or a visible alarm keypad, he avoided the home saying again, it’s not worth the risk.

I think it’s pretty clear what you should do and what you shouldn’t do to attract the attention and deter a burglar.

Robert Siciliano personal security expert to Home Security Source discussing burglar proofing your home on Fox Boston.

Holiday Shopping: Beware of Unethical Online Merchants

We have all encountered a sales clerk who was rude, a customer service representative who was incompetent and an online purchase that went south. Even I’ve been scammed out of an entire order and spent dozens of hours trying to get a return on another.

But when it comes to outrageous and shocking, including threats of violence and outright fraud, this story takes the cake.  An online merchant based in Brooklyn New York retailing designer sunglasses, some counterfeit and some real, thrives on bad customer service, over charging, making threats, stalking and abusing clients into giving up the fight over what’s right.

The merchant prides himself on getting negative feedback on consumer advocacy and review sites such as Get Satisfaction, ComplaintsBoard.comConsumerAffairs.com, RipoffReport.com, Yelp and Epinions.

He thrives on – for example “DO NOT ORDER ANYTHING FROM THIS COMPANY. This has been the most horrific experience EVER. I have extensive knowledge of website management and customer service, and they pretty much break every rule imagined. They are a total scam

The strategy of negativity gets this merchants website ranked high on search when listed with all the different opinion sites. Google and other search engines often rank a website to show on the first page of search based on how many links point to it from other prominent sites. So even though all the negative links are pointing to the unethical site from opinion sites, it still ranks on the first page of search helping its sales.

Beware of making purchases on any website based on how they rank in search. Even a first page organic hit can lead to a scammy company.

Learn from others bad experiences. ALWAYS search “Name Of Company” in Google before you make a purchase. The review sites almost always show on the first page of search when “Name Of Company” has been blacklisted.

More on THIS STORY.

Robert Siciliano personal security expert to Home Security Source discussing scammers and thieves on The Big Idea with Donnie Deutsch.

Protecting Yourself and Family During The Holidays

Criminals share the same calendar as you and I. Their lives are no different than ours. They anticipate the holidays and feel the same pressures to provide.  But they “shop” in a different way than we do. I’m already seeing news reports of “Woman attacked while shopping” and “Teens jump man leaving jewelry store”

The only thing that separates us from them is the boundaries they have established. While you and I are civilized humans who feel sympathy, empathy and understand personal boundaries, the bad guys don’t.

It is an unfortunate fact that we must cope with this sub-species that views you and I as their natural prey. They look upon us as cattle to be herded and meat to be slaughtered. They think nothing of taking from us and committing violence to get what they want.

Having this knowledge and understanding what you are up against should empower you. By achieving this kind of awareness, you can anticipate and proactively prepare and prevent crime.

The following considerations need to be made as the holidays advance:

Every tip here revolves around “situational awareness”. The more aware you are of every situation, the safer and more secure you will be. Predators seek people who are unaware. By knowing what’s happening around the perimeter of your body you reduce the chances of being chosen by an attacker.

ATM: As you are getting cash look around you, cover the keypad with your other hand as you enter your PIN. If someone makes an attempt to accost you, toss the money and run.

Parking lots: Don’t park near windowless vans. Before you get out of the vehicle scan the area. Once you are on your way continually scan the area around you. If anyone suspicious or aggressive approaches scream and run.

Wallet/purse: Carry “chump change” which is enough dollars to toss in one direction while you run in the other. If they want your purse give it to them. Don’t fight over material items.

Self Defense: If your physical security is in jeopardy offering resistance has been proven more often to get you out of a dangerous situation. Run, fight, kick, scream, and do whatever a 2 pound cat would do to get away.

Leaving the Mall: It’s never good to be loaded down with bags. Get a carriage if possible. If you are shopping late at night get a security guard to walk you out or buddy up with someone leaving the mall.

Back to your car: Scan the area around your car. Look inside the car before getting in. Scan the area around the vehicle while putting your stuff in the trunk. Once inside lock your doors.

Robert Siciliano personal security expert to Home Security Source discussing self defense on Fox Boston.

City or Suburbs, Which is Safer?

At one time everyone lived in the city, that’s all there was. Then suburban growth began and those who had money left the city for the suburbs. City inhabitants left back were often poor and where there is poor there seems to be crime.

There are many obvious differences between suburbia and city life including noise, congestion and crime. City kids are usually a little more street wise and suburban kids less so.

My parents grew up in the city and their parent’s grew up in the city. When I was young we lived in the city.

We moved to the “Leave It to Beaver” suburbs when I attended the first grade and I went through high-school a suburbanite. And because my parents were so young, (they were both 19 when I was born) I pretty much spent every weekend with my grandparents in the city. Growing up I kind of lived a “double life”. I had the idyllic upbringing of suburban life with the street savvy exposure of the city.

Over the years I’ve noticed lots of change in suburbia. Big change has occurred partly because of the Internet. With instant information and social media, the lines between city and suburb have been significantly blurred.

But what has obliterated those lines is crime. Crime now happens in suburbia just like it happens in the city. Statistically crime in the city is still higher than in suburbia, but the types of crimes, frequency and the violent nature of crimes are sometimes as bad in the suburbs as they are in the city.

Violence, burglaries, car theft, robberies and murder happen everywhere. And home invasions and the brutality that come with them are happening a lot in the suburbs.

In a Connecticut suburb Dr. William A. Petit Jr. was almost beaten to death while his wife and daughters, ages 17 and 11, were killed and the house was set on fire.

In a suburb in New Hampshire during a home invasion a mother is hacked to death with a machete and her daughter barley survives a similar attack.

What this all means is if you are an old school thinker and have grown up thinking “It can’t happen to me. Not here, we live in the burbs, that stuff happens in the city””…then you need to pay attention. If you live in the suburbs and neglect home security, not locking doors or thinking you don’t need a home security system is naïve.

Living in the suburbs no longer means you are insulated from crime. “Leave It To Beaver” is off the air.

Robert Siciliano personal security expert to Home Security Source discussing Home Invasions on Montel Williams.

5 Tips to a Secure Cyber Monday

For the past five years, Cyber Monday has been the marketing term for the Monday immediately following Black Friday. It is now one of the biggest online shopping days of the year, with 77% of online retailers reporting substantially increased sales.

Scammers seek to take advantage of seasonal opportunities like Cyber Monday, so beware of the following scams:

Fake websites: Criminals draw visitors to their deceptive websites using the same techniques as legitimate eTailers: search engine optimization, search engine marketing, and online advertising via AdWords. They use keywords to boost their rankings on Internet searches, causing their scam sites to appear alongside legitimate sites in search results. These same processes are also used to infect unsuspecting users with malware. Run a SiteAdvisor program to give you a sense of a website’s legitimacy.

Phishing: Many victims who find themselves on scam sites get there by clicking links in phishing emails, which offer high-end products for low prices. In this case, it should be easy enough to avoid spoofed websites. Anytime you receive an offer via email, you should automatically be suspicious. The same goes for offers received through Twitter or other social media.

Too good to be true: If you aren’t familiar with the eTailer, don’t even bother clicking the links. Do business with those you know like and trust. I do occasionally patronize whichever eTailer offers the lowest price, but only when purchasing a relatively inexpensive item, generally under $50. It’s safer to make larger purchases from eTailers that also have brick and mortar locations.

Typosquatters: Be sure you’ve typed in the correct address and are at the eTailer’s actual domain. Beware of cybersquatting and typosquatting, which rely on imitation websites that resemble your desired destination, but are in fact copies, using domains that are similar to the legitimate web address.

Unsecured sites: When placing an order, always check the address bar for “https,” which indicates a secure page. Your browser may also display a closed padlock, further confirming that the page is secure. Generally, scammers won’t take the time to set up secure sites.

Common sense can help you avoid becoming a victim of these and other scams. Beyond that, consider subscribing to McAfee Identity Protection, which offers proactive identity surveillance, lost wallet protection, and alerts when suspicious activity is detected on your accounts. For additional tips, please visit www.counteridentitytheft.com.

Robert Siciliano is a McAfee consultant and identity theft expert. See him discuss Cyber Monday on The Morning Show with Mike and Juliet. (Disclosures)

Supercookies: What Websites Know About You

Most major websites now install cookies on your computer, which track what you do online. Over time, these cookies develop a profile, which becomes your digital fingerprint, to a certain extent. You may have noticed after searching for a specific product, advertisements for that particular product or brand appearing on various other websites you visit.

The New York Times reports , “advertisers are increasingly using powerful software known as supercookies, such as so-called Flash and document object management (or DOM) cookies, which can hold more information, and Web bugs or beacons, which let sites record statistics like what ads attracted you to the site and whether you bought something. They are not removed when you clear out your cookies.”

The “harm” done here is less damaging than it is invasive. Meaning I don’t see any physical harm or identity theft ever happening as a result of this refined marketing. More so, it is very intrusive to some peoples web surfing habits and the collecting of this type of information will continually define what we are presented when we travel to different websites.

With numerous privacy watchdogs taking this kind of advertising offensively, and the Obama administration now stepping in, we will surely see standards in this kind of marketing practice appear over the next few years.

The NYT post HERE provides a litany of resources to combat supercookies. Another great resource from Linda Criddle HERE

Robert Siciliano personal security expert to Home Security Source discussing advertisers using “Internet spying” on Fox News.

Catching Criminals With a DNA “Spray”

Security is all about layers of protection. The more layers that are put in place the more secure you and your family will be. For example, if you lock your doors that is one layer, but not enough. A home security system which includes an alarm, security cameras and even signage are all additional layers of protection.

An axiom of the security professional is to “predict and prevent”. This means by having the foresight to visualize the possibilities of crime happening, how and why, will help that professional to prevent such a crime by putting the security layers in place.

Much of the security philosophy described here is meant to be proactive and deter or prevent a criminal from being successful. With that in mind, with the exception of high quality security cameras, security doesn’t often lend itself to catching the bad-guy after they have been successful in committing a crime.

Generally we leave the task of apprehending “evil doers” up to law enforcement officials who have a litany of procedures, processes, and tools meant to determine “who dunnit”.

A new security system using cutting edge liquid technology could significantly reduce theft from businesses traditionally seen by criminals as easy targets is “DNA Guardian” right now available in Australia through  ADT Security, is an all-in-one high tech crime fighting tool which establishes a forensic link between suspects and specific crime scenes. Similar systems used overseas have reduced theft by 84% and achieved a 100% conviction rate in court.* According to DNA Guardian, their system is involved in eliminating armed robberies in businesses which were repeatedly targeted.

Sign me up. I want this!!

In the meantime:

Be proactive with the help of ADT Pulse, a new interactive smart home solution that goes beyond traditional home security to provide a new level of control, accessibility and connection with the home.

• Arm and disarm your home security system.

• Get notified of alarms and selected events via email and text messages as well as video clips.

• View your home through cameras and watch secure real-time video or stored video clips of events from monitored areas of the home.

• Access lights and appliances or set schedules to automate them.

Robert Siciliano personal security expert to Home Security Source discussing  Home Security and Identity Theft on TBS Movie and a Makeover.

Using Social Media Passwords With Critical Accounts

For some social networking sites, security is not a top priority. Some do not protect your data with the same vigilance you could expect from your bank, for example. Nor do social media require strong passwords. And if you use the same passwords for more critical sites, like webmail or online banking, having your social networking account compromised can make those other accounts vulnerable as well.

Last year, 32 million passwords were posted online after a data breach at RockYou, a company that creates applications for social networking sites. The breach revealed the weakness of most people’s social networking passwords.

InformationWeek reports, that all the major sites have the same minimum password length of six characters. And password complexity checks are few and far between.

Of the 32 million people whose passwords were exposed, almost 1% had chosen “123456.” The next most popular password was “12345.” “Princess,” “qwerty,” and “abc123” were other common choices.

In another instance, phishers posted thousands of Hotmail addresses and the associated passwords in an online forum. These passwords were equally obvious. Those used most frequently included “111111,” “123456,” “1234567,” “12345678,” and “123456789.” Many of the phishing victims used people’s first names as passwords, most likely the names of their kids, spouses, and so on. 60% of the exposed passwords contained either all numbers or all lowercase letters.

Naturally, anyone using an insecure password is far more likely to be hacked. It is crucial to have strong, secure passwords for all online accounts, including social media accounts. And it is equally important to use different passwords for different accounts. Using the same password for social media sites as for critical accounts, like webmail and online banking, is an invitation for identity theft.

To protect your identity, observe basic security precautions. Consumers should also consider an identity theft protection product that offers daily credit monitoring, proactive identity surveillance, lost wallet protection, and alerts when suspicious account activity is detected. McAfee Identity Protection includes all these features, plus live help from fraud resolution agents if your identity is ever compromised. For more tips on protecting yourself, please visit www.counteridentitytheft.com.

Robert Siciliano is a McAfee consultant and identity theft expert. See him

discuss hacked email passwords on Fox News. (Disclosures)

Americans Waking Up to Social Media Privacy

There have been thousands of privacy related news reports over the past year depicting social networks, Google, marketers and advertisers as evil privacy violators who are slowly sucking dry whatever privacy we have left. Facebook has been raked over the coals by advocates and watchdogs who say their tactics violate their own policies. In response, numerous lawsuits have been filed and government agencies have put the pressure on everyone involved to come up with a serious solution.

It is evident that without some type of government oversight that the “self policing” done by all those who stand to gain financially by selling our data will continue to spin out of control to the point where privacy will be something of the past.

My stance as a security professional has always been on the “privacy is dead, get over it” side of the fence. I’ve always been of the belief that the data out there is as a result of the public’s own doing and if they don’t want the world to know their private thoughts they shouldn’t post it.  As they say, “the cat is out of the bag”.

However, my concern is not that the self exposed private data is out for the world to see is a violation of a person’s privacy, but what can be done with the data to affect ones security position.

Now as a result of all this attention to privacy, in a recent study published in the Wall Street Journal, about 36% of American adults said they were “very concerned” about their privacy on social-networking sites in 2010, compared with 30% who felt that way last year. The shift was particularly noticeable among people over age 44; 50% of people age 54 to 64 described themselves as “very concerned,” compared with 32% who said that in 2009.

In response, the WSJ further reports The Obama administration is preparing a stepped-up approach to policing Internet privacy that calls for new laws and the creation of a new position to oversee the effort, according to people familiar with the situation.

This is definitely a good thing as the US significantly lags behind Canada and Europe among others in regards to privacy.

Certainly I care about privacy and wish there was more. But the fact remains that the fundamental issue that affects ones well being is security. Too much information leaked may damage ones social standing in some ways and if you don’t want it out there then don’t put it out there. And considering marketers and advertisers have taken it up a notch, they definitely need to be watched by the watchdogs. But in the end, what’s most important is how that data can be used to hurt or harm you.

Home Security Source

Robert Siciliano personal security expert to Home Security Source discussing Facebook Apps leaking data on Fox News.

How to Prevent a “Wikileak” of Your Data

“Wikileak” is turning into a verb.  This is when sensitive information in office document files such as Microsoft Word, Excel, Textpad, or PDF files can be easily copied, transferred, sold and leaked, all without the owning organization’s knowledge.

It is easier than ever for sensitive information stored in electronic documents to be copied and publicly released without the owner’s knowledge or consent, thanks to WikiLeaks, an international activist organization that publishes documents that have either leaked or been provided by anonymous sources.

Politics aside, releasing confidential intelligence to enemy combatants puts lives at risk. Geoff Morrell, press secretary for the Pentagon, has condemned “the unauthorized disclosure of classified information,” which he says “could make our troops even more vulnerable to attack in the future.”

Document breaches of any nature have consequences. Data breaches, espionage, and the misuse of confidential or sensitive data are a multi-billion dollar problem. Corporations, government agencies, and healthcare organizations are bleeding data on a daily basis, at the hands of criminal hackers from the outside and malicious employees on the inside.

According to the Ponemon Institute’s annual study, a data breach cost an average of $6.75 million in 2009, up from $6.65 million in 2008, or $204 per compromised customer record.

Current information security techniques include “security in transit,” which means that data is exchanged in a secure channel between networked devices, and “security at rest,” which means the file is encrypted where it is stored. Data is safest when both techniques are incorporated. But neither type of data protection can prevent a trusted caretaker from going rogue, as occurred when soldiers released documents to WikiLeaks.

This problem can be solved with comprehensive technology that protects information both in transit and at rest, ensuring that no unauthorized access, disclosure, or modification can occur. Ideally, documents should also safely expire when no longer needed.

Zafesoft offers a data security solution by securing sensitive files wherever they are located or copied, while maintaining a transparent, nonrestrictive user interface. This technology provides full control of your data, whether it’s stored on your hard drive, copied to a server, or transmitted via USB, CD, or sent in an email. This can prevent you from being the victim of a Wikileak. Here is how it works.