How to be a Grandma Identity Thief Murderer

Lois Riess is a woman from Minnesota who police say shot her husband, went on the run, and then killed a woman in order to take on her identity.  Here are some shocking facts about her:

Riess Looked Like her Victim 

The woman Lois Riess killed, Pamela Hutchinson, looked like her. This is why Pamela lost her life. When the body was found, police said her ID, credit cards, cash, and car was gone. Police put out an arrest warrant for Riess, and then started hunting for her. Police say the women did not know each other.

Lois Riess Allegedly Killed Her Husband, Too

Pamela Hutchinson wasn’t the only one who has allegedly died at Riess’ hand. Lois’ husband, David Riess, is also dead. He was found in the couple’s Minnesota home with several gunshot wounds after two weeks of not showing up at work. David’s car was missing, as was $11,000 out of his business account. It is believed that Lois used the same gun to kill both of her victims. Though Lois originally took the couple’s Cadillac, it was found abandoned in Florida several days later.

Pamela Hutchinson and David Riess

Though she was killed in Fort Myers, Pamela Hutchinson didn’t live there; she lived in Bradenton, FL. She was in Fort Myers to spread the ashes of her husband who had recently passed away.

David, Lois’ husband, owned a commercial worm farm. He was a Navy veteran and loved boating, fishing, hunting, and spending time with his grandkids.

Lois Riess was a Gambler, and She Had an Interesting Nickname

According to reports, Lois Riess was a gambler, and had an addiction to gambling that eventually destroyed her family. It is said that she stole more than $100,000 from her sister, and had the nickname, “Losing Streak Lois.”

Lois Took a Road Trip After the Killings

After killing Pamela, detective believe that Lois left Florida and traveled through Alabama, Mississippi, Louisiana, and Texas. She was driving Pamela’s car, which she took after shooting the woman.

Before Lois was even captured, she was charged with the murder of both her husband, David, and Hutchinson. She is facing a first degree murder charge in Florida along with grand theft auto, grand theft, and criminal use of personal identification. She faces the death penalty if found guilty. As for the alleged murder of her husband, David, in Minnesota, murder charges are pending, so it’s likely that she will face two counts of first degree murder when all is said and done in this case.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Woman Voluntarily Sits in Truck of Man Who Creeped Her Out

Who does this?

Morna Brennen did this when she was 22. She and a few friends went to a bar and stayed there late.

At some point while they were there, a man took an interest in Morna. But she was creeped out by him and pretty much ignored him.

Later when it was time to leave, Morna and one of her friends went out into the biting cold and dark parking lot.

Her friend was going to drive her home. Suddenly, someone from near the bar called out the friend’s name.

The friend told Morna to wait for her, that she’d be right back.

So Morna waited alone in the very cold air.

Then someone appeared before her from the parking lot – the creepy man who had approached her earlier inside the bar.

She told him she was waiting for her ride to rejoin her outside and take her home.

The man suggested that she wait inside his warm truck rather than shiver outside in the cold.

What Morna did: Went inside the man’s truck by her own free will.

What Morna should have done: Gone back inside the bar.

What could have possibly compelled her to sit inside the vehicle of a man who, just a short while earlier, had given her the creeps?

Nobody will ever know, but one theory is that she thought it would have been rude to decline a kind gesture. Women, as children, more so than men, are trained to “always be nice.” Perhaps Morna’s judgement was clouded by being trained since childhood to never appear rude.

Another theory is that despite the way this story is told on Investigation Discovery, Morna was actually forced into the truck.

One might also suppose that had Morna declined the man’s offer and headed back towards the bar, he would have ambushed her from behind and dragged her to the vehicle, forcing her in.

Or perhaps he would have killed her right in the parking lot, then sped off.

So what ultimately could have saved Morna’s life?

When her friend decided to go back into the bar, Morna could have followed as well, if for no other reason than to avoid standing outside in the frosty air.

Nobody knows how much time passed between the time her friend left her and the man approached her.

But if you’re ever standing alone in a dark parking lot in the wee hours of the morning for longer than a few minutes while waiting for your ride to come out of a building, it’s time to go back inside the building.

The man, Rickie Kiger, drove off with Morna in the passenger seat, and soon after butchered her, dismembering her body. This occurred in the mid 1980’s, long before smartphones with emergency apps were invented.

Though it’s possible that Rickie approached her only 20 seconds after her friend left her, it’s easy to believe that had Morna sprinted back into the bar the second she saw him, she would have gotten inside before he had a chance to grab her.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Should You Use Facebook to Login to Websites?

Have you ever used Facebook to sign onto another site? Many of us do this pretty blindly simply because it is very convenient. But, this convenience could come at a cost.

You know the drill. You go to a website and it says “Log In With Facebook.” or Google. Usually, it just takes a couple of clicks and no logging in with other usernames or passwords. However, when you do this, Facebook essentially becomes your online identity. This means that anyone who knows these credentials have access to your preferences, posts, and most importantly, your personal information. What’s more is that you might be unknowingly giving permission to a third party to access your profile, view your online activities, and get information about your friends.

What Can You Do About It?

There are some things that you can do to keep yourself safe. First, of course, you should have a different username and password for all accounts. Make sure your passwords are strong and consider using a password manager. This helps to create strong passwords and keeps them safe for you.

If you play games, do quizzes, or other things on a social media platform, make sure that only necessary apps are connected. Stop connecting other apps.

You should also take some time to look at the settings you have set up for your social media accounts. Adjust them to make sure you are protected. Finally, make sure that you are logging out of your social media account when you are done with it. If you log into your social media account on your tablet or mobile phone, make sure that the lock screen is on before putting it away. Also, of course, make sure that you have a strong passcode on your device.

Control Your Data

Now is the time to take control of your data. When you choose to use a social media site to link with third-party services, apps, and sites, the social sites say that it will enhance your experience for the better. It also can make your online time more productive. At the same time, however, it can open you up to exposure, and even be an open door for hackers. It is important to understand what type of permission you are giving these apps when you click “Log in with Facebook.” Finally, if you are a parent, you should make sure that you understand what your kids are doing on social media, and take a look at what type of permission your kids have given to third-parties.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Does Your Mobile Have Spyware on It?

You have a mobile phone, you might think it’s pretty safe, but what you might not realize is that these devices can have spyware on them. Keep in mind, many of the “signs” listed below are everyday normal phone behaviors. But combined, might mean spyware. Here are some of the signs:

Unusual Background Noise

While common, humming, static, or other weird noises could be a sign that someone is tapping your line. Though all phones might have strange noises from time to time, you should check if there are other signs if you notice them. This is especially the case if you hear them when your phone is not in use.

Short Battery Life

Also common, another sign of a hacked phone is a short battery life. If you notice that your battery is suddenly losing power, it’s possible that there is malicious software running in the background. But don’t panic….yet.

Try Shutting it Down

If something seems weird with your mobile phone, try shutting it down. Watch how it reacts when you shut it down. Phones that have been hacked often won’t shut down correctly or never shut down, even though you tell it to. Still, a common issues with mobiles.

Look for Suspicious Activity

If you notice something suspicious, like your phone turning on or off by itself or apps getting installed or deleted, someone might have hacked it. Other suspicious signs that someone has hacked your phone include strange text messages that contain random letters or numbers. You might see pop-up ads or other issues, too.

Check for any Electronic Interferences

Though it might not be uncommon to get interference from other electronics, such as a computer, another phone, or even a television, it shouldn’t happen if you are not on a call. If it does, it could be a sign of something malicious, for instance, someone listening in on your phone calls.

Look at Your Phone Bill

If your phone bill shows more text or data usage than you typically use, it might be a sign that your mobile phone is hacked. Things like spyware can cause your data to rise, and this could definitely cause your bill to rise. However, keep in mind, if you just downloaded a new app, this could be the cause of your data usage. Also, make sure that no one in your home is using the data, such as your kids, who are notorious for this.

Use Caution when Downloading New Apps

Finally, when you download a new app, make sure they are safe. Most apps from the App Store or Google Play are safe, but occasionally, a malicious app will sneak in. If an app asks for access to your contact list, call history, or address book, use caution.

If you ever suspect spyware, back up your apps and reset the device back to factory then reinstall everything. Keep in mind, unless an iPhone is “jailbroken” spyware is unlikely. But with Androids, spyware is serious. Install antivirus on Androids.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Don’t Let a Pedophile Larry Nassar Happen to Your Kid

A very recent blog I published titled “15 Year Old’s Naked Photos Spread Like Wild Fire” is now of on the most clicked blogs on my site. It has significantly increased my websites traffic. But, scarily, for all the wrong reasons. The “15 year old naked pictures” part of the title is attracting skeevy pedophiles to my blog. Hi there pedophiles! Go jump off a bridge, your sucking up too much air!

You know Larry Nassar; the sick creep who worked as the doctor for USA Gymnastics. With up to or more than 156 victims, he was convicted of 10 counts of first-degree criminal sexual conduct, and he was ultimately sentenced to 40 to 150 years in prison. 150 years isn’t enough. I hope prison is as horrible as him.

One study says as many as 1 in 35 men could be pedophiles. Some studies suggest that the prevalence of pedophilia may be between 3% and 5% in the general population. That’s the WORLDS population. What this means is pedophilia, while horrible and not right, is “normal” in the sense that it’s an inherent human behavior that people are born with. It always has been, is, and always will be a human trait.

Nassar began working with gymnasts more than 40 years ago when he was an athletic trainer as a student. He graduation from the University of Michigan with a kinesiology degree, and in 1986, he joined USA Gymnastics. He went on and received a degree in osteopathic medicine from Michigan State, and by 1997, he was the team physician for USA Gymnastics and became an assistant professor. He kept both jobs until his evil crimes were revealed.

How can you keep your kids safe from the Larry Nassar’s of the world? Here’s some tips:

Believe them When They Try to Tell You About Abuse

Many parents were told that Nassar was being abusive to their children, but they didn’t believe them at first. Some people still don’t believe that Nassar is guilty, too. People like Nassar are often charming and manipulative and are great at making people believe they are innocent.

Anyone Can Abuse

To most people, Nassar was always caring and kind, and this is what he showed the community and the parents of his victims. Don’t believe it.

Abusers Do Their Best to Win the Trust of Their Victims

Nassar did all that he could to make his victims and their parents trust him. He saw them socially, and even went to their homes.

Reach Out to Police Immediately

If something does happen to your child, reach out to your local police department as soon as you find out. Don’t let this continue happening. The police, unfortunately, don’t always take children seriously, so make sure that you don’t let them push your accusations aside.

Reach Out to Journalists

Consider reaching out to journalists about the case. The first reports of any abuse done by Nassar was actually posted in the Indianapolis Star in 2016. Not only does this help other abused kids from speaking up, it also helps to have the skills of an investigative journalist on your side. If the media hadn’t heard whispers of Nassar’s crimes, he might still be out there abusing kids.

Teach Your Kids to Speak Up

Most kids are taught that they need to treat adults with respect and not to question them. However, when an adult does something bad, it’s important that you also teach your kids to speak up and tell you when something seems weird.

Good and Bad Touches

Finally, but most importantly, teach your kids good and bad touches. I know most parents don’t even begin to know how to start this conversation. But the fact is, there are people in all our lives who seek opportunities with kids. Have uncomfortable conversations that tread lightly on the topic and gradually increase the frequency of this dialog so you know your kids understand. A quick search on Youtube for “Good and Bad Touches will provide you with excellent examples you can use to inform both you and your kids. The nonprofit Barbara Sinatra Children’s Center Foundation in conjunction with Wonder Media has developed a national campaign on a child abuse awareness and prevention. Check them out.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Do Not take that Stupid Facebook Quiz

Where should you live in the world? What Game of Thrones family are you in? What is the food that best describes your personality? All of these answers are given and found by doing quizzes on Facebook. You have surely seen them if you use Facebook, and have may have taken these quizzes, but you definitely might want to consider stopping. If you have ever used one of these quizzes, you have probably given these third-party apps permission to access some of your personal data. Not only does this affect you, it might also affect the people on your friends list. How does it affect you? These answers can sometimes crack password reset questions,

Here are some tips that you can use to protect yourself:

Use Two-Factor Authentication – Almost all social media sites offer two-factor authentication. This allows you to further lockdown your accounts, as you won’t be able to sign in with only a password. Instead, you need a password and a code, which is often sent to you via text message. So, no one can log into your account even if they have your password, unless they also have access to your phone and texts.

Stop Taking Quizzes – The best thing you can do to protect yourself is to stop taking those quizzes. Though they look innocent enough, every click gives the company information on you. It’s true that not all companies collect your personal info, but you really have to do some digging in the terms of service to see if they do or not.

Check Your Privacy Settings – When is the last time you reviewed your privacy settings on Facebook? If you are like most of us, it’s probably been awhile. So, take some time to log in and do this. If you need a tip, choose to only share with yourself by clicking “Only Me” on all of the settings. That’s the safest, but after all, this is SOCIAL media, so you might want to pick and choose.

Look at What You Share – You should also look in your app security to find out what you are sharing with third-parties. You might be surprised at what you see.

Delete Old Accounts – Finally, make sure that you take a look at, and delete, any old social media accounts. If you don’t want to delete it, at a minimum, change your password. Also, Google yourself and see what accounts come up. If you can find it, you can bet that a hacker can.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Industry Leader & Best-Selling Author Releasing Highly Anticipated Book for Cybersecurity Awareness Month 2018

Press Release | New Book | Identity Theft Privacy By Robert Siciliano, CSP

Basil Ghafoor
Tempe, AZ
Basil@trossconsulting.com
www.Safr.me

Tempe, Arizona, 10/10/2018 – In 2018, Under Armour disclosed that 150 million of their customer records had been stolen. Equifax filed a similar claim for 143 million customer records breached in 2017. Uber, the popular ride-sharing app, admitted to 20 million customer records being compromised in 2016.

If multi-billion dollar corporations are susceptible to data theft, what is stopping a criminal from targeting you? Your business? Your kids?

Identity Theft Privacy: Security Protection and Fraud Prevention will be released this October. This is the latest of five books written by personal security expert Robert Siciliano, CSP. Robert is certified in professional speaking, identity theft risk management, and public investigation. He is also the author of the Amazon #1 Best Seller, 99 Things You Wish You Knew Before…Your Identity Was Stolen.

“Practical advice, and to the point with no fluff, just great information and advice. Really enjoyed the book and recommend it! ”

“Saw him on Anderson Cooper, and I knew I had to buy this book. Gives you sound advise on how to avoid ID problems and how to protect your kid’s ID”

“It is a fast and easy book to read and worth buying to protect yourself and family!”

– Amazon Customers

Robert believes that, when it comes to preventing cybercrime victimization, awareness and knowledge are king. Robert’s new book provides readers with content explaining how to protect your personal and professional privacy. Privacy protection applies to anyone who uses social media, telecommunication apps (e.g. Skype, Facetime, and Snapchat), online banking, and email among other technologies.

Even if you do not use technology, someone you care about does such as clients, family, or friends. Robert’s goal is to ensure that everyone has the proper tools to prevent cybercrime.

As you progress through different stages in life, there will be times when you are exposed to fraud and theft. How do you protect your identity today? How are people trying to steal your identity as you read this?

These two important questions are the tip of the iceberg when it comes to securing your personal identity.  Whether you are concerned about your individual identity, your small business, or a large corporation, this book provides ways to protect yourself online and out in the tangible world.

Identity Theft Privacy: Security Protection and Fraud Prevention does not promote anti-virus software or products based on scare tactics. Robert is not selling insurance; his philosophy is based on prevention.

Robert has helped over 50,000 readers by increasing their level of personal security through strategies you can apply immediately from home. Now, you can find everything you need to know about your identity privacy in one complete book! Get your copy today!

Identity Theft Privacy can be purchased here.

For a limited time only, Robert is offering 25% off all Safr.me educational courses.

A coupon code will be provided through email with the book purchase receipt.

Robert Siciliano is the CEO of Safr.me—an online resource created to help individuals who couldn’t see him speak. Safr.me’s mission is to help others by educating them on the reality of cybercrime as well as the most effective human-based practices to secure oneself in the digital and physical world. Safr.me empowers, supporting users to take charge of their own personal information and data before something bad happens.

[/av_textblock]

DNA Tech is Catching Bad Guys and its Great and Scary

In 1996, a 12-year-old Washington state girl was raped and murdered. However, it wasn’t until June 2018, that an arrest was made in the case. How did this happen? DNA technology.

The man arrested is Gary Hartman, and he is accused of killing and raping 12-year old Michella Welch. Donald Ramsdell, the Tacoma Police Chief, has said that computer modeling, police techniques, and advances in DNA identification has led his team to arresting Hartman on June 20th.

This case goes all the way back to March 26th, 1986. Welch and her sisters were in Tacoma’s Puget Park. She left her sisters there and went home to make lunch. About three hours later, Michella’s sisters noticed that her bike and lunch were at the park, but she was nowhere to be found. Just before 11pm that night, the body of Michella was found. DNA was recovered, but police were unable to solve the case…until now.

Before the arrest of Gary Hartman was made, police tried a number of methods to solve this case. For instance, in 2006, they were able to create a DNA profile of the person whose DNA was found at the crime scene. However, they were unable to match that DNA with what was in their database. It wasn’t until 12 years after that, in 2018, that detectives from the Tacoma Police department was able to work with genetic genealogists and track the DNA to family members of the, at the time, unknown suspect. The researchers then used that information, along with public records, to create a family tree. There were two members of the family, brothers, who lived in Tacoma in 1986. Both immediately became possible suspects.

On June 4, detectives began monitoring Gary Hartman. Nothing of note happened that day, but the next day, June 5, Hartman went to breakfast with a co-worker. Detectives took the napkin that Hartman used at the restaurant and sent it in for DNA testing. The DNA that was on the napkin was the same DNA found at the rape and murder scene of Michella Welch. He was arrested for the crime on June 20 after a traffic stop.

Michella’s mother is thrilled by the arrest, and Michella’s younger sister, Nicole, who was only 9-years old in 1986, described her sister like a “second mother,” and said that Hartman cut her sister’s “precious life” short.

This is all wonderful. And right out of a sci-fi movie. OK, so you have nothing to hide right? I have nothing to hide either. But I’m never throwing a napkin away again!

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Check Your Free Credit Report Now

When is the last time you checked your credit report? If it has been more than a year, you can get a free one. The issue is, however, is how to really understand it. Here’s some information about obtaining and reading your credit report.

Obtaining Your Free Credit Report

Based on US law, everyone is entitled to look at their credit report from all three major credit reporting agencies. If you want to look at more than that, you can pay a fee. This law dates back to 2003, and all three major bureaus, TransUnion, Equifax, and Experian, must allow people to access their credit reports from AnnualCreditReport.com. Keep in mind, you won’t see your credit score through the free reports. You’d have to pay to see your scores.

When you go to this site, you can fill out a form that requires a number of items. You have to supply your name and address, your date of birth, and your Social Security number. Once entering that information, you can submit it, and you will be taken to a new page.

The next page allows you to choose which credit reporting company you want a report from. There are checkboxes next to the name of these companies. You can select all three, only two, or a single credit reporting bureau. There are some cases where you might want to access all three reports at once, but there are also instances where you might only want to access one. This is further explained on the website.

Before you can access your credit report, you have to verify your identity. You should get a page of questions on the screen about a variety of things. It might include credit accounts, loan terms, or even what cars have been purchased by you. The only way to access your report is to answer these questions correctly.

Since this website is integrated with the sites of the credit bureaus, once you gain access, you will see how easy it is to switch from one report to the next. Now, you only get one free report each year, but it is possible to check reports again, if necessary. You just have to pay a fee of about $20 to view them.

Understanding Your Credit Report

Credit reports are not easy to understand. The top of your report contains information such as your name, address, employment information, and addresses. Next, you will see public records, such as collection accounts and judgements.

Next, you will see a list of all credit accounts you have in good standing. Revolving accounts are listed next, and then you will see all requests to view your credit report. Finally, you will see any personal statements that you have placed on your credit report. Generally, this is done if you have been a victim of identity theft.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

Bitcoin Scams Up the Ying Yang

If you are thinking of jumping onto the Bitcoin bandwagon, or any type of cryptocurrency, you have to make sure that you are watching out for scams. There are a ton of them out there, including the following:

Fake Bitcoin Exchanges

You have to use a Bitcoin exchange if you want to buy or sell Bitcoins, but not all of them are legitimate. Instead, many of them are created for the sole purpose of taking people’s money. Only use well-known exchanges.

Ponzi Schemes

Bitcoins are not exempt from Ponzi schemes, and you have to look out for these. These are like pyramid schemes, and you definitely don’t want to get caught up with this, as you will certainly lose your money.

Fake Currency

You have certainly heard of Bitcoin, but there are other cryptocurrencies on the market, too, as alternatives to Bitcoin. However, there are also fake ones. For instance, one of these, My Big Coin, was fake, yet the people behind it managed to take more than $6 million from customers.

Well-Known Scams

Bitcoin scammers also rely on old school, well-known scams to trick people. They might, for instance, send emails pretending to be the IRS or even having some type of Bitcoin sale. People fall for these scams every day. If it seems weird, like the IRS emailing about Bitcoin, it is most definitely a scam.

Malware

Malware is another associated scam with Bitcoin. Most, or all wallets are connected online, scammers can use malware to access the account and take your money. Malware can get on your computer in a number of ways, including from websites, social media sites, and even through email.

Fake News

We live in an era where online news is the most popular method to get news, but it’s also very easy to create news stories that seem totally legitimate, yet they are absolutely fake. Basically, scammers create these stories to bait victims, so always think before you start clicking.

Phishing

These Bitcoin scammers also use phishing scams to try to get money from people who are trying to buy and sell Bitcoin. These scams are often done by clicking malicious links.

It doesn’t matter if you join the Bitcoin craze or not, you can also use these tips to keep yourself safe from other scams. Here’s some final tips:

  • Always do a security scan on your laptops, computers, phones, and tablets on a regular basis.
  • Do your research before investing in any cryptocurrency website. Make sure it is trustworthy and secure.
  • Store all of your cryptocurrency in a wallet offline, which keeps it protected from scammers.
  • Always monitor all of your banking, credit card, and cryptocurrency accounts.
  • Always insist the crypto site has two step or two factor authentication.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.