Entries by Robert Siciliano

Mobile Phone Spyware Resellers Arrested

Spyware is sold legally in the United States. This software records chats, emails, websites visited, usernames and passwords, and basically everything a person does on that PC. Some spyware programs can record everything in a video file that can then be accessed remotely. This is all perfectly legal as long as the PC’s owner is…

National Strategy for Online Identification

The Internet has become a fundamental aspect of most of our lives. It goes beyond social media, online shopping, and banking. Critical infrastructures like water, sewer, electricity, and even our roadways all rely on the Internet to some degree. The Internet’s weak link is the difficulty in reliably identifying individuals. When online, our identities are…

Travel Security and Identity Theft Scams

Traveling for business or pleasure is hectic, unnerving, not at all glamorous and often draining. Often, we say we need a vacation after a vacation. And when traveling, the last thing you need is to be ripped off. Things to consider: Hotel Rooms Hotel rooms are not secure. Just last week I entered a hotel…

Toddler Used As Decoy in Burglaries

A confidence trick or confidence game (also known as a bunko, con, flim flam, gaffle, grift, hustle, scam, scheme, swindle or bamboozle) is an attempt to defraud a person or group by gaining their confidence. The victim is known as the mark, the trickster is called a confidence man, con man, confidence trickster, or con artist, and any accomplices are known as shills. Confidence men or women exploit human characteristics such as greed and dishonesty, and have victimized individuals from all walks…

Summertime Scams and Identity Theft

For everything in life, there is a corresponding scam. Scammers spend their energy trying to separate hardworking, law-abiding citizens from their money, and they’ll take advantage of any opportunity to do so. The four seasons provide various opportunities for scams. Summers “hottest” scams include: Stealing your mail. While you’re on vacation, your mailbox fills up…

Man lived under stolen identity for more than a decade

Identity cloning generally encompasses all types of identity theft. In most cases, the thief is intentionally living and functioning as the victim. The thief’s motivation may be to hide from the law, evade child support, or skirt immigration. A man lived a quiet life with a steady job. But he wasn’t who he claimed to…