Toddler Used As Decoy in Burglaries

A confidence trick or confidence game (also known as a bunko, con, flim flam, gaffle, grift, hustle, scam, scheme, swindle or bamboozle) is an attempt to defraud a person or group by gaining their confidence. The victim is known as the mark, the trickster is called a confidence man, con man, confidence trickster, or con artist, and any accomplices are known as shills. Confidence men or women exploit human characteristics such as greed and dishonesty, and have victimized individuals from all walks of life.

Social engineering is the act of manipulating people into performing certain actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim.

Call them con men, grifters, scammers, or thieves. Or simply call them liars. Lying is what they do best. They stare you in the eyes and lie through their teeth. They do it casually and with such conviction that we have no reason not to believe them. Their craft and skill is a remorseless trait called social engineering, which is also known as pre-texting.

Lying is a learned behavior. One day as children we stumble upon a situation, one that we created or were a party to, and we are confronted by someone in authority. Most likely mom, dad, or a teacher. We are asked a question and we respond with what we think they want to hear, as opposed to the truth. We lie. They believe us and we are relieved of the burden of truth’s consequences.

“They all thought they were helping a woman and her child, but Sanford police say the woman duped them. She cried wolf they said.

They said she knocked on four of her neighbors’ doors with a sob story. Twice she used her toddler to get into their houses. “She asked me ‘help, I need help. My car’s overheating. My baby’s suffocating,’” a victim. “I went into my room and I noticed that my jewelry box was open and everything was gone, I’m nervous. I sleep armed. I can’t sleep,” the unidentified victim said. “You feel stupid at first and you just wish the world wouldn’t be that way.”

Sometime the most effective way to penetrate the most secure system is through someone else’s good nature. It’s always important to help. And, it’s equally important to smell a rat.

Robert Siciliano personal security expert to Home Security Source discussing Home Invasions on Montel Williams. Disclosures

Dumb Thief: How to Locate a Stolen iPhone

With 20+ million iPhones on the market there is a good chance you have one. According to San Francisco police, the 31-year-old city resident rode a bicycle up to a woman and snatched an iPhone out of her hands, and then pedaled away.

Problem was, the woman was carrying the phone as part of a company’s demonstration of a real-time GPS tracking program. If the bandit would have taken a peek at the screen, he would have seen himself traveling across a map of San Francisco.

Using the tracking software enabled on the iPhone, the victim was able to tell a 9-1-1 operator the exact location of the thief as he peddled through San Francisco, which the operator then relayed to police. Ten minutes later, he was in police custody.

This is either the greatest ever publicity stunt or most likely the dumbest and unluckiest thief ever!

The iPhone has gone through numerous upgrades in both hardware and software and still holds its value. Even the iPhone 3G is still commanding $150-200 on eBay, while the 3GS is going for as much as $400 and the iPhone 4G is a whopping $800.00! .  That being said it is suggested to protect this hardware as you would a laptop.

Apple has a service called Find My iPhone that will allow iPhone owners to remotely locate their lost or stolen iPhones using the iPhone’s GPS. The service is available as part of Apple’s MobileMe online subscription service.

Find My iPhone will:
-Locate your iPhone or iPad on a map
-Display a message and optionally play a sound for two minutes at full volume even if your device is set to silent
-Remotely set a passcode lock on your device (or lock it using your existing passcode)
-Remotely wipe your device to permanently erase all of your personal data

The app will automatically sign you out after 15 minutes of inactivity or you can manually sign out at any time. You must first set up your MobileMe account and turn on Find My iPhone on each device you want to locate (installing the app is not required).

Robert Siciliano personal security expert to Home Security Source discussing iTunes Giftcard Scams on NBC Boston. Disclosures.

Police After Con-man Impersonating Cops

Our unending fascination with “Cops” must be due to the edgy dangerousness of their jobs. After all they are law enforcement officers who are often public bouncers and deal with the craziest of crazy situations. There’s also the whole “power of the badge” and the flickering blue lights that gives them authority over civilians.

It’s no wonder they have their own TV shows, movies and many dramas that depict them as both hero and villain.

With all the fanfare that comes with being a police officer, there is also the pressure of such an often difficult and stressful job. Next time you see a cop, thank him or her. They will appreciate it.

Impersonating a police officer is sometimes committed in order to assert police-like authority in order to commit a crime. Posing as a police officer enables the offender to legitimize the appearance of an illegal act, such as: burglary, making a traffic stop, or detaining.

In New York Police are hunting a con-man who pretends to be a cop while stealing from at least seven businesses cops said. The man sports an imitation police shield and NYPD jacket as he swipes items off the shelves and then returns the goods to the cashier as though he had previously purchased them, officials said.
It is not uncommon for police impersonation to occur when someone is driving and is being pulled over by a fake cop. It’s just as distressing when the criminal knocks on your door trying to gain entry.

This is a difficult scam to protect yourself from and just as tricky to advice on due to the fact that we are trained to obey authority coupled with the fact you don’t want to resist a real officer of the law.

My best advice is to always make a phone call to your local authorities or the state police whenever or wherever you are in a situation where you have the slightest inkling the “cop” may be a fake. Never let someone into your home who holds a badge or ID until you call their superiors to confirm their arrival.

Robert Siciliano personal and home security expert to Home Security Source discussing Home Security on NBC Boston. Disclosures.

100 Million Facebook Profiles Published via P2P

Personal information on 100 million Facebook users has been scraped from the social media site and is being shared and download as a single file via what is called a Bittorrent. BitTorrent is a peer-to-peer (P2P) file sharing protocol used for distributing large amounts of data.

Facebook  takes on the issue is the data that was scraped wasn’t private at all. To a degree, I agree. The data is being shared through the site, it’s already public.

Here’s how it went down: a good guy hacker developed a program that went through all 500 million profiles and was able to skim (scrape) all the data from Facebook that wasn’t locked down via the users Facebook privacy settings. Basically if you didn’t lock your privacy settings down, it’s now available in this file. If you lock down your settings today, it’s still in this file.

What’s the point? Hackers like to tinker, and some like to make a point. It seems the hacker here wanted to make a point that your data on social media is up for grabs whether you like it or not.

What’s the risk? It seems the format and way the data was compiled is now searchable in a way that can benefit advertisers and marketers. Can it be used by thieves? It’s too early to tell. In this situation my first concern would be data that you may not want to be around in 20 years that may damage your reputation down the road.

This incident should highlight the lack of privacy and lack of security that exists in social media. Recognize that whatever information you share online, can ultimately end up in anyone’s hands, whether you like it or not.

Lock down your privacy settings and be very conscious of what you share. It may bite you someday.

Robert Siciliano personal and home security expert to Home Security Source discussing social media Facebook scammers on CNN. Disclosures.

Apartments Likely Targets of Burglary

According to the National Crime Prevention Council (NCPC), apartments are 85% more likely to be victimized by a burglary than any other form of housing.

There are many reasons why apartments are targeted for burglaries. Here are a few:

Problem: In an apartment setting the residents live among other people. One tenant in a complex who has a propensity for theft may target units within. When he knows you aren’t home, that’s when he breaks in.

Solution: Alarm it. Apartment security systems trump all other options. And keep your TV or radio on to give the impression you are home. Even if your car is gone and he knows it, the alarm will screech and alert the authorities when you’re gone.

Problem: Mailboxes often signal who lives at the apartment. A single name on a mailbox may give the burglar the impression you might not be home during the day due to the fact most people work 9-5.

Solution: Put Your Name and Another Name on the mailbox. Tell your landlord ahead of time so they understand why.

Problem: You go on vacation or travel on business and the mail piles up and the lights are always off. Your apartment is seen by many other who notice you’re gone. This is called : “a crime of opportunity”.

Solution: Give your apartment the lived in look. Keep a TV on, shades down, put your lights on timers and have a friend grab your mail.

Problem: People in apartments often do not lock windows on upper levels thinking they are more secure. They forget that ladders and fire escapes can provide access even 3-4 levels up.

Solution: Lock your windows and make sure your apartment security system is applied to your windows and alerts you via the alarm whenever they are opened. You can also install motion sensors and glass break sensors as extra layers of security.

Robert Siciliano personal security expert to Home Security Source discussing burglar proofing your home on Fox Boston. Disclosures.

Cops Encourage Burglary Prevention

Let it be known and publicly stated right here and right now that I love law enforcement. Even though I’ve been pulled over for various vehicular infractions, but I’m not bitter. I’ve encountered officers of the law that may have taken themselves a bit too seriously, but I’ve meet plenty of flight attendants who fit the same profile. We are all just humans trying to get through this thing called life. It’s all good.

In Fort Wayne Indiana the local Police Department responded to a string of home burglaries that they are calling ‘crimes of opportunity’ and offer suggestions on how homeowners can prevent themselves from becoming victims of such crimes.

Some of the burglaries occur while people are sleeping in their homes.  They burglars were reported coming in through unsecured doors and windows. I don’t know where you live but in many parts of the country people don’t lock their doors because they don’t want to be “paranoid” I don’t know how lock your door can make you mentally ill. Maybe they know something I don’t.

One of the cops was quoted saying “Because they, (the homeowner), made it easier on the suspect or suspects to get into their home, it became a crime of opportunity. Whereas maybe those homes that were more secure, the suspect may have even gone to those homes and didn’t choose them because they were more secure, presenting more risk to him or her.” This is why I love law enforcement. Because of officials t like this guy who speak in common sense.

Be in charge of your home security:

  • Keep doors locked day and night and every time you leave your home.
  • Use wide-angle peepholes
  • Make sure glass is reinforced so they cannot be shattered.
  • Doors from attached garages must be solid and locked
  • Lock the overhead garage door – do not just rely on an automatic door opener.
  • Sliding glass doors should have strong locks.
  • Never leave a message on your voicemail or social media that indicates you are away.
  • Trim all shrubbery near doors and windows.
  • Use timed interior lights and outdoor timed or motion lights
  • Never leave a garage door opener inside your vehicle.
  • Install security cameras that can be remotely monitored.
  • Install a home alarm system monitored by an alarm company and the police.

Robert Siciliano personal security expert to Home Security Source discussing burglar proofing your home on Fox Boston. Disclosures.

What is that Facebook “Friends” Motivation?

Sandra Appiah is a curvy lady who wants to friend me. She friended two of my buddies and apparently they accepted because they showed as “2 Friends in Common”. I never automatically friend anyone, so I contacted each bud and neither knew who she was. Go figure.

What got my attention besides the fact that I don’t know her was that she had photos on her page on a bed, scantily clad with belts and Playboy bunny stuff in the room. Red flag anyone? But to my buds, they didn’t seem to see it the way I did.

I sent here a note, “Hi! Where did you learn of me?”

And “her” response: “I am simply online looking for the Love of my life….someone to make my heart skip a beat…shake my whole being. A fairy tale that lasts a life time. Someone to adore and cherish….want to look at his face in the morning. That! A Man who is going to show me true love and passion. Respectful and serious intentions for a long relations and marriage. Trust is everything, honesty. Someone who I can share my day with and hold in my arms forever. THANKS HAVE A NICE DAY I HOPE YOU REPLY ME”

When she contacted me she had 12 friends. Now she has 18. All “dumb” dudes that have no idea that “she” is a scammer in an internet café in Nigeria. Why would anyone facilitate a scam by providing this scammer legitimacy by friending them?

Robert Siciliano personal security expert to Home Security Source discussing social media Facebook scammers on CNN. Disclosures.

Home Invasions on the Rise During Summer

“Home invasions are especially frightening because the robber may not care who is home or who gets hurt,” states News 12.

We’ve often discussed how the home invader lacks a certain gene that many of us have called “compassion”. A home invader thrives on the chaos, fear and panic of a home invasion and ultimately the invader doesn’t care if anyone gets hurt.  Home invaders often take their act to another level and go far beyond “theft” and escalate to physical violence that involves beatings, rape and torture often resulting in murder.

In Richmond City GA, Richmond County reports at least fifteen robberies or burglaries in the past two weeks during which the victims were at home. Sometimes it seems like the suspect intended to meet the victim; other times they were surprised to find them home. Usually, there is no way to predict a home invasion. Their Lieutenant stated “there’s two main reasons why a criminal actually would want to meet his victim: “The main motivations are drugs and money.” One of the victim also said “I was shaking. I was scared. I wasn’t crying but I had tears in my eyes…I thought, ‘Oh my God, I’m about to die.'”

Wow. Very powerful words, and all too real. Listen to me: I’m a realist. I believe I see things pretty much for what they are. I don’t think things are getting “worse’, but they are definitely getting a little out of hand here and there. There is no reason to live in fear, and you also need to put systems in place so you don’t end up in this situation.

Every family must have a plan for home security and home security alarm.

  • Get a trained German shepherd.
  • Another consideration is a home safe-room also known as a “panic room” where families can hide out in a relatively bullet proof, well stocked room equipped with wireless communications and wait for law enforcement to show up.
  • Never talk to strangers via an open or screen door. Always talk to them through a locked door.
  • NEVER let children open the doors. Always require and adult to do it.
  • Not all home invaders knock, some break in without warning.  Just another reason to have that home alarm on.
  • Install a 24-hour camera surveillance system. Security cameras are a great deterrent.  Have them pointed to every door and access point.

Robert Siciliano personal security expert to Home Security Source discussing Home Invasions on Montel Williams.Disclosures

ATM Security Threats Increase

ATM skimming alone is responsible for $350,000 of fraud daily exceeding a billion dollars in losses annually.

A recent news report of a skimming scam in Long Island, N.Y., netted thieves more than $200,000 from ATMs at five branches.

Skimming today is far more sophisticated than in the past. Skimmers can include blue tooth and texting technology that send the data to the criminal anywhere. Keypads can be compromised by devices that overlay the exiting pad and transfer the data remotely.

ATM scams and fraud go beyond skimming to crimes that are very physical such as ram raiding to remote malicious software hacks.

During the Black Hat conference a hacker demonstrated how he forced three ATMs to dispense funds by exploiting the machines’ weaknesses in the computers that operate the ATMs. He purchased machines online and discovered that the physical keys were the same for all ATMs of that type made by that manufacturer.  He used the keys to unlock a compartment of the ATM that had standard USB slots. He then inserted a program he wrote for one of the machines, commanding it to dispense all of its vault cash.

Bankinfosecurity.com published “7 Growing Threats to Financial Institutions”.

#1 Skimming; Hardware readily available online that is attached to the face of ATM records user card information and pin codes. In this case you may still be able to perform a transaction.

#2 Ghost ATMs; A card reader is blocked off and replaced with hardware that supersedes the machine and records all your data without allowing a transaction. The machine reads “Can’t complete transaction”.

#3 Dummy ATMs; In some cases an ATM is bought off of eBay (do a search) or elsewhere and installed anywhere there is foot traffic. The machine is set up for one purpose; read data. The machine might be powered by car batteries or plugged in the nearest outlet.

#4 Ram Raids; ATMs built into a wall or stand alone are being rammed by a truck and/or wrapped with chain and pulled out then loaded onto a truck. Once removed the thieves blow torch the machine taking the cash. This is a hot topic in Mexican banks, buy certainly happens everywhere. A bank would be smart to install battery backed GPS in any machine.

#5 PIN ID’s; Sophisticated criminal hackers break into a database or skim magnetic strips. They then go to an online banking site with a hacking software that plugs in various well known PINs. These PINs might be consecutive numbers, people names, pet names, birthdates, or other various simple pass phrases people use. When it finds a match it gives the criminal access to your account.

#6 Automated PIN Changes; Criminals go through the banks telephone banking system to change the customers PIN. They may try to change the customers ANI (Automatic Number Identification) is a system utilized by telephone companies to identify the DN (Directory Number) of a caller. This might be accomplished via “Caller ID Spoofing”. They use publicly available data on the card holder such as name, card account number and last four digits of the social security number to “verify” them as the banks customer.

#7 SMS Attacks; AKA Smishing or Phexting – phish texting. Customers receive a text from a bank on their Smartphone requesting login information.

#8 Malware or Malicious Software; Researchers found a virus that specifically infects ATMs and takes over the machine logging card numbers and pins.

To help combat ATM skimming, ADT unveiled the ADT Anti-Skim ATM Security Solution, which helps prevent skimming attempts and detects skimming devices on all major ATM makes and models.

ADT’s Anti-Skim Solution is installed inside an ATM near the card reader, making it invisible from the outside. The solution detects the presence of foreign devices placed over or near an ATM card entry slot, without disrupting the customer transaction or operation of most ATMs. It can trigger a silent alarm for command center response and coordinate video surveillance of all skimming activities. Also, the technology helps prevent card-skimming attempts by interrupting the operation of an illegal card reader.

How to protect yourself from ATM skimming;

  1. First and foremost; Pay attention to your statements every two weeks. Refute unauthorized transactions within a 30-60 day time frame.
  2. Pay close attention to everything you do at an ATM. Look for “red flags”, anything out of place, your card sticks, odd looking configurations on the ATM, wires, two sided tape.
  3. Use strong PINs, uppercase lower case, alpha and numeric online and when possible at an ATM and for telephone banking.
  4. Don’t reply to phishing or phexting emails. Just hit delete.
  5. Don’t just use “any” ATM. Choose ATMs at locations that are “more secure” than in the middle of nowhere. Do not drop your guard if the ATM is at a bank branch.

Robert Siciliano personal security expert to Home Security Source discussing ATM skimming on Fox Boston. Disclosures.

Using a Honeypot to Snare Home Invaders

What do you get when you cross a dozen federal Bureau of Alcohol, Tobacco, Firearms and Explosives agents and the nation’s top city for home invasions with the myth of large quantities of cocaine? Answer: 70 arrested gun toting vicious home invaders.

The term Honeypot in technology refers to a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. In simpler terms a honeypot is a trap set for the bad guy that is so tempting, they can’t help themselves but attack.

Phoenix Arizona has had the distinction of being that famed city where home invasions are a massive problem.

ATF agents set a trap where they “leaked” word of homes with drugs and armed guards that never existed. But the suspects showed up with guns, duct tape and zip ties, ready to steal the cocaine. Instead, they were arrested.

One man had served an eight-year sentence for aggravated assault before he was released in March 2009. Three months later, he was in a car with four other armed men preparing to steal thousands of dollars’ worth of cocaine when ATF agents arrested him.

Obviously if you are reading this you probably don’t need to worry about your home being invaded because you don’t have 10 kilos of cocaine under your bed. But, the fact remains there are wacky people out there that think nothing of taking advantage of regular folk for a lot less.

Every family must have a plan for home security and home security alarm.

  • Get a trained German shepherd.
  • Another consideration is a home safe-room also known as a “panic room” where families can hide out in a relatively bullet proof, well stocked room equipped with wireless communications and wait for law enforcement to show up.
  • Never talk to strangers via an open or screen door. Always talk to them through a locked door.
  • NEVER let children open the doors. Always require and adult to do it.
  • Not all home invaders knock, some break in without warning.  Just another reason to have that home alarm on.
  • Install a 24-hour camera surveillance system. Security cameras are a great deterrent.  Have them pointed to every door and access point.

Robert Siciliano personal security expert to Home Security Source discussing Home Invasions on Montel Williams. Disclosures