Woman slams Staple Gun into Intruder’s Head

If you’re ever confronted by an assailant in your garage, you may have any number of highly effective weapons within your reach. A woman in Indianapolis identified as Carol found that out soon enough when she arrived home in February of 2016.

1SDA man was waiting in her garage. The 52-year-old questioned what the man wanted. He said he had a gun and demanded her purse.

She replied he could have the purse and it was in her car. Then he lunged at and grabbed her—pinning her against a toolbox (big mistake!).

“So I grabbed a staple gun and smacked him on the side of the head,” the story at fox6now.com quotes Carol. “He went down to his knees.”

The man must have been pretty hard-headed because the blow didn’t keep him from charging her a second time. However, Carol grabbed two staple guns and told him, “I will crush your skill in if you touch me again.”

The bleeding man left.

How to Protect Yourself

  • Preventing an intrusion is the first thing. How did this man get in the garage? The story doesn’t describe the type of garage, but perhaps he simply lifted the door open. But it’s also possible he got into the house from a back door or window, then made his way to the garage and waited.
  • All possible entries to your house should be as intrusion-proof as possible.
  • If you find yourself being pinned by an assailant, keep level headed and make a fast assessment of what’s within reach that could be a weapon—then slam it into your assailant’s head.
  • Unlike what you’ve probably seen on TV hundreds of times, all it takes is one good slam to disable the assailant enough for you to make your escape. The side of an angry man’s head is fragile simply due to the fact that it’s the side of a human head.
  • Even striking with an office stapler can daze an assailant.

Do not hesitate to deliver a second blow if he comes at you after the first blow.

Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.

9-Year-Old Kidnap Victim convinces Abductor to Release Her

Jeannette Tamayo was nine when she was abducted in June 2003, and exhibited a presence of mind that few adults would have in a similar circumstance.

10DHome from school, Jeannette entered her house, unaware that a man had been following her; he entered too, and that’s when the nightmare began. Soon after, her mother and brother arrived but were promptly beaten up by the man, and he then handcuffed the girl and crammed her inside a box inside his car.

The man took her to the second story of a house where he raped her for a few days and threatened to kill her. As a story on abcnews.go.com reports, Jeannette realized that her only chance of survival was to gain the man’s trust.

Predators see their victims as objects more than as human beings. Instead of constantly screaming and crying, Jeannette communicated with thoughtful words and kept her cool. To her abductor, she wasn’t some shrieking, pleading object. She was a person who started conversation. This approach is highly tactical and is considered a life saver in many abduction and hostage cases.

The young girl said she treated the man like a “normal” person. Soon after that decision, he took off her handcuffs, even allowing her to roam the house. The girl was too infuriated to let Stockholm syndrome poison her, but she continued keeping collected, even sharing with him her plans for the future.

While watching TV Jeannette saw something about asthma tests. She told the man she had asthma and would die without her medication. Next thing she knew, he drove her to a street corner and dropped her off.

However, Jeannette had made a point during the ride to his house to imprint the directions. She relayed them to the police and they arrested him.

Who knows, this could have ended up a Michelle Knight or Jaycee Dugard type situation. Instead of being blindly compliant, this little girl was strategic. Had she been nothing more than a crying, shrieking object, it’s easy to believe that her captor, David Montiel Cruz, who was sentenced to 100-plus years, would have killed her or kept her hostage for years.

Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.

World’s dumbest Rapist: Tells Victim to call Boyfriend

What’s sicker than raping a woman? Ordering her to phone her boyfriend so he could listen to the rape. But that was a good thing for a woman who was kidnapped last year. Her abductor drove her to the parking lot of an adult entertainment store in Georgia with the intent of raping her, reports WSB-TV.

1SDBut the abductor, Robert Giles, first ordered her to call her boyfriend so he could listen in. Smart move, dude: The victim called 911 instead. However, she pretended the man on the other end of the call was her boyfriend.

The victim explained the circumstance to her “boyfriend,” who quickly realized what was actually happening. And the 911 operator, Deonte Smith, went along with it, posing as her boyfriend, all the while gathering data to locate Giles.

Soon, the police nabbed Giles on the spot.

What can we learn about this event?

  • If you’re abducted, keep your cool and think hard. Do not be afraid to be strategic.
  • Of course, you want to prevent ending up in such a situation in the first place. A man doesn’t just randomly abduct a woman. He observes them first, to see who seems like they’d put up the least resistance.
  • If you are ever abducted, holler as loud as you can, “Fire! Fire!” People are more likely to come bolting out of the woodwork to help out when they hear “Fire!” rather than hearing just screaming. Even if you yell “Rape!” there’s bound to be a few listeners who will think this is a prank. Yelling “Fire!” is not associated with pranks.
  • If you notice a man following you, throw a curve ball. Predators are easily stunned by curve balls and paralyzed with confusion and trepidation. For example, if he sees you spit on the ground as he’s walking behind you, this will likely make him hesitant to grab you.
  • Always be aware of your surroundings. Never text while walking in public! Take out the earbuds and keep your ears on high alert.
  • Sign up for martial arts/self-defense lessons. Yes, they really work when taught by a highly qualified instructor.

Robert Siciliano CEO of IDTheftSecurity.com, personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft preventionvideo.

Predators hunting Kids on Gaming Sites

As a parent, you may not be crazy about your child spending a lot of time “gaming.” Chances are good that your feelings are fueled by the fact that kids should play outside, be more social, and are getting addicted to tech or maybe the correlation between childhood obesity and excess computer time. It’s not pretty.

12DHowever, there’s another elephant in the room, perhaps squeezing out the obesity threat: the pedophile threat.

Recently on a Long Island college campus, a male student was found to be traipsing through gaming sites that are popular with young boys such as Grand Theft Auto and Minecraft. The 21year old predator, convinced three underage boys to take sexually explicit pictures and send them to him.

It’s tempting to question what these boys were thinking, that they would so freely take and send sexually explicit images of themselves to a complete stranger. But the predator played a numbers game in his trolling quest, finding three vulnerable victims and convincing them that he was “Allison Denario” and ask for the photos.

He’d then pose as Allison’s furious boyfriend. Of course, in real life, an angry boyfriend would normally demand that the photos stop. But “Allison”’s boyfriend told the boys his father was a cop or FBI agent. This angry cyber stranger demanded the boys perform sex acts on camera or he’d snitch on them for sending Allison the images. So. Flipping. Dark.

Well, Mt Predators little game was short-lived and he was charged with child pornography.

For Parents

  • Get an activated security suite for the computer before any game playing begins.
  • Create long strong passwords. Please, no 123Gamer or Jayson14. So a long strong password might be a phrase ImaHugeStarWarsfan or a nonsensical jumble like gowkg850(4)2.
  • Before any game playing, check its Entertainment Rating Software Board’s rating.
  • Protecting your kids is more than just great passwords and online security features. Make your children feel that they won’t be judged or blown off by you if they report something peculiar or suspicious.
  • Teach your kids how to make these reports, about “catching the bad guy in real life.” Feel free to refer to the bad guy as a predator, not just “bully.” Many kids think of “bullies” as other kids who call each other names online. But if a child is old enough to play on gaming sites, they’re old enough to be taught about adult male cybersexual predators and how they pose as young girls.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention.

The TSA confiscated 2,653 Guns in 2015

How dumb can air travelers be, trying to get guns past the TSA? Duhh, don’t they know that the X-ray equipment or pat-downs will detect them? Just last year, over 2,600 guns were detected. More than 80 percent of these guns were loaded. Talk about the world’s dumbest criminals.

7HIt gets better: People have also tried to sneak past the TSA other potentially lethal weapons. In 2015, the TSA confiscated the following potentially deadly instruments:

  • Metal sickle shaped weapon. This could easily dig out someone’s insides.
  • Gun powder; yes, non-metallic weapons can be detected.
  • Lots and lots of knives
  • Ninja climbing claws (yes, don’t know how else to describe these, but what you’re right now picturing is probably pretty accurate)
  • Ninja stars (scads of these, in all shapes and sizes)
  • Cane swords (a sword hidden in a cane that looks like Grandpa’s)
  • Meat slicer, where is someone traveling that they need to bring a meat slicer, and if they really need to do this, why try to bring it on the plane rather than get it checked through with baggage? Although I doubt they had evil intentions with that device.
  • Grenades, real and fake
  • Pepper spray (lots of it)
  • Samurai swords
  • And no kidding: a Klingon sword—you know, that crescent shaped thing. They actually make these things—called bat’leths—Trekkies don’t get special passes on airplanes.
  • Battarangs (can you figure out what these are, based on the name? Hint: “Holy Ravioli, Batman!”)
  • Drugs (hidden in items that you’d think TSA would never suspect to look in, such as peanut butter, candy wrappers and batteries.

Certainly, some of these travelers meant no harm. In fact, maybe the vast majority of them meant no harm with their weapons, and were just innocently (and idiotically) bringing them along, figuring, “As long as it’s not a gun or sword, my Ninja star or can of mace will be okay.”

However, don’t people know by now that anything sharp and metallic, or containing a chemical poison, will be confiscated? See more allowed/prohibited items HERE.

And what were the people with the grenades, handguns and swords thinking? Certainly not “TSA’s gonna get me!” You humans just amaze me.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Woman Drives her Sleeping Assailant to Police Station

You don’t always have to outmuscle a assailant to beat him at his game. This is what a New Zealand woman learned after Vipul Romik Sharma abducted her. At first, things seemed fine; she exited a bar in Otahuhu with the 22-year-old and another man. Then they kidnapped and raped her.

Sharma then told her he was going to drive her home. The car began weaving due to Sharma’s sleepiness. The woman told him he was going to kill her first with his driving, and amazingly, Sharma gave control of the car to her.

At first, she intended on driving straight to her home with Sharma as a passenger. This occurred very early in the morning, and she figured that upon entering her driveway and tooting the horn, her roommate—a “big Islander guy”—would come out and take care of Sharma. But she realized he would have already departed for work.

That’s when she decided to drive straight to the Auckland Central police station—with Sharma snoozing and unaware.

But then the slime awakened, realizing where he was and repeatedly said “I’m sorry.” Too late, Tough Guy—you did the crime, you do the time. The woman told him: “You will be sorry; just wait.” Officers quickly placed Sharma on the ground.

During court, he claimed that the victim consented to the sex. This all happened in 2006, reported in the New Zealand Herald online, and Sharma was found guilty. As for the second man, he too was convicted.

Well, is there anything the woman should have done differently? It depends on what point of time in this chain of events. Certainly, she did everything right when Sharma began driving erratically. But what was she doing exiting a bar late at night with two men she didn’t know in the first place?

This is dangerous because once you’re outside late at night, it’s not difficult for a man to whisk an unwilling woman away into a vehicle and drive off with her, no witnesses. Think before you decide the best thing you can do for yourself at 1 a.m. is exit a bar with a man you just met.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

How to recycle Old Devices

When it comes to tossing into the rubbish your old computer device, out of sight means out of mind, right? Well yeah, maybe to the user. But let’s tack something onto that well-known mantra: Out of site, out of mind, into criminal’s hands.

7WYour discarded smartphone, laptop or what-have-you contains a goldmine for thieves—because the device’s memory card and hard drive contain valuable information about you.

Maybe your Social Security number is in there somewhere, along with credit card information, checking account numbers, passwords…the whole kit and caboodle. And thieves know how to extract this sensitive data.

Even if you sell your device, don’t assume that the information stored on it will get wiped. The buyer may use it for fraudulent purposes, or, he may resell to a fraudster.

Only 25 states have e-waste recycling laws. And only some e-waste recyclers protect customer data. And this gets cut down further when you consider that the device goes to a recycling plant at all vs. a trash can. Thieves pan for gold in dumpsters, seeking out that discarded device.

Few people, including those who are very aware of phishing scams and other online tricks by hackers, actually realize the gravity of discarding or reselling devices without wiping them of their data. The delete key and in some cases the “factory reset” setting is worthless.

To verify this widespread lack of insight, I collected 30 used devices like smartphones, laptops and desktops, getting them off of Craigslist and eBay. They came with assurance they were cleared of the previous user’s data.

I then gave them to a friend who’s skilled in data forensics, and he uncovered a boatload of personal data from the previous users of 17 of these devices. It was enough data to create identity theft. I’m talking Social Security numbers, passwords, usernames, home addresses, the works. People don’t know what “clear data” really means.

The delete button makes a file disappear and go into the recycle bin, where you can delete it again. Out of sight, out of mind…but not out of existence.

What to Do

  • If you want to resell, then wipe the data off the hard drive—and make sure you know how to do this right. There are a few ways of accomplishing this:

Search the name of your device and terms such as “factory reset”, “completely wipe data”, reinstall operating system” etc and look for various device specific tutorials and in some cases 3rd party software to accomplish this.

  • If you want to junk it, then you must physically destroy it. Remove the drive, thate are numerous online tutorials here too. Get some safety glasses, put a hammer to it or find an industrial shredder.
  • Or send it to a reputable recycling service for purging.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention

Go Two-Factor or go Home

Logins that require only a password are not secure. What if someone gets your password? They can log in, and the site won’t know it’s not you.

http://www.dreamstime.com/stock-images-online-risks-sign-road-banner-image34668294Think nobody could guess your 15-character password of mumbo-jumbo? It’s still possible: A keylogger or visual hacker could obtain it while you’re sitting there sipping your 700-calorie latte as you use your laptop. Or, you can be tricked—via a phishing e-mail—into giving out your super strong password. The simple username/password combination is extremely vulnerable to a litany of attacks.

What a crook can’t possibly do, however, is log into one of your accounts using YOUR phone (unless he steals it, of course). And why would he need your phone? Because your account requires two-factor authentication: your password and then verification of a one-time passcode that the site sends to your phone.

Two-factor authentication also prevents someone from getting into your account from a device other than the one that you’ve set up the two-factor with.

You may already have accounts that enable two-factor authentication; just activate it and you’ve just beefed up your account security.

Facebook

  • Its two-factor is called login approvals; enable it in the security section.
  • You can use a smartphone application to create authentication codes offline.

Apple

  • Its two-factor works only with SMS and Find my iPhone; activate it in the password and security section.
  • Apple’s two-factor is available only in the U.S., Australia, New Zealand and the U.K.

Twitter

  • Twitter’s two-factor is called login verification.
  • Enabling it is easy.
  • Requires a dependable phone

Google

  • Google’s two-factor is called 2-step verification.
  • It can be configured for multiple Google accounts.

Dropbox

  • Activating two-factor here is easy; go to the security section.
  • SMS authentication plus other authentication apps are supported.

Microsoft

  • Enable it in the security info section
  • Works with other authentication apps.

Additionally, check to see if any other accounts you have offer two-factor, such as your bank (though most banks still do not offer this as described above, but do provide a variation of two factor).

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention. Disclosures.

Take a Women’s Self-Defense Course

Crimes against women are often “crimes of opportunity”. The predator doesn’t care if the opportunity presents itself in a major bustling city or in a tiny town with a population of only 400. If he sees prey and nobody else is around, he’ll strike—big town, medium town or small town.

1SDWomen should take self-defense classes, regardless of their age, weight or height. Just do it. There’s more to a high quality self-defense program than learning how to throw a punch, get out of a choke-hold and deliver a kick.

Sometimes, a predator can be frightened away by a woman’s eyes and tone of voice. In fact, a predator will “interview” a woman before assaulting her. He wants to first make sure he can overtake her. He won’t automatically assume he can simply because he’s taller and heavier. He has to qualify her as victim material.

He may do this by asking her for the time, for directions, or just looking at her in a creepy way. Her response, tone of voice and body language will be very telling. Self-defense and martial arts teaches a woman how to display a posture that makes a dangerous man back off.

Sometimes a woman who’s trained to fight will get attacked anyways.

Its simple enough, you have to be willing to injure, hurt and harm your attackers. A good self-defense program will include instruction in how to get out of real attacks and how to fight from the ground and even when there is a weapon involved.

Attackers generally don’t expect their victims to fight back. So what you do, your response to an attacker in the first few moments of an attack, can very well determine the outcome. Scratching a man’s face is a good start, but may anger him rather than scare him, but a solid punch to the throat or a deep gouge to the eyes is better.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

What to Do if Accosted on Street and Dragged by a Man

The video of Carlesha Freeland-Gaither, 22, being grabbed on a street corner and forced along a sidewalk to her assailant’s car gripped the nation, bringing more attention than ever to how easy it seems for an unarmed man to abduct a woman.

1SDThere are things a woman can do to help prevent such a situation, as well as break free and bolt to safety before the assailant can get her into his car.

  • Sometimes, the abduction seemingly occurs in a microsecond when caught on video. But prior to what we see, there’s been an exchange of communication. Body language accounts for 55 percent of communication: gait, posture, eye contact, facial expression.
  • Thirty-five percent of communication is vocal. Yelling and screaming like an insane angry person is a lot more offensice than cryting and begging like a week person. Many self-defense programs for women instruct them that one of the first things they should do is let out a primal vocal directive to the suspicious man following them, such as “GET LOST!, STOP, NO or even yell PROFANITIES.
    While walking alone at night (or even during the day), be alert to way beyond your personal space, extending your alertness at least one block out in all directions.
  • Never walk close to vans.
  • Have a weapon in your hand at all times. This can be pepper spray (yes, it works) or a huge mock metal key that’s part of your key ring.
  • Using the typical smaller keys to your car or house may not work; they can break.
  • Carry loose single-dollar bills in a decoy pocket. If someone demands your money, pull it out and toss it, then run while the mugger is distracted by the money.
  • If a mugger wants your purse or wallet, toss it, then run. Don’t hand it to them because they could then grab your arm.
  • Be tactical if the assailant grabs you. Though this may seem like an unrealistic way to handle an assault, it’s your only chance unless you’re a lot physically stronger, and even then, a much stronger victim needs to be tactical.
  • Gouge the attacker’s eyes out. This really works. Rather than try to out-muscle him or break away from his strong hold, go for his eyes. The eyes of a 220 pound thug are just as fragile as the eyes of an infant. If this is not possible, then become dead weight.
  • As long as you’re on your feet and those feet are moving, the assailant can transport your body to his vehicle! If you weigh 130 pounds, even 105 pounds, and become willfully paralyzed, your assailant will be forced to carry all of this weight. Drop it to the ground and don’t move. Unless your assailant regularly performs powerlifting exercises at the gym with heavy weights, he’s going to have one helluva time picking you up from the ground.
  • Though it’s not all that difficult for a fit young man to scoop a 120 pound woman into his arms while she is standing, the biomechanics drastically change if the lift begins from the ground!
  • If you’re lying flat, he must either lift up all your weight from a squatted position, or, he must do it with straighter legs but a very bent-over back. This will be impossible for the average man—especially if the victim is heavy-set. Should he decide to just drag your dead weight along the ground to his car, at least this will buy you time in that it gives passers-by more time to see the abduction in progress and call 9-1-1 or directly intervene.
  • If the assailant manages to get you to his car…then it’s time to fight. Grab his groin and squeeze. It’s right there. If he has a cup (he probably won’t), then go for the eyes. Women have been known to escape their attackers. They just don’t make the news very much.
  • Learn self-defense and fighting skills. Never underestimate what a well-trained woman can do to the average or even not-so-average man.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.