Identity Theft Expert; “Robby, Do I have a Paypal Account?” Back to Basics

Identity Theft Speaker Robert Siciliano www.IDTheftSecurity.com

Me Mum calls me last night. Shes asks “Robby, Do I have a Paypal Account?” (Yes, my mom calls me robby) I say “Why do you ask?” Shes says “Paypal sent me an email and I need to update my account”

Shes 60. Been online for 5 years. Knows about as much as most “baby boomers” know about the Internet. And shes the mom of a dude thats been on CNN MSNBC FOX News and a bazillion publications on information security and identity theft prevention.

She does not have stupid written on her forehead. Shes just as naive, kind and cordial as most of her peers. She reached out to me because a piece of my advice to millions of others rubbed off on her.

I’m telling you, call your mother right now and tell her not to respond to any emails or phone calls or snailmail that are from anyone but her closest friends. I’m receiving more emails from victims and seeing more news now of people getting scammed than in any time in my adult life. It will get worse, it wont get better, and somebody you love will get scammed if you dont inform them of whats up.

Many agree. Another blogger added a very pertintnet comment to a recent post;
“With the Russian economy evaporating we can only expect a resurgence in scams coming from there, and in fact everywhere. With the public image of banks never worse and religious leaders announcing fatwa’s encouraging the cyber-attack of western commerce, I expect 2009 will see new records for fraud exploits. Perhaps not in value, because of diminished wealth of the victims, but certainly in the number of attacks.”

Yup. Cold War 2.0

Its Tax Time for Scammers in the USA. And I’m getting a flood of emails from scammers posing as the IRS. They are taking a low tech tact. They are including Word Docs that the victim fills out and faxes back. I sacrificed my security and went against my own rule and opened the attachments in the last one. I scanned them first and so far I think I’m good. And please dont send me comments telling me I have stupid written….

The attachments and note came equipped with a real fax number with an area code from the Bronx, New York USA. Cant blame the Nigerians or Russians for this one. Unless of course they live in NY ;)~

Make sure Mum has McAfee or another no brainer anti-virus provider on her PC automatically updating with every phish filter running.

See below.

DOC 1

Sir/Madam,

Our records indicate that you are a non-resident alien. As a result, you are exempted from United States of America Tax reporting and withholdings, on interest paid you on your account and other financial dealing to protect your exemption from tax on your account and other financial benefit in rectifying your exemption status.

Therefore, you are to authenticate the following by completing form W-4100B2, and return to us as soon as possible through the fax number: +1-646- 519-7245.

If you are a USA Citizen and resident, please complete form W-4100B2 and fax it to us, please indicate “USA Citizen/Resident” on the form and return it to us.

When completing form W-4100B2, please follow the steps below

1. We need you to provide your permanent address if different from the current mailing address on your Form W-4100B2 , you must indicate if a non-USA resident, your country of origin to support your non-resident status (if your bank account or other financial dealing has a USA address for mailing purpose).

2. If any joint account holder are now USA residents or Citizen, or in any way subject to USA tax reporting laws, Please check the box in this section.

3. Please complete 1 through 19 and have all account holders, sign and date the form separately and fax it to the above-mentioned number.

Please, complete Form W-4100B2 ‘attached” and return to us within 1 (one) week from the receipt of this letter by faxing it, to enable us update your records immediately if your account or any other financial benefits are not rectified in a timely manner, it will be subject to USA tax reporting and back up withholding (if back up withholding applies, we are required to withhold 30% of the interest paid to you).

We appreciate your cooperation in helping us protect your exempt status and also update our records.

Sincerely,

Laura Stevens
IRS .Public Relations.

_____________________________________________________________________
DOC2

FORM W-4100B2 (US Tax Recertification)
Request for Recertification of Foreign Status
W-4100B2 Certificate of Foreign Status of Beneficial Owner
(Substitute form) For United States Tax Withholding
Part I Identification of Beneficial Owner
(JAN-APRIL. 2009)
1. Name of individual or organization that is the beneficial owner
2. Sex: □ male □ female
3. Type of beneficial owner □ Individual □ Corporation □ Complex Trust
□ Simple Trust □ Grantor Trust □ Central Bank of issue
□ Government □ International organization
□ Tax-exempt organization □ Private foundation
4. Date of Birth
5(a). Nationality: 5(b). Place of Birth:
6(a). Country of permanent Residence 6(b). Passport No.
7. Mother’s Maiden Name:
8(a). Spouse Name: 8(b). Spouse date of Birth:
9.Permanent resident address (street, apt, or suite no, or rural route).
Do not use a P.O.box or In-care of address
City or town, state or province, include postal code where appropriate
10. Mailing address (if different from above)
City or town, state or province, include postal code where appropriate
11. Social Security Number □SSN or ITIN □EIN
12. Profession: 13.Day time phone/ fax Number
14.(a) Bank Name(s):
15. Account number(s):
16. Branch Address:
17. Date Account(s) was opened:
18. How often do you come to USA and when did you arrive last?
19. ATTACH PHOTOCOPY OF PASSPORT OR US DRIVERS LICENCE FOR PROPER IDENTIFICATION
Part II Certification of Beneficiary Owner
Under penalties of perjury, I decided that I have examined the information on this form to the best of my knowledge and believe it is true, correct and complete.
I furthermore certify under penalties of perjury that:
. I am the beneficial owner (or am authorized to sign for the beneficial owner) of all the income to which this form relate.
. The beneficial owner is not a U.S person.
. The income to which this form relates is not effectively connected with the conduct of a trade or business in the United States or is effectively connected but
subject to tax under an income tax treaty, and
. For broker transaction or barter exchanges, the beneficial owner is an exempt foreign person as defined in the instructions.
Furthermore, I authorized this form to be provided to any withholding agent that has control, receipt or custody of the income of which I am the beneficial owner or withholding agent that can disburse or make payments of the income of which I am the beneficial owner.
The Internal Revenue Service does not require your consent to any provisions of this document other than the Certifications required to establishing your status as a non-U.S person and, if applicable, obtain a reduced rate of withholding.

Sign Here ____________________________________________________________
(Signer #1) signature of beneficial owner or individual authorized to sign for beneficial owner Date

Sign Here ____________________________________________________________
(Signer #2) signature of beneficial owner or individual authorized to sign for beneficial owner Date SEND FAX TO: +1-646- 519-7245

Heres a video of fraud around Tax Day
http://www.youtube.com/watch?v=wSyPQnXNido

Identity Theft Expert; “Phexting” is the new phish “I ain’t got stupid written on my forehead”

Identity Theft Speaker Robert Siciliano www.IDTheftSecurity.com Article here; Text Message Scam

Interviewed for this article the victims states “I ain’t got stupid written on my forehead” I’m sure she is a lovely woman who must be smarter than her quote. She received a scam text and didnt get taken.

Most of us are somewhat aware of text messaging scams. Ive never received one. But I’m seeing a flood of local news reports on the issue. I’ve yet to see a national story on what I predict will become as bad as phishing in emails.

The problem stems from criminal hackers who are using technology to generate cell phone numbers based on area code first, plugging in the cell carriers given extension then generating the last 4 numbers.

Do a search on mass sms software and you will find lots and lots of vendors providing free and small fee programs to send mass texting.

Sexting is when teens send sex pics to one another. Robert Siciliano (me) says “Phexting” is the new phish.

Whats happening is browsers and email clients are doing a better job of protecting the naive. Phexting is the path of least resistance to get to the victim.

Most web based email providers do a pretty good job of recognizing that an email is a phish. First they send it right to spam or they might display a red banner along top of the email in the preview pane.

Up to date browsers have phish filters that recognized a spoofed website. This feature works if you dont turn it off.

While all these tools are helpful, nothing will fix the problem better than simple common sense. I aint got stupid written on my forehead either. But too many people do. And snake oil salesman can smell them from 10,000 miles away.

Heres a video on Phishing:

Identity Theft Expert; Are You Addicted to Information Insecurity?

Identity Theft Speaker Robert Siciliano www.IDTheftSecurity.com Article here;Are You Addicted to Information Insecurity?

Ben Rothke writes a great article that ties in addiction and information Insecurity, thats IN-security. Face it, you may be an addict. You might have an addiction to something like sugar, nicotine, alcohol, sex, gambling, addicted emotionally to another person , or even carbohydrates. Try not eating a baked flour based food for a few days and you’ll go through withdrawals. Ben states, and we all know that addictive activities produce beta-endorphins in the brain, which gives the person a feeling of being high. In this piece it seems that high is being connected to being lazy and taking the easy road. I think he makes the correlation.

At times we do take “pleasure” in in-action. We get a moment of “high” a sense of “relief”, and that is the beta-endorphins in the brain giving you a high five for in-action. But like any addiction it will eventually hurt you in one way or another.

We have been addicted to in-action. And we are fat and lazy and losing to the criminal hackers.

I often encounter people who just cant seem to get anything done. They are all addicted to in-action. And I see it in their personality’s in other areas of their lives. Organizations have to be responsible to not promote a culture of in-action addicts.
They must address security purely and organically with no additives or chemicals. They must systematically address each aspect of insecurity and execute strategic processes to avoid getting hit.

Consider criminal hackers disciplined, lean mean fighting machines that have no addictions (appease me) and thats what we are up against.

Here is another example of a long list of data breaches

Identity Theft Speaker Robert Siciliano on CNN 2/5/9 “Facebook Scams”

Robert Siciliano Identity Theft Protection Expert www.IDTheftSecurity.com is on CNN 7:24am and 8:44am EST (always subject to change). Updates all day on CNN.com, Headlines News, CNN International and maybe 360.

Personal Security and Identity Theft Expert on E! THS Investigates: Dating Nightmares

Robert Siciliano www.IDTheftSecurity.com featured on link; E! THS Investigates: Dating Nightmares

True Hollywood Stories Investigates probes the dark side of dating in all its forms – the cyber hook-ups, sexual secrets, swindling suitors, psychopathic Prince Charmings, and deranged stalkers.

Thursday, Feb 5 5:00 pm eastern

Roberts Internet Movie Database resume Here and Here

Identity Theft Expert; Are Legitimate Sites the Next Malware Threat?

Identity Theft Speaker Robert Siciliano www.IDTheftSecurity.com Excellent article here; Are Legitimate Sites the Next Malware Threat?

Lax attention to critical security patches continues to provide criminal hackers the path of least resistance inside the walls of SMBs and large enterprise networks. Most of us are privy to fundamentals such as not opening attachments, updating anti-virus, securing wireless connections, avoiding P2P downloads and not spending any time in the bowels of the web.

Where many fail is routinely updating whats is outdated or flawed. Further, attention is often paid to functionality and to build-out of an application during development than to security. Consequences often include data breach and becoming part of a botnet.

Here is a Fox News video depicting a retailer who was “compliant” but still had 300 machines infected.

Identity Theft Expert; Data breaches continue to get more costly for businesses

Identity Theft Speaker Robert Siciliano www.IDTheftSecurity.com Article here; Data breaches continue to get more costly for businesses

Ponemon Institute LLC is all the buzz this week after publishing a study showing the cost of a data breach has risen significantly. The study points to companies being hesitant to invest in security for numerous reasons that all point to costs associated with the investments.

Any company not doing what it takes to make the necessary investments in security will eventually be outed by the criminal hacker. Its not a matter of if, but when.

Study after study points towards organized webmobs attacking every aspect of information security from Application develoment to the Wild Wild Web.

Here is a clip from a Fox News piece about a google bug hack.

Identity Theft Speaker; Hold off the hackers by scanning credit

Identity Theft Expert Robert Siciliano www.IDTheftSecurity.com Hold off the hackers by scanning credit, Boston Herald 2/1/9.

The financial meltdown has forced many to tighten the purse strings, and experts say it’s vital to keep a tighter grip on personal information. Identity thieves are lurking everywhere, and the tally of such thefts has jumped in recent years.

“With the downturn in the economy, along with hackers getting that much more sophisticated, you’re seeing a lot more desperate people, and hackers are taking advantage of that,” said Robert Siciliano, CEO of IDtheftsecurity.com.

Article here Hold off the hackers by scanning credit, Boston Herald

See the devastating effects of Identity Theft here:

Tyra Banks Monday 2/2 “Mom Police” Featuring Robert Siciliano

Monday 2/2 the Tyra Banks show “Mom Police” Featuring Robert Siciliano features moms who go to extremes to spy on their kids! These snoopy moms admit to reading their girls’ diaries and going through their cell phones and personal things. Plus, one mom wants to know where her child is at all times — and secretly plants a tracking device on her!

Like all daytime talk, its a tad sensational, but an important topic albeit. What parent hasn’t snooped on their child at some point? I know my parents did, for good reason!!

Some moms simply search draws and closets, others interrogate and pat down. And with advances in snooping technology, many parents are installing computer monitoring software, tracking kids on GPS cell phones and others are monitoring their childs text messages either remotely or right on the phone bill.

Snooping is done to protect the child from themselves and from others.

My role is to demonstrate various snooping technologies. I walk a mom through a few tools to monitor her somewhat out of control 15 year old daughter.

There may be a lack of trust, paranoia, fear, or good reason to snoop on your kids. Sometimes parent who fear, use love as an excuse to snoop. Either way, there seems to be a breach of trust between parent and child when snooping occurs (or when the child finds out).

My children are young, so I have no need to snoop. Will I? Neither you or my child will ever know. ;)~ Unless of course my child snoops on me and I end up on Tyra.

If you are a parent and have time to Tivo or watch live, I think you find this to be entertaining and educational as well.

Personal security and Identity Theft Expert Speaker Robert Siciliano www.IDTheftSecurity.com

Here is a video discussing the topic on Fox:

Identity Theft Expert and MyLaptopGPS: Reports of Agreed-to Payout to Veterans Shows How Costly Laptop Theft Can Be

(BOSTON, Mass. – Jan. 30, 2009 – IDTheftSecurity.com) Recent reports indicated that the U.S. Veterans Affairs Department has agreed to pay $20 million in damages to the 26.5 million veterans and active-duty troops whose identifying information may have been on a laptop computer and external hard drive stolen from this government agency in 2006. Widely televised and quoted personal security and identity theft expert Robert Siciliano noted that the news showed how costly laptop theft can be. He advised organizations of all kinds to invest in the far more affordable alternative: laptop tracking and data retrieval technology from MyLaptopGPS.

"Millions of lost data records can equal millions of dollars in damages," said Siciliano. "Contrast this with the fact that it costs very little to equip laptop computers with security technology — simple, responsible measures designed to protect consumers’ data and organizations’ bottom line all of a sudden make lots of sense."

CEO of IDTheftSecurity.com and a member of the Bank Fraud & IT Security Report‘s editorial board, Siciliano leads Fortune 500 companies and their clients through presentations that explore security solutions for businesses and individuals. Author of "The Safety Minute: 01" and a longtime identity theft speaker, he has discussed data security and consumer protection on CNBC, NBC’s "Today Show," FOX News Network, and elsewhere.

On Jan. 28, the Boston Globe reported on a multimillion-dollar agreement that the U.S. Veterans Affairs Department apparently made to recompense the many millions of veterans and active-duty troops whose identifying information may have been on a laptop computer and external hard drive stolen from this government agency in 2006. The lost data included names, birth dates, and Social Security numbers, thus placing an unknown number of these 26.5 million veterans and active-duty troops at risk of identity theft and fraud. Reports indicated that the laptop was later recovered.

"In this case and in so many others, the key is to install technology that acts as a laptop theft deterrent," said MyLaptopGPS’ chief technology officer, Dan Yost, who invited readers to visit the MyLaptopGPS blog to discuss the VA laptop theft. "MyLaptopGPS deters thieves from stealing a mobile computing device in the first place. In the event that a theft does occur, MyLaptopGPS’ robust technology enables a laptop’s owner to retrieve and delete data on the machine — even while the computer is in the thief’s possession."

The theft rate for laptop computers equipped with MyLaptopGPS is just 0.4 percent, or 32 times lower than the average. Additionally, Yost pointed to SafeRegistry™, a comprehensive system from MyLaptopGPS for inventorying entire fleets of mobile computers, as well as a full line of highly renowned SafeTags™, which are police-traceable property tags designed to secure iPods™, cell phones, BlackBerry™ devices and other mobile property.

Yost’s expertise has been featured twice in CXO Europe. Furthermore, in December of 2008, he and Siciliano co-delivered a presentation titled "Information in the Modern Age: Maintaining Privacy in an Era of Medical Record Identity Theft" at the 4th Annual World Healthcare Innovation & Technology Congress in Washington, D.C., where Former U.S. Congressman Newt Gingrich delivered the keynote address.

Readers who belong to LinkedIn® are encouraged to join the MyLaptopGPS group there. Featured in Inc. Magazine and TechRepublic, MyLaptopGPS maintains the Realtime Estimated Damage Index (REDI™), a running tally of highly publicized laptop and desktop computer thefts and losses and these losses’ associated costs. A log of these high-profile laptop thefts is available at MyLaptopGPS’ website.

Readers may download a demo of MyLaptopGPS. A white paper is also available.

MyLaptopGPS combines Internet-based GPS tracking with other functionalities to secure mobile computing devices. A user launches MyLaptopGPS’ features remotely, protecting data even while the machine is in a criminal’s hands. Once connected to the Internet, the software silently retrieves and then deletes files from machines as it tracks the stolen or missing hardware — at once returning the data to its rightful owner and removing it from the lost mobile computing device.

The YouTube video below shows Siciliano on a local FOX News affiliate discussing the importance of securing mobile computing devices on college campuses, where laptop theft can run rampant. To learn more about identity theft, a major concern for anyone who’s lost a laptop computer or other mobile computing device to thieves, readers may go to video of Siciliano at VideoJug.

###

About MyLaptopGPS

Since 1984, Tri-8, Inc. (DBA MyLaptopGPS.com) has specialized in complete system integration. From real-time electronic payment processing software to renowned mid-market ERP implementations, the executive team at MyLaptopGPS has been serving leading enterprises and implementing world-class data systems that simply work. With MyLaptopGPS™, Tri-8, Inc. brings a level of expertise, dedication, knowledge and service that is unmatched. MyLaptopGPS™’s rock-solid performance, security, and reliability flow directly from the company’s commitment to top-notch software products and services for almost 25 years.

About IDTheftSecurity.com

Identity theft affects us all, and Robert Siciliano, CEO of IDTheftSecurity.com and member of the Bank Fraud & IT Security Report‘s editorial board, makes it his mission to educate Fortune 500 companies and their clients. A leader of personal safety and security seminars nationwide, Siciliano has been featured on "The Today Show," CNN, MSNBC, CNBC, "FOX News," "The Suze Orman Show," "The Montel Williams Show," "Maury Povich," "Sally Jesse Raphael," "The Howard Stern Show," and "Inside Edition." Numerous magazines, print news outlets, and wire services have turned to him, as well, for expert commentary on personal security and identity theft. These include Forbes, USA Today, Entrepreneur, Woman’s Day, Mademoiselle, Good Housekeeping, The New York Times, Los Angeles Times, Washington Times, The Washington Post, Chicago Tribune, United Press International, Reuters, and others. For more information, visit Siciliano’s Web site, blog, and YouTube page.

The media are encouraged to get in touch with any of the following individuals:

John Dunivan
MyLaptopGPS Media Relations
PHONE: (405) 747-6654 (direct line)
jd@MyLaptopGPS.com
www.MyLaptopGPS.com

Robert Siciliano, Personal Security Expert
CEO of IDTheftSecurity.com
PHONE: 888-SICILIANO (742-4542)
FAX: 877-2-FAX-NOW (232-9669)
Robert@IDTheftSecurity.com
www.idtheftsecurity.com

Brent W. Skinner
President & CEO of STETrevisions
PHONE: 617-875-4859
FAX: 866-663-6557
BrentSkinner@STETrevisions.com
http://www.STETrevisions.com
http://www.brentskinner.blogspot.com