Phishers Ties Up Victims Phones, Killing Notification

Identity Theft Expert Robert Siciliano

Many of today’s automated processes are designed with security and/or convenience in mind. For example, if a credit card companies’ anomaly detection software detects irregular spending on your credit card the software may freeze your account or call you to make sure you are infact the one making the charge. While this may help to secure you, it also may inconvenience you if you are traveling overseas and are declined or just in a hurry and trying to catch a flight.

These same technologies may or may not involve a human at different touch points during their activation periods. What’s happening today is the bad guys are figuring this out and they are determining when theses touch points occur and are tricking the system so they can move forward with their fraudulent activities.

In some cases when a money transfer may prompt an automated call alerting an account holder to the transaction the only requirement of the system is to make the call. The automated system doesn’t necessarily have to talk to a human and the human doesn’t need to do anything. This seems like a flawed system.

In the case of a Florida doctor a telephony denial-of-service attack flooded the victim’s phone with diversionary calls while the thieves drained the victim’s account. In some cases, the victim heard recordings from sex chat lines and in other calls he heard dead air when answering the phone. Sometimes he heard a brief advertisement or other recorded message.

Wired reports the doctor discovered that $399,000 had been drained from his Ameritrade retirement account. About $18,000 was transferred then $82,000-transfer followed two days later. Five days after that, another $99,000 was drained, followed by two transfers of $100,000. The thieves withdrew the money in New York.

Most likely the initial compromise was via a phishing email that he responded to. Once he responded to the phish, the criminals began the process of setting up VOIP telephones systems to bombard his telephone lines so he couldn’t answer the phone to receive the alert.

Currently any financial institution that employees technology that automatically relies on the telephone system to notify account holders of a transaction is at risk.

If you mistakenly respond to a phish email and give up your data, knowingly or unknowingly, and find yourself being bombarded with a flurry of odd phone calls, it may be a sign you’re being scammed.

Invest in Intelius identity theft protection and prevention. Not all forms of identity theft can be prevented, but identity theft protection services can dramatically reduce your risk. (Disclosures)

Robert Siciliano Identity Theft Speaker discussing criminal hackers on Fox News.

The Quality of Ones Life Rests on Effective Communication Skills

I used to stutter. I had a difficult time as a child putting words together and when I did, they came out in sporadic unintelligible banter. What made it worse was my lisp. My tongue seemed too big for my mouth and my lips too big for my face.  It wasn’t easy.

It didn’t help any bit that my speech coach was a Mr Krinsthski. Try saying that and it not sound lispy. At a young age burdened with what some would call impairment, kids my age didn’t give me a moment of peace. I was bullied on the way to school, at school, and on the way home.

While I corrected my impediment by the age of 14, the bullying continued throughout Jr High and into High School. As a result, I had to learn to fight. And fight I did.

I’m pretty sure I was suspended more times than any kid who ever went through my high school for fighting. I can remember at least a half dozen 10 day suspensions which were welcomed vacations from daily beatings. I didn’t just learn to fight with my fists, I also learned to fight with my tongue.  My speech coach created a sharp tongued warrior.

As a result I made numerous trips to the school psychologist who was a man of Polish decent standing at 5 feet “tall”. This is one man who understood what it meant to be a target. He sided with me and encouraged me to keep my head up and focus on protecting myself and proving to myself that I was OK. I read lots of self help and books on motivation and began to see my place in the world.

As a result of my life experience, self defense and personal security became my life’s passion and today my life’s work.  I pursued professions revolving around security and at the same time increased my vocabulary and communication skills. I knew if I ever wanted to “sell myself” as a security professional I needed to effectively communicate.

Early on at 25 years old I attended an event with the New England chapter of the National Speakers Association.  Here I witnessed professional communicators who had tremendous passion and spoke for a living about what they loved. They actually got paid to talk! In the days of Aristotle and Socrates we would refer to them as Orators.  Here I am a few years out of the Principals office surrounded by the same people whose books I read as a kid. How do you like them apples?

Ive been a member of NSA for more than 15 years and now I’m on the Board of Directors in New England. Today I am writing this from a café in NY City across the street from 1211 Avenue of The Americas, which houses Fox News. I’ve been in that building a dozen times. Today I’m shooting a live spot on Fox for one of the largest most respected security companies on the planet. Thank you NSA.

On June 10th and 11th at the Waltham Woods Conference Center, in Waltham MA, sponsored by the National Speakers Association, New England Chapter.  There will be two full days of exceptional courses for business leaders on how to speak like a pro and leverage speaking to build your business, advance in your career, and sell more products and services.

Speaker U is a quick, easy way to gain confidence, credibility, and clients:

For the Professional Speaker:  School of Sustainability: Keeping your professional speaking business growing, going, and thriving

For the Newer/Emerging Speaker:  School of Speaking Careers: Building a successful professional speaking business

For the Corporate/Professional Service Speaker: School of Professional Presentation: Mastering the essential skills to set you

apart from the competition!

Do you want to know how to:

  • Keep your professional speaking business growing, going, and thriving?
  • Add charisma, energy and pizzazz to your speech?
  • Build credibility and new business in a changing market?
  • Create and sustain successful professional speaking business?
  • Eliminate stage fright and speak with absolute confidence?
  • Develop a natural, compelling, authentic style?
  • Get away from notes and PowerPoint when speaking?
  • Master the essential skills that set you apart from the competition?

The courses will be taught by professional speakers and business people who coach top executives and professionals.  What’s remarkable about this is the incredible value.  My professional association, NSA New England, decided to offer it for a fraction of what you usually pay for most conferences like this.

The early bird rate is $297 if paid by April 25th, $357 if paid by May 21st.

Courses you’ll find at Speaker “U”

  • Speak Like a Pro: 7 Steps to Highly Effective Presentations
  • Book Me, Book Me! What’s Really Happening in the Meeting Industry
  • Never, Ever be a Dud Presenter: Proven Strategies to Stand out at Industry Conferences and Events
  • The Art of Movement on Stage: Learning through Improvisation
  • Blood from a Stone: How to Sell in Any Market
  • Professional Dress for the Professional Speaker
  • Book Schmook! How to Create Product that Builds your Brand
  • PR/RX: A Foolproof Prescription for a Healthy PR Plan
  • Pop! Your Business, Brand Book and Speaking Career!
  • The Art of Being Fabulous: Make a Powerful First Impression with Clients
  • The Dating Game, Speaker Edition: Do you Have What it Takes to Get Booked
  • Social Media for the Aspiring Speaker
  • Get your Book Published This Year!
  • This is No Time to Be Shy: How to Reach Out And Build Relationships
  • PR and Promotion Strategies for the Emerging Speaker
  • How to Find Your Topic and Niche Market
  • The New Rules of Marketing/PR
  • And more!

And don’t forget to put it on your calendar – June 10th and 11th at the  Conference Center at Waltham Woods , 860 Winter Street,  Waltham, MA.

So if you’re around, come hang out and learn something. Check out the courses and sign up on line at  www.nsanewengland.com

Parents Navigating the Social Media Mess

Robert Siciliano Identity Theft Expert

Children say and do things that make them vulnerable to dangers in the outside world. A parent can parent all day long and do everything possible to protect their kids from themselves, but a child’s persistence to have their way can wear a parent down. It’s a constant fight that makes a parent adopt a philosophy where they “pick their battles.

Growing up, it wasn’t all that uncommon for a parent to spank their kids to teach them a lesson. I experienced the occasional “windmill” from my father that set me straight more than once. And I’m thankful for it. By all accounts, if you add up all the number of risks I took and how many times the speedometer redlined and all the stupid things I did, I really shouldn’t be writing this. If a cat has nine lives I have 999,999,999,999. I think that’s trillion.

At one point political correctness crept into our culture and the fear of a child calling the Department of Social Services (DSS) on their parents because of a deserved fanny smack sent a cold chill down every parent’s spine. I’m certainly not saying it’s OK to beat your kids, or cage them for that matter. And when a child has zero fear of a parent, they tend to walk all over them. It’s in their nature to manipulate until they get their way. I’m just sayin.

A 16 year old ungrateful, self righteous teen has filed charges against his mother for making entries on his Facebook page. The kid further filed a no contact order against his mother. The mother apparently took over his Facebook account after she noticed some reckless behavior.

She was quoted saying “I read things on his Facebook about how he had gone to Hot Springs one night and was driving 95 m.p.h. home because he was upset with a girl and it was his friend that called me and told me about all this that prompted me to even actually start really going through his Facebook to see what was going on.”

What mother wouldn’t be concerned?  Hey kid, the day you deliver anything in excess of 10 pounds out of an orifice on your body, then you can have a say. I hope you have kids just like you.

I think my head is going to explode.

Protect your identity.

1. Get a credit freeze and follow the steps for your particular state. This is an absolutely necessary tool to secure your credit. In most cases, it prevents new accounts from being opened in your name. This makes your Social Security number useless to a potential identity thief.

2. Invest in Intelius identity theft protection and prevention. Not all forms of identity theft can be prevented, but identity theft protection services can dramatically reduce your risk. (Disclosures)

Robert Siciliano Identity Theft Speaker discussing Breach of 3.3 million Social Security numbers on Good Morning America

How to Spend More Money on Home Security

Lets face it, if you had it you’d spend it, and what better way than on your families security! In today’s high tech connected world a networked and remotely monitored home security system is the way to go.

Keyless Access: Door locks that require a pincode make it easier to access without fumbling for keys. Many keyless locks are smart and can be set to allow contractors limited one time PIN access.

Remote Control Alarms: For a few extra bucks you can add remote controls to an alarm system that allow you to activate or deactivate from the driveway or online.

Robot Cameras: New and very expensive robotic camera equipped technologies will roam your property taking full day and night video.

Remote Monitoring: Having someone monitor a video surveillance system 24/7/365 is close to having feet on the ground. These same systems come equipped with speakers used to yell at the trespassers.

Bullet Proof: If you’re especially concerned about flying bullets then installing bullet proof glass, doors and shoring up your walls with bullet proof steal is a must.

Panic or Safe Rooms: A safe room provides a space where you can survive a tornado, hurricane or home invasion with little or no injury.  Residents can hide out in a relatively bullet proof, well stocked room equipped with wireless communications and wait for law enforcement to show up.

16 or 32 Camera Surveillance System: Once you go beyond 8 cameras prices start to rise. However 16 or even 32 cameras will provide you with a birds eye view of every single nook and cranny of your home extending into your neighborhood.

Robert Siciliano personal security expert to Home Security Source discussing Self Defense on Fox Boston

Social Media Sticky Situations

Robert Siciliano Identity Theft Expert

Maybe you’re a Mom or a Dad, a Student or a Grad. No matter what you are, you have a reputation to protect. How we are viewed in society matters to most people. Being viewed as someone who is respectable, responsible, someone who has integrity and is generally a decent person is what most people strive for.

To be considered otherwise, would have negative repercussions. People who are viewed as irresponsible, out of control or someone who favors ill will, doesn’t allow that person to progress effectively in a civilized society. Life is harder for people who are destructive or make bad choices.

The Internet has made our personal and professional lives very transparent. We now live in the fishbowl. Despite what many will argue, your privacy is no longer fully in your control. What you say, do and post can live forever. You are being judged in the process. And there are repercussions for those choices you make more now than ever.

Recently, a university professor who used her Facebook account specifically for her personal friendships came under fire for things she said on her Facebook account. This professor even went through the process of securing her posts by privatizing her page and not friending students. She consciously made an attempt to separate her personal and professional life.

After a long week of work she made some off color, tongue and cheek posts about students that in today’s knee-jerk-take-no-chances response world, could be considered threats of violence.  Remember, it was her belief that her Facebook page was a private one and she was speaking to her closest friends.

What everyone needs to understand is that social media is anything but private. People are watching, and waiting and many are hoping and wishing you might say something controversial which will give them something to talk about and a reason to point the finger.

Plain and simple: Don’t give anyone any ammunition to be used against you. Don’t do or say or post anything that may come back to haunt you. Whatever you post realize that you mom, dad, employer, potential employer or law enforcement may be watching.

Robert Siciliano personal security expert to Home Security Source discussing social network privacy on Fox Boston.

Most People Don’t Understand Cyber Threats

Robert Siciliano Identity Theft Expert

Michael Chertoff, who ran the Department of Homeland Security from 2005 to 2009, says there’s a reason that computer security isn’t up to the threat posed by cyber criminals: Doing it right is too complicated for most people.

“You have to offer people solutions that they are comfortable with,” he said.

Cybercrime is a huge problem that the majority of people who have a connection to the internet aren’t prepared to deal with.

While securing ones PC isn’t a daunting task once you understand the process. For most people, protecting ones PC is beyond the capacity of most computer users. The main issue is that the companies that develop this technology aren’t effective at explaining how things work in simple terms.

Educating users on the terminology is like learning a second language and for most people is near impossible due to life’s existing constraints. Which means technology companies have to do a better job of providing solutions that people are comfortable with that require little or no additional skills.

Here is an attempt at increasing your security vocabulary:

1. Run Windows Update: Or it may be called “Microsoft Update” on your PC. This is a free update to your operating system that Microsoft provides. There are two ways to access this. Either click “Start” then “All Programs”, scroll up the menu and look for the link “Windows Update or Microsoft Update.” Click on it. Your browser (Internet Explorer) by default will launch taking you right to Microsoft’s Windows Update web page and will begin the process of looking at your PC and checking to see what security patches you don’t have. Follow the prompts and click “Express” and let it lead you in the direction it wants. The goal here is for XP to end up with “Service Pack 3” installed. Or go to “Control Panel” and seek out “Security Center.” And click “Turn on Automatic Updates” and let Microsoft do this automatically. In Vista the process is similar and your goal is “Service Pack 1.

2. Install Anti-Virus: Most PCs come with bundled anti-virus that runs for free for 6 months to a year. Then you just re-up the license. If you don’t, then every day that the anti-virus isn’t updated, is another opportunity for criminal hackers to turn your PC into a Zombie that allows your computer to be a Slave sending out more viruses to other PCs and turning your PC into a Spambot selling Viagra.

3. Install Spyware Removal Software: Most anti-virus providers define spyware as a virus now. However, it is best to run a spyware removal program monthly to make sure your PC is rid of software that may allow a criminal hacker to remotely monitor you’re keystrokes, websites visited and the data on your PC.

4. Run Firefox: Microsoft’s Internet Explorer is clunky and the most hacked software on the planet. Mozillas Firefox is less hacked and more secure. Maintain the default settings keep the pop-up blockers and phishing filters on.

5. Secure Your Wireless: If you are running an unsecured wireless connection at home or the office, anyone can jump on your network from 300-500 feet away and access your files. Serious. The router has instruction on how to set up WEP or WPA security. WPA is more secure. If this is a foreign language to you, then hire someone or get your 15 year old to do it.

6. Install a Firewall: Microsoft’s operating system comes with a built in firewall. But it is not very secure. Go with a 3rd party firewall that is prepackaged with anti-virus software.

7. Use Strong Passwords: Little yellow stickys on your monitor with your passwords isn’t good. Use upper case, lower case, alpha-numeric passwords that you change up every 6 months.

Robert Siciliano personal security expert to Home Security Source discussing hacked email on Fox News.

America’s Most Wanted Teen

Robert Siciliano Identity Theft Expert

Colton Harris Moore stole a bicycle at the age of 8 and never looked back. Now 6 ft. 5 in. and 18 years old, Harris Moore is suspected in over 100 burglaries in the Pacific Northwest. Recently he has been credited with stealing cars, speedboats and now airplanes (at least 3). He is known as the “Barefoot Burglarbecause he kicked off his shoes running from the police through the woods.

This 18 year old has never taken a flying lesson and has achieved celebrity like status with over 20,000 Facebook fans. However, Harris-Moore isn’t one to be celebrated. He steals as much from the average hard worker as he does from the dotcom rich.

He breaks into homes to get what he needs to survive in the woods and it is believed he enjoys the high living in the unoccupied rich vacation homes. He’s been known to make himself a bowl of ice cream and take a hot bath.

Generally, he will break in and copy down credit card numbers out of wallets, opposed to stealing the whole card, to avoid detection. He was accused of using a homeowners PC to buy a $6500.00 pair of night vision glasses and bear Mace. He’s also charged thousands of dollars in police scanners, video games and GPS devices.

He’s also accused of stealing an assault rifle out of a cop car. Which means he’s potentially armed and dangerous.

1. Install outdoor lighting on timers and motion sensors.

2. Make sure your home has a “lived in” look.

3. Use indoor timers for lights, TVs and automatic shades.

4. Install security cameras that can be remotely monitored.

5. Install a home alarm system monitored by an alarm company and the police.

Robert Siciliano personal security expert to Home Security Source discussing home security and identity theft on TBS Movie and a Makeover.

Who Are Your Kids Chatting With On Their Webcam?

Growing up we used to spend hours prank calling people we knew and also calling completely random numbers. The best calls were when you got someone on the line that got all mad and reacted in a way that made us want to call that person every five minutes forever. We just needed “stimulation.”

Then we grew up. Just in time for caller ID and no more prank phone calls. Back then, the telephone was the only technology we had access to, other than walkie talkies and hacking CB radios. Today is a whole new era.

All along we were told “not to talk to strangers.” It was the stranger that was strange and most likely to hurt you. Since then, “stranger danger” has been rebuffed by many. However new technologies are bringing back the danger in the stranger.

Your 12 year old daughter chatting in a park or online with a 35 year old stranger isn’t good. Chatting with that same 35 year old with a webcam is a disaster that will happen.

Then comes Chatroulette.

“Parents need to know that Chatroulette allows anyone with a webcam and Internet connection to instantly video chat with any other visitor anywhere in the world. Even if you don’t have a web cam, you can still use the site and view the other people using it. All you do is go to the site’s homepage, click a button to sync your webcam, and you are instantly connected randomly with other users.”

1. Talk to your kids about sites like these and the risks they pose.

2. Discuss both the good and potential bad intentions someone may have when on a site like this.

3. Explain how the anonymity of a site like this can motivate people to do and say things that aren’t socially acceptable in public.

4. Communicate to them that adults have a way of extracting information from minors and can manipulate them into saying and doing things they may later regret.

Robert Siciliano personal security expert to Home Security Source discussing Webcam Spying on The CW New York.

Security Increases After Grad Student Attack Off Campus

Robert Siciliano Identity Theft Expert

I see headlines like this every day. “Security increases” because we wait until something bad happens until we do something about it. How about we increase security right now because there is a small chance something bad can happen? Like the Boy Scouts, “Be Prepared.

Some time ago a home invasion in Connecticut took the lives of a mother and her two daughters while the Doctor father was tied up in the basement. Bad things happened to the women and the home was eventually set ablaze. This is the single worst home invasion I’ve ever seen. The case is in the courts now. This is a perfect example of what “Predators” are.

There always has been, is, and always will be predators stalking their prey. Unfortunately, this is the natural order of life. Predators are a part of many of life’s species. Growing up my dad sat me in front of the TV and made me watch documentaries on animal behavior.

“In the animal world”, he pointed out, and then he specifically pointed towards the lion and said “there are predators and their natural prey”. The lion hunts and stalks other animals and kills, then eats them. He explained that it’s normal for the lion to kill, its OK, it might not be nice of the lion, but that’s just the way it is.

He went on to say that in the human world, it’s the exact same thing. That there are human beings that act exactly as the lion, and its normal. Its not OK, its not nice, but that’s just the way it is. Lots to digest when you are 12. The fact is dad was right.

Some may know the story of the “Frog and the Scorpion.” Scorpion asks a frog to take him across the river on his back. Frogs like, no way dude you’ll kill me. Scorpion says “hey man, I won’t kill you, if I did I’d drown too” Frogs like, “OK man, sounds reasonable, lets do it”. Frog gets halfway across the river and the scorpion stings him! Surprised, the frog asks why, because now they will both drown, scorpions says, “Stupid frog, I’m a scorpion, its what we do. Predators are predators by nature.

There are over 500,000 registered sex offenders in the US. There are thousands more that aren’t registered and many more that simply haven’t been caught.

It’s unfortunate they can’t just be kept in jail. But this is the land of the free and the brave and we have rights. Even the child molesters have rights.

So here’s the deal. If you live in a house (which most of us do), chances are there are sex offenders near where you live and work. Its not enough to know that there are bad guys out there looking for their next victims. It’s important to do something about it. Take a self defense class, bone up on your eye gouging, and teach those you love how to protect themselves. Remember, once a scorpion, always a scorpion.

Robert Siciliano personal security expert to Home Security Source discussing Predators on the Gayle King Show

Please Hack Me. My Password is 123456

Robert Siciliano Identity Theft Expert


Is this you? Are you a hackers delight? Are you a lazy lima bean begging to be hacked? Recently, there were 32 million passwords stolen last month from a social media site. Upon observation, researchers determined 1 percent of the 32 million people it studied had used “123456” as a password. The second-most-popular password was “12345.” Others in the top 20 included “qwerty,” “abc123” and “princess.”

In another breach thousands of email addresses and their passwords were phished by identity thieves and posted in an online forum. Researchers parsed the hacked passwords and broke them down into categories based on their level of security. For example some of the passwords were very weak “111111” “123456” “1234567” “12345678” “123456789” made the top list. Many of the stolen passwords were people’s first names which of course could be kids, spouses, etc. Obviously, anyone who uses an insecure password like this is more likely to get hacked due to their laziness and less than sophisticated approach to security. 60% of the passwords contained either all numbers or all lowercase letters.

Beefing up passwords using a password manager is much easier. Combine uppercase and lowercase letters, as well as numbers and characters. Don’t use consecutive letters or numbers, and never use names of pets, family members, or close friends. Instead use the first letters of phrases: Full moons on Saturday bring out whackos @12am!: is FmoSbow@12am! That’s a strong password that no sane person will enter manually. But a password manager makes it possible.

I’ve tried every possible password manager on the planet. There is only one that I have found to be incredibly efficient and secure. Roboform. This thing works great. I have it on 5 PCs and the iPhone and they all sync automatically.

Robert Siciliano personal security expert to Home Security Source discussing Hacked email on Fox News