Posts

Whats Next: “On Demand Burglary”

Generally when a burglar or thief sets out to break into a home their motivation is to steal any item they can sell at pawnshops or to those on the “black market”. The phrase “black market” has always intrigued me.   It means doing business “in the dark” or out of the view of law enforcement. Any underground economy where business is done illegally or with illegal goods or services is considered the black market.

There has always been a black market demand and there always will be. Certain things like illegal drugs are a staple of this economy. “On Demand Burglary” refers to items that someone may have had their eye on and the thief meets that demand. On the low end one might envision a bicycle a neighbor just bought for his kid and on the high end an expensive rare painting a collector wants.

The BBC reports a man in the UK was injured when he walked into his home and surprised three men armed with a sledgehammer and a crowbar robbing his house. They stole money, jewelry and the family’s valuable pet Chihuahua. The family has offered a reward for the return of the dog which is called ‘Bruce’.

The homeowners’ son was quoted saying “They took mum and dad’s wedding ring and a wee bit of money, but the thing that has really vexed them is that they have taken the wee house dog called Bruce and it’s that, that has really upset them.”

Local Police were quoted saying “The belief is that these robberies are ‘on demand burglaries’ where robbers are stealing to meet orders”.

Consider for a moment if you spent the time to research an item then went out of your way to buy it, it is certainly in the scope of a bad guy to target it and take it.

Protect yourself and prevent a home invasion:

Nothing you own is worth fighting for. If someone ever wants your stuff let them have it.

If you ever walk in on a burglar turn around and run out of the house. The quicker you leave the safer you will be.

Consider what you own that might catch the eye of a criminal and who that criminal may be and what you need to do to protect it.

Invest in a home security system. The concern is protecting life and limb first and protecting your stuff second.

Robert Siciliano personal security expert to ADT Home Security Source discussing Home Security on NBC Boston. Disclosures.

Google Ordered to Name Cyberstalker

Stalking is about domination. It is one or more persons continually making efforts to control another person’s life and thoughts by paying unwanted attention. Stalking is when someone contacts you when you repeatedly request that they do not. They watch, follow, call, email, text, fax or continually send mail to you after you request they do not. Stalking is psychological terror. Celebrities and everyday people are potential victims of the stalker.

Stalkers become obsessive investigators, interrogators, intimidators and terrorists. Some stalking statistics report almost a million and a half people are being stalked by an ex-boyfriend, ex-girlfriend, ex-husband, ex-wife, estranged husband, estranged wife, secret admirer, or an infatuated mentally unstable individual.

Stalkers make you a prisoner in your own life. They make it known that they know where you have been, whom you have spoken to, what you have done and where you are going next. They insist that they cannot live without you and you cannot live without them.

With today’s technology, stalking has never been easier to stalk and it’s never been easier for stalkers to hide.

Until now.

Information week reports “A New York judge has ordered Google to reveal the identity of a cyberstalker who has anonymously posted video and messages on the Internet. The videos included sexual slurs and damaging information that could affect the woman’s reputation and career.

She was quoted saying “I don’t care about being called names. It was a safety issue. The Internet cannot become a safe haven for harassers and stalkers.”

And how right she is.

Cyberstalking is going away, but finally government and corporations are now thinking progressively and considering victims of these crimes and acting on their behalf accordingly.

Tips:

Set up Google alerts to keep you in tune to any postings of your name.

If something comes up that is in any way threatening report it to the police and develop a paper trail.

Every internet site has some form of “contact us” page that you can submit your concerns too.

If you do not get any response have a lawyer send a letter.

Dogs: this is also a good time to get a vicious dog. With little research a fully-grown Doberman, Pit-bull, German shepherd, Rottweiler or any other dog trained to kill can be a lifesaver. There are many outfits that will rent you a guard dog while you are in jeopardy.

Make sure you notify friends, family, neighbors, co-workers and local businesses who you are a customer of and acquainted with what your situation is and show photos of the stalker. Your circle of relationships might be a significant factor in staying safe.

Self Defense: knowing how to disable an attacker armed or unarmed should be a staple of everyday living. When you are being stalked you are essentially at war and need to understand the fundamentals of armed and unarmed combat. Once you have the tools to debilitate another human being, that’s when you decide if carrying a weapon is appropriate.

Home Security: if there was ever a time to install an alarm, it is when you are being stalked. Make sure it is monitored by local law enforcement and keep it on while you are home during the day and when you sleep at night. Wireless alarms can be installed quickly and there are no phone lines to cut.

Robert Siciliano personal security expert to Home Security Source discussing burglar proofing your home on Fox Boston. Disclosures.

25 of Americas Most Dangerous Neighborhoods

What’s the point in even knowing what the most 25 dangerous neighborhoods are? For one thing, if you live in one, you may already have a sense of it, but it would be good to know you’re considered high risk and might want to take the extra precautions and batten down the hatches. Plus for those of you who think it can’t happen to you it may be one more reason you should LOCK YOUR DOORS.

If you plan to move, it is always good to understand the crime climate of the environment you are considering. Checking this list and also contacting the local authorities will help give you an idea of what is going on.

Another great way to determine crime climate is the police blotter. If the police blotter mentions lots of violent crimes vs. another town that mentions lots of cats stuck in trees then you know what to expect. For example in Wellesley Massachusetts, a few towns over from where I live the headline in the police blotter is (and I kid you not) “Escaped cow takes to Wellesley streets” Nice.

Otherwise if you travel on business or plan to send a kid to college, knowing the crime climate of any given neighborhood is a good idea.

Chicago took the number one spot. Cleveland second. Then a couple in Vegas, and Atlanta took 4 places and Ohio a few more. So that being said see the 25 Of Americas Most Dangerous Neighborhoods all HERE.

Every family must have a plan for home security and a home security alarm.

Consider a trained German shepherd as a protection dog as well.

Another consideration is a home safe-room also known as a “panic room” where families can hide out in a relatively bullet proof, well stocked room equipped with wireless communications and wait for law enforcement to show up.

Never talk to strangers via an open or screen door. Always talk to them through a locked door.

NEVER let children open the doors. Always require an adult to do it.

Install a 24-hour camera surveillance system. Security cameras are a great deterrent.  Have them pointed to every door and access point.

Robert Siciliano personal security expert to Home Security Source discussing home invasions on the Gordon Elliot Show. Disclosures

Identity Theft Part 2 – 5 More Identity Theft Myths Unveiled

#1 Publically available information is not valuable to an identity thief.

If I was an identity thief I’d start with the phone book. All information about you is of value to an identity thief. The bad guy gathers as much intelligence about you as possible. Once they get enough data to become you they are off and running. The breadcrumbs we leave behind and the information we post is all used to help them gather a complete profile.

#2 Shredding will protect me.

Shredding will keep some of your data out of the hands of a dumpster diver. But when your information is hacked because someone like your bank was hacked or your mortgage broker threw it away, you are vulnerable. While you should still shred, you should also invest in identity theft protection and a credit freeze.

#3 I don’t use the Internet, I pay in cash, my credit stinks, so I am safe.

Wrongo bongo. While you may not use the internet, others that have your information in their internet connected databases make it vulnerable. Using credit cards doesn’t mean your identity is at risk or using cash means you are any less at risk. Credit card fraud isn’t identity theft. It’s credit card fraud. Just call the credit cards issuing bank and refute the charges within 60 days and you are fine. Bad credit just means not all lenders will grant you credit. Everyone with a SSN, a pulse and even some who are dead are vulnerable.

#4 My privacy settings in social media sites are locked down, so I am safe.

Negative. The mere fact you are sharing personal identifying information of any kind with anyone online means you are at risk. Anyone who you are connected to is a potential leak, whether you know them or not. If you tell a secret to one person, you are vulnerable. If you tell it to 250 people, the secret is out. Never share information in social media that could be used to crack the code of a password reset.

#5 Shopping or banking online isn’t secure.

It all depends. More than likely the etailer or bank where you do business is more secure than your PC. It is often the consumer who is the path of least resistance to fraud. As long as your PC is secured with updated antivirus and spyware protection then you should be fine. Always look for httpS:// in the address bar. The “S” means it’s a more secure site.

Robert Siciliano personal security expert to Home Security Source presenting 20 slides on identity theft at 20 seconds each to the National Speakers Association. Disclosures.

Part 1 of Identity Theft – 5 Identity Theft Myths Unveiled

#1 You can’t protect yourself from identity theft.

Some, not all Identity theft is preventable. There are many things people can do to minimize their risk, both online and offline. Shred anything that has names and account numbers or any other data that can be used to con someone else into divulging even more information. Keep financial records protected and private in a locking file cabinet at home or protected PC. Opt out of junk mail. Invest in an identity theft protection service and get a credit freeze.

#2 Identity theft is only a financial crime.

There is also medical identity theft when someone poses as you to get medical attention, criminal identity theft when the thief commits crimes under your identity. There is also employment fraud when they use your SSN to get a job and identity cloning when the thief is simply trying to evade the law or others by posing as you in plain sight.

#3 Technology and computers are why identity theft is so big.

Certainly data breaches are responsible for some identity theft. However, low tech identity theft is the bigger problem. A lost or stolen wallet, checkbook, or a debit or credit card handed over to a clerk or information tossed in the trash are all the most prevalent ways your identity is jacked.

#4 Caller ID is safe.

Caller IDs are easily spoofed with technology that allows the bad guy to change what shows up on your handset. First, no matter who calls, never giver personal information over the phone if you stand to gain or lose something or if the caller states your data was lost in a computer crash. Always use the phonebook or look up the number online and call them back.

#5 Checking your credit report protects you from identity theft.

I’ve always though thought this was silly advice. Checking your credit report just tells you if your identity has been stolen. But you should still check your credit report as often as possible. Some identity theft protection services let you check it every day. I’d check it monthly if you have the option.

Robert Siciliano personal security expert to Home Security Source discussing identity theft on YouTube. Disclosures.

National Protect Your Identity Week is October 17-23

The first decade of the new millennium is almost over, another year has passed and by my estimates identity theft as we know it is not getting any better, it is getting worse. I’m a big believer in the fundamentals and some things just can’t be said any other way, and to remind you I’m taking a page from a post from an entire year ago because it is absolutely essential that you – the public, corporations, associations and government agencies, all take responsibility and do what is necessary to protect yourself, your clients and your constituents.

Identity theft isn’t going away any time soon and therefore it is essential that you consume as much information to educate yourself, inform others and prevent identity theft from happening under your watch. Like any problem that we may face in life, we do our best to find a speedy and efficient solution. However identity theft is one of those problems that acts like a 10 headed monster that we keep chopping the head off but it keeps growing a new head, a new leg and a new arm.

Because we are a persistent and resilient people, and we never ever give up, we will prevail. The National Foundation for Credit Counseling has created National Protect Your Identity Week from October 17-23 to create awareness and provide information. The solution requires a coordinated effort between every single citizen, company and government official to see the big picture and to do what’s right and put the necessary systems in place that prevent the bad guy from doing his job. The solutions are near. Some of them are already in place. It’s just a matter of everyone getting on the same page and coming to an agreement.

Understand there has always been, and will always be a criminal element looking to take from those who have. The bad guy (and gal) persistently looks for their next victim all day, every day. Your job is to become informed and know what it means to become a tougher target. And in the meantime those who are responsible on a higher level to protect us, and our critical infrastructures, methods of commerce, and ways in which we identify ourselves will continue to work on the big stuff. But they need you to be aware and alert and actively participate in the process. We are all in this together.

The Pentagon and the Department of Homeland Security are hiring thousands of computer experts to protect our networks. But the weakest link in the chain is not the government, but the citizens. Government has lots of work to do, but moms and pops are the most vulnerable. Enterprise networks have become hardened, while small business and the lowly consumer know enough about information security to get hacked. Awareness is key. You are either part of the problem or the solution.

Read this and every possible blog, article and report you have access to so you can stay on top of what is new and ahead of what is next in technology and the security necessary to keep it safe. Build your IT security vocabulary. Become an expert in identity theft and information security. Be the go-to-person in your home or organization who has all the answers to the problem.

A number of national organizations are also putting their weight behind this initiative, joining the NFCC and BBB as Supporting PYIW Coalition Members.  This Coalition includes: American Bankers Association Education Foundation, American Financial Services Association Education Foundation, American Payroll Association, Consumer Action, Consumer Data Industry Association, Consumer Federation of America, Credit Union National Association, Federal Reserve Board, Federal Trade Commission, FICO, Foundation for Financial Planning, Identity Theft Assistance Center, Identity Theft Resource Center, Jump$tart Coalition for Financial Literacy, Junior Achievement USA, National Association of Triads, National Council of La Raza, National Crime Prevention Council, National Education Association Member Benefits, National Sheriffs’ Association, the Office of the Comptroller of the Currency and the Social Security Administration.

Robert Siciliano personal security expert to  Home Security Source discussing home security and identity theft on TBS Movie and a Makeover. Disclosures.

5 Sneaky Credit Card Scams

#1 Phone Fraud. The phone rings, a scammer poses as your banks fraud department. They may have your entire card number stolen from another source. They ask about a charge made and you deny the charge, but in order for the charge to be removed, they need your 3-4 digits CVV number off the front or back of the card. A variation may be they only have the last 4 digits found on a receipt or statement you threw away. They can also use the same ruse to get the full 16 digits from you.

#2 Clever Clerk. You hand your card to a sales clerk, waiter or waitress and they have a card reading wedge device that looks like this. The device may be wrapped around a band on their ankle. They bend over and make it look like they are fixing a sock, once they swipe the card through, they can make charges on your card.

#3 The Loop. You’re at an ATM that isn’t cooperating. Some nice guy injects himself into the scene to help you. During the process he watches you enter your pin. After another attempt the ATM eats your card. After you leave all upset, he pulls the card from the ATMs card slot using a loop of VHS tape he jammed inside the machine.

#4 Risky Retailer. When searching for something on the web you come across a website with a great deal. In the process of ordering they inform you a discount is available along with a free trial of another product. Thinking you just made out on the deal you take the bait. Next thing you know your card is charged every month and the company makes it very difficult to cancel the charges.

#5 Cell Snap. While buying something at a store you swipe your card through the point of sale terminal. If you are using a debit card you also need to punch your PIN into the keypad. The guy one or two people behind you filmed the entire transaction including your PIN on his mobile phone.

Robert Siciliano personal security expert to Home Security Source discussing Home Invasions on Montel Williams. Disclosures

Just One Day in the Boston Globe

Sometimes all you can do is shake your head and wonder how we have managed to get this far as a species. Scanning today’s paper I couldn’t help but notice the total mayhem that makes up one day of news. I bring this to your attention not to sensationalize or provide the “bad news” but to make you grateful for what you have and hopefully motivate you to go out and do something positive to help your community. It also might make you think twice about your personal safety.

October 6th 2010:

Hundreds mourn victim of Mattapan shootings

Simba Martin’s family huddled around his shiny, pewter-colored casket yesterday morning, their cries of grief filling the small red-brick church on Highland Street. Near the altar, a female relative shouted “why’’ repeatedly as she slumped in the embrace of a family member.

Death of Vt. woman is called a homicide

WATERBURY, Vt. — A body found in the woods Sunday by two bird hunters has been identified as that of a missing 78-year-old woman, and police called it a homicide yesterday.

Judge sets rules for N.H. slaying trial

CONCORD, N.H. — Three men who have acknowledged their roles in a deadly home invasion in which a woman and her daughter were stabbed and slashed dozens of times will be allowed to testify about the plot leading up it, a judge says.

Onetime serial arson suspect accused of setting office on fire

PLYMOUTH — A Brockton man who decades ago was a prime suspect in the torching of dozens of churches, VFW posts, and other buildings in the area south of Boston was accused yesterday of setting fire to a federal probation office Monday night.

Man allegedly stole more items from grandmother after theft

A Braintree grandmother’s house was robbed Monday afternoon, and police said that as they arrived to investigate, the victim’s grandson stole more items and tried to have a friend pawn them while blaming it on the original burglar.

1 student robbed, 1 nearly abducted

One Bay State College student was robbed and another was the victim of an attempted abduction in two separate incidents yesterday afternoon, police said. Boston police spokesman David Estrada said that at about 2:30 p.m. an 18-year-old student was walking out of a Subway restaurant on St. James Street when he was robbed by a man armed with a knife.

Man ordered held in statutory rape case

A 31-year-old Tewksbury man accused of raping a 14-year-old girl in August after sending her sexually charged text messages for a month pleaded not guilty yesterday, officials said.

Man sentenced for trying to lure teen

A Dorchester man already convicted of sex offenses against children was sentenced to up to five years in state prison and 10 years’ probation Monday for attempting to lure a 13-year-old girl who was on her way to school in 2009

Man convicted of killing three in 2007 Conn. home invasion

NEW HAVEN — A paroled burglar was convicted yesterday of killing a woman and her two daughters in a 2007 home invasion in an affluent Connecticut town and now could be sentenced to death.

Wow. Nuts! It can be a mad, mad, mad world sometimes. But being kind to someone takes less effort than being evil. Choose wisely. And please, think about home security and what systems need to be in place to protect your family.

Robert Siciliano personal security expert to Home Security Source discussing Home Invasions on Montel Williams. Disclosures

Be On The Pulse of Your Home Security

Being on top of what is new and ahead of what is next in technology has always been my thing. I had a beeper the size of a pack of cigarettes and a mobile phone bigger than a shoe box.  I’m somewhat of a gadget geek. I like new and shiny. However, when it comes to all these new technologies I am far from a first adopter.

First adopters are the ones who camp out overnight, wait in line and generally spend lots of money on something not ready for prime time. Sometimes there are flaws with new technologies that need to be worked out before you should get involved in them. My suggestion is to always let others make the mistakes and learn from them, and then you benefit from what they went through.

When it comes to home security and home automation, there have been many innovations in these technologies, most of the mistakes have been made and lots of them have gone the way of the wooden nickel.  ADT has taken their time and carefully orchestrated the best of the best technology and combined home security and home automation and created ADT Pulse. This is a “ready for prime time” technology that has learned from everyone else’s mistakes.

ADT Pulse is a new interactive smart home solution that goes beyond traditional home security to provide a new level of control, accessibility and connection with the home.

Connectivity and interactivity are driving the way people live and manage their homes.  ADT Pulse provides customers with anywhere, anytime access to their home via smart phones or personal computers, including an iPhone application to:

  • Arm and disarm their home security system.
  • Get notified of alarms and selected events via email and text messages as well as video clips.
  • View their home through cameras and watch secure real-time video or stored video clips of events from monitored areas of the home.
  • Access lights and appliances or set schedules to automate them.

All of these options have been around for years, but nobody has gotten them right until now. If you travel for business, have a vacation home, go away for the weekend or simply want to check in while you are at school or work, this technology is for you.

Robert Siciliano personal security expert to Home Security Source discussing Home Security on NBC Boston. Disclosures.

7 Ways to Combat Scareware

You may have seen this before, it goes like this: a pop-up pops and it looks like a window on
your PC. Next thing a scan begins. It often grabs a screenshot of your “My Computer” window
mimicking your PCs characteristics then tricking you into clicking on links. The scan tells you
that a virus has infected your PC. And for $49.95 you can download software that magically
appears just in time to save the day.

From that point on if you don’t download and install the software, your computer goes kooky
and pop-ups will invade you like bedbugs in New York City.

Web pages may be infected or built to distribute scareware. The goal is to trick you into clicking
on links and download their crappy software.

Information Week reports those behind a new fake antivirus software have added a new social engineering element — live support agents who will try to convince potential victims that their PCs are infected and that payment is the cure.

The rogue software comes equipped with a customer support link leading to a live session with the bad guy. Real scammers on the other end of chat have the ability to offer live remote access support instructed by support to click a link initiating remote access to their PC.  Once connected remotely, the scammer can potentially retrieve documents to steal your identity.

Another new twist on the scam involves a popup in the form of a browser with a warning that looks like what your browser may present to you when you visit a page that might have an expired security certificate, malware warning or be a potential phishing site. The page is usually red with a warning: “Visiting This Site May Harm Your Computer” then it provides you with a link, button or pop-up that gives you the option of downloading security software or to update your browsers security.

The software is sometimes known as “AntiVirus2010” “WinFixer,” “WinAntivirus,” “DriveCleaner,” “WinAntispyware,” “AntivirusXP” and “XP Antivirus 2010” or something like “Security Toolkit”. These are actually viruses or spyware that infect your PC, or just junk software that does nothing of value.

What makes the scam so believable is there is actual follow through of the purchasing of software that is supposed to protect you. There is a shopping cart, an order form, credit card processing and a download, just like any online software purchase.

Protect yourself:

#1 Use the most updated browser. Whether Internet Explorer 8, Chrome or Firefox, download the latest and greatest. At least download whatever security updates there are for your exiting browser.

#2 Usually by default, a pop-up blocker is turned on in new browsers. Keep it on. No pop-ups, no scareware.

#3 If you are using another browser and a pop-up –pops-up, shut down your browser. If the pop-up won’t let you shut it down, do a Ctrl-Alt-Delete and shut down the browser that way.

#4 Never click links in pop-ups.  If the pop-ups are out of your control, do a hard shutdown before you start clicking links.

#5 Persistence counts. Shutting off this pop-up is often difficult and any buttons you press within this pop-up could mean downloading the exact virus they warned you of.

#6 Employ the most recent versions of anti-virus and keep it set to automatically update your virus definitions.

#7 Never click on links in the body of a “WARNING” webpage that is suggesting to download updates for your browser or suggesting to download security software. Just hit the little red X in the upper right corner.

Robert Siciliano personal security expert to Home Security Source discussing home security and identity theft on TBS Movie and a Makeover. Disclosures.