Posts

Chicago: Homicides up, Citywide Crime Down 5.8 Percent

Thanks to Al Capone the infamous gangster, The Windy City has long been known for organized crime dating back to the 30’s. In concentrated areas like big cities, crime is often a factor. But as proven in New York City, effective policing can reduce crime. Chicago seems to be making positive strides in managing its crime climate as well.

Law enforcement in Chicago just announced there was an 11.2 percent drop in violent offenses and 4.2 percent decrease in property crimes. However the 164 recorded homicides in 2010 are six more than last year at this time, an increase of 3.8 percent.

The Chicago Suntimes reported “Homicides have continued to challenge us,” their Chief said, adding that the department will continue to deploy officers to areas where there is a probability of violent crime. “The safest place for your children is in your home under your supervision,” he said. Chicago police also seized 3,513 weapons, which were 189 more than last year. It breaks down to an average of nearly one weapon recovered an hour for the entire year so far.

Imagine if they didn’t get those weapons off the streets.

They further reported there were nearly 2,000 fewer property crimes, a drop of more than 4 percent including a drop in theft at 9.8 percent and burglary at just under 1 percent.

Taking into account the small rise in murders, the overall drop in crime is impressive. Whether you are from a little town or a big city the most effective way to reduce crime is to take an individual responsibility in your own personal security by reaching out to local law enforcement and finding out what systems they may have in place and what kind of information you can bring back to your neighborhoods.

Attend neighborhood watch meetings that may be sponsored by the local police. Work to get everyone on the same page in regards to monitoring your neighborhood to seek out suspicious behavior and report incidents that may lead to crime. Take direct responsibility for yourself and your family by installing heavy duty locks, locking your doors, and install a home alarm system.

Robert Siciliano personal security expert to ADT Home Security Source discussing Home Security and Identity Theft on TBS Movie and a Makeover. Disclosures.

Brazen Burglars Broke into the Same House Three Times in a Week

In the first hit they made off with a television and four-figure sum of cash, plus a key to the garden shed.

They came back, let themselves into the shed, and took garden tools but were spotted by the returning home owners.

The GazzetteNews reported the homeowner investigated after noticing the shed door was open, and saw four people in the park behind the house, two of them were holding the tools stolen from the shed and the group ran off.

The burglars then made a third attempt on the house and caused damage to the property.

Local law enforcement well aware of the ongoing break-ins assembled a team of detectives to thwart the property crimes and to try and break the pattern.

Their strategy is to visit well-known suspects, keeping tabs on their whereabouts and doing what they can to “divert these individuals from crime.

“They also work closely with victims, providing them with support and giving them advice on home and personal safety. “Anyone who has had to deal with a burglary will know that it’s not just the financial loss that is difficult; more often than not, items of huge sentimental value are taken, so it also has a huge emotional impact too.

“This is completely unacceptable and the teams will be doing all they can to prevent this from happening to residents in our communities.”

Bravo to all involved in the effort to preserve the sanctity of citizen’s rights to safety and security.

But what’s missing in this story is the homeowner being proactive and doing something to keep the burglars out in the first place. Often a home alarm monitored at a dollar a day will do the trick. In my case, first my cameras see them coming day and night and that notifies me with an audible alert. Second, once they get close enough the German Shepherd lets me and them know she is ready. Third, the doors and windows are all locked. Fourth they need to get through the home alarm system and if they trip it, the local police are called.

If they do make their way in, the Shepherd knows what to do next. Me? If I’m home I’m taking the family out of there as quickly as possible and heading to safety, then pizza.

Robert Siciliano personal security expert to ADT Home Security Source discussing Home Security on NBC Boston. Disclosures.

Phishing Scam: Using the U.S. General Commander in Iraq as Phish Food

Fishing of course is the sport of tossing a tasty wormy baited hook connected to a fishing line and patiently waiting for a fish to take the bait.

Phishing is the sport of tossing a wormy baited tasty lie connected to a wormy human and the degenerate patiently waits for a naïve victim to take the bait.

A phisher can send thousands of phish emails a day and eventually someone will get hooked.

Phishing is a $9 billion business. Unlike the ongoing depleting of the oceans fisheries, there are PLENTY of people out there to phish. Many of them today are from developing nations like India and China who are just getting a broadband connection to the internet and are considered fresh meat to the bad guy.

The New York Times reports “if you get an Internet appeal from Gen. Ray Odierno, the senior American commander in Iraq, asking you to pay lots of money to get your son or daughter out of combat duty, don’t believe it. And certainly don’t send the $200,000. General Odierno acknowledged that he is but one more victim of a social networking scheme offering a big — but fake — benefit, if you send big amounts of real money.

“I’ve had several scam artists on Facebook use my Facebook page and then go out asking people for all kinds of money: ‘If you pay $200,000, your son can get sent home early,’” General Odierno said at a Pentagon news conference.

Criminals may seek out military families and target them one by one or send a blast to thousands at a time and use a ruse that pulls at the heart strings of unsuspecting families who simply want their loved-one back home.

The General posted a large warning on his social networking site. “I have this big thing on my Facebook that says, If anybody asks you for money in my name, don’t believe it,” he said. “But it’s a problem.”

Frankly, I don’t like the idea of an American General having a Facebook page. It weird’s me out. Hopefully the high commander isn’t uploading pictures of himself doing shots of tequila while driving a tank.

My guess is there is someone out there who has the money and is probably acutely unaware of this type of scam, then is probably capable of getting hooked.  But more than likely nobody will cough up $200,000. But the scammers know to start high and they will go low. They will take a $1000.00 when it comes down to it. But they also know that people won’t argue with a General and nobody will “discount” the value of their loved-ones life. So overall it’s a pretty good scam. Just don’t take the bait.

Robert Siciliano personal security expert to ADT Home Security Source discussing Facebook scams on CNN. Disclosures.

Facebook + Hackers – Privacy = You Lose

I’m as sick of writing about it as you are sick of reading about it. But because Facebook has become a societal juggernaut: a massive inexorable force that seems to crush everything in its way, we need to discuss it because it’s messing with lots of functions of society.

We should all now know that whatever you post on Facebook is not private. You may think it is, but it isn’t. Even though you may have gone through all kinds of privacy settings and locked down your profile, Facebook has changed them up internally so many times that they may have defaulted to something far less private then what you previously set.

Furthermore, no matter how private you have set them to, if you friend someone who you don’t know (like that human resource officer), they see what’s “private” and anyone on the “inside” can easily replicate anything you post to the world.

The activist groups waging what amounts to an undeclared war against the social-networking site for the last year, complete with no fewer than three letters to federal regulators claiming Facebook’s actions are illegal said that they’re hardly ready to declare a truce.

Attacks targeting Facebook users will continue, and they could easily become even more dangerous. Computerworld reports “There are limitations to what Facebook can do to stop this,” said Patrik Runald, a U.K.-based researcher for Websense Security Labs. “I wouldn’t be surprised to see another attack this weekend. Clearly, they work.”

Websense has identified more than 100 variations of the same Facebook attack app used in the two attacks, all identical except for the API keys that Facebook requires.

What does this mean to you?

For crying out loud stop telling the world you hate your boss, neighbor, students’ teachers, or spouse and you’d like to boil a bunny on the stove to teach them a lesson. I guarantee even if you are kidding, someone won’t like it. What you say/do/post, lasts forever.

Stop playing the stupid 3rd party games. When you answer “25 questions about whatever” that data goes straight into the hands of some entity that you would never have volunteered it to.

Make sure you PC is secured. Keep your operating system up to date with security patches and anti-virus and don’t download anything from any email you receive or click links in the body of any email. Once you start messing with these files you become a Petri dish spreading a virus.

Robert Siciliano personal security expert to Home Security Source discussing Facebook scams on CNN.

Police Seek 2 Men, Woman in Stun-gun Robberies

A Stun gun or electromuscular incapacitation device when pressed against a human’s body causes a disruption in the electrical impulses of the nervous system.  When someone is “shocked” in the upper chest area where the arms meet the chest or the lower abdomen on the left or right sides and in the upper thighs, they may lose the ability to walk, talk or function normally.  Stun guns are considered non-lethal, which means they aren’t supposed to kill. However there have been situations where people have died when a stun gun was involved in subduing them.

Seattle police are searching for a trio of robbers responsible for daytime attacks on three women using stun guns.

In each case they were “crimes of opportunity. Crimes of opportunity generally mean the victims were in the wrong place at the wrong time, but what it really means is they were taken by surprise.

The women were going about their business and the robbers attacked them. One was pushed into her trunk then her purse stolen. Her wallet with her home address and her keys were stolen so her landlord changed her locks.

Another woman was followed home and while taking groceries out of her car was accosted by 2 men.

A third woman was in her driveway when she too was robbed when she heard the crack of a stun gun then fell to the ground hitting her head.

An attacker’s tool of trade is the element of surprise. They like to attack from behind when you aren’t paying attention. They also attack from the side or often use a distraction up front.  It’s easy to say all these attacks could have been prevented. But as they say, easier said than done.

By being fully aware of your surroundings you look less like a potential target.  When a bad guy stalks you, if they know you see them, they may move on to someone who they can easily surprise.

Always know what is going on behind you.

Be prepared for someone approaching and distracting you.

When pulling into your garage if you have the option shut the door behind you before you get out of your car.

When pulling into your driveway always look around your car before getting out.

Consider a home security alarm that also has home security cameras.  That same alarm equipped with a panic button can help you if you see someone paying unwanted attention. By hitting that panic button it sets off an alarm getting attention to the situation.

Robert Siciliano personal security expert to ADT Home Security Source discussing non-lethal personal protection and home invasions on the Gordon Elliot show.

How Secure is your Mobile Phone?

I love my iPhone. The fact that I have a full web browser and can access all my data anytime from anywhere is fantastic. Plus my iPhone allows me to peek in on my home security system with an application that’s connected to my home security cameras. If I’m on the road I can log in and see the family doing whatever activities in our outside the home.

If you don’t have a phone that you can integrate with your home security system I strongly recommend considering an iPhone. Besides being the coolest thing to be able to show someone live video of your home base, it is incredible peace mind to check in.

And consider if that phone fell into the wrong hands what could come of it? In my case not much due to the fact I’m pretty well locked down.

If you have one of the popular brands below pay attention:

BlackBerry:

The Blackberry is easily the most popular Smartphone on the market and, according to cellphones.org, the most ‘natively’ secure. Just by having a Blackberry, you are one step ahead but that doesn’t mean you don’t still have to enable your security settings.

Enable your password. Under General Settings set your password to ‘on’ and select a secure password. You may also want to limit the number of password attempts. Test to make sure that your password works by locking your phone to confirm.

Encrypt your data. Under Content Protection settings, enable encryption. Then, under ‘Strength’ select either ‘stronger’ or ‘strongest’. Though ‘strongest’ is the most secure, ‘stronger’ has faster encryption/decryption. Under the Content Protection settings you will also have the option to encrypt your address book.

When visiting password protected internet sites do not save your passwords to the browser. Anyone who finds your phone and manages to unlock it will then have access to all of your account data and your identity will be stolen. It may be annoying to have to enter your password every time but the extra 30 seconds is certainly worth avoiding identity theft.

iPhone:

The iPhone, which has captured over 25% of the Smartphone market, the second highest share in the industry, has notoriously poor encryption capabilities. As such, enabling the included security features and adding apps that allow you to secure your information is key to being a ‘safe’ iPhone owner.

Enable the Pass code Lock and Auto-Lock. Go into your phones General Settings and set the 4-digit phone pass code to something that you will remember but is not ‘significant’ to you. That means no birth dates, no anniversary dates, no children’s ages. Then, go back into General Settings and set the Auto-Lock. Although you can choose from 1 min to 5min, the quicker your phone locks the safer it is from those who might be tempted to tamper with it while you aren’t looking.

Turn your Bluetooth off unless you are using it. Bluetooth allows you to easily connect to a hands-free head set or to send files from your phone to a computer. However, this also works the other way. A tech savvy hacker with a laptop can easily hack your phone from the Bluetooth connection if it’s on.

Download Simple Vault 1.2. Simple vault adds a second layer of protection to your iPhone by allowing you to password protect each of your apps. It also allows you to store your sensitive information right on your phone, unlike other security apps which send it to you over the internet when you access it

General:

Whenever possible, wait till you get to your computer on a secured network before accessing sensitive information. When responding to important work emails or checking your bank account balance it really is best to wait until you can access this information from a secure network. Anti-virus and anti-malware software as well encryption capabilities for computers are miles ahead than what is currently available for phones. So ask yourself before you enter your credit card number to that online store: Is it worth identity theft for me to do this now or can it wait till I get back to the office/home?

Robert Siciliano personal security expert to Home Security Source discussing Mobile Phone Spying on Good Morning America

Google Street View Security Issues

You may not realize it but a picture of your own home is very likely available on the Internet thanks to the popular Google Street View map program.

I’m a big fan of Google. They’ve done a great job or organizing the world’s information. All their tools and apps like Gmail, calendar and docs are fully functional and mobile. They seemed to have taken the fight out of technology with these tools.

Then, there is Google Street View. Zoom, rotate and pan through street level photos of cities around the world. I remember the day Google Street View came down my street. I live on a private dead end and they came right down my driveway. They got stuck trying to turn around and we had to move a car for them.

Then, a few months later there it was on Google Street View. It’s an ambitious attempt at mapping the world just like you were there yourself.

So how does this affect you? For one thing, it allows anyone anywhere to gain intelligence about your street, fences, gates, driveway and information about your home and in general scope out your neighborhood. Certainly someone can simply just driveby and use a video camera or take pictures and Google Street View makes it even easier.

But what if Google captured much more than a picture?

Now Google admits they messed up a little. An ambitious Google Street View engineer plugged some code in their data collection process that they planned on using to collect data on “Public Wi-Fi Hotspots”.

The code pulled more the just hotspots. There could have been enough data pulled to steal someone’s identity.

Protect yourself by making sure your wireless router is protected with a password.

When you have an unsecured wireless connection, it’s just like leaving the front door to your home open and inviting the world to come inside to take a peek.

Google says its Street View cars will stay in park until the problem is fixed.

Robert Siciliano personal security expert to Home Security Source discussing burglar proofing your home on Fox Boston

New Facebook Phish Steals Passwords

I got an email from a colleague today:  Subject: “My Facebook account got hacked.

I wonder if you could give me some guidance here –

I received the following email from Facebook:

——————————————————————–

From: Facebook [XXXXXX@facebook.com]

Sent: Wednesday, March 17, 2010 5:58 AM

To: XXXXXXXXXXX

Subject: Security Warning From Facebook

Dear XXXXXXXXXX,

We have detected suspicious activity on your Facebook account and have temporarily suspended your account as a security precaution.

You can regain control of your account by logging into Facebook and following the on-screen instructions.

Please be sure to visit the Facebook Help Center (http://www.facebook.com/help/) for further information regarding these security issues and let us know if you need assistance.

Thanks,

Facebook Security Team

————————————————————————-

Reuters reports Hackers have long targeted Facebook users, sending them tainted messages via the social networking company’s own internal email system. With this new attack, they are using regular Internet email to spread their malicious software.

McAfee estimates that hackers sent out tens of millions of spam across Europe, the United States and Asia since the campaign began on Tuesday.

Dave Marcus, McAfee’s director of malware research and communications, said that he expects the hackers will succeed in infecting millions of computers.

“With Facebook as your lure, you potentially have 400 million people that can click on the attachment. If you get 10 percent success, that’s 40 million,” he said.

McAfee says:

Tip 1: Do not open the attachment. Promptly delete the Facebook scam email.

Tip 2: Consumers can protect their computer from this type of cybercrime by installing a complete security software suite that includes anti-virus, anti-spyware, and firewall protection.

Tip 3: Consumers should make sure they are running the most up-to-date security software and their subscription is active.

Tip 4: If consumers are unsure if their security software vendor has an update for this type of malware, McAfee recommends that they check for and install any available updates, then immediately run a full scan.

Robert Siciliano personal security expert to Home Security Source discussing Facebook hacking on CNN.

 

Most People Don’t Understand Cyber Threats

Robert Siciliano Identity Theft Expert

Michael Chertoff, who ran the Department of Homeland Security from 2005 to 2009, says there’s a reason that computer security isn’t up to the threat posed by cyber criminals: Doing it right is too complicated for most people.

“You have to offer people solutions that they are comfortable with,” he said.

Cybercrime is a huge problem that the majority of people who have a connection to the internet aren’t prepared to deal with.

While securing ones PC isn’t a daunting task once you understand the process. For most people, protecting ones PC is beyond the capacity of most computer users. The main issue is that the companies that develop this technology aren’t effective at explaining how things work in simple terms.

Educating users on the terminology is like learning a second language and for most people is near impossible due to life’s existing constraints. Which means technology companies have to do a better job of providing solutions that people are comfortable with that require little or no additional skills.

Here is an attempt at increasing your security vocabulary:

1. Run Windows Update: Or it may be called “Microsoft Update” on your PC. This is a free update to your operating system that Microsoft provides. There are two ways to access this. Either click “Start” then “All Programs”, scroll up the menu and look for the link “Windows Update or Microsoft Update.” Click on it. Your browser (Internet Explorer) by default will launch taking you right to Microsoft’s Windows Update web page and will begin the process of looking at your PC and checking to see what security patches you don’t have. Follow the prompts and click “Express” and let it lead you in the direction it wants. The goal here is for XP to end up with “Service Pack 3” installed. Or go to “Control Panel” and seek out “Security Center.” And click “Turn on Automatic Updates” and let Microsoft do this automatically. In Vista the process is similar and your goal is “Service Pack 1.

2. Install Anti-Virus: Most PCs come with bundled anti-virus that runs for free for 6 months to a year. Then you just re-up the license. If you don’t, then every day that the anti-virus isn’t updated, is another opportunity for criminal hackers to turn your PC into a Zombie that allows your computer to be a Slave sending out more viruses to other PCs and turning your PC into a Spambot selling Viagra.

3. Install Spyware Removal Software: Most anti-virus providers define spyware as a virus now. However, it is best to run a spyware removal program monthly to make sure your PC is rid of software that may allow a criminal hacker to remotely monitor you’re keystrokes, websites visited and the data on your PC.

4. Run Firefox: Microsoft’s Internet Explorer is clunky and the most hacked software on the planet. Mozillas Firefox is less hacked and more secure. Maintain the default settings keep the pop-up blockers and phishing filters on.

5. Secure Your Wireless: If you are running an unsecured wireless connection at home or the office, anyone can jump on your network from 300-500 feet away and access your files. Serious. The router has instruction on how to set up WEP or WPA security. WPA is more secure. If this is a foreign language to you, then hire someone or get your 15 year old to do it.

6. Install a Firewall: Microsoft’s operating system comes with a built in firewall. But it is not very secure. Go with a 3rd party firewall that is prepackaged with anti-virus software.

7. Use Strong Passwords: Little yellow stickys on your monitor with your passwords isn’t good. Use upper case, lower case, alpha-numeric passwords that you change up every 6 months.

Robert Siciliano personal security expert to Home Security Source discussing hacked email on Fox News.

Overcoming Civilized Conditioning

What would you do if confronted by a bad guy? How would you respond? Freeze up? Run? Fight?

You have been taught all of your life not to hurt another human being and that’s a good thing. From birth we are told to be kind to one another and have manners. This is called ‘civilized conditioning.’ Civilized conditioning is why we don’t walk around smacking each other. This cultural conditioning allows us to get along in a civilized society.

However, you know bad things still happens every day. We are all to well aware there are some people out there who are considered un-civilized. These are people who don’t share the same boundaries you and I do.

Civilized conditioning is a double edged sword. On one hand it prevents us from being physical with another person unnecessarily, but on the other hand it prevents us from being physical with another person necessarily to protecting ourselves. Civilized conditioning is also responsible for making a person freeze up, stop breathing and panicking when someone attacks them.

Are you a parent? Ask yourself this, if someone bad was to walk up to your child and put their hands on them, what would you do? Answer? Without hesitation you would respond like a bear protecting her cubs. Why? The parental instinct to protect a child is born within you as an adult and never goes away.  So understand, you do have it in you, you just have to know how to tap into it when it comes to protecting yourself.

Tools to overcome civilized conditioning when necessary:

  1. Recognize that nobody has a right to violate you in any way.
  2. Understand that resistance is often the best way to get out of a dangerous situation.
  3. Ask “What if” questions and prepare your mind and body to respond to danger.
  4. Visualize potential scenarios and act out how you would respond.
  5. Take a self defense class. Learning self defense is a life enhancing experience.
  6. Make sure you have an acute awareness of your environment when you are getting out of your car and walking to your destination. If anything feels wrong seek safety immediately.
  7. When possible always run to safety when attacked. The worse thing you can do is nothing.

Robert Siciliano personal security expert to Home Security Source discussing trusting your intuition.