Thursday

Why Information Security is Important


The security of personal information is something everyone should be concerned about (just read some of my stories on identity theft). Despite this, it seems that more and more cases of neglect by large organisations are appearing in the media.
Why?

If you read on. you'll find an article involving some of the world's biggest banks and lending organisations. American Express is one organisation I have had a specific bad experience with concerning security of data. As a result, I now refuse to deal with that organisation.
Read further on and you'll find an abstract of the excellent article 'creating a culture of security', as well as a link to it if you find it interesting.

Put simply, software out there enables hackers, and for that matter anyone at all, to recover just about any data from any hard drive. Everything is recoverable whether you use a software shredder or not. The only real way to be certain the information contained on hard drives is erased is to actually remove the drive and destroy it.

If a criminal, or even a novice, recovers your personal information like bank accounts, birth details, licences or social security particulars, they can steal your identity. It's a disgrace that this sort of thing is happening on a regular basis and people have become almost desensitised to it.
Technology cannot be relied upon anymore to be beyond the realms of the layman's knowledge. These days, most 12 year olds can search a hard drive.

'Government probe launched after details of one million bank customers found on computer sold on eBay'

The UK Daily Mail writes...

The eBay computer scandal which saw the loss of personal data on a million bank customers is to be investigated by the Information Commissioner.
The firms involved - the Royal Bank of Scotland, NatWest and American Express - have also promised to launch probes.
The Mail revealed today that the data was found on a second-hand computer sold for £35 in an eBay auction.
American Express said it was working 'as a matter of priority' to establish which of its card holders could have been affected.
A spokesman said: 'We have strict guidelines for suppliers around the security of information. We are currently working as a matter of priority to establish exactly what data is impacted and identify the card members who may be affected.'

As someone with a limit of more than £20,000 on his credit card, Christopher Tomlins was shocked to learn that NatWest has lost the information that could give anyone access to his account.
When told about the breach by the Daily Mail, Mr Tomlins, 32, said: 'It is like they have given my house keys to a stranger and then said, "Help yourself".'

Other UK Daily Mail Stories

'New data blunder as details of thousands of council taxpayers are found on £6.99 computer sold on eBay'

Personal details of council tax payers have turned up on a computer sold on eBay - a day after data on a million bank customers was found in the same way.
Thousands of bank account numbers, sort codes, names and addresses were stored on the hard drive owned by a borough council.
Further personal details were found including conversations about householders' divorces and family bereavements. The computer was sold on eBay to a Scottish computer expert for just £6.99.

Book Review: Privacy Lost


David H. Holtzman is a former security analyst, military code breaker, and Internet pioneer. His considerable experience and perspective of how technology threatens individual privacy is aimed at readers who are worried about snooping by entities ranging from the government to marketers.

Holtzman plainly outlines what he calls the "seven sins against privacy". He also details the trails we all leave behind that find their way into commercial and government databases. The book is divided into five sections: damage resulting from the loss of privacy, a historical overview, the legal basis of privacy, the mechanics behind snooping, and how to protect privacy.

The book is informative and sometimes frightening. It includes articles from newspapers and magazines regarding various privacy violations, as well as an overview of the gadgets that trace our every movement, from cell phones to global positioning systems, police surveillance cameras, and chips that can be hidden in books and clothing.

Create A Culture of Security
By Lee Hezzlewood at FT.com

We keep seeing news stories, in print, online and on television, about losses of people’s personal information by major organisations. Why do CDs containing names and addresses of millions of people get lost in the post? Why do bank details get sold with a laptop on eBay? How is this continuing to happen even after all of the publicity?

The simple answer is that many organisations don’t have a “culture of security”.

I’m not talking about having passwords or biometric security to control access to systems. I’m not talking about having swipe cards, and high fences to control physical access. I’m not even talking about the vetting of staff to check backgrounds and criminal connections. Most organisations which hold sensitive data already do most if not all of these things.

What I am talking about is engendering a culture of security with all staff – encouraging them to be aware of how security interacts with their day-to-day role, how they have a responsibility for the security of the information they work with, and how to protect that information and themselves.
As an IT Security Consultant, I get paid to be paranoid...





Sunday

How to Stay Safe on Trains


Riding on a train is something a lot of us just have to do. They can be uncomfortable, cold and noisey. They can also be a haven for dysfunctional people who prey on others.

Throughout the world, a lot of governments and private enterprise have started to employee security guards or electronic security, like cameras, to protect the patrons of public transport. However, this is often insufficient.

Like all crime, it seems countries all over the world suffer from the same type of animals who see trains as an opportunity to isolate and attack people. You'll find some stories from around the world as well as tips on how to be safe on trains in this article.

Australian Train Terror

Concerns over railway security have been raised after a 40-year-old woman said she was raped while travelling on a train near Wollongong, on the NSW South Coast.
There were no railway security guards on duty when the woman was attacked at 6.30am on Sunday, South Coast Liberal MP Shelley Hancock said today.
Ms Hancock said CityRail transit officers have not been rostered to work on the Sydney-Wollongong South Coast line for at least the past two weekends.
"I have raised issues of safety and security on the CityRail line for some time but last weekend no transit officers at all were rostered on the South Coast line and there were apparently none this weekend either," she told reporters in Sydney.
"So, in the light of that, we have the allegation of a rape of a 40-year-old woman travelling in the morning at 6.30am...


Read the full article

Japanese Train Rape


Police have served another arrest warrant for a 36-year-old man already on trial for a similar rape earlier this year.
Takamitsu Uezono, a demolition worker from Shiga Prefecture, has admitted to raping a woman aboard a train last August, police said Sunday.
Police linked Uezono to the August rape through their investigation of a similar incident on a train this January in Shiga. Uezono is currently standing trial for the January rape.

Read the full article

Indian Disgrace

The rape of a 13-year-old girl in a suburban train in Bombay in the presence of five commuters has shocked police and raised questions over the safety of women in late-night trains in India's financial hub.
In the incident, which took place in the last train bound for Borivli suburb last Tuesday, drunk labourer Salim Khan allegedly assaulted the mentally-disabled girl in a second class compartment.
The violent act was witnessed by five commuters, including a prominent journalist from one of the leading dailies in the country, who were travelling in the same compartment.
"There were five of them in the train. All they had to do was to pull the chain in the train or shout at earlier stations such as Malad and Kandivli where the train halts," said Rakesh Maria, commissioner of railway police.
The journalist, Ambarish Mishra of the Times of India, said he tried to stop the rape but was threatened with being thrown out of the moving train by the attacker.


Read the full article

Safety Tips When You're on a Train

Having a personal alarm or pepper spray for protection is not a bad idea, but you need to check the legality of such items where you are- Some phones are now being marketed with their own personal alarms.

Never get on the empty car, you need to stay with other people just in case. Try to ride during peak hours rather than quiet times. It might be crowded but there's less chance of an attack. If the train is empty, ride closest to the driver.

Keep personal items in your lap or close by.
When you get on a train, look around and check for an emergency cord or help button. It's a good idea to know where these things are before you need to use them.

While waiting, don't start talking on your phone. Thieves know you're a great target because your mind is on the conversation you're having, not on what is happening around you. Get off the phone and stay alert.
Trust your senses. If you ever feel like something is not safe, like a dark train stop, wait for a stop that is busy and get off there. Change your seat if you feel like someone is watching you.

Most important of all. If you experience any problems protect yourself first, as your property can always be replaced but you can’t.

Self Defence

Many people turn to self defence implements or skills to stay safe. Learning a martial art can be expensive but rewarding. It can also boost your confidence in everyday situations like communicating with people.

Another way to defend yourself is by using an implement. Pepper spray and other sprays like Mace are very common.

Pepper spray is an inflammatory made up of capsicum. It causes immediate closing of the eyes, difficulty breathing, runny nose, and coughing. The duration of its effects depend on the strength of the spray but on average lasts around thirty to forty-five minutes, with diminished effects lasting for hours.

Pepper spray comes in aerosol canisters and the legalities of its use vary all around the world.

In Canada all products with a label containing the words pepper spray, mace, etc, or otherwise originally produced for use on humans are classified as a prohibited weapon. Only Peace Officers, and individuals/corporations who have special government permits may legally carry or possess pepper spray. Any similar canister with the labels reading "dog spray" and/or "bear spray" may be legally carried by anyone. The legality of using spray intended for animal deterent on a person would be decided in court on a case-by-case basis.

In Germany pepper sprays labelled for the purpose of defense against animals may be owned and carried by anyone. Such sprays are not legally considered as weapons. Carrying it at (or on the way to and from) demonstrations may still be punished. Sprays that are not labelled "animal-defense spray" or do not bear the test mark of the Materialprüfungsanstalt(MPA) (material testing institute) are classified as prohibited weapons. Justified use against humans as self-defense is allowed. CS sprays bearing a test mark of the MPA may be owned and carried by anyone over the age of 14.

Saturday

Home Invasion Terror

Two men are accused of the brutal Connecticut home invasion of a prominent doctor. Joshua Komisarjevsky, 26, of Cheshire, and Steven Hayes, 44, of Winsted, have been arraigned on charges of assault, sexual assault, kidnapping, burglary, robbery, arson, larceny and risk of injury to children. More charges are pending and the two men could face the death penalty.

The state medical examiner confirmed that Jennifer Hawke-Petit, 48, was strangled and her daughters, 17-year-old Hayley and 11-year-old Michaela, died of smoke inhalation. The deaths were ruled homicides.

The girls' father, Dr. William Petit Jr., a prominent endocrinologist, remained hospitalised with head injuries.

All three women were raped. Petit was beaten with a baseball bat, thrown down the basement stairs, and then tied up in the cellar.

The daughters were tied to their beds and raped repeatedly, then left to burn after gasoline was poured around their beds and ignited.

How to Protect Yourself from a Home Invasion

It's frightning that home invasions have increased the way they have. Protecting yourself is a must as criminals will strike anyone- whether low or high income areas.

1.Fortify your home with solid core doors, strong locks and security devices on windows. To strengthen locks, secure heavy-duty strike plates with at least four three-inch screws.
2.Keep all doors and windows in the home and garage locked at all times.
3.Install a peephole and use it before opening your door. Make sure your porch light is in a position to help you see persons at your front door clearly.
4.Never open your door to strangers or solicitors and never rely on a chain-latch. If a solicitor acts suspicious, call the police.
5.Keep window shades closed at night. Windows can give a criminal a lot of information about your home's vulnerability. If a home invader can't see into your home, he may not feel confident about storming in.
6.Never make it obvious that you're home alone. The fewer the occupants, the easier a home invader's job becomes. A single occupant may be the opportunity a home invader is looking for. 7.Keep extra lights on. Use a television or radio to create the illusion that more people are in the house.
8.Hold a meeting with your family to discuss home security practices. Too often, the weakest part of a home security system is the habits of occupants. If your family is educated about the risks and certain home security practices are followed, this will greatly reduce the risk of a home invasion.

Rolling Out the UNWELCOME Mat and Other Considerations

1.Security Lights. Check Ebay for some handy solar power lights that don't require wiring.
2.A Pet. Dogs always alert their owners when someone approaches.
3.Security Cameras. Even the ones that don't work can make a criminal think twice.
4.A personal alarm or full security system. They're noisey but criminals will surely run away- make sure you get a sticker for the windows and a sign for your gate.

A tiny Chihuahua has been credited with the cracking of a robbery case following a daring bank heist in the US.

Seven-year-old Chico attacked one of two men who ran through his owner's backyard in Baton Rouge, Louisiana. During the struggle the tiny dog managed pull one of the men's pants down, which were later found by Chico's owner Peter Budo along with a pair of shoes. Mr Budo's backyard is just metres from a Capital One bank which had just been robbed. "He (Chico) was running in circles and barking up the fence," Mr Budo told local TV station WAFB. "I saw the shoes and I saw the pants laying down, that's all I could see."


More Scams

I've said it before, you can't win a lottery you never entered. These two washed up in my junk mail so I posted them in the hope that the email addresses these scum frequent become filled with spam(poetic justice). If you're silly enough to send your details to people like this you'll quickly find your bank account depleted and your identity stolen.

Scam 1

Dear Winner, Your Hotmail email has just won the sum of £ 1,628,360.00in cash credited to a file in the just concluded Lotto LondonInternational Award Programme held 18th August 2008 Your Hotmail e-mail address attached to:Ticket Number: 8603775966738Batch: 013/05/8394369Reference Number: UK/776090X2/23.WINNING NUMBERS: 9, 18, 21, 24, 37, 48(BONUS.22)WINNING DATE: 18th August 2008For Claims,Contact:====================================Name: Bar.David MarkSEND DETAILS TO: mrshellendavid5@hotmail.comForeign Services Validation OfficerTel Phone: +447024043160SEND DETAILS TO: mrshellendavid5@hotmail.com=====================================

Scam 2

E.U NATIONAL LOTTERYONLINE SWEEPSTAKES AWARD LOTTERY
46 Knockcullen Drive
Knocklyon,
Dublin 16,
Ireland.
Batch number.....................409978
Reff number.......................BTD/968/08
Ticket number...................0098876
WINNING NOTICEEAR ; WINNER
We are pleased to inform you of the final announcement today 18TH of AUGUST,2008 of winners of the E.U NATIONAL LOTTERY ONLINE PROMO
PROGRAMME, held on the 19TH of AUGUST,2008. You have therefore been approved for a lump sum pay out of 1,000,000,00 GBP in cash credited to your email.
To file for your claim, please contact our claims agent:
OVERSEA CLAIMS OFFICE
Fudiciary Agent,
Mr.James Bradley
Tel: +447045700405
Fax: +447035911730
Email: james.eu78@yahoo.de
Provide him with the information below for proper verification for payment.
FULL NAME:
ADDRESS:
DATE OF BIRTH:
SEX:
OCCUPATION:
NATIONALITY:
PHONE NUMBER:
WINNING EMAIL:
For due processing and remittance of your prize money. Congratulations once more from all members and staffs of this program. Thank you for being part of our online promotional lottery program.
Yours Truly,
Mr.Kelvin Grant.
Co-ordinator(Online Promo Programme).

Tuesday

Kidnapping All Around The World

Kidnapped and Murdered

The kidnapping and murder of a 14-year-old boy has caused a national outrage in Mexico.

Fernando Marti was abducted in June. His decomposed body was then found in the boot of a car in Mexico City, even though his family had paid the ransom. The murdered teenager's family co-owns Mexico's largest chain of sports stores.

The impact of his death was compounded by news that a number of police officers, including a police commander, have been arrested in connection with the case...

READ THE FULL BBC ARTICLE


Kidnapper's Reasons

Kidnapping is a dangerous threat in many countries. Children can be stolen to sell on the blackmarket or sold back to their parents. A businessperson can be kidnapped and held against their will for financial or political gain. Young woman from third world countries are often lured to richer countries with the promise of work, only to have their passports taken from them and be forced to work as sex slaves.

According to
NationMaster.com, the leading, most recent kidnappings have occurred in these countries.

WORLD KIDNAPPINGS

1. United Kingdom 3,261
2. South Africa 3,071
3. Canada 2,933
4. Belgium 994
5. Tunisia 555
6. Peru 491
7. Portugal 432
8. Romania 383
9. Kuwait 281
10.New Zealand 257

It is interesting to note that only 10% of kidnappings are usually reported and some of the hot spots around the world were extremely suprising to me. In fact, 66% of the world's reported kidnapping cases occurred in the United Kingdom, Canada and South Africa. Neither Mexico or the United States are mentioned in the list of 39 countries.

However, a recent article for the BBC suggests that Mexico is much closer to the top of the list. It's a fascinating story that suggests that the years of experience Mexican authorities and private security specialists have in this field could be utilised in Iraq.


Kidnapped by Paedophile Group

It is believed that British police were told Madeleine McCann had been snatched by an international paedophile ring which photographed her three days before she vanished.


An email sent by the Metropolitan Police stated that a child abduction ring based in Belgium placed an order for a "young girl". Three-year-old Madeleine was spotted while on holiday in Portugal by someone connected to the gang who took a picture of her.

The photograph was then sent back to Belgium where the paedophile ring agreed that she should be abducted.

READ THE FULL UK TELEGRAPH ARTICLE

More Kidnapping Stories from Around the World

Bush Says Kidnapping Not A Crime
Continuing its recent spree of criminality in the alleged pursuit of law enforcement, the Bush Justice Department formally advised a British Court last week that it is fully entitled to kidnap foreigners (i.e., Britons) off the street around the world and carry them off to secret prisons. The claim was formerly thought to relate to terrorists. But no longer. Now the Bush Justice Department asserts the right to kidnap anyone it suspects of a crime.

Children Stolen from India and Sold to Australians
"I thought someone had taken her for her kidney," says the weeping mother, clutching a photocopy of her daughter's picture that she keeps in a special place in her tiny two-room flat. "Many, many places I looked. My husband traveled everywhere looking. I was all the time crying for my daughter." Her husband says: "My wife was half mad with grief."


Sunday

Your Security When Travelling Overseas : How safe is India and was there strong indications of a threat prior to the terror attacks at Mumbai?

Public outrage may be growing in India after the terror attacks in Mumbai. Reports continue to emerge that clear warnings of a coming assault were ignored. I can say that travel warnings concerning terror attacks on hotels in India were made a month prior to Australian’s travelling abroad.

In India, the Hindustan Times has said that intelligence agencies did have very precise information almost a year ago that the Pakistan-based militant group Lashkar-e-Taiba was planning to attack hotels in India.

The information was specific and provided by a Lashkar militant arrested in northern India last February, the Times said.

The interrogator stated that the captured operative stayed at a guesthouse in Mumbai to survey each floor of the luxury hotels the Taj Mahal and the Oberoi/Trident.

The captured operative also disclosed that the attack would probably emerge from the sea.

Islamist gunmen launched their assault on Mumbai in two dinghies. As well as the Taj Mahal and Oeroi/Trident, the attack targets included Mumbai's main train station, a hospital as well as a Jewish cultural centre.

Indian commandos shot the last remaining militants 60 hours later, despite this 170 people had been killed. Initial suspicions were focused on the Lashkar-e-Taiba.

According to the Times of India, the Intelligence Bureau told India's National Security Council as far back as September that the Taj hotel could be the target of a terrorist attack and another advisory on November 12 stated that an attack would come from the sea.

Pakistan links

Indian investigators said that evidence from Azam Amir Kasav, the only gunmen of the 10 not killed, clearly showed that Pakistani militants were involved. The clean-shaven, 21-year-old with fluent English was photographed during the attack.

New Delhi has not accused Islamabad's civilian Government of any involvement, but has expressed frustration that its neighbour has been unable to prevent militants using its soil to attack Indian cities.

One thing that is for long debate: Is the siege on Afghanistan driving extremists into Pakistan and fuelling a deeper threat to India?

Murdered During The Olympics

Beijing Olympics: Murdered American was volleyball coach's relative

Todd Bachman and his wife Barbara, who was seriously wounded in the attack, were stabbed at the city's 13th-century Drum Tower monument. Their daughter Elisabeth, the wife of head indoor volleyball coach Hugh McCutcheon, witnessed the attack but escaped unhurt.

The lone Chinese attacker subsequently committed suicide by jumping from the second storey of the tower. The motive for the murder remains a mystery, especially since it is rare for foreigners in China to suffer from violent crime.

Tips For Overseas Travel


Travelling to a new country can be an incredible experience and whether you are travelling on business, a student, or taking a holiday. The recent murder/ suicide in China has brought travel security to the fore. Some simple things to consider are;

Do you have experience or knowledge of the country and region you're travelling to? If you've been to your destination many times in the past you probably consider yourself one of the locals. However, first timers overseas can find themselves lost very fast.

Check your embassy or news reports to see if there are any areas of concern - a good example would be the south islands of the Philippines. Sometimes, areas of countries be complete polar opposites. In the Philippines, you can easily travel from an area that is quite safe, to an area that is considered extremely dangerous, in just a few minutes. The Islamic group MILF (Moro Islamic Liberation Front) has been involved in sporatic violence against the Philippine government for many years.





The Philippine Supreme Court has stopped the government from signing a territorial agreement with Muslim separatist rebels, in yet another blow to efforts to end a thirty-year conflict. Both sides were due to formalise a deal, to widen an existing Muslim autonomous region. The court ruling followed a petition by Catholic law-makers in the region.. who oppose the deal between the Moro Islamic Liberation Front and the government, saying they weren't consulted. They fear that non-Muslim areas might also come under MILF control in southern Mindanao island. An MILF spokesman says the court decision is a setback, but that the group is still committed to a peaceful resolution.

Kidnappings and violence are common in many countries, so be cautious and make sure you are well informed.

Can you speak the language? Do you need a guide? And, is the guide a reputable one? You'll find no shortage of people wanting to help you in a foriegn country. The problem is, often those who are offeing help are just looking to con travellers. Check their credentials and ask if they have references.


Will you be staying at a safe location? Some hotels are safer than others. If you're travelling to a country that has problems with dysfunctional activity, look for a safe place to stay.

Transport type? If you need to get around, is the transport safe? Would you be better to use a taxi service? Some hotels even have their own shuttle services.

Health precautions (vaccinations) Consult your doctor long before you travel. Some vaccination processes take 6 months or more.

Contingency plans. Consider Plan Bs. Plane's get cancelled. Trains often run slow. Don't make your schedule so critical that a small problem upsets your whole holiday. Also, consider making copies of all your information (passports, tickets,etc) in case of theft of a mishap with your luggage.

Other Stories, Including More on the Philippines and the War Against MILF




Deep in a jungle hide-out in Mindanao's remote Lanao del Norte province, about 100 men armed with American-made assault rifles gather to pledge a jihad, or holy war, against the Philippines government.




They are members of the Moro Islamic Liberation Front [MILF], the largest Muslim rebel group in the southern Philippines, and their field commander, known by his radio codename "Congressman", explained what they were fighting for.

AFRICA

You don't face any more danger traveling in Africa than in other parts of the world. Petty theft is probably the most common crime you are likely to come across when visiting Africa. As a tourist with cameras and cash, you just have to be careful. Violent muggings are quite rare for most African countries. Dakar, Lagos, Nairobi and Johannesburg are probably most notorious for violent crime, car-jacking and murder. Keep up to date with African news so you can avoid areas where there is war, famine or obvious political instability. This article will give you a brief overview of what to watch out for and how to avoid becoming a victim of crime when traveling in Africa.


Basic Safety TipsRegardless of your budget, when you are traveling in Africa keep in mind that you are much richer than the majority of local people around you. While most people are honest, the sight of a tourist with cash to spare and cameras dangling is too tempting for some. To avoid being fodder for con-artists, petty thieves and opportunists keep some of the following safety tips in mind when visiting Africa:

India

In past years, some private medical clinics have provided patients with more treatment than is necessary in order to procure larger medical insurance claims - get several opinions where possible. Worse still, a serious food scare erupted in northern India in 1998, principally in Agra and Varanasi, when numerous travellers became sick and two died after eating at local establishments. This scam has thankfully been quashed, but there's always the chance it could reappear. Water can also be a potential problem. Always ensure the seal is intact on bought mineral water and check that the bottom of the bottle hasn't been tampered with. Crush plastic bottles after use to prevent them being misused later. Better still, bring along water-purification tablets to avoid adding to India's plastic waste problem.

United States

Despite its seemingly Babylon-like list of dangers - guns, violent crime, earthquakes, tornadoes, hurricanes - the USA is actually a very safe country to visit. Perhaps the single greatest danger for travelers is posed by car accidents on America's highways (buckle up - it's the law). The two greatest annoyances will be auto traffic in the cities and crowds at popular sites.

South America

Although women travelers in South America face the same general safety concerns as men, they also have to cope with undue attention from local males. South America is a fairly chauvinistic continent, and a single foreign woman is often considered an easy target for male advances. To get rid of undesirable male company, some women recommend wearing a wedding ring and referring to their imaginary husband. However, there is no strategy or advice that can completely prevent undesired advances. A friendly shopkeeper in Peru offered to take my girlfriend and me to the outskirts of a small jungle town. Since he only had a motorcycle we had to go one at a time. He took me first and when my girlfriend finally arrived, she told me that the man had taken her to his house and had proposed to have sex with her.


Saturday

Stalking and Cyber Stalking


Stalking has often been good subject matter for Hollywood movies, who could forget the evil character played by Glenn Close in Fatal Attraction. Stalking is also a nightmare for thousands of people worldwide who are victims of harassing behaviour, such as actress Uma Thurman (pictured left) who was stalked by a crazed fan.

These days Cyber Stalkers are also an issue for anyone who engages in social interaction online.

Whether stalking, or cyber stalking is the issue, it is about recurrent harassment that erodes another person‘s quality of life. The behaviour usually extends over a long period of time rather than a single incident or action and it could last a few weeks, or in some severe cases, several years. The stalker’s behaviour can be continuous over that period, or may stop and then start up again.

Time Won’t Heal a Stalker

A victim may feel that the stalker’s interest becomes more threatening as time passes. The stalker could become more violent, more daring, or just that the actions of the stalker become less lawful. This ascending behaviour could culminate in physical assault, destruction of property, defamation, even rape or murder.

Stalkers usually prefer a mixture of contact. Their interest may be shown by visual sightings and first-person contact, posting letters and/or cards, emails and/or messaging and phone contact. They might even attempt entry to an abode or contact in the workplace, and can make declarations of love or threats of aggression.

Phone Stalkers

Typical phone stalking involves heavy breathing or recurrent phone calls only to hang up. Extreme cases of phone stalking feature several hundred calls each week by the perpetrator. Victims can feel as though they are imprisoned, being forced to change their phone numbers, addresses, jobs and even their name.

Other Types of Stalkers

There are two types of stalkers: Those who are psychotic and those who are not. Many psychotic stalkers have severe depression, schizophrenia or personality disorders that compel them to engage in such behaviour. For the non-psychotic stalker, feelings of anger, dependency, jealousy or other emotions may drive them.

Stalkers are driven by rejection, resentment, intimacy problems or a predatory nature.

Avoiding Cyber Stalkers

Avoiding online stalkers is difficult, but the first step is taking control of what is already on the net about you. Social pages like Facebook and Myspace are a fantastic way to stay in touch with friends and family. Unfortunately, they are also a way for stalkers to gain personal information.
Google your own name and see what comes up.

Case Study :Man found guilty of stalking Uma Thurman

A former psychiatric patient sent the actress a series of disturbing letters and cards. He also turned up at Ms Thurman's home and film sets and sent harassing e-mails to her family.

The man, an out-of-work lifeguard and pool cleaner, was convicted of stalking and aggravated harassment.

Prosecutors said the man sent Uma Thurman 20 bizarre letters while in a psychiatric institution. The actress said she felt "sick" after receiving a picture drawn on a on a religious confirmation card that showed a razor blade and a gravestone marked RIP near what appeared to be an open grave.

The man was also accused of emotionally blackmailing Ms Thurman's parents by telling them he would kill himself unless he could see her. He tried to get into Thurman’s trailer during the filming of a recent film and once said his hands should be on the star's body "at all times", the court heard.

The convicted stalker said: "In a misguided way I was trying to give her an opportunity to meet me and give myself an opportunity to meet her.

"I was feeling distressed. I had this feeling of longing for Ms Thurman and I was trying to explain it. I was not trying to scare her in any way."


Sunday

Apple iPhones, PDA and Phone Viruses


iPhone Updates

BOSTON (Reuters) - Apple Inc released 45 software patches on Wednesday to address rare security vulnerabilities in its popular iPhone and iPod Touch mobile devices.

The company released them as part of its widely anticipated iPhone 3.0 operating system.
"This is a large cluster of patches for the iPhone," said Dino Dai Zovi, a security expert who is writing a book on cracking the iPhone.

Apple has a stellar reputation when it comes to securing its devices. While it is unusual for the company to issue so many patches at once, analysts have yet to uncover any malicious software targeting the iPhone since Apple got into the mobile phone market two years ago. Wall Street analysts said they were not alarmed by the news.

Such vulnerabilities are not unique to Apple. Technology companies constantly battle to stay ahead of increasingly sophisticated hackers. Every time a security flaw is identified, there is potential for hackers to exploit it.

Apple rival Research in Motion Ltd recently issued a security patch for its popular BlackBerry, addressing a glitch that had potential to let hackers use the device to break into corporate computer networks."Given the breadth of feature and functionality within the iPhone OS, it is not surprising that Apple would have security patches," said Cross Research analyst Shannon Cross.

Hackers have traditionally focused most of their time on writing programs that attack PCs running Microsoft Corp's Windows operating system because it sits on more than 90 percent of the world's personal computers.

Analysts expect that to change because sales of mobile devices are soaring as the PC industry slumps. Apple's iPhones and iPods are dominant players in the rapidly growing sector.

"They are no longer dumb devices used only to make phone calls. They hold a wealth of personal information and in some cases are being used as electronic wallets," said Joris Evers, a spokesman for No. 2 security software maker McAfee Inc.


The Enemy at the Gate

With phones becoming so technical throughout the world the reality of a major virus attacking our mobile communication devices is getting closer and closer. Some minor attacks have already occurred, but the viruses have been too isolated and unable to cross the many different phone types.

The first known mobile or cell phone virus appeared in 2004 but crashed and burned fast. Cabir infected a number of Bluetooth-enabled phones and was the result of a group of malware developers creating Cabir just to prove it could be done.

Next was the slightly more aggressive Commwarrior- The first mobile phone virus capable searching through a phone and sending a copy of itself to uninfected phones of your contacts.

However, it is only a matter of time before a mass infection, as it’s probably been for lack of people wanting to try to create a large-scale virus that has prevented such a release. Of the viruses that are out there, most attack phones of the Symbian Series 60 breed like the Nokia 6620.

Scanning the many internet pages for freelance coders out there and it’s easy to see that people are requesting exploitable code for phones.

Authorities in Australia, together with the CSIRO, are trying to develop a virus for use in cases of stolen phones. The concept is simple; when a phone is reported stolen a text message containing the virus is sent to the phone by the police which renders it useless.


Some Words on Protecting Your Phone

When you think about the information that goes into a mobile phone or cell phone, it’s easy to see why they would be such a target for scammers. Identity theft perpetrators have everything they need in a lost phone so a misplaced mobile device should be given high priority by its owner.

Viruses can already be modified to enable people to listen in on conversations and monitor calls. As cell phones advance, so too does the information they carry. And information is gold.







Now consider the sort of information being carried in the average PDA or Apple iPhone!

ZDNET Article : Mobile Phone Viruses Infecting Car Onboard Computers



As seen in the motion picture 'Untraceable'.





Antivirus companies are researching reports that computer viruses have attacked the onboard computers of cars.

Moscow-based Kaspersky Labs was asked last weekend how to disinfect the onboard computers of several Lexus models: LX470, LS430 and Landcruiser 100. The security company was told that the infection likely occurred via a mobile phone.

Some mobile-phone viruses already exist, such as Cabir and Skulls, which spread by Bluetooth and infect handsets based on the Symbian operating system. Many Lexus cars include a navigation system that can connect to a mobile phone over Bluetooth to allow hands-free calls, and Kaspersky believes that Bluetooth could be used to transmit a virus to a car's GPS navigation system...

READ THE FULL ZDNET ARTICLE by Clicking Here

Wednesday

A Big Scam Doing the Rounds :Death Threats by Text Message

A generic death threat conveyed by phone text message and coming from unknown persons claiming to be hired hit men is fast circulating. The offenders try to extort thousands of dollars from their victims.

The text message is simple; it’s a warning that the recipient has been targeted for death- but will be spared if they pay up.

These death threats involve SMS messages arriving from what appears to be an international number (some say coming from Thailand or Asia in general). In many cases though the number is be blocked.

An example may read: "Someone paid me to kill you. If you want me to spare you, I'll give you two days to pay $5000. If you inform the police or anybody, you will die, I am watching you."

Some messages are long and contain much text, while others are shorter.

The requested amount can vary from between $1000-$50,000. The scam includes payment details and an e-mail address for their victims to contact them when payment is complete.

This scam is designed to frighten people into paying money and has already snared victims across many countries.

If you’ve received an e-mail like this don't respond under any circumstances. Most people think the people sending these are just guessing random numbers, but if you respond they will know the number is lead.

Don't send any money.

Don’t provide personal information, especially not your banking details- You risk being a victim of identity theft.

Report the incident to authorities as they may be able to trace the number.

If you are scared for your safety consult police.

Telegraph Article : Army Wives Receive Phone Death Threats

Wives and family members of soldiers fighting in Iraq have received telephone calls, believed to include death threats, from insurgents, according to military documents seen by The Sunday Telegraph.

The "nuisance" calls have been made with increasing frequency over the past few weeks after insurgents managed to obtain home numbers from soldiers' mobile telephones.

The growing number of calls has led to an investigation by the Royal Military Police, which has issued a warning to all soldiers in Iraq to take great care when using mobile telephones to call home.

The extent of the problem emerged in a restricted Army document issued to soldiers of the London Regiment, a Territorial Army unit, which has soldiers from its ranks serving in Iraq.

The document warns soldiers preparing to take part in operations that insurgents in southern Iraq have managed to obtain the home telephone numbers of soldiers by using electronic intercept devices to hack into mobile phone systems.

Read the full Telegraph Article Here

Saturday

More on Identity Theft

Credit Card fraud is a huge worldwide phenomenon and has been since plastic money was created. It can be perpetrated on-line and in the real world. We’re talking about billions of dollars in stolen funds all around the globe and it can, and has, happened to people without them realising until it is much too late.

The ease at which a criminal can steal your identity and money out from under you has made identity theft one of the crimes people all around the world are most concerned about.
Protecting Yourself Can be Easy

Many people are purchasing ways to protect themselves from criminals who see credit card theft as an easy way to make some fast cash. There’s a range of protection options from security suites for computers to agencies whose specific task is to protect you identity and watch your credit history for unusual changes.

Two Major Mistakes Many People Make That Won’t Cost You any Money

Number One

On-line threats are everywhere on the internet and on the increase because of the ease in taking information. One of the big mistakes many people make is not having on-line security such as antivirus and firewalls. Some people do have them but don’t update.

Cost shouldn’t be an issue because there are some very good free products out there. Even the products that cost money can be obtained on a trial basis for you to evaluate and then decide if you wish to make a purchase.

Wireless internet is big risk if you aren’t using a security suite.

Number Two
Sensitive information needs to be disposed of appropriately, but many people just throw it in the bin without a thought. One of the easiest ways for a person to steal your identity is by using one of those preapproved letters so many banks and lending organisations send out in the mail. In the wrong hands, one of these letters can be used to open a new credit card and then maxed out before you even know it. Rip them up into tiny pieces or buy yourself a shredder.

Here are a few other good tips anyone can follow.

Report any lost or stolen credit cards immediately and cancel any that are inactive.

If you applied for a credit card, or if a card has expired, and a new one doesn’t arrive, notify the credit card provider fast.

Make sure you sign your credit card immediately.

Check for unauthorized charges on your bills.

Try electronic bills and statements instead of paper

Keep your personal documentation and your bank records somewhere safe.

Do not give your credit card number, or any bank account details over the phone.

Do not disclose your credit card and other personal data on-line unless the site is secure

Make sure all information is erased. From your old computer when you upgrade

Be aware of any persons that may be watching when you enter passwords or PIN numbers.

Case Study: USA Federal Trade Commission Figures for 2005

The Federal Trade Commission (FTC) said 8.3 million Americans, or nearly 4 percent of the population, were victims of identity theft in 2005.

3.2 million experienced fraud or misuse of their credit cards, 3.3 million suffered fraud or theft from non-credit card accounts, and 1.8 million had their personal information stolen to open new accounts in the victims' names.

The FTC also looked at the costs of identity theft. Where the ID theft was limited to existing accounts, the average loss was less than $500. However, "new account fraud," losses were much higher, an average $1,350.

Ten percent of new account fraud victims reported losses of $15,000 or more, with the top five percent of victims reporting losses of $30,000.

Recovering from new account fraud was more time-consuming and costly, the top 10 percent of victims incurred expenses of at least $3,000. Thirty-seven percent of victims reported harassment by debt collectors, being unable to get loans, having their utilities cut off, being subject to a criminal investigation or civil suit, being arrested, and having difficulties with bank accounts.

84 percent of identity theft victims did not know the thief, contradicting other studies that claimed the majority of identity theft crimes were committed by friends or relatives.

Tuesday

Tips for Securing Your Home

Windows
Most break-ins occur via a back window, which shouldn't happen when you consider how cheap and easy to install window locks are. Make sure you take into account small windows like the bathroom might have- thieves tend to get in anywhere small enough to fit your head.
And don’t leave the key in the lock.

Lighting
Sensor lights are a great idea for around the home, they activate whenever they detect movement. Solar-powered lights are available through sites like Ebay and need no wiring.

Time Switches
Thieves are very good at telling who is on holiday, at work or at University or College. By installing automatic timers so that your TV and other lights come on, you can create the impression that you’re home.

Away From Temptation
Don’t leave valuables where they can be seen through windows or outside your home.

Neighbourhood Watch
If you are going away for a while, ask a friend or neighbour that you trust to check on your home each day, water the plants, draw the curtains etc. A good relationship with your neighbours will help guard your home.

Burglar Alarms
Burglar alarms can be quite expensive, but the do-it-yourself ones on the market (while not as good as one installed by an expert) contain the most important part- The sticker you put on your window. If you do by an el-cheapo model, make sure you get two or three stickers and don’t tell anyone you have a cheap one.

Front Door Blues
Front doors are usually very flimsy in small apartments or flats. When you choose a place to live, take into consideration how secure the doors and windows are.
Never leave your spare key somewhere like under a pot plant- Thieves look there. Always have the locks changed when you move to a new location, the last thing you want is for the previous owner to have access to your new abode.

Don’t Leave Tools Around the Yard
Often people leave their expensive tools in places thieves can pick them up and then use to break into their house. Keep your tools locked away.
Also, try to control access to your backyard by installing a good gate.

Most Important of All
If you are burgled, don’t enter the house unless you are absolutely certain the thief has left the scene, they could be dangerous. You might also
disturb any evidence the thief has left behind.

Sunday

Toyota Lotto Scam

I'd only just posted my last article on scam lotteries when a new one popped into my junk mail, this one claims to be from Toyota and it's very authentic-looking.

Alas, it is a scam and if you scroll to the bottom you will see I've pasted Toyota's official reply to this scam.

TOYOTA INTERNATIONAL LOTTO (HEADQUARTERS) Customer Service Department Affiliate of Toyota Japan. #28 Kanashiwa road Tokyo JP

We are pleased to inform you of the announcement made today, You are among the winners of the TOYOTA CAR INTERNATIONAL PROMOTION PROGRAM

Participants were selected through a computer ballot system drawn from 2,500,000 email addresses of individuals and companies from all part of the world as part of our electronic business Promotions Program. As a result of your visiting various websites we are running the e-business promotions for. You/Your Company email address, attached to ticket number 719-226-1319, with serial number 902-66 drew the lucky numbers 5,12, 30, 11, 17, 43 and Bonus number 12 , Your INSURANCE Number: FLS433/ 453L /GMSA and consequently you won in the Second Category of the TOYOTA FORTUNE LOTTO DRAW.

You have therefore been approved for the payment of the sum of US$500, 000, 00 in cash, including a Toyota car which is the winning present /amount for the Second category winners. This is from the total prize money of US$2,650,000.00 shared among the international winners in the Second category.

CONGRATULATIONS!!!

Please be informed that your won fund of the sum of US$500,000.00 is now with the payee center. Contact our agent and give them your full names so that they will re-insure your winning fund under your full names. Together with the port where your winning car should be shipped to.

To begin your claim, please call our claim agent or send email immediately to:-.
Certificate Agent,
Toyota Email Lotto
Mr. Thomas Lee
E-mail: thomaslee@toyota-jp.cn
E-mail: info@toyota-jp.cn
Phone: +86 13420100150
NOTE: In order to avoid unnecessary delays and complications, Please quote your
1. Full name:
2. Address/contact number:
3. Country of origin:
4. Age:
5. Occupation:
6. Tel/fax:
Sincerely,
Mrs Ing Chuny Liu
Hon Cordinator
www.toyota.cn

And the official reply from Toyota posted at www.toyota.co.jp/en/announcement/060822.html


"TOYOTA INTERNATIONAL LOTTO", ETC.
Toyota Motor Corporation and its affiliated companies have no connection whatsoever with any lotteries that inform members of the public by e-mail that they have won a prize, even if the "Toyota" name appears in the e-mail, such as e-mails from the so-called "Toyota International Lotto", "Toyota Car Promotions", "Toyota Car International Promotion Program" and "Toyota Fortune Lotto Draw". Any such e-mail was not sent by us or with our permission. Members of the public should exercise extreme caution before responding to any such e-mail or providing any personal information or money, as any e-mail using the "Toyota" name and claiming to award a lottery prize is highly likely to be part of a fraudulent scheme.
Aug. 28, 2006Toyota Motor Corporation

Friday

Fake Lottery Scams

I’m starting to see a few more fake lottery scams in my e-mails. Everyone wants to win the lotto, but you can’t win one that you didn’t enter in the first place.

Rohit Kaul is the sender of a recent one to enter my junk mail with the teaser ‘ you have won'. These scammers use many names and they do so because hundreds of people still fall victim to scam lotteries. The first thing these fraudsters do is ask you to send money to pay for some sort of local tax or insurance before they can release the winnings. Then they need another payment to pay a bank charge, and another for some other government fee and before you know it you've sent them a couple of hunderd dollares. Some people have sent tens of thousands in the past.

No lottery would ask you to pay hundreds, even thousands of dollars, to claim winnings. And, there’s no way to win a lottery from some far-off country if you never entered in the first place.

When in Doubt, Google It!

Check the lottery out with your local legislative body or on-line to see if it is legitimate. A simple Google search can often uncover warnings from other people out there who have either been caught out or are savvy enough to spot a scam.

In America, talk to the Federal Trade Commission about any bogus scams. Australia’s legislative body is the Department of Fair Trading and, in the UK, try Consumer Direct, they’re funded by the UK office of Fair Trading.

If you’re from another country and you aren’t sure about who to contact, just Google “top scams” and your local equivalent should appear in one of the first ten search results.

Can Lost Money be Recovered?

Nope. Most of these crooks are targeting first world nations from the third world. People disappear in places like Africa and some parts of Asia all the time. You won’t find them or your money.

Notify the authorities or one of the legislative bodies mentioned above so that they can warn others.

Thursday

Hidden Cameras That Anyone Can Use

Be careful of what you say or do. No one is safe from surveillance these days as hidden cameras become almost undetectable. However, when playing with cheap technology like Nanny Cams, even the hunter can become the hunted.

Hidden cameras and Nanny Cams are gaining in popularity because you can use them for so many things. Given their name because of the main use - finding out abusive nannies- Nanny Cams can look like ordinary clock radios, teddy bears, pencil sharpeners, pot plants and much more.

People use them to check up on Nannies, children, cleaners and other household workers as well as even spying on cheating partners. They come in wired and wireless forms and can range in prices from around a hundred bucks for a basic camera.

You’ll also need a device to record the footage, such as a recordable DVD player, and if you purchase a wired model you may need someone to wire the thing up for you.
<
There are always privacy issues when recording video and sound and Nanny Cams could be a potential legal risk if you don’t know the state or federal laws that govern their use. Perhaps consultation with your lawyer before using one would be beneficial if you’re concerned about legal ramifications.
The Biggest Privacy Issue of All
Just like wireless internet, wireless Nanny Cams send out a signal that can be intercepted. As a qualified electronics technician I know how easy it is to pick up some cheap gear that can be used to turn a Nanny Cam against the people who are using it.
Imagine someone parked outside your house watching the show on your Nanny Cam, imagine the strange guy next door watching every move you make in your own house. Wireless monitoring systems are easy targets for anyone with a little knowledge in the electronics field.
Real Life Article: 'Nanny Cams' A Window for Video Spies
The so-called "nanny-cams" are best sellers at stores like Fort Lauderdale's Spy Shop International. One big problem, though, according to the Spy Shop's Joss Klavans, is that they make it easy to spy on camera owners in their homes.

"You are getting a false sense of security with wireless," Klavans said, adding that "whenever you have a wireless system you are going to have to deal with people being able to pick up that same channel."
Like thousands of other parents, Lisa Liebman bought a nanny-cam to keep an eye on her kids.
Unknowingly, she opened a window for peeping toms, thieves or even kidnappers to see into her home.
To demonstrate, NBC 6 senior correspondent Ike Seamans drove through her neighborhood and picked up her nanny-cam's signal with just an inexpensive television receiver.

Tuesday

Japanese Internet Killings Could Continue

There is the possibility of numerous copycat killings occurring in Japan as authorities struggle to quell the rise of online threats of suicide and harassment after a June 8 stabbing attack in Akihabara. The man involved rammed pedestrians with a truck then randomly knifed more than a dozen people after threatening to do so online. The attack has also mirrored a dark game that the killer may have played.

There is also a new dark side to the Japanese Internet emerging- The Suicide Club.

Concern has also been raised over other violent trends on Japanese websites, including suicide guides and violent games.

The Tragedy of Internet Gamers in Japan : "HIKIKOMORI"

The rise and rise of the reclusive internet gamer is becomming a trend worldwide, not just in Japan. However, Japan's model of the gamer is almost existentialistic.

We all know one. They call themselves 'gamers' and lock themselves away from society, semmingly discontent with the competitiveness of the educational system, workplace or just life in general. They submerge themselves in violent games, magazines and other media that seems dark and despondent to outsiders.

Similarities between the Akihabara killings and the gaming culture might seem a stretch of the imagination to some, but to others the connection is as plain as day.

The UK Telegraph produced an article that will be poignant to any parent who has lost sleep over their child who seems lost in an alternate universe of games and dark heroes.

Telegraph Artilce : Japan's Recluses Emerge and Start Killing

A decade ago, the Japanese public was gradually becoming aware of the term "hikikomori". Coined by a psychologist, Tamaki Saito, it referred to the individuals - usually male adolescents - who opted to lock themselves away from society and refused to communicate with the outside world.

Saito estimated that there could be as many as a million such social recluses across the country, choosing computer games, reading "manga" comics and surfing the internet rather than undergoing Japan's notoriously demanding education system, followed by unswerving loyalty to an employer.

And while parents may have wrung their hands with worry as they left another meal on a tray outside the bedroom door of their son, there was at least little concern that he was going to get into much trouble...

READ THE FULL TELEGRAPH ARTICLE BY CLICKING HERE

BBC Article : Japan's Internet Suicide Clubs

In Japan, the internet has been blamed for a spate of group suicides which appear to have been arranged in online chat rooms.

Andrew Harding talked to one young man searching for someone to die with.

Naoki Tachiwana opened his apartment door with a surprisingly warm smile, and beckoned us in to a neat living room. His computer was switched on - the screen facing out towards Naoki's eleventh floor balcony, and the night sky above Tokyo's eastern suburbs...

Read the Full BBC Article by Clicking Here
Japan Times Article:Akihabara Killings

Killer posted warnings on Internet'I will kill . . . in Akihabara

The nation was still reeling Monday from the deadly mayhem waged the day before by a 25-year-old man who ran down several people with a truck and then proceeded to fatally stab others in Tokyo's densely crowded Akihabara electronics district, killing seven.


Prayers offered: Visitors pray Monday in Akihabara, Tokyo, for seven people who were killed during a random knife attack the previous day. It was learned that several posts on a mobile phone Web site foretold the deadly stabbing spree.

The descriptions and the time-stamps of the messages, which were apparently posted starting early Sunday and continued until minutes before the stabbing spree, closely followed the developments.

The suspect, Tomohiro Kato, 25, a temp staff worker from Shizuoka Prefecture, has admitted to investigators that he posted the messages on the Web site, and the Metropolitan Police Department was trying to confirm the link between the crime and the posts, police sources said...

Japan Times-Click Here to Read the Full 'Akihabara Killings' Article


Paypal and Ebay Dirty Rotten Scoundrels

PayPal and Ebay Scams Still Happening

PayPal and Ebay have often been the target of criminals who attempt to phish or hack the organisation and/or its clients. Phishing attacks are usually e-mails trying to trick account holders into entering their details to fake websites that look like the real thing.

If you fall for it, you’re sending your Ebay or PayPal account number, as well as passwords and even credit card information, to a criminal. Any guesses whether this criminal will then use that information to empty your PayPal or bank account. Also, they may well use your Ebay account for other scams.

Here’s a couple of samples of scam emails

"Dear PayPal User, Today we had some trouble with one of our computer systems. While the trouble appears to be minor, we are not taking any chances. We decided to take the troubled system off-line and replace it with a new system. Unfortunately this caused us to lose some member data. Please follow the link below and log into your account to make sure your information is not affected. Account balances have not been affected."

Dear PayPal client, While performing it's regular scheduled monthly billing address check our system found incompatible information which seams to be no longer the same with your current credit card information that we have on file. If you changed your billing information or if you moved from you previous address please follow up the link bellow and update your billing information: If you didn't change any of this information you still need to follow up the previous link and update your existing billing information because it means that our database regular scheduled update wasn't made correctly. Choosing to ignore this message will result in to a temporary suspension of your account within 24 hours, until you will choose to solve this unpleasant situation.We apologies for any inconvenience this may caused you and we strongly advise you to update your information you have on file with us.

The scams will send account holders to a fake website where the victim will give up their details. The scams are quite sophisticated and the fake emails arrive with PayPal or Ebay logos.

The PayPal Security Center, located within the organization’s website, gives some good instructions for spotting phishing scams.

Ebay have some good information
here

Sunday

More on Identity Theft

Identity thieves use your own information against you to assume your identity. An identity thief can then open bank accounts, write bad checks, acquire new credit card accounts, personal loans, cash advances, cellular phone accounts or even illegally obtain employment in your name.

They may even break the law using your name.

Who Are These Identity Thieves?

It could be anyone. Although about half of identity theft cases in America are attributed to someone who knows the victim, but don‘t assume that this is the only area that the threat of fraud attacks from. Anyone wIho has access to your personal information could descend your identity and credit history in turmoil by assuming your identity.

Why do they do it?

Illegal immigrants do it to work in foreign countries. Some people do it so they can have access to medical insurance. Some people commit identity theft to hide from their past. The most sinister are terrorists or people who have previously committed a serious crime, like sex offenders who change their identity to try and gain access to employment at schools and gain access to children.

Some are internet hackers who run their scams on stolen credit cards and bandwidth provided by unknowing users. This practise has become more and more prevalent with the popularity of wireless internet. Most people do not take precautions when they use wireless internet and it is like leaving your front door open while you sleep at night.

Who is at Risk of Identity Theft?

Everyone is. Those at greatest risk don’t dispose of, or are careless with, information like credit card numbers, bank and other accounts, birth certificates, numbers associated with income tax and driver’s licenses.

On line, the threats are ever increasing and range from issues like phishing to hidden code within social sites like Myspace and Facebook. You should be very careful about forwarding your information across the web, especially when using wireless internet.

Physorg.com Article : Second-Hand Computers Pose Identity Theft Threat

A new identity theft study conducted by leading University of Leicester criminologist, Professor Martin Gill found that second-hand computers - which account for one in 12 computers in use worldwide - can be a potential treasure trove of personal information - putting users at risk of fraud and identity theft. The study urges personal and business computer users to ensure that all data is removed from their computers prior to disposing of them.

During his study, Second-Hand Computers and Identity Fraud, Professor Gill and his team purchased six computers through a mixture of second hand channels. They then conducted a forensic data analysis on each one, using a widely available software programme.

Half of the computers had in fact not been securely wiped. In one case there had been no attempt to wipe the contents whatsoever. Worryingly, data retrieved from two of the computers contained information that could be used by an identity thief. ..

Read the Full Article by Clicking Here


Wednesday

Safety for Children Online

Is it Safe for Kids On-line?

It’s up to their parents to take the right precautions. If you allow them carte blanch to do as they wish, they face on-line predators and the temptation of pornography among other things.

On the other hand, if you do too much and smother them you could drive them to do things behind your back. The internet should be a family activity and with good communication it can be exactly that.

So How Do You Keep an Eye on What the Kids Are Doing Without Betraying Their Trust?

It’s a good idea to set house rules about what information your children can give out and where they can go on-line. On-line communities like Myspace, Friendster and Facebook are extremely popular with young people (and some older kids, too), but they have to understand how easy a predator can track them using simple information obtained from the web.

Talk to your kids about they’re doing on the internet and let them know they can tell you if they come across something that isn’t what they expect. Get yourself up to date with some of the serious on-line threats like identity fraud, internet bullying, stalkers, phishing and spam. It’ll impress if the person setting the rules knows what they’re talking about.

Don’t put details like full names, addresses, phone numbers, birthdates and schools into social sites unless you’re going to restrict who can view the profile.

Try Some of the New Breed of Security Software Available

You might even consider using filters or surveillance software. Kaspersky has just released a new security suite that features a unique parental control. It’s worth downloading the free trial version to evaluate yourself. Just Google or Yahoo “Kaspersky free trial” and see what comes up.

In addition to parental control it has all the usual stuff like a firewall and antivirus. Kaspersky have obviously put a lot of work into simplifying the operation of their security software after a common complaint about previous efforts was continually that the product was difficult for novices to use.

Time.com Article : Facebook Sets Predator Safeguards

Facebook will add more than 40 new safeguards to protect young users from sexual predators and cyberbullies, attorneys general from several states said Thursday.

The changes include banning convicted sex offenders from the site, limiting older users' ability to search online for subscribers under 18 and building a task force seeking ways to better verify users' ages and identities.

Read the full Time.com article

Safety When Walking




If you’re walking alone at night to keep fit, or perhaps you're a student on campus or just need to get where you're going, it’s understandable that you might feel uneasy from time to time. Here are some simple tips that can help minimise your chances of being targeted by thieves, attackers or even stalkers;

1.Keep alert. If you feel as though something is wrong, head for a well-lit or populated area.

2.Try to walk against the flow of traffic as this will make it easy to see any cars that are approaching.

3.Walk with friends whenever you can, there‘s safety in numbers.

4.If people are following you or approach you, don't stop to have a conversation with them. Try to keep moving and find a well populated area.

5.Avoid walking where the lighting is poor, such as parks and laneways.

6.Handbags should be carried either in front of you or under your arm with the strap secured. Never let the bag or strap hang loosely.

7.Avoid wearing headphones as it’s difficult to hear what is happening around you.

8.If you have to walk alone, vary your route and consider a personal duress alarm
.
9. Carry a phone for emergencies

Keep Your Eyes on the Road

Driving and talking on a mobile phone is a definite no-no, but what about walking and talking on the phone? Apparently, it’s just as dangerous.In a study into mobile phone use among pedestrians, University of New South Wales researchers Julie Hatfield and Susanne Murphy observed more than 500 people crossing at intersections and found that those talking on phones did indeed appear more distracted than those who were not.

Men who were chatting on the phone crossed more slowly at intersections without traffic signals. Women on the phone not only crossed over more slowly, but also were less likely to look at traffic before setting out or to wait for cars to stop. It seems the real issue seems to be one of distraction, and that is as important for pedestrians crossing the road as it is for drivers, the study said.

Man Murdered While Walking the Dog

Police believe a plank of wood was used to assault a 66-year-old man who later died in hospital. A murder inquiry was launched after Peter Seaman was attacked while walking his dog in the Cornish village of Dobwalls on Thursday. The retired heating engineer was taken to hospital with serious head injuries but later died.

A 20-year-old man from the Looe area has been arrested on suspicion of assault.

Mr Seaman, who lived in the village, had been walking his terrier dog along Duloe road at about 1640 pm on Thursday afternoon when he was attacked near a bus shelter.
Police officers have since recovered a length of timber from the scene.


The Dangers of Using Pepper Spray and Stun Guns

Stun Guns and Tasers have their advantages, but they also have disadvantages for walkers. The biggest issue is that an attacker has to be close enough for you to touch them with the stun gun. That means you have a split second to react. There is also the urban myth that you can also be electrocuted if the attacker is touching you when you shock them. I'm not going to say this won't happen.

Another factor is clothing. If your attacker is heavily suited up with a rubber coat or similar thick clothing the effect of the stun gun could be minimal.

The voltage in stun guns ranges from around 50,000 volts to 1,000,000 volts. The amperage in stun guns is relatively low at around 2mA to 4.6mA (electrical current above 100mA is considered to be potentially lethal). Because the amount of current is relatively low, stun guns are considered to be non-lethal to humans.

Stun Guns have become big business and these days come as dual purpose protection aids. Some are flashlights with built in stun feature. Others are disguised as phones, pagers etc.

A telescopic stun baton is designed to be used on an attacking dog. Dog attacks are on the increase and one of these would be practical equipment for any fitness freak.

Pepper Spray is an option more civilians and law enforcement professionals are capitalising on. Imagine a substance 600 times hotter than cayenne pepper sprayed into your face, eyes and nostrils. Imagine if you have asthma or bronchitis. Or a heart condition.

The pain will be intense, breathing will become difficult and the subject's eyes will swell when sprayed with pepper (capsicum) aerosol. They will become disoriented and fall to the ground. Fear and panic will set in.

The European Parliament Scientific and Technological Options Assessment (STOA) published in 1998 “An Appraisal of Technologies of Political Control” with extensive information on pepper spray and tear gas. They write:

"The effects of pepper spray are far more severe, including temporary blindness which last from 15-30 minutes, a burning sensation of the skin which last from 45 to 60 minutes, upper body spasms which force a person to bend forward and uncontrollable coughing making it difficult to breathe or speak for between 3 to 15 minutes."

Those with asthma, taking other drugs, or subject to restraining techniques which restrict the breathing passages, risk death.

Immunity to Pepper Spray

Some people are actually immune to Pepper Spray. There is no way of telling who is and who isn't just by looking at them. For those out there who aren't lucky enough to be immune, capsicum is not washable by water alone, so hosing off a victim will not work. The only way to remove it is to wash liberally with detergent and water.

There is some speculation about clearasil being effective as a removal tool.

Something Interesting to Talk About

Pepper spray is banned for use in war by Article I.5 of the Chemical Weapons Convention which bans the use of all riot control agents in warfare whether lethal or non-lethal.









Add to Technorati Favorites