Purpose

Dedicated to helping people make themselves safe and their Homes harder targets,...or when James Bond meets Soccer Mom




Thursday, August 26, 2010

Personal Security - Protect Against Cell Phone Cloning

This week, we discovered that our Sprint cellular phones were cloned. This is usually done to make fraudulent telephone calls. The BILL for the calls goes to the legitimate subscriber – us! I am finding out that this cloning phenomenon is very popular in areas with large immigrant populations. The cloner or THIEF is also able to make effectively anonymous calls, which attracts another group of interested law-breakers. Thanks to my wife for checking our account periodically, the anomaly was caught early.

As a reminder to everyone, check your cell phone bill each month, whether for plan features or charges you didn’t ask for, all the way to issues like what my wife found on our account – anonymous long distance charges and unknown phone numbers. It is especially important because many people opt for auto pay on a cell phone bill, and given that these issues generally take a couple of weeks to research and resolve, auto pay could be triggered before the bill is fixed, prompting other issues in your bill paying lifestyle.


Speaking with a family member that works in a Sprint call center and with the Sprint customer service representative, they have a fraud department, which is where we were directed to once we called Sprint initially. Their sole job is to research issues like this cloning fraud case. They are generally responsive. In our case, it was obvious that our accounts were tampered with. I can only assume the fraud department analyzes the cell phone usage pattern. The fraud department works well with us and will work well with you if it is obvious.

Cloning required access to ESN and MIN pairs. ESN/MIN pairs were discovered in several ways:

Sniffing the cellular network
Trashing cellular companies or cellular resellers
Hacking cellular companies or cellular resellers
Cloning still works under the AMPS/NAMPS system, but has fallen in popularity as older clone-able phones are more difficult to find and newer phones have not been successfully reverse-engineered. Cloning has been successfully demonstrated under GSM, but the process is not easy and currently remains in the realm of serious hobbyists and researchers. Furthermore, cloning as a means of escaping the law is difficult because of the additional feature of a radio fingerprint that is present in the transmission signal of every mobile phone. This fingerprint remains the same even if the ESN or MIN is changed. Mobile phone companies can use the mismatch in the fingerprints and the ESN and MIN to identify fraud cases.


The Federal Communications Commission (FCC) defines cellular fraud (cell fraud) as the unauthorized use, tampering, or manipulation of a cellular phone or service. At one time, cloning of cellular phones accounted for a large portion of cell fraud. As a result, the Wireless Telephone Protection Act of 1998 expanded prior law to criminalize the use, possession, manufacture or sale of cloning hardware or software. Currently, the primary type of cell fraud is subscriber fraud. The cellular industry estimates that carriers lose more than $150 million per year due to subscriber fraud.

BOTTOM LINE:

Remember, to prevent subscriber fraud, make sure that your personal information is kept private when purchasing anything in a store or on the Internet. Protecting your personal information is your responsibility. For cell phone cloning fraud, the cellular equipment manufacturing industry has deployed authentication systems that have proven to be a very effective countermeasure to cloning. Call your cellular phone carrier for more information.

For more information on protecting your personal information, see the FCC’s Protecting Your Privacy consumer fact sheet at www.fcc.gov/cgb/consumerfacts/protectingprivacy.html. For information about other communications issues, visit the FCC’s Consumer and Governmental Affairs Bureau Web site at www.fcc.gov/cgb, or contact the FCC’s Consumer Center by e-mailing fccinfo@fcc.gov; calling 1-888-CALL-FCC (1-888-225-5322) voice or 1-888-TELL-FCC (1-888-835-5322) TTY; faxing 1-866-418-0232; or writing to:

Federal Communications Commission
Consumer & Governmental Affairs Bureau
Consumer Inquiries and Complaints Division
445 12th Street, SW
Washington , DC 20554

Tuesday, August 24, 2010

Home Security -Master Lock Weakness

The Master Lock 175D

It is easy to open up a Master Lock 175D. I use to use them to lock up my firearms in their pelican cases and my gate doors to my backyard. Please be aware of how thieves can pick these locks.



Take a look at the youtube video below. It is easy and fast to pick this lock.



There is another lock I have yet to see if there is a way to pick this one…the Shrouded Padlock No. 177D.


Best Used For:

* Residential Gates and Fences
* Sheds, Workshops and Garages
* Storage Lockers
* Tool Chests and Tool Boxes

There will always be people who figure out how to pick/ by pass these locks, but it is good for you to always be on top of the weaknesses of the locks you use…it makes you situational aware and keeps you from falling complacent and not give you a false sense of security.

Saturday, August 21, 2010

Personal Security - Choosing to Own a Gun for Protection

Whether you are looking to carry a firearm to protect yourself or your family, choosing a handgun or rifle for protection requires the open eyed decision to commit to the training and responsibility that comes with gun ownership. Do not take this lightly.

It requires some research as well. I knew someone who was in the military for a while and never owned a gun. Now married and with a family, there are at least two guns in that household. The following are just a few checklist items that were followed:

Check 1: Research your state gun laws. A good place to start is your local law enforcement department, whether it’s the Police or Sheriff’s department. You can check online, but things in cyberspace sometimes are not updated – local law enforcement is your best bet!

Check 2: Your gun of choice. That is a personal preference. Revolvers are almost always reliable alongside shotguns. In this day and age there are semi-automatic handguns and different type of caliber guns! Getting comfortable and knowing the pros and cons of the weapon is a plus! Revolver picture at upper left.

Check 3: Training and gun safety. Taking a gun course that covers everything from your state gun laws, gun safety, and shooting is the right way to go to cover your basis. If your State allows concealed carry, this is a good course to take knowing gun laws, and a good capability to have - carrying concealed or even in your vehicle. Plus these courses puts you in good contact with other like minded gun owners and exposes you to training opportunities. Semi-Automatic pictured at upper left.

Check 4: Maintenance. This requires proper cleaning and storage of your gun.

Check 5: Firing your weapon. Go to a local gun range and fire your gun! The more you practice, the more comfortable you will feel with it and become better equipped to handle a dangerous situation like a home invasion. Some gun clubs have rental guns so you can "test drive" different guns. And, I have not ever been to a gun club that id not have people willing to give you advice and let you fire their guns. You have to be safe and comfortable with the gun(s) you own. Shotgun pictured at upper left.

There are many programs and to start visit the NRA website or its blog site, http://nrablog.com.