Purpose

Dedicated to helping people make themselves safe and their Homes harder targets,...or when James Bond meets Soccer Mom




Tuesday, September 7, 2010

Personal Protection for Senior Citizens

The Federal Bureau of Investigations (FBI) has a common fraud schemes site on their webpage that provides tips on how you can protect you and your family from fraud. Senior Citizens especially should be aware of fraud schemes.


It has been the experience of the FBI that the elderly are targeted for fraud for several reasons:

1) Older American citizens are most likely to have a "nest egg," own their home and/or have excellent credit all of which the con-man will try to tap into. The fraudster will focus his/her efforts on the segment of the population most likely to be in a financial position to buy something.

2) Individuals who grew up in the 1930s, 1940s, and 1950s were generally raised to be polite and trusting. Two very important and positive personality traits, except when it comes to dealing with a con-man. The con-man will exploit these traits knowing that it is difficult or impossible for these individuals to say "no" or just hang up the phone.

3) Older Americans are less likely to report a fraud because they don't know who to report it to, are too ashamed at having been scammed, or do not know they have been scammed. In some cases, an elderly victim may not report the crime because he or she is concerned that relatives may come to the conclusion that the victim no longer has the mental capacity to take care of his or her own financial affairs.

4) When an elderly victim does report the crime, they often make poor witnesses. The con-man knows the effects of age on memory and he/she is counting on the fact that the elderly victim will not be able to supply enough detailed information to investigators such as: How many times did the fraudster call? What time of day did he/she call? Did he provide a call back number or address? Was it always the same person? Did you meet in person? What did the fraudster look like? Did he/she have any recognizable accent? Where did you send the money? What did you receive if anything and how was it delivered? What promises were made and when? Did you keep any notes of your conversations?

The victims' realization that they have been victimized may take weeks or, more likely, months after contact with the con-man. This extended time frame will test the memory of almost anyone.

5) Lastly, when it comes to products that promise increased cognitive function, virility, physical conditioning, anti-cancer properties and so on, older Americans make up the segment of the population most concerned about these issues. In a country where new cures and vaccinations for old diseases have given every American hope for a long and fruitful life, it is not so unbelievable that the products offered by these con-men can do what they say they can do.

***What to Look For and How to Protect Yourself and Your Family***

Health Insurance Frauds:

1) Medical Equipment Fraud.

Equipment manufacturers offer "free" products to individuals. Insurers are then charged for products that were not needed and/or may not have been delivered.

2) "Rolling Lab" Schemes.

Unnecessary and sometimes fake tests are given to individuals at health clubs, retirement homes, or shopping malls and billed to insurance companies or Medicare.

3) Services Not Performed.

Customers or providers bill insurers for services never rendered by changing bills or submitting fake ones.

4) Medicare Fraud.

Medicare fraud can take the form of any of the health insurance frauds described above. Senior citizens are frequent targets of Medicare schemes, especially by medical equipment manufacturers who offer seniors free medical products in exchange for their Medicare numbers. Because a physician has to sign a form certifying that equipment or testing is needed before Medicare pays for it, con-artists fake signatures or bribe corrupt doctors to sign the forms. Once a signature is in place, the manufacturers bill Medicare for merchandise or service that was not needed or was not ordered.

***Some Tips to Avoiding Health Insurance Frauds***

1) Never sign blank insurance claim forms.

2) Never give blanket authorization to a medical provider to bill for services rendered.

3) Ask your medical providers what they will charge and what you will be expected to pay out-of-pocket.

4) Carefully review your insurer's explanation of the benefits statement.

5) Call your insurer and provider if you have questions.

6) Do not do business with door-to-door or telephone salespeople who tell you that services of medical equipment are free.

7) Give your insurance/Medicare identification only to those who have provided you with medical services.

8) Keep accurate records of all health care appointments.

9) Know if your physician ordered equipment for you.

***Some Tips to Avoiding Counterfeit Prescription Drugs***

1) Be mindful of appearance. Closely examine the packaging and lot numbers of prescription drugs and be alert of any changes from one prescription to the next.

2) Consult your pharmacist or physician if your prescription drug looks suspicious.

3) Alert your pharmacist and physician immediately if your medication causes adverse side effects or if your condition does not improve.

4) Use caution when purchasing drugs on the Internet. Do not purchase medications from unlicensed online distributors or those who sell medications without a prescription. Reputable online pharmacies will have a seal of approval called the Verified Internet Pharmacy Practice Site (VIPPS), provided by the Association of Boards of Pharmacy in the United States.

5) Product promotions or cost reductions and other "special deals" may be associated with counterfeit product promotion.

***Some Tips to Avoiding Funeral and Cemetery Fraud***

1) Be an informed consumer. Take time to call and shop around before making a purchase. Take a friend with you who may offer some perspective to help make difficult decisions. Funeral homes are required to provide detailed general price lists over the phone or in writing.

3) Educate yourself fully about caskets before you buy one and understand that caskets are not required for direct cremations.

4) Understand the difference between funeral home basic fees for professional services and any fees for additional services.

5) You should know that embalming rules are governed by state law and that embalming is not legally required for direct cremations.

6) Carefully read all contracts and purchasing agreements before signing and make certain that all of your requirements have been put in writing.

7) Make sure you understand all contract cancellation and refund terms, as well as your portability options for transferring your contract to other funeral homes.

8) Before you consider prepaying, make sure you are well informed. When you do make a plan for yourself, share your specific wishes with those close to you.

9) And, as a general rule governing all of your interactions as a consumer, do not allow yourself to be pressured by vendors into making purchases, signing contracts, or committing funds. These decisions are yours and yours alone.

There are more helpful tips for you at http://www.fbi.gov/majcases/fraud/seniorsfam.htm

Stay safe and alert out there!

Sunday, September 5, 2010

Gun Safety

If you are one of the 60 million plus Americans owning guns for personal protection, or are considering becoming a gun owner, it will pay off in spades for have and follow firearms safety rules when handling, using and cleaning guns.

The fundamental NRA rules for safe gun handling are:

1. ALWAYS keep the gun pointed in a safe direction.
This is the primary rule of gun safety. A safe direction means that the gun is pointed so that even if it were to go off it would not cause injury or damage. The key to this rule is to control where the muzzle or front end of the barrel is pointed at all times. Common sense dictates the safest direction, depending on different circumstances.

2. ALWAYS keep your finger off the trigger until ready to shoot.
When holding a gun, rest your finger on the trigger guard or along the side of the gun. Until you are actually ready to fire, do not touch the trigger.

3. ALWAYS keep the gun unloaded until ready to use.
Whenever you pick up a gun, immediately engage the safety device if possible, and, if the gun has a magazine, remove it before opening the action and looking into the chamber(s) which should be clear of ammunition. If you do not know how to open the action or inspect the chamber(s), leave the gun alone and get help from someone who does.

When using or storing a gun, always follow these NRA rules:

1. Know your target and what is beyond.
Be absolutely sure you have identified your target beyond any doubt. Equally important, be aware of the area beyond your target. This means observing your prospective area of fire before you shoot. Never fire in a direction in which there are people or any other potential for mishap.

2. Think first. Shoot second.
Know how to use the gun safely. Before handling a gun, learn how it operates. Know its basic parts, how to safely open and close the action and remove any ammunition from the gun or magazine. Remember, a gun's mechanical safety device is never foolproof. Nothing can ever replace safe gun handling.

3. Be sure the gun is safe to operate.
Just like other tools, guns need regular maintenance to remain operable. Regular cleaning and proper storage are a part of the gun's general upkeep. If there is any question concerning a gun's ability to function, a knowledgeable gunsmith should look at it.

4. Use only the correct ammunition for your gun.
Only BBs, pellets, cartridges or shells designed for a particular gun can be fired safely in that gun. Most guns have the ammunition type stamped on the barrel. Ammunition can be identified by information printed on the box and sometimes stamped on the cartridge. Do not shoot the gun unless you know you have the proper ammunition.

5. Wear eye and ear protection as appropriate.
Guns are loud and the noise can cause hearing damage. They can also emit debris and hot gas that could cause eye injury. For these reasons, shooting glasses and hearing protectors should be worn by shooters and spectators.

6. Never use alcohol or over-the-counter, prescription or other drugs before or while shooting. Alcohol, as well as any other substance likely to impair normal mental or physical bodily functions, must not be used before or while handling or shooting guns.

7. Store guns so they are not accessible to unauthorized persons.
Many factors must be considered when deciding where and how to store guns. A person's particular situation will be a major part of the consideration. Dozens of gun storage devices, as well as locking devices that attach directly to the gun, are available. However, mechanical locking devices, like the mechanical safeties built into guns, can fail and should not be used as a substitute for safe gun handling and the observance of all gun safety rules.

8. Be aware that certain types of guns and many shooting activities require additional safety precautions.


9. Cleaning
Regular cleaning is important in order for your gun to operate correctly and safely. Taking proper care of it will also maintain its value and extend its life. Your gun should be cleaned every time that it is used. A gun brought out of prolonged storage should also be cleaned before shooting. Accumulated moisture and dirt, or solidified grease and oil, can prevent the gun from operating properly.

Before cleaning your gun, make absolutely sure that it is unloaded. The gun's action should be open during the cleaning process. Also, be sure that no ammunition is present in the cleaning area.

Thursday, September 2, 2010

Cellular Security - Removing Cell Phone Virus'

How To Remove Mobile Trojans or Cell Phone Virus

As we move more and more into the smart-phone era of cellular technology, we are exposing ourselves to a different type of criminal in cyberspace – aside from your computers (although your smart-phone is a mini-computer). Below is some advice and information I ran across the following website http://www.nospysoftware.com/spyware-articles/cell-phone-virus.php

The more and more we get into this 21st century technology, just like anything with the good comes the bad.

Trojans unlike viruses are a program that never duplicates or copies itself but does damage or compromise the security of the mobile. The best defense against mobile virus is antivirus software but most antivirus software won’t find all variants of Trojans so again a firewall is needed.


The Kaspersky Antivirus is one of the antiviruses available for removing the cell phone virus like cell phone virus 911. The spy sweeper is an award winning software that effectively and safely detects and removes Trojans from your mobile. The antivirus software is a pest patrol that protects your cell phone from the cell phone spyware and removes them. The best way to remove Trojan is preventing it before it gets installed. Some of the preventive techniques are explained below.

Preventive Techniques:

Fortunately, security products that can detect malicious code exist for most mobile device operating systems. For smart phones in particular, real-time automatic and on-demand virus scan capabilities can protect files that are stored on the smart phone's file system, while the firewall should use protocol and port filtering to protect the data and applications being transmitted. To ensure that devices are protected against new threats, users should be able to download the latest virus protection updates when the device has access to a wireless connection.

Another way of prevention is

* Do not install pirated software on your mobile. Only install software from reliable resources.
* Do not accept any messages sent over blue tooth from somebody you don’t know or if you are not expecting to receive one.
* Provide training to personnel using mobile phones / PDAs. People cannot be held accountable to secure their information if they haven't been told how.
* Patch management for software on mobile devices should not be overlooked. This can often be simplified by integrating patching with syncing, or patch management with the centralized inventory database.

The anti virus software can easily detect and remove all the current Symbian Malware and can also detect if infected files are trying to be installed and stop them. But at the end of the day if you use your common sense and follow the rules you will have nothing to worry about at all.

Smartphones, PDAs, and laptops are increasingly being used in much the same way as desktop computers, putting these devices at risk of the onslaught of threats that has been seen in recent years on PCs. Mobile phone virus though still not as widespread as computer viruses can still be a nuisance and lead to monetary loss or identity theft. Taking some basic precautions as described above could effectively combat cell phone virus and mobile viruses.

Tuesday, August 31, 2010

Personal Security - Self Defense With a Gun

There have been a couple of news reports of people defending themselves against the bad guys with their guns! Personal protection and home security is very important! The following articles are examples of defending yourself and your home. Please keep in mind that with proper training and practice, you will become more confident with your weapon and will less likely have an accident. When the time comes to use it, you will be more likely to make a valid decision – saving and protecting yourself and or your family!


Police: Home intruder shot, killed by Midtown resident
Anchorage Daily News/adn.com, Published: August 30th, 2010


Anchorage police have identified the man who was shot and killed early Sunday during a failed home-invasion robbery attempt. Robert Kost, 23, of Anchorage died of his wounds after being shot by a tenant of a Midtown triplex in the 800 block of West 23rd Avenue , said police Lt. Dave Parker. Police believe two or more others were with Kost during the robbery attempt just after midnight Sunday, and homicide detectives are searching for them. The others ran away after the shooting, Parker said.

Read more: http://www.adn.com/2010/08/29/1429906/police-intruder-shot-killed-in.html#ixzz0yDTtRRK0

69-year-old Ala. woman shoots home intruder, Decatur, Ala.

A pistol-packing 69-year-old woman in northern Alabama believes intruders will think twice before messing with her again.

Police say Ethel Jones shot an 18-year-old man in the stomach when she found him inside her bedroom at her home in Decatur .

Jones says she sleeps with her gun under a pillow next to her. She says she grabbed it after hearing a door rattle shortly before 3 a.m. Monday.

Police say the suspect removed a window air conditioner to get inside the home. He is in the hospital and faces a charge of second-degree burglary.

http://www.sltrib.com/sltrib/home/50195350-76/ala-decatur-woman-decaturdaily.html.csp


Police say man fatally shot alleged mugger in South Dallas
The Dallas Morning News, Monday, August 30, 2010,By Avi Selk


A Sachse man shot his alleged mugger to death in South Dallas early Friday morning, according to police records.

Nicholas Lewis, 22, who lived on Cleveland Street , died in the hospital a few hours after he allegedly held up Jeffrey Hall, 43, in the 1800 block of Pennsylvania Avenue.

Lewis pointed a semiautomatic pistol at Hall and demanded his wallet, according to a police report. Hall told police he handed his wallet to Lewis, who started to ride away on a bicycle.

But Lewis then turned, according to police, and fired at Hall – missing him and striking his pickup.

Hall then pulled out his licensed pistol and shot Lewis multiple times, according to police. Hall shot Lewis in the torso, the buttocks and the head, according to Lewis' sister, who says she watched him die at Baylor Medical Center at Dallas a few hours later.

Lt. David Pughes of the Dallas Police Department said police so far had no reason to doubt Hall's claim that he shot Lewis in self-defense. But it would be up to a grand jury to decide whether to file any charges, Pughes said. Reached at home, Hall declined to comment.

Latasha Lewis said that her brother "had his shortcomings," but that she could not believe he fired at Hall.

"I'm not justifying him robbing," she said. "He was wrong if that's what he did. But if he drove off on his bicycle, the best thing you could have done was to call the police."

http://www.dallasnews.com/sharedcontent/dws/news/localnews/stories/DN-shooting_30met.ART.State.Edition2.3583e60.html

Sunday, August 29, 2010

Cyber Security - Wi-Fi Security

This weekend I was talking to family about Wi-Fi and the security measure one needs to take when at a Wi-Fi hotspot such as a cyber cafe or even at home. Locking your router with a complex password is a start. However, I cam across an article By Jorge L. Valens, from the Sun Sentinel this weekend that touches the surface of this phenomena. Below are the key points he had:


Looking to set-up a Wi-Fi network at home or enjoy browsing the Internet in public? FIU Network Manager Eric Johnson offers this advice.

1. Protect your network with a WPA/WPA2 encryption and allow it to generate a password for you, rather than choosing something predictable like your last name or birthday.

2. Use common sense when connecting to a Wi-Fi network outside of your home. If you notice more than one network, ask someone at the location you are at, be it a coffee shop or an airport which network is the correct one.

3. Don't do things in public you don't want to be seen. Most public Wi-Fi hotspots are not secured, always assume someone can see what you are surfing on in these places.

4. Use different passwords for different services. Sites like social networking sites don't always default to a secure connection. Bad guys will try to use a password they collect from those sites

5. Be careful about signing on to social networking sites and forums. These sites typically don't use HTTPS protocols and require login/pass to get in. If your social network password is the same as the one for your bank account, hackers will use them.

The article also had more important points to remember:

Leaving the default security settings switched on in a home wireless router is never a good idea.

Elias Montoya, technology director for Abadin Cook, a Miami-based law firm, said users should make sure to stick to a strong password, such as the WEP 2 generated password, that mixes characters, numbers and letters rather than choosing something predictable like their home phone number or leaving the default password.

"The [Wi-Fi] user should be in the mindset that nothing is 100 percent secure. … If someone is intent on hacking you, they will," Montoya said.

Wi-Fi use in public places, such as coffee shops, is becoming increasingly popular, but these networks are typically wide open, said Johnson.

"You should always treat any Internet activity you do at these locations as if it's being monitored," he said.

Johnson added that people should stay away from doing anything that they would not want to be seen, such as online banking.

Many coffee shops offer free, secure Wi-Fi to customers.

For the complete article, click here.

Stay safe out there in cyberspace!

Thursday, August 26, 2010

Personal Security - Protect Against Cell Phone Cloning

This week, we discovered that our Sprint cellular phones were cloned. This is usually done to make fraudulent telephone calls. The BILL for the calls goes to the legitimate subscriber – us! I am finding out that this cloning phenomenon is very popular in areas with large immigrant populations. The cloner or THIEF is also able to make effectively anonymous calls, which attracts another group of interested law-breakers. Thanks to my wife for checking our account periodically, the anomaly was caught early.

As a reminder to everyone, check your cell phone bill each month, whether for plan features or charges you didn’t ask for, all the way to issues like what my wife found on our account – anonymous long distance charges and unknown phone numbers. It is especially important because many people opt for auto pay on a cell phone bill, and given that these issues generally take a couple of weeks to research and resolve, auto pay could be triggered before the bill is fixed, prompting other issues in your bill paying lifestyle.


Speaking with a family member that works in a Sprint call center and with the Sprint customer service representative, they have a fraud department, which is where we were directed to once we called Sprint initially. Their sole job is to research issues like this cloning fraud case. They are generally responsive. In our case, it was obvious that our accounts were tampered with. I can only assume the fraud department analyzes the cell phone usage pattern. The fraud department works well with us and will work well with you if it is obvious.

Cloning required access to ESN and MIN pairs. ESN/MIN pairs were discovered in several ways:

Sniffing the cellular network
Trashing cellular companies or cellular resellers
Hacking cellular companies or cellular resellers
Cloning still works under the AMPS/NAMPS system, but has fallen in popularity as older clone-able phones are more difficult to find and newer phones have not been successfully reverse-engineered. Cloning has been successfully demonstrated under GSM, but the process is not easy and currently remains in the realm of serious hobbyists and researchers. Furthermore, cloning as a means of escaping the law is difficult because of the additional feature of a radio fingerprint that is present in the transmission signal of every mobile phone. This fingerprint remains the same even if the ESN or MIN is changed. Mobile phone companies can use the mismatch in the fingerprints and the ESN and MIN to identify fraud cases.


The Federal Communications Commission (FCC) defines cellular fraud (cell fraud) as the unauthorized use, tampering, or manipulation of a cellular phone or service. At one time, cloning of cellular phones accounted for a large portion of cell fraud. As a result, the Wireless Telephone Protection Act of 1998 expanded prior law to criminalize the use, possession, manufacture or sale of cloning hardware or software. Currently, the primary type of cell fraud is subscriber fraud. The cellular industry estimates that carriers lose more than $150 million per year due to subscriber fraud.

BOTTOM LINE:

Remember, to prevent subscriber fraud, make sure that your personal information is kept private when purchasing anything in a store or on the Internet. Protecting your personal information is your responsibility. For cell phone cloning fraud, the cellular equipment manufacturing industry has deployed authentication systems that have proven to be a very effective countermeasure to cloning. Call your cellular phone carrier for more information.

For more information on protecting your personal information, see the FCC’s Protecting Your Privacy consumer fact sheet at www.fcc.gov/cgb/consumerfacts/protectingprivacy.html. For information about other communications issues, visit the FCC’s Consumer and Governmental Affairs Bureau Web site at www.fcc.gov/cgb, or contact the FCC’s Consumer Center by e-mailing fccinfo@fcc.gov; calling 1-888-CALL-FCC (1-888-225-5322) voice or 1-888-TELL-FCC (1-888-835-5322) TTY; faxing 1-866-418-0232; or writing to:

Federal Communications Commission
Consumer & Governmental Affairs Bureau
Consumer Inquiries and Complaints Division
445 12th Street, SW
Washington , DC 20554

Tuesday, August 24, 2010

Home Security -Master Lock Weakness

The Master Lock 175D

It is easy to open up a Master Lock 175D. I use to use them to lock up my firearms in their pelican cases and my gate doors to my backyard. Please be aware of how thieves can pick these locks.



Take a look at the youtube video below. It is easy and fast to pick this lock.



There is another lock I have yet to see if there is a way to pick this one…the Shrouded Padlock No. 177D.


Best Used For:

* Residential Gates and Fences
* Sheds, Workshops and Garages
* Storage Lockers
* Tool Chests and Tool Boxes

There will always be people who figure out how to pick/ by pass these locks, but it is good for you to always be on top of the weaknesses of the locks you use…it makes you situational aware and keeps you from falling complacent and not give you a false sense of security.

Saturday, August 21, 2010

Personal Security - Choosing to Own a Gun for Protection

Whether you are looking to carry a firearm to protect yourself or your family, choosing a handgun or rifle for protection requires the open eyed decision to commit to the training and responsibility that comes with gun ownership. Do not take this lightly.

It requires some research as well. I knew someone who was in the military for a while and never owned a gun. Now married and with a family, there are at least two guns in that household. The following are just a few checklist items that were followed:

Check 1: Research your state gun laws. A good place to start is your local law enforcement department, whether it’s the Police or Sheriff’s department. You can check online, but things in cyberspace sometimes are not updated – local law enforcement is your best bet!

Check 2: Your gun of choice. That is a personal preference. Revolvers are almost always reliable alongside shotguns. In this day and age there are semi-automatic handguns and different type of caliber guns! Getting comfortable and knowing the pros and cons of the weapon is a plus! Revolver picture at upper left.

Check 3: Training and gun safety. Taking a gun course that covers everything from your state gun laws, gun safety, and shooting is the right way to go to cover your basis. If your State allows concealed carry, this is a good course to take knowing gun laws, and a good capability to have - carrying concealed or even in your vehicle. Plus these courses puts you in good contact with other like minded gun owners and exposes you to training opportunities. Semi-Automatic pictured at upper left.

Check 4: Maintenance. This requires proper cleaning and storage of your gun.

Check 5: Firing your weapon. Go to a local gun range and fire your gun! The more you practice, the more comfortable you will feel with it and become better equipped to handle a dangerous situation like a home invasion. Some gun clubs have rental guns so you can "test drive" different guns. And, I have not ever been to a gun club that id not have people willing to give you advice and let you fire their guns. You have to be safe and comfortable with the gun(s) you own. Shotgun pictured at upper left.

There are many programs and to start visit the NRA website or its blog site, http://nrablog.com.

Thursday, August 19, 2010

13 Things An Identity Thief Won't Tell You

Courtesy of of Reader's Digest Magazine

Former identity thieves confess the tactics they use to scam you.

1. Watch your back. In line at the grocery store, I’ll hold my phone like I’m looking at the screen and snap your card as you’re using it. Next thing you know, I’m ordering things online—on your dime.

2. That red flag tells the mail carrier—and me—that you have outgoing mail. And that can mean credit card numbers and checks I can reproduce.

3. Check your bank and credit card balances at least once a week. I can do a lot of damage in the 30 days between statements.

4. In Europe, credit cards have an embedded chip and require a PIN, which makes them a lot harder to hack. Here, I can duplicate the magnetic stripe technology with a $50 machine.

5. If a bill doesn’t show up when it’s supposed to, don’t breathe a sigh of relief. Start to wonder if your mail has been stolen.

6. That’s me driving through your neighborhood at 3 a.m. on trash day. I fill my trunk with bags of garbage from different houses, then sort later.

7. You throw away the darnedest things like pre-approved credit card applications, old bills, expired credit cards, checking account deposit slips, and crumpled-up job or loan applications with all your personal information.

8. If you see something that looks like it doesn’t belong on the ATM or sticks out from the card slot, walk away. That’s the skimmer I attached to capture your card information and PIN.

9. Why don’t more of you call 888-5-OPTOUT to stop banks from sending you pre-approved credit offers? You’re making it way too easy for me.

PLUS: 13 Things Your Financial Adviser Won't Tell You

10. I use your credit cards all the time, and I never get asked for ID. A helpful hint: I’d never use a credit card with a picture on it.

11. I can call the electric company, pose as you, and say, “Hey, I thought I paid this bill. I can’t remember—did I use my Visa or MasterCard? Can you read me back that number?” I have to be in character, but it’s unbelievable what they’ll tell me.

12. Thanks for using your debit card instead of your credit card. Hackers are constantly breaking into retail databases, and debit cards give me direct access to your banking account.

13. Love that new credit card that showed up in your mailbox. If I can’t talk someone at your bank into activating it (and I usually can), I write down the number and put it back. After you’ve activated the card, I start using it.

Tuesday, August 17, 2010

Exterior Doors and Locks

Good information from State Farm Insurance, regarding door and locks.

State Farm recommends Grade 1 (ANSI designation) deadbolt type locks on:

Exterior doors:
Doors between attached garages and living spaces
Garage man doors (even if the garage is not attached to the house.)

Although many people assume their local building codes require a minimum level of quality and security for the door locks installed on their homes, most building codes don't even require a lock on exterior doors, let alone a minimum level of quality.

Most contractors select the locks based on price. Make a better selection by knowing what to look for.

Door Locks From a Burglar's Perspective:

Burglars prefer to break into a home through a door because it is quick and easy. A good quality lock is a deterrent. When intruders are interviewed about the selection of a target, many say seeing quality deadbolt locks will cause them to move on to another house.

A burglar can enter the home through a door using several methods:

The door can be left unlocked.

Doors can be kicked in.

Door locks can be picked.

Door locks can be hammered until they fall off.

Doors can be pried open.

Door frames can be spread apart with a spreader bar.

Door locks can be "drilled out" using a power drill.

Locks can be pried off with pipe wrenches or pliers.

Panes of glass in or beside doors can be broken so the intruder can reach in and unlock the lock.

Sometimes thieves obtain a copy of the house key from an acquaintance.

Remember, the intruder will select the door that looks easiest to break into and that offers the least chance of being seen.

Doors going into the garage and going from an attached garage into the house many times offer an intruder the opportunity to hide from view while they are breaking in. Extra thought should go into the security at these locations.

According to a study by the California Crime Technological Research Foundation, the most common techniques used by burglars to enter single-family homes are (from most often used to least often used):

32.00% Through unlocked window or door

26.64% Forced entry by impacts

24.02% Prying or jimmying

6.79% Use of pass key or picking the lock

5.10% Entry attempted, but failed

5.45% Other or unknown

Learn more about how to protect your home from intruders:


1.) Install locks with deadbolts. In residential construction there are basically two types of bolts used on exterior doors: latch bolts and deadbolts. Some locks combine the two bolts into one.

2.) Install locks with an ANSI Grade 1 classification. There is a grading system that measures the security and durability of door locks. The American National Standards Institute (ANSI) has standards, developed and maintained by The Builders Hardware Manufacturers Association Inc. (BHMA), that comparatively measure the security and durability performance of door locks. Not all Grade 1 locks are equal. Different types of door locks are tested differently under ANSI standards. But the grade designation system is the same.

3.) Install locks with key control. Key control is simply controlling who has copies of keys to your home. Many door keys can be copied at a local hardware or retail store. However, many manufacturers now offer locks using keys that cannot be copied except by certain locksmiths or only by the manufacturer themselves. There are burglaries where the unlawful entry can be traced back to a key that was either knowingly or unwittingly provided to the burglar.

Key control can help protect your from the following scenarios:

In-home help has been fired or quit, but they made their own copy of your house key.

In-home help may have acquaintances who burglarize homes; they might try to acquire a key through them

Mechanics may try to make copies of your house key while working on your car.

Key control may require extra effort, such as a letter to the lock manufacturer or a trip to the locksmith to get a key made. Also, there is an additional cost due to record keeping by the manufacturer or locksmith (between $10 and $50 per key). The additional cost and inconvenience should be weighed against the security benefits.

Other Door Lock Features to Look For:




Security Strike Plate -- A strike plate comes with every door lock. Many times these strike plates are cosmetic and not intended to provide much security. The strike plate's attachment to the doorframe is usually the weakest point in the entire door/door frame/lock system.

High security strike plates are available. They sometimes come with a heavy gauge metal reinforcing plate that mounts under the cosmetic strike plate and come with 3" long screws that secure the strike to the wall framing, not just to the door frame jamb.

The screw holes are staggered so the screws don't penetrate into the same grain of wood. The concept of screwing into different wood grains in the door frame and wall framing is to make it more difficult to split the wood door frame or wall framing when the door is impacted. This feature should be considered at every exterior door and at those doors coming from attached garages.

Long Screws. 1" Minimum Throw on Deadbolt -- The throw of the deadbolt is the length that the deadbolt extends out of the door edge. A minimum throw of 1" is recommended. Longer throws makes it more difficult to gain entry by spreading the door frame.

Saw-Resistant Bolts. Some deadbolts come with internal anti-saw pins. The pins spin freely inside the bolt. If someone tries to break in by sawing off the deadbolt, the pin will make this difficult because it spins back and forth with every movement of the saw blade.

Captured Key Deadbolt. Burglars can gain entry through a locked door by breaking the glass in the door light or sidelight, reaching in, and simply unlocking the door. Many homeowners, in an effort to prevent this, install double cylinder deadbolt locks with keyholes on both sides of the door.

Don't let Double Cylinder Deadbolts create a fire safety danger to your family. In the case of a fire when the family needs to get out of the house quickly, you don't want to be wasting time looking for the key to unlock the door. Most building codes do not allow this type of lock on doors that are used to exit the house for this very reason.

To solve this conflict between family safety and security, one manufacturer has developed a deadbolt lock with a feature called a captured key. On the interior side of the door the deadbolt lock has a thumb turn that can be removed from the lock, leaving a keyhole. The idea is when no one is home, there is no need for the thumb-turn. The last person to leave removes the thumb-turn and creates a double cylinder deadbolt condition.

Captured Key Thumb-turn -- The thumb-turn cannot be removed without having a key to the lock. Therefore, small children cannot remove the thumb-turn from the lock. Also, the thumb-turn can actually be used as a house key. It is important that whenever anyone is in the home that the thumb-turn is left in the lock at all times.

Hardened Cased Steel & Beveled Casings -- On a typical deadbolt lock the outside housing of the lock is called the "casing" or "case." Many lock manufacturers make their casings out of hardened steel and many make the casing beveled. The hardened cased steel makes the casing more resilient against blows from a hammer. Beveling the casing makes it very difficult to get pliers or pipe wrenches to stay on the lock when trying to twist it loose.

Anti-Drill Feature -- Some intruders know how to drill out a lock. Some manufacturers combat this by installing hardened steel chips within the lock housing. When the drill bit hits these steel chips, it tears up the drill bit.

Dropbolts and Rim Locks -- If a dropbolt or rim lock is selected, make sure the lock is mounted on the door with through bolts.

Dropbolt with Through Bolts and Without -- If not, a forced entry can cause the lock to separate from the door. The typical dropbolt and rim lock should not be considered as secure as a deadbolt lock.

Help in assessing the need for better security can be found with your local police department. Many departments have a crime prevention unit that will examine your home. Based on their experience with crime, they can see things that the average homeowner does not. Also, an experienced locksmith can help you select the right products.

Sunday, August 15, 2010

Child Safety and Crime Prevention Tips

On a drive to the local store yesterday I saw two children that could not be older than 7 or 8, walking along the road at least 400 yards from the nearest house. This was on a road that was a few hundrd yards from a State Highway. Predators look for opportunities to kidnap kids where there is a easily access escape route. Time and distance are the predator's friends.

So as we gear up for the school season to once again start. Let's be mindful of the safety tips we need to take for our children.

Tips to Protect Your Children from Crime:

Never leave small children alone in a public place. Have young children walk to school with a brother, sister or friend. Don’t allow young children to roam the neighborhood, trick or treat, or sell things door-to-door without an adult.

Tell children not to answer the door if they are alone.

Teach children telephone safety. Children who are alone should tell callers that their parents are unable to come to the telephone. Warn them not to give their name or address to an unknown caller.

Talk to children about crime and safety. Warn them not to talk to strangers. Remind them not to enter a car or home of a stranger.

Teach your kids about some ruses that predators use to lure kids to a car....."Hey little buddy, want to see my puppies? Do you know someone who wants a puppy? I have to find a good home for my puppy,..do you know anyone who wants a cute puppy?

Teach them to make a commotation if someone trys to grab them; running and screaming if the best way to draw attention and either make the predator abort or get witnesses to the act.

Teach children how to use 911 or another emergency telephone number. Leave a number so that babysitters can reach someone in an emergency.

Teach children their home telephone number and address. Show them how to call home from a pay phone even without money.

Friday, August 13, 2010

Personal Security - Beware of Geo-Tagging on Photos

When Adam Savage, host of the popular science program “MythBusters,” posted a picture on Twitter of his automobile parked in front of his house, he let his fans know much more than that he drove a Toyota Land Cruiser.

Embedded in the image was a geotag, a bit of data providing the longitude and latitude of where the photo was taken. Hence, he revealed exactly where he lived. And since the accompanying text was “Now it’s off to work,” potential thieves knew he would not be at home.

Security experts and privacy advocates have recently begun warning about the potential dangers of geotags, which are embedded in photos and videos taken with GPS-equipped smartphones and digital cameras. Because the location data is not visible to the casual viewer, the concern is that many people may not realize it is there; and they could be compromising their privacy, if not their safety, when they post geotagged media online.

Mr. Savage said he knew about geotags. (He should, as host of a show popular with technology followers.) But he said he had neglected to disable the function on his iPhone before taking the picture and uploading it to Twitter.

“I guess it was a lack of concern because I’m not nearly famous enough to be stalked,” he said, “and if I am, I want a raise.”

Still, Mr. Savage has since turned off the geotag feature on his iPhone, and he isn’t worried about the archived photo on Twitter because he has moved to a new residence.

But others may not be so technologically informed or so blasé about their privacy.

“I’d say very few people know about geotag capabilities,” said Peter Eckersley, a staff technologist with the Electronic Frontier Foundation in San Francisco , “and consent is sort of a slippery slope when the only way you can turn off the function on your smartphone is through an invisible menu that no one really knows about.”

Indeed, disabling the geotag function generally involves going through several layers of menus until you find the “location” setting, then selecting “off” or “don’t allow.” But doing this can sometimes turn off all GPS capabilities, including mapping, so it can get complicated.

The Web site ICanStalkU.com provides step-by-step instructions for disabling the photo geotagging function on iPhone, BlackBerry, Android and Palm devices.

A person’s location is also revealed while using services like Foursquare and Gowalla as well as when posting to Twitter from a GPS-enabled mobile device, but the geographical data is not hidden as it is when posting photos.

A handful of academic researchers and independent Web security analysts, who call themselves “white hat hackers,” have been trying to raise awareness about geotags by releasing studies and giving presentations at technology get-togethers like the Hackers On Planet Earth, or Next HOPE, conference held last month in New York.

Their lectures and papers demonstrate the ubiquity of geotagged photos and videos on Web sites like Twitter, YouTube, Flickr and Craigslist, and how these photos can be used to identify a person’s home and haunts.

Many of the pictures show people’s children playing in or around their homes. Others reveal expensive cars, computers and flat-screen televisions. There are also pictures of people at their friends’ houses or at the Starbucks they visit each morning.

By downloading free browser plug-ins like the Exif Viewer for Firefox (addons.mozilla.org/en-US/firefox/addon/3905/) or Opanda IExif for Internet Explorer (opanda.com/en/iexif/), anyone can pinpoint the location where the photo was taken and create a Google map.

Moreover, since multimedia sites like Twitter and YouTube have user-friendly application programming interfaces, or A.P.I.’s, someone with a little knowledge about writing computer code can create a program to search for geotagged photos in a systematic way. For example, they can search for those accompanied with text like “on vacation” or those taken in a specified neighborhood.

“Any 16 year-old with basic programming skills can do this,” said Gerald Friedland, a researcher at the International Computer Science Institute at the University of California , Berkeley . He and a colleague, Robin Sommer, wrote a paper, “Cybercasing the Joint: On the Privacy Implications of Geotagging,” which they presented on Tuesday at a workshop in Washington during the Advanced Computing Systems Association’s annual conference on security.

The paper provides three examples of so-called cybercasing that use photos posted on Twitter and Craigslist and a homemade video on YouTube.

By looking at geotags and the text of posts, Mr. Sommer said, “you can easily find out where people live, what kind of things they have in their house and also when they are going to be away.”

“Our intent is not to show how it’s done,” he said, “but raise awareness so people can understand their devices and turn off those options if they want to.”

ICanStalkU.com, developed by the security consultants Larry Pesce of the NWN Corporation in Waltham , Mass. , and Ben Jackson of Mayhemic Labs in Boston , uses a more direct approach to warning about the potential dangers of geotags. The site displays a real-time stream of geotagged photos posted on Twitter; the person who posted the photo also gets a notification via Twitter.

“The reaction from people is either anger, like ‘I’m going to punch you out,’ or ‘No duh, like I didn’t already know that’ or ‘Oh my God, I had no idea,’ ” Mr. Pesce said.

In the latter category was Cristina Parker of El Paso , who sells appliances part-time at Kmart and also manages social media for small companies. ICanStalkU.com notified her last week that a photo she had posted on Twitter of her Chihuahua , Zipp, also revealed where she lived.

“I immediately tweeted back to find out what I can do about it,” said Ms. Parker. The site sent her a Web link to instructions on how to turn off the geotag function on her LG Ally smartphone. “It’s definitely good to know for me personally and because of my social media work, too,” she said

Because of the way photographs are formatted by some sites like Facebook and Match.com, geotag information is not always retained when an image is uploaded, which provides some protection, albeit incidental. Other sites like Flickr have recently taken steps to block access to geotag data on images taken with smartphones unless a user explicitly allows it.

But experts say the problem goes far beyond social networking and photo sharing Web sites, regardless of whether they offer user privacy settings.

“There are so many places where people upload photos, like personal blogs and bulletin boards,” said Johannes B. Ullrich, chief technology officer of the SANS Technology Institute, which provides network security training and monitors the Internet for emerging security threats.

Protecting your privacy is not just a matter of being aware and personally responsible, said Mr.Sommer, the researcher. A friend may take a geotagged photo at your house and post it.

“You need to educate yourself and your friends but in the end, you really have no control,” he said, adding that he was considering writing a program to troll the Internet for photos with geotags corresponding to users’ home addresses.

“I’m beginning to think there may be a market for it.”

Wednesday, August 11, 2010

Home Security--Protect Your Firearms and Valuables!



A gun safe is a good measure to have when it comes to safeguarding your firearm(s), ammunition and valuables as well, even important documents (wills, birth certificates, passports, etc.) I recommend having the gun safe in a convenient location, preferably a relatively cool, dry place. Most of us have it in our bedroom, whether it is a rifle gun safe or hand gun safe by the dresser. The majority of burglars are not prepared or able to defeat a decent gun safe. A gun safe also demonstrates, in the event of a firearms related lawsuit, that you took all reasonable precautions to secure your gun(s).

Make sure your gun safe is locked whenever you leave the house and frequently if you have children. The last thing you want is to be surprised by a burglar and cause harm to you and/ or your family with your own gun(s). If it is possible to do so in your state, get a carry permit and make it a point to arrive home armed. If you surprise a burglar, you need to be able to control the situation immediately. Otherwise you become a statistic…a victim.


Most importantly, make sure that you and your family understand the proper and safe use of guns! You can never say this enough!

The majority of gun safes are fire retardant and one can buy them at your local sporting goods store like Academy Sports or your local Wal-Mart. Do a little research and you will get the best gun safe that suits you and your gun.

The push button electronic combination locks have a feature in case the battery goes dead, where you can use a key. All free standing safes will have the ability to bolt the safe to the wall. Some people think if they have enough weight in the safe, it can't be move. This is not true. Thieves will often have knowledge from day workers or maintenance people on the existence and location of gun safes and will enter with a hand truck (dolly) and move the safe. Another option may to be place in a closet and put a good dead bolt lock on the closet door.

Monday, August 9, 2010

Cell Phone Security

Your cell phone. It's your lifeline! It's your phone book! It's your portable photo album! So, okay, maybe it's time to invest a little time theft-proofing your cell just in case it gets stolen. While the best protection is commonsense stuff (for example, keep your phone in a zipped purse or the front pocket of your jeans) there are a bunch of other measures you can take.


1. Know Your Phone. Note down your phone number, SIM number and/or IMEI number, the make and model, and your provider name and 800 number. If your phone ever disappears, you'll have all the essential info at your fingertips for reporting it stolen (to the police, your provider) or advertising it as lost (via Craigslist, your local paper).

Remember: call your provider immediately that you realize your phone is missing. One cell phone thief can rack up horrible long-distance charges in just a matter of hours, so deactivate your account or have the number disabled as soon as possible!

2. Lock it With a PIN. Most cell phone thieves want instant but short-term access to your phone service, not so much the phone itself. After all, they know once you discover it's missing you will cancel service on the device, rendering it basically useless.

So here's a sure way to ruin a thief's day: keep your key pad locked with a security PIN number. They won't be able to make calls or access your personal information ... and in the meantime you'll have time to notify your provider of the theft and have your account deactivated.

3. Store Personal Info with Caution. Speaking of personal stuff, one way to protect against damaging -- or just plain embarrassing -- identity theft it to simply limit what kinds of personal information you keep on your phone. Think of it as the only no-fail, low-tech security option.

4. Consider Anti-Theft Software. Companies like Gadget Trak now offer software that aims to put you in control of your phone remotely should it be lost or stolen. Other software, like iHound, use GPS technology to help you locate your missing iPhone or iPod Touch. If you keep everything on your portable device, this is an option you should look into for peace of mind.

5. Don't Assume the Worst. Could be your phone is just lost and some fine citizen is out there wanting to return it to you. There's the downside to locking your phone with a PIN: said fine citizen can't access your phone book to track you down. Oops! Solution: consider programming your cell to display your email address or home phone number even when the keys are locked.

Friday, August 6, 2010

A New Kind of Credit Fraud

Identity theft: How to protect your kids. Identity theft that targets children is rising. By Alissa Figueroa, Christian Science Monitor Correspondent

Identity theft has grown into a multibillion-dollar problem. And it’s not only adults who are targeted.

At least 7 percent of the reported cases of identity theft target children. The number could actually be much higher, since many families don’t discover theft until a child applies for credit.

And the problem is likely to get worse before it gets better, the Associated Press reports, as identity thieves steal children's dormant Social Security numbers and use them to create phony lines of credit and rack up debt, sometimes for years.

The scam, which has popped up only in the last year, is difficult to guard against, says Linda Foley, cofounder of the Identity Theft Resource Center (ITRC), an organization that offers counseling and resources to identity theft victims. The ITRC has seen a notable jump in the number of children identity-theft cases in the last year, reaching about 9 percent of its caseload this month.

“There’s no way to protect your child completely,” says Ms. Foley. That’s partly because these thieves are likely using sophisticated programs that mine for dormant numbers through school or doctor’s offices databases, which often require that children’s Social Security numbers be provided. And partly because tactics for selling the numbers are constantly evolving, making this kind of theft difficult to track.

Since credit issuers do not keep track of the age of Social Security number holders, they cannot alert families when a child's number is being used. That's something Foley's organization has been trying to change since 2005, and a protection she considers vital for preventing child identity theft on a large scale.

There is some advice that parents can follow, though, to reduce the risk of identity theft:

1. Be cautious with your child’s Social Security number. Always ask why an organization needs the number and when possible, do not give it out. Be careful about which individuals, even friends and family, have access to your child’s number. Many identity thieves know their victims. Destroy extra documents that list your child’s number.

2. Talk to your kids about identity theft. Teach children not to divulge their personal information on the telephone and online.

3. Do not check your child’s credit report unless you have reason to believe there’s a problem. A minor should not have a report unless someone has applied for credit using that child’s Social Security number. To order reports unnecessarily can establish a credit report, opening a door to thieves, according to the ITRC.

4. Watch for red flags. If you receive pre-approved credit card offers or calls from collection agencies, run a credit report on your child immediately to see if there has been fraud.

5. Contact an identity theft specialist if you suspect a problem. There are several resources for families concerned with issues of identity theft. Visit the ITRC’s website for facts and information, or call its hotline at (888) 400-5530. You can also find information on the Federal Trade Commission’s identity-theft-prevention website.

Wednesday, August 4, 2010

McAfee Family Internet Protection for Mac's

Anti-Virus for Your Mac:

Understanding that the majority of computer users are IBM type users, Apple’s Mac computers have seen an increase in viruses and malicious cyber “bad guy” crimes. McAfee Internet Security has released a pair of it protection products for the Mac: McAfee Internet Security and McAfee Family Protection.

The following is by Dan Moren, Macworld

McAfee Announces Internet Security, Family Protection

If you're just looking to keep your own surfing habits from getting you into trouble, McAfee Internet Security can protect you from dangerous Web sites and browser exploits as well as telling you if a particular online shopping site has been checked over by McAfee (unfortunately, McAfee's Site Advisor, which adds safety markings right inside your browser is only compatible with Firefox at the present time). It can also scan e-mail and IM attachments from Mail and iChat to make sure nobody tries to slip you a mickey while online, and can repair many files without damaging the contents.

In addition, a dedicated Secure Search tool allows you to make sure that phishing sites don't find their way into your results; a two-way firewall keeps an eye on all the traffic entering or leaving your computer as well as locking down outside access to protect from hackers; and all the while McAfee Internet Security can scan for both Windows and Mac malware.

McAfee Internet Security runs $80 and covers one Mac for one year-after that, you'll need to buy a new copy as there's currently no upgrade pricing available. That's all well and good for your own personal Web surfing, but if you're more concerned about what your kids might be getting up to, there's McAfee Family Protection (also available for the iPhone and iPod touch). Not only does it allow parents to filter searches by keyword and prevent access to Websites from 35 different categories of content, but reports provide parents an overview of all the Websites that their kids are visiting.

Alerts can be sent to parents via e-mail or text message if a child tries to access a site that's not appropriate for them. In addition, parents can specify time limits to manage their kids' Internet use and block the use of specific programs on the Mac. Parents can also remotely modify a child's profile if necessary.

McAfee Family Protection covers up to three Macs for a year for $40. As with Internet Security, you'll need to shell out for a new copy after that due to any lack of upgrade pricing at present.

Both products available now and require Mac OS X 10.5 or later. They also come with a 30-day money-back guarantee and 30 days of free support.

Monday, August 2, 2010

Home Security System - What to Look For

It is wise to consider a security system that will work for you. Try not to consider price when it comes to choosing a security system, but if you are cost conscience, then please question it, but most of all make sure that you own your alarm equipment, so that you can switch monitoring companies if you’re not happy with their service.



Most regular security companies will charge $300-$400 for what the “free” companies offer for no charge. After that, devices tend to be the same price, or slightly lower with the non-“free” companies. So for an extra $300-$400 upfront, you get a system that is a lot less vulnerable, is more reliable, lasts longer, is installed by the better technicians, and gives you the freedom to shop around for better service and/or a lower monitoring rate.

The following is from www.alarmsystemreviews.com

If you honestly think you’re going to get adequate security protection for “free”, you’re going to be disappointed. Let's set the record straight about the infamous "free home alarm system". When you’re offered a “free” system, it usually consists of the following:

An “all in one” wireless keypad, siren, control panel and dialer.

One wireless door or window contact, one wireless motion sensor.

A long term monitoring contract, that automatically renews (sometimes even up to five years).

Extra charges for additional contacts, motion sensors, etc.

Extra charges called “activation fees” or “police and fire registration fees”.

Especially sneaky: Some companies that use central monitoring stations that are out of your telephone area code will actually CHARGE you to use their 1-800 number, in order for your alarm to send its signal

So Why Is The System Wireless?

Most of these “free” alarm companies go with wireless because it takes virtually no skill to install. A lot of the programming can be done ahead of time, so the “technician” that installs the system can get the job done as quickly and easily as possible. Many of these employees have little to no skill, because their employers pay them as little as possible. Really talented technicians are paid well, because they are a surprisingly rare and valued commodity in the industry these days. These “free” alarm companies do not attract the best technicians.

What’s wrong with these “all in one” wireless units?

They’re extremely vulnerable. The best set up for your alarm is to have the keypad, control panel (the “brains” of the system) and siren installed in separate places. So for example if a thief rips the keypad off your wall, it doesn’t matter. The dialer that sends your alarm system’s signal to the monitoring station is located inside the control panel, which is most likely installed in your basement, and is not damaged. If you have an “all in one” system, not only is the keypad disabled, but so is the entire alarm system, including the siren!

No matter which company you go with, it is always best to have a hard wired alarm system. They are more reliable than wireless, last forever, and you don’t have to worry about batteries running out and compromising your security!



Here’s a scary fact about wireless alarm components: at one time, one of the bigger alarm equipment manufacturers produced wireless equipment that communicated using a 900MHZ signal. What’s wrong with that, you ask? The problem is/was that most cordless phones use the SAME frequency! These systems were vulnerable to interference (therefore false alarms) from not only the phones that belonged to the homeowner, but even the phones that belonged to neighbors! So now manufacturers are using different frequencies, such as 2.4 MHZ and 5.8 MHZ, to solve the problem. The only problem is, newer style cordless phones are now starting to use the same frequency! Will your wireless system be compromised by a cordless phone or any other wireless interference? The chances are slim, but not zero. All the more reason to go with a hard wired system, where there is NO chance of interference. Even better, hard wired devices generally cost less than their wireless counterparts.

They Cannot Be Monitored By Any Other Alarm Company.

It is important that you own your alarm equipment, so that you can switch monitoring companies if you’re not happy with their service, or want to shop around for a better monitoring rate. And there are dramatically different levels of service quality and monitoring cost between the various alarm companies! With a “free” system, it is almost certain that it is “locked out”. This means that no other alarm company can monitor it. These companies may also use software that can “remotely kill” your alarm system, rendering it useless in a matter of minutes.


They Give A False Sense Of Security.

Protecting your home with one motion sensor and one or two door contacts would not be even adequate protection for the average home owner. It will leave huge gaps in your security protection, allowing an intruder to easily enter your home, and stay a lot longer, before the alarm actually goes off.




The “Free” System Offer Gets Their Foot In The Door.

As explained above, you are definitely going to have to add more equipment to get to an acceptable level of security. Typical prices for a wireless device offered by any alarm company would be: $75-$95 for a door or window contact, $90-$130 for a wireless motion sensor, and about the same cost for a wireless smoke detector. If you decide to go with fire monitoring (highly recommended), or if you need a back up for your phone line using cell or radio, the (already inflated) monitoring charges will be much higher. The “free” offer is really a classic “bait and switch” tactic.

Saturday, July 31, 2010

GPS Locators for Your Children

Not knowing where your children are and worrying about what bad places they may be is a constant companion to parents.

Being able to locate your children using GPS technology is a great peace of mind provider. Being able to see their real-time locations on interactive satellite maps from any PC or web-enabled mobile phone will just push the right buttons with most parents.

Home Security and Personal Protection recently tested the Sprint Family Locator (SFL) program. Going to a website, logging in then choosing a phone to geo-locate then seeing a satellitle imagery map with your child's location (or really your child's cell phone's location) worked quite well. We knew the exact location of the child (phone) and each time the SFL depicted the phone to within a few feet of the actual location.

A couple times, there was a delay where we were asked, through a popup box to try again in 60 seconds, but 60 seconds later we were able to geo-locate to the child (cell phone) location.

If you child carries a cell phone, this is the way to go as it is well affordable and easy technology to master.


Sprint offers a 15 day free trial. Regular cost is $5 per month per phone. There is unlimited use. Geo-locate your children, set Safety Checks and send text messages to your children from within SPrint Family Locator. Peace of mind for your entire family.

Go to the SFL site and view the demonstration or watch the video below,...both are different so we suggest viewing both.


Friday, July 30, 2010

Facebook Personal Profiles Leaked



Leaked: 100 million personal profiles on Facebook out in public

If you have not checked your Facebook profile setting, here is another wake up call. About 100 million Facebook users’ personal data, web profile address where posted on web for anyone and everyone to access. Personal details posted on profile Facebook profile pages were found on public file sharing service The Pirate Bay.

According to news reporting, those individuals whose Facebook Profile setting is set to be available for public search where the only profiles affected. This latest incident shows that one should BE CAREFUL with the information they share on social and public websites on internet.

The issue is not only restricted to Facebook, if you have profiles and are active on different social networking websites, such as Hi5, Twitter, MySpace etc.. Make sure that you thoroughly check your profile settings and profile information.

Here are some Facebook safety tips:

* Use Friend Lists to create a personal group of friends, you personally know and trust.
* Facebook Privacy Setting page, remove your personal information from showing up in Facebook public search.
* From Facebook Privacy Setting page, remove your profile from appearing in Google and other search engine search results. Under “Public Search Listing”, remove the check mark next to “Create a public search listing for me and submit it for search engine indexing” and save.
* Protect your photos, albums and share only with the people in with your friend list.
* Prevent you post and stories from showing up in your friend’s news feeds.
* Set your contact details to private.

Thursday, July 29, 2010

ATM Security Problems

Cracking the vault: ATMs spill their guts in new computer attacks

an article by Jordan Robertson, Wednesday July 28, 2010,

LAS VEGAS (AP) -- A hacker has discovered a way to force ATMs to disgorge their cash by hijacking the computers inside them.

The attacks demonstrated Wednesday targeted standalone ATMs. But they could potentially be used against the ATMs operated by mainstream banks.

Criminals have long known that ATMs aren't tamperproof.

There are many types of attacks in use today, ranging from sophisticated to foolhardy: installing fake card readers to steal card numbers, hiding tiny surveillance cameras to capture PIN codes, covering the dispensing slot to intercept money and even hauling the ATMs away with trucks in hopes of cracking them open later.

Computer hacker Barnaby Jack spent two years tinkering in his Silicon Valley apartment with ATMs he bought online. These were standalone machines, the type seen in front of convenience stores, rather than the ones in bank branches.

His goal was to find ways to take control of ATMs by exploiting weaknesses in the computers that run the machines.

He showed off his results here at the Black Hat conference, an annual gathering devoted to exposing the latest computer-security vulnerabilities.

His attacks have wide implications because they affect multiple types of ATMs and exploit weaknesses in software and security measures that are used throughout the industry.

His talk was one of the conference's most widely anticipated, as it had been pulled a year ago over concerns that fixes for the ATMs wouldn't be in place in time. He used the extra year to craft more dangerous attacks.

Jack, who works as director of security research for Seattle-based IOActive Inc., showed in a theatrical demonstration two ways he can get ATMs to spit out money:

-- Jack found that the physical keys that came with his machines were the same for all ATMs of that type made by that manufacturer. He figured this out by ordering three ATMs from different manufacturers for a few thousand dollars each. Then he compared the keys he got to pictures of other keys, found on the Internet.

He used his key to unlock a compartment in the ATM that had standard USB slots. He then inserted a program he had written into one of them, commanding the ATM to dump its vaults.

-- Jack also hacked into ATMs by exploiting weaknesses in the way ATM makers communicate with the machines over the Internet. Jack said the problem is that outsiders are permitted to bypass the need for a password. He didn't go into much more detail because he said the goal of his talk "isn't to teach everybody how to hack ATMs. It's to raise the issue and have ATM manufacturers be proactive about implementing fixes."

The remote style of attack is more dangerous because an attacker doesn't need to open up the ATMs.

It allows an attacker to gain full control of the ATMs. Besides ordering it to spit out money, attackers can silently harvest account data from anyone who uses the machines. It also affects more than just the standalone ATMs vulnerable to the physical attack; the method could potentially be used against the kinds of ATMs used by mainstream banks.

Jack said he didn't think he'd be able to break the ATMs when he first started probing them.

"My reaction was, 'this is the game-over vulnerability right here,'" he said of the remote hack. "Every ATM I've looked at, I've been able to find a flaw in. It's a scary thing."

Kurt Baumgartner, a senior security researcher with antivirus software maker Kaspersky Lab, called the demonstration a "thrill" to watch and said it is important to improving the security of machines that can each hold tens of thousands of dollars in cash. However, he said he doesn't think it will result in widespread attacks because banks don't use the standalone systems and Jack didn't release his attack code.

Jack wouldn't identify the ATM makers. He put stickers over the ATM makers' names on the two machines used in his demonstration. But the audience, which burst into applause when he made the machines spit out money, could see from the screen prompts on the ATM that one of the machines was made by Tranax Technologies Inc., based in Hayward, Calif. Tranax did not immediately respond to e-mail messages from The Associated Press.

Triton Systems, of Long Beach , Miss. , confirmed that one of its ATMs was used in the demonstration. It said Jack alerted the company to the problems and that Triton now has a software update in place that prevents unauthorized software from running on its ATMs.

Bob Douglas, Triton's vice president of engineering, said customers can buy ATMs with unique keys but generally don't, preferring to have a master key for cost and convenience.

"Imagine if you have an estate of several thousand ATMs and you want to access 20 or so of them in one day," he wrote in an e-mail to the AP. "It would be a logistical nightmare to have all the right keys at just the right place at just the right time."

Other ATM manufacturers contacted by the AP also did not immediately respond to messages.

Jack said the manufacturers whose machines he studied are deploying software fixes for both vulnerabilities, but added that the prevalence of remote-management software broadly opens up ATMs to hacker attacks.

Tuesday, July 27, 2010

Cyber Security Threats

Cyber threats to a control system refer to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway. This access can be directed from within an organization by trusted users or from remote locations by unknown persons using the Internet. Threats to control systems can come from numerous sources, including hostile governments, terrorist groups, disgruntled employees, and malicious intruders.

To protect against these threats, it is necessary to create a secure cyber-barrier around the Industrial Control System (ICS). Though other threats exist, including natural disasters, environmental, mechanical failure, and inadvertent actions of an authorized user, this discussion will focus on the deliberate threats mentioned above.

Terrorists

Traditional terrorist adversaries of the U.S. , despite their intentions to damage U.S. interests, are less developed in their computer network capabilities and propensity to pursue cyber means than are other types of adversaries. They are likely, therefore, to pose only a limited cyber threat. Since bombs still work better than bytes, terrorists are likely to stay focused on traditional attack methods in the near term. We anticipate more substantial cyber threats are possible in the future as a more technically competent generation enters the ranks.

Their goal is to spread terror throughout the U.S. civilian population. Their sub-goals include: attacks to cause 50,000 or more casualties within the U.S. and attacks to weaken the U.S. economy to detract from the Global War on Terror.

Hackers

Although the most numerous and publicized cyber intrusions and other incidents are ascribed to lone computer-hacking hobbyists, such hackers pose a negligible threat of widespread, long-duration damage to national-level infrastructures. The large majority of hackers do not have the requisite tradecraft to threaten difficult targets such as critical U.S. networks and even fewer would have a motive to do so. Nevertheless, the large worldwide population of hackers poses a relatively high threat of an isolated or brief disruption causing serious damage, including extensive property damage or loss of life. As the hacker population grows, so does the likelihood of an exceptionally skilled and malicious hacker attempting and succeeding in such an attack.

In addition, the huge worldwide volume of relatively less skilled hacking activity raises the possibility of inadvertent disruption of a critical infrastructure.

For the purposes of this discussion, hackers are subdivided as follows:

Sub-communities of hackers

Script kiddies are unskilled attackers who do NOT have the ability to discover new vulnerabilities or write exploit code, and are dependent on the research and tools from others. Their goal is achievement. Their sub-goals are to gain access and deface web pages.

Worm and virus writers are attackers who write the propagation code used in the worms and viruses but not typically the exploit code used to penetrate the systems infected. Their goal is notoriety. Their sub-goals are to cause disruption of networks and attached computer systems.

Security researcher and white hat have two sub-categories; bug hunters and exploit coders. Their goal is profit. Their sub-goals are to improve security, earn money, and achieve recognition with an exploit.

Professional hacker-black hat who gets paid to write exploits or actually penetrate networks; also falls into the two sub-categories-bug hunters and exploit coders. Their goal is profit.

Nature of the computer security community


Hackers and researchers interact with each other to discuss common interests, regardless of color of hat. Hackers and researchers specialize in one or two areas of expertise and depend on the exchange of ideas and tools to boost their capabilities in other areas. Information regarding computer security research flows slowly from the inner circle of the best researchers and hackers to the general IT security world, in a ripple-like pattern.

GAO Threat Table


The following table is an excerpt from NIST 800-82, "Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control System Security (SME draft), provides a description of various threats to CS networks: (click on the table to enlarge)

Monday, July 26, 2010

Sensor Lighting for Home Security

Sensor Lighting For Home Security

Sometimes street lighting and your front/ back home lights are not enough to shed light during the night; making it an easy target for thieves to strike. Some ideas to consider for not only shedding light around your home for safety purposes, but also inside cost effective sensors are:

Setting up a dawn and dusk detection sensor that controls safety and security on your standard porch lights. The Passive Infrared motion sensor will tell your lights when it’s getting dark outside and automatically turn them on and then back on again when it gets light. (Porch light with sensor picture Upper left) and (Sensor for light porch picture Lower left)











Security floodlights are great for securing the perimeter of your home with easily control lights and plenty of remote access. There are some floodlight packages that have a motion activated sensor of up to a 20 foot distance. (Flood lights with sensor picture below)











Inside the home you can have timers hooked up to your lamps, televisions, radios, etc. They can be easily bought cost effectively from your local neighborhood Walgreens store, Wal-Mart, or your Lowe’s or Home Depot stores. Setting these up inside your home gives the illusion that someone is at home and not empty. These are great for when you go out on a family trip or coming home late at night. (Inside timer for electronics picture below)











A sensor light switch is ideal for two reasons: One. If you have children that constantly leave the light on, the sensor will detect that no one is in the room and shut off saving you on the electric bill. Two. It surprises anyone who enters that room by automatically turning on the light when it senses someone or movement in the room. (Sensor light switch picture below)





It is amazing what a little light can do to help you stay safe. Not only will sensor for lights help you in your home security, but if used properly, they can even help you on your light bill (result may vary).