Purpose

Dedicated to helping people make themselves safe and their Homes harder targets,...or when James Bond meets Soccer Mom




Friday, December 5, 2014

Camera Phones Copy Keys Easily For Homeowners — And Crooks

Here is a very interesting article with video that came from the Denver CBS site. This is very scary in the hands of the wrong person. Be sure to use caution with your keys from now on. What the attached video.

DENVER (CBS) - Camera phones and cyberspace are making it easier to make copies of your keys without ever stepping foot inside a hardware store. But as CBS4′s Jennifer Brice reported, the new technology could also make it easier for criminals to break into your home.

Brice used a cell phone camera to take a snapshot of a co-workers keys. With the co-worker’s permission, she uploaded the photo to an online locksmith called keysduplicated.com. After paying just $6, a functioning house key arrived in the mail just two days later.

The founders of keysduplicated.com say most of the requests they receive come from people who are just trying to copy their house keys. They say they’re company is safer than a traditional locksmith because they require a credit card with a name on it and a phone number to purchase a key, which is more easily traced than the cash many locksmiths accept.

“We make sure that you take a picture of the front and back of the keys so you can’t be using a telephoto lens and spotting a key on the table,” said Jordan Meyer, co-founder of Keysduplicated.com.

The society of professional locksmiths disagrees with the claim that cyber locksmiths are safer and says leaving your keys in plain view is just as much of a risk as handing them to a stranger.

“You need to protect your keys, not leave them out of site for any amount of time,” said Barry Campbell, Director of Operations of the Society of Professional Locksmiths.

Security experts urge caution when handing over your keys for auto repairs or to a valet.

“Don’t keep them with other identification which can tie up the connection between the key and the physical address,” said security expert Alan Schissel, who advises detaching your keys from the rest of the ring to avoid becoming a victim.

Thursday, November 27, 2014

WhatsApp Encrypts User Messages Following Google, Apple


 



WhatsApp Encrypts User Messages Following Google, Apple
By Jordan Robertson and Sarah Frier Nov 18, 2014 10:01 PM MT

Facebook Inc.’s WhatsApp is adding encryption so messages can’t be deciphered when stored or traveling between devices, boosting efforts by technology companies to thwart snooping by hackers and government spies.

WhatsApp, which was acquired by Facebook for $22 billion this year, is working with startup Open Whisper Systems to enact the change, the companies said yesterday. Open Whisper Systems said in a blog post that it has been working on encryption with the mobile-messaging service for the past six months.

A WhatsApp representative declined to comment beyond confirming the encryption.

Google Inc. and Apple Inc., among other technology companies, have also recently expanded their use of encryption on mobile communications. The moves have drawn praise from privacy advocates and criticism from the Federal Bureau of Investigation and other law enforcement agencies for potentially hindering criminal investigations. U.S. Attorney General Eric Holder and FBI Director James Comey are among those who have said that they glean essential information from the contents of phones seized in criminal investigations.

The expanding use of encryption is part of a backlash among technology companies to leaked documents from former National Security Agency contractor Edward Snowden, which showed the U.S.’s widespread spying on digital communications. Doubts about the security of their technologies could cause U.S. companies to forgo as much as $35 billion in revenue through 2016, according to the Washington-based Information Technology & Innovation Foundation, a policy research group.

No Compromise

WhatsApp has said that after being acquired by Facebook, its opinion on the importance of its users’ data privacy wouldn’t be compromised. Chief Executive Officer Jan Koum has recounted memories of growing up in Ukraine and the Soviet Union during the 1980s, and the fear that every form of communication would be monitored by the KGB.

“Respect for your privacy is coded into our DNA, and we built WhatsApp around the goal of knowing as little about you as possible,” Koum wrote in March.

Encryption isn’t fail-safe. While popular Internet services are using encryption to shield user data from outsiders, they are generally retaining the ability for themselves to scan the contents of e-mails, text messages, search queries and other information for use in targeted marketing.

Apple and Google have gone a step further recently with their encryption, saying new versions of smartphones that use the iOS and Android software will automatically encrypt data and make it impossible for the companies themselves to decipher photos, contact lists and other files.

Authorities may still be able to retrieve e-mails, text messages and other data transmitted between devices through court orders. The FBI’s Comey said last month that providers of new communications services should create a “front door” way for investigators to intercept data.

Thursday, November 20, 2014

Cellphone tracking: Find an address? Easy. But new devices can calculate your altitude.



Cellphone tracking: Find an address? Easy. But new devices can calculate your altitude.

New devices are able to determine not only what building you and your phone are in but also which floor you’re on.

By Craig Timberg November 19 at 9:00 PM 

Cellphones long have doubled as tracking devices, capable of revealing your location to police, paramedics, even grocery stores looking to deliver coupons to nearby customers. But there’s a measurement cellphones once struggled to make: altitude.

No more.

Cellphone tracking is about to go vertical as the location-services industry, prodded by the U.S. government, solves the riddle of what experts call “the z vector.” Soon it will be possible to determine not only what building you and your phone are in but also whether you are on the first or 15th floor.

One key is the rapid spread of barometric-pressure sensors, which have become standard features in Apple’s iPhone 6 and several Android devices. More than 100 million of these smartphones already are in the hands of consumers, capable of making air-pressure readings that can be used to estimate a user’s altitude, to within a few feet.

The systems, though now used mainly for apps that users control, are part of a new generation of location technology that could collect altitude data from smartphones and use it to, for example, help rescue crews find people trapped in an office-tower fire. But privacy advocates warn that detectives, intelligence agencies and maybe hackers could gain the ability to map the three-dimensional movements of cellphone users with startling new detail.

The FCC is considering new rules for how wireless carriers handle 911 calls. Dispatchers already receive location information from callers, but the new rules would require greater precision and, for the first time, an estimate of each caller’s altitude. Privacy advocates worry that this three-dimensional location data will be used by police, private businesses or hackers to track people for other purposes.  View Graphic:


An early glimpse at this tension is playing out at the Federal Communications Commission, which is updating its requirements for how wireless carriers handle 911 calls, 70 percent of which now come from cellphones rather than land lines. In a proposal that could be adopted as soon as January, the FCC would require wireless carriers to build more-precise location systems capable of finding callers anywhere, even in a multistory building.

The proposal has triggered a lobbying fight, with some public-safety groups supporting strict FCC rules and wireless carriers pushing for slower implementation and different technology. The outcome of that struggle is likely to determine the precision of the next generation of cellphone tracking and how quickly it arrives.
Advertisement

“This puts those of us in the civil-liberties community in a difficult position of opposing the creation of location services for emergency services, because we know the FBI will ask for it later and we don’t have the power to stop them when they ask for it later,” said Christopher Soghoian, principal technologist for the American Civil Liberties Union.
 
 

The FBI declined to comment on the location rules under consideration by the FCC, but the bureau’s own investigative guidelines say it can seek access to any information supplied to other government agencies. Previous generations of FCC location rules, though created for 911 services, eventually led to the FBI quietly gaining an expanded ability to track cellphone users.

The potential goes far beyond government uses, said Manlio Allegra­, chief executive of Polaris Wireless, one of the location-services­ companies experimenting with altitude measurements. Malls could use altitude tracking to monitor crowd flows and send coupons to the phones of customers walking past a shoe shop on the top floor. Multilevel casinos could monitor gamblers for security purposes. Companies could better keep tabs on the movements of their employees, especially those handling expensive products.

“It’s like a tidal wave,” Allegra said of the potential for three-dimensional­ tracking. “You upgrade the network, every performance [capability] on the network gets upgraded.”

From air to ‘z’

The technology works on a simple principle: Air molecules concentrate more densely at low altitudes than at high ones, causing measurable variations that follow predictable patterns. Even if overall barometric pressure at a certain location is shifting — say, as a hurricane approaches — the bottom floor of an office building will have higher pressure than the top one.
Advertisement

The air-pressure sensors built into the latest smartphones have sparked the development of a range of apps. Some help forecast the arrival of storms; others claim to alert anglers to when fish — which are said to prefer high, stable pressure — are biting.

The iPhone 6 includes a health app that uses changes in air pressure to estimate how many stairs a user climbs each day. Apps that help hikers navigate peaks and glider pilots track flights are increasingly using barometric sensors to measure altitude, something that GPS tracking technology struggles to do as quickly and accurately.

Australian glider pilot Peter Rundle built an Android app called GlideMate that maps longitude and latitude — the “x” and “y” vectors — while also showing the “z” vector of altitude based on air-pressure readings made by the smartphone.

GlideMate also tracks rates of ascent or descent, mimicking a device called a variometer and allowing him to leave some bulky gear behind when he flies. “It’s easier to just have one instrument that does everything,” Rundle said.

The Polaris Wireless altitude sensors work roughly the same way. During a demonstration for government officials on the seventh floor of FCC headquarters in September, amid the cluster of drab office buildings south of the Mall in Washington, a company employee carried a Samsung Galaxy S3 smartphone down several flights of stairs, said Allegra, the Polaris CEO.

Using software the company designed, the Samsung device measured the pressure shifts and relayed them to a server at the company’s Silicon Valley headquarters. The server then compared the readings with an atmospheric model of the area and reported the shifting altitude estimates to another device, as Allegra and the FCC officials looked on.
Advertisement

The proposed FCC rules would not endorse a particular location technology, but any new standards are likely to spur innovation as companies compete for the lucrative business of helping wireless carriers comply.

“We are committed to both improving public safety and protecting consumer privacy,” David Simpson, chief of the FCC’s public-safety and homeland-security bureau, said in a statement. “The goal of this proceeding is to use technological advancements in the marketplace to help first responders better locate 911 callers. We’ve sought public comment on our proposals, including any privacy implications, and will consider all input as we move forward.”

The four largest wireless carriers reached an agreement with two major public-safety groups last week, endorsing standards and a timetable less stringent than proposed by the FCC and relying on a different technology — using maps of WiFi and Bluetooth signals, as some commercial location services now do — for determining the address and altitude of a 911 caller.

Other groups are still pushing for air-pressure technology, arguing that it is more reliable and precise and could be implemented more quickly. “The [wireless] industry is basically trying to slow the train down,” said Harold Schaitberger, general president of the International Association of Fire Fighters. “That’s very troubling to us.”

Beyond GPS

A 911 call is unlike any other: A person dialing the number typically is seeking help from authorities to report a crime, fire or medical emergency. The dispatcher needs to know the location of the caller to direct the appropriate responders to the right place, even if the caller cannot or will not provide that information.

Several technologies, operating under existing FCC rules, already are capable of finding 911 callers based on data that flows through cellular networks, such as what cell towers phones are using and how quickly signals are reaching them. Increasingly, though, carriers also are activating the GPS chips in smartphones to determine the locations of callers and sending the results to dispatchers.

Yet some in the location-services industry, backed by coalitions of emergency workers, have argued that existing systems are flawed and imprecise. GPS tracking, for example, needs a clear line of sight to satellites, making them all but useless when somebody inside a building makes a 911 call.

“There needs to be privacy protections, but right now, for all the networks, that’s not the challenge,” said Jamie Barnett, a former top FCC official now lobbying for one of the location-services companies, TruePosition, and also for a coalition of emergency workers that the company is funding. “The question is, can the networks even find you?”

Many privacy advocates support the idea — in concept — of better location tracking for 911 calls but fear government overreach. The last time the FCC updated its location requirements for wireless carriers, several later agreed to provide that same data to the FBI.

The increasing use of GPS tracking, the privacy advocates say, offers a cautionary tale. Even if callers have turned off the capability on their smartphones, 911 systems are capable of remotely activating GPS functions and extracting precise locations.
Advertisement

This may cause little concern since somebody calling authorities typically wants to be found. But if smartphones are designed to include the ability to have their GPS tools activated remotely, there is no guarantee that others will not secretly take advantage of that feature. Users making 911 calls typically do not get notification that their smartphones have activated the GPS functions and reported the location to authorities.

Jim Dempsey, senior counsel to the Center for Democracy & Technology and a veteran of debates over FCC location rules, said privacy concerns could be lessened by requiring wireless carriers to build systems capable of transmitting altitude measurements only during 911 calls. “It’s not like the FCC is forcing anyone to design a mass surveillance tool of the future,” Dempsey said.

But Rundle, the Australian glider pilot and app developer, said location data generated for 911 calls will inevitably be collected by the government — and perhaps others — to track cellphone users.

“It’s the dilemma of today’s technology. You can’t make it hack-proof,” he said. “If somebody can program it, someone else can re-purpose it.”

Brian Fung contributed to this report.

Saturday, October 25, 2014

Teachers Invention Help Protect Children




School teachers are doing great things to help keep our children sage while at school. Following is an article from www.myfoxhouston.com showing how some teachers invented a door block that keeps active shooters and other idiots from entering class rooms. Great idea!

Article:

MUSCATINE, IA-A school shooting is a parent's worst nightmare, but a handful of teachers have come up with something they think will save lives.

A group of small town teachers have a big idea called "The Sleeve." It's a device that slips over the closer-arm of a door to prevent the door from being opened from the outside. The idea is to buy time for teachers and students during a school shooting.

"It's in the back of the mind every time, every time we walk through those school doors, ya know, could this be the day,” said President of Fighting Chance Solution Dan Nietzel.

Tactics during drills didn't do the trick, so the team came up with a better system. The Sleeve is made of solid carbon steel that can withstand 550 pounds of force.

“The Sleeve is meant to be fast and easy. It takes only a second to slip on, and when there's an active shooter, seconds are what count,” said President of Muscatine Community College Bob Allbee.

Muscatine Community College is installing The Sleeve in all their classrooms.

"Hopefully, we'll never use them. Hopefully, we'll just have to dust them every once in a while and they'll be on the wall, but in case we need them that's why they're there, again we're just trying to buy some time," said Allbee.

The sleeve is painted 'safety red,' like a fire alarm, to help address concerns of teachers being locked out.

"When students think of this, see this they think OK safety, ya know this is not to be messed with unless it's a life or death situation," said Nietzel.

The Sleeve is custom-made and small enough hide away in a drawer. They cost $65 and measurements can vary.

Saturday, October 4, 2014

Luggage Zipper Breach- Travelers Beware!





Think your luggage is safe even with padlocks? Think again! Watch the above video and see how easy it is to access luggage that have zippers. 

Time to start to look for better secured luggage.

Saturday, September 27, 2014

Bullet Resistant Glass Film? You Be The Judge.




Here is a video on a ballistic film for glass panels. This may come in handy for a home security project, but may be a little pricey. The product is from a company called ACE. Their web address is http://usace.com/ .

Wednesday, August 27, 2014

One Solution For Home Door Security



I just recently viewed a video from shattergard.com. It shows the above door security device called the OnGard Door Brace in action. I must say it does a pretty good job. Below is the same video I watched. The company has this to say about the product which is located on their website:

The majority of home security devices serve as psychological deterrents only. Alarm systems, “Beware of Dog” signs or even surveillance cameras are simply not enough to stop the new breed of violent criminals. For instance, when an alarm sounds, typically the intruder has already entered your home. And sadly, criminals can do the “unthinkable” between your alarm sounding and police arriving on scene. Simply stated, alarm systems rarely keep the bad guys on the outside of your home. Don’t allow inferior security devices and methods lull you into a false sense of security.

Consider these alarming statistics:

In the United States:

  • A burglary occurs every 15.4 seconds.
  • Approximately 1,596,008 burglaries occur annually.
  • Approximately 1,300,000 violent crimes occur annually.
  • Up to 78% of break-ins occur forcibly through a locked door or window.

Enter the patented ONGARD security door brace.

Unlike an alarm system, the OnGARD door brace actually prevents a criminal from gaining entry. Five years in development, the unique two-piece design utilizes both the strength of the existing floor and a space age polymer – the identical material in US military fighter planes.

Praised by locksmiths, security professionals and even law enforcement, the OnGARD easily withstands up to 1,775 pounds of violent force, resisting door kick-ins, sledgehammers and even battering rams.

Easily install on most wood, concrete or tile floors, etc.


Friday, August 15, 2014

E-ZPass Agencies Warn of Email Phishing Scam

Here is an article that I read in the Washington Post by the writer that call himself Dr. Gridlock. Its an important email phishing scam that I believe needs to be shared so that people are aware of the dangers of this. Read on!

E-ZPass agencies warn of phishing scam
By Robert Thomson July 9

  
By now, many people have learned to ignore pleading e-mails from close friends who say they’re trapped in a foreign country and need your money. That’s a relatively easy fraud to spot. Since when did your close friend start speaking zombie English? But a new scheme hides behind an American institution: The E-ZPass transponder used to quickly pay tolls.

Transportation agencies that administer E-ZPass accounts are warning their customers to beware of an e-mail scam that begins with a claim they haven’t paid their bills.

E-ZPass scam letter:

The Virginia E-ZPass program provided this sample of the e-mail scam.


People targeted by the scammers are not necessarily E-ZPass users. James Paul of Annandale said in an e-mail that he discovered one. “Not being an automobile owner, and never having driven in the Lexus lanes, I wasn’t surprised to see it in the spam filter,” he said. “The sending address being in France was another tipoff.”

The sending address that the e-mail reader sees at first glance may not be the full address, but rather something like, “E-ZPass Info,” or “E-ZPass Customer Service Center.” Where the actual e-mail address appears, the address may be different. The one Paul spotted had a designation suggested it originated in France. The one in the sample provided by the Virginia E-ZPass operators has a standard “.com” sender address.

The subject line also may vary. The one in the Virginia sample says, “In arrears for driving on toll road.” In the fake message that Paul received, the subject line is, “Payment for driving on toll road.”

The body of the message will say something about you failing to pay for using a toll road.

Overall, the e-mail looks very official. It has the purple color you see on the highway signs and at toll plazas. It even had a link that purports to lead to the agency’s “Phishing Policy.” Paul described that reference as “a bit cheeky.”

To me, the most chilling thing is that the scammers spell “E-ZPass” right. Almost nobody outside of government can do that.

Bottom line: Control your outrage or fear about an unexpected bill. And don’t click on the link provided to obtain a copy of your invoice. The scammers are after your private information. Just delete the e-mail. E-ZPass bills generally come in the U.S. Mail.

If you have any doubts, call the customer service center for the agency that holds your account. For Virginia accounts, that’s 877-762-7824. For Maryland accounts, it’s 888-321-6824.

I haven’t seen any form of this scam e-mail that indicates it comes from any particular agency that issues E-ZPasses. The scam logo is a generic “E-ZPass Service Center.”

Robert Thomson is The Washington Post’s “Dr. Gridlock.” He answers travelers’ questions, listens to their complaints and shares their pain on the roads, trains and buses in the Washington region.

Saturday, August 9, 2014

New Protection From NSA Mobile Phone Snooping



Looking for an excellent solution to cell phone privacy? Read what two people have done to help secure your privacy from those who want to violate your cell phone privacy. Below is what their website offers in the form of a secure cell phone with a secure operating system. You can obtain more information at their website at https://www.blackphone.ch/ and https://silentcircle.com/

In 2011, Mike Janke, former U.S. Navy SEAL and security specialist, approached Phil Zimmermann, cryptography legend (Internet Hall of Fame inductee; creator of PGP and ZRTP) about a partnership to create the world’s first communications network built for privacy.

Jon Callas, creator of Apple's Whole Disk Encryption, joined as CTO and Silent Circle's founding team was made. Their idea was to create an encrypted communications service with easy-to-use tools available to all who appreciate a little control over who has access to their conversations.

Silent Circle has matured into the world's most trusted solution for mobile privacy serving individuals, businesses, and governments in over 130 countries with a truly revolutionary ecosystem of software, services, and devices.

Headquartered in Switzerland with employees in eight countries, Silent Circle has revolutionized how the world communicates - securely.

Here is some information on their secure cell phone that can be found on their website:

Blackphone combines a custom operating system with leading applications optimized for security. The result: an unparalleled product ideal for people who recognize a need for privacy and want a simple, secure place to start.

Blackphone's unique features put privacy back in your hands.

  • Bundled with privacy enabled applications
  • Smart disabling of WiFi except in trusted hotspots
  • Comes with years of key security subscriptions
  • Remote Wipe and anti-theft features

Blackphone comes unlocked and features several pre-installed privacy tools, all fully enabled for at least two years of use.  These tools include the Silent Circle suite of applications, including Silent Phone, Silent Text, and Silent Contacts; anonymous search, private browsing, and VPN from Disconnect; and secure cloud file storage from SpiderOak. (Source: https://www.blackphone.ch/ and https://silentcircle.com/)

This may be the privacy protection we all are craving. But rest assured there is someone or some company out there that will try and break this system just to once again invade your right to privacy.

Thursday, July 24, 2014

Top 5 Tricks of Identity Thieves

From an article at Yahoo! Finance of the same name, written by Stacy Curtin September 29, 2010

Identity theft affects 9 million Americans each year. Knowing the most common methods identity thieves use could save your financial and medical health.

Paying with a credit card, updating friends on social networking sites and throwing out the trash are fairly common activities for most Americans these days. But however routine or harmless these behaviors might seem, they could potentially cost you your identity.

According to the Federal Trade Commission (FTC), a federal consumer protection agency, identity theft affects 9 million Americans each year.

The FTC website says, "Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes."

If your identity is stolen, your credit rating, finances and even your medical health could be at risk.

Identity theft is very difficult to detect. However, there are things you can do to protect yourself.

As is often the case, the best defense is sometimes a good offense.

Knowing the most common methods thieves use to steal identities is a good way to fight back. So this week in Financially Fit, we'll cover five of the top tricks of identity thieves.

#1 Skimming

Skimming can happen while you're paying for gas at the gas pump, when you're removing money from the ATM or even when you're handing over your credit card to pay for dinner.

"Skimming is when information is captured from your credit card illegitimately," says Leonard Gordon of the FTC.

At gas pumps and ATMs thieves install special equipment called skimmers that are not visible to the naked eye. These skimmers make two copies of your credit card information.

"One [copy] to process the transaction and one for the bad guys to later download," explains Gordon.

Skimming is a very lucrative scheme. In a recent Los Angeles case, a gang of thieves netted $2 million after placing skimmers on the credit card readers at gas pumps.

Gordon says skimming is a big problem — one that costs consumers and banks billions of dollars a year.

#2 Medical Identity Theft

Medical identity theft is on the rise, and it's scary. This type of identity theft not only has financial risks, it could cost you your life. Here, thieves use your identity to gain access to doctors, dentists, prescriptions and procedures, and then send you and your insurer the bill.

In 2009, 1.4 million Americans were victims of medical identity theft according a report by Experian.

"If a person who is impersonating you has had medication administered [and] a procedure performed and then you go into the emergency room, and you are not conscious, and your medical records reflect that you have had this procedure performed [and] you have had this medication administered, when in fact you hadn't, there are some real medical risks there," Gordon says.

If you start to receive bills for procedures that you didn't have or from providers that you don't use, that's a key way to determine that someone else might be using your medical benefits.

#3 Social Networking Abuse

Social networking allows us to keep up with friends, family and colleagues, but these websites also serve up our identities on a silver platter to identity thieves.

According to a survey by the CMO council, one in every five users has been touched by social networking abuse.

Key personal details, such as age, hometown, employer and personal favorites, can be used against you.

Fraudsters on the web frequently use "pretexting" to steal your identity. The FTC website defines pretexting as "the practice of getting your personal information under false pretenses."

For example, after looking at your profile pages for basic information about you, a "pretexter" could call — pretending to be from an organization you trust — and ask for important personal data such as your birthday or social security number.

#4 Family and Friends

Theft source number four is surprisingly common — family and friends commit nearly half of all identity crimes. It often happens at the places we feel the safest, including at work, a college dormitory or even at home.

"Don't leave your pocket book laying around, don't leave your wallet around [and] check your credit card statements as soon as you get them," Gordon says.

It is important to look over all credit card statements carefully for any unidentified charges, says Gordon. He also recommends checking your credit report twice a year to spot all types of identity fraud.

#5 Dumpster Diving

Just taking out the trash is another routine activity that could put your identity at risk.

Every year, each of us throws away 175 pounds of paper, and much of that includes personal information thieves can use to steal your identity.

Credit card offers, bank account numbers and even just your name and address are clues thieves can use to help unlock your identity.

Visit the Federal Trade Commission website for additional information and identity theft-prevention methods.

Charlie