Translate

Friday, August 29, 2014

The Creative Identity Theft

It's amazing what some people will do to steal from you. Here are a few of the more creative identity theft trends you need to be aware of

While the same old methods of ID theft keep occurring over and over again -- because, sadly, they work like gangbusters --I've seen some surprisingly creative identity theft methods become more prominent recently. 
 
While ID thieves can be dumb, they're not always. Sometimes they're pretty darn smart. We don't say that because we admire them, but because it's critical for you to realize that a lack of ethics doesn't necessarily equal a lack of brains. You have to remain very, very careful, even in situations when you shouldn't have to.

The price of good credit is, after all, eternal vigilance. I think one of the Founding Fathers said that.

Endless Diversity

Recently, we made you aware of the recent plague of identity theft on Facebook, and you can rest assured that it's spread to any other social media site you can think of since, from Zing to LinkedIn to Bubba's BBQ Network. This is pedestrian compared to some recent ID theft issues.

For instance: You may not be aware that most photocopiers, scanners, fax machines, and similar devices made in the past decade contain hard drives that can store images of anything you pass through them. The clever thief can access that drive to pull your identity information with relative ease.

Your only real fix here is to never, ever copy your personal information on a machine you don't have total control over.

Matters of Life...

If you become pregnant, be very, very careful about who your friends are. Recently, one woman went to great lengths to pretend to be a new mom, then befriended an actual pregnant women, stole her information, obtained the birth certificates of her children... and used them to acquire government benefits.

If you have kids, it's a good idea to order credit reports on each of them every few years, to be sure that no one has tried this--or any other form of ID theft that could leave your kids' credit (or yours) ruined sometime in the future.

...and Death

People aren't even safe from identity theft after death. Recently, enterprising thieves have been grabbing personal information from places like the online Social Security Death Index, and opening new credit card accounts to abuse -- and have even been raiding existing ones. 
 
Usually, the first thing anyone knows about this is when bill collectors start harassing the family of the deceased. 
 
Now, you usually aren't liable for a deceased person's bills anyway, although some collectors may try to convince you otherwise. But it's still a nuisance. The best fix is to notify the credit reporting agencies immediately if a relative passes away, so you don't fall prey to some ghoul's creative identity theft. -Birdy

Protect You and Your Family With These Computer Tips

These computer tips could save you from a case of ID theft or worse!

Identity theft and computer tips go hand in hand. Sure, there are many methods of stealing someone's identity -- but online is the easiest and most common. That being the case you have to keep your eyes open wide and remember that as private as your computer feels, it's just like a window into your home: only as secure as you make it.

In fact, a window is exactly what your computer can be -- and without computer security tips, it could be a sliding window standing wide open with a sign that says 'come on in.' So if you want to protect yourself and your financial information from identity theft, take these computer tips to heart!

Helpful computer security tips

1. Watch for your computer suddenly slowing down or working less efficiently. This can be a sign of a computer virus, which could easily hack through your entire system.

2. Enter web addresses yourself -- don't click on links, especially those in emails. A common phishing method involves sending you a great link which, once you click on it, either downloads a file, harvests information, or redirects you to a fake site that tricks you into entering personal info.

3. Read about common phishing scams and stay up to date. Treat all emails with healthy suspicion, even if they seem to come from close friends. Contact people personally on the phone before you reply to any email requesting personal information.

4. If you want to phone someone to confirm an email, look up their phone number directly -- don't go with the number they include in the email. Sometimes thieves will claim to be a financial institution and give you their phone number. Call your bank, creditor, etc. directly if you think an email may be genuine.

5. Change your passwords. Don't use easily predictable passwords and don't use the same password for every website. I know it can get complicated after a while, remembering all of those passwords, but this is an incredibly important computer tip. Otherwise, if a thief cracks one password, they crack them all.

6. Watch your bank account and credit card statements carefully. If you find unexplained charges, even if they're very small, immediately contact your financial institution. If this continues, consider putting a fraud alert on your cards. Small thefts are still thefts, and sometimes thieves take small amounts in preparation for taking larger amounts later on.

Computer safety is one of the most important things we can teach ourselves and our families in these days of rampant fraud. It's not enough to follow these computer tips yourself: you need to make sure everyone in your family, especially people who might not be as familiar with computer scams (elderly people or children, for example) are aware of the dangers.

Create computer rules for your family and enforce them strictly -- and keep them yourself, too. It may seem like a pain, but these computer tips could keep you from losing your life's savings, or worse. -Birdy

Watch Out For These Computer Crimes

Beware of these all-too-common computer crimes!

The most common form of identity theft remains computer crimes, especially those that allow hackers to capture personal information and use a victim's credit cards fraudulently. And yet many people don't understand the depth and danger of computer crime -- instead, they think of it as a 'lesser' crime when compared to face-to-face offenses.

Obviously, though, perpetrators commit identity theft in secret -- and that makes computer crimes the perfect approach. Here are the three most common identity theft computer crimes and what you can do to avoid them.

1. Phishing

By now most people know better than to send money to African princesses, but there are literally thousands of phishing emails out there, and some are pretty insidious. The best hackers pose as an established company, going so far as to create a plausible email address and analyze the company's official communications to sound authentic.

Most phishing emails contain a threat so that you'll act quickly, without thinking too much. Be wary of any financial threat coming via email. If you have any suspicions at all, immediately contact the institution and ask them to confirm the information. Obviously, you should not do this by replying to the suspect email or using any phone numbers it provides -- look up the company's contact info directly.

2. Keystroke Spyware

Spyware is another one of those insidious computer crimes. It preys on the unsuspecting, attaching itself to legitimate websites, showing up in random links, or appearing in games and other programs you download. 

Keystroke spyware is particularly insidious. The hacker installs a keystroke program on your computer -- which is to say, a program that captures every key you strike and sends it back to the hacker to analyze. From there, it's surprisingly easy to glean information like your passwords, credit card number, and anything else you type into your computer.
The only protection against spyware? A good antivirus program that also watches for computer crimes. Install one of these and keep it up to date. Otherwise, you never know what you'll wind up downloading.

3. Hacker Spyware

Hacker spyware is the same as keystroke spyware, but serves a different function. Instead of capturing keystrokes, it opens a window into your system, allowing the hacker to enter your computer and stroll through your hard drive, gathering any information you might store. 

Obviously, you should handle these computer crimes the same as the former: install a good antivirus protection system that also watches for spyware.

It's true that computer crimes are on the rise, but you don't have to be helpless -- not if you follow these simple tips.

Common Fraud Myths

Protect yourself from fraud by knowing the truth behind the myths

We all know about fraud, but how accurate is our information? There are a surprising number of myths floating around, some of them so common they've become accepted 'knowledge' -- much to the experts' dismay! Are you falling for any of these common myths?

ID fraud myths and the truth behind them

Make sure you don't fall prey to these myths!
1. Most identity theft occurs online.
In fact, the highest instances of identity theft come from credit card misuse. That includes an online portion, but it can also involve someone stealing your credit card or a sneaky waiter or sales clerk grabbing the number.

2. People who steal credit and debit cards are petty thieves out for personal gain.
Identity theft, especially credit card fraud, is almost its own industry. Many very organized criminal groups such as drug traffickers and the like engage in ID fraud on a (dare I say it?) professional level. These people are not only very good at getting your information, they are good at stretching out the time period between the theft and the time you realize what's going on.

3. The police can't do anything about identity theft, so there's no point calling them.
While it's true that the police often find their hands tied in fraud situations, you still have to report the crime. The police will do whatever they can to help you, and sometimes they even can make arrests or stop sloppy thieves before they get too far.

4. If a website has a professional appearance and contains contact information, it's safe to do business online.
It's not hard to design a professional looking website, and it's even easier to fabricate contact information. Again, the problem here is that we regard identity thieves as petty criminals, whereas many of them are very well organized and know what they're doing. Verify that a site is real by checking its address, looking for security features, and reading online reviews.

5. If you're familiar with online scams and have a good security system on your computer, you're safe online.
Thieves constantly change and evolve their scams, and you can never completely rely on internet security systems. Always be careful and treat anything that seems a little bit suspicious with great caution. Remember the old chestnut: if it seems too good to be true, it probably is!

6. Offshore tax shelters are a quick and easy way to protect your money.
Offshore tax shelters do exist, and there are legal ways to invest internationally. However, inviting people to invest in offshore tax shelters is a quick, easy way to convince them to dump large sums of money in places where American law enforcement officials can't touch it. Watch out for these investments.

There are a lot of myths out there, but if you're careful, you can avoid these common fraud pitfalls.

Common Fraud Schemes




 The following are some of the most common scams and tips to help prevent you from being victimized.

Telemarketing Fraud

When you send money to people you do not know personally or give personal or financial information to unknown callers, you increase your chances of becoming a victim of telemarketing fraud.

Here are some warning signs of telemarketing fraud—what a caller may tell you:

* "You must act 'now' or the offer won't be good."
* "You've won a 'free' gift, vacation, or prize." But you have to pay for "postage and handling" or other charges.
* "You must send money, give a credit card or bank account number, or have a check picked up by courier." You may hear this before you have had a chance to consider the offer carefully.
* "You don't need to check out the company with anyone." The callers say you do not need to speak to anyone including your family, lawyer, accountant, local Better Business Bureau, or consumer protection agency.
* "You don't need any written information about their company or their references."
* "You can't afford to miss this 'high-profit, no-risk' offer."

If you hear these or similar "lines" from a telephone salesperson, just say "no thank you" and hang up the telephone.

Tips for Avoiding Telemarketing Fraud:

It's very difficult to get your money back if you've been cheated over the telephone. Before you buy anything by telephone, remember:

* Don't buy from an unfamiliar company. Legitimate businesses understand that you want more information about their company and are happy to comply.
* Always ask for and wait until you receive written material about any offer or charity. If you get brochures about costly investments, ask someone whose financial advice you trust to review them. But, unfortunately, beware—not everything written down is true.
* Always check out unfamiliar companies with your local consumer protection agency, Better Business Bureau, state attorney general, the National Fraud Information Center, or other watchdog groups. Unfortunately, not all bad businesses can be identified through these organizations.
* Obtain a salesperson's name, business identity, telephone number, street address, mailing address, and business license number before you transact business. Some con artists give out false names, telephone numbers, addresses, and business license numbers. Verify the accuracy of these items.
* Before you give money to a charity or make an investment, find out what percentage of the money is paid in commissions and what percentage actually goes to the charity or investment.
* Before you send money, ask yourself a simple question. "What guarantee do I really have that this solicitor will use my money in the manner we agreed upon?"
* Don’t pay in advance for services. Pay services only after they are delivered.
* Be wary of companies that want to send a messenger to your home to pick up money, claiming it is part of their service to you. In reality, they are taking your money without leaving any trace of who they are or where they can be reached.
* Always take your time making a decision. Legitimate companies won't pressure you to make a snap decision.
* Don't pay for a "free prize." If a caller tells you the payment is for taxes, he or she is violating federal law.
* Before you receive your next sales pitch, decide what your limits are—the kinds of financial information you will and won't give out on the telephone.
* Be sure to talk over big investments offered by telephone salespeople with a trusted friend, family member, or financial advisor. It's never rude to wait and think about an offer.
* Never respond to an offer you don't understand thoroughly.
* Never send money or give out personal information such as credit card numbers and expiration dates, bank account numbers, dates of birth, or social security numbers to unfamiliar companies or unknown persons.
* Be aware that your personal information is often brokered to telemarketers through third parties.
* If you have been victimized once, be wary of persons who call offering to help you recover your losses for a fee paid in advance.
* If you have information about a fraud, report it to state, local, or federal law enforcement agencies.


Nigerian Letter or “419” Fraud

Nigerian letter frauds combine the threat of impersonation fraud with a variation of an advance fee scheme in which a letter mailed from Nigeria offers the recipient the "opportunity" to share in a percentage of millions of dollars that the author—a self-proclaimed government official—is trying to transfer illegally out of Nigeria. The recipient is encouraged to send information to the author, such as blank letterhead stationery, bank name and account numbers, and other identifying information using a fax number provided in the letter. Some of these letters have also been received via e-mail through the Internet. The scheme relies on convincing a willing victim, who has demonstrated a "propensity for larceny" by responding to the invitation, to send money to the author of the letter in Nigeria in several installments of increasing amounts for a variety of reasons.

Payment of taxes, bribes to government officials, and legal fees are often described in great detail with the promise that all expenses will be reimbursed as soon as the funds are spirited out of Nigeria. In actuality, the millions of dollars do not exist, and the victim eventually ends up with nothing but loss. Once the victim stops sending money, the perpetrators have been known to use the personal information and checks that they received to impersonate the victim, draining bank accounts and credit card balances. While such an invitation impresses most law-abiding citizens as a laughable hoax, millions of dollars in losses are caused by these schemes annually. Some victims have been lured to Nigeria, where they have been imprisoned against their will along with losing large sums of money. The Nigerian government is not sympathetic to victims of these schemes, since the victim actually conspires to remove funds from Nigeria in a manner that is contrary to Nigerian law. The schemes themselves violate section 419 of the Nigerian criminal code, hence the label “419 fraud.”

Tips for Avoiding Nigerian Letter or "419" Fraud:

* If you receive a letter from Nigeria asking you to send personal or banking information, do not reply in any manner. Send the letter to the U.S. Secret Service, your local FBI office, or the U.S. Postal Inspection Service. You can also register a complaint with the Federal Trade Commission’s Complaint Assistant.
* If you know someone who is corresponding in one of these schemes, encourage that person to contact the FBI or the U.S. Secret Service as soon as possible.
* Be skeptical of individuals representing themselves as Nigerian or foreign government officials asking for your help in placing large sums of money in overseas bank accounts.
* Do not believe the promise of large sums of money for your cooperation.
* Guard your account information carefully.

Identity Theft

Identity theft occurs when someone assumes your identity to perform a fraud or other criminal act. Criminals can get the information they need to assume your identity from a variety of sources, including by stealing your wallet, rifling through your trash, or by compromising your credit or bank information. They may approach you in person, by telephone, or on the Internet and ask you for the information.

The sources of information about you are so numerous that you cannot prevent the theft of your identity. But you can minimize your risk of loss by following a few simple hints.

Tips for Avoiding Identity Theft:

* Never throw away ATM receipts, credit statements, credit cards, or bank statements in a usable form.
* Never give your credit card number over the telephone unless you make the call.
* Reconcile your bank account monthly, and notify your bank of discrepancies immediately.
* Keep a list of telephone numbers to call to report the loss or theft of your wallet, credit cards, etc.
* Report unauthorized financial transactions to your bank, credit card company, and the police as soon as you detect them.
* Review a copy of your credit report at least once each year. Notify the credit bureau in writing of any questionable entries and follow through until they are explained or removed.
* If your identity has been assumed, ask the credit bureau to print a statement to that effect in your credit report.
* If you know of anyone who receives mail from credit card companies or banks in the names of others, report it to local or federal law enforcement authorities.

Advance Fee Schemes

An advance fee scheme occurs when the victim pays money to someone in anticipation of receiving something of greater value—such as a loan, contract, investment, or gift—and then receives little or nothing in return.

The variety of advance fee schemes is limited only by the imagination of the con artists who offer them. They may involve the sale of products or services, the offering of investments, lottery winnings, "found money," or many other "opportunities." Clever con artists will offer to find financing arrangements for their clients who pay a "finder's fee" in advance. They require their clients to sign contracts in which they agree to pay the fee when they are introduced to the financing source. Victims often learn that they are ineligible for financing only after they have paid the "finder" according to the contract. Such agreements may be legal unless it can be shown that the "finder" never had the intention or the ability to provide financing for the victims.


Tips for Avoiding Advanced Fee Schemes:

If the offer of an "opportunity" appears too good to be true, it probably is. Follow common business practice. For example, legitimate business is rarely conducted in cash on a street corner.

* Know who you are dealing with. If you have not heard of a person or company that you intend to do business with, learn more about them. Depending on the amount of money that you plan on spending, you may want to visit the business location, check with the Better Business Bureau, or consult with your bank, an attorney, or the police.
* Make sure you fully understand any business agreement that you enter into. If the terms are complex, have them reviewed by a competent attorney.
* Be wary of businesses that operate out of post office boxes or mail drops and do not have a street address. Also be suspicious when dealing with persons who do not have a direct telephone line and who are never in when you call, but always return your call later.
* Be wary of business deals that require you to sign nondisclosure or non-circumvention agreements that are designed to prevent you from independently verifying the bona fides of the people with whom you intend to do business. Con artists often use non-circumvention agreements to threaten their victims with civil suit if they report their losses to law enforcement.




Health Care Fraud or Health Insurance Fraud

Medical Equipment Fraud:

Equipment manufacturers offer "free" products to individuals. Insurers are then charged for products that were not needed and/or may not have been delivered.

"Rolling Lab" Schemes:

Unnecessary and sometimes fake tests are given to individuals at health clubs, retirement homes, or shopping malls and billed to insurance companies or Medicare.

Services Not Performed:

Customers or providers bill insurers for services never rendered by changing bills or submitting fake ones.

Medicare Fraud:

Medicare fraud can take the form of any of the health insurance frauds described above. Senior citizens are frequent targets of Medicare schemes, especially by medical equipment manufacturers who offer seniors free medical products in exchange for their Medicare numbers. Because a physician has to sign a form certifying that equipment or testing is needed before Medicare pays for it, con artists fake signatures or bribe corrupt doctors to sign the forms. Once a signature is in place, the manufacturers bill Medicare for merchandise or service that was not needed or was not ordered.

Tips for Avoiding Health Care Fraud or Health Insurance Fraud:

* Never sign blank insurance claim forms.
* Never give blanket authorization to a medical provider to bill for services rendered.
* Ask your medical providers what they will charge and what you will be expected to pay out-of-pocket.
* Carefully review your insurer's explanation of the benefits statement. Call your insurer and provider if you have questions.
* Do not do business with door-to-door or telephone salespeople who tell you that services of medical equipment are free.
* Give your insurance/Medicare identification only to those who have provided you with medical services.
* Keep accurate records of all health care appointments.
* Know if your physician ordered equipment for you.


Redemption / Strawman / Bond Fraud

Proponents of this scheme claim that the U.S. government or the Treasury Department control bank accounts—often referred to as “U.S. Treasury Direct Accounts”—for all U.S. citizens that can be accessed by submitting paperwork with state and federal authorities. Individuals promoting this scam frequently cite various discredited legal theories and may refer to the scheme as “Redemption,” “Strawman,” or “Acceptance for Value.” Trainers and websites will often charge large fees for “kits” that teach individuals how to perpetrate this scheme. They will often imply that others have had great success in discharging debt and purchasing merchandise such as cars and homes. Failures to implement the scheme successfully are attributed to individuals not following instructions in a specific order or not filing paperwork at correct times.

This scheme predominately uses fraudulent financial documents that appear to be legitimate. These documents are frequently referred to as “bills of exchange,” “promissory bonds,” “indemnity bonds,” “offset bonds,” “sight drafts,” or “comptrollers warrants.” In addition, other official documents are used outside of their intended purpose, like IRS forms 1099, 1099-OID, and 8300. This scheme frequently intermingles legal and pseudo legal terminology in order to appear lawful. Notaries may be used in an attempt to make the fraud appear legitimate. Often, victims of the scheme are instructed to address their paperwork to the U.S. Secretary of the Treasury.

Tips for Avoiding Redemption/Strawman/Bond Fraud:

* Be wary of individuals or groups selling kits that they claim will inform you on to access secret bank accounts.
* Be wary of individuals or groups proclaiming that paying federal and/or state income tax is not necessary.
* Do not believe that the U.S. Treasury controls bank accounts for all citizens.
* Be skeptical of individuals advocating that speeding tickets, summons, bills, tax notifications, or similar documents can be resolved by writing “acceptance for value” on them.
* If you know of anyone advocating the use of property liens to coerce acceptance of this scheme, contact your local FBI office.

Investment-Related Scams

Letter of Credit Fraud

Legitimate letters of credit are never sold or offered as investments. They are issued by banks to ensure payment for goods shipped in connection with international trade. Payment on a letter of credit generally requires that the paying bank receive documentation certifying that the goods ordered have been shipped and are en route to their intended destination. Letters of credit frauds are often attempted against banks by providing false documentation to show that goods were shipped when, in fact, no goods or inferior goods were shipped.

Other letter of credit frauds occur when con artists offer a "letter of credit" or "bank guarantee" as an investment wherein the investor is promised huge interest rates on the order of 100 to 300 percent annually. Such investment "opportunities" simply do not exist. (See Prime Bank Notes for additional information.)

Tips for Avoiding Letter of Credit Fraud:

* If an "opportunity" appears too good to be true, it probably is.
* Do not invest in anything unless you understand the deal. Con artists rely on complex transactions and faulty logic to "explain" fraudulent investment schemes.
* Do not invest or attempt to "purchase" a "letter of credit." Such investments simply do not exist.
* Be wary of any investment that offers the promise of extremely high yields.
* Independently verify the terms of any investment that you intend to make, including the parties involved and the nature of the investment.

Prime Bank Note Fraud

International fraud artists have invented an investment scheme that supposedly offers extremely high yields in a relatively short period of time. In this scheme, they claim to have access to "bank guarantees" that they can buy at a discount and sell at a premium. By reselling the "bank guarantees" several times, they claim to be able to produce exceptional returns on investment. For example, if $10 million worth of "bank guarantees" can be sold at a two percent profit on 10 separate occasions—or "traunches"—the seller would receive a 20 percent profit. Such a scheme is often referred to as a "roll program."

To make their schemes more enticing, con artists often refer to the "guarantees" as being issued by the world's "prime banks," hence the term "prime bank guarantees." Other official sounding terms are also used, such as "prime bank notes" and "prime bank debentures." Legal documents associated with such schemes often require the victim to enter into non-disclosure and non-circumvention agreements, offer returns on investment in "a year and a day", and claim to use forms required by the International Chamber of Commerce (ICC). In fact, the ICC has issued a warning to all potential investors that no such investments exist.

The purpose of these frauds is generally to encourage the victim to send money to a foreign bank, where it is eventually transferred to an off-shore account in the control of the con artist. From there, the victim's money is used for the perpetrator's personal expenses or is laundered in an effort to make it disappear.

While foreign banks use instruments called "bank guarantees" in the same manner that U.S. banks use letters of credit to insure payment for goods in international trade, such bank guarantees are never traded or sold on any kind of market.

Tips for Avoiding Prime Bank Note Fraud:

* Think before you invest in anything. Be wary of an investment in any scheme, referred to as a "roll program," that offers unusually high yields by buying and selling anything issued by "prime banks."
* As with any investment, perform due diligence. Independently verify the identity of the people involved, the veracity of the deal, and the existence of the security in which you plan to invest.
* Be wary of business deals that require non-disclosure or non-circumvention agreements that are designed to prevent you from independently verifying information about the investment.

“Ponzi’ Schemes

“Ponzi” schemes promise high financial returns or dividends not available through traditional investments. Instead of investing the funds of victims, however, the con artist pays "dividends" to initial investors using the funds of subsequent investors. The scheme generally falls apart when the operator flees with all of the proceeds or when a sufficient number of new investors cannot be found to allow the continued payment of "dividends."

This type of fraud is named after its creator—Charles Ponzi of Boston, Massachusetts. In the early 1900s, Ponzi launched a scheme that guaranteed investors a 50 percent return on their investment in postal coupons. Although he was able to pay his initial backers, the scheme dissolved when he was unable to pay later investors.

Tips for Avoiding Ponzi Schemes:

* Be careful of any investment opportunity that makes exaggerated earnings claims.
* Exercise due diligence in selecting investments and the people with whom you invest—in other words, do your homework.
* Consult an unbiased third party—like an unconnected broker or licensed financial advisor—before investing.

For more information:
- Bernie Madoff Case
- Stanford Case
- Wholesale Grocery Distribution Ponzi Scheme
- ATM Ponzi Scheme
- Victims Turn Tables with Ponzi Scheme

Pyramid Schemes

As in Ponzi schemes, the money collected from newer victims of the fraud is paid to earlier victims to provide a veneer of legitimacy. In pyramid schemes, however, the victims themselves are induced to recruit further victims through the payment of recruitment commissions.

More specifically, pyramid schemes—also referred to as franchise fraud or chain referral schemes—are marketing and investment frauds in which an individual is offered a distributorship or franchise to market a particular product. The real profit is earned, not by the sale of the product, but by the sale of new distributorships. Emphasis on selling franchises rather than the product eventually leads to a point where the supply of potential investors is exhausted and the pyramid collapses. At the heart of each pyramid scheme is typically a representation that new participants can recoup their original investments by inducing two or more prospects to make the same investment. Promoters fail to tell prospective participants that this is mathematically impossible for everyone to do, since some participants drop out, while others recoup their original investments and then drop out.

Tips for Avoiding Pyramid Schemes:

* Be wary of "opportunities" to invest your money in franchises or investments that require you to bring in subsequent investors to increase your profit or recoup your initial investment.
* Independently verify the legitimacy of any franchise or investment before you invest.

Market Manipulation or “Pump and Dump” Fraud

This scheme—commonly referred to as a "pump and dump”—creates artificial buying pressure for a targeted security, generally a low-trading volume issuer in the over-the-counter securities market largely controlled by the fraud perpetrators. This artificially increased trading volume has the effect of artificially increasing the price of the targeted security (i.e., the "pump"), which is rapidly sold off into the inflated market for the security by the fraud perpetrators (i.e., the "dump"); resulting in illicit gains to the perpetrators and losses to innocent third party investors. Typically, the increased trading volume is generated by inducing unwitting investors to purchase shares of the targeted security through false or deceptive sales practices and/or public information releases.

A modern variation on this scheme involves largely foreign-based computer criminals gaining unauthorized access to the online brokerage accounts of unsuspecting victims in the United States. These victim accounts are then utilized to engage in coordinated online purchases of the targeted security to affect the pump portion of a manipulation, while the fraud perpetrators sell their pre-existing holdings in the targeted security into the inflated market to complete the dump.

Tips for Avoiding Market Manipulation Fraud:

* Don't believe the hype.
* Find out where the stock trades.
* Independently verify claims.
* Research the opportunity.
* Beware of high-pressure pitches.
* Always be skeptical.

-Birdy.

What you should not tell anyone on FaseBook


The whole social networking phenomenon has millions of Americans sharing their photos, favorite songs and details about their class reunions on Facebook, MySpace, Twitter and dozens of similar sites. But there are a handful of personal details that you should never say if you don’t want criminals — cyber or otherwise — to rob you blind, according to Beth Givens, executive director of the Privacy Rights Clearinghouse.



The folks at Insure.com also say that ill-advised Facebook postings increasingly can get your insurance canceled or cause you to pay dramatically more for everything from auto to life insurance coverage. By now almost everybody knows that those drunken party photos could cost you a job. And experts now say that debt collectors are throwing away their phone books in favor of trolling social networking sites to find deadbeats, too.
You can certainly enjoy networking and sharing photos, but you should know that sharing some information puts you at risk. What should you never say on Facebook, Twitter or any other social networking site?
  • Your birth date and place. Sure, you can say what day you were born, but if you provide the year and where you were born too, you’ve just given identity thieves a key to stealing your financial life, said Givens. A study done by Carnegie Mellon showed that a date and place of birth could be used to predict most — and sometimes all — of the numbers in your Social Security number, she said.
  • Vacation plans. There may be a better way to say “Rob me, please” than posting something along the lines of: “Count-down to Maui! Two days and Ritz Carlton, here we come!” on Twitter. But it’s hard to think of one. Post the photos on Facebook when you return, if you like. But don’t invite criminals in by telling them specifically when you’ll be gone.
  • Home address. Do I have to elaborate? A study recently released by the Ponemon Institute found that users of Social Media sites were at greater risk of physical and identity theft because of the information they were sharing. Some 40% listed their home address on the sites; 65% didn’t even attempt to block out strangers with privacy settings. And 60% said they weren’t confident that their “friends” were really just people they know.
  • Confessionals. You may hate your job; lie on your taxes; or be a recreational user of illicit drugs, but this is no place to confess. Employers commonly peruse social networking sites to determine who to hire — and, sometimes, who to fire. Need proof? In just the past few weeks, an emergency dispatcher was fired in Wisconsin for revealing drug use; a waitress got canned for complaining about customers and the Pittsburgh Pirate’s mascot was dumped for bashing the team on Facebook. One study done last year estimated that 8% of companies fired someone for “misuse” of social media.
  • Password clues. If you’ve got online accounts, you’ve probably answered a dozen different security questions, telling your bank or brokerage firm your Mom’s maiden name; the church you were married in; or the name of your favorite song. Got that same stuff on the information page of your Facebook profile? Are you playing games where you and your friends “quiz” each other on the personal details of your lives? You’re giving crooks an easy way to guess your passwords.
  • Risky behaviors. You take your classic Camaro out for street racing, soar above the hills in a hang glider, or smoke like a chimney? Insurers are increasingly turning to the web to figure out whether their applicants and customers are putting their lives or property at risk, according to Insure.com. So far, there’s no efficient way to collect the data, so cancellations and rate hikes are rare. But the technology is fast evolving, according to a paper written by Celent, a financial services research and consulting firm.
  • Remember: it is better to be safe than to be sorry.



-Birdy

Improving your WiFi Experience

If you use a WiFi network at home, there are undoubtedly limits to where you can access the signal. You might get a strong connection at the kitchen table, but take your laptop to the living room and you lose the signal. If you're looking to boost your signal a few feet or get a strong connection all the way upstairs in the back bedroom, we've got a handful of simple tricks and more advanced techniques to get you on connected to your home wifi from anywhere in your house.

Move your router:
* It's so simple, but many people don't realize that where you put your router really does make a difference. Obviously a central location is best, but for many, you are tied to putting the router where the Internet connection comes into the house.

* Beyond simple proximity, consider the router's height. The higher your router is on a shelf or cabinet, the less physical interference it's likely to encounter. Move the router to the best possible position to take advantage of doorways and open spaces instead of walls and corners. Wifi might move through the airwaves, but furniture, walls and appliances can weaken your signal substantially.

* Signal interference is one of the biggest culprits that might be at work if your wifi is weak. Walls and physical obstructions block your signal, but signals emitted by any electromagnetic household object do too. Scoot your router away from anything that might interfere: cordless phones, microwaves, wireless game controllers, other wifi-enabled devices (TVs, etc.), Bluetooth devices, and even flourescent lights and elevators.

Technical tweaks:
Once you've got your router in an ideal spot, take a look at your equipment. These next steps can help you further improve your wifi signal.

* Did you know routers have channels? If you live in close proximity to someone else with a wifi network you may both be trying to use the same channel and degrading your signals.

To find out if you are "crossing the streams" use WiFi Stumbler or inSSIDer to find the best and least-trafficked channel for your router to broadcast on. Once you've found the optimal channel, follow these step-by-step instructions to get your router on the right track.

* Depending on the age of your router, it may be slower than newer models. Upgrade an older b or g router to an n router to extend your range for relatively reasonable cost. There are some new n routers for as little as $30. An n router can handle local electrical and physical signal interference better than b and g and may get you quite a bit more range.

* Lesser-known fact: The "current standard" 802.11n routers can operate at either 2.4 GHz or 5 GHz bands, and 2.4 GHz is far better at traveling through walls. So if you already have a Wireless-n router and need it to extend farther, make sure it's set to use 2.4 GHz instead of 5 GHz.

* The internal antenna on your laptop itself can be a factor in how much range you get. Even if your laptop has built-in wifi, it could be well worth picking up an external USB adapter, like this $30 option from Netgear.

This could also help an older laptop without Wireless-N support take advantage of faster speeds and improved range from a new 802.11n router.

Invest in network extension options:
* Wifi repeaters amplify and extend your wireless signal. Put a repeater within range of your existing wifi router and it will relay that signal out to hard-to-reach locations around your home or office. They cost about $90 and while they can theoretically double your range, real life results tend to vary considerably. If you've had good or bad luck with a repeater, we welcome any advice or testimonials in the comments section below.
  • Power-line networking uses the electrical wiring in your house to extend your Internet coverage. This is especially good if you want to get Internet access in a back room or you want to connect a gaming console that's on an old TV in the garage. Plug one power-line adapter into your router and the other into an electrical plug. Then in the far room where you want connectivity, plug the other power-line adapter into an electrical plug and voila - you've got Internet, you can even put a second wireless router on that connection. Setting up an alternative powerline network using your home's own AC power adapters can circumvent many of the most common wireless connectivity problems, and you don't even need to give up wifi altogether. If you look into getting started with a power-line setup, be sure to stick with one manufacturer when buying your equipment to avoid any compatibility issues.



Internet connections have allowed the flow of information in and out of our households to grow exponentially over the last decade. One of the best developments in this same time frame has been the implementation of the home wifi system. With wifi, you can connect to the internet from practically any room in your home, without any wiring required.

With these tips, you will be able to maximize that connectivity and make your home wifi a more enjoyable experience.

The router
The first order of business is the router. Not all routers are created equal, and you need to make sure that yours is up to the challenge of your home's layout. While there are still G-designated routers on the market, the latest standard is labeled N. We don't want to get too technical, so let's consider the main thing with these designations and how they apply to you.

It's important to try and match up the devices that you have with the router. While N routers are usually backward-compatible with G wifi devices, not matching these can cause some problems.

Though any N device should work with any N device, another consideration to make sure things go smoothly is to try and match manufacturers. For example, if you have a Cisco Linksys network adapter in your computer, take advantage of the fact that Cisco will make sure their products work with their products and get a Cisco Linksys router.

If you're unsure what is in your computer, you can check the Control Panel under "Devices." When in doubt, ask your local tech guru to help you out. Otherwise, you can spend a few extra dollars and buy a USB wireless adapter to match your router.

Location, location, and location
The next consideration should be the placement of your router. You are limited by cables to your primary computer as well as the location of your DSL or cable modem. Beyond these limitations, you should try to put the wifi router in a centrally located place within your house to ensure the best access possible in each room. However, if there are only a few rooms where you will be using the wifi, then the router should be located as close to those rooms as possible.

While the signal can travel through walls, each obstacle can cause the signal strength to drop a little. In light of this, it's also better to locate your router off of the floor, if possible.

Out with the old, in with the new
It's never been easier to hook up a wireless network adapter to your desktop. As far as laptops go, practically all new laptops come with the latest wifi standard, compliant adapters installed and ready to go. However, if you happen to not have one in any of your computer systems yet, it's as simple as using a USB wireless adapter.

Most manufacturers now have USB wifi adapters in both G and N standards. Drivers for these may come on a CD-ROM that needs to be run first, or they may be on the actual USB device itself. Don't be afraid to go out and get a new adapter; installation is as easy as plugging the adapter into an available USB port and perhaps installing some software.

The only consideration here is whether or not you plug the USB adapter into the back of a desktop system or into the front USB ports. If one isn't giving you the signal strength you want, try the other. Also, make sure to update the driver if you are given that option during install. Many times the driver for the device is updated after the adapters have already hit the store shelves, and installing the latest version for your device could provide benefits in terms of stability or performance. 

Enjoy -Birdy
 

The Biggest Security Threat: Facebook And You


Forget those phishing emails that attempt to get your credit card or bank sign-in information. When crooks want to know how to get into your bank account, they post a message on Facebook. These messages appear so innocuous and so appropriate in the Facebook setting that you are likely to not only get conned, but pass with a straight “A”on the scam.

Facebook is the new frontier for fraud, says Tom Clare, head of product marketing at Blue Coat, an Internet security company that does annual reports on web threats. In just this past year social networks have soared to 4th from 17th most treacherous web terrain — behind porn and software-sharing sites, which you probably know that you should avoid like a plague.

What makes Facebook so treacherous? Us, the very people who make Facebook great.

It starts with the fact that we are inundated with requests to set up passwords to get into our work computers, our online bank accounts, Facebook and every other web-based subscription. So what do we do? Well, most of the time its the same password.

Crooks understand that most users use the same password for everything,” says Clare. “If they can get your user credentials for your Facebook account, there’s a good chance that they have the password for your bank account, and every other account that you may have linked to your e-mail.” You see, on Facebook, your email address is imputed, so if you use the same password that is your email account as well as your Facebook account, if your Facebook is compromised, than by proxy anything that you receive email from should also be considered as being compromised. 
 
If you are smart enough to have separate passwords for Facebook and your financial accounts, crooks get at you through a variety phishing attempts that you might think are Facebook games and widgets. But look closely and you’ll realize that they deliver answers to all of your bank’s security questions–and possibly clues to your passwords — right into the hands of the crooks.

Think it couldn’t happen to you? Let’s see if you recognize any of these 5 recent Facebook messages that jeopardize your security. All of these came from my Facebook friends in just the past few months:

1. Who knows you best?
The message reads: Can you do this? My middle name __________, my age ___, my favorite soda _______, my birthday ___/___/___, whose the love of my life ______ , my best friend _____, my favorite color ______, my eye color _______, my hair color ______ my favorite food ________ and my mom’s name __________. Put this as your status and see who knows you best. ♥

How many of these are the same facts your bank asks to verify your identity? Put this as your status and everybody — including all the people who want to hijack your bank account and credit cards — will know you well enough to make a viable attempt. And 92% of the time that attempt will work!

2. Your friend [Name here] just answered a question about you!
Was it possible that an old friend answered a question about me that I needed to “unlock”? Absolutely. But when you click on the link, the next screen should give you pause: 21 Questions is requesting permission to…(a) access your name, profile picture, gender, networks, user ID, friends and any other information shared with everyone…(b) send you email…(c) post to your wall…and…(d) access your data any time…regardless of whether or not you’re using their application.

Can you take that access back — ever? It sure doesn’t look like it. There’s no reference to how you can stop them from future access to your data in their “terms and conditions.” Worse yet, it appears that to “unlock” the answer in your friend’s post, you need to answer a bunch of questions about your other friends and violate their privacy too. I didn’t give 21 Questions access to my information, but the roughly 2400+ people who joined “People Who Hate 21 Questions on Facebook” apparently have and can give you insight into just how pernicious this program can be.

3. LOL. Look at the video I found of you!
This is the most dangerous of all the spam messages and it comes in a variety of forms, says Clare. It’s actually a bid to “surreptitiously” install malware on your computer. This malware can track your computer keystrokes and record your sign-in and password information with all of your online accounts.

How does it work? When you click on the link, it says that you need to upgrade your video player to see the clip. If you hit the “upgrade” button, it opens your computer to the crooks, who ship in their software. You may be completely unaware of it until you start seeing strange charges hit your credit cards or bank account. Up-to-date security software should stop the download. If you don’t have that, watch out. But beware that the security program McAfee will not detect such an intrusion, whereas Norton will detect and quarantine such an effort, and issue a warning that such an attempt was detected, blocked and quarantined.

Better yet, if you really think some friend is sending you a video clip, double-check with the friend to be sure before you click on the link. When I messaged my high-school classmate to ask if she’d really sent this, she was horrified. Her Facebook account had been hijacked and anyone who clicked through was likely to have their account hijacked too. That’s how this virus spreads virtually, to dozens of computers almost over-night. Every computer that such a malware program infects provides a host to spread it further. Thus, 2 computers can spread it to 4 computers which can spread it to 16, etc.

4. Help! We’re stuck!
It started out as an email scam, but now the “Help We’re stuck in [Europe/Asia/Canada] and need money” scam has moved to instant messages on Facebook, where it can be more effective. Most people have learned not to react to the email, but instant messages help crooks by forcing you to react emotionally — They’re right there. They need help, now. A friend got one of these messages last week from the parents of a close friend. Her reaction was the perfect way to deal with it: She immediately called her friend and said “Have you talked to your parents lately?” The response: “Yeah. They’re right here.”

Facebook has launched a security system to combat account hijacking that allows crooks to send messages and posts through your account. You can get updates on what they’re doing at Facebook’s security page, where they’ve also got a nice little security quiz that’s definitely worth taking.

5. Please Share This Story.
I pay an astounding amount of money to subscribe to the New York Times because they’re one of the few papers that invests enough money in its staff to support incredibly robust investigative reporting. As someone who believes that democracy relies on that type of journalism, I’m willing to shell out $$$ a year for a daily subscription.

But I won’t share their stories on Facebook.

Why? When I try, up pops the ubiquitous Facebook “Request for Permission” that says they want my name, gender, email, friends, likes, music, movies, books, quotes, interests….and the list goes on. To their credit, the New York Times privacy policy is prominently posted and clear. But they want more privacy than I’m willing to give up. Also to their credit, they allow you to rescind access later. But I’m not convinced that privacy once given up can ever be regained.

To quote Nancy Reagan, when someone asks “permission” to violate your privacy: Just say no.”

No amount of reading what could happen to you if you are not careful can prepare you for the terrible onslaught of crooks and thieves, until you have had it happen to you. Your best bet is to guard your privacy as if it was your own child, and in that manner you will not become a victim of thieves. -Birdy
Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)