Showing posts with label safety online. Show all posts
Showing posts with label safety online. Show all posts

Wednesday, July 6, 2011

A Warning: Social Networking Tied to Recent Kidnapping

May 2011

We have talked to you before about monitoring what your kids post on Facebook or check in location software like Foursquare to protect them from cyberstalking and child predators.  Well now, we have news tonight of a recent attempted kidnapping where police believe that the kid’s social networking activities made him a target.

It is a parent’s worst nightmare, your child does not come home on time or arrives home late saying someone tried to follow them home, or worse, they go missing.  This horrible scenario happened to a security experts 20 year old son.

Eugene Kaspersky is a legend in the security field.  His son Vanya, also known as “Ivan” is 20 years old and was kidnapped on his way to work.  The overall story is terrible but it has a happy ending – Ivan is alive and home safe and sound.  When police started investigating, they and his Dad, Eugene, believe that the kidnappers were tracking his son using social networking.

The kidnappers were actively using social networks, gleaning ever detail possible about their potential victims and mapping out their daily routines.  They used this information to plan their crimes, including kidnapping Ivan.

We know that sometimes young people lie about their ages online but since the age they type in is all we have to work with, conside these statistics from InsideFacebook.com:

Over 46% of Facebook users are UNDER 25

Roughly 1 in 5 of every Facebook account belongs to someone UNDER 17 years old.

OnGuardOnline.gov did a recent study and said that over 1/5 of 16-24  year olds admit they don’t know all the people they share their information with on social networks.

Here are 4 tips to start the conversation with your kid, to hopefully avoid a situation like this in your family:

TIPS TO PROTECT YOURSELF:
1. DON’T TALK TO STRANGERS:  Tell kids to assume that strangers on the internet can read posts only intended for close friends.  With that in mind, don’t post you daily routine any place online.
2. GEOCODING:  Every time your kid posts a photo with geocodes they are broadcasting where they have been which makes it easier to map out routines.
3. LOCATION CHECK IN SERVICES:  Your kids might think it is fun to be Mayor of Starbucks but talk to them about the dangers of linking their social networking and location check in services together creating a more complete picture of their routines
4. PRIVACY CHECK:  Check all settings, addresses, phone numbers, and email addresses that show on internet profiles.

Now, for our word of the week, it is:
TETWRIST:  It’s a techie term for that sore wrist you get after playing an addictive game.  The term first started when the game TETRIS first hit the cell phone gaming scene calling it a TETWRIST but now can apply to games like FruitNinja, AngryBirds, Doodle Jump and any other addictive games!

WEB RESOURCES:
To read about what happened in the Dad’s own words, go to Eugene Kaspersky’s Facebook page at:
https://www.facebook.com/notes/eugene-kaspersky/talk-to-your-children-about-privacy-in-social-networks-now/10150169499355998
www.OnGuardOnline.gov has great resources for kids and families.  They provide tips and even games to test your online know how.  A great place to start to reinforce safety lessons for kids and adults.
Kaspersky Lab has an educational program at:  http://www.kasperskyacademy.com/en/
If you want to see how social media and networks are changing the way we think, act and react, check out the infographics at:  http://www.pamorama.net/2011/01/30/65-terrific-social-media-infographics/

Monday, April 18, 2011

Guest Post - Intern Stephanie Graziano

Intern: Stephanie Graziano
Topic:  Identity Theft


It’s strange to think that there could be another you in this world, but in today’s world it’s not impossible.
The FTC (Federal Trade Commission) estimates that approximately 9 million Americans have their identify stolen each year.


Internship Outline #3
Version 1.0
Date: 8 April 2011


SUMMARY PARAGRAPH:
Identity theft occurs when someone uses your own identifying information as their own. They can use a social security number or a credit card number without your permission to commit a crime or fraud. The FTC (Federal Trade Commission) estimates that approximately 9 million Americans have their identify stolen each year.

BACKGROUND
I myself was a victim of identity theft last summer. I received a strange letter in the mail from a local banking chain, that I had no affiliation with, telling me that I was overdue on payments. I spoke with my Dad about the letter and we decided we needed to look into this letter further. After speaking with a bank representative the next day, I found out that someone living two hours north of me in Connecticut used my social security number to withdraw a loan from the bank. I proceeded to go online and check my credit statements to see what actions had been taken. I used the three credit report companies, Equifax, Experian and Transunion. When I printed out the credit statements there was about fifty pages worth of actions under my social security number that in fact were not mine, and a total debt of $76,000. The most shocking of all the actions was where it said I took out a $40,000 college loan… I was 8 years old at the time the loan was taken. It took about two months, working with my father and our local police department, to restore my credit statements to the way they should be.

  I feel that it is important for every person to keep updated on their own personal credit check. If I had not caught this issue last summer, I would have had a very hard time applying for jobs after graduating or even taking out a loan if needed. I now receive weekly emails from Experian, Equifax and Transunion making me aware if there have been any strange actions in my accounts.

STRATEGIC PLANNING ASSUMPTIONS:
Creating accounts with the three leading credit check companies to receive annual credit reports and records. (Equifax, Transunion and Experian)
When hiring, do elaborate backgrounds checks on possible employees.
When at work, companies should not allow employees to explore Internet sites which are not affiliated with the company tasks. Limit Internet access to restrain employees from getting into trouble.

ANALYSIS:
Identity thieves can take another person’s information and rent apartments, open credit cards and establish telephone records under the victim’s name. Some victims can resolve their identity theft quickly, while other can spends up to two years, as well as hundreds of dollars, clearing their records. Many victims of identity theft may lose out on job opportunities, or be denied loans for education, housing or cars because of fraudulent charges on their credit reports. In rare cases, victims even are arrested for crimes they did not commit.

It has been researched that young people are more vulnerable to identity theft because they are online more, share more information often and are less careful with their information. For example, college students living in school housing such as dorm rooms and apartments may be at fault for leaving their information vulnerable without knowledge. Their information and personal belongings make be unsecured and an easy target.

IMPLICATIONS:
Financial histories and credit records can suffer from identity theft. 85% of Identity theft victims report loss or misuse of one or more accounts.
The amount of time and money needed to re-establish identity, credit and clear your name.
Businesses, particularly in credit and financial fields, also suffer financial losses from ID theft. A business can suffer from lost time and productivity when the victim is an employee.
Re-establishing a legal identity, including social security number, passport, tax records and even military records.
Once your identity is out on the “black market” you are more vulnerable to following attacks.

KEY FINDINGS
Stealing someone's identity to acquire -- and use -- new credit cards has become one of the most popular white-collar crimes today, according to fraud investigators from across the country.
This year alone more than 500,000 Americans will be robbed of their identities...with more than $4 billion stolen in their names.
Experts report that a victim can spend anywhere from six months to two years recovering from identity theft.
Most people don't find out they have been a victim of a stolen identity until they are turned down for a loan or credit card. A copy of their credit report explaining the denial may unveil weeks or months of fraud.

RECOMMENDATIONS
When setting up Internet accounts, be sure to create “strong” passwords with more characters (combinations of letters, numbers, special symbols, upper and lower cases). It will help protect your information if you create a password that is hard for others to know.
Always ensure that the URL of the site you are using is the correct URL. If you are ever not sure of the exact URL, type it into Google and then enter the site with the link from Google. This will help ensure that you do not enter a hacker’s site.
Never enter any financial information or other sensitive information into any website that does not use the secure “https” protocol (note the “s” added to “http”). When buying over the Internet with a credit card or otherwise, if a site does not use https, do not use it.

SOURCES:
 “PROTECT YOUR PRIVACY”. By: MOGULL, RICH, ROTHMAN, MIKE, Macworld. April 2011
“ID Theft Red Flags” By: Lankford, Kimberly. July 2010

http://www.identitytheftprotection.org/

http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html

Friday, March 18, 2011

Guest Post - Intern Stephanie Graziano

Intern: Stephanie Graziano
Topic: Teens and young adults- implication from social networking
In a world where people have become so consumed and adapted to social networking on a daily basis, it is overlooked that a person’s shared information on these sites can be used in ways to hurt or ruin their lives, and there’s no taking it back. 

Internship Outline #1
Version 1.0
Date: 3 March 2011


SUMMARY PARAGRAPH:
·       Social Networking has become a large trend for teenagers and young adults. With these sites becoming more popular by the day, it is important to raise awareness to the sites users about the consequences that can come from sharing too much personal information with others. Each user needs to be careful about what he or she posts on their site profiles, and they need to know how to properly protect their privacy and security.


BACKGROUND
The sites, Facebook, MySpace, Twitter, and many others have morphed themselves into every teenager and young adult’s daily routine, and not always to better his or her lifestyle. Sites like these that encourage its users to upload photos and videos and share personal information with their friends and family. The problem with these applications is that this information is not always used in a positive manner. Teenagers and young adults don’t understand the consequences that come from posting personal information and how their posts can increase exposure to people that sometimes have less than friendly intentions. Social networking users need to be educated on how to better protect their security and privacy while using these sites.
The phrase that became a nightly question in everyone’s household, “It’s 10 p.m. do you know where your children are?” has now been revolutionized thanks to social networking sites. The phrase should start including the question as to whether parents know what their children doing and exactly who are their children are talking with online. Today, parents feel inferior to the Internet because it holds so much power, and with kids starting to use the Internet at such a young age, some as young as five and six, parents feel less confident in knowing what’s available on the Internet.  It is becoming more important everyday to educate parents of young teens and adults of the serious consequences that come from being an active member of social networking sites. 


STRATEGIC PLANNING ASSUMPTIONS:
·      Parents should stay educated about these different social networking sites that attract their children to the computer every day.
·      School systems around the country should educate their students as well as their public about the risks and consequences that come from sharing too much information on social networking sites.
·      School systems should hold classes or conferences for their students to better help them in providing safer profiles on their preferred site. 


ANALYSIS:
Education seems to be one of the leading ways to reduce the implications that come from teenagers and young adults using social networking without understanding the consequences. If school systems and parents focused on this issue with their teenagers, these sites could be considered much safer. Social networking has picked up within the last few years and it has certainly become a part of our nation’s everyday life with smart phones enabling these sites to be at our finger tips. With users not fully understanding how sharing too much on their profiles could affect their future, we need to be educated on the proper ways to display our information.


In the article titled, “Police detective warns about dark side of the Internet,” Detective Rebekah Lynch stated that “Over 90 percent of American teens use the Internet and 75 percent of them have cell phones. There are social networking sites such as Facebook, chat rooms, e-mail, blogs, file sharing and gaming. Predators use all these to contact and connect with your kids. The Internet is the most efficient tool ever designed for sex predators.” Lynch explained that a predator can be anyone they choose to be online, anyone that may seem appealing to others, and users may never the truth. This is a valid point that social networking users may not be contacting who they think they are. A younger user can come into contact with a stranger via social networking and that person can seem friendly and kind; but on the other side of the networking site, that younger user could be chatting with a sex offender. Lynch went on to discuss that it is vital for parents to educate the children about the dangers of social networking, and to stress to never give out information such as a telephone number or address.


IMPLICATIONS:
·      Those who talked to people they didn’t know were significantly more likely to be aged 16-24 (22% of those with a social networking page or profile) than 25-34 (7% of those with a profile).
·      17% of adult users said they talked to people on social networking sites that they didn’t know and 35% spoke to people who were “friends of friends”
·      Having too many Facebook 'friends' and access to different social capital disrupt the sharing process due to experiences of social surveillance and social control. This social control often forces younger people in particular to use conformity as a strategy when sharing content to maintain their privacy.
·      Younger and older adults display completely open public profiles without realizing it.


KEY FINDINGS
·      Taking the statistic that states that 17% of adult users of social networking don’t know other uses who they keep in contact with, I find it interesting that after the news that has been reported about the risks social networking opens, users still find it not harmful to stay in touch with strangers through the internet (On Guard Online).
·      On Guard Online states in their article that 22% of 16-24 year olds using social networking do not know who they are sharing their information with. It is that exact age range that is most at risk for facing invasion of privacy from strangers. This age group needs the education about the dangerous side effects of sharing too much.
·      The article, “Too Many Facebook 'Friends'? Content Sharing and Sociability Versus the Need for Privacy in Social Network Sites,” states many social networking users display completely open profiles and do not realize it. This is an important example of why users need to fully understand what they are signing up for. Their profiles could hold information about their personal lives which may not be beneficial to have others know.


RECOMMENDATIONS
1)    More advanced privacy settings.
a)     Using the site Facebook as an example, as of right now each user is offered to change their privacy settings to how they see fit. Meaning they can set up their profile to each one of their friends in a different way. One friend may be able to view photos, but another may only be able to view their hobbies. If Facebook were to encourage young users to have their profiles be overseen by their parents, then it may be possible for Facebook to allow anyone who is under the age of 18 to only access their Facebook profile, through their parents own profile; that way, teenagers cannot post anything on their pages without their parents’ consent or without them knowing.
2)    Help inform teenagers and young adults of the consequences that come from posting personal information and photos.
a)     Before signing up to create a profile, each user should be educated on the site about the risks they are taking if they post too much information about themselves. Educate the users on how to safely share their information, before they create their profile.
SOURCES:
1. On Guard Online, Quick Facts, September 2007
2. WkiDot, Social Media Statistics
3. Ebsco Host, “Too Many Facebook 'Friends'? Content Sharing and Sociability Versus the Need for Privacy in Social Network Sites”  [International Journal of Human-Computer Interaction]
Authors: Brandtzæg,  Petter,  Luders, Marika, Skjetne, Jan Håvard
4. “Police detective warns about dark side of the Internet”
Author:  Nikki Patrick_morningsun.net 
.      

Friday, February 25, 2011

Apple and Viruses. Guest Post by Spring Intern - Michael Senatore


Intern:  Michael Senatore
Topic:  Apple and Viruses
Internship Outline #1
Version 1.0
Date:  25 February 2011

TEASER / TITLE
For years, Apple products have had one up on the PC regarding viruses and malware.  However, due to increased market share, that time may be coming to an end. 

SUMMARY PARAGRAPH
Throughout the history of Apple products there has been a long standing consumer myth that they are incapable of becoming infected with viruses.  Most believe that the Mac Operating System was simply more secure than that of PC.  Although the system may be more secure, it is still vulnerable to malware and other infections.  One needs to look no further than the fact that Apple sells anti-virus software from many of the leading names in the virus protection industry.  What really gave Apple its edge was their lack of market penetration, a result of occupying a small portion of the computer sales industry.  Simply put, if you want to catch a fish, you go to the pond with the most fish.  That “pond” has always been PC’s.  However, along with their growing popularity and rise in market share, Apple products are becoming more vulnerable to viruses and other harmful infections.

BACKGROUND
The myth that Apple products are impervious to viruses is almost like a virus in and of itself.  Only instead of infecting Apple products, it is infecting the way Apple users think about the product.  This “myth” continues to mislead Apple users into believing they are safe from viruses and there is no need for anti-virus programming.  Unfortunately, life would just be too simple if this was the case. From reading forums and discussing the topic with owners of Apple products, it is blatantly obvious that Apple users are completely unaware of the harm to which they are exposing their computers.
            Currently there are several types of viruses that can potentially harm Apple products.  One of the main areas of concern is downloading files that are infected with Trojan horses, spyware, and worms.  These types of files can be found on pirated software and games.  Versions of Microsoft Office infected with viruses can also infect Mac products using the program.  Also, browser plug-ins for viewing video content can harbor malware, making your Mac more vulnerable to other infections.  These problems are really just the beginning because they do not take into account the growth and success of Apple and their products. 

STRATEGIC PLANNING ASSUMPTIONS
-Apple, the company, must do a better job of informing their customers of the risk to their computers.  What was once a selling point, needs to now be addressed as a concern.
-Apple users need to become more educated.  They need to open their eyes to the problem and take appropriate action.
-Acquire an anti-virus program.  Many of the major anti-virus companies, such as McAfee, Intego, Norton and Symantec have all released programs for Apple products. 

ANALYSIS
The main reason for the recent increase in viruses infecting Apple products goes hand in hand with the success of the company.  In just the past two years, Apple has consumed nearly 3% of the entire computer sales in the United States, raising their overall market share to 10.4%.  Although that may not sound like a large increase, Apple’s annual growth is nearly off the charts.  Over those same two years, Apple’s year to year growth has been 24.1%, which dwarfs the overall industry’s growth of 3.8%.  With the wild popularity of the iPad, iPhone and other Apple products, this percentage will only continue to grow.
            In any business venture, success has its drawbacks, and this same theory can be applied to Apple and their current surge in the United States computer sales industry.  As stated previously, the idea that Apple products were incapable of being infected with viruses was a selling point.  Many businesses opted to use Apple computers for their convenience and savings that go along with not having to worry about viruses or spend more money on anti-virus programming.  While Apple products once enjoyed the safety of their own anonymity, they must now accept what comes along with their new found popularity. 

IMPLICATIONS
-The “myth” of Apple products not being able to contract viruses is simply not true.
-Apple has become a mainstay of the computer industry, holding a market share of nearly 11%, a figure which continues to rise.  As a result of the increased penetration, the most secure days of the Mac OS are in the past.
-The vulnerability of Apple products goes hand in hand with the success of the company, which is growing at a rate nearly eight times that of the rest of the computer industry.
-While the sales figures of HP and Dell have plateaued, Apple continues to grow at an annual growth rate of 24.1%.
-Apple currently holds the number four ranking in the computer sales industry, behind HP, Dell, and Acer.  Following market trends, by this time next year, Apple will be well ahead of Acer and catching up to HP and Dell. 
-Due to the wild success of the iPad, iPhone and the Mac OS, there are no signs of Apple’s growth slowing down.

KEY FINDINGS
-The majority of Apple users are completely unaware of the susceptibility of their computers when it comes to malware.  Stay informed with updates from Apple and other security upgrades.
-The easiest way to prevent computers from being infected with viruses is to stop them before they start.  We all know how difficult computers can be to work with when they are infected with any type of virus. 
-Nearly all the major anti-virus companies now sell programs for Apple products.  (A sign of things to come?)

RECOMMENDATIONS
-Verify that your computer is protected by an anti-virus program.  There are some free anti-virus programs available, such as iAntiVirus and ClamXav, however they are not considered as robust as the major companies such as McAfee, Intego, Norton and Symantec.
-Use common sense when surfing the web.  Do not visit websites that are not known to be secure and do not download files or documents from an unknown sender.  Also make sure your virus scanner and security updates are frequently updated with the newest protection.
-Stay ahead of the curve by educating yourself with the current viruses and other problems infecting computers. 
-Happy surfing!


SOURCES
“Do Apple Computers Need Virus Protection”.  Robin Noelle.  eHow.com.  April 1, 2010.
“Apple’s Share of Computer Sales Surpasses 10% in the U.S.”.  Eric Slivka.  Macrumors.com.  October 13, 2010.
“Hey Apple, About This Virus Thing”.  Steven Hodson.  WinExtra.com.  April 27, 2010.
“Antivirus Software On Your Mac:  Yes or No?”.  David Greenbaum.  Gigaom.com.  February 4, 2011.  

Thursday, January 27, 2011

Photo Posted Not Privacy Protected - See Judge's Opinion

According to the quote noted on the Technology and Marketing Law Blog, a Kansas City Judge said:

"[P]hotos are taken to be viewed. When [nursing student supervisor] Delphia granted permission to take the photos, it was unreasonable to assume that they would not be viewed...By giving the students permission to take the photos, which Delphia admitted, it was reasonable to anticipate that the photos would be shown to others..."

This particular case centers around nursing students who took pictures of a patient's placenta and then posted a picture on Facebook of the human placenta.  The nursing students were expelled from nursing school.  The students went to court and won a ruling to go back to nursing school.

The Judge saw all the facts of the case so I do not want to question his ruling.  I do want to put people on alert that if this ruling becomes precedent, you may have problems with bringing forward complaints or lawsuits on ANY future photos of you or loved ones, that are posted without your permission,

Sending racy photos of yourself to your spouse?  If it gets into the wrong hands and this Judge's ruling is applied, I guess you should remember that it is "..reasonable to anticipate that the photos would be shown to others..."

Snap and store photos and videos with great care.

Sources:
"Judge Says It’s Reasonable For Any Photo Taken To Go Viral. A Dangerous Precedent?", Kashmir Hill, The Not So Private Parts Blog.Forbes.com, January 27, 2011.


"Nursing School Can't Expel Students for Posting Photo to Facebook--Byrnes v. Johnson County CC", Eric Goldman, Technology & Marketing Law Blog, January 26, 2011.

Fortalice Welcomes Spring Interns: Michael and Stephanie

Fortalice is pleased to announce that we have brought on two spring interns from Immaculata University.  They will be providing research on key topic areas which will be posted to our company blog.  Please welcome Michael and Stephanie.  They look forward to hearing your feedback!

Stephanie Graziano

Stephanie hails from Ridgefield, Connecticut, which is located on the outskirts of New York State. She is a senior at Immaculata University, studying public relations and graphic design. Throughout her college experience I have been involved in a few clubs and organizations. Stephanie started her sophomore year as a Mac Mentor for the incoming freshman assisting them in their transition into college. The following year she was appointed the universities Communications Committee Chair and is responsible for creating and designing Immaculata University’s clubs and organizations monthly event calendars. After graduation she would like to work in the field of public relations and eventually would love to work as an event planner. She is undecided as to where she wants to relocate after college, she is considering Philadelphia or New York City.

Michael Senatore

Michael Senatore is currently a junior attending Immaculata University and is pursuing a degree in communications.  Michael wants to work in a media broadcasting field, specifically radio after graduation.  Michael has worked various jobs recently such as enumerating for the U.S. Census and overseeing catering sales for the local Boston Market.  Michael is looking forward to the spring 2010 internship with Fortalice Solutions because of the freedom to work on different topics of interest and the invaluable experience it will provide.

Friday, January 14, 2011

An Internet ID for Americans

The Obama Administration is reviewing a plan called the National Strategy for Trusted Identities in Cyberspace.  This would essentially mean crating Internet IDs for all Americans.  An early draft of the plan indicates that the implementation would be handled via the U.S. Commerce Department and not Department of Homeland Security or the National Security Agency.  Experts feel this may be in a nod to privacy concerns.


CBS News quoted the White House Cybersecurity Coordinator, Howard Schmidt, "I don't have to get a credential if I don't want to."  Schmidt has also said there would not be a centralized database and they are counting on the private sector to lead how this is implemented.


U.S. Commerce Secretary, Gary Locke, was also quoted as saying at the Stanford Institute for Economic Policy Research, "We are not talking about a national ID card. We are not talking about a government-controlled system. What we are talking about is enhancing online security and privacy and reducing and perhaps even eliminating the need to memorize a dozen passwords, through creation and use of more trusted digital identities."


Some potential Pros and Cons based on what we know so far:


Pros:
1.  Child  safety experts have long felt that an internet identity system is critical to protecting kids
2.  Trusted identities could be used as another layer of authentication before accessing your personal information online, such as your bank account balance
3.  There might be a way to create an economical, digital certificate that belongs to you, think of it as a password passport so you can have one digital identity vs. many passwords to access information 


Cons:
1.  Large collections of userid/password or other identifying parts of information are targets for cybercriminals
2.  Who do you trust to be the agent that holds your internet identity?
3.  It is not clear what information is part of your identity or follows your internet identity around.  Is it just who you are or what you like to do on the internet?
4.   If this is "optional" and led by the private sector as suggested, we may be creating bureaucracy within the Commerce Department that cannot actually manage this or may not be needed


I did an informal poll and asked people what their thoughts were.  The responses were surprisingly consistent.   Here is a summary:


Overall many had mixed feelings: 
1.  Many respondents feel there is so much anonymity that it allows cybercreeps and cybercriminals to prey on others, however,


2.  Respondents have followed the data privacy breaches that come with centralized ids/passwords both in the private and the public sector and they feel this could create new forms of identity theft.


Bottom line:  Not one person answered and said we must have IDs for All Americans without saying in the next sentence they were concerned about privacy, security, and governance.  


I would love to know your opinion.    Do you see additional pros that I did not mention?  


Sources:


"Obama Wants Internet ID for All Americans", Kevin Parrish, Tom's Guide, January 12, 2011.



"No more passwords? Obama considers Internet ID for Americans in bid to boost web security", David Gardner, Daily Mail Online UK, January 10, 2011.

Read more: http://www.dailymail.co.uk/news/article-1345576/Obama-considers-Internet-ID-Americans-bid-boost-web-security.html#ixzz1B0T2xQyx



"Obama Administration Reportedly Plans to Create Internet ID for All Americans", Fox News, January 8, 2011.



Wednesday, January 5, 2011

Hee Haw - Get Your Video Games and Apple Gift Cards By Way of a Mule?

Was an Apple gift card or video game under the Menorah or Christmas tree this recent holiday season?

Well, it may have come to you via a mule.   Slow down PETA members, I'm actually not talking about a new method of transit via animals, I am talking about money mules.

The Feds recently busted a major, multi million dollar ring involving two exchange students in Minnesota.  The dynamic duo, from Vietnam, are believed to be the masterminds behind a major scheme using counterfeit credit cards and taking advantage of online auctions and online stores.

It is believed that Apple, Dell, Verizon, Amazon, Paypal, eBay, and even Rosetta Stone lost money due to these alleged cybercriminals.

Investigators believe they have uncovered 180+ eBay accounts and roughly 360 PayPal accounts that were established by this ring under false information.  The tally of their evil looting?  Possibly $1.25 million.

How did they pull it off?  With money mules that wired them the money.  Mules are people that might be people duped into "work at home" schemes and have no idea they are part of a mule ring.  Some mules know exactly what they are doing.  The mules are believed to be US based and the scam ran in the U.S., Vietnam, and Canada.


Sources:


"Cyber crime trail leads to Winona State students - Feds say a transnational cyber crime ring based in Vietnam has ties to two exchange students", Dan Browning, Star Tribune, January 3, 2011.


"Foreign-exchange Students Linked to Vietnamese Cyber-Crime Gang", Camille Tuutti, The New New Internet, January 3, 2011.

" 'Operation eMule' Feds Bust Duo with 500+ eBay, PayPal Accounts", John Leyden, The Register, January 5, 2011.

Sticks and Stones Do Break Bones...And Internet Postings Can Land You in Court.

There is a new example in the news that I want everyone to read about and take heed.  Please sit down with your young adults and children to discuss the do's and don'ts of life and how they must transfer into how they treat people on the internet.

For background purposes, you may want to read a book that talks about this, from the victim's point of view.  I am referring to the Google Bomb Book by Sue Scheff.  You can read about her and the awful ordeal that she survived and eventually learned how to thrive her way through.  Sue was the subject of internet defamation.  I met Sue through Twitter and I consider her an esteemed colleague and friend.  You can read a summary at the Google Bomb Book site.

The latest headline in the news that your teens and young adults can relate to is the Courtney Love defamation trial.  A social media expert is expected to testify AGAINST Ms. Love.  A defamation suit alleges that Ms. Love tweeted awful things about a designer known as "Boudoir Queen".  The defamation suit alleges that the Twitter posts damaged the fashion designer's reputation.

The lawsuit heads to trial January 18th.  I wonder if Ms. Love will tweet about it from the court room?

The court will hear the defamation suit and then will have to decide if Ms. Love's Twitter posts are an expression of her thoughts and opinions vs. presented as facts.

Social Media Expert, Jessie Stricchiola, has been asked to be a witness at the trial and to testify what the twitterati and followers of Ms. Love may have interpreted from the posts.


Sources:

"Twitter Expert Will Testify Against Courtney Love In Defamation Trial", Debra Cassens Weiss, Internet Law, January 5, 2011.

"Are you ready to be google bombed? Why you must read Sue Scheff’s story", Dr. Michele Borba, September 7, 2009.

Google Bomb - The Untold Story of the $11.3M Verdict That Changed the Way We Use the Internet, by John W. Dozier Jr. and Sue Scheff.

Friday, December 17, 2010

Strong Passwords

I taught a class on Internet Safety to 3rd graders.  We talked about examples of creating strong passwords and how to vary them across accounts.  We had fun doing it by making up phrases and turning them into crazy passwords to use.

By the way, are you a user on Gawker.com?  If so, are you one of the 100,000 people out of their 1.3 million users that had your user id and password posted online for the world to see?

Just to be on the safe side, here are a few tips you may want to use:
1.  Vary your password across different sites
2.  Make up a phrase and use the first letter of each word alternating lower and upper case
3.  Add numbers and special characters for effect

"FBI Investigating Gawker.com Hack", Fox News, December 14, 2010.

Friday, December 10, 2010

When A Bully Games the System - Store Owner Bullies Customers to Win More Business

An eyeglass store owner in New York is accused of bullying customers as part of a bizarre marking campaign.

The NY Times quotes from a blog post supposedly written by the store owner:
“Hello, My name is Stanley with DecorMyEyes.com,” the post began. “I just wanted to let you guys know that the more replies you people post, the more business and the more hits and sales I get. My goal is NEGATIVE advertisement.”

Perhaps this strategy was working?  Evidently when searching for eyeglass brands, names, places to order online, his store was indeed popping up in the coveted spot:  on page #1.

A few more quotes from the NY Times article just to drive the point home:


The NY Times asks "Profitable?"

“Very,” says Vitaly Borker, the founder and owner of DecorMyEyes, during the first of several surprisingly unguarded conversations.

“I’ve exploited this opportunity because it works. No matter where they post their negative comments, it helps my return on investment. So I decided, why not use that negativity to my advantage?”


This is disappointing but not surprising that a merchant would try to game the system.  I wrote a piece on my "word for the week" a while back about "Google Juicing" where celebrities or merchants pump up stories to juice the search results on Google, even if it is negative publicity.

On December 7, the Huffington Post reported that Assistant U.S. Attomey E. Danya Perry brought the owner of the store into custody.  He is being held without bail.  They also reported that U.S. Magistrate Judge Michael H. Dolinger says there was sufficient information to believe that Mr. Vitaly Borker was considered a danger to the community.

At this point, complaints have also been filed with the FTC.  Mr. Borker has been charged with cyberstalking, interstate threats, mail fraud, and wire fraud.  He could face up to 50 years in prison if found guilty of all the charges.

Google has announced that they are making changes to their algorithms to hopefully avoid this bullying form of Google juicing to get more business.



Sources:
"Vitaly Borker ARRESTED:  Alleged 'Bully' Online Retailer Apprehended in New York", Larry Neumeister, Huffington Post, December 7, 2010.

"A Bully Finds a Pulpit on the Web", David Segal, New York Times, November 26, 2010.

What should we do when kids are behind cybercrime?

By now most of us have read the news that PayPal, Visa, and Mastercard had a rough week on the internet during the busy holiday season.  This was due to distributed denial of service attacks launched against their company websites.

The Dutch National High Tech Crime Team thinks they have caught their man.  Well, sort of, the alleged guilty "man" is just old enough to drive by U.S. standards but not old enough to vote or join the U.S. military.  The boy has confessed to taking part in the attacks and his computer equipment is under evaluation.

Because of the duration of the attacks, it is believed he did not act alone.  The Dutch Attorney general was quoted in the IDG News article as saying "probably thousands of computers" took part in the attacks.

So what should we do when our kids are behind cybercrime?  Just as we ask in the physical world, where did we fail to teach them right from wrong, what should our response be?

2 Steps to Prevention:
1.  Education - make sure children know that cybercrimes and hacking companies as if it were a sport are a crime
2.  Awareness - teaching parents to look for the signs that their kids are not doing school work or just reaching out to others but are pursuing cybercrimes

If they find this young man guilty as charged, should he be tried as an adult or child?

Sources:
"Dutch Arrest 16 year old related to WikiLeaks Attacks', Jeremy Kirk, IDG News, December 9, 2010.

Wednesday, December 8, 2010

Toys with video cameras will have consequences

New Barbie doll has a video camera and easy uploads to the internet.  Sounds like a great way to capture your daughter's tea parties and play time to send to the Grandparents, right?

The FBI issued a warning about the Barbie concerned, that in the wrong hands, the doll and or video could have disastrous consequences.

The Barbie is one of many toys on the market with built in video.  What is your reaction to this FBI warning?

Best bet is to talk to your kids about responsible video taping & home ground rules about postings on the internet.

1 in 4 of you over 50 use social networking!

Move over net generation, you are not the only ones on social networking.

It's been shown in studies that people over 50 that can use a computer and access the internet appear to be less depressed then peers their age and it may also help with ongoing mental health because of the social access and ability to read information about events, hobbies and interests that might otherwise not be available.

AARP did a recent report of the 50+ set and found that this age group is increasingly embracing social-networking sites.  According to a polly released by the Pew Internet and American Life Project said usage has grown to almost 42% of this age group uses the internet with 1 in 4 engaging in social networking.

23% are using Facebook.

17% of this group said they are "extremely comfortable" with the internet and 23% are "very comfortable", only 9% said "not very comfortable" and 13% said "not at all".

This is all great news but it also leaves this group vulnerable to spam and scams.

In general, the "old school" rules still apply:
1.  Don't talk to strangers
2.  If it sounds too good to be true, it most likely is
3.  You don't take candy from strangers so don't open files or links sent to you by strangers

Top 3 scams to worry about for the 50+?
1-Opening "greeting cards", clicking on links, or opening files that are really spam or filled with viruses

2-Emails about sweepstakes and winning the lottery
 
3-Clicking on pop up windows that say the computer is not protected and by clicking the notification it will be

Protections for the 50+:
1.  Never click on links or open files, even if you know the sender, without asking them about it first
2.  Up to date virus protection, browser software, and operating software
3.  If you don't remember entering a sweepstakes or lottery, you probably did not
4.  Never send bank account information via email or social networking sites
5.  Consider an internet class at your local library or community college
6.  Ignore pop ups and set your browser settings to block pop ups will eliminate most of these pesky ads and scareware

Resources:
The Senior's Guide to Computers

Sources:


"Older Folks Get Into Social Media - An AARP survey of 50-plusers finds more than one in four using online social networking", Mark Dolliver, AdWeek, June 15, 2010.

"Social Media Use for Older Adults Continues to Rise", Roy Wells, SocialMediaToday.com, August 30, 2010.

If you see something, say something - DHS program

The Department of Homeland Security has created videos of Secretary Napolitano that will play in hotels and retail stores.  They will start with 200+ locations and plan to spread it to 600 across the nation.

According to a Time News Feed article, there is a video for Walmart stores.  The video has Secretary Napolitano asking shoppers:

"If you see something suspicious in the parking lot or in the store, say something immediately. Report suspicious activity to your local police or sheriff. If you need help, ask a Walmart manager for assistance."

If you visit the Mall of America, Amtrack, DC's Metro system, Walmart and other places you may see the video.


Sources:

"Attention, Wal-Mart Shoppers, an Urgent Message from the Department of Homeland Security", Madison Gray, Time News Feed, December 7, 2010.

Monday, December 6, 2010

Facebook Launches New Look and Features

If you missed the show on 60 Minutes, no worries, with the internet, you are just a click away.  I've added a link to "Part 1" of the Interview with Mark Zuckerberg.

Facebook in less than 7 years is a global phenom.

In their offices they have the word "Hack" prominently displayed.  Keep in mind that "hacking" something in the computer engineering community is a compliment.  The word has been hijacked by bad guys and their dastardly deeds on the internet.

Interesting way they approach their staff to create and launch new features:
a.  Facebook engineers stay up all night, with their CEO Zuckerberg, doing "hackathons" to practice their craft and come up with new ideas within that time frame.

b.  Another way, the engineers get tasks assigned, go to a war room, and then they get a time limit to complete everything.

Mr. Zuckerberg has launched a new layout for profiles:
1.  Old way:  you see everything posted pretty much in date/time order
     New way:  you put your bio up at the top of the page

2.  Old way:  photos could be a tab or in posts
     New way:  scrolling photos right away under your bio

3.  New:  You can list the important people in your life on the left hand side of the page

4.  New:  History of your relationship with any of your Facebook friends

5.  New:  Graphics of what is important to you

6.  New:  Sports section of the teams you like to follow

Want to update your Facebook account to the new profile look now?  Go to:
Link to upgrade to the new profile

Facebook founder, Zuckerberg, said they will not share this information with advertisers.
They do have a large inventory of interests.  However, applications on Facebook have been found to share this information.  Zuckerberg said they shut down those applications when they find out about it.

60 minutes questions how Facebook exists if it cannot invade your privacy...it's really about transparency.

The FTC is looking into it, private Privacy Groups, and the Hill are looking into it.  Facebook has hired their own lobbyist to help them with policies.

Facebook said over 200 million of their users access the application via mobile devices.

Newest product:  take your text messages, emails, and instant messages...what do you call it?  Facebook calls it "Messages" and considers it a virtual switchboard.  It is considered to be a potential email killer.

Example used in 60 Minutes:
Type "Prius" on Google and you get public information.  Type "Prius" on Facebook and you see what your friends have to say about it.

I used it to check into opinions on lego sets and other toys.

Facebook has been poaching from Google's talent base - 10% of the staff are former Google employees.





Watch the show on 60 minutes at this link:
http://www.cbsnews.com/video/watch/?id=7120522n&tag=contentMain;contentAux

Friday, December 3, 2010

Mega-D, We're not talking vitamins here, we're talking spam

The U.S. Charges a Russian Man With Spamming

Oleg Y. Nikolaenko, a 23 year old man from Russia, has been charged with violating an international spam law.  Internet security experts estimate that, on some days, his spamming software was responsible for 1/3 of all spam mail.  They believe he is linked to the "Mega-D" which is considered a major global spam producer.  It is estimated that 500,000 or more computers are infected with Mega-D and are sending spam mails around the globe.

How they caught him:
An undercover FBI agent ordered Viagra through an email sent by Nikolaenko's operation.  When the agent received bogus herbal pills, the cyber squad from the FBI was pulled in to investigate internet fraud.

Their initial tip came from catching a man who was conspiring to sell counterfeit Rolex watches.

Of course, other spammers just want to fill the void left behind by the arrest of Nikolaenko.

Sources:  "Russian accused of mass-spamming charged in US', Dinesh Ramde, AP, December 1, 2010.

Wednesday, November 24, 2010

Texting In Your Emergency - 911 Service to get Makeover

911 was established in 1968.  Americans call in roughly 650,000 times per day.

Sometimes maligned, I have been a staunch defender of 911 dispatch.  My family has had to use them 4 times over the past 15 years and the quick actions of the 911 person on the other end of the phone, saved my loved one's life.  One dispatcher even prayed with me as I thought I was watching a loved one pass away.  Thankfully, those awful moments are only memories and the loved ones are still with me today.

When 911 first hit the scene in 1968, many consumers were not even thinking about mobile phones much less texting.

In a recent review of statistics, the FCC found that 70% of 911 calls now come from mobile phones.  FCC Chairman, Julius Genachowski, announced the nationwide initiative this week.  Funding and timing of the initiative remain unclear but it is good that 911 is in the planning stages of the makeover.

What is your opinion?  Is this too little too late?

I would like to see the FCC also consider reviewing their processes so they can better leverage other technology such as:
a. importing geocoding from the cell phones placing the calls to better track kidnapped or victims on the move
b. perhaps even leverage popular check in software
c. ability to better leverage social networks such as Twitter for callers that are under duress.

What would your suggestions include?

Source:

"911 Getting 21st Century Update to Allow Text Messages", FoxNews.com, November 23, 2010.

Friday, November 19, 2010

New Tactics of Debt Collectors Using Facebook - Clever or Pitbull?

Most states have laws in place for consumer protections against debt collectors.  For example, many states would not allow a debt collector to begin calling everyone you know and defaming you to embarass you into paying.

This blog post is not going to get into the virtues of or evils of debt collection.

A Florida debt collection firm allegedly used Facebook to track down a woman who owes $362 on her auto loan.  They allegedly sent the woman messages and told her family to please have her call the agency.

The woman is suing the debt collection agency.

What is your opinion?  Should debt collectors be allowed to use social networks as a means to reach people when they do not respond via phone or mail?  If yes, what should the boundaries be?  For example, debt collectors are only allowed to call during certain hours of the day.  What would the limitation be for social networks?

Sources:
"Woman Says Debt Collectors Harassed Her on Facebook", Associated Press, November 18, 2010.

"Check In" Software Dark Side - Troop Safety Implications

We have covered the fun and the dark side of location software on this blog before.

Examples of Check In Software:  Facebook Places, GoWalla, Foursquare, Loopt - once you check in, I can find you on a map.

Examples of Location Aware Software:  Twitter allows you to turn on your location when you tweet

Benefits:
Locate your friends & family easily
Earn rewards points
Special deals

Dark Side:
Reputation:  You may be broadcasting an image, based on where you check in, that you don't want to broadcast
Stalking:  Young people or women traveling alone open themselves up to potential issues

The US Air Force put out a warning recently to its troops to be careful when they use social media networks because many of the new features show exactly where you are when you use them. This is potentially devastating for U.S. forces in war zones.

To put it into perspective, we have roughly 95,000 troops in Afghanistan and approximately 50,000 in Iraq.

If you have loved ones serving overseas, thank them for their service and then show them this warning and ask them to be safe.

Sources:  "Air Force Warns Troops:  Don't 'Check In' to Wars", Associated Press, November 18, 2010.