Defense Against Crime

19/10/2023

October is Cyber Security Awareness Month

Filed under: Computer Secuity,Crime Prevention,Cyber Crimes — Onyx Knight @ 8:02 AM
Tags: ,

Email or SMS/Text messages to be suspicious about:

  1. If you are asked to validate your account within a short time frame (i.e., 24-hours) to avoid it from being terminated.
  2. Asking you to fill out a form that includes your personal information.
    1. Asking for your password, especially via a Google form. Companies will not ask you for your password.
  3. Poor grammar in the message body.
  4. Offering you a job but then asking you to connect with them via your personal email account or phone number.
  5. If it seems too good to be true, it is likely not a valid message.
  6. email addresses or website addresses that don’t match the company they claim to represent. like verybadguy6638@russianhacker.ru claiming to represent amazon.com

Things to consider to protect your data, your identity, and your intellectual property:

  • Keep your personal and professional communications/data separate.
  • Never share your credentials.
  • Add multi-factor authentication to ALL of your accounts (bank, credit cards, personal email, health care information, etc.).
    • Use an authenticator app instead of SMS/TXT for your second factor when possible.
      • Authenticator mitigates the opportunity for what is called “man-in-the-middle” credential stealing.
    • Authenticator Apps (all free)
      • Microsoft
      • Google
      • Apple
      • LastPass
  • Before clicking on a link in your browser or text message, look at the URL and if it doesn’t match, don’t click on it.
    • Even better – go to the URL/web site directly in your browser without clicking on it.
  • Regularly monitor your credit. (https://consumer.ftc.gov/articles/free-credit-reports)
  • Use a tool to monitor your daily transactions (I use mint.com).
  • Protect your personal information (i.e., phone numbers, addresses, birthdates, etc.) Do you have any of these on your Social Media profile.
  • If you receive a phone call or text from someone who identifies themself as law enforcement or some other official, even if the caller ID supports their claim, hang up or do not respond.
    • If it “seems” legitimate, get their name and tell them you will call them back at the number you have on caller ID.
    • Don’t give out any personal info. Identity thieves often pose as representatives of banks, credit card companies, creditors, or government agencies to get account numbers, SSNs, mother’s maiden names, passwords and other identifying info.
    • End the call immediately, then call the phone number listed on the account statement / website of the company or government agency to determine if the request is legitimate.

Stay safe and be diligent and aware. We live in a dangerous digital world. A 1% success rate with the hackers can yield thousands of dollars with little effort. If it seems too good to be true, it probably is.

Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. – 
Victor Swindell, Onyx Knight Enterprises 

11/10/2023

Protecting your phone number…from hackers


October is CyberSecurity Month

Mobile/Cell Phone Hacking

Cybercriminals have found a way to break into online accounts using your mobile phone numbers. They can take over your mobile phone account, allowing them to intercept your two-factor authentication verification codes. They can access your social media account, bank accounts, credit cards, and other important accounts with this access.

How can this happen?

We are sure that there are more, but below are two common scams

  1. Port-out scam
    1. Hackers can get your identity information online or through a phishing message. If they have enough information about you to convince your wireless phone company that ‘they’ are you, they can have your phone service transferred to their mobile device. They can do this online or by visiting the wireless store.
  2. Facebook Marketplace, Craigslist, and other online markets
    1. You list an item and get an immediate response from a potential buyer. The “buyer” claims to be very interested in your item, but they want to make sure you are legitimate first. The scammer asks for your phone number so that they can text you a verification code. They instruct you to reply with the 6-digit code on the platform where your item is listed.
    1. The scammer is setting up a Google Voice number linked to your phone number. If you send the verification code, the scammer will be able to complete the account setup pretending to be you. Then, the scammer can then use your phone number to conceal their identity. Or, if a scammer gets your Google Voice verification code and other information about you, they can pretend to be you and open new accounts in your name.

How to avoid scams
Guard your personal information. 

Filling out online forms sent to you through an email message asking for personal information (full name, address, phone number, email address, etc.).

  • The most companies will not ask you for information that they already know.  
  • As it relates to the marketplace, you don’t need to give someone your phone number to make a sale.
  • Be sure you know who you are speaking with before you share it. Never give out your phone number in public social media posts or publicly listed on any social media sites. Unfortunately, this information can probably be found by web searching your information.
  • On a personal note, do NOT provide SSN on the form to see my doctor. I’m suspicious when anyone asks for other personal information that doesn’t seem to be necessary to transact business.  The Social Security Number was not designed to be an identification number except to the IRS.  Given the number of data breaches the less systems that have your SSN.  You can look up your options on the Social Security Administration site.

Watch out for red flags. 

Avoid making transactions with people who offer you deals that sound too good to be true (i.e., overpaying for an item you listed for sale) or people who pressure you to make a deal quickly.

Phone Carrier PIN

Call your wireless carrier and ask for PIN authentication for your wireless account. Some carriers require you to create a PIN when you open a new account. Change it on your birthday..every year.  The same with your passwords.

Understand marketplace policies. 

Most online marketplaces encourage you NOT to make transactions outside of the platform. If someone asks you to carry out transactions elsewhere, be wary. Understand how the platform you use verifies both sellers and buyers and stick to their guidelines when selling and buying items.

If you stop receiving calls or texts, and you don’t know why, contact your wireless provider immediately. Even if you don’t use your mobile device often, you should check regularly for provider and account alerts.

How to Protect Yourself

  • Be Proactive: If you don’t already have a PIN or a password to verify your identity when calling about your account, contact your phone company and ask about adding one.
  • Stay Vigilant: Enable email and text notifications for financial and other important accounts.  If you receive notice that changes to your account have been made without your knowledge, contact the business holding that account immediately to inform them that you didn’t authorize a change.
  • Don’t Respond: If someone calls or texts you and asks for personal information, do not provide it.  If the caller claims to be from a business you are familiar with, hang up and call that business using a number you trust, such as the number on your bill, in a phone book or on the company’s website.
  • Don’t overshare: Guard personal details that can be used to verify your identity – such as the last four digits of your Social Security number, your phone number, your date of birth, the make and model of your car, your pet’s name, or your mother’s maiden name.  And keep that information off social media.

Act Quickly

Typically, loss of service on your device – your phone going dark or only allowing 911 calls – is the first sign this has happened.  If you suspect you have been a victim of a porting-out scam, take immediate action:

  • Contact your phone company.
  • Contact your bank and other financial institutions.
  • File a police report
  • Place a fraud alert on your credit reports and get copies of your report.
  • Consider locking your credit report.
  • Consider getting identity theft insurance….really this is important.

File a complaint 

If you feel you’re the victim of a porting-out scam, file a complaint with the FCC for free.  The FCC Complaint Center FAQ has more information about the agency’s informal complaint process.  You can also file complaints about identity theft and consumer fraud with the FTC.

Resources:

Did You Get Scammed On Facebook Marketplace?

Facebook Marketplace Scams: How to Identify and Avoid Them

My phone number was hacked and I am trying to reclaim in Google Voice

What To Do if Your Phone Has Been Hacked

Stay safe and be diligent and aware. We live in a dangerous digital world. A 1% success rate with the hackers can yield thousands of dollars with little effort.


Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. – 
Victor Swindell, Onyx Knight Enterprises 

19/09/2023

Beware of Caller ID Spoofing


This IMPORTANT MESSAGE provides information about a known and successful scam and tips to avoid being the next victim.

There have been reports of Caller ID Spoofing.

Caller ID Spoofing is when:

  • To disguise their identity, a caller deliberately falsifies the information transmitted to your phone’s caller ID display.
  • Recently colleges have reported scammers spoofed the Public Safety of Colleges non-emergency number in the reported cases.
  • If the call is answered, they use scam scripts to steal your money or valuable personal information, which can be used in fraud.
  • In a few cases, the scammer called a relative and identified as a law enforcement agent. The scammer told them that their loved one had been arrested and they needed to post bail.

Legitimate law enforcement agencies , will never ever call and request money to be paid over the phone. Bail is paid in court!

You can watch this Caller ID Spoofing video by the FCC (Federal Communications Commission) to learn more about spoofing and how to avoid being scammed.

If you think you’ve been the victim of a spoofing scam, you can file a complaint with the FCC.

How to avoid Caller ID Spoofing

You may be unable to tell immediately if an incoming call is spoofed. Be extremely careful about responding to any request for personal identifying information. If you did not initiate the call or contact, DO NOT provide financial or personal information to anyone you do not know or recognize. I have my phone set up to block all unknown calls and immediately send them to voicemail.

  1. Don’t answer calls from unknown numbers.
    1. If you answer such a call, hang up immediately.
    2. Apple and Android phones have the ability to block all calls from unknown numbers (numbers not in your contact list).
  2. If you answer the phone and the caller – or a recording – asks you to press a button to stop getting the calls, you should hang up.
    1. Scammers often use this trick to identify potential targets.
  3. Do not respond to any questions, especially those that can be answered with “Yes” or “No.”
  4. Never give out personal information such as account numbers, Social Security numbers, mother’s maiden names, passwords or other identifying information in response to unexpected calls or if you are at all suspicious.
  5. If you get an inquiry from someone who says they represent a company or a government agency, hang up and call the phone number on your account statement, in the phone book, or on the company’s or government agency’s website to verify the authenticity of the request. You will usually get a written statement in the mail before you get a phone call from a legitimate source, particularly if the caller is asking for a payment.
  6. Please be sure to use caution if you are being pressured for information immediately.

How does this happen?

There are spoofing services designed specifically to help users spoof a call. In some cases, these services are web-based platforms or third-party apps. With these services, scammers can easily customize their caller ID information for a small fee or at no cost.  Because this can be as simple as downloading a free app, using a phone spoofing service can make phone number spoofing easy and accessible for scammers of all skill levels. In addition, these services can also be used to send text messages and may be used for smishing attacks.

Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. – 
Victor Swindell, Onyx Knight Enterprises

24/07/2023

Amazon E-mail and Phone Scams Alerts

Filed under: Self Defense Infomation — Onyx Knight @ 8:30 AM

I received a phone test msg from my cousin the other day. I don’t click on links in text messages no matter who they appear to be from. This is how your phone our account can get hacked and my phone is my security key to many account, including work and financial account.

Anyway I send the person a test question that only my first cousin would know…and he knew the answer and we laughed… and told my that was smart cause his mom has been getting Amazon scam calls.

I get those too.
Usually I do a few things.

1) Tell them yes, I did order 5 Apple MacBook’s, when can I expect them. The FBI office in Springfield is waiting on them?
2) Pretend I’m hard of hearing, and keep asking them to speak louder. Using my best old person impersonation.
3) Speak in a thicker foreign accent than the caller.
4) Respond in Klingon.

Here is an email that I received from Amazon

Scammers are creative and they constantly devise new schemes, exploit new technologies and change tactics to avoid detection. Stay safe by learning to identify and avoid scams. Prime membership scams: These are unexpected calls/texts/emails that refer to a costly membership fee or an issue with your membership and ask you to confirm or cancel the charge. These scammers try to convince you to provide payment or bank account information in order to reinstate a membership.

Amazon will never ask you to provide payment information for products or services over the phone. Visit the Message Center on Amazon.com or on our app to review authentic emails from Amazon. To verify your Prime Membership status or make payments, log into your Amazon account, and go to Your Account.


Account suspension/Deletion scams: Scammers send texts, emails and phone calls stating that your account will be suspended or deleted and prompt you to click on a fraudulent link or verbally provide information to “verify your account.” Customers who land on these pages or receive these phone calls are then lured to provide account information such as payment information or account login credentials.

Amazon will never ask you to disclose your password or verify sensitive personal information over the phone or on any website other than Amazon.com. Please do not click on any links or provide your information to anyone over the phone without authenticating the email or phone call. If you have questions about the status of your account, go directly to Amazon.com or on our app to view your account details, including the Message Center which displays a log of communications sent from Amazon.  

Here are some important tips to identify scams and keep your account and information safe:

1. Trust Amazon-owned channels. Always go through the Amazon mobile app or website when seeking customer service, tech support, or when looking to make changes to your account.


2. Be wary of false urgency. Scammers may try to create a sense of urgency to persuade you to do what they’re asking. Be wary any time someone tries to convince you that you must act now.


3. Never pay over the phone. Amazon will never ask you to provide payment information, including gift cards (or “verification cards,” as some scammers call them) for products or services over the phone.


4. Verify links first. Legitimate Amazon websites contain “amazon.com” or “amazon.com/support.” Go directly to our website when seeking help with Amazon devices/services, orders or to make changes to your account.

For more information on how to stay safe online, visit Security & Privacy on the Amazon Customer Service page.

If you receive communication — a call, text, or email — that you think may not be from Amazon, please report it to us at, amazon.com/reportascam. Report it to us
To review or respond to emails from Amazon, visit the Message Center on our website.

Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. – 
Victor Swindell, Onyx Knight Enterprises 

27/04/2022

I received a fake email claiming to be from Norton


Recently I’ve gotten scam text messages and scam e-mail.  I decided to share one that is soo obvious. I’m sure you get lots of scam e-mails as well. When you get an e-mail that claims that it has charged your bank account. First actually look at the e-mail for red flags. Can you spot the red flags?

  1. The Email isn’t from Norton.  and the name on the email doesn’t match the person. Is it Thomas or Teresa?
  2. The email doesn’t have the customer’s name.  Have you ever received a bill that did not refer to you by name?
  3. Did you notice the name at the top doesn’t match the one at the bottom of the page?
  4. I am billed for what  a LAN.  When did Norton…a computer security agency start selling Local Area Networks?
  5. I love that it has the address 1575 Evergreen Ave, Juneau AK 99801 at the bottom of the page (not shown)…if you type the address in google map you get the picture of a house.  (I’m not sure whose house)

The 803 Area code would be SC not AK…but still a fake number.


  1. If you go to the Norton Site it has the following?

Verify that an email you receive from Norton is legitimate

We use email or direct mail to keep you informed about the latest offers, announcements, and product updates from Norton. Norton Affiliates may also send emails or mails about various offers or promotions on Norton products. These may contain trademarked Norton images, but your personal information is not used to send these mails. You should never provide personal or confidential information to a sender or webpage that you do not know or trust. 

Sometimes you may receive mails from scammers claiming that it is from Norton. If you receive suspicious mails that look like it is from us, forward it as an attachment to spam@nortonlifelock.com.


Just be careful with your email. These emails are designed to get a response…
I was sooo tempted to call the number just to play along.

Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime. If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. – 
Victor Swindell, Onyx Knight Enterprises 


20/10/2021

Just one click and you can be hooked

Filed under: Phishing — Onyx Knight @ 11:51 AM
Tags: , ,

What is Phishing    (fishing)

Phishing is a type of social engineering attack often used to steal your data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity like your bank, or a company, or friend, dupes you into opening an email, instant message, or text message. You are then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack, or the revealing of sensitive information.

An attack can have devastating results. For individuals, this includes unauthorized purchases, the stealing of funds, or identity theft.

Furthermore, phishing is often used to gain entry into corporate or governmental networks as a part of a larger attack, such as an advanced persistent threat event. In this latter scenario, employees are compromised to bypass security perimeters, distribute malware inside a closed environment, or gain privileged access to secured data. This is usually how big data thefts happen.

An organization succumbing to such an attack typically sustains severe financial losses in addition to declining market share, reputation, and consumer trust. Depending on the scope, a phishing attempt might escalate into a security incident from which a business will have a difficult time recovering.

Phishing attack examples

There are several examples of phishing emails on this blog that you can example by typing ‘Phishing’ in  the search bar

The Phishing attempt  all have a CALL TO ACTION (CTA)  a link for you to click

Several things can happen to you when you click that link.

You will be redirected to a bogus page appearing exactly like the real site page (usually with bad grammar or spelling errors), where both new and existing passwords are requested. The attacker, monitoring the page, hijacks the original password to gain access to secured areas on your actual account if you have an account there.

The user is sent to the actual password renewal page. However, while being redirected, a malicious script activates in the background to hijack the user’s session cookie. This results in what is called a reflected XSS attack, giving the perpetrator privileged access to the  real network.

Some Phishing techniques

Email phishing scams

Email phishing is a statistical game. An attacker sends out thousands of fraudulent messages can net significant information and sums of money, even if only a small percentage of recipients fall for the scam. As seen above, there are some techniques attackers use to increase their success rates.  There is a reason why the Nigerian Prince Scam is still going on.

For one, they will go to great lengths in designing phishing messages to mimic actual emails from spoofed organizations like banks, or shopping companies. Using the same phrasing, typefaces, logos, and signatures makes the messages appear legitimate. 

In addition, attackers will usually try to push you into action by creating a sense of urgency by causing fear and panic. For example, as previously shown, an email saying your bank account access has been stopped because of unusual activity.  Applying such pressure causes you to be less diligent and more prone to error.

Lastly, links inside messages resemble their legitimate counterparts, but typically have a misspelled domain name or extra subdomains. In the above example, the amazon.com/support URL was changed to  amozon.com/support. Similarities between the two addresses offer the impression of a secure link, making the recipient less aware that an attack is taking place.

Spear phishing

Spear phishing is an email or electronic communications scam targeted towards a specific individual (like you), organization or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on your computer.

This is how it works: An email arrives, apparently from a trustworthy source, but instead, it leads you to a bogus website full of malware. These emails often use clever tactics to get victims’ attention. For example, the FBI has warned of spear phishing scams where the emails appeared to be from the National Center for Missing and Exploited Children.

Many times, government-sponsored hackers and hacktivists are behind these attacks. Cybercriminals do the same intending to resell confidential data to governments and private companies. These cybercriminals employ individually designed approaches and social engineering techniques to effectively personalize messages and websites. As a result, even high-ranking targets within organizations, like top executives, can find themselves opening emails they thought were safe. That slip-up enables cybercriminals to steal the data they need to attack their networks.

How to prevent phishing

Phishing attack protection requires steps be taken by YOU and the company you work for.

For users, vigilance is key. A spoofed message often contains subtle mistakes that expose its true identity. These can include spelling mistakes or changes to domain names, as seen in the earlier URL example. Users should also stop and think about why they’re even receiving such an email.  Many of these have been covered in previous Phishing blogs on this site

For enterprises, several steps can be taken to mitigate both phishing and spear-phishing attacks:

Mult-factor authentication (MFA) is the most effective method for countering phishing attacks, as it adds an extra verification layer when logging in to sensitive applications. MFA relies on users having two things: something they know, such as a password and user name, and something they have, such as their smartphones. Even when employees are compromised, MFA prevents the use of their compromised credentials, since these alone are insufficient to gain entry.

In addition to using MFA, organizations should enforce strict password management policies. For example, employees should be required to frequently change their passwords and not be allowed to reuse a password for multiple applications.  Google is great for examining your stored password and giving you this warning.

Educational campaigns can also help diminish the threat of phishing attacks by enforcing secure practices, such as not clicking on external email links.

Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. –
Victor Swindell, Onyx Knight Enterprises

04/10/2021

October is Cybersecurity Awareness Month


October is Cybersecurity Awareness Month, a global effort to help you stay protected wherever and however you connect. This month’s theme is: ‘Do Your Part. #BeCyberSmart.’ We are proud to be a champion and support this online safety and education initiative.

 To promote the cybersecurity and digital privacy of our readers throughout October, we will post tips you can use to protect yourself, friends, and family against cyber threats. For example:

 Keep software updated: If you connect it, protect it. Protect yourself against cyber threats by regularly updating your software.

  • Use MFA: Enable multi-factor authentication to ensure that you are the only person with access to your accounts. Most financial, social media, and email accounts offer MFA.
  • Use a passphrase: Use a passphrase password (such as: IL0VE2readtheSKY!) where possible. Mix it up and keep them long, easy-to-remember, and unique for each account.
  • Manage apps: Do all your apps need to track your location or personal information? Absolutely not. Take a moment now to check the privacy settings of all your apps and limit what you share.
  • Watch for phishing: Scams often request urgent help, threaten you, or offer financial rewards. Think before you click on a link.
  • Be cautious of free Wi-Fi. Public Wi-Fi is not secure or safe. Don’t conduct College or personal business that requires passwords, sensitive, or financial information on public Wi-Fi.
  • Keep Personal Information Off Social Media – Don’t post your phone number, email address, address on your social media profile. These are treasures to professional hackers. You would be surprise how much of your personal information is already public…don’t add more.

Look at all of our other post on Cyber Security

Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. –
Victor Swindell, Onyx Knight Enterprises

09/09/2021

Before you click Authorize….THINK!


We have written lots of entries on ransomware and how to reduce your changes of being a victim.  Since that time, we have had a reports of people users override the 2-factor authentication by approving access even though they were not attempting to log in themselves. This resulted in their account being compromised.  

Two-factor authentication is there to protect your account from being compromised.  If you are NOT attempting to log into your account when you receive a notice for the 2nd factor – DO NOT APPROVE IT. This is analogous to leaving your residential door key in the locked door or using a weak password that is easily guessed or posting the combination of the safe with your valuables for the perpetrator to easily locate.

This also created opportunities for the hacker to use the compromised account to attempt to gain access to some of your other accounts. These hacks are rarely done in isolation.  It’s another reason why you should NEVER USE the same password on multiple account.

As a Reminder

Make sure you do not override the 2-factor authentication process.

  1. 2-factor authentication protects you if someone successfully guesses your password, they still need the 2nd factor (i.e. mobile phone) to access your account.
    1. Example: Just this past weekend I received two text messages with confirmation codes from a google account that I have. Evidently, someone has guessed my password and was trying to log in. Because they had not received the confirmation codes, they were unable.  I also changed my password
  1. One  institution told us that they have had problems with their employees approving access on the 2nd factor because the alerts were annoying. If you are receiving alerts and you are not attempting to log into your account, someone has guessed your password and are attempting to access your account. DO NOT APPROVE!
  2. You should set up 2-factor for all of your computer account that allow it such as financial institution, social media, email etc.

Be safe in Cyber space

Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. –
Victor Swindell, Onyx Knight Ente
rprises

20/05/2019

20 Safety Tips to Help You …Be Safe


cropped-bxp35697

According to RAINN, a sexual assault occurs every 98 seconds. You’ve probably seen stories in the media of sexual predator who follow women home from the gym, or other places. But there are several things you can do to reduce your chances of becoming their next prey.

Whether you’re our jogging, shopping or out and about running errands, there are safety tips you can follow to help lower your chances of becoming a crime victim.

1. Defense Against Crime’s motto is Get Ready! Stay Ready. – Preparation and Prevention are the keys. Think about having a fire extinguisher and knowing how to use it in your home.
2. Stay Alert – avoid being distracted by your smartphone. Use a blue-tooth if you need to talk
3. Trust your instincts. If something doesn’t ‘feel’ right .. leave the area.
4. Always have your keys ready. There are videos on YouTube on how to use your keys for self-defense. Watch and learn.
5. If you carry a personal defense device, like pepper spray or a stun gun, whistle – knows how to use it and have it ready. The bottom of your purse is the wrong place to have it.
6. Be aware! Look around and make eye contact with people you encounter.
7. Walk with an attitude. Have that I dare you to mess with me look.
8. If security is available, ask for an escort to your vehicle — especially at night. If you know you are going out at night, have a friend with you!
9. Don’t wear expensive jewelry or carry pricy handbags when you’re shopping, running errands or anytime you’re alone. Robbers often work in pairs. One scopes out potential victims inside, then text or calls their partner with a  description to their partner waiting outside.
10. If you have children with you, keep a close eye on them and teach them about stranger danger. On the news last week was a woman trying to steal a child.
11. If you must take a purse, consider a small, crossbody bag.
12. Hide your cash, credit cards and cell phone in your front pockets, so if a thief does grab your purse, he or she won’t get away with much.
13. Try to avoid being overloaded with shopping bags.
14. When you leave, lock your doors and keep your windows up, and don’t have valuables in plain sight!
15. Keep an eye out for vehicles that might be following you. If they’re still behind you when you’re close to home, drive to the nearest fire station or police station and honk your horn.
16. In carjacking or robbery, give them your car, purse or anything else they want. Nothing is worth risking your life.
17. If someone tries to sexually assault you or force you into their vehicle, scream and fight like your life depends on it..cause it does. Do whatever you have to do to get away…do it!
18. Take a self-defense course. Search for them online. Many colleges and universities offer a FREE RAD (Rape aggression defense) class, and some will teach them to the ladies of any organization (church, yoga, etc).
19. There are several safety apps available, including Guard Lallana, Safe Walk, B Safe, and others they are beneficial to you. Research and use the one that’s best for you.
20. Knowing all of this stuff is good, doing it daily will be better.

PepperSprayPDWimage
Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. 
Victor Swindell, Onyx Knight Enterprises 

28/01/2019

Password Correct..Access Granted


In this digital age, almost all of us are using a computing device (laptop, desktop, tablet, or smart phone) to access messages, social media cyber thief-hackernetworks, manage some aspects of our financial life, some other aspect of internet usage that puts aspects of our lives open to someone who has the key. I usually tell people not to hide their residence keys in obvious places, like under the welcome mat. The same common sense should be used is hiding the digital keys to the virtual residences of our lives. How safe would you feel is a crook has the keys to your house? The same sense of security should be taken when it comes to wanting to secure. One of the sad things is that we can unknowingly tell clues about our lives online in places like Facebook, or blogs, or ancetry.com that a thief can use to help him figure out possible passwords. If any of you have seen the 1983 movie War Games, you may remember that the Hacker was able to gain access to the system, by figuring out that the programmer used the name of his dead son as his backdoor password.

To highlight the necessity of securing your digital life should be news story accounts of security breaches at Abbot Labs,  IBM, Sony, Booz Allen Hamilton, Fox News, NBC, New York Times, Apple, Microsoft, Facebook, Twitter, Linkedin, the US Government and hundreds of other companies. These stories have exposed how insecure or unprepared these major websites and companies, to which consumers like you and I entrust their personal information really are. While we expect some level of security at a corporation, ultimately, your security is your responsibility. Unfortunately one of the side effects of this is that these stories have exposed, is just how helpless we can be. Close examination of a sample set of 40,00 username and passwords out of a sample size of over a million have revealed some interesting results.

Some analysis results:

  1. The analysis showed about 50% of the passwords are less than eight characters long. Nine characters are considered, the minimum length you should even consider when choosing a strong password.  (These passwords only take less than a minute  for a PC to crack)
  2.  Only 4% of the passwords analyzed used at least makes use at least three of the four character types (Upper case letters, lower case letters, numbers, special characters like #|*. The vast majority only used one character type, such as all lowercase letters or all numbers.  (These passwords only take about 3 days for a PC to crack)
  3.  Over 33% of the analyzed were not a random character like “qp}Edhg!13evTOI” rather than “ILikeSpock”. These analyzed passwords could be found in a common password dictionary. The most frequent passwords use included: Seinfeld, password, aa12345678,123456, purple, princess, qwerty123,Maggie, peanut, shadow, ginger, Michael, Buster, sunshine, trigger, cookie, George,123456789, summer, Taylor, Bosco, abc123, Ashley, and bailey.  (most of these take less than a second for a PC to crack, ‘IlikeSpock’ takes about a year)
  4.  67% of users had the exact same username/email and password on different systems used the same password on both systems. BAD BAD BAD. It’s like giving a skeleton key to the doors of your life.

6 Simple Rules for some great passwords

  • NEVER choose passwords less than 9 characters long and that is made up solely of numbers or letters. Use letters of different cases, mixtures of digits and letters, and/or non-alphanumeric characters. The longer a password the better so strive for passwords over 8 characters long. If some systems limit the numbers of characters. It’s doesn’t have to be complex as “Picard-Delta-47-Alpha-21” or “173467321476C32789777643T732V73117888732476789764376” which would take a PC 14 octillion  years and 6 vigintillion years to crack respectively
  • Randomness is also key to a great password. NEVER choose a password based upon personal data like your name, children’s name, dog’s name, a birthday, an anniversary, your username, or other information that one could easily discover about you from such sources as searching the internet. 
    • You should search the internet to see how much information there is about you.
  • Create a list of 10-12 such as Qy#i1827Vbsg12348()17w passwords that are random and use a password management program like 1Password or LastPass, or create and remember a password recipe or simple padding pattern.
    • Change this list every 3-4 years.
  • NEVER choose a password that is a word (English, German, or otherwise), proper name, the name of a TV shows, or anything else that one would expect a clever person to put in a “dictionary” of passwords. Especially if it can be found it’s something you’re found of like ‘Hello Kitty’, ‘Disney’, etc, that you happen to also have peppered all over your social media.  I mean if you can tell that a person is a Star Wars fan and you guess that ‘HanShotFirst’  or ‘Maythe4thbewithU’ was the password and it used for all their social media and financial accounts.  Game over.
  • NEVER choose a password that is a simple transformation of a word, such as putting a punctuation mark at the beginning or end of a word, converting the letter “l” to the digit “1”, writing a word backward, etc. For example, “password,123” is not a good password, since adding “,123” is a common, simple transformation of a word. Neither is using password where you have substituted the number zero for the letter “o”
  • NEVER EVER EVER use the same password for all your logins (have at least 9).
  • NEVER EVER EVER EVER – User the same password on many platforms with a 1 character difference.  Like Monk3ySocks*, Monk3ySocks-, Monk3ySocks+

How to Make Up a Great Password

Passwords should contain a mix of the following sets

  1. lowercase letters
  2. uppercase letters
  3. Numbers
  4. special characters !,#,$,+,%,~ etc
  5. Should be longer than 8 Characters
    1. Example the Password 1@Tf%s&E9Tewhich is based on the numbers 1-2-3-4-5-6-7-8-9-10 would take a PC 4 Thousand years to hack.

Password Levels

  • Level One – contains at least one of the character sets
  • Level Two – contains at least two of the character sets
  • Level Three– contains at least three of the character sets
  • Lever Four-contains all four character sets
  • You can Include some simple substitution like 3 for ‘e’, zero for the letter ‘O’, 1 for ‘I’, 7 to T, 2 for S

Example of how to create a good password

  1. Think of two unrelated things you like computer & socks books & dogs autumn & chocolate OR a phrase from one of your favorite movies or tv shows
  2. Join the words with a non-alphabetic character or two. (#,+,|,!..etc.)
  3. Make at least one change (for example, uppercase a letter or add another character) to one of the words (preferably not just at the very beginning or end of the password).
  • Some example passwords generated using this method:
    • C0mput3r%socks
    • B00ks #dogs
    • Autumn|choc0lat3
    • Gen3sis_Doggi3
    • 76TltbpWa110ccah# – (Seventy-six trombones led the big parade With a hundred and ten cornets close at hand.)
    • 2bo!2b_TitQ – -(To Be or Not To Be The Question)
    • I106mtC_wgaftog_hap0c_1dawws -It’s 106 miles to Chicago, we got a full tank of gas, half a pack of cigarettes, it’s dark… and we’re wearing sunglasses. 
  • Books like the Bible have a great resource to create passwords as it has over 31,173 verses you can use. You can use Bible verses to create passwords like Joshua24I5$, 54Isa1ah17 *, Pr0v3rbs9_8%, J8hn316+
  • Convert from the Arabic-Hindu Number system into the Hexadecimal System so that you can say BacktoTheFuture1151955 and make it Back#T0#Th3#Future_1193D3

Biometric passwords – There is an increase of computers gives you the ability to use biometric data such as facial recognition, fingerprint, retina pattern or voice print data to generate a unique password based on your data. However, there have also been reported as successful hacks for these methods.   An example of this would we be the Apple fingerprint lock, which was able to be bypassed the week it was released.

Second Key Authentication or Multifactor Authentication: Many systems like Facebook, Google, Twitter, Yahoo, Hotmail, PayPal, and even financial institutions offer second key authentication. In this method, you give the institutions your mobile phone number. When you attempt to login, the system sends a special random access code to the users’ mobile phone. To complete a log in the user must type in this code. Which means they have to have your phone.

Personal Info Authentication: Many systems ask the user to select personal info questions to set up their user accounts such as the color of your first car, or mother’s maiden name, or best friend. These questions are to help users in case they have forgotten your password.  Be careful what info you select! Some information is public information or can be gathered from your Facebook profile.  For example, if your question is ‘Name of the High School you attended?’ and you are a member of the Eric Erickson High School group on Facebook (Meta), then it’s not hard to answer this question.  What I can suggest is giving easy to nonsense answers like the J3di Acad3my. For example for all your selected questions, put in the name of your favorite something (recording artist, fruit, book, author).  I mean if you select mother’s maiden name as your question, and typed in Mayberry.  it is highly improbable that anyone trying to hack your account will guess that.

CHANGE YOUR PASSWORD…OFTEN

Most computer security professionals recommend changing your Internet passwords and account login information at least once every three to six months. Though some debate if it is necessary, however, if you want to be safe change it at least once a year, like a month before or after your birthday and make it an annual reminder on your calendar. It may be safe for you to wait longer; it just depends on your computer habits, and how and where you surf the web. I recommend changing all your passwords at a minimum of once a year, perhaps the day after your birthday, or on New Year’s day, or the first day of spring (spring cleaning). Changing all of your Internet passwords can be a time-consuming and even an exasperating task, especially if you have lots of online accounts. But it is a sure way to guarantee a modicum level of safety; however, it is not the only safety precaution that should be considered for your login information. Whether you bank online or you are just sending a few simple emails, secure passwords are essential. You’ve heard of problems caused by hackers, who use your account to do illegal activity. There have been incidents of people not only hacking into people’s e-mail, or Facebook accounts but sending vicious messages.

You should avoid writing down your password or giving it to others. You should especially avoid writing it down and leaving it in a non-secured place such as on a post-it on your monitor or a piece of paper in your desk. If you absolutely must write something down (because you suffer from CRS), we suggest doing the following:

  • Don’t write down the entire password, but rather a hint that would allow you (but nobody else) to reconstruct it.
  • Keep whatever is written down in two places like a small notebook or other places that only you have access to and where you would immediately notice if it was missing or someone else gained access to it. (like in the movie Ghost)
  • Keep a list of 10 to 12 passwords of length 10 to 20 characters that you only use for 1 year, and then create new ones each year
  • Treat the not book like the One Ring – Keep it secret -Keep it Safe

TEST YOUR PASSWORD

There are several great websites that will examine your password and tell you how strong that is. Such sites include

  1. http://www.passwordmeter.com/
  2. https://howsecureismypassword.net/

However remember that hackers have tools as well, so you should have as many security measures to help reduce your chances of being hacked. Many sites link PayPal, Google, Facebook, Twitter and more have code key authentication features. You can turn these on, and when you (or anyone else) attempts to log in to your account, a numeric code is sent to your cell phone, and you need to type in that code to log in.  Sometimes it’s a hassle, especially if you lose or don’t have your phone with you.

 

NEVER EVER – TELL ANYONE YOUR PASSWORDS or LET SOMEONE KNOW WHERE YOU KEEP THEM..except in your will.

Onyx Knight Enterprises is dedicated to providing you useful and informative data to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  In today’s society, being equipped mentally and physically is no longer an option. – Victor Swindell

Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. –
Victor Swindell, Onyx Knight Enterprises

08/01/2019

January is Human Trafficking Awareness Month


Imagine these scenarios:

  • You are on vacation in a foreign country with your family, you have an 8-year-old shutterstock_492622561-750x551son or daughter with you. You are our shopping and while you are looking at some merchandise, your child disappears.  Unknown to you, they snatched by sex traffickers.
  • You see an advertisement for young models. The ad promise that selected models can make lots of money, and travel around the world. You are required to have a passport to bring on the interview, as well as a portfolio. No experience is required  You go on the interview, told you fix the bill, they then tell you to go wait in  with some other interviewees. They load you all in a van.  None of you are seen again.

What happened to these people?  They became sex-slaves.  It doesn’t matter the age; it doesn’t matter the gender. Almost, anyone could become a sex slave. Some people are abducted, some people are forced into it, some are sold into the business by their own families.

I’ve seen documentaries filmed in poor countries where families would pimp their young children to earn money to live. Don’t think it doesn’t happen here?

Here are the facts about this crime!

  • All the statistics you will read is based on data they know about or that are reported.
  •  In 2020, 109,216 victims of human trafficking were identified worldwide. This is almost ten thousand less than in the previous year, but the number of human trafficking victims has significantly increased in the past decade.
  • In 2014, Sex trafficking was a lucrative industry making an estimated $99 billion a year.
  • A 2012 report estimated that at least 9 million adults and children are bought and sold worldwide into commercial sexual servitude, forced labor, and bonded labor.
  • A 2005 UNICEF report estimated that about 2 million children are exploited every year in the global commercial sex trade.
  • According to a 2016 UNODC TIP Report, 54% of trafficking victims are trafficked for sexual exploitation.
  • The same UNODE Tip reported that Women and girls make up 96% of victims of trafficking for sexual exploitation. Additional Data can be found here: Human Trafficking data or Number of human Trafficking site

One website I found had the following…

Sex is not the only motive for human tracking, modern-day slavery is another. It is estimated that there are over 40 million people who are trapped in this condition, even in the United States.

The terms Human trafficking and modern-day slavery are both umbrella terms – often used interchangeably – that refers to the exploitation of people through the means of the use of threats or use of force, coercion, abduction, fraud, and/or deception. Human trafficking includes the practices of unpaid forced labor, debt bondage, cheap domestic servitude, forced marriage, sex trafficking, and the recruitment and use of child soldiers, and other forms. The most common forms of exploitation are cheap forced labor, which, according to the International Labor Organization, impacts 24.9 million people a year – 16 million in private sector exploitation, 4 million in state-sanctioned forced labor, and 4.8 million in sex trafficking – and forced marriage, which enslaves 15.4 million individuals. The ILO estimates that forced labor generates $150 billion in illegal profits each year.

Trafficked persons may be forced or coerced to work in a variety of settings, both hidden and in plain sight. Some examples include factories, “sweatshops,” fields, brothels, “massage” parlors, online escort services, on street corners, as child soldiers, or in private homes. The most common industries associated with the trafficking in persons include agriculture, construction, garment and textile manufacturing, catering and restaurants, domestic work, entertainment, and the sex industry.

While human trafficking spans all demographics, trafficked persons most often come from positions of vulnerability. Those most vulnerable to trafficking include: Prior to their trafficking situation, individuals may:

  • Come from a low socio-economic background.
  • Be homeless or have run away from home.
  • Be a political, cultural, or ethnic minority.
  • Be an immigrant (legal or illegal)
  • Have a history of sexual abuse, rape, or domestic violence
  • Be in a foster care system
  • Have been subject to natural disasters, conflict, or political turmoil

These vulnerabilities are the result of policies and practices that marginalize entire groups of people and make them particularly susceptible to exploitation. Traffickers use these vulnerabilities to their advantage and use a number of tactics to establish control over victims.  One tactic is to threaten to have them deported.  Other methods include the use of violence, isolation, threats, deception, manipulation, debt bondage, prospects of education, and romance. Traffickers may operate alone with one or many victims or may be a part of an extensive criminal network. Examples of trafficking rings include gang members, family members, pimps, business owners, or smugglers.

What you can do

Remember this is a multi-billion-dollar industry. If you do anything that can disrupt someone money, it could cost you your life. Do not at any time attempt to confront a suspected trafficker directly or alert a victim to your suspicions. Your safety, as well as the victim’s safety, is paramount.  Instead, please contact local law enforcement directly or call the tip lines indicated on this page:

  • Call 1-866-DHS-2-ICE (1-866-347-2423)to report suspicious criminal activity to the U.S. Immigration and Customs Enforcement (ICE) Homeland Security Investigations (HSI) Tip Line 24 hours a day, 7 days a week, every day of the year. The Tip Line is accessible outside the United States by calling 802-872-6199.
  • Submit a tip at ice.gov/tips.  Highly trained specialists take reports from both the public and law enforcement agencies on more than 400 laws enforced by ICE HSI, including those related to human trafficking. To get help from the National Human Trafficking Hotline (NHTH), call 1-888-373-7888 or text HELP or INFO to Be Free (233733). The NHTH can help connect victims with service providers in the area and provides training, technical assistance, and other resources. The NHTH is a national, toll-free hotline available to answer calls from anywhere in the country, 24 hours a day, 7 days a week, every day of the year. The NHTH is not a law enforcement or immigration authority and is operated by a nongovernmental organization funded by the Federal government.

Defense Against Crime with useful information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security,  who need arm themselves with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option.
-Victor Swindell Onyx Knight Enterprises

10/12/2018

Law Enforcement Christmas Safety Tips


blkfriday2As Christmas shopping season approaches, your local Police Department wishes to assure you and your neighbors that we are taking measures to combat and prevent the types of criminal activity which occur this time each year. We also wish to stress the importance of citizens doing their part to protect themselves by not presenting opportunities for criminals to ruin your holiday.

Where ever possible, additional officers will be on high-visibility patrol around shopping areas, banks, and the like. They will also be available to provide bank escorts for businesses that request them.

A particular problem this time of year is theft from automobiles and residential burglaries. These are the most preventable crimes. If citizens remove the opportunity, the crime is less likely to occur, and some types cannot occur at all.

At Home:

  • Make sure to keep doors and windows locked, even if you are home.
  • When you are not home, leave your radio or smart speaker on low on talk radio.
  • If you have home security cameras, with motion sensors, see if you can also program a lamp to turn on at night when motion is detected. Set it to turn on a minute later.
  • Turn on outside lights at night, motion sensor lights are great.
  • Report persons or vehicles roaming your neighborhood, day or night so police may check them. They may be simply looking at Christmas lights, or they may be “casing” houses to burglarize.
  • Place your tree where the gifts will be less visible from outside. Thieves like window-shopping through your windows.
  • After Christmas, don’t put the empty boxes out on the curb. This makes it easy for burglars to decide which houses to burglarize (ie: new computers, TVs, electronics, video games…). Break down boxes and put them in the trash, making sure to save all paperwork. Also, remember many electronic devices require original boxes for warranty repair.
  • Immediately make an inventory listing the model and serial numbers of new items (and old ones if you haven’t already) and engrave personal markings on them

If Leaving Home (On a trip or just for a little while):

  • Make it look like you are still there.
  • If you have an Alarm System – USE IT!
  • If you can monitor your home remotely – DO IT
  • Timers on exterior lights, interior lights, and TVs will help make it look like you are home. Don’t leave an answering machine message saying you are gone, in fact turning it off would be better. If you have the call forwarding option on your phone use that.
  • Double check Locks on all doors and windows, including second floors and garages. The doors should have dead-bolts and kick plates; key locks for windows are also available.
  • Have a Trusted Neighbor pick up mail, papers, and  put out your trash can, and park in your driveway. Give them emergency and cell numbers to reach you.
  • Call the police department to request a periodic residence check (“Keep-A-Check”) while you are away.
  • When you return, look around outside first. If you see any evidence of a break-in, do not go inside. Go to a neighbor’s house and call the police. The burglars could still be inside.

While Shopping or Going Out: 

  • Secure valuables out of sight in your trunk. BUT, Be aware that many cars now have fold-down seats or a remote trunk release inside the car. These conveniences make your trunk vulnerable to thieves willing to break a window.
  • If at a mall or a shopping center, periodically go to the car and lock away purchases so they will not “disappear” when you put them down trying-on clothes or at the food court.
  • Safeguard your purse, wallet, bank cards, and personal information. Identity thieves thrive in this environment.
    • Keep close tabs on your children while shopping. With so many people it is easy for them to become lost. Make sure they
  • Know their full name, your full name, address, phone, and your cell or pager number to reach you if you get separated.
    insist children hold your hand in parking lots. Drivers won’t see them if they run ahead or behind you.
  • Be aware of your surroundings going to your car, going into and out of your house, and while at the ATM.

DON’T DRINK and DRIVE

Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. –
Victor Swindell, Onyx Knight Enterprises

05/04/2018

The IRS Scam Continues


I’ve written about this scam before on this blog.  This scam is alive and well. In fact just this TpyHkgJweek, I’ve received two calls this week.  One of them was from Canada, one from New York! It used to be that the call was from someone with a thick foreign dialect calling from New Mexico, and other places…now it’s a digital recording ..still using broken English.  They claim to be the Investigative Team of IRS, and assert there is a legal matter against me, and If I don’t call the local law enforcement is going to pick me up. It’s still so obvious to me that it’s a scam.  However, our goal is to warn you!

Numbers they have called from:
(If you have others ..let me know ..I’m keeping a running list as I get them)

  • (607) 542-3079             (646) 396-7418
  • (914) 401-5565             (607) 542-3893
  • (914) 401-5965             (607) 542-4652
  • (914) 512-5975             (518) 615-7980
  • (631) 604-0694             (929) 800-2683
  • (209) 896-8620             (800) -732-9131
  • (607) 542-4652             (607) 542-3893

So after many years of reporting, why are they still doing it.  Obviously many people are still falling for it. It’s phishing, with using fear as bait, to get someone to bite

You can go to the IRS Web Site to verify what I’m about to inform you about. (https://www.irs.gov/privacy-disclosure/report-phishing)

Also, See https://www.irs.gov/newsroom/scam-calls-and-emails-using-irs-as-bait-persist

The real IRS will NOT:

  • Call you to demand immediate payment.
  • The IRS will not call you if you owe taxes without first sending you a bill in the mail. (this includes Robo Calls)
  • Demand tax payment and not allow you to question or appeal the amount you owe.
  • Require that you pay your taxes a certain way. For example, demand that you pay with a prepaid debit card. (using Green Dot, money grams or other).
  • Ask for your credit or debit card numbers over the phone.
  • Threaten to bring in local police or other agencies to arrest you without paying.
  • Threaten you with a lawsuit. (They will serve you first)

If you don’t owe taxes or have no reason to think that you do:

  • Contact the Treasury Inspector General for Tax Administration. Use TIGTA’s “IRS Impersonation Scam Reporting” web page to report the incident.
  • You should also report it to the Federal Trade Commission. Use the “FTC Complaint Assistant” on FTC.gov. Please add “IRS Telephone Scam” to the comments of your report.

If you think you may owe taxes:

  • Ask for a call back number and an employee badge number. (go to IRS.gov to call a local office)
  • Call the IRS at 800-829-1040. IRS employees can help you.

In most cases, an IRS phishing scam is an unsolicited, bogus email that claims to come from the IRS. They often use fake refunds, phony tax bills, or threats of an audit. Some emails link to sham websites that look real.  The scammers’ goal is to lure victims to give up their personal and financial information. If they get what they’re after, they use it to steal a victim’s money and their identity.

If you get a ‘phishing’ email, the IRS offers this advice:

  • Don’t reply to the message.
  • Don’t give out your personal or financial information.
  • Forward the email to phishing@irs.gov. Then delete it.
  • Don’t open any attachments or click on any links. They may have malicious code that will infect your computer.

More information on how to report phishing or phone scams is available on IRS.gov.

What happens when you call

One day I decided to play along and called one of the numbers.  I, of course, pretended to be someone else.  If they can pretend to be the IRS, I can be someone else. You get connected to some type of call center, as there are LOTS of people on the phone … scamming people.  I got connected to a person who identified themselves as Agent Eva Green (foreign accent).  Badge # PP35759  and my case number assigned is U8CIA69Q04.  Apparently, I have made mistakes on my 2011-2016 Tax forms and according to section 101 (If you look it up its discusses death benefits..but I most people won’t look this up) – I owed $7,500 which included all kinds of fines, fees…etc.  Since there was sooo much noise I told her that I could not hear her…and really you can’t with all the noise.  So I was transferred to another person speaking with a foreign accent, he called himself Mike Olson Badge GS26052.  He wanted to verify my ID…I gave him my fake persona (I think I covered this in one of my posts).  He said the ID verified (Oh really?).  He said that I owed $3,424 which included the fees etc.  Notice how the amounts did not match.  Anyway, under section 101- they had the ability to have the local police come to arrest me, take me to Washington DC, cancel my driver’s license, take the money from my bank account, suspend my social security and other things.  I had two options to settle this in court or out of court and of course, had to hire a lawyer.  I told him I was a lawyer.  (If he can claim to be an IRS Agent, I can be a lawyer).  He said he would see me in court and hung up.

So if you get these calls…and have the time… have fun. Next time I’m gonna be a politician.

Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. –
Victor Swindell, Onyx Knight Enterprises

03/11/2017

Have fun with Phone Scammers


In years gone by, I’ve gotten those phone calls from someone with a foreign accent telling b25belderly-smartphone-620x350me that I had an IRS legal matter and ‘law enforcement’  was coming to get me, unless I sent them the money I owed.  You may have gotten one of those calls from someone claiming to be Amazon questioning to $974.24 Apple products.

I always ignore them, or just hung up. The calls seemingly came from all over the US.  It’s one of those scam calls meant to scare you and get you to send the scammer money immediately.

You can read more about the IRS Scam here: https://www.irs.gov/newsroom/tax-scams-consumer-alerts.

The data breaches, especially at Equifax, has more of our information out there for scammers and other criminals to use.

So recently I’ve decided to have fun and decided that you should too. Here is what you need to do

  • Step 1 Create a fake persona. – Set up a Name like Emmett Brown, a birthday like 11/5/1955 and the rest  OR you can go to sites like http://www.fakenamegenerator.com/ to create one for you including a FAKE SSN, address and the rest. (you can alter it a little)
  • Step 2 – Create a Fake Voice (I do the country hick, but you can test your acting chops)
  • Step 3 – Call them back and pretend you are the person in Step 1 and have every intention of sending in the money and act like your scared.

Today, I got a call from someone calming to  Kevin White calling from 914-499-8989 with Case Number RC846042 he also claimed his badge number was SM786024.  I called and wanted more information, and gave him my info.  He pretended that he was looking it up…and then came back to tell me all the scam stuff to make me think it was real. When he could not verify me, and then told me the Sheriff would be coming to give me the info.

Please share this with your friends, and lets as the dog says..take a bite out of crime.

BTW, I’ve printed up my new fake ID and will be using it on any site I know is a scam.

See you can have fun with scammers too.

Onyx Knight Enterprises is dedicated to providing you useful and informative data to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  In today’s society, being equipped mentally and physically is no longer an option.

14/07/2017

Before you send her off to College…


Many years of college campus safety statistics show an increased danger for mostly female students—with up to 1 in 51140-father-moving-daughter-into-dorm.imgcache.rev.web.900.518 college women experiencing and reporting sexual assault and nearly 10,000 students each year enduring aggravated assaults and robberies during their time in college. These facts are gathered by the Government Crime Data and organizations like RAINN.

If you are sending your daughter off to college…did you prepare her for EVERYTHING?

We are working to enhance awareness of the safety steps students need to take when they get to campus or go off campus. However, we also want to encourage students to take every opportunity to learn the programs their campus offers to help keep them safe.

Here are a few things Students should do

  • Before unpacking your boxes, students should check out what free safe ride or the campus offers walking services.
  • Students should take every safety seminar or attend a self-defense class (like RAD). Many colleges offer student free or for credit, and the techniques and strategies can be lifesaving.
  • For students moving from dorms to apartments, a personal alarm, door Alarm provides portable security. Compact options of a Dorm/Apartment hidden safes for keeping personal belongings safe are also available.
  • Always be aware of your surroundings. Listening to music through headphones or looking down at a cell phone can impede your ability to be alert.
  • Prepare themselves with pepper sprays or other legal products—one of the most effective ways to deter or distract an attacker, and permitted on most campuses.  has the most potent and reliable options on the market.
  • Stick together—there is safety in numbers, so stay close to friends when going out or coming home late from parties.

 

Additional Tips is available in these articles

College Safety Tips

10 Back-to-School Safety Tips for College Females

Parents:

You baby is living home in their journey to adulthood. This can be exciting or stressful, just make sure you do your part in making them prepared for the new world and about choices and consequences. Remember most of the sexual assaults involve excessive alcohol. If you search this blog we provide different resources for you to use.

 

Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. –
Victor Swindell, Onyx Knight Enterprises

11/11/2016

How to protect your package deliveries from Porch Pirates


This year’s Christmas Online shopping expected to exceed  the 10.2 billion, according to most porch-pirateindustry analysts, with upward of 121 million shoppers who planned to click “buy” on Cyber Monday alone.

That’s a lot of packages that will need the delivery and a lot of potential booty for opportunistic thieves.

Last Christmas season, a home video camera caught delivery personnel mishandling packages, this year with the increase of home security cameras and Ring videro doorbell or similar product, the images are capturing something else …thieves labeled as “Porch Pirates

These “Porch Pirates,” as they are being called typically tail a delivery driver and pounce on the merchandise as soon as the driver is out of sight. They also cruise subdivisions looking for possible targets.

This summer, a couple in Lodi set up a home security camera to help monitor who is coming to their house. The camera did capture something interesting a porch-pirates. After a few incidents of having packages stolen the couple retaliated by filling a box full of fecal matter for the thieves.

In various subdivisions a scan of the Nextdoor social network tells the all-too-familiar tale: A package, waiting for its recipient to come home, is snatched off the front stoop, often in broad daylight and sometimes in clear view of security cameras.

“It’s an easy target,” said one evening delivery service owner, in response to a problem one of his own neighbors experienced. “Usually there’s something of value in there, and there’s nobody watching over it.”

But consumers have plenty of options for protecting their holiday bounty and their packages all year, experts said, from requiring a signature on all deliveries to having their packages sent elsewhere for safekeeping.

What  Can You Do?

The U.S. Postal Service, which expects to deliver 600 million packages nationwide over the holidays, recommends the following:

  • Ask friend or neighbor to pick up your mail if you know a package is coming that day;
  • Have packages sent to your place of employment or to a family member or friend who can accept it for you during daytime hours.
  • See if there is a Amazon locker near your residence you can use.
  • if possible; using services that require a signature on delivery, or even renting a P.O. box.
  • Any mail theft should be reported to the U.S. Postal Inspection Service and to local police, she said. Complaints can be filed online at  US Postal Inspector Site
  • Always require a signature on delivery.
  • Provide instructions to the shipping company on where packages can be left securely and out of sight. You can opt to pick them up at the delivery company.
  • Insure all your packages.
  • Install a Security Camera to capture any illicit activities that you can then give to law enforcement if necessary. Many security companies are now offering motion-activated doorbell cameras that will give a better facial image of people coming on your porch.
  • Consider installing a Doorbell Camera- it allows you to not only see who comes on your porch but also allows you to talk to them.
  • There are Porch lockers like Porch Box that you can buy if you lots of deliveries.
  • You can always hire the Kevin McCallister Home Security Service 😉
  • Clean out your garage and put your old stuff in Amazon Boxes…and let the thieves take it away for you. They say one man’s trash is another man’s treasure.  Use the Mailing address of city hall. So they don’t remember where they got it from.

Defense Against Crime provides you with the best information to meet the security needs of you, your family members, your home or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. – 

16/08/2016

College Safety Tips You Should know!


Going off to college can be a fun and exciting time for many young adults.  However, this is not the time to throw common sense, and caution to the wind. There are still a few people on and off campus who are up to no good.  We have compiled this list of safety tips for you and your offspring to know!

Campus safety tips: While walking around on campusbxp35697

  • Pay Attention to your surroundings!
  • Many Colleges have alarms and phones stationed around campus -learn where they are in case of trouble or you don’t feel safe.
  •  Survey the campus after dark to see that buildings, walkways, quadrangles and parking lots are adequately secured, lighted and patrolled.
  • Avoid walking alone if possible – consider using your campus escort service. Get the contact information and save it on your phone.
  • Make it a habit to check in with family and friends.
  • Walk with an air of confidence and stay alert.
  • Walk in well-lighted areas.
  • Keep your hand free, not overloaded. (is stay off your phone)
  • Avoid Texting and walking, and use a blue-tooth when on your cell phone
  • ALWAYS carry your keys ready, we recommend having a key ring self-defense product. Have it in hand, ready to go if in questionable areas.
  • If you are being followed: cross the street, scream, run to an occupied residence or store, or flag down a car.
  • If your college offers a RAD program…take it every semester.
  • If you see something, say something- Report suspicious activities or individuals

At dorm rooms or apartment

  • Doors and windows to your residence hall should be equipped with quality locks.
  • Room doors should have peepholes in the door and deadbolts locks.
  • Keep blinds and curtains closed while changing clothes
  • Do not loan out your keys (it doesn’t take long to make duplicates).
  • If you lose your apt/room key replace locks immediately.
  • Never compromise your safety for a roommate or friend who wants the door left unlocked.
  • Keep valuable personal items and documents locked away
  • Replace locks when a key is lost or stolen.
  • Use caution to admit strangers to your room, even if it is your date!.
  • Have good lighting around entrances.
  • Be sure all doors and windows are locked when leaving room or apartment
  • If you are a woman and live alone or with other women, use only your first initials
  • on your mailbox and, when possible, in phone directories.
  • Report suspicious activity to campus police—or to the police if you live off campus.
  • consider purchasing a room door alarm

While in your car

  • Keep windows up and doors locked.
  • Be sure someone knows where you are going and when you should be back
  • Park in well-lighted areas and travel on populated, well-lighted streets.
  • Never pick up hitchhikers.
  • If you have car trouble, a signal for help by raising the hood or tying a white handkerchief to the door handle.
  • It is wise to have a car Emergency kit

Social Media

  • Don’t accept people you really don’t know as friends
  • Set all your settings to private.
  • enable multi-factor authentication

Parties or other Social Events

  • Alcohol & Drugs: Be STRONG. Don’t cave to temptation and peer pressure. Know your limits when drinking.
  • Do not accept drinks from someone you don’t know. It could have date rape drugs in it. Keep drinks in your hands at all times. NEVER mix drugs and alcohol.
  • Don’t drink and drive.
  • When dating be sure someone you know and trust knows where you’re going and what time you plan on being home. Have a 911 code you can quickly text your trusted friend. Share your location with that trusted friend.

Traveling Off Campus

  • Travel with a buddy/ groups.
  • Be very familiar with the good and bad parts of the surrounding area.
  • If approached by a stranger asking for time or directions: keep your distance and stride. Don’t be distracted. Be aware. Trust your instincts. Avoidance is always a safe bet.
  • Have your Pepper Spray handy
  •  Attackers look for those who appear to present the least amount of resistance.
  • Avoid headphones. Stay off the texting, games and social media while walking and or jogging.
  • Avoid late night ATM’s and shopping.
  • Travel and park in familiar, populated and well-lit areas.
  • If attacked. Yell. Scream. Run. Remember STRIKE the target primary target areas: eyes, nose, groin. Strikes: Palm, fingers, thumbs, elbows, knees, kicks.

Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. –
Victor Swindell, Onyx Knight Enterprises

09/10/2014

October is …


October is..

campus rape

  • Breast Cancer Awareness Month
  • Bullying Prevention Month
  • Church Safety and Security Month
  • National Domestic Violence Awareness Month
  • National Crime Prevention Month
  • National Cyber Security Awareness Month

Somehow this reminds me of that Red Cross commercial where the person wanted to do so many things because there was too much need in the world and decided that if he gave blood that he could save three people lives.  

Onyx Knight Enterprises, sell items on eBay go to organizations such as RAINN and that deal with victims of and The South Carolina Coalition Against Domestic Violence and Sexual Assault.   Our Blog Defense Against Crime
(https://peppereyes.wordpress.com/) address many issues included Cyber Security, Crime Prevention, Business Security, Crime Prevention and many other issues

We wrote a piece on few statistics on some of these issues see:
https://peppereyes.wordpress.com/2012/10/26/october-is/
A Word on Domestic Violence.

By now we have all seen the TMZ edited video on the incident took place Feb. 15th at the Revel Hotel and Casino in Atlantic City — after Ray and then-fiancée (now wife) Janay Palmer got into a heated argument on their way into the elevator.   (If not you can find it on the internet) Suddenly some people became shocked and appalled because they could not connect the fact that seeing her dragged out of the elevator after being knocked out was different from seeing her knocked out.  But I digress.

Statistically, 1 in 4 women are victims of Domestic Abuse, if this incident at this moment helps shed light to help prevent and address the issue in the civilized world when I’m going to use it. Unfortunately, when we talk about Domestic Violence, we only think about physical abuse. However, domestic violence takes on many forms.

·         Emotional
·         Verbal
·         Financial
·         Stalking
·         Digital
·         Physical.

Remember this when you abuse another human being you are abusing the only thing in creation that was made in the likeness and image of God.  So when you see Domestic Abuse in any form or if you are a victim. STAND UP.. GET HELP.   If you need help contact RAINN.org – they can get you assistance http://centers.rainn.org/ from people in your area.

Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. –
Victor Swindell, Onyx Knight Enterprises

24/09/2013

If your daughter is going to College Ladies ..Please ask her to enroll in R.A.D. Class for her safety,


RAD-ClassAs part of National Campus Safety Awareness Month, I had the privilege of sitting in on the first part of a Rape Aggression Defense (RAD) class that was held at the College of Charleston. This is a FREE course which is offered at many colleges and universities across the country. I also had the chance to ask the program director a few questions about the RAD program and about crime on campus in general. According to FBI crime statistics available from the Department of Justice website as well as on websites like RAINN.org about 25% of college women will be sexually assaulted. Across the United States, in a typical academic year, 3% of college women report surviving rape or attempted rape. This does not include the summer when many more rapes occur. The true number of actual sexual assaults nationally can’t be determined because about 54% of sexual assault victims will not report the crime for various reasons. Capt. Grimes reported that on average that only 5 to 6 rapes are reported annually at the college. Given the large body of female students, we can probably guess that this number is much higher. Most colleges and universities publish their crime data on their websites. We also know that most rapes are by males against females. The instructors of the R.A.D. also pointed out the definition of rape and sexual assault can vary from state to state or even in different cities. Students should be aware of what these are because sadly about 97% of these perpetrators are rarely punished. All of these statistics can be verified by the US Justice Department and FBI crime data. This is one of the reasons why it is necessary that you learn to take the steps not to become a victim. The good news is that because of awareness, and action steps to make women aware and empowered through the easy availability of self-defense products like pepper spray and programs like RAD, sexual assaults have fallen by more than 60% in recent years.

Sadly we still have a long way to go to make this number even lower. One of the biggest walls to take down is the mentality of “It won’t happen to me”. If you ask any rape victim, they will tell you that they never thought it would happen to them. Capt. Grimes said that the enrollment of students per semester in RAD is only about a dozen students. Considering that a there are a few thousand women enrolled at the College you can see the problem. College students have left the comfort, security, and protection of living with their parents, and have entered a stage where they have to be more responsible with their lives, and having to navigate with more of the real world. Sadly many are not prepared for the reality of the world. However, for many college students they see college life as a chance to be free, and to experiment with rules and behaviors. For many, it is the chance to freely become acquainted with alcohol. According to Lt. Grimes, Alcohol is the leading factor in sexual assaults. This can be from the drunken stranger who approaches a young lady or a young lady who has had too much to drink or a date where very little resistance can be put up by a horny partner. The RAD instructors also confirmed another fact that many (about 60%) sexual assaults are committed by someone the victim knows.

WHAT DOES RAD OFFER?

The RAD program offers lifelong skills that help females to develop and enhance the options of self-defense so that they may be viable considerations to women who may be attacked. The program doesn’t just teach self-defense tactics, but it also makes women more aware of how, when and where they could be victims of a sexual or criminal attack, and the options that have to increase their survival of these possible life-altering events. The four areas that RAD covers are as follows:

Risk Awareness – Teaches women to be aware of the possibly dangerous situation, and how to avoid them. This not only includes where you go, but who you are with. Risk Awareness also means knowing the facts about the acts, and participants of rape and sexual assaults. For example “True of False – Only young attractive women are raped?”

Risk Reduction – Teaches women different strategies to help reduce their chances of being sexual assault victims. This includes some common-sense things you can do like keeping your door lock at all times, or not putting a spare key under the doormat, or just paying attention when you are out and about.

Risk Recognition– Jesus taught as recorded in Matthew 24:23 that if the owner of the house had known at what time of night the thief was coming, he would have kept watch and not let his house be broken into. That being said, you can’t tell by the way a person looks if they are good or bad. You do however have a built-in danger detector. You must learn to listen to it, and use it. RAD Students learn to develop a color-coded Awareness system they allow them to deflect possible dangers. These are yellow, orange and red. It reminds me of the Star Trek Alert system. Sadly many people aren’t prepared for Red Alerts.

Risk Avoidance – RAD Students learn how to increase their overall reaction time to possible threats, as well as learn how to avoid the possible precarious situation like being alone in parks, parking lots, and how to avoid vulnerable circumstances i.e. drugs, alcohol, unfamiliar groups etc.

The RAD Program is a 4 session program that empowers and equips women to be competent and to become survivors of an attack. In the first session, students get classroom knowledge of what they need to be aware of. The remains three sessions teach the young ladies efficient self-defense moves that are viable in many aggressive situations. The dynamic simulator is completely hands on so that young ladies get repeated practice using the techniques they are taught. The students are cautioned not to show their male friends what they have learned, as many rapes happen by male acquaintances. If you show them your moves, then they are more prepared to counteract what you know.

What I also found interesting is that the RAD program isn’t just for college women. The R.A.D. Systems of Self Defense offers programs for women, children, men, and seniors. These offerings provide a truly holistic approach to self-defense education, supporting the necessity of continuous learning in order to provide realistic options for the population as they go through life. Each of these programs includes educational components consisted of a lecture, discussion, physical restive strategies. All of which are facilitated by certified R.A.D. Instructors supported by a network of dedicated professionals who honor one another’s student through their unique Lifetime Return and Practice Policy.

Decide Today…Not to be a crime victim

Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. 
Victor Swindell, Onyx Knight Enterprises 

25/03/2011

Would you leave $500 unguarded on you car seat?


Very often, someone on Next-door posted that their car was broken into and something were stolen. Lately, I’ve seen lots of reports of car break-in’s on Nextdoor on on the local news.  One neighbor said that she went in the house, did somethings and came back out to see he car doors open.   I’ve seen various reports of gun stolen from cars.

You can google Car Break-in  and Smash-N-Grab near me to see these crimes in your area.

According to nation crime data car break-in are running out of control across the United States. Look at these headlines.

  • Belvedere Square site of series of car break-ins
  • Sheriff’s Task Force Tackles Car Break-Ins
  • Car break-ins out of hand / Police say incidents way up, prosecutions nearly impossible
  • Crime stoppers hear break-in statistics
  • Dashcam footage shows brazen smash-and-grab thieves breaking into parked car and snatching bags in crime-ridden San Fran

The only thing a thief needs is OPPORTUNITY!

It does not matter if it is a low income, middle income of high income neighborhood, Car break-ins don’t just happen at night in high crime neighborhoods. They happen in broad daylight in all kinds of neighborhoods, in parking lots, parking decks, and on the street. If you’ve seen the news you’ve seen a rash of break-in’s in various neighborhoods. The primary reason for this is that we are just tempting, or making it easy for criminals to take our stuff. Would you leave $500 cash sitting in a unlocked car, and walk away? You may say no, but many of you are doing this. There are some things you can do to not be the next crime victim.

  • Lock your car to provide some protection. – this should go without saying, but sometimes we think we are just going to be a minute at the convenience store, etc. According to the National Insurance Crime Bureau 31 percent of drivers fail to lock the doors of their vehicle, and 14 percent will leave the keys in the ignition.  Some even leave their windows down. The easiest car to break into is the one that’s unlocked. People think that having your car parked at your residence makes it safe. However, it only takes a few seconds to remove valuables from an unlocked car. Never assume that because you don’t have expensive electronics in your car that thieves won’t bother your car. You may have your work ID, or spare keys, or spare change in your car, or something that can be used to steal your ID, or a letter that has your address on it. A police officer told me that according to the criminals themselves, leaving your car unlocked almost guarantees that you can be a victim.  I know of someone who had the spare key to their second car in their other car, and the door was unlocked.  Guess what happened?  Thieves stole the other car!

  • Leave NO VALUABLES visible inside the car.– The only barrier between  your phone, your GPS system, $250 Ipad, or $1500 Laptop, your purse or briefcase is a piece of glass that can easily be smashed with various window breaking tools. Leaving your valuables or what may appear to be valuable inside your car in plain view is advertising for trouble. Last year, a woman had her child stolen from her unlocked car. College students often find their laptops stolen from their car (locked or not). Putting your MP3 player in your glove box and leaving the cable attached is just a big clue for the thieves. According to the police a locked car with valuables in side give you a 50/50 chance of getting robbed. If you have to leave something in the car for a short time conceal it using the trunk, the space under a seat or a blanket. It’s best to have in there, before your park. There is a slight chance that if you put it in your trunk after you park, a thief is watching, but putting it in your trunk is better than nothing. I’m not going to discuss the issues with shopping, but be mindful which you purchase expensive items, and store them in your car. This is usually a big issue during Christmas, but can happen if you buy something, put it in your car, and then go into another store.

  • Be mindful about the inside of your automobile Crooks and Drug addicts don’t want to waste time looking for valuables. They want to know something of value is in the car before they even touch it. Keep a clean car with nothing of value in it. If you purchase MP3 player to hook into your new stereo, as many of them have IPOD connectors, take the player out of the stereo along with the face plate to your stereo when you park. The stereo is useless to the burglar without the faceplate. (yea this is dated to the era of MP3 players)

  • Secure your car with a good alarm system or counter theft system– These days most cars come with car alarms, so if you have one, USE IT. If you don’t have one GET ONE. Yes they can be a pain and cost money but they have gotten inexpensive in the past few years. A car alarm is the number one electronic deterrent for a-would-be-intruder. Criminals want easy low risk targets. A loud beeping sound heard six blocks away is the last thing they hear to give them away. They will not prevent a smash and grab. If you are looking for a device to prevent your car from being stolen you can invest in THE CLUB or the Portable Car Lock with Alarm.

  • Watch where you park – Park in a well lit, high traffic area where passerby, either walking or driving, may serve as a deterrent to someone who might steal from your car. Try to park near a storefront that will still be brightly lighted, on a main thoroughfare, under a street light, etc. If your car is too visible it can help deter a criminal for checking it out. If you have a garage at your residence or job, utilize it to protect your car. You’d be surprised to know some intruders break into cars while their parked in their owner’s driveway even while they are at home. However, it does happen. There are all kinds of solar motion sensor light, motion sensor dummy camera camera, consider installing these.
  • Report IT – Notify your break-in to the police right away, so that can determine if there are a rash of similar crimes in your neighborhood, and they can take appropriate steps. However, please remember YOU ARE THE FIRST LINE of Security for your possessions, not the police.

Each year, there are millions of car break-ins and robberies each year in the United States, and many of these are preventable. If you reduce your chances of being the victim of a car break-in do not leave your valuables in your vehicle, make your car an unlikely target of high risk for an intruder by removing valuables and parking it in a well lit and highly visible area. The probability of having your vehicle broken into is typically based on difficulty. Some drivers own high risk cars. These cars include convertibles, luxury cars, and cars with items of value visible to thieves. Statistically, your vehicle is the least safe at night when you are sleeping and the darkness provides limited visibility for would be burglars to mask themselves while committing their crime against you. We all want to live in a world where or persons and our property are safe, protected and respected, but we don’t. If you don’t want to be a crime victim, it is your responsibility to get educated and take the steps necessary to reduce your chances.

As my High School Teach said: Never give a thief a chance.

Defense Against Crime provides you with the best information to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. –
Victor Swindell, Onyx Knight Enterprises

 

30/04/2024

College Students are getting scammed by Fake Jobs


 

New Job Scams Targeting Young Professionals Are Flourishing
Fake online recruiters using sophisticated techniques lure in young college students and new graduates

Add these steps to your job search checklist to help you spot and avoid a job scam:
1. Look up the name of the company or the person who’s hiring you, plus the words “scam,” “review,” or “complaint.” See what others are saying about them.
2. Reach out directly. If the email looks like it came from a professor or an office at your college, contact them directly. Confirm that they’re really looking for someone for this position.
3. Get it in writing. Ask the employer to send you details of the job duties, the pay, and the hours. If they refuse, that could be a sign of a problem.
4. Talk to someone smart and wise that you trust. Show them the offer and see what they think. This also gives you vital time to think about the offer.
5. Job seekers should be wary of texts or emails that ask them to do an interview in any app they need to download, such as Signal or WhatsApp, or requests to conduct interviews only by text, email or online chat, said Teresa Murray, consumer-watchdog director at U.S. Public Interest Research Group, an advocacy organization. Any question about personal information or bank account numbers, and promises to send a check to cover work-from-home equipment are red flags, she said.

Your boss should be paying you, not the other way around. If they tell you to deposit a check and use some of the money for any reason, that’s a scam. Walk away. Then report it to the FTC at

ReportFraud.ftc.gov. Learn more at ftc.gov/jobscams.

Excerpt from the WSJ article…
Excerpt 1:
Soon after, Querubin was offered a remote job and sent a check to cover the cost of a laptop and software. Querubin said he deposited the check into his bank account. The next day, he was told to send the money to a vendor through Apple Pay or Zelle.

He suspected something sketchy was going on and notified his bank, but by then it was too late. The check bounced and the money was gone. He had lost $1,745.
Excerpt 2:
Job scammers are also using job boards and networking sites like Indeed, ZipRecruiter and LinkedIn, which has prompted those sites to update their fraud-detection efforts. LinkedIn this month launched a verification feature for recruiters, so job seekers can see a badge on their profiles to signal it is an authenticated corporate subscription.

See Also: https://consumer.ftc.gov/articles/job-scams
See also :https://www.flexjobs.com/blog/post/common-job-search-scams-how-to-protect-yourself-v2/

Sources:

FTC Consumer Advise – College Students are targeted with job scams

Wall Street Journal


Defense Against Crime provides you with the best information to meet the security needs of you, your family members, your home or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. – 
Victor Swindell, Onyx Knight Enterprises 

01/04/2024

Trust a Hunch


Saturday I was sitting in the barbershop waiting my turn when my phone rang. The callerID said it was my bank. Curious I answered it. The caller claimed to be from the fraud victim division of the bank and wanted to alert me to “suspicious activity” on my account and that someone was trying to use my OLD debit card. Note I said old, and in my mind, I’m thinking…so what the problem? He also said that someone was trying to access my account from an account from an iPhone in Texas.  
The one thing that bugged me was that it was often hard to hear the caller – I’ve gotten calls from their fraud victim department, and it was always crystal clear. 

The other thing that was off is that the credit using fraud department of the bank ALWAYS sends a text alert first. There wasn’t one. 
 
The caller said they needed to verify my account and they wanted me to give them my one-time-access code from the text message I was about to receive. RED FLAG RED FLAG. 
 
and Yes—I have MultiFactor Authentication set up on all my accounts. 
 
I told the caller NO, and that I would just go into the bank, and hug up. 
 
I verified the number on my phone, and it was the same number that the bank uses. 
I called the bank and asked if they had recently called me about unauthorized activity on my account. They reported that they didn’t and the last time they called was when there really was an issue (they replaced by card at that time) 
 
if you get one of these calls…do the same… 

Even the text message you received from your bank states that No one from the bank will ever ask you for that code. 

When I got home, I changed my password. 
 
Know that those data breaches of various, the internet dark web is exposing all kinds of information about You. 
  
 
Here are the takeaways.  

Step 1:NEVER rely on caller ID.  

Watch out for scammers who may be able to spoof a phone number so your caller ID reads your bank’s name 

Step 2: NEVER share private account information.    

Remember that bank employees will never ask for your PIN, password, or one-time access codes. This information should always be private and never shared. Many of their text messages reiterate this fact. 

Step 3: Ignore requests to send a payment to solve a problem. 

Know that bank employees will never ask you to send money to anyone – including yourself – to “reverse a transfer,” “receive a refund,” or anything similar. Remember, if a correction is needed, the bank already has your account information. 

Step 4: Ignore transaction requests you didn’t initiate. 

If you receive a one-time access code to authorize a transaction you didn’t initiate, don’t use the code or share it with anyone, even if they claim to be from your bank. One-time access codes should never -ever be shared. The text messages usually reiterate this fact. 

Step 5: When in doubt, hang up and contact us directly. 

If you receive a suspicious phone call that seems like bank spoofing, hang up immediately. If you receive a suspicious text, don’t respond. Contact your directly using a verified, legitimate source such as the phone numbers on your banking app. 

Step 6: If you get a call wanting your one-time-access, chances are the criminals have your username and password —- CHANGE YOUR PASSWORD (to some you are NOT using) 

Defense Against Crime provides you with the best information to meet the security needs of you, your family members, your home or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. – 
Victor Swindell, Onyx Knight Enterprises 

06/12/2023

Spotting an Amazon Scam

Filed under: Cyber Security,Safety Tips,Self Defense Infomation — Onyx Knight @ 10:18 AM
Tags:

I received this in my inbox today…this time of the year I’m doing shopping on line…and thieves know it and hope to catch you off guard using fear.

However, since I do order from Amazon…I know what Amazon email look like (they don’t include pictures)
They also include MY NAME, and they say ‘SHIPPED’ not Dispatched. Also the Email’s com from AMAZON…not these weird addresses.

If you receive an email claiming to be from Amazon that seems suspicious, it may be a phishing email. A phishing email appears to be from a reputable source, but in reality it is sent from an outside party attempting to access your personal information by getting you to open an attachment containing malware or click on a link that redirects to a potentially dangerous website.

Some phishing emails may even contain a link to a website that looks like Amazon.com, but is not a legitimate site. The website may ask for your Amazon username and password or try to install unwanted software on your computer. If you receive a message like this, you should delete it without opening any attachments or clicking any links.

If you wish to report a suspicious email claiming to be from Amazon that you believe is a forgery, you may submit a report. You may also forward phishing emails and other suspected forgeries directly to stop-spoofing@amazon.com.

Defense Against Crime provides you with the best information to meet the security needs of you, your family members, your home or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase high-quality self-defense products kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. – 
Victor Swindell, Onyx Knight Enterprises 

26/11/2023

Cyber Monday Safety Tips

Filed under: Crime Prevention,Cyber Security — Onyx Knight @ 7:31 PM
Tags:

Next Page »

Website Powered by WordPress.com.