Defense Against Crime

07/02/2019

Had your phone number been Spoofed?


Today I received a phone number and my phone auto-replied saying  I will call you right Annoying callback.  Then I received a text reply asking“ who is this?”

So I replied “you called me and my phone auto-replied

Long story short…the person did not call me, and I alerted them that their phone number has been spoofed.

After doing some research because this is not the first time this has happened.  I discovered it’s now a common practice for scammers to display people’s legitimate phone #s on their your Caller IDs, instead of their own phone number.  What is worse, your legal number may get labeled as a scammer or frequent caller if reported enough, and there is NOTHING the cell phone companies can currently do about it ( or not willing to).

Even worse, it turns out that spoofing a company or your number is not technically illegal under certain circumstances. According to the FCC website and Truth in Caller ID Act, “FCC rules prohibit any person or entity from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm, or wrongfully obtain anything of value.”

However, with this law, if there is no intent to harm, in other words, if it is a legitimate business, you can use other numbers. Phone spoofing is legal in cases such as a business displaying their toll-free call-back number or a doctor using their mobile phone and having their office number appear. Even if the intent is to harm or defraud, some of the call centers originate from outside the United States, so they are very hard to regulate or shut down.

Now I know I’m just a simple person, but it seems that some piece of software can be added to the carrier’s systems to verify phone numbers. Basically, undo the hole in their system for calls the happen in the country. If the numbers used don’t belong to the owner, don’t allow the call.

What can you do

 Bad news: there are websites that explain HOW to do this…so your number is not safe.
Good News: There are precautions you can take.

What is Caller ID Spoofing and How can you stop it. The FCC Provides help at this link:

https://www.fcc.gov/consumers/guides/spoofing-and-caller-id

 

PepperEyes.com Self-Defense Products Store is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high-quality discount self-defense products. Survival kits and arm yourself with the knowledge about self-defense and security products and information on the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option

Advertisements

05/02/2019

20 Things You Should Know About Teen Dating Violence


February is Teen Dating Violence Awareness Month

The tragic crime of domestic violence in the United States is often unacknowledged by the public face that our society wears. Behind smiling, couples and seemingly carefree children lurk something that many thoughts was better left unspoken.  While the discussion of domestic violence happens much more often today, bringing light to this terrible crime that makes a home a prison, abuse still occurs, and, often, the children adopt these destructive behavioral patterns both as victims and aggressors

The shocking numbers

  • Annually one in four teens reports verbal, physical, and emotional or sexual abuse.
  • Almost one in five teens reports being a victim of emotional abuse.
  • Almost one in five high school age girls has been physically or sexually abused by their dating partner.
  • One of five college females will experience some form of dating violence.
  • A survey of adolescent and college students revealed that date rape accounted for 67% of sexual assaults.
  • Dating violence among fellow teens is reported by about 54% of high school students.
  • One in three teens reports knowing someone who has been physically hurt by his or her partner through violent actions which included hitting, punching, kicking, slapping, and/or choking.
  • Nearly 80% of teens believe verbal abuse is a serious issue for their age group.
  • Nearly 80% of girls who have been victims of physical abuse in their dating relationships continue to date the abuser.
  • Nearly 20% of teen girls who have been in a relationship said that their boyfriend had threatened violence or self-harm in the event of a break-up.
  • Nearly 70% of young women who have been raped knew their rapist; the perpetrator was or had been a boyfriend, friend, or casual acquaintance.
  • The majority of teen dating abuse occurs in the home of one of the partners.
  • About one in three high school students have been or will be involved in an abusive relationship.
  • Forty percent of teenage girls ages 14 to 17 say they know someone their age that has been hit or beaten by a boyfriend.
  • Most abused teens NEVER tell their parents.
  • In one study, from 30% to 50% of female high school students reported having already experienced teen dating violence.
  • In one particular year, 7% percent of all murder victims were young women who were killed by their boyfriends.
  • A survey of 500 young women, ages 15 to 24, found that 60% were currently involved in an ongoing abusive relationship and all participants had experienced violence in a dating relationship.
  • One study found that 38% of date rape victims were young women from 14 to 17 years of age.
  • It is estimated that between 20% to 52% of high school and college age dating couples have engaged in physical abuse.

The sources of these facts come from the U.S. Department of Justice, Bureau of Justice Statistics, National Center for Victims of Crime Health Resources and Services Administration (HRSA), Maternal and Child Health Bureau, U.S. Department of Health and Human Services (HHS), and other studies.

 See Also February is Teen Dating Violence Awareness Month

 

PepperEyes.com is dedicated to providing you with the best and most affordable personal protection products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for yourself, your home or your business, buy our high quality discount personal protection products and arm yourself with the knowledge of the best way to stay secure in an ever-increasing violent world. In today’s society being equipped mentally and physically is no longer an Option. Victor Swindell

28/01/2019

Password Correct..Access Granted


In this digital age, almost all of us are using a computer to access messages, social media cyber thief-hackernetworks, manage some aspects of our financial life, some other aspect of personal computer usage that puts aspects of our lives open to someone who has the key. I usually tell people not to hide their residence keys in obvious places, like under the welcome mat. The same common sense should be used is hiding the digital keys to the virtual residences of our lives. How safe would you feel is a crook has the keys to your house? The same sense of security should be taken when it comes to wanting to secure. One of the sad things is that we can unknowingly tell clues about our lives online in places like Facebook, or blogs, or ancetry.com that a thief can use to help him figure out possible passwords. If any of you have seen the 1983 movie War Games, you may remember that the Hacker was able to gain access to the system, by figuring out that the programmer used the name of his dead son as his backdoor password.

To highlight the necessity of securing your digital life should be news story accounts of security breaches at Abbot Labs,  IBM, Sony, Booz Allen Hamilton, Fox News, NBC, New York Times, Apple, Microsoft, Facebook, Twitter, Linkedin, the US Government and hundreds of other companies. These stories have exposed how insecure or unprepared these major websites and companies, to which consumers like you and I entrust their personal information really are. While we expect some level of security at a corporation, ultimately, your security is your responsibility. Unfortunately one of the side effects of this is that these stories have exposed, is just how helpless we can be. Close examination of a sample set of 40,00 username and passwords out of a sample size of over a million have revealed some interesting results.

Some analysis results:

  1. The analysis showed about 50% of the passwords are less than eight characters long. Eight characters are considered, the minimum length you should even consider when choosing a strong password.  (These passwords only take less than a minute  for a PC to crack) 2. Only 4@ percent of the passwords analyzed used at least makes use at least three of the four character types (Upper case letters, lower case letters, numbers, special characters like #|*. The vast majority only used one character type, such as all lowercase letters or all numbers.  (These passwords only take about 3 days for a PC to crack) 3.. Over 33% of the analyzed were not a random character like “qp}Edhg!13evTOI” rather than “ILikeSpock”. These analyzed passwords could be found in a common password dictionary. The most frequent passwords use included: Seinfeld, password, 123456, purple, princess, Maggie, peanut, shadow, ginger, Michael, Buster, sunshine, trigger, cookie, George, summer, Taylor, Bosco, abc123, Ashley, and bailey.  (most of these take less than a second for a PC to crack, ‘IlikeSpock’ takes about a year) 4. 67% of users had the exact same username/email and password on different systems used the same password on both systems. BAD BAD BAD

6 Simple Rules for some great passwords

  • NEVER choose passwords less than 8 characters long and that is made up solely of numbers or letters. Use letters of different cases, mixtures of digits and letters, and/or non-alphanumeric characters. The longer a password the better so strive for passwords over 8 characters long. If some systems limit the numbers of characters. It’s doesn’t have to be complex as “Picard-Delta-47-Alpha-21” or “173467321476C32789777643T732V73117888732476789764376” which would take a PC 14 octillion  years and 6 vigintillion years to crack respectively
  • Randomness is also key to a great password. NEVER choose a password based upon personal data like your name, birthday your username, or other information that one could easily discover about you from such sources as searching the internet.
  • Create a list of 10-12 such as Qy#i1827Vbsg12348()17w passwords that are random and use a password management program like 1Password or LastPass, or create and remember a password recipe or simple padding pattern.
  • NEVER choose a password that is a word (English, German, or otherwise), proper name, the name of a TV shows, or anything else that one would expect a clever person to put in a “dictionary” of passwords. Especially if it can be found it’s something you’re found of like ‘Hello Kitty’, ‘Disney’, etc
  • NEVER choose a password that is a simple transformation of a word, such as putting a punctuation mark at the beginning or end of a word, converting the letter “l” to the digit “1”, writing a word backward, etc. For example, “password,123” is not a good password, since adding “,123” is a common, simple transformation of a word. Neither is using password where you have substituted the number zero for the letter “o”
  • NEVER EVER EVER use the same password for all your logins (have at least 5).

How to Make Up a Great Password

Passwords should contain a mix of the following sets

  1. lowercase letters
  2. uppercase letters
  3. Numbers
  4. special characters !,#,$,+,%,~ etc
  5. Should be longer than 8 Characters
    1. Example the Password 1@Tf%s&E9Tewhich is based on the numbers 1-2-3-4-5-6-7-8-9-10 would take a PC 4 Thousand years to hack.

Password Levels

  • Level One – contains at least one of the character sets
  • Level Two – contains at least two of the character sets
  • Level Three- contains at least three of the character sets
  • Lever Four-contains all four character sets
  • You can Include some simple substitution like 3 for ‘e’, zero for the letter ‘O’, 1 for ‘I’, 7 to T, 2 for S

Example of how to create a good password

  1. Think of two unrelated things you like computer & socks books & dogs autumn & chocolate OR a phrase from one of your favorite movies or tv shows
  2. Join the words with a non-alphabetic character or two. (#,+,|,!..etc.)
  3. Make at least one change (for example, uppercase a letter or add another character) to one of the words (preferably not just at the very beginning or end of the password).
  • Some example passwords generated using this method:
    • C0mput3r%socks
    • B00ks #dogs
    • Autumn|choc0lat3
    • Gen3sis_Doggi3
    • 76TltbpWa110ccah# – (Seventy-six trombones led the big parade With a hundred and ten cornets close at hand.)
    • 2bo!2b_TitQ – -(To Be or Not To Be The Question)
    • I106mtC_wgaftog_hap0c_1dawws -It’s 106 miles to Chicago, we got a full tank of gas, half a pack of cigarettes, it’s dark… and we’re wearing sunglasses. Read more: Music Man – Seventy-six Trombones Lyrics | MetroLyrics
  • Books like the Bible have a great resource to create passwords as it has over 31,173 verses you can use. You can use Bible verses to create passwords like Joshua24I5$, 54Isa1ah17 *, Pr0v3rbs9_8%, J8hn316*
  • Convert from the Arabic-Hindu Number system into the Hexadecimal System so that you can say BacktoTheFuture1151955 and make it Back#T0#Th3#Future_1193D3

Biometric passwords – There is an increase of computers gives you the ability to use biometric data such as facial recognition, fingerprint, retina pattern or voice print data to generate a unique password based on your data. However, there have also been reported successful hacks for these methods.   An example of this would we be the Apple fingerprint lock, which was able to be bypassed the week it was released.

Second Key Authentication: Many systems like Facebook, Google, Yahoo, Hotmail, PayPal, and even financial institution offer second key authentication. In this method, you give the institutions your mobile phone number. When you attempt to login, the system sends a special random access code to the users mobile phone. To complete a log in the user must type in this code. Which mean they have to have your phone.

Personal Info Authentication: Many systems ask the user to select personal info questions to set up their user accounts such as the color of your first car, or mother’s maiden name, or best friend. These questions are to help users in case they have forgotten your password.  Be careful what info you select! Some information is public information or can be gathered from your Facebook profile.  For example, if your question is ‘Name of the High School you attended?’ and you are a member of the Eric Erickson High School group on facebook, then it’s not hard to answer this question.  What I can suggest is giving easy to nonsense answers like the J3di Acad3my. For example for all your selected question, put in the name of your favorite something (recording artist, fruit, book, author).  I mean if you select mother’s maiden name as your question, and typed in Mayberry.  it is highly improbable that anyone trying to hack your account will guess that.

CHANGE YOUR PASSWORD…OFTEN

Most computer security professionals recommend changing your Internet passwords and account login information at least once every three to six months. Though some debate if it is necessary, however, if you want to be safe change it at least once a year, like a month before or after your birthday and make it an annual reminder on your calendar. It may be safe for you to wait longer; it just depends on your computer habits, and how and where you surf the web. I recommend changing all your passwords at a minimum of once a year, perhaps the day after your birthday, or on New Year’s day, or the first day of spring (spring cleaning). Changing all of your Internet passwords can be a time-consuming and even an exasperating task, especially if you have lots of online accounts. But it is a sure way to guarantee a modicum level of safety; however, it is not the only safety precaution that should be considered for your login information. Whether you bank online or you are just sending a few simple emails, secure passwords are essential. You’ve heard of problems caused by hackers, who use your account to do illegal activity. There have been incidents of people not only hacking into people’s e-mail, or Facebook accounts but sending vicious messages.

 

You should avoid writing down your password or giving it to others. You should especially avoid writing it down and leaving it in a non-secured place such as on a post-it on your monitor or a piece of paper in your desk. If you absolutely must write something down (because you suffer from CRS), we suggest doing the following:

  • Don’t write down the entire password, but rather a hint that would allow you (but nobody else) to reconstruct it.
  • Keep whatever is written down in two places like a small notebook or other places that only you have access to and where you would immediately notice if it was missing or someone else gained access to it. (like in the movie Ghost)
  • Keep a list of 10 to 12 passwords of length 10 to 20 characters that you only use for 1 year, and then create new ones each year
  • Treat the not book like the One Ring – Keep it secret -Keep it Safe

TEST YOUR PASSWORD

There are several great websites that will examine your password and tell you how strong that is. Such sites include

  1. http://www.passwordmeter.com/
  2. https://howsecureismypassword.net/

However remember that hackers have tools as well, so you should have as many security measures to help reduce your chances of being hacked. Many sites link PayPal, Google, Facebook, Twitter and more have code key authentication features. You can turn these on, and when you (or anyone else) attempts to log in to your account, a numeric code is sent to your cell phone, and you need to type in that code to log in.  Sometimes it’s a hassle, especially if you lose or don’t have your phone with you.

 

NEVER EVER – TELL ANYONE YOUR PASSWORDS or LET SOMEONE KNOW WHERE YOU KEEP THEM..except in your will.

PepperEyes.com Self-Defense Products Store is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high-quality discount self-defense products. Survival kits and arm yourself with the knowledge about self-defense and security products and information on the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. Victor Swindell of PepperEyes.com is a division of Onyx Knight Enterprises.

 

23/01/2019

Date-Rape Drugs: Protecting Yourself

Filed under: Date Rape,Date Rape Drugs Informatiion,women's Self-Defense — peppereyes @ 3:35 PM

 What they are and the steps to staying safe from becoming a date rape victim.a-group-of-college-students-having-a-good-time-at-a-party-drinking
For many years a new kind of rape threat has reared it’s ugly head at bars, on college campuses, at house parties, and in various nightclubs – they can be called “predator” or “date rape” drugs. You may have heard of them, but what exactly are date rape drugs? Strictly speaking, any substance that renders a person incapable of saying no or asserting yourself and your needs can be used to commit the act of sexual rape. This can include items such as alcohol, marijuana or other street drugs, designer or club drugs like ecstasy, over-the-counter sleeping pills, and antihistamines, even cold medications. However, the term “date rape drug” usually applies to drugs like Gamma Hydroxy Butyrate (GHB), Rohypnol, and Ketamine Hydrochloride. Listed below are the various types of “Date Rape Drugs” and how they are used.

Alcohol
When people hear the phrase “date rape drug,” alcohol isn’t usually what comes to mind. But, as these statistics show, the link between alcohol and campus sexual assaults is evident:

  • 90% of all campus rapes occur when alcohol has been used by either the assailant or the victim.
  • 55% of female students and 75% of male students involved in acquaintance rape admit to having been drinking or using drugs when the incident occurred.
  • As many as 70% of college students admit to having engaged in sexual activity primarily as a result of being under the influence of alcohol, or to having sex they wouldn’t have had if they had been sober.

Understanding the effects of alcohol on your body, limiting your alcohol consumption and avoiding drinking games are some of the ways you can decrease the risk of sexual assault. Know what alcohol can do to you can help in you in the following ways:
1. You can make a more informed decision about whether or not to drink.
2. You can recognize the warning signs of dangerous intoxication and call EMS for a friend.
3. You can reduce the risks associated with using alcohol, including injury, unwanted sex and being a victim of crime.
4. If you choose to drink, you can make safer decisions about drinking.
5. You can get help for yourself or for a friend.

GHB
GHB stands for gamma hydroxybutyrate, a central nervous system sedative often referred to by other names such as “Liquid Ecstasy” or “Grievous Bodily Harm.” GHB can produce drowsiness, dizziness, nausea, unconsciousness, seizures, severe respiratory depression, and coma. An overdose of GHB can occur quickly and can be fatal. GHB is typically an odorless, colorless liquid, with a slightly salty taste. It is classified as a sedative and is in the same drug family as Rohypnol and ketamine.

GHB is used as a general anesthetic in Europe; however, the drug is illegal in the US. It has been used in this country as a date rape drug: it can be slipped into a victim’s drink, causing dizziness, confusion, drowsiness and sometimes loss of consciousness. When GHB is combined with alcohol, it is especially dangerous because the combination of two depressants can lead to overdose.

GHB is generally taken in a liquid form, though it is sometimes found in powder, tablet, or capsules. Since in its liquid form, the strength of GHB varies, and people’s reactions to it varies it is very easy to take a dangerous dose of this drug. The effects of the drug begin 10 to 20 minutes after taking it and last up to 4 hours.

Rohypnol
Rohypnol is a brand name for a powerful sedative that is often referred to as “roofies.” Rohypnol is not legally available for prescription in the US and so just having it in your possession signals intent to commit a crime. Rohypnol may cause users to feel intoxicated; they may have slurred speech, impaired judgment, and difficulty walking. The effects are often felt within 10 minutes and can last up to 8 hours. Rohypnol can cause deep sedation, respiratory distress, and blackouts that can last up to 24 hours. Though it has gained popularity as a recreational drug. Colorless and odorless, it has been linked to numerous incidents of sexual assault because it is a fast-acting sleeping pill that can be slipped into a drink and leave the victim with little or no memory of the incident. The drug has been changed to leave telltale blue floating particles when mixed with liquids. If you see these in your drink, do not drink it. Get help and notify Police and Security immediately.

Ketamine
Ketamine is an injectable anesthetic that is intended for veterinary use. It is also known as Special K, K, Vitamin K or Cat Valiums. At high doses, ketamine can cause delirium, amnesia, impaired motor function, high blood pressure, depression, and potentially fatal respiratory problems. Low-dose intoxication from ketamine results in impaired attention, learning ability, and memory. It is most commonly used by veterinarians on large animals today. In the 1980s it began to be used recreationally as an intoxicant.
Ketamine is either sold as a dry white powder or a clear liquid (in its original pharmaceutical packaging). The powder is made by drying the liquid. The residue from this drying process is then crushed and snorted in small doses (called bumps). In rare cases, ketamine is injected intramuscularly or smoked with tobacco or marijuana. Whether smoked or snorted, the effects begin in a few minutes and last less than an hour.

Why Rohypnol, GHB and Ketamine are used in Date Rapes:
While many sedatives have been used as date-rape drugs, Rohypnol, GHB and Ketamine are the ones you are most likely to encounter.

They are easy to administer. (Stir and dissolve)
When victims feel the effects, they often leave and are caught alone and vulnerable.
If victims ‘come to’ during an assault, the drugs render them totally helpless and unable to do anything.
GHB – is most often administered to victims as a clear liquid with a salty taste, but can also be found in capsule and powder forms.

Ketamine – Administered in liquid, tablet and powder form, Ketamine is a fast-acting general anesthetic often used by veterinarians.

Rohypnol – Often dropped into beverages in tablet form, Rohypnol is a potent and fast-acting sedative that dissolves rapidly, leaving no detectable taste, color or odor.

When victims are raped, they doubt their experience because of the impaired memory of it.

HOW TO PROTECT YOURSELF

PepperEyes.com desires that no one falls prey to a data rate drug and we recommend that you take all precautions to not become their next victim.

Whether you are at a bar, the student union or any public situation, keep yourself and your friends safe by doing these simple things:

  • Never leave a drink unattended. NEVER.
  • Do not accept a drink from anyone you would not “put your life into their hands.” Remember, any stranger or casual acquaintance could be suspect. Even those people who are mixing or pouring drinks.)
  • If you are feeling sick or dizzy while out socially, go to someone you KNOW and TRUST. If there is no person you can talk to about your condition, call someone on the phone. Never leave alone or with a stranger. NEVER. (The intent of date rape drugs is to get you isolated and then to assault you.) If you think you have been drugged and cannot tell or call someone, call 911. A blood sample can be collected and appropriate tests run.
  • Remember, alcohol greatly increases the effects of these drugs. The mixture could be lethal.
  • Attend parties or bars with a group of friends, arranging beforehand to watch each other’s drinks. If you arrive as a group, leave as a group.
  • Watch out for your friends. If a friend shows symptoms of date-rape drug ingestion, seek medical attention immediately.
    Signs to look for include: Dizziness and/or nausea, memory loss, breathing or motion difficulties, and acting disproportionately intoxicated relative to the amount of alcohol consumed.
  • To prevent yourself and your friends from becoming victims of date-rape drug, you need to know what you are up against.
  • There are Drink testing Kits you can purchase

 

PepperEyes.com Self-Defense Products Store is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high-quality discount self-defense products. Survival kits and arm yourself with the knowledge about self-defense and security products and information on the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. – Victor Swindell

 

08/01/2019

January is Human Trafficking Awareness Month


Imagine these scenarios:

  • You are on vacation in a foreign country with your family, you have an 8-year-old shutterstock_492622561-750x551daughter with you. You are our shopping and while you are looking at some merchandise, your child disappears.  Unknown to you, they snatched by strangers.

  • You see an advertisement for models. The ad promise that selected models can make lots of money, and travel around the world. You are required to have a passport to bring on the interview, as well as a portfolio. No experience is required  You go on the interview and are never seen again.

What happened to these people?  They became sex-slaves.  It doesn’t matter the age; it doesn’t matter the gender. Almost, anyone could become a sex slave. Some people are abducted, some people are forced into it, some are sold into the business by their own families.

I’ve seen documentaries filmed in poor countries where families would pimp their young children to earn money to live. Don’t think it doesn’t happen here?

 

Here are the facts about this crime!

  • In 2014, Sex trafficking was a lucrative industry making an estimated $99 billion a year.
  • A 2012 report estimated that at least 9 million adults and children are bought and sold worldwide into commercial sexual servitude, forced labor, and bonded labor.
  • A 2005 UNICEF report estimated that about 2 million children are exploited every year in the global commercial sex trade.
  • According to a 2016 UNODC TIP Report, 54% of trafficking victims are trafficked for sexual exploitation.
  • The same UNODE Tip reported that Women and girls make up 96% of victims of trafficking for sexual exploitation.

One website I found had the following…

Sex is not the only motive for human tracking, modern-day slavery is another. It is estimated that there are over 40 million people who are trapped in this condition, even in the United States.

The terms Human trafficking and modern-day slavery are both umbrella terms – often used interchangeably – that refers to the exploitation of people through the means of the use of threats or use of force, coercion, abduction, fraud, and/or deception. Human trafficking includes the practices of unpaid forced labor, debt bondage, cheap domestic servitude, forced marriage, sex trafficking, and the recruitment and use of child soldiers, and other forms. The most common forms of exploitation are cheap forced labor, which, according to the International Labor Organization, impacts 24.9 million people a year – 16 million in private sector exploitation, 4 million in state-sanctioned forced labor, and 4.8 million in sex trafficking – and forced marriage, which enslaves 15.4 million individuals. The ILO estimates that forced labor generates $150 billion in illegal profits each year.

Trafficked persons may be forced or coerced to work in a variety of settings, both hidden and in plain sight. Some examples include factories, “sweatshops,” fields, brothels, “massage” parlors, online escort services, on street corners, as child soldiers, or in private homes. The most common industries associated with the trafficking in persons include agriculture, construction, garment and textile manufacturing, catering and restaurants, domestic work, entertainment, and the sex industry.

While human trafficking spans all demographics, trafficked persons most often come from positions of vulnerability. Those most vulnerable to trafficking include: Prior to their trafficking situation, individuals may:

  • Come from a low socio-economic background.
  • Be homeless or have run away from home.
  • Be a political, cultural, or ethnic minority.
  • Be an immigrant (legal or illegal)
  • Have a history of sexual abuse, rape, or domestic violence
  • Be in a foster care system
  • Have been subject to natural disasters, conflict, or political turmoil

 

These vulnerabilities are the result of policies and practices that marginalize entire groups of people and make them particularly susceptible to exploitation. Traffickers use these vulnerabilities to their advantage and use a number of tactics to establish control over victims.  One tactic is to threaten to have them deported.  Other methods include the use of violence, isolation, threats, deception, manipulation, debt bondage, prospects of education, and romance. Traffickers may operate alone with one or many victims or may be a part of an extensive criminal network. Examples of trafficking rings include gang members, family members, pimps, business owners, or smugglers.

What you can do

Remember this is a multi-billion-dollar industry. If you do anything that can disrupt someone money, it could cost you your life. Do not at any time attempt to confront a suspected trafficker directly or alert a victim to your suspicions. Your safety, as well as the victim’s safety, is paramount.  Instead, please contact local law enforcement directly or call the tip lines indicated on this page:

  • Call 1-866-DHS-2-ICE (1-866-347-2423)to report suspicious criminal activity to the U.S. Immigration and Customs Enforcement (ICE) Homeland Security Investigations (HSI) Tip Line 24 hours a day, 7 days a week, every day of the year. The Tip Line is accessible outside the United States by calling 802-872-6199.

  • Submit a tip at ice.gov/tips.  Highly trained specialists take reports from both the public and law enforcement agencies on more than 400 laws enforced by ICE HSI, including those related to human trafficking.

  • To get help from the National Human Trafficking Hotline (NHTH), call 1-888-373-7888 or text HELP or INFO to BeFree (233733). The NHTH can help connect victims with service providers in the area and provides training, technical assistance, and other resources. The NHTH is a national, toll-free hotline available to answer calls from anywhere in the country, 24 hours a day, 7 days a week, every day of the year. The NHTH is not a law enforcement or immigration authority and is operated by a nongovernmental organization funded by the Federal government.

 

PepperEyes.com Self-Defense Products is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high-quality discount self-defense products. Survival kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. Victor Swindell

 

 

 

 

 

 

Next Page »

Create a free website or blog at WordPress.com.

%d bloggers like this: