Defense Against Crime

07/02/2019

Had your phone number been Spoofed?


Today I received a phone number and my phone auto-replied saying  I will call you right Annoying callback.  Then I received a text reply asking“ who is this?”

So I replied “you called me and my phone auto-replied

Long story short…the person did not call me, and I alerted them that their phone number has been spoofed.

After doing some research because this is not the first time this has happened.  I discovered it’s now a common practice for scammers to display people’s legitimate phone #s on their your Caller IDs, instead of their own phone number.  What is worse, your legal number may get labeled as a scammer or frequent caller if reported enough, and there is NOTHING the cell phone companies can currently do about it ( or not willing to).

Even worse, it turns out that spoofing a company or your number is not technically illegal under certain circumstances. According to the FCC website and Truth in Caller ID Act, “FCC rules prohibit any person or entity from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm, or wrongfully obtain anything of value.”

However, with this law, if there is no intent to harm, in other words, if it is a legitimate business, you can use other numbers. Phone spoofing is legal in cases such as a business displaying their toll-free call-back number or a doctor using their mobile phone and having their office number appear. Even if the intent is to harm or defraud, some of the call centers originate from outside the United States, so they are very hard to regulate or shut down.

Now I know I’m just a simple person, but it seems that some piece of software can be added to the carrier’s systems to verify phone numbers. Basically, undo the hole in their system for calls the happen in the country. If the numbers used don’t belong to the owner, don’t allow the call.

What can you do

 Bad news: there are websites that explain HOW to do this…so your number is not safe.
Good News: There are precautions you can take.

What is Caller ID Spoofing and How can you stop it. The FCC Provides help at this link:

https://www.fcc.gov/consumers/guides/spoofing-and-caller-id

 

PepperEyes.com Self-Defense Products Store is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high-quality discount self-defense products. Survival kits and arm yourself with the knowledge about self-defense and security products and information on the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option

Advertisements

05/02/2019

20 Things You Should Know About Teen Dating Violence


February is Teen Dating Violence Awareness Month

The tragic crime of domestic violence in the United States is often unacknowledged by the public face that our society wears. Behind smiling, couples and seemingly carefree children lurk something that many thoughts was better left unspoken.  While the discussion of domestic violence happens much more often today, bringing light to this terrible crime that makes a home a prison, abuse still occurs, and, often, the children adopt these destructive behavioral patterns both as victims and aggressors

The shocking numbers

  • Annually one in four teens reports verbal, physical, and emotional or sexual abuse.
  • Almost one in five teens reports being a victim of emotional abuse.
  • Almost one in five high school age girls has been physically or sexually abused by their dating partner.
  • One of five college females will experience some form of dating violence.
  • A survey of adolescent and college students revealed that date rape accounted for 67% of sexual assaults.
  • Dating violence among fellow teens is reported by about 54% of high school students.
  • One in three teens reports knowing someone who has been physically hurt by his or her partner through violent actions which included hitting, punching, kicking, slapping, and/or choking.
  • Nearly 80% of teens believe verbal abuse is a serious issue for their age group.
  • Nearly 80% of girls who have been victims of physical abuse in their dating relationships continue to date the abuser.
  • Nearly 20% of teen girls who have been in a relationship said that their boyfriend had threatened violence or self-harm in the event of a break-up.
  • Nearly 70% of young women who have been raped knew their rapist; the perpetrator was or had been a boyfriend, friend, or casual acquaintance.
  • The majority of teen dating abuse occurs in the home of one of the partners.
  • About one in three high school students have been or will be involved in an abusive relationship.
  • Forty percent of teenage girls ages 14 to 17 say they know someone their age that has been hit or beaten by a boyfriend.
  • Most abused teens NEVER tell their parents.
  • In one study, from 30% to 50% of female high school students reported having already experienced teen dating violence.
  • In one particular year, 7% percent of all murder victims were young women who were killed by their boyfriends.
  • A survey of 500 young women, ages 15 to 24, found that 60% were currently involved in an ongoing abusive relationship and all participants had experienced violence in a dating relationship.
  • One study found that 38% of date rape victims were young women from 14 to 17 years of age.
  • It is estimated that between 20% to 52% of high school and college age dating couples have engaged in physical abuse.

The sources of these facts come from the U.S. Department of Justice, Bureau of Justice Statistics, National Center for Victims of Crime Health Resources and Services Administration (HRSA), Maternal and Child Health Bureau, U.S. Department of Health and Human Services (HHS), and other studies.

 See Also February is Teen Dating Violence Awareness Month

 

PepperEyes.com is dedicated to providing you with the best and most affordable personal protection products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for yourself, your home or your business, buy our high quality discount personal protection products and arm yourself with the knowledge of the best way to stay secure in an ever-increasing violent world. In today’s society being equipped mentally and physically is no longer an Option. Victor Swindell

28/01/2019

Password Correct..Access Granted


In this digital age, almost all of us are using a computer to access messages, social media cyber thief-hackernetworks, manage some aspects of our financial life, some other aspect of personal computer usage that puts aspects of our lives open to someone who has the key. I usually tell people not to hide their residence keys in obvious places, like under the welcome mat. The same common sense should be used is hiding the digital keys to the virtual residences of our lives. How safe would you feel is a crook has the keys to your house? The same sense of security should be taken when it comes to wanting to secure. One of the sad things is that we can unknowingly tell clues about our lives online in places like Facebook, or blogs, or ancetry.com that a thief can use to help him figure out possible passwords. If any of you have seen the 1983 movie War Games, you may remember that the Hacker was able to gain access to the system, by figuring out that the programmer used the name of his dead son as his backdoor password.

To highlight the necessity of securing your digital life should be news story accounts of security breaches at Abbot Labs,  IBM, Sony, Booz Allen Hamilton, Fox News, NBC, New York Times, Apple, Microsoft, Facebook, Twitter, Linkedin, the US Government and hundreds of other companies. These stories have exposed how insecure or unprepared these major websites and companies, to which consumers like you and I entrust their personal information really are. While we expect some level of security at a corporation, ultimately, your security is your responsibility. Unfortunately one of the side effects of this is that these stories have exposed, is just how helpless we can be. Close examination of a sample set of 40,00 username and passwords out of a sample size of over a million have revealed some interesting results.

Some analysis results:

  1. The analysis showed about 50% of the passwords are less than eight characters long. Eight characters are considered, the minimum length you should even consider when choosing a strong password.  (These passwords only take less than a minute  for a PC to crack) 2. Only 4@ percent of the passwords analyzed used at least makes use at least three of the four character types (Upper case letters, lower case letters, numbers, special characters like #|*. The vast majority only used one character type, such as all lowercase letters or all numbers.  (These passwords only take about 3 days for a PC to crack) 3.. Over 33% of the analyzed were not a random character like “qp}Edhg!13evTOI” rather than “ILikeSpock”. These analyzed passwords could be found in a common password dictionary. The most frequent passwords use included: Seinfeld, password, 123456, purple, princess, Maggie, peanut, shadow, ginger, Michael, Buster, sunshine, trigger, cookie, George, summer, Taylor, Bosco, abc123, Ashley, and bailey.  (most of these take less than a second for a PC to crack, ‘IlikeSpock’ takes about a year) 4. 67% of users had the exact same username/email and password on different systems used the same password on both systems. BAD BAD BAD

6 Simple Rules for some great passwords

  • NEVER choose passwords less than 8 characters long and that is made up solely of numbers or letters. Use letters of different cases, mixtures of digits and letters, and/or non-alphanumeric characters. The longer a password the better so strive for passwords over 8 characters long. If some systems limit the numbers of characters. It’s doesn’t have to be complex as “Picard-Delta-47-Alpha-21” or “173467321476C32789777643T732V73117888732476789764376” which would take a PC 14 octillion  years and 6 vigintillion years to crack respectively
  • Randomness is also key to a great password. NEVER choose a password based upon personal data like your name, birthday your username, or other information that one could easily discover about you from such sources as searching the internet.
  • Create a list of 10-12 such as Qy#i1827Vbsg12348()17w passwords that are random and use a password management program like 1Password or LastPass, or create and remember a password recipe or simple padding pattern.
  • NEVER choose a password that is a word (English, German, or otherwise), proper name, the name of a TV shows, or anything else that one would expect a clever person to put in a “dictionary” of passwords. Especially if it can be found it’s something you’re found of like ‘Hello Kitty’, ‘Disney’, etc
  • NEVER choose a password that is a simple transformation of a word, such as putting a punctuation mark at the beginning or end of a word, converting the letter “l” to the digit “1”, writing a word backward, etc. For example, “password,123” is not a good password, since adding “,123” is a common, simple transformation of a word. Neither is using password where you have substituted the number zero for the letter “o”
  • NEVER EVER EVER use the same password for all your logins (have at least 5).

How to Make Up a Great Password

Passwords should contain a mix of the following sets

  1. lowercase letters
  2. uppercase letters
  3. Numbers
  4. special characters !,#,$,+,%,~ etc
  5. Should be longer than 8 Characters
    1. Example the Password 1@Tf%s&E9Tewhich is based on the numbers 1-2-3-4-5-6-7-8-9-10 would take a PC 4 Thousand years to hack.

Password Levels

  • Level One – contains at least one of the character sets
  • Level Two – contains at least two of the character sets
  • Level Three- contains at least three of the character sets
  • Lever Four-contains all four character sets
  • You can Include some simple substitution like 3 for ‘e’, zero for the letter ‘O’, 1 for ‘I’, 7 to T, 2 for S

Example of how to create a good password

  1. Think of two unrelated things you like computer & socks books & dogs autumn & chocolate OR a phrase from one of your favorite movies or tv shows
  2. Join the words with a non-alphabetic character or two. (#,+,|,!..etc.)
  3. Make at least one change (for example, uppercase a letter or add another character) to one of the words (preferably not just at the very beginning or end of the password).
  • Some example passwords generated using this method:
    • C0mput3r%socks
    • B00ks #dogs
    • Autumn|choc0lat3
    • Gen3sis_Doggi3
    • 76TltbpWa110ccah# – (Seventy-six trombones led the big parade With a hundred and ten cornets close at hand.)
    • 2bo!2b_TitQ – -(To Be or Not To Be The Question)
    • I106mtC_wgaftog_hap0c_1dawws -It’s 106 miles to Chicago, we got a full tank of gas, half a pack of cigarettes, it’s dark… and we’re wearing sunglasses. Read more: Music Man – Seventy-six Trombones Lyrics | MetroLyrics
  • Books like the Bible have a great resource to create passwords as it has over 31,173 verses you can use. You can use Bible verses to create passwords like Joshua24I5$, 54Isa1ah17 *, Pr0v3rbs9_8%, J8hn316*
  • Convert from the Arabic-Hindu Number system into the Hexadecimal System so that you can say BacktoTheFuture1151955 and make it Back#T0#Th3#Future_1193D3

Biometric passwords – There is an increase of computers gives you the ability to use biometric data such as facial recognition, fingerprint, retina pattern or voice print data to generate a unique password based on your data. However, there have also been reported successful hacks for these methods.   An example of this would we be the Apple fingerprint lock, which was able to be bypassed the week it was released.

Second Key Authentication: Many systems like Facebook, Google, Yahoo, Hotmail, PayPal, and even financial institution offer second key authentication. In this method, you give the institutions your mobile phone number. When you attempt to login, the system sends a special random access code to the users mobile phone. To complete a log in the user must type in this code. Which mean they have to have your phone.

Personal Info Authentication: Many systems ask the user to select personal info questions to set up their user accounts such as the color of your first car, or mother’s maiden name, or best friend. These questions are to help users in case they have forgotten your password.  Be careful what info you select! Some information is public information or can be gathered from your Facebook profile.  For example, if your question is ‘Name of the High School you attended?’ and you are a member of the Eric Erickson High School group on facebook, then it’s not hard to answer this question.  What I can suggest is giving easy to nonsense answers like the J3di Acad3my. For example for all your selected question, put in the name of your favorite something (recording artist, fruit, book, author).  I mean if you select mother’s maiden name as your question, and typed in Mayberry.  it is highly improbable that anyone trying to hack your account will guess that.

CHANGE YOUR PASSWORD…OFTEN

Most computer security professionals recommend changing your Internet passwords and account login information at least once every three to six months. Though some debate if it is necessary, however, if you want to be safe change it at least once a year, like a month before or after your birthday and make it an annual reminder on your calendar. It may be safe for you to wait longer; it just depends on your computer habits, and how and where you surf the web. I recommend changing all your passwords at a minimum of once a year, perhaps the day after your birthday, or on New Year’s day, or the first day of spring (spring cleaning). Changing all of your Internet passwords can be a time-consuming and even an exasperating task, especially if you have lots of online accounts. But it is a sure way to guarantee a modicum level of safety; however, it is not the only safety precaution that should be considered for your login information. Whether you bank online or you are just sending a few simple emails, secure passwords are essential. You’ve heard of problems caused by hackers, who use your account to do illegal activity. There have been incidents of people not only hacking into people’s e-mail, or Facebook accounts but sending vicious messages.

 

You should avoid writing down your password or giving it to others. You should especially avoid writing it down and leaving it in a non-secured place such as on a post-it on your monitor or a piece of paper in your desk. If you absolutely must write something down (because you suffer from CRS), we suggest doing the following:

  • Don’t write down the entire password, but rather a hint that would allow you (but nobody else) to reconstruct it.
  • Keep whatever is written down in two places like a small notebook or other places that only you have access to and where you would immediately notice if it was missing or someone else gained access to it. (like in the movie Ghost)
  • Keep a list of 10 to 12 passwords of length 10 to 20 characters that you only use for 1 year, and then create new ones each year
  • Treat the not book like the One Ring – Keep it secret -Keep it Safe

TEST YOUR PASSWORD

There are several great websites that will examine your password and tell you how strong that is. Such sites include

  1. http://www.passwordmeter.com/
  2. https://howsecureismypassword.net/

However remember that hackers have tools as well, so you should have as many security measures to help reduce your chances of being hacked. Many sites link PayPal, Google, Facebook, Twitter and more have code key authentication features. You can turn these on, and when you (or anyone else) attempts to log in to your account, a numeric code is sent to your cell phone, and you need to type in that code to log in.  Sometimes it’s a hassle, especially if you lose or don’t have your phone with you.

 

NEVER EVER – TELL ANYONE YOUR PASSWORDS or LET SOMEONE KNOW WHERE YOU KEEP THEM..except in your will.

PepperEyes.com Self-Defense Products Store is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high-quality discount self-defense products. Survival kits and arm yourself with the knowledge about self-defense and security products and information on the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. Victor Swindell of PepperEyes.com is a division of Onyx Knight Enterprises.

 

08/01/2019

January is Human Trafficking Awareness Month


Imagine these scenarios:

  • You are on vacation in a foreign country with your family, you have an 8-year-old shutterstock_492622561-750x551daughter with you. You are our shopping and while you are looking at some merchandise, your child disappears.  Unknown to you, they snatched by strangers.

  • You see an advertisement for models. The ad promise that selected models can make lots of money, and travel around the world. You are required to have a passport to bring on the interview, as well as a portfolio. No experience is required  You go on the interview and are never seen again.

What happened to these people?  They became sex-slaves.  It doesn’t matter the age; it doesn’t matter the gender. Almost, anyone could become a sex slave. Some people are abducted, some people are forced into it, some are sold into the business by their own families.

I’ve seen documentaries filmed in poor countries where families would pimp their young children to earn money to live. Don’t think it doesn’t happen here?

 

Here are the facts about this crime!

  • In 2014, Sex trafficking was a lucrative industry making an estimated $99 billion a year.
  • A 2012 report estimated that at least 9 million adults and children are bought and sold worldwide into commercial sexual servitude, forced labor, and bonded labor.
  • A 2005 UNICEF report estimated that about 2 million children are exploited every year in the global commercial sex trade.
  • According to a 2016 UNODC TIP Report, 54% of trafficking victims are trafficked for sexual exploitation.
  • The same UNODE Tip reported that Women and girls make up 96% of victims of trafficking for sexual exploitation.

One website I found had the following…

Sex is not the only motive for human tracking, modern-day slavery is another. It is estimated that there are over 40 million people who are trapped in this condition, even in the United States.

The terms Human trafficking and modern-day slavery are both umbrella terms – often used interchangeably – that refers to the exploitation of people through the means of the use of threats or use of force, coercion, abduction, fraud, and/or deception. Human trafficking includes the practices of unpaid forced labor, debt bondage, cheap domestic servitude, forced marriage, sex trafficking, and the recruitment and use of child soldiers, and other forms. The most common forms of exploitation are cheap forced labor, which, according to the International Labor Organization, impacts 24.9 million people a year – 16 million in private sector exploitation, 4 million in state-sanctioned forced labor, and 4.8 million in sex trafficking – and forced marriage, which enslaves 15.4 million individuals. The ILO estimates that forced labor generates $150 billion in illegal profits each year.

Trafficked persons may be forced or coerced to work in a variety of settings, both hidden and in plain sight. Some examples include factories, “sweatshops,” fields, brothels, “massage” parlors, online escort services, on street corners, as child soldiers, or in private homes. The most common industries associated with the trafficking in persons include agriculture, construction, garment and textile manufacturing, catering and restaurants, domestic work, entertainment, and the sex industry.

While human trafficking spans all demographics, trafficked persons most often come from positions of vulnerability. Those most vulnerable to trafficking include: Prior to their trafficking situation, individuals may:

  • Come from a low socio-economic background.
  • Be homeless or have run away from home.
  • Be a political, cultural, or ethnic minority.
  • Be an immigrant (legal or illegal)
  • Have a history of sexual abuse, rape, or domestic violence
  • Be in a foster care system
  • Have been subject to natural disasters, conflict, or political turmoil

 

These vulnerabilities are the result of policies and practices that marginalize entire groups of people and make them particularly susceptible to exploitation. Traffickers use these vulnerabilities to their advantage and use a number of tactics to establish control over victims.  One tactic is to threaten to have them deported.  Other methods include the use of violence, isolation, threats, deception, manipulation, debt bondage, prospects of education, and romance. Traffickers may operate alone with one or many victims or may be a part of an extensive criminal network. Examples of trafficking rings include gang members, family members, pimps, business owners, or smugglers.

What you can do

Remember this is a multi-billion-dollar industry. If you do anything that can disrupt someone money, it could cost you your life. Do not at any time attempt to confront a suspected trafficker directly or alert a victim to your suspicions. Your safety, as well as the victim’s safety, is paramount.  Instead, please contact local law enforcement directly or call the tip lines indicated on this page:

  • Call 1-866-DHS-2-ICE (1-866-347-2423)to report suspicious criminal activity to the U.S. Immigration and Customs Enforcement (ICE) Homeland Security Investigations (HSI) Tip Line 24 hours a day, 7 days a week, every day of the year. The Tip Line is accessible outside the United States by calling 802-872-6199.

  • Submit a tip at ice.gov/tips.  Highly trained specialists take reports from both the public and law enforcement agencies on more than 400 laws enforced by ICE HSI, including those related to human trafficking.

  • To get help from the National Human Trafficking Hotline (NHTH), call 1-888-373-7888 or text HELP or INFO to BeFree (233733). The NHTH can help connect victims with service providers in the area and provides training, technical assistance, and other resources. The NHTH is a national, toll-free hotline available to answer calls from anywhere in the country, 24 hours a day, 7 days a week, every day of the year. The NHTH is not a law enforcement or immigration authority and is operated by a nongovernmental organization funded by the Federal government.

 

PepperEyes.com Self-Defense Products is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high-quality discount self-defense products. Survival kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. Victor Swindell

 

 

 

 

 

 

05/01/2019

January is National Personal Self-Defense Awareness Month.


January is National Personal Self-Defense Awareness Month.

 

 What would you do if you suddenly came face-to-face with a criminal or you felt Pepper-Spray-for-Security-of-Womenthreatened? You have two options Do something (Fight or Flight), or Do noting (be a victim).

If you look at the FBI Crime statistics you can see that it is only a matter of time that you can be targeted. In these times, it is very likely that you’ll be a target. Crime can happen to anyone, anyplace and at any time.  One crime not listed are sexual assaults, which happen every 98 seconds, according to RAINN. Will you know what to do when you find yourself in these situations? Are you prepared with the tools, knowledge, and skills to protect yourself and your loved ones when the need arises?

This month is dedicated to educating citizens, especially women and teens about realistic self-defense options that could very well save their lives. The aim is to emphasize that being totally prepared by raising your awareness, reducing your risk of being a victim. This, however, is only 90 percent of the equation. The other 10 percent of your safety is purely physical. The total package is aimed to make you more alert and more aware that to the fact that the key to their own safety lies within you.

Despite the recent reports that crime has dropped the following statistics have remained almost constant.


19ca1c2c-7ee2-493a-9fa4-9bb555bc66e9

 

When the time comes, instead of being paralyzed with fear, you can be empowered with the right knowledge and the correct tools to STOP a potential life altering event if you buy the right protection and, arm yourself with the knowledge of how to protect yourself and guard your property.  Don’t let some offensive criminal behavior negatively impact your life.

The best way of protecting yourself is through personal self-defense education and training. Self-defense is not always about FIGHTING back.  Mr. Miyagi said in one of the Karate Kid movies  ” Best way to avoid punch, no be there.”  Your best way to avoid being a crime victim is to apply quick thinking and de-escalating methods to the situation in order to get away. Criminals feed off of vulnerability so stay alert to avoid becoming a statistic.  Did you know that approximately a large percentage of crime can be easily prevented?
How?  By being prepared.  By being alert! By being ready!
Survivors of rape and domestic violence will probably agree that avoidance is much easier than recovery.

Where to begin

  •  Learn to do smart things that will keep you safe.
  • Make it a point to enroll in a local self-defense class. Your local police can probably tell you about free classes.  While you are at it, take some friends with you.
  • If you are a College Student, see if your campus offers RAD Classes
  •  If you can’t avoid a situation, having the right self-defense product, and knowing how to use it correctly can allow you to escape.

PE_Banner_SelfDefense1

PepperEyes.com Self-Defense Products Store is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high-quality discount self-defense products. Survival kits and arm yourself with the knowledge about self-defense and security products and information on the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. – Victor Swindell

Additional Resources

Next Page »

Blog at WordPress.com.

%d bloggers like this: