Surveillance cameras in public spaces are getting smarter…

CCTV Cameras in some major US cities are capturing private citizens’ faces in real-time.

Surveillance capitalism in the United States has been steadily evolving in the United States over the last ten years. Since the invention of social media and the rise of ubiquitous outdoor CCTV surveillance systems in major cities, private individuals are becoming more and more visible to anyone who knows where to look, and how to access the images. Now, the announcement that certain American cities are ostensibly planning to install real-time facial recognition software for their external CCTV systems has civil liberty groups in a uproar.

The “authoritarian potential,” as it was denoted in a recent article by WIRED, began in China, with many activist groups condemning the country’s use of facial recognition software to flag suspects who are caught on the cities’ external candid cameras. However, according to WIRED, Georgetown researchers released a report last week that cities like Chicago and Detroit have purchased this software for their CCTV surveillance systems. In addition to the fact that both cities deny current use of this software, there is no federal or state law that would prevent them from doing so.

The technology is innocuous enough. It’s the same technology that allows personal smart devices like iPhones, desktops, and laptops to have security protocol that prevents someone who is not the user from accessing the device. Image recognition software has been used by law enforcement for years to catch criminals, but experts are saying this level of sophistication in technology can create a troubling landscape in which a private individual’s anonymity in public spaces is threatened—experts like Evan Selinger, a professor at the Rochester Institute of Technology, “Historically, we haven’t had to regulate privacy in public because it’s been too expensive for any entity to track our whereabouts.” With the rise of a surveillance capitalism, those days are over.

For civil liberty groups, the premise of this software being used to catch criminals does little to overshadow the specter of Big Brother hanging over them. Experts and activists alike call into question the accuracy of the software, and what effect any inaccuracies will have on persons of color and other private, non-suspect individuals who are minding their own business in a public square. They’ve also called attention to the use of such real-time facial recognition systems on police work, saying technological biases in biometric surveillance will lead to flawed investigations, and resources wasted on faulty leads generated by the systems. In one instance, actor Woody Harrelson’s image was uploaded into the system with the intention of identifying potential suspects who resemble him.

It is difficult to ignore the potential good a system like this could do in cases of missing persons or child abduction. CCTV footage is constantly being utilized by law enforcement to recreate a person’s movements in order to find answers—just recently, CCTV footage was used by Houston law enforcement to investigate the claims of a missing 4-year-old’s stepfather, who says she was kidnapped by two men after he was ambushed on the side of the road. He’s now being held on a $45,000 bond after the CCTV footage outside their Houston apartment directly contradicted his story.  

Despite the concerns surrounding this evolving real-time facial recognition technology, one thing is certain: Legislature at all levels of government must have an eye on this technology and its capabilities, bearing in mind that misappropriation could have disastrous consequences to private citizens who are innocent of any wrongdoing.  Without rules or regulations to dictate how the technology should be used, cities in the United States could become vulnerable to what has been denoted as a potentially authoritarian practice, eroding our privacy, and threatening our liberty.

5 Cyber Security Measures Every Business Needs

5 Cyber Security Measures Every Business Needs

Cyber criminals are evolving at an alarming rate. Cyber-security product developers are on an infinite loop with felons, each trying to out fox the other with regards to data breaches. Security is absolutely necessary for brick and mortar establishments due to a myriad of reasons, but in 2019, the name of the game is cyber-security. Not only are data breaches an efficient way to steal trade secrets and financial information from businesses, but they can also be done remotely. A proficient hacker or scammer can access a company’s vital company information from halfway across the world, and from that same location, can devastate the company. Within minutes, they can access financial information, trade secrets, distribution and delivery schedules, and private customer information. To prevent this from happening to your business, here are 5 cyber security measures every business should have:

Iron-clad Passwords

This is Internet 101. Since the birth of the World Wide Web, we’ve been educating adults and children alike on the importance of having a strong password to access online accounts. Whether it’s a company’s financial information, or a Grubhub app on an executive’s phone, thieves can crack weak passwords to gain access. As such, it’s important passwords never contain personal information about an individual, especially if that information is visible on social media. Parents often include the name of their kids in their passwords, using their dates of birth for any numerical value requirement. Teens and young adults use the name of their favorite animal, sport, or music artist. Another common tactic is using common words that are easy to remember, and then spelling them backwards for a false sense of security. Experts at the National Cyber Security Alliance also do not recommend using sequences of characters that are near each other on the keyboard, such as “QWERTY,” the first six characters of the keyboard. The current recommended length for strong passwords is between 8-12 characters. If you’re unsure whether or not you password is secure, use an online password checker to verify the passwords level of  cyber security.

Fortified Firewalls

Firewalls have been around almost as long as passwords. Firewalls are shields that protect your business from harmful or insidious traffic. When you connect to the internet, the system is constantly communicating with the wireless network, both sending and receiving units of information known as packets. Firewalls monitor these packets and perform a risk assessment, blocking unsafe packets. These firewalls protect your company’s data from unauthorized remote access by criminals.

Antivirus Protection

Roland Cloutier, the Chief Security Officer for ADP, calls antivirus software “the last line of defense” when protecting your company’s data from hackers and other cyber-criminals. Not only can remote criminals access and view a company’s vital information, but they can also install vicious malware that will copy the target’s hard drive, and subsequently render the machine inoperable. Installing anti-virus and anti-malware programs aren’t enough, though. These programs need to be updated regularly as part of the infinite loop mentioned earlier. Every time a criminal finds a way to bypass an anti-malware product, the product requires changes to combat those breaches.

Laptops and Mobile Phones

It’s important to secure laptop computers and mobile smartphones associated with your business. For this, experts recommend encryption software so any remote felon attempting to access or copy the hard drive cannot do so without the proper password. They also stress the importance of never leaving these devices in ones vehicle, where they are easily accessible to thieves. “Lock-out” options are also standard for these devices in 2019. This setting allows you to establish a time period during which the phone lies idle. After that period expires, the phone locks itself, preventing anyone from accessing it without the password. Smartphones and laptops with remote-wipe features must be enabled. This way, if your device falls into the wrong hands, you can remotely wipe the device and prevent the leak of sensitive company information.

Employee Education

Last, but never least, it’s important your workforce is educated on the security measures in place and regularly enforces them on a day-to-day basis. Companies often neglect employee education under the false impression their IT team will be able to resolve all issues whenever they arise. The fact is, even IT professionals cannot anticipate every cyber threat, and may not be up-to-date on the very latest in cyber-criminal tactics. An ounce of this education is worth a pound of cure—Despite the level of technology literacy in the United States in 2019, an employer or business owner cannot assume an employee’s level of security knowledge. The prevention starts with employees, providing them with an intimate knowledge of company operations and how cyber security measures protect them. 

Regardless of your company’s industry or size, all businesses must update and maintain their cyber security. An ounce of prevention is worth a pound of cure when criminals can bypass cyber security, and devastate a company in minutes.

Phishers Want Your Direct-Deposit

Phishers Want Your Direct-Deposit

money lockedThe invention of direct-deposit payments in electronic banking have likely saved companies millions of dollars over the years in labor hours, materials, and fees that previously caused problems for companies. However, in an age where your paycheck is sent automatically to your checking account, phishers are seeking to exploit this automation for personal gain.

The Internal Revenue Service has reported an upswing in various types of fraud that directly target a company’s payroll. While the ruses come in many forms, one of the most popular is phishing emails disguised as legitimate correspondence from an employee or upper management. It’s always an instruction to alter payroll information so that funds would be rerouted to the scammer’s bank account. Once the deed is done, the money is withdrawn and the company is responsible to replace the missing funds. While the FTC and the IRS are constantly reevaluating their strategies for containing these types of fraud, this particular scheme is hard to detect and often goes unreported. The email can outsmart security measures set down by the company or within a company’s email server, and scammers take amounts that can just be written off as unfortunate missteps on behalf of personnel.

Frauds such as these have gone through an evolution as security technology becomes more sophisticated and what we know about internet culture continues to grow. Internet frauds used to be about volume and inattention to detail—thus the birth of phishers, who sent emails rife with spelling and grammar mistakes out to mile-long email lists, casting a wide net throughout the web. Education about fraud has forced scammers to be more cautious. Today, companies who have seen this scam in its newest form remark that these phishing emails look so authentic that there may not be a question in their mind before obliging their request. Security measures that have risen from the nucleus of electronic banking combat wire fraud every day in the United States. Large sums in wire transfers now throw up giant red flags. Phishers and scammers are getting more bang for their buck by taking smaller amounts with more frequency, lurking below the radar. This does not require sophisticated hacking skills. Just the ability to open a Gmail account. Phishers make the account look cosmetically convincing, then throw out the lure. One of the most targeted entities is non-profit organizations, because of the benevolent nature of their business. The idea of someone ripping off a charity or relief organization is horrifying, but the simplicity of scams like this make the opportunity too lucrative to pass up.

It’s frightening how simple the fraud is to pull off, but there is recourse for businesses who are vulnerable to such a scam. One of the non-profits who fell prey to this scam was KVC Health Systems, an agency for child welfare in Kansas City. Their IT director, Erik Nyberg, says it starts with comprehensive education on company procedures, “The CEO is never going to email you out of the blue and ask you for any deposit changes. And if you have any sliver of a doubt, call the person who is making the request.” He goes on to discourage executives and upper management employees from using their personal email accounts to send staff correspondence, and to set email filters that will catch suspicious incoming messages. Social media managers are also cautioned against posting any company information to their pages that could serve to bolster a phisher’s credibility.

If your business has been the target of this wire fraud scam, you are encouraged to report them to the Federal Bureau of Investigation’s IC3 tip line.

Predators Use Online Gaming to Groom Minors

Predators Use Online Gaming to Groom Minors

predators online gaming

Advances in technology are constantly changing the dialogue about how we protect our children from potential predators. Over the last decade, parents have had to reform their strategy when it comes to protecting their child in the real world. Before, parents cautioned their kids on stranger danger, special code words, and remaining aware of their surroundings in public. In a new era of unfettered internet access through multiple smart devices, parents had to contend with the real world being brought into their homes, with predators targeting their children through social media. Now, it appears parents will yet again have to add some new pages to the playbook when it comes to protecting their children from predators on video game platforms with integrated social networking.

Parents with children between the ages of 12-25 will likely be familiar with the online first-person shooter video game known as Fortnite. In the game, 100 players at a time compete to be the last one standing in a battle-royale style of combat. The game features a chat feature allowing players to communicate in team efforts and other uses. It has great potential to foster team building and cooperation between young people, but also has a dark side recently illuminated by an arrest made in Florida in late January.

Authorities arrested 41-year-old, Anthony Thomas, a man who allegedly used Fortnite’s instant-messaging feature to groom over 20 minors, including a 17-year-old, with whom law enforcement allege he had a sexual relationship. The Florida Attorney General’s Office also stated Thomas has been charged with 22 counts of possession of child pornography, and other charges related to his unlawful sexual relationship with the minor. Investigators uncovered he groomed the minors by sending them gifts—including a cell phone so their communication could remain more private.  Ashley Moody, Attorney General, remarked about the predation perpetrated, “This case is disturbing, not only because it involves child pornography, but also because a popular online game was used to communicate with the victim.”

Grooming is defined as “a process by which a child predator gains the trust of a victim by building a relationship with the child and then breaking down his or her defenses.” Once a predator has earned their trust, they begin exploitation. Minors who are groomed in the gaming community are particularly vulnerable because the predator may literally be on their team. Cooperative play between players fosters a healthy, “there’s no ‘I’ in TEAM,” mentality, but predators use this relationship to manipulate the minor.

One of a predator’s greatest weapons when grooming a minor online is pop culture. The predator—perhaps unlike the minor’s parents—shows their target they’re “hip and cool”, and are able to converse at their level about something they enjoy. This causes the minor to lower their guard, and the predator begins their manipulation game, culminating in the exploitation of said  minor. Online gaming is becoming so ubiquitous predators have developed a way to sense when a minor’s gaming is suddenly being supervised. The moment a minor’s behavior changes—they stop responding to messages, or do so uncharacteristically—the predator can pick up on that and cease all communication before they’re caught.

Unfortunately, even if a parent is supervising the communication between their minor child and other players online, it doesn’t mean they cannot be groomed. In the grooming process, between the introduction and the beginning of the exploitation, predators often suggest moving their communications to a third-party app, like What’sApp or Snapchat. These are apps where communications disappear with ease, and a parent performing their due-diligence in supervising their child’s internet safety may not notice, or even know how to access. TeenSafe says it’s critical parents learn to recognize the signs of grooming in their minor child.

Signs of Groomingpredators and online gaming

  • Your child wants to spend more time online or playing games on a console, but won’t tell you why.
  • Your child does not want to discuss what he or she does online, or what websites he or she visits.
  • You notice your child is using inappropriate language he or she would not have heard within your home or at school.
  • When you walk in a room, your child quickly changes the computer screen, mutes the volume on their gaming console, or turns it off all together.

Fortnite and other games with similar messaging platforms have been on law enforcement’s radar for the last few years as the instances of these cases continues to grow. In August of 2018, Titania Jordan, a digital safety expert, appeared on The Doctors to provide parents with helpful tips—not just for supervising their children’s gaming—but also for establishing boundaries that can nip grooming in the bud.

  • Do not allow minors to have computers, game consoles, or tablets in their room without supervision. Keeping these devices in common areas will increase visibility and deter predators from targeting them.
  • Instruct your child to never reveal any personal information about themselves to people they’ve met online, especially very specific information, such as where they live or where they go to school.
  • Create a culture of openness in your home where children feel comfortable coming to you if they feel uncomfortable about an interaction they’ve had online.

People of all ages play video games, but the vast majority of players are either minors or young adults, and parents often find themselves overwhelmed with the strange new world of online gaming. Titania Jordan reminded parents knowledge is power, recommending they verse themselves in the games their children play. This can only heighten your ability to detect when something is off. This means doing research online, and actively listening when your children describe normal gameplay behavior.

Having an internet connection in your home may feel like you’re inviting predators into your home. And true, there’s no time to supervise every single activity your child does online. This is why it’s so important to nurture an open line of communication between parent and child. Not only will parents be able to sense when something is amiss in their child’s online interactions, but a strong bond between parent and child makes it less likely that an online predator will be able to isolate the child emotionally and manipulate them for the purposes of exploitation.

Virtual Kidnapping incidents on the rise

Virtual Kidnapping incidents on the rise

KidnappingYou receive a phone call and hear the voice of someone you don’t recognize. They tell you they have your child and will kill them unless you pay a ransom – they direct you not to call police or you will never see your child again.

What would you do?

You tell the person on the other end of the phone not to hang up. You don’t want to disconnect with the one person that can reunite you with your child. You plead for your child’s safe return. “Please don’t hurt her. I will do whatever you want,” you say. And, you would!

They demand you go to the bank and wire a ransom of several thousand dollars. Do you call the police? Do you pay the ransom and hope the thug will return your child to you safe?

A child going missing is every parent’s worst nightmare, and for those who do have a missing child – living with such ambiguity is said to be the most traumatic of human experiences.

Sounds like a situation that only happens in the movies, right? Or, something that only happens to the wealthiest people in society.

The Federal Bureau of Investigation (FBI) has declared virtual kidnapping a violent crime and issuing warnings to parents that scammers are targeting parents and demanding a ransom in exchange for the safe return of children they kidnapped . . . well, virtually kidnapped. Police throughout the country are following suit, issuing warnings in their communities.

Police throughout the country are following suit, issuing warnings in their communities.

 

kidWhat is a Virtual Kidnapping?

A virtual kidnapping scam is an attempt to dupe victims into paying a quick ransom. The virtual aspect of the scam involves staging a scene on the phone to convince a person that a loved one has been kidnapped, following with a demand for ransom.

According to the FBI, “The success of any type of virtual kidnapping scheme depends on speed and fear. Criminals know they only have a short time to exact a ransom before victims unravel the scam or authorities become involved.”

Typically, the scam is executed by calling a victim claiming they have kidnapped a loved one, then demand a ransom in exchange for the loved one’s safe return.

Valerie Sobel is one such person who did receive a call from a person who said, “We have your daughter’s finger. Pay up or you’ll get the rest of her body in a body bag.”

Petrified, Sobel rushed to a money transfer location to pay the ransom, wiring $4,000 to the person who claimed to have kidnapped her daughter.

Valerie made many frantic phone calls to her daughter’s cell phone and after many hours had passed, her daughter Simone called her back totally confused but safe.

Basically, scammers call random numbers hoping to find a person who they can convince, while other times these scammers research Facebook and other social media platforms for names and numbers. If a scammer calls 100 people, chances are at least one will instantly pay.

Another way it may go down is a scammer calls you and you hear a child crying, “Mom, please help me.” Panic immediately sets in. You think it is your child. Then a man’s voice comes on the phone and calls you by your first name. This legitimizes the caller and you immediately ask them to just tell you what they want. What mother would not empty her bank account in exchange for her child’s safety.

If you don’t think you could become a victim, please read on.

 

chedVirtually Kidnapped Daughter

According to the Washington Post, Wendy Mueller lives in historic Leesburg, Va., and never thought she would become a victim of a virtual kidnapping scam.

One afternoon, while standing at her kitchen sink, she received a call from a number she did not recognize but answered.

She heard screaming and it sounded like her 23-year old daughter’s voice begging for help.

Then a man’s voice tells her, “we have your daughter.”

The caller told Mueller to put her phone on speaker, get her purse and phone charger and get into the car.

The man asked, “How much cash can you get right now?”

$10,000,” Mueller replied.

The man told her not to contact anyone for help or they would kill her daughter.

Mueller’s daughter attends college hundreds of miles away and she had no way of knowing her daughter was safe.

“They told me they were actually targeting someone else, someone they would be able to get a lot of money for. But they said my daughter intervened when they tried to grab him. And that sounded exactly like something she would do,” Mueller said.

“I was terrified,” Mueller continued. “They told me they wouldn’t hesitate to kill her.”

The caller had told Mueller he had hacked her phone and knew every move she was making. For hours, he told her to go to small stores and offices across Northern Virginia, where she wired the max amount of usually $1,900 each time to names and addresses in Mexico that the caller had given Mueller.

Mueller cross-crossed the state following his directions and making payments, until nightfall came.

Mueller had kept asking to speak to her daughter.

“They kept promising me: ‘As soon as you send the last one, you will talk to her,’” Mueller said.

The caller told Mueller he was a professional and part of a group of kidnappers – a huge organization – who do this all the time and kill.

The man told Mueller they had placed a set of headphones on her daughter so she could hear everything, so her daughter would know if her mother did anything to cause her death.

Mueller thought of stopping passersby but didn’t want to chance the kidnapper knowing.

“It was torture,” Mueller said.

As it turned out, her daughter was in class, safe and sound. Mueller had been scammed.

 

No one is immune

Thousands of families throughout the country have become targets of these malicious scammers.

According to FBI kidnapping expert, Agent Eric Arbuthnot, several organizations use these scams regularly to make money.

“Thousands of dollars in ransom,” said Arbuthnot. “And you’re talking about a criminal organization that is capable of doing more than one kidnapping at a time.”

According to Arbuthnot many of the cases have been happening on the West coast and along the border involving criminal organizations from Mexico, some claiming to be members of the cartel.

The FBI has seen recent increases in California, Nevada, New York, and Texas and increasing on the east coast.

Monroe Police Department in Connecticut said by using social media, scammers can identify a victim, look up relatives, and reference names of family members and friends to make the call appear legitimate.

FBI Supervisory Agent Christopher Johnson said his office in St. Louis, Missouri, deals with these types of crimes. “Scammers will often mention specific facts about the parent or victim, likely from information they were able to obtain online.”

Authorities say about one in five kidnapping cases are successful resulting in the criminal getting their ransom and not getting caught. While extortion has been around for decades, virtual ransom kidnapping calls are increasing around the country.

With this emerging scam, the FBI has launched a nationwide campaign to warn parents to fight back against “virtual kidnapping.”

 

guyIf you receive a virtual kidnapping ransom call

Unlike traditional kidnapping schemes, a “virtual kidnapper” has not actually kidnapped anyone. According to Federal Bureau of Investigation, if you receive a call from an individual demanding a ransom for the safe return of a kidnap victim, it is suggested you quickly evaluate the following to determine if you are receiving a legitimate ransom call:

  • Caller insists you stay on the phone.
  • Call does not come from your child’s cell phone.
  • Caller tries to stop you from contacting the kidnap victim.
  • Call includes demand for ransom to be paid via wire transfer.
  • Ransom amounts may decrease quickly.

Knowing what to do

Police say it is best to hang up the phone but:

  • If you engage the caller, don’t call out your loved one’s name.
  • Deliberately try to slow the situation down and ask to speak to your child directly.
  • Ask “proof of life” questions like, “How do I know my loved one is okay?”
  • To gain confirmation if your child is an actual kidnapping victim, ask questions only your child would know such as the name of a pet.
  • Listen very closely to the voice of the person speaking, if possible record the call.
  • If possible, have someone else try to call your child’s cell phone, school, by text, social media, etc., to confirm their safety.
  • To buy time, repeat the caller’s request and tell them you are writing down the demand, or tell the caller you need time to make arrangements.
  • Don’t agree to pay a ransom, by wire or in person.
  • Don’t deliver money in person.
  • Immediately call your local FBI office and police.

According to the National Crime Information Center (NCIC), as of March 31, 2017, there were 86,618 active missing person cases in the FBI database, with 8, 792 entered as involuntary.

Experts agree that an actual kidnapping with a ransom demand is quite rare but all experts urge parents to be vigilant.

To read the FBI warning, please click here.