How easy would it be to kidnap a child in a crowded place? Maybe the park, walking home from school or even sleeping in their own bedroom. Over again, we see parents of missing children making pleas for the safe return of their children on the news. We see the Amber Alerts and Facebook posts and immediately picture our own children’s faces, thinking “What if it happened to me?” A common reaction to something so traumatic.
A young child becoming the victim of a predator is every parent’s worst nightmare, but the fact is, it is happening every day to parents throughout the country and our own fears do not wane just because our children are getting older.
I am a parent of four grown children and a mother who has worked in the field of missing persons for over 25 years. Every day I interacted with parents who were desperately searching for their missing child. Their pain unimaginable. Very quickly I realized the crime of abduction does not discriminate based upon a child’s age.
Commonly, we think of small children when we hear the word kidnapping and we think as our children age, they are safer, but the fact is, they can become even more vulnerable as they approach adulthood.
While teenagers are venturing out, without the protective eye of a parent, there is even more chance they can cross paths with a potential kidnapper. It is our responsibility as parents to guide our children throughout their lives and hopefully provide them with some tools that will keep them safe.
According to the National Center for Missing & Exploited Children (NCMEC), approximately 800,000 children are reported missing each year in the United States. That number accounts for nearly 2,000 per day.
The Federal Bureau of Investigation (FBI) estimates a relatively small number, approximately 115 of those missing children are abducted by strangers and listed as an “involuntary” abduction in the national database of missing children. However, this number does not account for children (to include teens), who are listed in the FBI National Crime Information Center (NCIC) in various categories such as “Endangered Missing,” “Runaways” or “Other.” Many of these disappearances are considered “long-term” with more than a year having passed with no resolution or explanation as to how or why the child disappeared. The fact is, we just don’t know, therefor accurate statistics impossible.
One thing we all can do as parents is prepare our children. Much of the following information and tools have proven to save lives.
- Communicate with your children
Predators do not look like the “Boogieman.” Strangers look like everyone else. Children need to understand that everyone is a stranger, even women and seniors. It is not about being unsociable, explaining this is about being cautious.
- Agree to a code word
Strangers have no business asking a child for directions or a lost pet. Many times, a predator will try to coerce a child into coming with them voluntarily without causing a scene by telling them they were sent by their parents to pick the child up. Agree to a simple “code word” like “Giraffe” or “Cheetos” that your child can remember and tell them to only trust an adult who knows the code word.
- Walking Away
Children should be taught to trust their instincts and walk away if a stranger approaches them. Though not all people are dangerous, it is always more important to be safe than being polite.
- Don’t put your child’s name on personal items
Children will tend to trust others who know their name. Never put your child’s name on personal items such as clothing or backpacks.
- Just scream
If approached, children should be taught to scream and run. Reassure your child the likelihood of being approached by a stranger is minimal but should it happen, to scream “This is not my dad” or “Fire” while running away.
The stakes are high when a child becomes the target of a predator. It really is a matter of life or death. According to the FBI, statistically when a child is abducted by a stranger, the likelihood of recovering them alive diminishes with each hour that passes.
When a predator has targeted its prey, survival depends upon fighting back. For example, if approached with a knife or gun and told to get in a car, statistically the child or teen have more of a chance surviving if they fight back at the initial crime scene. Survival rates drop when a child is transported to a second crime scene.
As children get older and spend more time away from parents, it is important to communicate openly with them. They need to know the dangers and reality of abduction without feeling fear which can be paralyzing.
- Not alone
Children should never answer the door when home alone or answer the phone and tell the caller their parent is not home.
- No compromises
Use the “Buddy System” and teens should always inform their parents where they are going and with who. No compromises.
- No shortcuts
Children should avoid shortcuts through empty parks, fields, and alleys. It is better to always remain in a well populated area to be safe.
- Life-saving technology
Use a GPS on their phone. There are free Apps such as Life 360. The App can be loaded on both the child’s phone and the parent’s phone and track location. Personally, my children are all grown with their own families now but my daughter and I both use Life 360 to keep tabs on each other. Though teens may demand their space, their safety trumps the right to privacy.
Remember, promote a home atmosphere that is open so kids can let you know what is going on in their lives. It is important to help them to have an understanding and confidence you want the best for them. Thomas Lauth has been in the private investigation industry for over 30 years, and in the cases of missing children, he stresses the importance of communication between parent and child, “We often get calls for missing children and teens. Once located and reunited with their families, we often educate parents or caregivers on tenets that would prevent this from occurring again. Regardless of circumstances, the most important thing is communication. Not only open and honest communication between parent and child, but communication safety concerning things like social media. In a world where young people are glued to their devices, it’s paramount that they remember to have awareness of their surroundings. Communicate, Educate, Communicate.”
Teaching children techniques to avoid an abduction
The window of opportunity to save oneself from danger might be seconds and children need to feel confident enough to make a split-second decision. In addition to coercion, abductors use intimidation. There are some techniques you can practice at home to build their self-confidence should they ever be face to face with a kidnapper.
- Practice yelling “Stop, Stranger” or “Fire” to draw attention and yell as loud as they can.
- Practice the Windmill technique which means rotating arms in a big circle so a potential attacker can’t get a good grip.
- Practice the Velcro technique by having your child grab and hold onto something, not letting go. They should also learn to scream while doing this.
If a child is abducted and somehow placed in a vehicle, they should know they need to take any opportunity they can to escape while trying to keep a cool head.
- Children should be taught not to be passive but proactive.
- Try to open the passenger side door quickly or jump in the back seat and try to escape through the rear doors.
- If placed in a trunk, they should be taught not to panic but to look for the “release” that opens the trunk upon pulling on it. Tear all the wires to the tail lights and brakes if possible.
I know this is a very serious and scary topic and just the thought of having to explain to an innocent child that some people are out to hurt them is incredibly uncomfortable, but when teaching others about fire safety, Benjamin Franklin said, “An ounce of prevention is worth a pound of cure.” It applies throughout life.
Kym Pasqualini is the founder of the Nation’s Missing Children Organization and the National Center for Missing Adults and worked with law enforcement and families of missing persons for over 25 years. Kym continues to work with media nationwide to raise awareness of missing children and adults.
According to the Bureau of Labor Statistics, as of 2010, there were over 34,7000 licensed private investigators operating throughout the United States. The Bureau projects by 2020, the figure will increase twenty percent—resulting in almost 42,000 PIs. Though they may be great in number, you may never spot one, because private investigators have a unique set of skills allowing them to blend in with all walks of society.
When the average person thinks of a private investigator, it often evokes a handful of stereotyped images. Sherlock Holmes is one of the most famous private investigators in the global lexicon—even if he is fictional. In the United States, the film noire genre gave average citizens a staple look for PIs; long, tan trench coats, matching fedora hats, toting cameras with obnoxiously long lenses. More contemporary private sleuths are often thought of as being clad in all black and wearing dark sunglasses. Because these images have permeated American culture, a private investigator fitting any of these descriptions can instantly have their covers blown. With a surge in surveillance culture and the ubiquity of technology and social media, private investigators in the 21st century must modify their investigative methods to adapt to a world where everyone is watching.
Close, But Not Too Close
Even in a world where individuals often have their eyes glued to a screen, it is easier than ever for a private investigator to have their cover blown while in the field. Rise in the saturation of crime coverage in both local and national media has citizens paying attention to their surroundings more than ever, especially when walking to and from their vehicles, and when developing a home security system. Despite concerns about the proverbial “Big Brother,” invading human privacy, the U.S. began to appreciate surveillance technology as a nation after a CCTV camera captured the perpetrators behind the Boston Marathon bombing in the summer of 2013. Law enforcement investigating the tragedy were able to identify Tamerlan and Dzhokhar Tsarnaev in a crowd of thousands, tracking every move they made until the fateful moment when they planted the two homemade pressure-cooker bombs killing three people and injuring hundreds more.
In 2018, the nation saw a rise in law enforcement agencies utilizing drones in their investigations, leading to a new wave of outrage and concern over the violation of privacy and spying. As of December 6th, over 900 law enforcement agencies were reported to use drones in their casework. This heightened awareness in the American population has forced private investigators to redefine their standards for proximity to a subject. Of course, a PI must be close enough to properly observe the subject, and despite their benefits, long camera lenses outside of large events inundated with press can just as likely be the aspect that blows a private investigator’s cover. Being too close to a subject can provoke them to confront the investigator and compromise the entire investigation. This obliterates future opportunities for surveillance and collection of evidence, as the subject will be on high-alert.
Do Your Homework
Prior to a stake-out or any form of field surveillance, private investigators must conduct extensive research about the area in order to move fluidly and avoid detection. Study of local businesses and restaurants can inform a private investigator what the public will be doing in the area, and increase their chances of successfully blending in with a crowd. In order to keep a low profile, PIs must place themselves in the mindset of a local. Places like coffee shops, restaurants, or shopping malls can be ideal places for surveillance, as there are built-in explanations for a person sitting or milling about without purpose for extended periods of time. In situations where this is not the case, it’s important for the investigator to have a method for making themselves appear occupied to cover their presence in an area. Luckily, a person staring at their phone for large blocks of time will raise no alarms with the subject or anyone else. Books, laptops, or accompaniment by an associate for “lunch” are also tried-and-true covers. Many private investigation periodicals recommend conducting as much online research as possible prior to surveillance in order to limit exposure. This means searching public databases, combing news articles, and scraping social media to arm oneself with as much information as possible.
Blending in is the name of the game when you’re a private investigator.
As mentioned above, everyday citizens are more hypervigilant than ever. Subjects with a history in the criminal justice system or with law enforcement will be even more so. As such, the concept of tailing a subject is becoming less effective, resulting in the private investigator “getting made” by their target. Subjects will recognize the same face after multiple sightings, even if it is in a crowd, and strange vehicles parked in the same location for hours at a time are sure to draw suspicion. This is where thorough research with a private investigator’s client can become invaluable. Reconnaissance at the hands of a client can provide the investigator with information allowing them to be more inconspicuous when following a subject from location to location. For example, a spouse suspicious of infidelity can provide the private investigator with their spouse’s daily schedule—what time they wake up, their morning routine, addresses for their employment, frequent lunch locations, extra-curricular activities, the addresses of friends’ homes, the list goes on and on.
Even the most catlike of private investigators will have their covers blown from time to time. That’s why it’s imperative to have a bulletproof cover story. If they’ve done their research, private investigators can be ready with a plausible reason for being in the area, such as house-hunting, shopping, or just being plain lost and in need of direction. These quick explanations will cause a subject to lower their guard and reconsider their suspicion. Just as is the case with any deception, too many details pierce the veil. Being caught with surveillance equipment like cameras or microphones will also require explanation, but in a culture saturated with technology, this can also be easily explained. Camera drawing too much attention? Not if you’re a professional photographer on assignment. Microphone too conspicuous? It’s no longer a stretch to believe the average citizen is a fledgling podcaster or filmmaker recording “foley” or “walla” noise for their project.
As is the case with many professions, media and culture have defined the role of private investigator as one for a man, which often leaves women out of the conversation. However, it could be argued female private investigators have a much better chance of remaining undetected in surveillance. While social code continues to grow and develop, women are often socialized to diminish themselves—to listen, not speak. Follow instead of lead. Men are socialized to be forward and confident in the interest of being some kind of alpha, while women are known to be better at reading a room, picking up on behavioral cues that might inform their investigation, and their perceived gentility improves their chances of a subject or witness trusting and opening up to them. These aspects of our society are the same ones preventing citizens from suspending disbelief when a woman is accused of a violent crime. A woman would never do that. This allows a female private investigator to conduct field surveillance with more freedom.
Technology has spiked over the last 25 years at astronomical proportions, and our population’s socialization has changed dramatically since the invention of social media. While this may have hampered private investigators in their work, the proper tools, flexible strategies, and an analytical mind can get the job done. Whatever a private investigator’s method for remaining inconspicuous in the field, there is no doubt that as society changes, so must their methodology.
Active Shooter Training in the Workplace
So far this year, there have been 297 mass shootings
in the United States. Seeing as how November 1st
is the 305th
day in the calendar year, it would appear that the spike in active shooter events in recent years will not slow down any time soon. While schools redefine their safety protocols and implement programs that prepare students for these events, employers throughout the United States are also beginning to understand the importance of preparing their workforce for an active shooter event.
The year of 2017 broke the record for the most mass-shooting deaths every recorded—112 deaths
, well exceeding the amount in any other year in recorded history. In 2018, the Bureau of Labor Statistics
published a report that showed another spike in workplace homicides. According to them, there were 83 workplace homicides in 2015, a number that skyrocketed to 500 for the year of 2018 alone. A terrifying 79% of those cases were the result of an active shooter. As a result, the desire for employee active shooter training has never been higher, with NPR
reporting that as of 2016, 75-80% of employers are seeking qualified active shooter training to protect their workforce.
The Department of Homeland Security
has a myriad of resources on their website for dealing with active shooters. One of them is a pocket-card that outlines the characteristics of an active shooter event, “Victims are selected at random. The event is unpredictable and evolves quickly. Law enforcement is usually required to end an active shooter situation.” Active shooters may fire at random, using no discernible criteria for their victims, but that arbitration should not be misunderstood. Perpetrators are deliberate, focused, and simultaneously detached from their task, creating a fatal perfect storm.
The Department of Homeland Security also have their own guidelines to how private citizens should react during an active shooter event: Run—hide—fight
At the onset of an active shooter event, individuals should immediately identify an escape route, most likely a fire exit. While keeping their hands visible, they should leave their belongings behind and run to safety as quick as possible, assisting others if needed.
Once they’ve reached safety (or if escape is impossible) the Department of Homeland Security recommends hiding immediately in a location out of the shooter’s line of sight. Individuals should block the door or manner of entry into their hiding spot and silence their cell phones and pagers. Sit very quietly and wait for first-responders to find you.
The Department of Homeland Security lists this option as an absolute last resort in the event of an active shooter in the workplace. Your life should be in immediate danger, and you should be well-positioned to act with physical aggression and incapacitate the shooter.
Many third-party security companies also endorse the methods of Homeland Security, but there are others that take a different approach. Laurence Barton, a workplace violence expert, recommends employers seek training programs that promote a culture of safety and preparedness—not fear. In lieu of careful research regarding active shooter training, many employers opt for the simple, cost-effective route by showing employees the prolific training video produced by the city of Houston, which features graphic depictions of employees being shot. “When some companies have created these videos that show blood and guts—that’s not in any way the kind of learning that stays with people. In fact, it repulses them…employees get scared,” Barton says, “I just don’t believe scaring people is the way to teach them. It just promotes anxiety.” Aric Mutchnick, the president of a risk management firm called the Experior Group
, agrees with Barton, “Cops or military guys like to have it very realistic because they think the more real it is, the more they can find out. That is true if you’re a tactical team, but you can’t apply tactical training to a civilian population.” Mutchnick points out that the equal distribution of choice laid down by the Department of Homeland Security—run, hide, or fight—is not only dangerous, but unrealistic, “It should be 90 percent run, 8 percent hide until you can run
, and then as for fight, really? Are you kidding? I don’t know how you would even train on that.” Companies like Experior Group also recommend that a base knowledge of firearms should also be part of the training, not so employees can operate firearms, but so their knowledge can inform their escape. Civilians who are ignorant of basic firearm operations can easily be paralyzed by fear because they are uncertain of a weapons range or magazine size. This gives an active shooter ample opportunity to change their position and reload without fear of retaliation.
Frozen with fear—it’s something we can all relate to. After all, many working people today are not acclimated to the viable, potential threat of an active shooter in the workplace. Aggressive, hyper-realistic training can compound the anxiety triggered by the increased probability of being involved in an active shooter event. That’s why Barton and other like-minded professionals epitomize on a feeling of safety, with straightforward and honest training that will leave any employee feeling prepared. “The chief learning officer has a huge opportunity to lead a discussion about workplace safety. [Employees] are yearning to be informed about how the world is changing and how threats get processed at work…You want to have a subject matter expert who works with law enforcement and can speak the language of all employees.”
One thing that employers often overlook when considering active shooter training programs is a company that curtails the training to their individual brick and mortar location. As part of what they call “red ball drills,” Experior Group will evaluate the property to identify the specific issues that might present during an active shooter event. “The problems of a commercial building are not the problems of a hospital or a school,” Mutchnick says. “Run, hide, fight is s giant blanket they throw over the problem as a response, but it doesn’t deal with any site-specific issues.” All training dispensed by Experior Group is tailor-made for the culture and physical context of any business. When these issues have been identified, the instructor can direct employees the best manner of exit, should they have that option.
The last thing to consider when choosing an active shooter training program is the credibility behind the operations. Some of the most prolific risk management and security companies are headed by former members of law enforcement or the military. This experience with weapons and chaos not only validates the content for many employers, but also leaves employees empowered with credible knowledge. However, former navy seals and swat team leaders are not the only option when it comes to the instructor. Lauren Perry, the vice president of operations for Trident Shield, often addresses training groups. Her specific style and feminine touch opens the dialogue in any room, allowing individuals who might not respond to an aggressive, alpha males to remain engaged in the training, retaining the information that might one day save their lives.
Many employers often grapple with the cost of active shooter training for their employees. With many training programs averaging in the realm of thousands of dollars, employers often question whether or not active shooter training is even necessary. The Occupational Safety and Health Act of 1970 says, “Employers have the responsibility to provide a safe and healthful workplace that is free from serious recognized hazards.” The rise of active shooter events in the United States is most certainly recognized, with every event further inflaming the political world and conversations surrounding gun control. Given the statistics we’ve seen here, it appears as though it’s not a matter of if an active shooter even will occur, but when
Carie McMichael is the Communication and Media Specialist for Lauth Investigations International. She regularly writes on private investigation and missing persons topics. For more information, please visit our website.
In the first decades of the 21st century, we have witnessed advances in technology unprecedented in human history. It was once costly and cumbersome to rely on technology to work for you. The reality today is astonishingly different. To view this article, you likely performed a Google search (or whatever your search engine of choice) and clicked through several links to get here. Advances in technology have made it possible for the search engine to collect the data you spread through the internet and use data to determine what kind of advertising you’ll see in the side banners of the websites you visit. For many in America, our phones and our cameras are the same device. Clunky security systems are a thing of the past, and spy cameras can be made as small as a button. This new reality has a name: surveillance capitalism.
There was a time in the United States where changing your identity was as simple as grabbing what you can carry, hopping a train or hitchhiking to a new location, and introducing yourself to others under a different name. Now, in the world of surveillance capitalism, almost every piece of data you put out in the world, either online or on an official form, will likely be entered into a database where you can be tracked by anyone with the proper clearance. At Lauth Investigations International, we use databases like these every day to perform skip traces, asset searches, and background checks. And then there’s the omnipresent threat of “Big Brother,” a moniker often attributed today to the government agencies, law enforcement, and other surveillance platforms who are constantly watching us on what can only be imagined as an IMAX display of viewing screens. Not to mention the entities that might be surveying us and our information in a manner not exactly above reproach, such as Google, Facebook, and every demonym of foreign hackers who see America’s obsession with its surveillance culture as its Achilles heel.
It’s not all doom and gloom, of course. Humans in America and abroad have reaped the top-tier benefits of surveillance capitalism, such as using the “Find My iPhone” to locate someone who has been reported missing. In the recent high-profile case of a missing young woman from Brooklyn, Iowa, Mollie Tibbetts, law enforcement were able to use data collected by Mollie’s Fitbit to piece together her last hours. This information would eventually lead investigators to the man who is now charged with her first-degree murder. Just this past week, an American couple was saved in Bali after a scooter accident left them both without a way to call local authorities for help. Mikey Lythcott, 36, was able to turn on the roaming data on his cell phone, and with a single bar of service, managed to pen a desperate call for help to his Facebook friends. The United States Consulate in Bali was contacted, and help was sent to the couple’s location. Knowing how well technology can work for us makes it that much more frustrating when we feel it has violated our privacy, such as the aforementioned data-mining that helps target you for specific advertisements.
In addition to impacting the way Americans live their lives, surveillance capitalism has already become a constipator for many well-established areas of the economy, such as journalism, transportation, and—in a fascinating irony—private investigations. While surveillance capitalism has certainly had a significant impact on American culture, there are many who have a misunderstanding of its omniscient power. In a recent article titled, “A Private Investigator on Living in a Surveillance Culture,” a private investigator named Judith Coburn, shared an anecdote where a client completely underestimated the available technology:
“Two lawyers working on a death-penalty appeal once came to see me about working on their case. There had been a murder at a gas station in Oakland 10 years earlier. Police reports from the time indicated that there was a notorious “trap house” where crack addicts were squatting across from the gas station. The lawyers wanted me to find and interview some of those addicts to discover whether they’d seen anything that night. It would be a quick job, they assured me. (Translation: they would pay me chump change.) I could just find them on the Internet. I thought they were kidding. Crack addicts aren’t exactly known for their Internet presence.”
Frustrations like these are rampant in investigation firms across the country, but the advancements in technology do not prevent the use of tried-and-true analog methods, such as old-fashioned tailing surveillance, or telephone ruses without the use of any fancy phone surveillance tech.
The concept of the “right to be forgotten” was forged in the European Union, with individuals voicing their concerns about their inability to “determine the development of their life in an autonomous way, without being perpetually or periodically stigmatized as a consequence of a specific action performed in the past.” Given the surveillance tech available to citizens, both private and public, it sounds like an unattainable status for anyone who uses social media, the internet, or walks by a security camera on their way to work every day.
In February, 2018, NPR published an article titled, “Google Has Received 650,000 ‘Right To Be Forgotten’ Requests Since 2014,” detailing the mountain of requests fielded by the multi-national technology company to remove certain URLs from their search results on the condition the content is “inadequate, irrelevant or excessive in relation to the purposes of the processing.” The article goes on to say this means it is up to the discretion of a private company to determine what is in the best interests of the people who use their services, which is a tall-order in a capitalist society. Whether the policy proposed in the EU will ever be universally enforced—both in Europe and around the world—education regarding this newfound culture in which we find ourselves is paramount to protecting yourself and your loved ones from the evils of surveillance capitalism.
Carie McMichael is the Communication and Media Specialist for Lauth Investigations International, a private investigation firm based in Indianapolis, Indiana–delivering proactive and diligent solutions for over 30 years. For more information, please visit our website.
We expose more of ourselves on a daily basis than at any other time in history. Most people have some form of social media an enterprising sleuth could build a profile based off of just by pressing the “older posts” button. There’s been a lot of news about wiretaps lately, but something under most people’s radar are the Smart TV’s and toys that have been listening to their owner’s conversations.
While it’s scary enough to consider how many things in your home could be listening in on you this very moment, what’s even more concerning is how quickly you can lose control of these devices and extorted to get them back. And it’s not just individuals having their devices and data taken from them, it’s also hit schools, hospital and private businesses hard over the last year.
One of the most common forms of extortion today is the use of “ransomware” to lock people or companies out of their electronics and data. Ransomware is a term for a particular kind of hacking that’s been on the rise as internet reliance has increased. Victims of ransomware typically receive a message on their device’s display saying something to the effect of “pay us this money and we’ll give you back your data.”
In an interview with CNN, South Carolina public school administrator Charles Huck, highlighted the dilemma presented by ransomware when he said, “You get to the point of making the business decision: Do I make my end-users — in our case teachers and students — wait for weeks and weeks and weeks while we restore servers from backup? Or do we pay the ransom and get the data back online more quickly?”
If the targets of ransomware want their systems or data back then they don’t have much choice, but to pay the fee. The hackers have repeatedly targeted hospitals since their technology working is literally a case of life or death there is significant pressure on the hospitals to simply pay the ransom.
When Hollywood Presbyterian Medical Center had some of it’s communication devices taken over by hackers last year, the criminals demanded $17,000 to be paid in bitcoin. The hackers asked for that amount, because it’s low enough most places will pay under the impression it’s the quickest way to get it all over with.
“The malware locks systems by encrypting files and demanding ransom to obtain the decryption key. The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key,” Chief Executive Allen Stefanek said when the LA Times asked why they paid the hackers. “In the best interest of restoring normal operations, we did this.”
One of the scarier things about ransomware is this is only the beginning. The FBI reported ransomware to be a $1 billion industry in 2016. In a follow-up story CNN reported:
At that rate, ransomware is on pace to be a $1 billion a year crime this year. The FBI told CNN that the number “is quite high” because a few people “reported large losses.”
The agency also said that the losses could even be bigger once other related costs from these extortion schemes are factored in. Plus: Some victims may choose to pay and not report the crime.
Paul Roberts, founder and editor of a website called The Security Ledger told CNN, “The ransomware criminals understand this. Their business in some ways is a volume business so they don’t set their ransom so high that you can’t pay it. They set it at a level so they can get their money and move on to the next victim.”
This crime has even made its way into consumer electronics like smart phones and TVs. Last Christmas a photo of an LG TV stricken with ransomware went viral.
The hackers demand far less money to relinquish control of personal devices, but $500, especially if it’s on Christmas Day after you’ve spent money on gifts, is still a lot. In December, Slate reported:
“Ransomware works by taking over a system until a user pays a fee, often in the form of cryptocurrency or digital gift cards. One recent high-profile ransomware attack shut down much of San Francisco’s public transit system while another targeted a Hollywood hospital. More mundane ransomware has been reported on Android devices since at least 2014, and Frantic Locker first began to show up on phones in 2015.
Keep your systems operating systems up to date and don’t download files that aren’t from trusted site to help avoid ransomware. If you do all these things and still end up under attack, contact your systems administrator or the manufacturer of your device. Take precaution, because ransomware isn’t going away anytime soon.
David Schroeder, Blog Writer, Lauth Investigations International