Category: information

Website Review: Spamlaws

SPAMLAWS – HOW TO STOP SCAMS AND FRAUD (www.spamlaws.com)

SpamLaws say they are dedicated to providing accurate and up-to-date information on issues affecting Internet security. They aim to supply the readers with the best Internet protection information and are constantly striving to learn more about and report on the latest and most up-to-date Internet security issues, software, and protection.

They also investigate common Internet based scams and fraud issues.

Their approach to protecting your personal information is “Get informed”.

The “Spam Laws” section of SpamLaws.com was created by David E. Sorkin, a Law Professor at the Center for Information Technology and Privacy Law, at The John Marshall Law School in Chicago.

Professor Sorkin has written and lectured extensively about issues surrounding Internet policy, privacy and consumer protection.

The web site covers Identity Theft, Scams, Spam, Fraud, Antivirus, Spyware, Adware, Backup, Computer Virus & Worms, Wireless Security, Networking, Software Reviews, Phishing, Malware 101, Parental Control, Network Security, Operating Systems, Data Encryption, Browsers, Email Client Software and Password Protection.

The site has sections covering the United States, European Union and some mention of other countries, so you can see which laws are relevant in each jurisdiction.

Do click on the Facebook or Twitter icons on top right to follow Fight Back Ninja.

Fightback Ninja Signature

Internet Domain Name Sellers

When you’re starting up a new company or have any other reason to need a new Internet domain name, it can be tricky to decide on the name and then to ensure the company name is available (if you want it) and the relevant domain names are available.

Then you have to ensure that the chosen name doesn’t mean something unpleasant in a common language or in slang or is unintentionally funny and that it does match your Marketing need for a relevant name.

E.g. a new bakers wants to use the name Best Bakers and decides on domain names bestbakers.co.uk and bestbakers.store and that’s all.

If the domain names are available – then no problem but if what you want isn’t available? – you may have to can try to buy them from the existing owners.

Generally this will be a business or Internet operation for whom the domain name is relevant so it could take a lot of cash to pry the name away from them.

But it might also be a domain name hoarder who has what you want.

These people buy domain names they think could be valuable in the future and then they will hold you to ransom to get what you want.

Another variant of this is that once having bought the domain names you want you may get emails from people offerign to sell you related domain names.

E.g. for Best Bakers that could be bestbakers.com or bestbakers.shop etc.

These people don’t usually own the domain name, they just were notified of your purchase. They check what related names are available and offer them to you. If you say yes and agree a price then they actually buy the domain name and sell it to you – having charged you a big mark up for it of course.

Do enter your email address and click on the subscribe button on top right to keep up to date with new posts.

Fightback Ninja Signature

How to Identify a Suspect Photo

If you receive a photo from someone on a dating website or a Facebook friend request or a scam email etc. you might want to know whether the photo is of the sender or has just been copied off the Internet.

Fake photos are a common problem on dating websites, where, for male scammers photos of uniformed soldiers are often used. For female scammers, the use of photos of random hot women stolen from social media sites is very common.

Google has a reverse image lookup facility and it’s easy to use.

  1. Download a copy of the photo of the person on to your device if possible (or you can a URL pointing to the image)
  2. Go to Google Image search and select the camera icon
  3. Upload the photo or type in the URL for the image
  4. The result will be a list showing where the picture is on the Internet.

This cannot be guaranteed to give 100% accurate results, but it makes a good effort to match the image you supply.

If the scammer has chosen a popular photo from a popular website then Google is likely to find it but if someone is just using a picture of their neighbour for example then there’s little chance of finding it.

Just because Google cannot find the photo on the Internet does not prove it is a genuine photo of the sender.

The scammers that use fake pictures may well work for professional criminal organisations and treat it like an everyday job. So, confronting them is pointless, trying to talk out of such deceitful behaviour is a waste of time.

If you catch people cheating with photos then report them to the social media site concerned or the relevant dating site.

You may also choose to report them to the Police and tell the scammer you know they are fake.

If you have any experiences with scammers, spammers or time-waster do let me know, by email.

Fightback Ninja Signature

Official Crime Figures 2018

 

Overall levels of crime showed falls in recent decades, but levels have remained broadly stable in recent years.

In the last year there has been no change in overall levels of crime although this hides variation seen in individual crime types.

Headline figures

  • Theft showed a 13% increase compared with the year ending March 2017. Despite this increase, estimates of theft remain much lower than 20 years ago.
  • a 2% increase in vehicle offences, which includes an 8% increase in the subcategory of “theft or unauthorised taking of a motor vehicle”
  • an 11% increase in robbery
  • a 3% decrease in burglaries, following rises seen in the previous two years
  • a 17% increase in fraud offences
  • a 21% decrease in computer misuse

Figures for year ending March 2019,
Things to note
Computer
misuse
21% decrease (to 966,000 offences) in computer misuse offences estimated by the Crime Survey for England and Wales (CSEW). The CSEW is the best source for measuring the volume of computer misuse offences as it captures offences that go unreported.
Fraud 17% increase in fraud offences estimated by the CSEW (to 3,809,000 offences). The CSEW provides the best indication of the volume of fraud offences experienced by individuals as it captures the more frequent lower-harm cases that are likely to go unreported to the authorities.

There are figures available for all types of crime – above is just for computer misuse and fraud.

Do enter your email address and click on the subscribe button on top right to keep up to date with new posts.

Fightback Ninja Signature

A Scammers Mindset

As with many criminals, people who scam others for a living tend to carry on doing so until something dramatic makes them think again – such as a significant prison sentence, losing someone important in their life, violence etc.

“Fred” was a scammer for many years, working for various scam outfits until the day the Federal agents turned up at his office and he ended up spending several years in prison. Now he works to prevent fraud and warn people of how it is done. This is Fred’s warning.

 

Developing the Persona

The scammer assumes a false personality or social mask that makes it easier to pull off the deception. Swindling is really acting, and you play a character who will help you appear legitimate, confident and successful … even when you are not.

On the outside you will see nothing but charm, an engaging personality and swagger. On the inside lies a predator. There is no conscience in this business. It’s every person for themselves, and the goal is to get as much money as possible.

The business needs to have a persona, too, to look legitimate and trustworthy. Some scam companies run television commercials and hire famous actors to appear in them.

It’s About Emotion, Not Logic

Think about the first time you fell in love or a time when someone cut you off on the freeway and you were seething for hours. Were you thinking clearly? Probably not. Those who believe they’d never fall for a scam don’t realize it’s not about how smart you are; it’s about how well you control your emotions. Fraud victims are people with emotional needs, just like the rest of us. But they can’t separate out those needs when they make financial decisions. That’s what makes them vulnerable.

As a master scammer, I made it my first objective to get the victim’s emotions stirred up and so agitated that you won’t know which way is up and which is down. Once I have gotten you into this condition, it doesn’t matter how smart or dumb you are, you will succumb.

The two most powerful ways to do this are through need and greed.

To find a client’s emotional need, I’ll ask a bunch of personal questions. Then I’ll throttle up the pressure by focusing on that need. “Oh, you lost your job? That’s got to be tough.” Or “So your two kids are in college and the tuition is driving you into the poorhouse.” Now the person isn’t thinking about whether the offer is a scam but instead, “Here’s a fix for my problems.”

The “crush,” or the “kill” — that’s what we call closing the deal — is emotionally driven. It’s not logic. If you apply logic, the answer is: “No, I am not going to send you my hard-earned money. I don’t even know who you are.” If my victims had applied logic to our deals, they would have walked away every time.

The other pathway to the ether is simple greed: I just promise people they can make a ton of money.

 

The Perfect Victim

I’m often asked how I could have ripped off senior citizens. The answer is that con men target people who have money, and a lot of seniors are sitting on fat nest eggs. It’s the Willie Sutton rule: He robbed banks because that is where the money was.

But there’s more to it than that. I think older people are easier to scam, because their emotional needs are closer to the surface. They aren’t afraid to tell people how much they care about their kids and grandkids. They aren’t afraid to share their fears about the unstable financial markets and how much they worry about being on a fixed income. These fears are real. And every one of them is a bullet for my gun.

My scam career was focused on investments like phony oil and gas deals, bogus business opportunities and gold-coin scams. And for these types of investments the perfect victim was almost always a male. Why men? Men are grandiose; they are full of ego. And that’s all driven by emotion; it’s driven by insecurity; it’s driven by a feeling of inferiority.

Most people who get emotional quickly will fall every time. And if they don’t get worked up, I won’t waste my time with them. If prospects are asking a lot of questions or tell me they want to think it over or talk with their lawyer, I will hang up the phone. Victims don’t ask a lot of questions; they answer a lot of questions. Victims don’t read paperwork; they wait for you to tell them what it says. Victims don’t look for why the offer is a scam; they look for why the offer will make them money. They want you to make them feel good so they can pull the trigger.

 

Early on in my career I was selling bogus oil and gas units to investors. We were selling units for $22,500 for a quarter unit, or $90,000 for a full unit, promising a 10-to-1 return. Sure, we had a well, but it was a dry hole, and we knew it — there was no chance of hitting oil. Every so often when I was pitching these deals, an investor would ask if I was registered with the U.S. Securities and Exchange Commission. I would always say, “Of course we are, and I want you to verify that the minute we get off the phone.” The truth is, we were never registered, but 98 percent of the people who ask that question never check. They just want to hear me say it.

Don’t Get Burned

Never make a buying decision when you’ve just heard the sales pitch. Always give yourself at least 24 hours to think about it. This gives you time for the emotional effects of the sales presentation to subside — and time for you to do research.

Don’t ever share personal information about your family or about your worries with people who are trying to sell you something.

In any interaction with someone trying to sell you a deal, always ask yourself, “What’s in it for them?” In other words, if this is such a great deal, why are they calling you about it? Why don’t they just do it themselves?

 If you have any experiences with scammers, spammers or time-waster do let me know, by email.

Fightback Ninja Signature

Phishing a WiFi Password

Most people believe that using Wi-Fi in public places is safe as long as there is a password needed to access the service, rather than the public ones with open access.

However, there are assorted methods used by hackers to get into Wi-Fi services and in particular a set of software and techniques we’ll call Wi-FiX (not the real name).

Sadly, Wi-FiX is available on the Internet to anyone with programming skills.

The basic method used involves the software creating a fake Wi-Fi access point that mimics the real ones on the selected network. Then it jams any messages to the real access points and posts up a message requesting login and password. The user cannot get around this so enters their login and password and then the software relays on the messages to the real wi-fi access point so the user believes everything is OK again, but the fake Wi-FI access point is recording all of the traffic.

In that data may well be logins and passwords, credit card details etc.

The details are complex but below is a simple technical explanation

  1. The victim is deauthenticated from their access point. WiFiXcontinuously jams all of the target access point’s wifi devices within range.
  2. WiFiXcopies the target access point’s settings. It then creates a rogue wireless access point that is modelled on the target. It also sets up a NAT/DHCP server and forwards the relevant
  3. The victim is requested to re-input login and password which WiFiX can use to access the genuine access point. The victim joins the hacker’s rogue access point.

The victim continues to use the Wi-Fi unaware that all of their messages are being copied and examined for confidential information etc.

Always be wary of using Wi-Fi outside of your home and office.

Do enter your email address and click on the subscribe button on top right to keep up to date with new posts.