Robert Siciliano

Loading...
    • Media Contact:
      Robert Siciliano
    • Member Type(s): Expert
    • Title:Identity Theft Expert
    • Organization:IDTheftSecurity.com
    • Area of Expertise:
    •  
    • Member:ProfNet

    To become a ProfNet premium member and receive requests from reporters looking for expert sources, click here.

    Mass Shootings: Driven by Evil or a Desire for Celebrity Status?

    Thursday, August 22, 2019, 12:07 PM [General]
    0 (0 Ratings)

    If all a gunman, who opened fire and randomly killed nine people, wanted was 15 minutes of fame, he could have achieved this running naked into the field at a major league baseball game.

    At least one criminologist believes that the driving force behind mass shootings is a desire for celebrity status. According to Adam Lankford, a criminologist at the University of Alabama, they want to be famous.

    But this theory has holes. You don’t have to kill people to be famous, and since when are murderers treated like celebrities? Since when does celebrity treatment include prison food?

    If it all came down to wanting to be famous, then why do these mass murderers always have troubled pasts, particularly a history of being victimized by bullying?

    However, many criminologists do believe that most shooters are seeking infamy – even though, certainly, anyone who’s planning a shooting spree knows there’s a good chance they’ll get killed in the process – in which case, they won’t be alive to revel in their infamy.

    In an attempt to prevent future mass shootings, the media has decided not to mention the killers’ names more than once, such as with the 2012 movie theatre slaughter in Colorado and the 2017 Las Vegas concert massacre.

    This tactic has proved futile, given the shootings that occurred the first week of August 2019 in El Paso, Texas and Dayton, Ohio, plus many additional (smaller) shootings since 2012 and even 2017.

    Nevertheless, supposedly the Sandy Hook Elementary School shooter kept a journal detailing decades of mass shooting events.

    If a man has suffered a corrupt childhood and is seething with hatred towards people, feels no hope for his future and knows how to get an AK-47, or AR-15, do you really think that he cares whether or not his name is mentioned after a killing spree?

    Sure, he’d like to gain a lot of notoriety – as long as he’s going to commit the deed. But notoriety isn’t the reason he wants to kill people.

    Are killers born or made via childhood environment?

    These killers may have come from “privileged backgrounds,” but a big house, a swimming pool in its backyard and tennis lessons can still be part of a childhood environment that’s conducive to creating a soulless, evil person who hates humans so much that he one day decides to shoot into a crowd.

    We can argue till the cows come home whether or not years of bullying led to the Columbine massacre, or if while growing up El Paso murderer Patrick Crusius frequently heard his father rant that Mexicans didn’t deserve to live.

    But at the end of the day, it really makes no sense that wanting to hear your name on CNN would make a well-adjusted man go on a homicidal rampage.

    Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

    Woman Murdered after Man Tricks Her with Lost Puppy Ruse

    Tuesday, August 20, 2019, 12:02 PM [General]
    0 (0 Ratings)

    This entire post is brutal and for some, hard to read. But if there is a woman or girl in your life might benefit from being freaked out, read it and forward and share it.

    We’ve all heard about the man approaching a child, showing her a picture of his “lost” puppy, asking the child to help him look for “Truman” or “Roxie.” The child goes off with the predator – never again seen alive.

    You’d think that no ADULT could ever fall for this scheme. But at least one woman, 36, did. Now maybe Kimra Riley, mother of a toddler, had never heard of the lost puppy ruse.

    But according to ID Channel’s “Swamp Murders: A Dark Place to Die,” there were several blaring red flags that Rodney O’Neal Hocker was a predator.

    • Take note of these red flags.
    • Teach them to your kids.
    • Teach them to YOURSELF!

    In March 1996, Kimra’s decomposed body was discovered near the shore of the Tennessee River after being reported missing two months prior. Tied to the body were bricks. An autopsy revealed that she had been alive when forced into the water; she had drowned.

    Lost Puppy Trick

    The docudrama depicts Kimra telling her boyfriend she was headed to the Bama Club to meet a female friend. There, she ran into Rodney, who recognized her as his server at a diner several days prior.

    After small-talk, he asked if she wanted to see his puppy which was in his truck outside.

    • RED FLAG: What adult asks a stranger in a building to come outside to see his puppy?
    • When in doubt: Ask yourself if it’s easy to imagine the man asking another man if he’d like to see this puppy!
    • What to do: Tell the stranger to bring the puppy inside “so everyone can see it.”

    Kimra went to the parking lot with Rodney. Rodney, 27, said the puppy had escaped the back of his pickup truck. He asked if she’d like to get in his vehicle to help look for the alleged yellow lab.

    • RED FLAG: The man immediately wants to drive around to search for the puppy. If a puppy jumps out of a parked vehicle, the first place to look is the parking lot, on foot! A puppy won’t get far!
    • What to do: Run back inside the building. Never mind hurting the stranger’s feelings.

    Once Kimra was in the truck, her fate was sealed. He stopped the vehicle, came onto her; she resisted. The investigation determined he had rammed her head into the windshield, incapacitating her. Sexual assault was suspected because her body had on only a shirt, but was too decomposed for a rape kit.

    If You Love Puppies…

    • Don’t ever go off with ANYONE to see an unseen
    • Tell the suspicious individual that you get enough puppy fixes with your neighbors’ dogs.

    Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

    Another Rideshare Rape is an Epidemic

    Friday, August 16, 2019, 11:44 AM [General]
    0 (0 Ratings)

    Women should never take a ride from a stranger because it’s dangerous – unless she’s paying the driver???

    Wrong, of course. Uber and Lyft drivers provide paid rides to strangers as requested via the Uber and Lyft apps.

    As of August 2018 WhosDrivingyou.org tallied the number at almost 400 rapes and probably stopped recording the sexual assaults because it has become so common. A quick Google search for “rideshare rape” pulls almost 7K results.

    YeT another rideshare rape allegedly happened this week when an intoxicated woman was overcome by her driver. And before you blame the victim, JUST SHUT UP.

    Almost the Perfect Crime

    • The predator has no problem getting a woman into his vehicle.
    • There’s an easy explanation for her DNA in the vehicle: the ride service.
    • She might be intoxicated, which is a common reason for hiring a rideshare service, and intoxication means vulnerability and lack of credibility.

    Has the rideshare industry created a monster?

    What makes rape even easier to get away with is if the passenger passes out from intoxication.

    But by no means does this mean a predator should feel confident he could get away with his crime, such as Uber driver John David Sanchez, who got 80 years for ride-related sex crimes.

    A CNN investigation revealed that at least 31 Uber drivers have been convicted of crimes such as rape as well as forcible touching.

    On the other hand, CNN reported the case of an Uber driver who was accused by his fare of sexual assault. He claimed it was consensual; the charges were dropped.

    CNN also reported that many of the women who were sexually assaulted by the over 100 accused drivers had been drinking or were drunk at the time of the alleged crimes.

    A similar investigation of Lyft by CNN also revealed numerous sexual assault accusations.

    What can a woman do?

    • Use Uber, Lyft (or a taxi service) only as a last resort, i.e., you can’t find someone you know to transport you.
    • Make sure you’re not impaired by any substances. This is a two-edged sword because an impaired person should not drive, either. If you’re convinced ahead of time you’ll be impaired, then arrange for a trusted friend to drive you home. If you can’t find someone, then reconsider your plan on getting wasted; is it worth it?
    • Arrange to use rideshare services with a companion.
    • Hire only female drivers.
    • Under no circumstances let a driver into your home.
    • Make sure your phone has a one-touch emergency alert button that will activate first responders who can home in on your location.

    Don’t assume that just because someone works for Uber or Lyft that they’re safe. Though these companies do background checks, you have to consider that some predators have a clean record because they haven’t been caught (yet).

    Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

    6 More Places to Put Your Identity on Lock Down

    Friday, August 16, 2019, 11:41 AM [General]
    0 (0 Ratings)

    If you have been thinking about a credit freeze, you probably should know that the process is designed so that a creditor cannot see your credit report unless you specifically allow it. This process blocks any potential creditors from viewing or pulling your file, which makes it much more difficult for an identity thief to apply for new credit using your name or information. For links to freeze your credit at the 3 major bureaus go to How to Freeze My Credit. However, there have been reports of people complaining of having accounts opened in their name while having credit freezes. So, if you already have a credit freeze at Experian, Trans Union, and Equifax, you also might want to consider freezing at the following companies, too:

    Innovis Credit Freeze

    Innovis is the 4th credit bureau you need to freeze with. The process is similar to the big three and its free. Go here to freeze your Innovis Credit Freeze.

    National Consumer Telecommunications and Utilities Exchange or NCTUE

    One place you should contact to freeze your credit through is the National Consumer Telecommunications and Utilities Exchange, or NCTUE. Many mobile phone companies, for instance, get credit inquiries done through this organization, so hackers can still open mobile phone accounts in your name, even if your credit is locked down elsewhere via the 3 major bureaus.

    In general, only mobile phone companies use NCTUE, but there are other companies, like water, power, and cable companies that also use it. You can contact NCTUE to freeze your credit by calling them and giving them your Social Security number. You will also have to verify a few other details, but the system is automated, so it’s very easy. If the system can verify your identity, your credit report through this organization will be frozen. You can also get your NCTUE credit report and risk score by calling their 800-number 1-866-349-5355 or try to do it online here NCTUE Freeze but some say this links form doesn’t work well.

    ChexSystems

    You should also place a security alert with ChexSystems. This is a system that is used by banks to verify the worthiness of customers who are requesting new savings and checking accounts. When you request a freeze through this organization, it is only applied to your ChexSystems consumer report. If you want to freeze your credit at other companies, you must do it directly through them. For ChexSystems, you can do it here: ChexSystems Security Freeze.

    Opt-Out Prescreen

    You can additionally opt out of any pre-approved credit offers by calling 1-888-5-OPT-OUT or you can go online and visit the website Optoutprescreen.com.

    myE-Verify Self-Lock via the Department of Homeland Security

    The fourth organization you should freeze your credit with is called Self Lockvia the Department of Homeland Security. This freeze helps to protect you from any employment-related fraud. When you lock your Social Security number through this tool, it will stop anyone from using your Social Security number to get a job, which is another scam. If a Social Security number that has been locked is entered into the system, it will result in a mismatch, which will flag the number as fake. It’s easy to lock and unlock your identity through Self Lock, and each time you do it, it remains locked for a year. Once that year is over, you can choose to renew the lock, too. You can learn more online at the Self-Lock Freeze.

    Social Security Administration

    Finally, if you want to prevent any type of Social Security fraud, you should set up an account at the Social Security Administration. There are a number of Social Security scams designed to siphon your benefits or sensitive information. Your telephone may ring followed by and automated message saying your Social Security number has been “suspended” because of some suspicious activity or be threatened with arrest if you don’t call the telephone number provided in the automated message. Simply by setting up the account you can prevent someone else from setting it up as you and posting as you. Also you can check in with then SSA should you received any calls, emails or mail to determine the communications legitimacy. You can do it online, Social Security Administration Set-up.

    Here’s your Freeze to-do checklist.

    1. NCTUE Freeze
    2. ChexSystems Security Freeze.
    3. com.
    4. Self-Lock Freeze.
    5. Social Security Administration Set-up
    6. How to Freeze My Credit.
    7. Innovis Credit Freeze.

    Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

    Should Life Insurance Policies Be Banned?

    Tuesday, August 6, 2019, 10:58 AM [General]
    0 (0 Ratings)

    It’s fair to wonder how many people would still be alive today if there were never any such thing as a life insurance policy. Personally I can’t imagine NOT having a life insurance policy if you have children 17 and under. But the below info might ring true for some of you.

    An insurance policy may be the only thing it takes to kick a murder plan into high gear. A woman who isn’t generally capable of murder just because she saw him with another woman might be to get her hands on that $300,000 payout.

    Which brings us back to the initial question: How many people would still be with us had they not named their killer as the beneficiary of a life insurance policy?

    Who in their right mind keeps an angry, disgruntled family member as the beneficiary anyways?

    You’d be stunned to know the answer: Enough to supply the Investigation Discovery channel with one crime documentary after another in which a person was murdered for their life insurance policy.

    • In many cases the killer is a woman – either directly, or she “hires” someone to do the job.
    • Of course, many times the victim is a woman.
    • A third scenario is when a non-family member has been scammed by the killer to name the killer as the sole beneficiary.
    • A fourth scenario is when the killer takes out the policy of the victim without the victim knowing!

    This article is about the first two types.

    What’s absolutely mind-blowing is why the policyholder keeps these beneficiaries on the payout plan, when any one of the following has occurred:

    • The beneficiary and the policyholder have separated or divorced – and have a very ugly relationship in which the beneficiary has displayed fits of rage.
    • The policyholder is afraid of the beneficiary, though there’s been no violence directed towards him or her.
    • The policyholder has been assaulted by the beneficiary.
    • There are no children (which then begs the question more than ever of why the policyholder would want that ex-spouse or soon-to-be ex-spouse still as a beneficiary).

    In short, why on earth would you want someone – whom you’re either afraid of or now hate to the bone – to be your beneficiary?

    Even if you have young children with the beneficiary…it still makes zero sense if you believe there’s even a remote chance that your ex is capable of killing you for that money.

    Your raging ex or deeply troubled son do NOT need $800,000 if you die in a car accident or from disease. So why do you have the policy and why are they on it?

    Bottom Line

    • Nobody whom you fear or who now hates you should be your beneficiary.
    • Remove them at once and inform them promptly.
    • It could save your life.

    Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

    Apps for Stalkers Disguised as Parental Control Tools

    Thursday, August 1, 2019, 11:23 AM [General]
    0 (0 Ratings)

    Sell something called “SuperParent” or even the actual FlexiSpy — and all is swell. Frankly, I’m not opposed to monitoring a child’s phone, kids shouldn’t have phones anyways.

    But sell something called “iStalk” or “StalkU,” well … this won’t quite go over well with the authorities or the general community.

    It’s all in a name (pardon the cliché).

    Apps that track users contain Spyware. A wannabe stalker can secretly install such an app on their intended victim’s phone via any of the following:

    • Manual access to the phone
    • Link to a Twitter share
    • Share for LinkedIn or Whatsapp
    • Text a link posing as security update

    Sending a “malicious” link works when its clicked. However the stalker will usually need to have access to the victim’s phone to install the tracking software. With the way people leave their phones lying around, this is fairly easy to do – to users who don’t have a password set up for their device or share their password with their “stalker”.

    What can some “stalking apps” track?

    • Call logs
    • Contents of text and chat messages
    • Location of phone (and hence, victim if the phone is with them)
    • Listening in to ambient sounds picked up by the phones microphone
    • Listening in to phone calls
    • Access to voicemail

    According to a 2014 study by the National Network to End Domestic Violence, 54% of domestic abusers use tracking software, for which its icon can be visibly concealed from the victim.

    Though availability of tracking apps has become more limited over time, due to the revelations of how these have been abused, they are still available, such as mSpy, which can be easily downloaded to Android devices.

    Downloading stalkware to iPhones is more challenging, but far from impossible. In fact, one technique doesn’t even require physical access to the target’s phone. And even then…this can be breached by a techy stalker.

    How do app makers cover their butts?

    They include language with their apps, such as citing that consent of the target is required before installation, or that the app company will cooperate with law enforcement should a complaint be reported.

    Stalkware isn’t going away anytime soon. Thus, the emphasis needs to be on prevention.

    How to Prevent Remote Stalking

    • Heavens, please don’t let your new boyfriend/girlfriend talk you out of having a password with some kind of nonsense like, “If you trusted me you wouldn’t need a password.”
    • Never share passwords.
    • Tell him or her – on the first date – that  your phone is off-limits to them. If they give you flack, it’s over. Only a control freak would mind this.
    • If they keep cool, this could be an act to gain your trust. Never leave your phone alone with that special someone.
    • Keep your phone turned off unless you’re using it.
    • Disable the GPS feature.
    • Never leave your phone unsupervised in the presence of other people, even your new boyfriend’s great-grandmother.

    Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

    You Know Tom Might Kill You So Why Do You Stay with Tom?

    Wednesday, July 31, 2019, 10:46 AM [General]
    0 (0 Ratings)

    “Tom” can also be “Alicia.”

    Nevertheless, it happens often enough to come up every so often in a crime documentary aired on the Investigation Discovery channel.

    The premise is as follows:

    • A person is SO convinced that their spouse or soon-to-be ex-spouse is going to kill them, that they actually tell friends something like, “If anything ever happens to me, Tom did it,” or, “If anything bad ever happens to me, have the cops question Alicia.”
    • There was one case in which a woman spoke from the grave. Detectives discovered a note she had hidden inside a piece of furniture explaining that if she was ever murdered, her husband was responsible.
    • Yet these men and women continue living with the person they think is capable of murdering them.

    These aren’t cases in which the future killer warns their future victim, “If you move out I’ll kill your parents and your dog and boil your bunny.”

    The irony is that there’s often no threat given to the future victim of any devastating consequences if they move out.

    Another thing about many of these cases is that there aren’t young children living with them who could provide the future victim an excuse for continuing to live with the man (or woman) they’ve told friends might kill them.

    So this begs the question: Why would anyone want to continue living under the same roof with someone whom is so threatening, that the future victim has actually told friends or other family members, “If something happens to me…it was Alicia”?

    One might think, “Well, maybe these individuals don’t have any other place to go.” Yet in the documentaries, friends or extended family members are speaking lovingly of them and are very distraught over what ultimately had happened. Certainly, they would have taken in the person they cared about.

    But this element is never explored. Thus, the assumption is that a place to stay was offered but declined.

    There are many reasons people stay in destructive relationships. Fear and uncertainty play a huge role. Bad judgment might be another. But one things for sure, the victim in these situations isn’t to be blamed. They are no more “at fault’ than someone who is walking down the street and gets bit by a dog. And Tom just plain sucks.   

    Why stay?

    #1 Self-esteem might be so damaged through emotional abuse the victim simply can’t make a move.

    #2 Abusive behavior seems “normal” in a society that is abusive towards each other.

    #3 Leaving can be very dangerous. Its not unlikely for their abuser to act on his feelings of violence when feeling abandoned.

    #4 Abuse is all about control of the mind and body. A victim’s decisions are often not their own.

    #5 Abusers are skilled at making the victim think everything’s their fault.

    #6 The victim might think they can change the abuser. They cannot.

    #7 Embarrassment, being judged by others and shame often keeps the victim from leaving.

    #8 Family. Having kids together is huge and the victim might stay “for the sake of the kids”.

    The worst-case scenario is living in a mission, a safe house or even on the street – which would be a lot safer than living in the same house as someone you’re convinced might kill you.

    Would you spend even ONE NIGHT in a house if you knew that somewhere in that house, a 20-foot python was loose? Of course not. If you were told you had a choice of a nice warm bed and bath facilities – in a house with that roaming snake – or…a homeless shelter…which would you choose? This however is easier said than done.

    If you’re compelled to hide a “from the grave” note or inform a friend, “Tom did it,” then GET OUT NOW. If you or someone you know is in danger call the National Domestic Violence Hotline at 1−800−799−7233

    Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

    Florida City Pays Hackers $600,000 after Scam

    Thursday, July 25, 2019, 11:41 AM [General]
    0 (0 Ratings)

    Riviera Beach, a city in Florida, has agreed to pay a $600,000 ransom to hackers who attacked its network.

    This week, the City Council voted to pay the demands after coming up with no other option to meet the demands of the hackers. It seems that the hackers got access to the system when a staff member clicked on a link in an email, which uploaded malware to the network. The malware disabled the city’s email system, direct deposit payroll system and 911 dispatch system.

    According to Rose Anne Brown, the city’s spokesperson, they had been working with independent security consultants who recommended that they pay the ransom. The payment is being covered by the city’s insurance. Brown said that they are relying on the advice of the consultants, even though the stance of the FBI is to not pay off the hackers.

    There are many businesses and government agencies that have been hit in the US and across the world in recent years. The city of Baltimore, for instance, was asked to pay $76,000 in ransom just last month, but that city refused to pay. Atlanta and Newark were also hit with demands.

    Just last year, the US government accused a programmer from North Korea of creating and attacking banks, governments, hospitals, and factories with a malware attack known as “WannaCry.” This malware affected entities in over 150 countries and the loses totaled more than $81 million.

    The FBI hasn’t commented on the attack in Riviera Beach, but it did say that almost 1,500 ransomware attacks were reported in 2018, and the victims paid about $3.6 million to the hackers.

    Hackers often target areas of computer systems that are vulnerable, and any organization should consistently check its systems for flaws. Additionally, it’s important to train staff about how hackers lure victims by using emails. You must teach them, for instance, not to click on any email links or open emails that look suspicious. It is also imperative that the system and its data, and even individual computers, are backed up regularly.

    Most of these attacks come from foreign entities, which make them difficult to track and prosecute. Many victims just end up paying the hacker because the data is precious to them. They also might work with some type of negotiator to bring the ransom down. In almost all cases, the attackers will do what they say and allow the victims to access their data, but not all of them do. So, realize that if you are going to pay that you still might not get access to the data. Ransomware simply should not happen to your network. If all your hardware and software is up to date and you have all the necessary components and software that your specific network requires based on its size and the data you house then your defenses become a tougher target. Additionally, proper security awareness training will prevent the criminals from bypassing all those security controls and keep your network secure as it needs to be.

    Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

    Boy Scouts of America 12,000 Sex Abuse Victims is Normal

    Tuesday, July 23, 2019, 9:34 AM [General]
    0 (0 Ratings)

    The Boy Scouts of American is no stranger to controversy, and now new information is shedding light on how many leaders were actually involved in a sex abuse scandal.

    According to official records of the Boy Scouts, more than 12,000 children were sexually assaulted while in the scout program. The records, which date back to the 1940s, show that more than 8,000 leaders have been accused of these acts. Yes, that’s EIGHT THOUSAND PREDATORS.

    Basically, this information was known to the organization, but only in the past 10 years or so had the vast scale of this abuse been exposed. What’s even worse is that this is probably not all of the incidents that have occurred. These are only those that have been exposed. Only the organization itself knows the true numbers of victims and perpetrators, and it has never released any of the names of the abusers. Though it is believed that these leaders were removed from their positions, the Boy Scouts never released their names to the public.

    There are more than two million members of Boy Scouts of America, and hundreds of members are expected to file suit against the organization. One sexual abuse attorney, who has taken a prominent role in the case, has signed with more than 180 victims.

    Currently, Boy Scouts of America have thousands of acres of land across the country, and the value of that land is very high. However, it is expected that the organization could declare bankruptcy, which has the victims in this case in an uproar as they would get little to no compensation.

    Michael Surbaugh, Chief Executive of Boy Scouts of America, recently made a public apology. He said that the organization is offering support for the victims and members of the organization are outraged by the number of times that individuals took advantage of innocent children. He also said that they all care deeply about the victims and that they apologize to anyone who, during their time with the Boy Scouts, was harmed. He said that they believe the victims’ stories and will pay for counseling for any victim that requires it. He also encouraged any and all victims to come forward.

    If the Boy Scouts of American files bankruptcy, it could continue to operate while keeping its information and assets safe. Last year, the organization filed suit against several of its insurers and claimed that the companies refused to cover its liabilities. The insurance companies banded together and said that the Boy Scouts failed to take precautionary action in these situations. As of now, all of those cases are still pending. Here’s the most disturbing aspect of this story: This is normal. Yup. Normal. That doesn’t mean it’s OK or acceptable behavior, but it’s the way it’s always been. If it’s happened consecutively over the past 70 years, and its part of the culture, the same way the Catholic church works, or thousands of teachers and coaches or others in professions who work with kids, its normal. Predators go to where their prey is. And the sooner you begin to have these uncomfortable conversations with your kids, the better chance you have of preventing this in your family. Care to discuss?

    Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

    Reinforce Your Door with the Door Devil

    Tuesday, July 16, 2019, 10:06 AM [General]
    0 (0 Ratings)

    Unfortunately, there is no such thing as a totally burglar-proof home, but there is also no burglar who can get into any home. By taking a few steps and using some specific security measures, you can make your home ALMOST burglar-proof.

    When most homeowners consider security, they usually only think of a few items. However, you might not realize that things like shatter proof glass is on the market. There are also surveillance cameras that are real and fake, which can be installed. That certainly will help deter a burglar.

    And while deterrence is huge, the most important aspect of home security is “hardening” the home to prevent access. Doors are the most common method of burglar entry and most doors significantly lack reinforcement.

    There are a few critical things that you can do with your front and back door. If you have a typical door, its frame made of pine and it can definitely get kicked in. It doesn’t even take a lot of strength to get through a door, and most adults would have the strength to do it if they know how.

    A normal door closes with a latch that has two or four small screws that go through a weak strike plate. This is attached or a pine door frame, which might be only ½” to ¾” thick. Keep in mind that a child can kick through pine that is ½” thick, so it should be no surprise that it’s so easy to kick through a door.

    Here’s how to Secure Your Doors!


    As in the video above, this is where a device like the Door Devil Anti-Kick Door Jamb Kit comes in handy. This kit has a bar that is over a foot long and is 1/16th inch heavy steel. It is installed right on the door jamb over the strike plates that are already there.

    The kit includes:

    • 13-inch strike plate with EZ mounting tabs
    • Door plate and hinge plate
    • Heavy duty mounting screws in two different sizes for extra strength
    • Installation drill bits

    It only takes about 15 minutes to install the Door Devil, and once it is installed, you are done. The only other thing you have to do is lock your door.

    Though door reinforcement is a great thing, just consider that it is only a single layer of security, and you should consider complimenting this with other types of home security including motion detection lights, surveillance cameras, and home security systems. Remember, most burglars aren’t extremely skilled, nor are they extremely smart. If they can’t get through a door with a couple of kicks, they will move on to the next house.

    Robert Siciliano is a home and personal security expert to DoorDevil.com discussing Anti-Kick door reinforcement on YouTube. Disclosures.


    Page 1 of 33  •  1 2 3 4 5 6 ... 33 Next

Blog Categories