If its span its scam is a safe approach to online merchants offering things to good to be true.
Some viewers of Gilligan’s Island apparently took the show seriously in the 1960s. The U.S. Coast Guard received several telegrams from concerned citizens asking why they didn’t rescue the Minnow’s crew. This has been an excellent week. I have received four or five emails from London and Africa announcing that I have been selected to receive, from each of them, sums in eXcess of ten million dollars The quite remarkable fact seems to be that one fellow’s plane crash, another’s unexpected demise—apparently run over by a herd of elephants— a third’s cruel wife, have all resulted in me being just the right person on the planet to receive millions of dollars which was left in their estates. Not only that: Several lotteries have paid off this week as well, and, just like the poor African ministers who want to share their millions with me, the lottery companies are happy to send money as well. It seems all I have to do is let any one of these secret correspondents know a few details about my bank account and social security number and my life worries will be over.
Illegal pyramid schemes. Sell YOU e-mail lists. Illegal and everyone loses money. Stuffing envelopes You pay to register- you send same ad to others. Gimmick cures and “scientific breakthroughs”. Don’t work. World currency market scam – beware. Free goods like computer – have to pay to join – bring in other memebers – disguised pyramid plan. Ponzi schemes – paid from money from later investors and told to invest more money… Kits don’t work and if they did they are illegal and cable companies are aggressively prosecuting. You pay up front costs but loans don’t come through Promise to erase negative information – promoters of this scam cannot deliver – if you lie on a loan app about your income, ss# you could be committing fraud and violation federal laws You “won” a vacation on a deluxe cruise chip – more like a tugboat with expensive upgrades – hotel accommodations are shabby.
Today in the game -MISSING we have learned grooming techniques of on-line predators -Airdogs- theft, fraud, bullying The next area of concern are modeling scams… Modeling agencies prepare prospective models for the industry by enhancing their appearance, training them on the catwalk, photo shots, and arrange jobs for the models. What can sometimes happens is the modeling agencies are fronts for scams and other criminal activity
What makes them scams… Several years ago I became a partner in a retail clothing company and part of my responsibilities were the advertising and marketing of the company -I signed up with a local modeling agency (in an professional office) to participate in a workshop and photo shot to build a portfolio. I learned how to “work” the catwalk, makeup and clothing and photography. I paid for my photos (slides) Was sent on a “job” hair model…never paid, never called again Learned what I needed to know for my work However, there are other scams that lead to very different situations….
(After reading slide) My experience: -Cattle call…eliminated down, called back to meet in a hotel room…at my age and experience ….RED FLAG!
Web criminals are getting much more personal in their attacks, using social networking sites and other databases to make their story lines much more believable. Bryan Rutberg's daughter was among the first to notice something odd about her dad's Facebook page. At about 8 p.m. on Jan. 21, she ran into his bedroom and asked why he'd changed his status to: “BRYAN IS IN URGENT NEED OF HELP!!!“ In Rutberg's case, criminals managed to steal his Facebook login password, steal his Facebook identity, and change his page to make it appear he was in trouble. Next, the criminals sent e-mails to dozens of friends, begging them for help.
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: The Dark Side of Computer-Mediated Communication
Great CMC or source of Fraud? <ul><li>The Internet Crime Complaint Center's 2007 INTERENET Crime Report found Internet fraud had risen and that online dating fraud was one of the most commonly reported complaints. </li></ul><ul><li>The top 5 types of abuse on online dating sites 1. Identity mining/phishing and/or 1-1 credit card fraud - 61% 2. Spam - 14% 3. Profile misrepresentation - 7.6% 4. General misconduct - 5.9% 5. Solicitation - 2.9% Source: Iovation compilation of incidents from online dating sites using its security services </li></ul>
Online Dating: Analyzing the Algorithms of Attraction <ul><li>The company uses proprietary algorithms to score that data against 29 “dimensions of compatibility”- such as values, personality styles, attitudes and interests -- and match up customers with the best possible prospects for a long-term relationship. </li></ul><ul><li>Online dating site visitors Snapshot: November 2008 </li></ul><ul><li>Total number of visitors to online dating sites: 22,274,000Male users: 52.4%Female users: 47.6% Source: comScore Media Metrix </li></ul>
Does online dating work? <ul><li>eHarmony and other online dating sites have their own studies about the services, but no independent research has been completed that demonstrates the effectiveness of online dating services. </li></ul><ul><li>Do the matching algorithms produce better matches that lead to long-term relationships? “ I don’t think so.” says Dr. Dan Ariely a professor of behavioral economics at MIT who continues to research the subject. </li></ul><ul><li>So far, eHarmony has not produced much scientific evidence that its system works. It has started a longitudinal study comparing eHarmony couples with a control group but secrecy may be a smart business move, but it makes eHarmony a target for scientific critics, not to mention its rivals. </li></ul>
Truth about online dating <ul><li>One thing is already clear. People aren’t so good at picking their own mates online. Researchers who studied online dating found that the customers typically ended up going out with fewer than 1 percent of the people whose profiles they studied , and that those dates often ended up being huge letdowns. The people make up impossible shopping lists for what they want in a partner, says Eli Finkel, a psychologist who studies dating at Northwestern University Relationships Lab. </li></ul>
A Crash Course in the Dangers of Computer Mediated Communication <ul><li>Meet my Second Life Avatar: Talcott Barrymore </li></ul>
TINSTAAFL!! <ul><li>(There is no such thing as a free lunch!) </li></ul>Develop Good Consumer Skills
Internet Scams are happening all around you! Tribune Review “ Indiana Man Loses Thousands” May 25, 2004 Fake Cashiers Check For Car purchase – Sent a money order through Western Union for shipping.
<ul><li>PHISHING: Bad guys who want your money or your identity </li></ul>Emails, phone calls, text messages, strange “friend requests: Run Away! Beware of the “Push”, i.e. A Communication that You Did Not Initiate
Temptation….. Ref. Number:EGOGHS255125600419 Batch Number: 14/ 01259/ IPD Ticket Number:113-2471-752-209 Serial Number: 5063-11 Attention We are pleased to inform you of the result of the Winners in our UNIVERSAL STAKES Lottery Program held on the 20th JULY, 2004.Your e-mail address attached to ticket number 27522465896-6453 with serial number 3772-554 drew lucky numbers 7-14-18-31-45 which consequently won in the 2ND category, you have therefore been approved for a lump sum pay out of USD$1,500,000 ( One Million Five Hundred Dollars) Only . CONGRATULATIONS!
What makes them scams? <ul><li>Most often: </li></ul><ul><ul><li>Upfront fees…illegal to collect </li></ul></ul><ul><ul><li>Promises of work…never happens </li></ul></ul><ul><ul><li>Promises of photographs…never received </li></ul></ul>
Besides the scam… <ul><li>Photos posted on-line can be altered </li></ul><ul><li>Webcams can lead to questionable videos </li></ul><ul><li>World wide demand by pedophiles </li></ul>
Modeling Scams leading to Sex Crimes <ul><li>Police search for victims of MySpace sex predator </li></ul><ul><li>http://www.mycrimespace.com/2009/05/15/police-search-for-victims-of myspace-sex-predator/ </li></ul><ul><li>Man Uses Modeling Scam to Lure Girls </li></ul><ul><li>http://www.cfrb.com/node/347303 </li></ul><ul><li>Modeling Scam Suspect Accused Of Sex Crimes </li></ul><ul><li>http://www.wftv.com/news/2321802/detail.html </li></ul>
A new, targeted social media version of a very old scam -- the “Nigerian,” or “419,” ploy
The meteoric rise in social media use has also created a launch pad for identity thieves. <ul><li>“ My prediction for 2010 is that the increase in social networking activity, along with a user’s failure to implement security and privacy settings and protocols, will lead to an increased exposure of not only the user’s personal information but possibly that of their “friends”. </li></ul>Robert Siciliano : CEO of IDTheftSecurity.com http://www.youtube.com/watch?v=JwFC0jfxTco
How did they do that? <ul><li>Because Facebook regularly contacts its users through e-mail, and includes links in those e-mails to login pages, the format is ripe for phishers. It's easy to imitate Facebook e-mails and simply send users clicking to a look-a-like login page that steal passwords. </li></ul>
Privacy Paradox An Oxymoron Young people will freely give up personal information to join social networks on the Internet. Afterwards, they are surprised when their parents read their journals. " There's a big difference between publicly available data and publicized data.” Dr. Dana Boyd, co-author a newly published book: Hanging Out, Messing Around, and Geeking Out: Kids Living and Learning with New Media .
Social networks put careers at risk Recent Market Research Microsoft http://www.euractiv.com/en/Social-networks-careers-risk <ul><li>US, where 79% of HR experts scan the Web in search of personal information for recruiting purposes. </li></ul><ul><li>23% are rejected outright because of online reputation, outlandish photos and social artifacts. </li></ul><ul><li>Research by Symantec found that the under-25 age group appear to be the least apprehensive about their digital tattoos and have a careless attitude towards the distribution of their personal details. </li></ul>Digital tattoos
Symantic and Sperling’s Best Places 2010 Report Americas Riskiest Cities for Cybercrime <ul><li>"I look at it like driving a car," said Dan Nadir, the director of product management for Symantec. "Your risk of an accident is going to be greater the more you drive. If you're online more, you need to be more cautious, just like the more you're on the road, the more you should wear your seatbelt, have airbags and rotate your tires." </li></ul>
Variables In Study <ul><li>Sins of Commission : risky online activities, including online banking and online shopping. </li></ul><ul><li>Sins of Omission: Also factored into the rankings was the number of free WiFi hotspots per capita. "WiFi is a big concern," acknowledged Nadir, "because it's something most people don't understand, and most don't know who is behind that hotspot, or if it's even legitimate.“ </li></ul><ul><li>What counters the risk? Awareness through education!! </li></ul>
We are all victims! <ul><li>1700 new victims in the course of this meeting. </li></ul><ul><li>By the end of the decade someone in your family will be a victim. </li></ul><ul><li>Lowest estimate of projected damage is $5000. </li></ul><ul><li>Only 1 in 700 is investigated. </li></ul><ul><li>1 year or less in jail. </li></ul><ul><li>70 – 80 % involve illegal dugs </li></ul><ul><li>FBI reports 30,000 computer a week are taken over. </li></ul>
Three FREE “must have” online tools.. http://www.passwordchart.com/
Any Web site or print ad offering free credit reports has to display this disclosure across the top of each page: THIS NOTICE IS REQUIRED BY LAW. Read more at FTC.GOV. You have the right to a free credit report from A nnualCreditReport.com or 877-322-8228, the ONLY authorized source under federal law. In September 2010 the rules will go into effect for TV and radio ads. September 2010: New law goes into effect.
<ul><li>Do not respond to any request for information in an email or by phone. Not your bank, your credit card company, your hospital or other so called “legitimate” company. </li></ul><ul><li>When in doubt CALL THEM AND ASK IF THEY SENT SUCH A REQUEST! </li></ul>Become a Privacy Grouch
Want to know more! My new course offered this fall.