Tuesday, December 10, 2013

Personal Information Sold at Goodwill



Have you ever donated old clothes, books, furniture or other items to a Salvation Army or Goodwill store?  Well, one donator to Goodwill in central Indiana donated a bit more than he intended.  If his donations were checked before being put up for sale, this may not be an issue.  Unfortunately, a box containing 39 pounds of one family’s personal information was sold to a woman for $27.69.

Emily Watson opened a box that she bought from a Goodwill outlet store in the Indianapolis area and found someone else’s sensitive records.  If items can’t be sold at the retail stores for any reason, they are put in bins and sent to Goodwill outlet stores.  These are closed boxes sold by the pound to anyone who wants to take a chance that there is something valuable inside.  Ms. Watson bought one such box and when she opened it found personal information all belonging to one family.  The box contained Social Security cards, tax returns, pay stubs, banking information, dental and other medical records, divorce papers and insurance documents.  There were also family photos and addresses of family members.

This had happened to Ms. Watson before.  At another time, she purchased a box containing personal information, so she opened the box in the store before buying it.  When she saw what it contained, she pulled out all the items to show a store employee, who referred her to the manager.  When the manager looked through the paperwork, she said, “It doesn’t look harmful to me.  It’s OK.”  Ms. Watson then made the purchase because she was afraid that it would get into the hands of someone not as honest as she.  She was afraid for the people the information belonged to. 

After purchasing the box, Ms. Watson tipped off WTHR Channel 13 as to her find.  WTHR 13 Investigates then opened an investigation as to the allegations made of Goodwill selling personal information.  The station sent undercover “shoppers” to three Indianapolis area Goodwill outlets and found that at every outlet location they visited, they were able to purchase someone’s personal information.  This didn’t just happen once; out of 28 visits in 2 months, personal information was purchased 24 times.   WTHR employees were able to purchase valid debit and credit cards, leases, automobile titles, medical histories, immigration papers, bills, employee drug test results, college transcripts, IRA and 401K statements and all other kinds of legal documents containing personal information. 
 
The personal information donated to Goodwill, then sold by them, contained thousands of pages, filling three boxes.  Some Social Security numbers found belonged to police officers stationed at the Indianapolis Metro Police Department.  When WTHR spoke with Sgt. Eric Eads, who is an identity theft expert in the department, he said, “Let me put it to you this way:  this is a police nightmare here.  If someone got ahold of this stuff.  It’s just shocking the amount of Social Security numbers and tax records you found.”

Another person whose tax records were found by WTHR employees is Elesabeth Leclercq.   She is quoted as saying, “It’s terrible.  I don’t even know what to say.  I’m still stunned and in a state of shock.”  Julie and Brett Snyder also found out that their information had been sold along with information on their children.  Mrs. Snyder said, “This isn’t anything we would throw away.  I mean, we wouldn’t have just handed this over to Goodwill.  It’s shocking.  We are completely shocked.”

The person whose information started it all when Emily Watson purchased it is named Rose.  She refused to give her last name, but she did give a statement.  “It’s pretty devastating and I’ve had nightmares about it” she said. 

Tuesday, December 3, 2013

Make Sure Your Password is Secure



Just about every day, there’s an article in the newspaper or a story on the news that talks about cyber-crime, usually in the form of identity theft.  Most Internet users feel that they are safe because they are “cautious”; they never download from strange websites, nor do they open an e-mail unless they know who sent it.  The problem is that these “cautious” people forget one of the most important aspects to keeping their privacy safe:  the password.  Maybe laziness or forgetfulness is the reasoning, but in this World Wide Web full of hackers, many thousands of people are still using the same password for everything they do online.  Some may argue that each password is “different”; however, having variations of the password “ABCD1234” doesn’t count as being different.   If you or someone you know is guilty of this way of thinking, you should really read on.
  
One of the first lines of our privacy defense is the password.  Whenever you sign up to become a member of a website, you need to enter a log-in name and a password.  Most sites will not accept passwords shorter than 8 characters and many require them to be alpha-numeric and case sensitive.  If you choose the password “platypus1”, you will not be granted access into that site if you mistakenly type in “Platypus1” on your next visit.  The password must be an exact match.  So, if you are a registered user on 10 different sites, you need 10 unique passwords.  “Platypus1”, “Platypus2”, “Platypus3”, etc. just won’t cut it. 

In order to try to make each password unique, many people will use different names combined with birthdates.  It’s not uncommon for a man to have “Pamela823” (his wife and her birth date, August 23) for one site, then choose “Henry312” (his son and his birth date, March 12) for another site.  A problem could arise, however, if that man signs on to Facebook using a public hotspot and is hacked.   Once the hacker knows the Facebook password, he could look to see the names and birthdates of the spouse and children.  So, if the Facebook password is “Pamela823”, this hacker will try that same password for an email account.  If that doesn’t work, he’ll look to see the son’s name and try “Henry312”.  Hackers are very good at what they do, so before you know it, this cyber-crook is going through your bank account.

There is a corporation in Virginia called Siber Systems, Inc., that realized how difficult it is for many people to come up with unique passwords.  With this in mind, in 1999 they developed RoboForm, their first product with consumers in mind.  It now has worldwide users numbering in the millions.  Demand was so great that RoboForm is now available in 30 languages.

RoboForm takes your information and each time you register for a site, it comes up with a unique username and password.  You don’t have to do a thing.  The only password you need to remember is the master password from when you first used it.  So, you log on to your computer, enter your master password into RoboForm and RoboForm goes to work for you after that.  It not only generates unique passwords, it remembers them for you.  Another plus is that each password is encrypted, making it almost impossible to be hacked.

Due to the success of the original RoboForm, in 2004, Siber Systems expanded its product line with RoboForm2Go.  This portable version of RoboForm is on a USB flash drive that you plug into your computer.  No matter where you travel, you will have RoboForm2Go with you.  Not only that, it will work in your native language.

RoboForm is the perfect solution for creating unique passwords and then remembering what they are for each site that you visit.  It is a great tool for keeping you safe when you surf the Net.

To add even more protection to your Internet surfing, you should use a proxy server from a reputable company.  Please take the time to visit Privacy Partners and take advantage of the FREE trial offer.  You will be glad you did once you see how safe you feel knowing that you can surf the Internet from anywhere knowing that every time you connect, your information is encrypted.

Thursday, November 21, 2013

What Is An IP Address?



Anyone who uses a computer has heard the term “IP Address”, but what exactly does that mean?  What is an IP Address?
 
An IP Address, or Internet Protocol Address, is the digital “address” assigned to every device connected to the Internet. Internet Protocol is the technical standard that should be followed while using the Internet.  This protocol was developed in the 1970s.

There are two versions of IP that support the computer network addressing.  They are:  Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6).  The most commonly used version is IPv4.  With this version, the IP Addresses are four bytes (or 32 bits) long.  IPv6 is the newer version, which allows IP Addresses of 16 bytes (or 128 bits) long.  Whichever version is used, the IP Address has two main purposes:  host or network interface identification and location addressing. 

IPv4 addresses are typically shown in a “dot-decimal” sequence.  They are made up of four parts, using numbers that range from 0 to 255.  Each part is separated by a decimal (or dot) and each group consists of 8 bits.  An example of this is shown below:

The Internet Assigned Numbers Authority (IANA) is responsible for coordinating the global pool of IP Addresses and then providing them to the Regional Internet Registries (RIRs) so they can be assigned to end users, including Internet service providers.  The main address pool used by IANA was depleted on February 3, 2011.  This is the date that the last blocks were assigned to the 5 RIRs.

IPv4 addresses were depleting so rapidly due to the explosive growth of the Internet, that the Internet Engineering Task Force (IETF) was forced to look into new technologies in order to expand the address capacities.  The solution they decided on was to completely redesign the Internet Protocol.   In 1995, IPv6 was named as a means to replace IPv4.

In this new version, the address size was increased to 128 bits from the original 32 bits.  Even considering a growth explosion, this should give a sufficient amount of available addresses well into the future.  A typical IPv6 address would look like this:
This new formula is capable of automatically changing the routing prefix of whole networks without the need to redesign or renumber the system.  This will be necessary if global routing policy changes. 

Thursday, November 7, 2013

Grocery Shelves Will Now be Spying on Us



As if we don’t have enough to worry about, now we need to start thinking about being spied on while we do our grocery shopping.  Food giant Mondelez International, parent company of Nabisco, Kraft and Cadbury, is said to be planning on introducing “smart shelves” to grocery stores by the year 2015. 

Working with Microsoft Kinect, Mondelez International is said to be working on a system to identify shoppers walking down the food aisle.  Using facial recognition, these “smart shelves” will be able to identify shoppers by age and gender.  Once identified, a coupon will appear near a food or snack targeted to that particular shopper.  For example:  If a woman in her early 30s walks by, there’s a good chance she may be thinking about chocolate.  As she approaches the shelf for Cadbury chocolates, a coupon will pop up.

Along with facial recognition, the smart shelves will also have weight sensors installed.  This way, if a shopper over the age of 18 picks a box up from the shelf, a coupon could be sent to “persuade” the shopper into buying that product.  The coupon will come by way of either a dispenser or a display screen.  Tech writer Brian Fung of the Washington Post says of this technology, “it’s not quite Minority Report levels of creepiness, but it’s getting there.”, while Neal Ungerleider of Fastcompany.com said it’s “the ultimate in creepy, yet inevitable marketing tech.”  Personally, I have to agree with Neal about it being the ultimate in creepy.

According to Mondelez’s CIO Mark Dajani, no videos or photos of specific shoppers will be saved.  The information will only be used to collect information about the types of shoppers looking at the products or walking down the grocery store aisles.  It could help food companies with product placement so as to maximize sales.

Monday, September 30, 2013

Do You Regret Some Social Media Posts?




Every day, all over the world, people are signing on to the Internet and their social media accounts.  Facebook alone has millions of users worldwide who keep in touch with family and friends.  Then, there are those who use LinkedIn to keep up with business contacts or create new ones and still others who aren’t happy unless they check their Twitter accounts several times a day.  Do you have photos or videos you want the world to see?  No problem!  For that, there are Instagram and YouTube.  Social media is so important in our lives that most people have accounts with all of these giants.  Love it or hate it, it seems that social media is here to stay.  

In the early years of the Internet, in order to surf the web, you needed to be either home or in your office sitting in front of your computer.  Today, everywhere you look, people are on the Internet.  There are so many gadgets available with Internet access that Facebook, Instagram, Twitter and LinkedIn are available at the touch of an icon.  With your smartphone, tablet or iPod, the Internet is at your fingertips no matter where you are.  Because of this easy access, many people will hit that “Send” button without really thinking things through. 

Work can be stressful and your commute home is often the first time you had all day to just sit and relax.  As the bus brings you closer to home, you pick up your smartphone and post a rant on Facebook about your incompetent co-workers, your idiotic boss and how all the work falls on you or it would never get done.  As soon as you hit “Send”, you feel as if a weight has lifted off your shoulders.  You spend the rest of your commute either reading or catching a quick nap and in no time, your Facebook rant is forgotten.  Well, it’s forgotten until the next morning when you walk into the office and are greeted with angry stares and your boss is waiting for you at your desk with your final paycheck and your personal items packed away.  You don’t understand what’s happening and then you remember your rant.  You also remember that all of your co-workers and your boss are your Facebook friends. 
 
Another common mistake is recording a friends’ night out.  All through the night, martini after martini, you and your friends are snapping pictures with your smartphones and posting them to Twitter, Instagram and Facebook accounts.  At the end of the night, you and your friends decide that it would be “fun” to make use of the stripper pole on the stage to show your most seductive moves.  As each of you has a turn, the others are making videos and posting them to YouTube.  You and a few million others will see it the next day.  If it goes viral, maybe you’ll even see yourself on the news in a week or so. 
 
Then there are those who feel the need to update their relationship status each time they get a new girlfriend or boyfriend.  I don’t know why there is a need to let the world know that “Joanie is in a relationship with Chachi”, but, it gets posted and stays on the couple’s Facebook Timelines long after they break up.  Imagine all the relationship statuses there can be until you find Mr./Ms. Right. 

There used to be a time when drunk-dialing had to wait until you were home; today, you can drunk-dial your ex as you’re sitting at the bar!  But it doesn’t end at drunk-dialing; there is now drunk-Tweeting and drunk-Facebooking.  It’s so convenient to have this technology, but what happens when you realize that you blasted your co-worker, your boss or your significant other on Facebook or Twitter? 

Yes, social media at your fingertips turns normally reasonable people into unreasonable people.  No one seems to consider that Facebook updates and tweets in real time could be dangerous.  Letting the world know where you are every second allows you to be found by anyone.  It also lets thieves know that you aren’t home and the time to strike is now.  So, the question is:  Do you regret some of your social media posts?

Privacy is one of our most valuable commodities.  So many things can compromise our privacy, so don’t let social media be yet another risk.  Before you post anything, step back and ask yourself the following questions:

1.   How will this be viewed by my employer, prospective employer or university? 
2.   In the future, will this post embarrass me?
3.   Would I be embarrassed if my parents or children saw this?
4.   Can I lose my job if my boss sees this post?

Immediately delete the comment, video or photo if you answered “yes” to these questions.


All of us would like to keep our privacy safe.  At the top of this page there is a free download of our Privacy Guide.  Please take us up on this offer.  You will see many suggestions on how you can keep your private life private.