Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Child Identity Theft

Parents Beware of Finstagram

…cess the device and its applications. Or the child can’t have a phone. Non-negotiable. Done deal. Sit down with your child to talk about their usage of social media, and the repercussions of their actions on social media. You also might want to talk to other parents you know about Finstagram accounts. These accounts might be for innocent fun, but they could also ruin someone’s life. Robert Siciliano personal security and identity theft expert…

What is Sextortion?

…ay you can fill the gaps. You might also consider contacting any social media services where photos were shared, such as Facebook. They will usually help. It is also a good idea to contact a victim advocate, as they know what type of evidence to look for that can be used in court. Finally, make sure to report the person via social media, which will help to block the accused account. Robert Siciliano personal security and identity theft expert…

What age is it OK to leave Kids home alone?

…seem old enough to be left home alone for a few hours, but not in charge of his two-year-old sibling. The various U.S. states do not have clear explanations; it’s up to the parent to interpret each circumstance. And only three states specify the minimum age: Maryland is eight; Oregon is 10; and Illinois is 14 … even though many girls begin babysitting late into the night at age 11. Robert Siciliano personal security and identity theft expert…

How to Use your Mobile as a Child Locator

…onth) applications that can give you the location of your family member. Family locator apps are offered by T-Mobile, AT&T, Sprint and Verizon Wireless. Locator apps also come with other features, not just the locator aspect. Some offer 911 and emergency features. This would be great for your elderly grandmother who forgets things or gets lost easily. Robert Siciliano CEO of IDTheftSecurity.com, personal security and identity theft expert…

Identity Theft getting even worse

…an accelerated mode of operation. For them, your Social Security Number is the pot of gold at the end of the rainbow. Thieves will use it to set up new accounts in the victims’ names, then go on spending sprees. This kind of identity theft is called new-account fraud. This can go on for months or years before the victim realizes it. Sometimes the victim never finds out. These cases can also slip by the victim’s bank. A favorite scam is for the…

Predators hunting Kids on Gaming Sites

…se reports, about “catching the bad guy in real life.” Feel free to refer to the bad guy as a predator, not just “bully.” Many kids think of “bullies” as other kids who call each other names online. But if a child is old enough to play on gaming sites, they’re old enough to be taught about adult male cybersexual predators and how they pose as young girls. Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity

Child Predator screws up, gets caught

…this is what forensic technology can do these days. Only some of Keating’s name and the prescription number were actually extracted in a photo lab, but it was enough information for a record check of the pharmacy to get his identity. Homeland Security Investigations Cyber Crimes Center specialist Jim Cole says his Project Vic teamviews half a million images every week. How does this technology work? Computers use “Photo DNA” to speedily sift…

Parents legally can spy on their Kids

…including New Jersey, Texas, Arizona, Maine and the Carolinas. Hopefully, not too many parents will abuse this legal right and end up eavesdropping for the fun of it or to show off their “power” as the adult in charge. But that fact is, kids can get into lots of trouble with their physical and digital lives if their parents are unaware of what’s going on. Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity

Parents: do You know your Teen’s Social Media Platforms?

With all the apps out there that individualize communication preferences among teens, such as limiting “sharing,” parents should still hold their breath. Face it, parents: times have changed. It’s your duty to discuss these applications with your kids. And parents should also familiarize themselves with the so-called temporary apps. Temporary messages do not vanish forever. Are anonymous applications really anonymous? How temporary is…

Posting Kids’ Photos online is illegal?

…are hoping to accomplish), the police wouldn’t be so rigid. Still think the police are over-reacting? And maybe they are, but consider this: According to The Parent Zone, the average person posts nearly 1,000 images of their child online by the time that child blows on five birthday candles. Now maybe The Parent Zone isn’t the gospel, but we all know people who seem to have 8,000 pictures up of their children on social media. What’s even more…

Preplan for a Safe Vacation

…ll you’re on vacation to do this. And speaking of young kids…forbid them from dashing ahead of you, especially in crowded areas, especially in a foreign land. You just never know what could happen (e.g., someone swiping your child; your child accidentally ramming into someone and getting injured or inadvertently knocking over a frail elder). Really, I’ve seen kids bolting ahead of their parents like a freight train, including when the parents…

How Parents can de-motivate Sexting in their Teens

…e.” Recognize that the peer pressure to sext is similar to the peer pressure to drink and smoke. Don’t just tell your kids what not to do. Role play with them. Recruit an older teen to do some staged pressuring. See how your child responds. Does your child stammer and find it difficult to vocalize resistance? Are they at a loss for words? Is their body language mousy? If the answer is “yes” to these, you have a big job to get done fast. Robert…

Prevent Child Identity Theft

…hey can get away with their crime all throughout the victim’s childhood until they start applying for college, credit cards, etc., at age 18 or so. That’s a long time to get away with a crime. Let’s talk about how to prevent child identity theft. ID Theft Protection Sign on with an ID theft protection company; many such companies protect the entire family including kids. Get an ID theft protection service. This is not the same as antivirus…

How to freeze your Child’s Credit

…someone is using your child’s SSN: You receive an IRS notice claiming your child didn’t pay income taxes. You get an IRS notice informing you that another tax return used your child’s SSN. You receive collection notices for things you didn’t purchase. Rejection of government benefits because the benefits are going to another account with your child’s SSN. Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity

Sorry, stop posing Kids’ Photos online

…and set them at their highest. Find out whom your “sharing” images with. Do all of these people meet your approval? Do you know whom they’re sharing them with? It’s not a crime to build old-fashioned photo albums—stored safely on a living room shelf that only visitors to your house can view. When in doubt, don’t post it. Once it’s up, it’s there forever. Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity

Indiana Is a Big Target for Identity Theft

…Just recently, the state’s Attorney General Greg Zoeller was in Fort Wayne to announce the launch of “Freeze Identity Thieves.” This program, which is designed to protect consumers who may become victims of identity theft, allows people to freeze their credit online, for free. And it’s been around since 2008. He just figured it out. This past year, there were reports of more than 400 data breaches in the state, which allowed…

Business Identity Theft: Beware of Identity Thieving Employees

…forgery and two counts of theft of property. So you see, the “bad guy” is sometimes a woman. It happens more often than you think, too. An article at sacbee.com tells the case of Natashia Adams Lugo, 31, whose dirty deeds of identity theft got her a sentence of almost 15 years in a state prison. Lugo had been employed by Job Journal LLC. Then she was fired. So she decided to get some revenge by using her former employer’s bank checking and…

Stop being a blabber on Social Media

…media for one week to kill your hunger for obsessing over a family member’s bigger house, fancier car and more prestigious job. Set your privacy settings on high. Stop making inane posts about everything that happens to you. Nobody will go to bed in distress just because they didn’t read that you had an upset stomach after eating too much at BurgerVille. Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity

Is your Daughter chatting with a Pedophile?

…s are best. Use spyware to keep tabs on your kids (yes, this is legal from parent to child). Spyware will track the user’s online activities and is quite thorough, though it may be overkill if your child is a normal, typical child. Before buying your child a computer or smartphone, lay out the big rule: You get to periodically check the device; you will meet new online friends; you will even have your child’s passwords. If your child already has…

How to stop Teenage Sexting

…your kids how they’d manage life living with a child pornography conviction. Make cell phones prohibited in their bedroom at night. Keep the phone chargers in your room. Habitual sexting, like any ongoing bad behavior, is a symptom of skewered family dynamics. Kids from a stable home life where they feel valued are less likely to get hooked on sexting. Robert Siciliano is an identity theft expert to TheBestCompanys.com discussing identity theft

Do you know what your Kids are doing online?

…o that they can’t be identified by you? Chances are, you, the parent, also uses a pseudonym. It’s very common. Cyberspace is full of obvious pseudonyms, but a phony name can also be a regular name that many people have. Your child will be lost in a sea of David Johnsons or Amanda Millers. Intel Security did a study and found that 40 percent of kids use aliases or alternate accounts. Intel Security also found: Many kids fessed up to…

Child Identity theft is becoming Solvable

…l to see how much private information might be shared. For instance, a child’s Social Security number absolutely does not have to be given just for them to be on a softball team, member of the band, chess club, this or that. Identity theft protection on a family plan should be a consideration. Generally these services will watch for activity regarding your childs SSN and new lines of credit. Robert Siciliano is an identity theft expert to…

Don’t Name Your Dog After Your Password

Recently I got a puppy for my child. We decided to name the puppy 4wgu23x5#9. My wife,8yysH3m, thought we should name the dog 0x2%#b5. But I’m sure she’ll get over it. Meanwhile, I’m helping my older child with setting up a few social media accounts, and I suggested the two passwords: Rover and Spot. Is there something wrong with this picture? Of course! But this picture replays itself millions of times over all the time, as people name their…

Identity Fraud Victim every two Seconds

…l) when anomalous activity occurs, such as a purchase made in two countries only a few hours apart, or any purchase over a certain amount. Ask about additional forms of fraud detection as well. If you suspect fraud, immediately report it. If you receive notification of a data breach, you’re at higher risk for fraud; crack down on monitoring your accounts. Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity

Smartphones for Kids aren’t such a good Idea

…ught of: cyberbullying, violent porn, online drug purchases, you name it. Smartphones give kids ongoing Internet access; they can’t live without this constant connection because it’s the normality that they’ve grown up with. Children and teens are a product of their technological times and can’t imagine getting through the day without constant connection to the cyber universe. An article in The Telegraph features a perspective from child

Company proves why you shouldn’t post Kids’ Pics online

…further down the continuum, we may have a company sooner or later selling T-shirts with YOUR child’s face on them—without your knowledge. Koppie Koppie says it will take down a mug of your child within two weeks of your complaint. But think of how many parents will never read this article and know what Koppie Koppie has been up to or anyone else for that matter. Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing…

Frequently Asked Questions About Identity Theft

…tealing money or credit? No, financial identity theft, using your personal information to access your money or credit, is not the only type of identity theft, although it is the most common. There are other kinds of identity theft identity theft. Medical identity theft is when someone uses your information to receive medical care. Criminal identity theft is when someone takes over your identity and assumes it as his or her own. They can then…

Promote Child Home Safety

…the cabinet containing the cleaning supplies was off limits. The second child didn’t have this option due to all the cabinet locks. Don’t forget the bathroom and linen closets and even the garage. Home security. The smartest child in the world can still be victimized by a thug who broke through a window. Windows should have shatter-proof film. Your child should learn how to activate the house alarm so that it will go off if someone tries to…

This is what Spy Software looks like

…more like defensive TOS, since anyone can claim they’re a parent or workplace supervisor without having to prove it. What’s a company really going to do…send out a private investigator to see if the new user really DOES have a teenager? Now that you know more about spyware, how can you prevent someone from bugging your phone or computer? Keep your devices locked. Never leave your phone where someone can get to it. Robert Siciliano is an…

Having the Privacy Talk with your Kids

…hat would you like them NOT to discover?” Don’t be all lecture. Get your child thinking and talking opportunities. Ask them open-ended questions, such as the example in the previous bullet point. Get their brain cells working. The privacy talk should be a process, not an event. That is, it should be a work in progress, ongoing, rather than a single event. Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity

Father nabs Daughter’s Kidnapper

…intruder was carrying her across the lawn after kidnapping her at 4:30 am. The parents left a door unlocked! The father never heard screams, but was a light enough sleeper that he heard the front door opening, then heard the child talking. The time lapse between when the front door opened and when the father caught the intruder outside is not clear. But there was enough time for the sociopath to get into the girl’s basement bedroom, pick her up,…

What is Criminal Identity Theft?

…victims of identity theft. What most people don’t know is that identity theft is much more than just stealing your credit card number. In other posts, I discussed how thieves use your identity to get free healthcare or your child’s identity to apply for credit. Today, I want to introduce you to another kind of identity theft—criminal identity theft—where the criminal uses your identity to make you look like the criminal. Criminal identity theft

The Sweet Sixteen Rule

…ng the big sweet 16 party and preparing for a new driver on the road (and the crazy high insurance that goes with it). During this exciting time, there’s something else you should be thinking about—your child’s credit score. Child identity theft is more common than we want to think it is. According to a study by Identity Theft Assistance, 1 in every 40 households with minor children has been affected by child identity theft. Thieves love this…

Child’s Honesty nabs Robbers

A four-year-old girl witnessed two young men break into her home to commit a robbery. You’d think this would cause some kind of post-traumatic stress disorder, or at least at a minimum, nightmares. But it looks like instead, Abby Dean of Washington, WI, will have dreams of flying around with a cape and rescuing people. That’s because her accurate description led to a confession by the thieves. She was with her 17-year-old babysitter when it…

Family Identity Theft is Ugly

…en’t available to children until their identity is stolen. Applying for a fraud alert every quarter to 6 months and being denied means no credit has been established. Identity theft protection in many cases will help prevent child identity theft. However not all services offer this option. The good news is that child identity theft protection is generally less than $50.00 a year per child when the parent invests in a family plan. Robert…

Kiddie Burglary Ring busted with 10-year-olds

…inda Narro’s door was kicked down by the home invaders who absconded with thousands of dollars’ worth of belongings. More thieves in this string of crimes are believed to be out there, as police continue hunting them down. A child burglar gets probation as punishment. Hmmph. A convicted adult can get up to 10 years in prison. It’s too easy to blame lack of supervision on 10-year-old robbers. Lack of supervision usually amounts to playing…

Children significantly affected by Burglary

…g to 10 percent of the parents. One-third reported that their kids’ sense of personal safety was affected. The investigation also turned up that the psychological impact of burglary can have a long lasting negative effect on children. So what does this mean for adults, who, as children, experienced a home burglary? One-third of the participants in the study, whose homes were burglarized when they were kids, believed that this experience was…

Security is about Layers and Attitude

…e softies when it comes to truly threatening situations. Or, we’ve become desensitized to possible threats. An example of this civilized conditioning is mothers teaching their children, “Respect authority.” But what should a child do when an authorative adult tells a child his mother is sick so he must get on the van to go see her? It’s this conflict with civility and survival that predators prey upon. We need to take more responsibility towards…

How to keep your Kids safe Online

…w who they are communicating with. At any given point and time it should be required that parent can check devices and openly discuss any conversations being had. If the parent can’t meet the person or the persons parents, then the child shouldn’t be talk talking to them. Require device and account passwords. No matter where they go online or whatever devices they own, the parent should have full access at all times. Robert Siciliano is an…

Dear Colleagues, Clients, Friends, Family, Media and all others

…#8220;The greatest gifts are those that can never be reciprocated, like the gift of health that the doctor makes to a poor patient, demanding nothing in return, or like the gift of life and nurture that a mother makes to her child, or like the gift of his own life that a soldier makes when he dies in battle for his country. Philosopher Roger Scruton in The American Spectator defined Gratitude and Grace. One sentence in particular “Everyone who…

Boston Bombing

…Shortly after the bombings, evacuating the city, carrying my 40lb child after running 26 miles. Hurt, angered, saddened and grateful to get to my family. …

How To Stop Criminal Hackers In Their Tracks

…ill then have their credit card number on file. This would mostly eliminate any anonymity, thus preventing numerous e-crimes. Don’t think for a second something bad can’t happen to your business. Performing due diligence, knowing your options and implementing these barriers will keep both you and your customers from legal troubles and from getting hacked. Robert Siciliano CEO of IDTheftSecurity.com, personal security and identity theft expert…

Beware of Employees Who Lie About Their Identity

…employment applications, time and money can be saved and problem employees who lead to litigation can be averted.  Eventually, detection methods for fake IDs, such as smartcards, biometrics in all its forms, and multi-factor authentication, will help ensure that the identities presented can be trusted—and being an imposter won’t be so easy. Robert Siciliano CEO of IDTheftSecurity.com, personal security and identity theft expert…

Amber Alert GPS: Say Hello to Smart Affordable Child Locators

…it easier for families to stay connected and protected. In the course of raising a family, over 90% of parents will at some point lose track of a child. Kids are curious beings, so it’s not surprising that every 40 seconds a child goes missing in the US and close to 50% of autistic kids wander each year. These panic stricken moments are usually the result of a child misunderstanding directions, being lost, running or wandering away. With today’s…

Find Missing Kids with SafetyLink

…curred in New Delhi. So disturbed by this crime, he awakened one morning at 4 a.m. and knew it was time to develop a mobile-based solution that could save people in danger. Enter SafetyLink The main targets of SafetyLink are children, women and senior citizens. Should a child become lost or abducted, for example, or a hiker take a serious fall, they simply press and hold the coin-sized button of the device. This will send an SOS. The SOS will…

Home Invasion results in Child Casualties

Two young girls died after a man broke into their second-story Cleveland apartment and set it afire. This was after the man forced the 55-year-old babysitter (the children’s’ aunt) into a bathroom, where she remained—until she began smelling smoke. Then she fled to outside and later reported that the man had started the fire. Ironically, in the week prior, the victims’ mother had been robbed at gunpoint. The man who broke in and the man who…

Managing your Digital Afterlife

…your death. An unused account will become a property of the state. Give your family information pertaining to safe-deposit or security boxes. Register your spouse’s name or child’s with your bank. Next, have your spouse and child sign the registration document; they’ll then be able to access your account without having to get a court order. Health Care Fill out a durable health care power-of-attorney form. This way, a person you designate can…

Child Identities need more Legal Protection

…it to a different name and always changes the date of birth. So 2 year old Sally is now 22 and has a Benz. The thief then uses this new identity for job applications, loans or government benefits. The unique disaster is that child identity theft could persist for years before the parents or victim when older figure it out. This delay makes it harder to restore the victim’s good name. Tens of thousands of children are victims of identity theft

Should You Post Pictures of Children Online?

…en have a right to privacy. Just because they are five and you think it’s fun to post their photos online—and maybe they think it’s fun too—what makes you think in 10 years they will want their entire childhood posted on the web? Digital media lasts forever, and maybe they might not want their identity all over the web in the first place. You really have no right. Tagging: Anyone can take a picture and tag it. I forbid…

House Keys for the Kids…When Your Children are Ready

…in days at specific times. You can also receive text alerts when an alarm triggers or when specific codes provided to your kids are entered at the lock. Once a parent comes to the conclusion it is necessary to provide keys to a kid, it might now be a good time to consider ditching the keys and handing over the passcode! Robert Siciliano home security expert to Schlage discussinghome security and identity theft on TBS Movie and a Makeover….

Why Child Identity Theft is Dangerous

…ty thieves to steal the identities of children, especially infants because it is unlikely that your child or you as parent, will be checking their credit report, since they are too young to talk let alone have a credit card. Child identity theft occurs when the identity of someone under the age of 18 is compromised. When this occurs, the child’s Social Security number is used to open up new accounts. The new accounts opened could be anything…

Why Home Security Matters

…cal safety—due to war, natural disaster, family violence, childhood abuse, etc.—people may (re-) experience post-traumatic stress disorder or transgenerational trauma. That’s serious stuff, but think of it like this: If your child experiences some form of trauma at school, like bullying, he or she will most likely not want to go back. And in some cases, the child even takes his or her life because of that trauma. And if your home is ransacked,…

15 Tips for Back And Forth To School Security

…and do not reveal locations. 14. When getting home, make sure the house is locked before walking in. Always look for red flags that might signal an intrusion. If something seems wrong, it is wrong. 15. Consider Schlage’s Touchscreen Deadbolt, which is a keyless lock. Eliminating keys eliminates lost keys and lockouts. Robert Siciliano home security expert to Schlage discussing home security and identity theft on TBS Movie and a Makeover….

Children Heading Back to School Face Identity Theft Risk

…or simply from someone stealing mail or going through the organization’s trash. The problem here is that once a bad guy gets hold of the child’s Social Security number, he or she can then open new lines of credit under that child’s identity simply by lying and saying the child is 18 years or older. With that information in the wrong hands, that child will face serious issues as a young adult when he/she is starting a new life and career out of…

Cheating and Bullying: It’s a Bigger Problem than You Think!

…2 say they have witnessed mean behavior directed at a classmate or friend online, but that number jumps to 34% for young adults ages 18-23. Parents don’t know the full extent of the problem – Only 9% of parents believe their child or children have witnessed cruel behavior online; even worse, only 6% think that their son or daughter has been a target of this cyber bullying, when in reality 13% of youth report they have been targeted online. Peer…

A Digital Life Through the Eyes of a Child

McAfee’s 2013 study, Digital Deception: Exploring the Online Disconnect between Parents and Kid s , examines the online habits and interests of tweens, teens, and young adults. It found there is an alarming and significant disconnect between what they do online and what their parents believe they do. The study shows that 80% of parents did not know how to find out what their kids were doing online, while 62% did not think that their kids could…

Fight or Flight: What Would You Do?

…tribute to making a person freeze up, stop breathing and panic when someone attacks. What would you do if confronted by a bad guy? How would you respond? Freeze up? Run? Fight? As a parent, if someone were to walk up to your child and put his hands on her, without hesitation you would respond with a vengeance—because the parental instinct to defend one’s child never goes away. So you do have it in you; your job is to access those instincts when…

10 Ways to Prevent an Abduction

…predators, there are predators today and there always will be predators—and we have to take steps to protect ourselves and those we care for. When a true stranger—not a family member, not someone known to the child—steals a child, that child often won’t survive beyond three hours. No matter what the statistics are, child abductions are real—and they happen far too often. The last thing you ever want to think about is your child getting taken…

5 Ways to Ensure Online Privacy for Kids

…ave been brought about from technology, such as the rapid adoption of mobile devices. Parents who lack experience with the Internet, computers, or mobile devices must learn the basics before they can adequately monitor their children’s habits. A parent’s discomfort or unfamiliarity with technology is no excuse to let a child run wild on the Internet. In fact, in McAfee’s study, “The Digital Divide: How the Online Behavior of Teens is Getting…

Enacted Maryland Child Identity Lock Bill, is Useless

…inor’s Credit File” As of this writing, a phone call to Equifax at 1-800-603-9430 (a phone number only available by initiating a chat session) reveals the customer service agents have no knowledge of the Maryland Child Identity Lock bill, and will only freeze credit if the child is currently a victim of identity theft. Once a credit report is generated for a minor the damage is done and then a credit report can be frozen. Transunion…

Top 13 Halloween Safety Tips

…r me I have two kids which means I’m going trick or treating and eating 20lbs of chocolate on November 1st. Don’t worry I’ll give them a few pieces! To prepare you and your family for a safe and secure Halloween follow these child safety tips from the Center for Disease Control: One basic Halloween safety tip is to avoid trick-or-treating alone. Walk in groups or with a trusted adult. Fasten reflective tape to Halloween costumes and bags to help…

10 Ways To Protect Kids Online

…one numbers, or other personal information. Limit exposure: Kids should not be permitted to post inappropriate photos or photos that may reveal their identities. (For example, a photo in which a t-shirt bears the name of the child’s city or school.) No strangers: Never allow a child to meet an online stranger in person. 10. No attachments: Children should be taught not to open online attachments from strangers. Robert Siciliano, personal…

June is Home Safety Month

children between birth and age 19 are seen for injuries each year in U.S. emergency departments, and injuries are the leading cause of death among children in this age group. Home Safety Month is an ideal time to learn about child safety and the top causes of child injury.   Burns Install and maintain smoke alarms in your home. Develop and practice a family fire escape plan. Set your water heater’s thermostat to 120 degrees Fahrenheit…

Basic Security Tips When Providing Free Wi-Fi at Your Business

…via Peer to Peer programs is big and costing the entertainment industry billions. The RIAA and MPAA don’t like this and will often crack down on whoever is connected to the IP address associated with the illegal downloading. Child Porn: The long arm of the law is often spending time in chat rooms posing as the young and vulnerable and chatting it up with pedophiles who exchange in child pornography. Wouldn’t be cool if the FBI to came knocking….

Managing Family Time On The iPad or iPhone

…for right before dinner, homework, or bed. It’s tough to peel a kid away and readjust their senses to their real world responsibilities. 4. Set time limits. Addiction to gaming and virtual worlds is a real thing. Allowing a child unlimited access to television is bad enough. Allowing a child unlimited access to the digital world could cause behavior issues. We don’t allow any more than 15 or 20 minutes per hour on any game, and no more than 45…

FBI launches FBI Child ID App

child can go missing. In response the FBI has created the FBI Child ID application. Straight from iTunes: “The free FBI Child ID app provides a convenient place to electronically store photos and vital information about your child so that it’s literally right at hand if your child goes missing. You can show the pictures and provide physical identifiers such as height and weight to security or police officers on the spot. Using a special tab on…

Do You Let Your Kids Out Unsupervised?

…rned about situational awareness and being aware of my surroundings. Not a day goes by now that I don’t “benefit” from that horrible incident. Recently news reports of “Brooklyn Missing Boy: Police Arrest Man the Dismembered Child Had Asked for Directions” reminded us about how there always have been predators, there are predators today, and there always will be predators and we have to take steps to protect ourselves and those we care for. My…

Online Gamers Risk Credit Card Fraud

…ime with your child discussing appropriate online behavior, and look for parental controls that will send you email alerts when your child makes a purchase. McAfee, the most trusted name in digital security, includes proactive identity surveillance to monitor subscribers’ credit and personal information, as well as access to live agents who can help subscribers resolve identity theft issues. For additional tips, please visit…

What Identity Theft Protection Is and Is Not

To all you security companies out there, listen up: “identity theft protection” has become an overused and abused marketing term, which is often used to sell a product or service that doesn’t actually protect users from identity theft. It’s like labeling food “natural” when we know it’s not “organic.” It’s incorrect at best and a lie at worst. Every security company on the planet claims to protect identities. But a firewall is not identity

Talk To Your Kids about Teen Dating Violence

…demeanor is a red flag. Signals of a controlling relationship range from the obvious signals exhibited by a person’s overbearing body language to the not so obvious manipulative text messages. Look for signs of fear in your child such as behaving oddly (which can mean a thousand things) or verbal or physical abuse. If your child begins to change their daily routine to accommodate their partner that may mean they are being manipulated. If they…

Predators Using Social Media to Stalk Kids

…nd slowly groom their victims. Now many of them are on hundreds of different social networks. In 2010 the CyberTipline received more than 223,000 reports of nefarious online behavior.“The increase in the number of reports of child pornography and online sexual solicitation of children is alarming,” said Ernie Allen, President & CEO of NCMEC. “The child pornography images we are receiving are becoming more violent and the victims much…

Another Reason To Secure Your WiFi

…ication program that was created in response to several serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy. Follow your routers instructions to set up its security or find yourself a 14 year old to do it for you. Robert Siciliano personal and home security specialist to Home Security Source discussing home security and identity theft on TBS Movie and a Makeover….

18 Snagged In Home Invasion Ring

…ree trimmers it often involves the homeowner being taken into the back yard while the invaders go in through the front door and ransack the home. CrimeVoice.com reports “And in one case they actually took a photograph of the child in the house. (They) threatened if they did call police; they had a picture of the child, knew what they looked like, and would harm them. Jewelry has yet to be recovered; the task force did help uncover $25,000 in…

Child Abduction Awareness For Parents

When a true stranger steals a child, the child often doesn’t survive beyond 3 hours. Protecting yourself and children begins with understanding basic security. Today most helicopter parents won’t take their eyes off their kids, and I don’t see that as a bad thing. Always have recent photos and videos of your child for police. Invest in a fingerprint or DNA kit to help investigators. In the event that a child is approached, the best defense is a…

School Officials Warn of Identity Theft

…ction includes proactive identity surveillance to monitor a child’s identity and access to live fraud resolution agents who can help subscribers work through the process of resolving identity theft issues. For additional tips, please visit http://www.counteridentitytheft.com Robert Siciliano is a McAfee Consultant and Identity Theft Expert. See him discussing child identity theft on NBC Boston (Disclosures)…

Google Assembles “Best Of” Family Safety Center

…Safety Center works alongside many organizations in the US to promote action and awareness around Internet safety. They offer resources and advice on cyber bullying, child protection and online education both for parents and children.” A few of the resources include: ConnectSafely is the leading interactive resource on the Web for parents, teens, educators – everyone engaged and interested in youth safety on the fixed and mobile social Web. In…

Protecting Children on the Internet

…s, addresses, phone numbers, or other personal information. Kids should not be permitted to post inappropriate photos or photos that may reveal their identities. (For example, a photo in which a t-shirt bears the name of the child’s city or school.) Never allow a child to meet an online stranger in person. Children should be taught not to open online attachments from strangers. Robert Siciliano, personal security expert contributor to Just Ask…

Part 1 of Identity Theft – 5 Identity Theft Myths Unveiled

#1 You can’t protect yourself from identity theft. Some, not all Identity theft is preventable. There are many things people can do to minimize their risk, both online and offline. Shred anything that has names and account numbers or any other data that can be used to con someone else into divulging even more information. Keep financial records protected and private in a locking file cabinet at home or protected PC. Opt out of junk mail. Invest…

Victim Rebuilds Life After Identity Theft

…dentity theft can happen to anyone. McAfee Identity Protection, offers proactive identity surveillance, lost wallet protection, and alerts when suspicious activity is detected on your accounts. McAfee Identity Protection puts victims first and provides live access to fraud resolution agents who work with the victim to help restore their identity even from past theft events. For additional tips, please visit http://www.counteridentitytheft.com….

Child Identity Theft

…discovered a tremendous amount of debt, and accounts he had never opened. One such account showed that a credit card had been opened in his name when he was 13 years old. Jason found out the hard way that he was a victim of child identity theft. When Jason was a child, his father was convicted of credit card fraud. You may be saying, “Of course I would never steal my own child’s identity,” but sometimes the custodial parent discovers that his…

Privacy Laws for Kids Online

…on Twitter in order to bring attention to the potential problems with this type of sharing. The risks are magnified for children, who will often fail to comprehend the significance of sharing personal information. And when a child’s location is collected automatically, neither the parent nor the child is aware that this information is being shared, nor are they given the opportunity to consent or refuse to consent to such data collection. Kids…

Do You Really Need Identity Theft Protection?

…ee of protection offered by a reputable, full-service, paid product. To ensure peace of mind and protect your most valuable asset, your identity—subscribe to an identity protection service, such as McAfee Identity Protection, which offers proactive identity surveillance, lost wallet protection, and alerts when suspicious activity is detected on your accounts. For additional tips, please visit http://www.counteridentitytheft.com Robert Siciliano…

Child Identity Theft

Choosing An Identity Protection Solution

…tection. McAfee hopes to educate consumers about identity theft so that they can make informed choices on the ways to protect themselves. McAfee has launched a new website dedicated to consumer education at http://www.counteridentitytheft.com/. The site includes a tool to help consumers access their risk for identity theft and make necessary adjustments. Ultimately, you want to make an informed decision and invest in identity theft protection…

MCAFEE, INC. LAUNCHES THE FIRST COMPREHENSIVE PERSONAL IDENTITY PROTECTION PRODUCT FROM A LEADING SECURITY COMPANY

…ntity surveillance which keeps consumers’ identities safe by providing multiple layers of protection, including monitoring the major credit reporting agencies and public records as well as Internet scanning for indicators of identity theft. Javelin Research reports that individuals who took six or more months to detect fraud suffered more than 14 times the cost of those victims who discovered fraud in its early stages.1 McAfee Identity

Identity Theft – Common Consumer Errors

The major problem that consumers face today is a fundamental lack of understanding of what identity theft actually is. Most people think of identity theft as when someone uses your credit card without your permission. Fraudulent credit card use is certainly a multibillion dollar problem, but it’s only one small part of the identity theft threat. A comprehensive understanding of what identity theft and what it is not empowers citizens to make…

2004-2005 Press Releases

…logy’s Reputation Exists Even as Problems Mount for the Industry November 21, 2005: Personal Security Expert Offers Advice Holiday Travelers Can Follow to Reduce Their Risk of Falling Prey to Crime November 18, 2005: Fear of Identity Theft among Consumers Leaves Industry with no Choice but to Implement Multifactor Authentication Measures November 8, 2004: Industry Leaders Can Rehabilitate Less-Lethal Technology’s Image by Offering and…

2006 Press Releases

December 18, 2006: Personal Security and Identity Theft Expert: Smart Organizations Understand that Laptop Computer Security Demands GPS Technology December 7, 2006: Personal Security and Identity Theft Expert Cites Rising Tide of Targeted Mobile Computer Thefts as Reason to Install GPS Tracking on Laptops November 27, 2006: Personal Security and Identity Theft Expert Warns that Laptop Computers Bereft of GPS Tracking Technology Are Easy…

2007 Press Releases

Theft: Research May Support Decisions to Create Computer Security Alert System in Europe—Identity Theft Expert and Speaker on Personal Security June 1, 2007: Identity Theft: Unmonitored Data May Be Online and Susceptible to TheftIdentity Theft Expert and Speaker on Personal Security May 21, 2007: Identity Theft: P2P Networks Invite Online Thieves—Identity Theft Expert and Speaker on Personal Security May 18, 2007: Identity Theft: Expert Lauds…

2008-2009 Press Releases

May 18, 2009: Identity Theft Expert and Laptop Computer Security: CTO of MyLaptopGPS Discusses Laptop Thefts Involving Oklahomans’ Data Records April 13, 2009: Identity Theft Expert and Laptop Computer Security:CTO of MyLaptopGPS Reiterates that a Mobile Computer is Stolen Every 12 Seconds March 30, 2009: Identity Theft Expert and Laptop Computer Security:CTO of MyLaptopGPS Explains Why Internet-based GPS is Best for Laptop Tracking March 20,…

The Safety Minute

…me for a ride? What do I do when I’m pulled over by someone that “appears” to be the police? Child Abductions What do I have to know to be safe? What are the different lures abductors use? How do I teach my children about abductions and abuse? Violence on Television How is it affecting our children? How is it affecting our culture? What can parents do about it? Kids and Crime Why are our teenagers more violent now than in the…

Published Articles

…rldhealthcareblog.org/2008/09/02/is-that-patient-who-he-claims-to-be/ (quoted Sept 2 2008, Is that patient who he claims to be?) http://lolabutcher.com/wordpress/archives/23 (quoted Sept 2 2008 My conversation with a medical theft identity expert) http://finance.yahoo.com/banking-budgeting/article/105723/Credit-Card-Shavin (quoted Sept 2008, Credit card shaving: Scammers go low-tech with trick) http://www.hartfordbusiness.com/news6571.html…

Children’s Safety and Security

…gs similar to, “Don’t you like me?” or “I thought we were friends” to make the child feel responsible for the predator’s feelings. Download PDF version Similar Posts from the Security Blog Child Identity Theft Child identity theft is a growing problem. The Federal Trade Commission estimates that there are 500,000 new victims every year. The culprits are often parents or others who have direct access to the…

Media

…or 2012 Phishers Use Social Media 2012 Threats: Are You Ready? Supermarket Skimming Scam Highlights Retailer Risk Securing New Digital Devices The new ATM skimming threats: How gangs skim to finance their activities How your child’s identity could be used to buy cars for criminals Giving your credit card to a hotel? Why you should think twice! Why tight-lipped women are hackers’ biggest obstacle to stealing personal information Your new Facebook…

Why We Need Secure Identification

…Martins’ identities may have been stolen.” Criminal identity theft is when someone commits a crime and uses the assumed name and address of another person. The thief in the act of the crime or upon arrest poses as the identity theft victim. Often the perpetrator will have a fake ID with the identity theft victim’s information but the imposters’ picture. This is the scariest form of identity theft. In Mexico plans are rolling out to…

Why American’s Identities Are Easily Stolen

…d (it has a simple algorithm built in), and then submitted electronically to a national registry, which then returns the name, address and credit info tied to that SSN. Utility bills or such are therefore not needed. The low identity theft figures in Finland are mostly due to the SSN, where the system does real-time checks on the status of the identity, combined to a difficult-to-forge array of ID papers (passport, driver’s license,…

4 Month Old Baby and Parents Rob Homes

…ects in this story aren’t horrible, they’re actually sick. Addiction is an extremely difficult disease to cope with for everyone involved. “ A couple accused of going on a home break-in spree last week have been charged with child abuse for allegedly bringing along a 4-month old child. Deputies said the suspects ages 28, 23 and 25, were arrested after a citizen spotted them leaving the scene of one of the crimes, followed the vehicle and called…

Stalker Frames Victim Husband for Child Porn

…ow article is it. A Crazy guy broke into the home of a woman who he was stalking . The woman is married, but apparently the guy didn’t care. When he broke into the home he logged onto the victim’s husband’s PC and downloaded child pornography. Then he took the hard drive and sent it to the local police with a note to the police identifying the owner of the hard drive. The idea behind the scheme was to get his stalking victim husband arrested and…

1.5 Million Americans Have Been Victims of Medical Identity

Robert Siciliano Identity Theft Expert The Smartcard Alliance has released an in-depth report called “ Medical Identity Theft in Healthcare . ” While identity theft is a global issue that garners much media attention, most do not realize that medical identity theft is a serious and growing threat. Many authorities consider medical identity theft one of the fastest growing crimes in America . With the digital age of healthcare upon us, the risks…

Parents Navigating the Social Media Mess

…an absolutely necessary tool to secure your credit. In most cases, it prevents new accounts from being opened in your name. This makes your Social Security number useless to a potential identity thief. 2. Invest in Intelius identity theft protection and prevention . Not all forms of identity theft can be prevented, but identity theft protection services can dramatically reduce your risk. (Disclosures) Robert Siciliano Identity Theft Speaker…

 

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in