As all of you are well aware, there's an app for just about everything. Well, personal security is no exception. A few weeks ago, I received some insider information on a security app called MyForce, that uses your smart phone's GPS and microphone to pinpoint your location and monitor any audio. The app is basically a panic button on your smart phone that you press if you get in a dangerous situation. The system is being monitored 24/7 by trained security personnel who can notify the nearest law enforcement agency and provide detailed information on your situation.
I reviewed the system and it seems great, in theory. I do believe this security app will work as advertised but I do have one nagging reservation. This reservation come to mind after recalling the research on the Vivint Home Security System . Is the system actually being monitored by a real human being? In the case of Vivint, a customer who disconnected his alarm and boxed it up, was told by the monitoring company that his system was working just fine. (Vivint Security Alarms post, 12/28/13). Could this the case with MyForce?
With that being said, The app seems be more than just another "me too" app trying to make a buck. One benefit I see in the app is the GPS locator and the ability to transmit audio of the situation. Of course, that brings up the obvious question of, why not just call 911?
Well, since most attacks happen when you least expect it, dialing 911 and explaining your situation and giving an exact location is almost impossible. Imagine walking to your car in a dimly lit parking lot. You get the creepy feeling your being followed and turn around just in time to see an assailant rushing you from about four feet away and closing in fast. Honestly, do you have time to dial 911, wait for three or four rings, explain your situation, and give your location before the assailant has you pinned down? Or would it be easier to have your phone in your hand with your finger hovering over the panic button and hit it when you realize you're being attacked? Your location will be instantly transmitted and the microphone activated. The monitor will be able to pinpoint your location and hear the attack in progress and anything you or the attacker says. That information will be relayed to your local law enforcement agency within minutes.
Besides, if you get abducted and taken somewhere in a vehicle, 911 will be of no use, considering you don't drop your phone.
At this point, the decision to use this app over calling 911 is yours. Although the MyForce service costs around $15.00 per month, I think it's a small price to pay for security in this day and age.
MyForce is available for iPhone, Android, and Blackberry.
For more information on this app, follow the link below.
MyForce Security App.
Your safety must be 24/7.
Dave.
Wednesday, October 29, 2014
Tuesday, October 21, 2014
An Amazing New Discovery in Lock Technology
Well folks, I have good news, and I have bad news, First, the good news. As I have always stated in my blog and presentations, I'm always on the lookout for new techniques on personal security to keep you and your family safe. Well, after getting several requests and questions on door locks, I kept digging and persisting and I'm glad to tell you that I have found a new residential / commercial door lock and padlock that is currently undefeatable with all known lock defeating techniques. It is bump proof, pick proof, force-proof, and even idiot proof.
The bad news is that it is currently out of stock every where I searched and I'm not even sure who the manufacturer is. Rest assure that I will continue to search for the manufacturer and I will probably be one of the first to market this lock to presentation guests and hosts, (right after I install the first one in my house), and post the website of the seller right here on this blog puppy.
This door lock, also known as a soft key. It is unique in that the tumbler path is curved and the key itself is more of a flexible chain rather than an easily duplicated traditional straight key. Rather that try to explain this amazing locking mechanism...just follow the link below and watch the video to be amazed. No sound but not needed.
http://www.gadgetreview.com/2014/10/the-soft-key-lock-is-essentially-unpickable
Since the teeth of the key are flexible and must follow a curved path within the tumbler section, there is no known method to defeat this key and tumbler system because all current techniques are based on the same straight fixed key and tumbler method. This is a fine example of "thinking way way outside the box."
Folks, I love this lock because the concept of its design goes beyond traditional lock construction and avoids typical lock defeating techniques. Whoever designed this lock, really thought things through and put a lot of security thought into it.
But, if I found this, I'm sure the scumbag thieves found out about it too and working on a way to defeat it or looking for other weaknesses in your home. So, as I have said many many times before, don't become over reliant on just one piece of technology for your safety. Layers, layers, layers.
It's a new world, keep up.
Dave.
The bad news is that it is currently out of stock every where I searched and I'm not even sure who the manufacturer is. Rest assure that I will continue to search for the manufacturer and I will probably be one of the first to market this lock to presentation guests and hosts, (right after I install the first one in my house), and post the website of the seller right here on this blog puppy.
This door lock, also known as a soft key. It is unique in that the tumbler path is curved and the key itself is more of a flexible chain rather than an easily duplicated traditional straight key. Rather that try to explain this amazing locking mechanism...just follow the link below and watch the video to be amazed. No sound but not needed.
http://www.gadgetreview.com/2014/10/the-soft-key-lock-is-essentially-unpickable
Since the teeth of the key are flexible and must follow a curved path within the tumbler section, there is no known method to defeat this key and tumbler system because all current techniques are based on the same straight fixed key and tumbler method. This is a fine example of "thinking way way outside the box."
Folks, I love this lock because the concept of its design goes beyond traditional lock construction and avoids typical lock defeating techniques. Whoever designed this lock, really thought things through and put a lot of security thought into it.
But, if I found this, I'm sure the scumbag thieves found out about it too and working on a way to defeat it or looking for other weaknesses in your home. So, as I have said many many times before, don't become over reliant on just one piece of technology for your safety. Layers, layers, layers.
It's a new world, keep up.
Dave.
Monday, October 13, 2014
A Stalker Has Constitional Rights!
Stalkers. I don't know about you but I hate stalkers. I'll be honest, I don't know much about stalking laws but I do know that they're not readily enforced because it is a relatively new activity and as it stands, stalking is not harmful, dangerous, or legally, not a crime to follow someone without harmful intent as the laws are now written.
As we all know, stalking and following or appearing periodically at the same place for purpose of observing or intimidation cannot be defined as threatening or endangering by any current definition of current laws. It is well known that stalking could cause serious psychological and emotional damage, but while a textbook definition of a stalker could by current laws, defined as anyone who happens to appear regularly or at random places, could just as easily be defined as someone who has a similar schedule or route as yours everyday. The stalker's defense could just as easily be that he has a similar schedule as yours and works or lives near by and presence be justified be simply defined as happenstance.
I bring this topic of stalkers because I recently did a home presentation for a high school friend I had not seen in many years. I happened to run into her while jogging at a park and we had a good conversation while reminiscing. As we continued, we wound up at the topic of my security service and I eventually wound up doing a presentation at her home with only three of her friends present. While I normally don't do presentations with less that six guests, I made an exception for Leonor. (I've always like that name), I must mention that I did the presentation without any of the security products I normally have for sale.
After I made the presentation, I received very good input and information from the three women guests. The second guest, whom I'll call Cassy, (because I like that name), gave me some great insight into her problem with some creep who seemed to appear wherever she went. He always seemed to be at the same store she was at, behind her in traffic, driving down her street, etc. Although she reported her experience to the local police, they told her that there was nothing they could do because the "citizen" had not broken any laws. While that was technically true, they were aware that he was stalking her but had their enforcement hands tied and unable to do anything without violating his constitutional rights.
The first guest, whom I'll call Nicki because I also like that name, told me about the time she was jogging and was approached by a another female jogger who attempted to stop her to ask her for directions to a certain park. She found it suspicious that the female jogger was wearing a local high school football team shirt but didn't know where a well known park was. She also noticed a tall male wearing green shorts and a San Antonio Spurs jersey behind her. She played dumb and ran off. Later, she heard from an acquaintance that the same question had been asked from her by a female jogger and a tall man wearing the identical clothing described in her incident!
The third guest whom I'll call Consuela because I don't like that name, told me about the time she went to the grocery store and a older gentleman approached her in the parking lot and offered to help her load her grocery bags into her car. Although she was a little reluctant, she agreed and the stranger helped load her groceries, wished her well, bid her good night and walked away.
So what's the point of this post? Well, first off, the first two incidents sounded very suspicious because the first case demonstrated that the perpetrator was clever enough to know the legal limits of his actions without being accused of anything, yet accomplishing his goals. The second seemed like a setup for some type of mugging. The third, resulted in a random act of kindness, or as I refer to it, human interaction.
So what's my take on these three incidents? In the first two incidents, the potential victims were OBSERVANT. Cassie was observant in the way that she was cognizant of her surroundings at all times. She noticed that the creep appeared to be wherever she was because she took notice of her surrounding and noticed an anomaly, something out of the ordinary. She took action as she notified police. Even though the police didn't take any action, the incidents were documented in case any later proof was ever needed in the futuer.
Nicki was OBSERVANT in that she saw the female jogger who was wearing a local school shirt but was asking for a well known local landmark but was quick enough to ask if the jogger knew the city while she formulated a quick egress plan. But, she also took the time to look around and noticed the male jogger behind her and got his description. This may have been a mugging scheme.
Consuela was a victim of a human act of simple human interaction. I believe Consuela was paranoid because she had lost confidence in humanity and she had become suspicious of everyone and changed her mentality towards being a victim.
My take? There are those who will take advantage of you at every turn but, you will only be taken advantage if you know how it's done. You'll never know if you;re being set up if you don't know your enemy. When yo're ready to learn about your enemy and learn how to defend yourself against him, come here and educate yourself in the new times!
This is a new world and you must keep up with new knowledge to survive or they will run you over with your ignorance.
Dave.
Note: Although I don't normally deal with stalking, it is a violation I STRONGLY despise, I will do more research and advise on in later posts. Please note the words in BOLD lettering in the post.
As we all know, stalking and following or appearing periodically at the same place for purpose of observing or intimidation cannot be defined as threatening or endangering by any current definition of current laws. It is well known that stalking could cause serious psychological and emotional damage, but while a textbook definition of a stalker could by current laws, defined as anyone who happens to appear regularly or at random places, could just as easily be defined as someone who has a similar schedule or route as yours everyday. The stalker's defense could just as easily be that he has a similar schedule as yours and works or lives near by and presence be justified be simply defined as happenstance.
I bring this topic of stalkers because I recently did a home presentation for a high school friend I had not seen in many years. I happened to run into her while jogging at a park and we had a good conversation while reminiscing. As we continued, we wound up at the topic of my security service and I eventually wound up doing a presentation at her home with only three of her friends present. While I normally don't do presentations with less that six guests, I made an exception for Leonor. (I've always like that name), I must mention that I did the presentation without any of the security products I normally have for sale.
After I made the presentation, I received very good input and information from the three women guests. The second guest, whom I'll call Cassy, (because I like that name), gave me some great insight into her problem with some creep who seemed to appear wherever she went. He always seemed to be at the same store she was at, behind her in traffic, driving down her street, etc. Although she reported her experience to the local police, they told her that there was nothing they could do because the "citizen" had not broken any laws. While that was technically true, they were aware that he was stalking her but had their enforcement hands tied and unable to do anything without violating his constitutional rights.
The first guest, whom I'll call Nicki because I also like that name, told me about the time she was jogging and was approached by a another female jogger who attempted to stop her to ask her for directions to a certain park. She found it suspicious that the female jogger was wearing a local high school football team shirt but didn't know where a well known park was. She also noticed a tall male wearing green shorts and a San Antonio Spurs jersey behind her. She played dumb and ran off. Later, she heard from an acquaintance that the same question had been asked from her by a female jogger and a tall man wearing the identical clothing described in her incident!
The third guest whom I'll call Consuela because I don't like that name, told me about the time she went to the grocery store and a older gentleman approached her in the parking lot and offered to help her load her grocery bags into her car. Although she was a little reluctant, she agreed and the stranger helped load her groceries, wished her well, bid her good night and walked away.
So what's the point of this post? Well, first off, the first two incidents sounded very suspicious because the first case demonstrated that the perpetrator was clever enough to know the legal limits of his actions without being accused of anything, yet accomplishing his goals. The second seemed like a setup for some type of mugging. The third, resulted in a random act of kindness, or as I refer to it, human interaction.
So what's my take on these three incidents? In the first two incidents, the potential victims were OBSERVANT. Cassie was observant in the way that she was cognizant of her surroundings at all times. She noticed that the creep appeared to be wherever she was because she took notice of her surrounding and noticed an anomaly, something out of the ordinary. She took action as she notified police. Even though the police didn't take any action, the incidents were documented in case any later proof was ever needed in the futuer.
Nicki was OBSERVANT in that she saw the female jogger who was wearing a local school shirt but was asking for a well known local landmark but was quick enough to ask if the jogger knew the city while she formulated a quick egress plan. But, she also took the time to look around and noticed the male jogger behind her and got his description. This may have been a mugging scheme.
Consuela was a victim of a human act of simple human interaction. I believe Consuela was paranoid because she had lost confidence in humanity and she had become suspicious of everyone and changed her mentality towards being a victim.
My take? There are those who will take advantage of you at every turn but, you will only be taken advantage if you know how it's done. You'll never know if you;re being set up if you don't know your enemy. When yo're ready to learn about your enemy and learn how to defend yourself against him, come here and educate yourself in the new times!
This is a new world and you must keep up with new knowledge to survive or they will run you over with your ignorance.
Dave.
Note: Although I don't normally deal with stalking, it is a violation I STRONGLY despise, I will do more research and advise on in later posts. Please note the words in BOLD lettering in the post.
Sunday, October 12, 2014
My Home Alarm System is Set, Yup, I'm Good.
Not so fast folks. I was reviewing speeches from the latest Black Hat security conference in Las Vegas and found an interesting talk on defeating home security systems. I also found this very topic on a deep web site (http://en.wikipedia.org/wiki/Deep_Web) along with instructions on how to go about defeating alarm systems using off the shelf 90s technology
This is why I repeatedly keep reminding my readers that you must have layers of security and to stay informed on the latest security measures. This blog will be one of your resources. Remember, we live in different world that 10 years ago. I know security is not a popular, convenient, or "comfort" topic, but it is a necessary topic for our time, and because, it is the go-to topic for the bad guys.
Anyway, what is now common knowledge is that many of today's modern gadgets and home appliances are hooked into the internet and can easily be hacked and taken over by hackers and other unsavory type folk. That's nothing too alarming since the most they can do is reprogram your toaster oven, fridge, or turn your heater on to 100 degrees during a heatwave in South Texas.
While it's frustrating and scary to know that a stranger with unknown intentions can control things in your home without your knowledge, but it's down right scary to realize that a stranger may have the ability to disarm you home security system at will without your knowledge. All this is possible because you are dependent on old technology that the bad guys have had plenty of time to study and learn how to defeat and the industry has continued to use while telling you that it is still top of the line technology.
So what is this defeatable technology?, your wireless home security system. Here's how they are defeated. All the wireless alarm systems examined rely on radio frequency signals sent between door and window sensors to a control system that triggers an alarm when any of these entryways are breached. The signals deploy any time a twired window or door is opened, whether or not the alarm is enabled. But, when enabled, the system will trip the alarm and also send a silent alert to the monitoring company, which contacts the occupants and/or the police. But, researchers found that most wireless systems do not encrypt or authenticate the radio signals being sent from sensors to control panels, making it easy for someone to intercept the data, decipher the commands, and play them back to control panels at will using easily obtained technology.
These radio signals can also be jammed to prevent them from tripping the alarm by sending radio interference to prevent the signal from getting through from sensors to the control panel. My questioning of alarm company personnel either claimed the signals were encrypted or they gave me the deer in the headlight look. My observation of their reactions when asked that question was that they had no clue but responded with the better sounding answer of "encrypted", but couldn't answer how it was encrypted.
So, without getting into the technical details of encryption and defeating methods, I'll just tell you that with the right equipment, top-selling home alarm setups use wireless technology can be easily subverted to either suppress the alarms or create multiple false alarms that would render them unreliable. False alarms could be set off using a simple tool from up to 250 yards away, though disabling the alarm would require closer proximity of about 10 feet from the home.
Some of the technology used to perpetrate this crime may cost in upwards of $1,700.00, but it may may very well be worth it for a thief who can break into multiple homes without the risk of the home security system going off to make a good profit . Think about it.
"An attacker can walk up to a front door and suppress the alarm as they open the door, do whatever they want within the home and then exfiltrate, and it’s like they were never there,” says Logan Lamb, a security researcher at the Oak Ridge National Lab, who conducted his work independent of the government. So who could possibly get within 10 feet of your home while the home security system is armed and still get in?
Yeah, this discovery gave me the creeps but at least I know I have multiple layers of security in my home. Do you?
See related posts:
Be Alarmed, Be Very Alarmed, 12/20/13
I Bought Your Front Door Key Online, 9/26/14
Be One Step Ahead of The Dirt Bags.
Dave
This is why I repeatedly keep reminding my readers that you must have layers of security and to stay informed on the latest security measures. This blog will be one of your resources. Remember, we live in different world that 10 years ago. I know security is not a popular, convenient, or "comfort" topic, but it is a necessary topic for our time, and because, it is the go-to topic for the bad guys.
Anyway, what is now common knowledge is that many of today's modern gadgets and home appliances are hooked into the internet and can easily be hacked and taken over by hackers and other unsavory type folk. That's nothing too alarming since the most they can do is reprogram your toaster oven, fridge, or turn your heater on to 100 degrees during a heatwave in South Texas.
While it's frustrating and scary to know that a stranger with unknown intentions can control things in your home without your knowledge, but it's down right scary to realize that a stranger may have the ability to disarm you home security system at will without your knowledge. All this is possible because you are dependent on old technology that the bad guys have had plenty of time to study and learn how to defeat and the industry has continued to use while telling you that it is still top of the line technology.
So what is this defeatable technology?, your wireless home security system. Here's how they are defeated. All the wireless alarm systems examined rely on radio frequency signals sent between door and window sensors to a control system that triggers an alarm when any of these entryways are breached. The signals deploy any time a twired window or door is opened, whether or not the alarm is enabled. But, when enabled, the system will trip the alarm and also send a silent alert to the monitoring company, which contacts the occupants and/or the police. But, researchers found that most wireless systems do not encrypt or authenticate the radio signals being sent from sensors to control panels, making it easy for someone to intercept the data, decipher the commands, and play them back to control panels at will using easily obtained technology.
Oh yeah, 1234, I'm safe!
These radio signals can also be jammed to prevent them from tripping the alarm by sending radio interference to prevent the signal from getting through from sensors to the control panel. My questioning of alarm company personnel either claimed the signals were encrypted or they gave me the deer in the headlight look. My observation of their reactions when asked that question was that they had no clue but responded with the better sounding answer of "encrypted", but couldn't answer how it was encrypted.
So, without getting into the technical details of encryption and defeating methods, I'll just tell you that with the right equipment, top-selling home alarm setups use wireless technology can be easily subverted to either suppress the alarms or create multiple false alarms that would render them unreliable. False alarms could be set off using a simple tool from up to 250 yards away, though disabling the alarm would require closer proximity of about 10 feet from the home.
Some of the technology used to perpetrate this crime may cost in upwards of $1,700.00, but it may may very well be worth it for a thief who can break into multiple homes without the risk of the home security system going off to make a good profit . Think about it.
"An attacker can walk up to a front door and suppress the alarm as they open the door, do whatever they want within the home and then exfiltrate, and it’s like they were never there,” says Logan Lamb, a security researcher at the Oak Ridge National Lab, who conducted his work independent of the government. So who could possibly get within 10 feet of your home while the home security system is armed and still get in?
Yeah, this discovery gave me the creeps but at least I know I have multiple layers of security in my home. Do you?
See related posts:
Be Alarmed, Be Very Alarmed, 12/20/13
I Bought Your Front Door Key Online, 9/26/14
Be One Step Ahead of The Dirt Bags.
Dave
Sunday, October 5, 2014
Latest Presentaion
I want to thank Monica K. for her generosity and hosting my presentation at her home. Monica brought nine of her friends to her home for one of my presentations and introduced me to a lady who had experienced a home invasion. Not only did this woman do all the right things during the home invasion, she told me about her experience with the legal system afterwards. Fortunately, she was released from all guilt and did not have any charges pressed against her. And, the attackers were put away for a long time. Yes, shots were fired in this case.
This brave woman will have to live with that experience for the rest of her life but she has a new understanding of the times we live in and has accepted that she must make some changes in the way she does things now. She did purchase a few of my products but did mention to me that it was just something she knew she must do in this new age. She compared buying my product to having to buy a new computer and cell phone when society turned to the technology age in the 80s. She didn't want to but she understood that that's where society was going and she didn't want to be left behind. The society of today has now turned to security and she knew she had to keep with the times.
Sandra also told me and the group about the time she was approached by a man who asked for directions while pumping gas in her car at a convenience store. While she turned around to point in the direction, the man's accomplice snuck up behind her to attack her. As the pump lock snapped off, she looked back down and noticed the accomplice rushing towards her and she instinctively pulled out the gas nozzle, still and pointed it at the attacker with gas still spewing out. That was enough to scare him off and he ran away. That was a new scenario that prompted me to investigate this technique and learned that it was a new tactic and had only been reported six other times in Texas and once in Louisiana. Sandra's incident happened north San Antonio.
Here's the scenario in Sandra's incident. A two man team hangs around a gas station or convenience store with gas pumps, the lost man (perpetrator), sometimes holding a map or appearing as a tourist, waits by the street near the gas station while the accomplice waits by the station or store entrance away from the perpetrator. Once a female starts pumping gas in her vehicle, the perpetrator walks up to the female pumping gas, who is committed, and asks for directions to a certain street or location he knows is located in the opposite direction of his accomplice. This is done to ensure that the female victim is facing away from the perpetrators accomplice. While her attention is focused on telling the perpetrator directions, the accomplice is rushing her from behind. The accomplice grabs the victim and her car keys, throws her aside, jumps in the car, the perpetrator jumps in the passeger seat and they drive away with her car.
More than likely, the victim's purse along with any cash, credit card, identifiers, and personal information is quickly found and exploited. Not to mention her car could be used in further crimes.
My take on this crime is that the criminals may now know the victim's name by the content of her car, where she lives and works, and may have her garage door opener, house keys, cell phone which may give them access to her online accounts which may wreak more havoc in her life. If she had a gun in her car that was used in a future crime, there could be legal implications for her.
Let's take this scenario a step further, what if you were the victim in that scenario and you left your cell phone in the car? What valuable, embarrassing, or incriminating information on that cell phone could the criminals use to their advantage or use against you?
I'm not trying to scare anyone here but, I just want you to realize that the crooks are getting smarter and are now using human nature to get you to let your guard down to victimize you. I want you to realize that we now live in a different time and you must know that your personal safety is reliant on what you know.
Knowledge is protection.
Dave
This brave woman will have to live with that experience for the rest of her life but she has a new understanding of the times we live in and has accepted that she must make some changes in the way she does things now. She did purchase a few of my products but did mention to me that it was just something she knew she must do in this new age. She compared buying my product to having to buy a new computer and cell phone when society turned to the technology age in the 80s. She didn't want to but she understood that that's where society was going and she didn't want to be left behind. The society of today has now turned to security and she knew she had to keep with the times.
Sandra also told me and the group about the time she was approached by a man who asked for directions while pumping gas in her car at a convenience store. While she turned around to point in the direction, the man's accomplice snuck up behind her to attack her. As the pump lock snapped off, she looked back down and noticed the accomplice rushing towards her and she instinctively pulled out the gas nozzle, still and pointed it at the attacker with gas still spewing out. That was enough to scare him off and he ran away. That was a new scenario that prompted me to investigate this technique and learned that it was a new tactic and had only been reported six other times in Texas and once in Louisiana. Sandra's incident happened north San Antonio.
Here's the scenario in Sandra's incident. A two man team hangs around a gas station or convenience store with gas pumps, the lost man (perpetrator), sometimes holding a map or appearing as a tourist, waits by the street near the gas station while the accomplice waits by the station or store entrance away from the perpetrator. Once a female starts pumping gas in her vehicle, the perpetrator walks up to the female pumping gas, who is committed, and asks for directions to a certain street or location he knows is located in the opposite direction of his accomplice. This is done to ensure that the female victim is facing away from the perpetrators accomplice. While her attention is focused on telling the perpetrator directions, the accomplice is rushing her from behind. The accomplice grabs the victim and her car keys, throws her aside, jumps in the car, the perpetrator jumps in the passeger seat and they drive away with her car.
More than likely, the victim's purse along with any cash, credit card, identifiers, and personal information is quickly found and exploited. Not to mention her car could be used in further crimes.
My take on this crime is that the criminals may now know the victim's name by the content of her car, where she lives and works, and may have her garage door opener, house keys, cell phone which may give them access to her online accounts which may wreak more havoc in her life. If she had a gun in her car that was used in a future crime, there could be legal implications for her.
Let's take this scenario a step further, what if you were the victim in that scenario and you left your cell phone in the car? What valuable, embarrassing, or incriminating information on that cell phone could the criminals use to their advantage or use against you?
I'm not trying to scare anyone here but, I just want you to realize that the crooks are getting smarter and are now using human nature to get you to let your guard down to victimize you. I want you to realize that we now live in a different time and you must know that your personal safety is reliant on what you know.
Knowledge is protection.
Dave
Friday, September 26, 2014
I Bought Your Front Door Key for $6 Online
Nowadays, you can pretty much find anything online. But, have you ever considered that the key to the front door of your house can be bought online for $6.00? I didn't think so.Well, think again. Fortunately, it can only be bought online if you allow your house key to be photographed. Think that's far fetched? Criminals don't think so. I took a walk around the office I work in and managed to photograph three house keys. I even told one guy I was going to do a magic trick using his keys and got the perfect picture of his house key. Of course that was just a ruse and I played the failure of the trick well but I still managed to keep the picture of his house key.
I'm not going to explain the whole scenario since Good Morning America did a great job so I'm just going to provide a link to the video and story.
The video will open in a new window. Watch it & return here for the solution.
http://www.today.com/news/new-technology-could-give-thieves-key-your-door-literally-2D80161986?utm_source=zergnet.com&utm_medium=referral&utm_campaign=zergnet_270783
Obviously, the best way to prevent someone from duplicating your key is to keep it secure and never leave your keys where someone else can access them regardless of how well you know them.
Another good ploy is to have a dummy key on your key ring. This works best if you label the dummy key "house" or "back door" with a Sharpie or your actual house key labeled "Shed" or some other undesirable place away from your home.
If you need this service for yourself, go to https://keysduplicated.com/
No Man is Above Temptation
1 Corinthians 10:13
Dave
I'm not going to explain the whole scenario since Good Morning America did a great job so I'm just going to provide a link to the video and story.
The video will open in a new window. Watch it & return here for the solution.
http://www.today.com/news/new-technology-could-give-thieves-key-your-door-literally-2D80161986?utm_source=zergnet.com&utm_medium=referral&utm_campaign=zergnet_270783
Obviously, the best way to prevent someone from duplicating your key is to keep it secure and never leave your keys where someone else can access them regardless of how well you know them.
Another good ploy is to have a dummy key on your key ring. This works best if you label the dummy key "house" or "back door" with a Sharpie or your actual house key labeled "Shed" or some other undesirable place away from your home.
If you need this service for yourself, go to https://keysduplicated.com/
No Man is Above Temptation
1 Corinthians 10:13
Dave
Theft by Infrared
Well, I know its been a long time since I posted anything but, I've been trolling the deep web for more juicy security information for you and have had some major changes in my life which have kept moving around a lot. Regardless, I have found some info for your personal safety. I wanted to post this one first because I want to demonstrate how far criminals will go to achieve their goal of ripping you off using readily available technology. Although this methods may seem a little far fetched now, they are plausible and will eventually catch on. I want to give you a heads up so you can learn how to protect yourself now so you won't be a victim in the future.
The video uses an infrared iPhone camera attachment used to read your PIN number on most keypads. Since I used to be an infrared night vision system expert in the US Army, I can honestly say that this procedure will definitely work as demonstrated.
BTW, that is not me in the video. Mark Rober is the genius dude who demonstrates the procedure.
So how do you protect yourself from this type of PIN theft? Well, first of all, keep in mind that even if some scumbag pulls this stunt on you, he may have your PIN number but, he still needs your actual debit card. The problem here lies in you becoming a mugging or theft victim.
I actually went into a store and tested a method to defeat this PIN theft procedure. The best method I found was to simply punch in your PIN number using the stylus attached to the keypad because it will not leave a heat signature. If no stylus is provided, use a pen, your keys or some other solid object to press the keypad buttons. That will eliminate any heat signatures on the keypad.
If you find yourself with nothing solid to press the keys with, use you finger but continue pressing additional buttons after you've entered your PIN since the code reader will only register the first four numbers anyway. Just make sure that you press one of the numbers in your PIN so the heat signature changes and leave a pattern.
Never underestimate the craftiness of greed.
Dave
The video uses an infrared iPhone camera attachment used to read your PIN number on most keypads. Since I used to be an infrared night vision system expert in the US Army, I can honestly say that this procedure will definitely work as demonstrated.
BTW, that is not me in the video. Mark Rober is the genius dude who demonstrates the procedure.
So how do you protect yourself from this type of PIN theft? Well, first of all, keep in mind that even if some scumbag pulls this stunt on you, he may have your PIN number but, he still needs your actual debit card. The problem here lies in you becoming a mugging or theft victim.
I actually went into a store and tested a method to defeat this PIN theft procedure. The best method I found was to simply punch in your PIN number using the stylus attached to the keypad because it will not leave a heat signature. If no stylus is provided, use a pen, your keys or some other solid object to press the keypad buttons. That will eliminate any heat signatures on the keypad.
If you find yourself with nothing solid to press the keys with, use you finger but continue pressing additional buttons after you've entered your PIN since the code reader will only register the first four numbers anyway. Just make sure that you press one of the numbers in your PIN so the heat signature changes and leave a pattern.
Never underestimate the craftiness of greed.
Dave
Friday, January 10, 2014
Safety in a Hotel
There a lot of
websites and safety “experts” out there that dole out hotel safety advice for
women. Some are OK, some are so-so and many others are way outdated and
useless. I’ve even seen government sights giving out safety advice that only
address the common sense basics with no mention of the new break in techniques
and outdated hotel security procedures. Well, I’ve taken much of the relevant
advice, updated it, and included your new Advent Personal Security tips.
The following
safety tips are most applicable for hotel stays, especially if you’re alone.
(This is covered in the Advent presentation). Keep in mind that hotels are
usually not at fault for thefts and assaults and try to prevent any negative
experiences for their guests. The culprits are usually low wage workers with little
direct supervision and their outside accomplices. These employees are usually
very familiar with the building and the vulnerabilities within it.
When the time comes to book your hotel, don't just look
at rates and amenities -- pay close attention to location as well. Is the hotel
in an upscale residential neighborhood, a bustling business district or a seedy
commercial area? Is it safe to walk around after dark? Is there a police
station nearby? All of these factors could affect the likelihood of a break-in
or assault during your stay. You can find neighborhood information online or in
a good guidebook.
Start using the 5 Ss when approaching the hotel, SITUATION.
Evaluate the layout. Are the doors facing the outside or inside of the
building. Is the lot / building well lit. Is the front desk is staffed 24 hours
a day. Is the location among other
business or in a residential area.
When making
reservations, reserve the room under Mr. & Mrs. Name. That will give any
questionable staff the impression that there will be a man present rather than
a single female. If you are questioned about your spouse at check-in time, you
can simply state that he will be in later. (He’s out getting ammo). Or, don't
be gender specific when you reserve your room, use your first initial and your
last name.
Note: In Texas, the Castle Law extends to hotel stays for handgun owners which means that you can take your gun in your hotel room. It must still be concealed though.
Do not use
titles such as Dr., Atty. at Law, etc.
when reserving or checking in. Those titles may tip off crooks that you may
have currency, lots of credit cards, and other expensive items with you.
When making
reservations, ask for a room between the second and sixth floor. A first floor room is easier to break into
from the outside and the second through 6th floors are easier to
access by fire ladders.
When checking
in, ask that your room number be written down and handed to you rather than
loudly announced. Be wary of anyone standing by the front desk waiting to hear
your room number being announced. Tell the staff not to give out your name or
room number to anyone. Take a business
card or matchbook with the hotel address on it. If you need to take a cab or
ask for directions when returning to your hotel, you’ll have the exact location
as there may be multiple hotels in a large city.
Ask if the room
phone can make outside calls in case you need to make a 911 call but, be sure
to ask if you must also dial a 9 or other number to get an outside line. Texas
had a case where a guest could not reach the 911 operator because she was
unaware she had to dial a 9 first. The victim died.
The part time security guard in the lobby is probably
not qualified to handle a break in or attack.
He is paid by the hotel to give the illusion of safety and sometimes
there, more to protect the hotel from you, rather than you from an attacker or
intruder.
Find out if
there is an unmanned entry / exit to the parking garage. These unmanned entries are an easy entry for
crooks and thieves since many don’t go by the front desk.
SEE. When going to your room, make a mental
note of exits, stairwells, elevator, and fire extinguisher locations.
SENSE. When getting in elevators, enter an
empty elevator and stand by the control panel. When entering an elevator
occupied by a sole male, use you best judgment or sixth sense. A gentleman will understand if you don’t
enter. You can even fake forgetting your key if you don’t feel comfortable
entering the elevator with a male inside.
SECURE. Once in your room, lock the door and
check all places someone could hide, closets, baths, etc. once your satisfied,
install you door alarm, lock enhancer, and or door bar. Check to ensure the
peephole is properly installed and place a post-it or band-aid over the peep
hole. Decide where you will keep your stun gun then use your CC308 hidden
camera detector to SCAN for hidden cameras. Concentrate on the bathroom,
air vents, smoke detector.
Text or call a
family member to let them know you’re safe. Let someone know where you’re going
when you leave the hotel. (See the Safety Location & Time Text post).
If someone
knocks on the door claiming to be from the staff, call the front desk and
verify.
Do NOT use the
in room security safes for valuables or important documents! These safes are
not covered by the hotel’s insurance and are easily defeated with default
unlock codes almost every employee knows by heart. Instead, use the main safe
at the front desk.
When you leave the room, do not put out the "Do Not
Disturb" sign on the door, especially if you’re leaving valuables in the
room.
Some safety experts say you should put out the "Do
Not Disturb" sign to give the impression that someone is in the room. If you’ve seen my demonstrations, the
"Do Not Disturb" can be used to unlock the door latch. It’s best if
you’re not in the room when that happens. It’s better to have something stolen
rather than being assaulted. Stuff can be replaced, you can’t. Not putting the
sign out also leaves a potential thieve not knowing for sure if the room is
occupied. He may not want a confrontation with the unknown occupant. Your door
brace or lock enhancers may prevent all this.
If you do experience a crime during your stay, don't
simply complain to the hotel -- file a police report as well. Your homeowners'
insurance policy may cover certain losses during your travels, and the
insurance company will need a copy of the police report and any other relevant documentation.
Tip: Avoid using drinking glasses that are not in sealed
plastic or use only the sealed plastic cups.
Sleep tight.
Wednesday, January 1, 2014
2014 Already?
Another year is here and that sometimes means new resolutions. One of my resolutions is to help you be safe at home and outside of your home. I intend to do this by doing more presentations, keeping this blog updated with the latest information on security and safety issues, and adding as many security products as I can handle.
I hope you consider making one of your resolutions to be more security minded and focus more on keeping your home and family safe. As unfortunate as it is, crooks are making their resolution to gain more by committing more crimes. Don't fall victim to these creeps with complacency.
Subscribe to this blog to keep updated on the latest security issues regarding your personal and home security.
Have a safe and great 2014!
I hope you consider making one of your resolutions to be more security minded and focus more on keeping your home and family safe. As unfortunate as it is, crooks are making their resolution to gain more by committing more crimes. Don't fall victim to these creeps with complacency.
Subscribe to this blog to keep updated on the latest security issues regarding your personal and home security.
Have a safe and great 2014!
How to Frustrate a Crook
One of the most
frustrating things to experience is being robbed. The feeling of helplessness,
knowing that someone else took full advantage of you and enjoying your stuff is
enough to make even the Pope curse a blue streak. Knowing that there’s almost nothing
you can do about it, makes the frustration even worse.
Well maybe you
can do something. Maybe not get even to the level you would like, but you can
turn the tables on the crooks and maybe get some of your stuff back but, to do
that, you must be proactive. Aside from the precautions, I’ve been telling you
about on this blog, you can prepare in case the thief somehow manages to get
through your layers of security.
What do you own?
Start by making
an inventory of all your valuables. Include as much information as possible,
especially it’s value. You can put the inventory on a spreadsheet and print out
a copy. It’s best if you can include photographs of the property. Burn the
inventory and photos on to a disc. Do not leave the inventory on the
computer, delete the file. If the computer is stolen, the thief will now
have a complete list of all the valuables in your house. Put the
inventory sheet and or disc in a book or at another safe location where you
will always have quick access.
Mark your
stuff!
Marking
identifiers on your valuables such as electronics makes it easier for police to
identify stolen items and return to the rightful owners if it’s easily
identifiable and undesirable to thieves. Marked stolen goods are also harder to
fence or sell at flea markets. And, it really ticks off the thieves!
Mark your
valuables with a simple UV pen or an engraver, or both. The ink is invisible
until UV light is applied (black light). Theses pens can be found just about
anywhere pens are sold and usually under $10.00. Engraving tools run anywhere
from $30 - $40. You can also use a Dremmel Tool with an engraving attachment.
Most pawn shops will not accept marked item unless the seller can prove the
markings are his.
Mark your items
with an identifier such as your address numbers and a phone number, last four
digits of your driver’s license number, something that can be identified to you
only. Do not use your SSN and avoid using address numbers if you tend to move a
lot. Make sure you use the same identifier on all your property and put this
identification number on your inventory sheet.
Let the
burglars know you’re prepared.
A warning sign on your windows can also be a deterrent to thieves who
might not want to take a chance with un-loadable property. You can just print one out and tape it to the inside of your windows.![]() |
| Advent Security window sticker taped to inside of window. |
Wire your belongings.
Attached (glue)
vibration sensors to your TV and other electronics or valuables. They’re about
$12 each but still cheaper than having to replace a TV or Xbox. No thief will
want to leave your house with a TV or Xbox blaring an ear piercing 120 decibel
alarm.
![]() |
| Vibration sensors can be attached to just about anything. |
For the Techies
A tech savvy homeowner could also rig up an alarm that attaches to the
bottom of an item that will sound when it is picked up. That alarm should scare
the daylights of a thief and quickly reconsider staying in your house for long.
Serious positive
recovery
For the more discerning homeowner who wants his stuff back ASAP, Data
Dots may be just the thing. Data Dots are tiny microscopic discs (microdots)
that contain unique information that's linked to your property and you. As
small as a grain of sand, DataDots are recognized as being one of the most
effective ways of preventing theft, and play a crucial role in the recovery and
return of stolen goods. The unique etched code on the DataDot is stored on our
worldwide verification database, DataBaseDNA. Data Dots can even be applied to vehicles.![]() | |
| Data Dot Reader. |
Here are some
other, but expensive methods, for identifying or locating your stuff.
Locate lost
items with your phone: http://www.dvice.com/archives/2012/03/locate_your_stu.php
Live GPS
tracking for personal use: http://www.liveviewgps.com/
Tricks that
just don’t work on thieves anymore.
If you’ve read
this blog for any length of time you’ll notice that I don’t advocate the use of
decoy safes and fake security equipment. Those items have now become more of a
novelty item. Here’s why I don’t advocate these products. While most crooks
won’t spent their time checking your fridge or garage, most of the more
experienced thieves already know which products are used as decoys and will
look for them first because that’s where the high dollar items will be stashed. These decoy safes can easily be thrown in a bag and easily hauled off.
It’s easy to
make your own or at least use a hollowed out book or a cereal box but, it's best to use a wall safe behind a picture
frame or a locking false outlet. These things can’t be thrown in a bag and easily hauled off if they're secured to the wall.
![]() |
| You can take a chance on these. |
![]() |
| Decoy safes come in 12 different "brands" |
![]() |
| If you like this decoy safe, at least use one that locks. |
Fake Cameras
Seriously? Does anyone really believe a crook doesn’t know real cameras
don’t have blinking red lights? Besides, most fake cameras do not look
realistic enough and easily identifiable as a fake. If you’re going to spend the money on
realistic camera, you might as well install real ones.![]() | |||||
| Crooks may be stupid, but even they | can tell this is a fake. |
Fake rocks
for keys
Just say no to fake rocks. Burglars are already so familiar with these
that they now look for them first. Most homeowners who use the fakes usually place them within 6 feet of the house
which makes the even easier for the crooks to find. These plastic replicas just don’t look
real enough and don’t blend in well. I’ve seen so many of these realistically
fake looking rocks in my time and they don’t really fool anyone but the homeowner who
still uses them. Stop it already. Would you really trust your security to a $12
piece of plastic?![]() |
| Genuine fake rock. Safe? Is this really safe? |
Fake
sprinkler heads.
See above. Again, these things became so popular, even by people without
sprinkler systems, that crooks look for them as well. A good idea when they
first came out, but they’ve become cliché. Now, if you want to frustrate a crook, put a fake key in these "safes". He may spend enough time trying to unlock your door that he may get caught. Or, he could break the key off in your lock.
Folks, understand that these products are NOT security measures, they are for your convenience and marketed with the illusion of security. You must take your security seriously and not depend on a cheap outdated or gimmick products that aren't true security measures. Know that crooks also surf the web to see what they’re up against and how to get the upper hand over you. They Google break-in techniques, hiding spaces, and security products, they trade information between each other and even post lists of easy houses and good locations, areas with poor police reaction times, and where the best fencing operations are.
Advents products are true security measures that add layers to your security that work, not gimmicks. Advent products are affordable and reliable with no possibility of being used by the crooks.
Subscribe to:
Posts (Atom)















