As a service to you, we are supplying you with some helpful tips to keep your video security system up, DVR and cameras, and running well. A little prevention or self help can save you money and keep your system healthy. Continue reading
A young father, wondering why his toddler behaved perfectly around the babysitter but no one else, learned the reason was fear. The man, from Joliet, set up a hidden camera to capture the sitter’s interaction with the child later watched in shock as the woman–a family friend–used physical force to keep the child in tow. According to NBC Chicago, the father, Paul Carlos, stated, “It was the most amazing thing I ever saw in my life. It was horrible.”
The camera, disguised as a clock radio, was triggered by a motion sensor. The sitter was caught beating the 2-year-old boy because she couldn’t find the TV remote control. The sitter, Erin Denny, actually lived with Carlos’s mother. She’s been arrested and jailed on felony aggravated batter charges and parole violation.
When Carlos went to work each day, he would drop his son off at his mom’s house on the way to work. Denny would watch the boy. Carlos installed the hidden camera because he thought it was strange that the boy listened to the sitter, but didn’t listen to anyone else.
It was out of fear.
Hidden cameras, or “nanny cams” have been employed to catch suspected cases of babysitter abuse, theft, and other criminal activities. Some, like the one used by Mr. Carlos, capture video footage for later viewing. Others provide real-time footage that can be accessed from any computer–even while a parent is working.
A woman in Coventry was caught via surveillance cameras dropping her cat into a trash bin. The woman was seen carrying and petting a cat–named Lola–before stopping in front of the trash can. She lifts the lid, drops the cat inside, and walks away.
The matter is under investigation by England animal rights group, RSPCA. Continue reading
A recent rash of New Hampshire thefts caused police to investigate and warn the public not to leave valuable items inside vehicles parked in the state’s national park areas–especially at trail heads. U.S. Forest Service agents also cautioned visitors to lock their cars.
A recent investigation was launched after thieves smashed car windows to get into vehicles, stealing electronics and cash.
Unfortunately for the unwitting criminals, police were able to track down them down within hours due to quick action stemming from a victim’s GPS application on his cell phone. Most of these smash-and-grab type cases go unsolved, especially due to the remote locations, time delay between the crime and report, and absence of witnesses to the crime.
In this case, the victim went to the State Trooper barracks and borrowed a police computer to track the location of his Smartphone; the phone was in a nearby community, and appeared to be with someone walking.
State Law Enforcement officers called the community’s police department, who dispatched officer to the area; the officer spotted a group of juveniles outside the residential area. A local Forest Service special agent also assisted, helping police determine four teens as the likely suspects. Police recovered the majority of property and the teens eventually confessed they’d participated in the crime spree, or were guilty of receiving stolen goods.
While the case remains under investigation, police expect charges to be filed shortly. Ah, technology!
Identity theft is the new watchword; hackers, thieves and criminals are continually discovering new methods to twist technology in an effort to steal personal information. Social media networks, cell phones, discarded utility bills and outright theft of personal property are all means employed by thieves to hijack your personal information.
Trustwave, a security and compliance company, provides security information services and end-to-end solutions for businesses in an effort to protect confidential information systems. A recent report shows that hotels are now the top source for credit card data theft, surpassing restaurants for the top spot; nearly 40% of all personal data in 2009 came from hotels/motels compared to just 13% of thefts from restaurants.
Hackers target hotel/motel booking and reservation centers due to the high-number of credit card numbers these entities keep “on-file.” Like the Internet, once a credit card is in the system, it’s available. A successful hacker can steal thousands of credit card numbers and, in essence, thousands–or millions–of dollars. Credit card numbers are used for numerous hotel services, such as bars, beaches, golf courses, swimming pools, gift shops, spas, and other recreational areas; however, they’re all processed through one main database.
Since hotels use proprietary systems, they’re easy for hackers to exploit: a computer system at one hotel is similar, if not exactly the same, as the computer system at a competing hotel.
The other unavoidable fact of hotels and motels are the number of employees who have access to the computer system and your personal data. According to an ABC News Report; “You have so many different employees going through the system that it allows them to either skim cards or put in malware that lets the bad guys hack into the system.”
In June 2010, Destination Hotels & Resorts had its computer system hacked and the credit card data of more than 700 guests from across the country was stolen; in January, Wyndham reported that their computer systems were breached and hackers accessed information from 31 hotels between November 2009 and January 2o1o. They never reported how many cards were compromised.
Credit card companies usually don’t require consumers to pay for unauthorized charges, but credit card users must report the theft in a timely manner to ensure their identity remains safe; the best method to is to check statements regularly and keep tabs on credit reports.
It’s a given that your computer’s been exposed to Spyware or Malware, attacks that have hopefully been thwarted by anti-virus software. However, what about your cell phone?
According to police detectives, cell phones are infected with both spy- and mal- ware. Aware of the danger of computer viruses, most users, for the most part, are not familiar with similar threats that can infect cell phones. Detective Ernest Ward (Jonesboro Police Department) stated that cell phones are “infected with spyware and malware and they [users] don’t even know about it.”
Searching the Internet will reveal numerous websites that offer downloads that will track and record text messages, phone numbers, pictures, and call logs. The general assumption–and manufacturer’s sales information–is that these applications are to be used for practical purposes. Parents tracking their children, or corporations ensuring the proper use of company resources.
However, many such programs can replicate themselves and are difficult to detect to those not familiar with cell phone operating systems. The spyware programs often run “below” areas where users operate their smart phones.
Some of the applications send reports in real-time, displaying information on a parent’s phone as a child receives the call, allowing the parent to record the number and listen to the call.
Since many smart phones have the same capabilities as laptops, the risk is heightened because phones don’t have in-depth defense programs. Some of the viruses on cell phones can activate micro-phones or cameras, allowing other parties to eavesdrop on conversations or view areas captured by the phone’s camera.
Recently, spying via technology was boosted into the national spotlight when it was reported that a Pennsylvania school district school that provided students from two high schools with free Macbooks was sued in federal court. A theft-tracking program on the laptops, allegedly used to track missing units, was deemed to be invasive because of a feature that activated computer webcams on the laptops.
Users were never informed of the software, and district officials concede that their monitoring of students had gone too far. The original intent of the software was to capture images of the “desktop and whatever is in front of the screen for law enforcement to help track down a missing computer.”