Child Predators and Internet Safety

Lancaster County associate pastor arrested by Attorney General’s Child Predator Unit; families urged to review Internet safety during the holidays

LANCASTER, PA — Agents from the Attorney General’s Child Predator Unit have arrested an associate pastor from Lancaster County accused of using Facebook and text messages to sexually soliciting a 15-year old boy, along with sending a nude photo to the boy.

Attorney General Linda Kelly identified the defendant as Clarence Tyrone Taylor, 26, of 442 Manor St., Columbia.

Kelly urged parents to regularly discuss Internet safety with their children, especially during times when family schedules change – such as during holiday vacations. She noted that some predators attempt to arrange meetings with kids, while others send nude photos or sexually explicit videos, many times during their initial online chats.

“Predators use popular social networking sites like Facebook to identify young people who may be vulnerable or lonely, gathering details about their activities and interests and using that information to gain their trust,” Kelly said. “Computer and smart phone technology now makes it quick and easy to send messages, photos or video, and many of the men arrested by the Child Predator Unit began sexually graphic discussions during their first online conversations with what they believed were children.”

Kelly said that Taylor allegedly made suggestive comments to several young people in his congregation, prompting parents to approach the pastor of the church. In response to those complaints, the pastor contacted Lancaster County Detectives and the Lancaster City Police Department, who forwarded the case to the Attorney General’s Office because of the specialized investigations performed by the Child Predator Unit.

According to the criminal complaint, Taylor used Facebook to contact a 15-year old boy from his church – telling the young man that he was “cute,” commenting on his appearance and suggesting that they spend more time together. Taylor also allegedly encouraged the boy to contact him via cell phone and to delete all messages between them.

Kelly said that following a review of those Facebook messages, an undercover agent from the Attorney General’s Office assumed the online identity of the boy and continued communication with Taylor.

Over the course of several days, Taylor allegedly engaged in a series of text message conversations – sending an explicit nude photo to the boy, requesting similar photos in return and suggesting that they meet for sex.

Taylor was taken into custody on Thursday, December 13th, by agents from the Attorney General’s Child Predator Unit, assisted by officers from the Columbia Borough Police Department.

Taylor is charged with one count of solicitation to commit sexual abuse of children, a second-degree felony punishable by up to ten years in prison and a $25,000 fine.

Taylor is also charged with one count of unlawful contact with a minor (related to obscene and other sexual materials and performances) and one count of criminal use of a communications facility, both third-degree felonies which are each punishable by up to seven years in prison and $15,000 fines.

He was preliminarily arraigned before Columbia Magisterial District Judge Robert A. Herman and lodged in the Lancaster County Prison in lieu of $75,000 bail. Taylor is also prohibited from having any contact with the victim.

A preliminary hearing will be scheduled before Magisterial District Judge Robert A. Herman and the case will be prosecuted in Lancaster County by Deputy Attorney General Christopher J. Jones of the Attorney General’s Child Predator Unit.

Kelly thanked the Columbia Borough Police Department for their cooperation and assistance with this investigation.
Internet Safety

Kelly noted that the Child Predator Unit has made 314 arrests since it was created.

Kelly urged parents to regularly discuss Internet safety and security issues with their children, including the importance of telling a trusted adult if someone engages in inappropriate online activity, such as:

  • Sexual discussions.
  • Sending or requesting nude photos or explicit videos.
  • Sharing links to pornography.
  • Trying to arrange face-to-face meetings.

Additionally, Kelly said parents and other caregivers should also monitor how kids are using the Internet, including:

  • Checking the websites they use frequently.
  • Searching the social networking sites they visit.
  • Asking them to show you their online profiles on Facebook and other websites.
  • Discussing the items they may be posting online.

Kelly also encouraged parents to stress the importance of not sharing personal information online, like full names, ages, addresses, phone numbers and school information, and added that children should always be especially cautious about strangers who approach them online.

Suspected internet predators can be reported to the Attorney General’s Office by clicking on the “Report a Predator” link, located on the front page of the Attorney General’s website, or by calling the toll-free Child Predator Hotline at 1-800-385-1044.
(A person charged with a crime is presumed innocent until proven guilty.)

People Forget, Computers Do Not

In 2003, the British Government published a report on Iraq’s security and intelligence organizations. Then a Cambridge University lecturer discovered that much of the document was copied from three different articles, one written by a graduate student. How did he know? The document contained a listing of the last 10 edits, even showing the names of the people who worked on the file.

Hidden data can often be found within Microsoft Office documents particularly Word. Whenever you exchange documents with clients, convert them to plain ascii text.  For instance, you can copy and paste the information to a “notepad” or turn the document into an html page.

For more info, and to download Microsoft’s Hidden Data Removal tool, see http://www.microsoft.com/downloads/.

FaceBook Cookies

Though FaceBook claims to be a social network, their cookie police states different:

Cookies info: Technologies like cookies, pixels, and local storage are used to deliver, secure, and understand products, services, and ads, on and off Facebook. Learn more about how we and our partners use cookies and similar technologies.

Bahdges?

Badges? We don’t need no stinkin’ badges!
— “The Treasure of Sierra Madre”

The Treasure of the Sierra Madre is a 1948 American film written and directed by John Huston, a feature film adaptation of B. Traven’s 1927 novel of the same name, in which two impecunious Americans Fred C. Dobbs (Humphrey Bogart) and Bob Curtin (Tim Holt) during the 1920s in Mexico join with an old-timer, Howard (Walter Huston, the director’s father), to prospect for gold. The old-timer accurately predicts trouble, but is willing to go anyway.

HISTORY
By the 1920s the violence of the Mexican Revolution had largely subsided, although scattered gangs of bandits continued to terrorize the countryside. The newly established post-revolution government relied on the effective, but ruthless, Federal Police, commonly known as the Federales, to patrol remote areas and dispose of the bandits. Foreigners, like the three U.S. prospectors who are the protagonists in the story, were at very real risk of being killed by the bandits if their paths crossed. The bandits, likewise, were given little more than a “last cigarette” by the army units after capture, even having to dig their own graves first.

Dobbs (Humphrey Bogart) and Curtin (Tim Holt), cheated out of promised wages and down on their luck, meet old prospector Howard (Walter Huston) in the Mexican oil-town of Tampico. They set out to strike it rich in the remote Sierra Madre mountains, searching for gold.

They ride a train into the hinterlands, surviving a bandit attack en route. In the desert, Howard proves to be the toughest and most knowledgeable; he is the one to discover the gold they seek. A mine is dug, and much gold is extracted. Greed soon sets in, and Dobbs begins to lose both his trust and his sanity, lusting to possess the entire treasure. Dobbs is also unreasonably afraid that he will be killed by his partners.

A fourth American named James Cody (Bruce Bennett) appears, which sets up a moral debate about what to do with the new stranger. The men decide to kill Cody, but just as the three confront him with pistols and prepare to kill him, the bandits reappear, crudely pretending to be Federales. (This leads to a now-iconic line about not needing to show any “stinking badges.”) After a gunfight with the bandits, in which Cody is killed, a real troop of Federales appears and chases away the bandits.

WARNING: West Conshohocken Police

CONSHOHOCKEN, PA — Warning! The West Conshohocken Police have been conducting illegal stop and searches. On several occasions, the West Conshohocken Police have been observed committing crimes under both state and federal laws.

On November 25, 2012 in the early evening, the West Conshohocken Police were pulling over 100% of the traffic on Front Street near the intersection of Fayette Street. The perpetrator claimed to be making a “seat belt check” which is in clear violation of the Fourth Amendment to the United States Constitution.

Police officers that commit crimes should be reported.  If a citizen is pulled over, they should document the crime to the best of their ability including video taping the offending officer.

 

CONTACT THE WEST  CONSHOHOCKEN POLICE DEPARTMENT:

West Conshohocken Borough » Police

www.westconshohockenboro.com/?page_id=105

We, the West Conshohocken Borough Police Department exist to serve all people within our jurisdiction with respect, fairness and compassion. We are

1001 New Dehaven Street  W Conshohocken, PA 19428
(610) 940-5842

CRIME SCENE MAP:

Scene Where Conshohocken Police Violated the Law

Scene Where Conshohocken Police Violated the Law

Supreme Court: You May Video Police

from the Chicago Tribune

The Supreme Court has rejected an appeal from the Cook County state’s attorney to allow enforcement of a law prohibiting people from recording police officers on the job.

The justices on Monday left in place a lower court ruling that found that the state’s anti-eavesdropping law violates free speech rights when used against people who tape law enforcement officers.

The law set out a maximum prison term of 15 years.

The American Civil Liberties Union filed a lawsuit in 2010 against Cook County State’s Attorney Anita Alvarez to block prosecution of ACLU staff for recording police officers performing their duties in public places, one of the group’s long-standing monitoring missions.

Opponents of the law say the right to record police is vital to guard against abuses.

Last May, a federal appeals court in Chicago ruled that the law “likely violates” the First Amendment and ordered that authorities be banned from enforcing it.

The appeals court agreed with the ACLU that the “Illinois eavesdropping statute restricts far more speech than necessary to protect legitimate privacy interests.”

The appeals court ruling came weeks before the NATO summit when thousands of people armed with smart phones and video cameras demonstrated in the city. Officials had already announced that they would not enforce the law against summit protesters.

Public debate over the law had been simmering since last summer.

In August of 2011, a Cook County jury acquitted a woman who had been charged with recording Chicago police internal affairs investigators she believed were trying to dissuade her from filing a sexual harassment complaint against a patrol officer.

Judges in Cook and Crawford counties later declared the law unconstitutional, and the McLean County state’s attorney cited flaws in the law when he dropped charges this past February against a man accused of recording an officer during a traffic stop.

Harvey Grossman, legal director of the ACLU of Illinois, said the organization was “pleased that the Supreme Court has refused to take this appeal. . .The ACLU of Illinois continues to believe that in order to make the rights of free expression and petition effective, individuals and organizations must be able to freely gather and record information about the conduct of government and their agents – especially the police. The advent and widespread accessibility of new technologies make the recording and dissemination of pictures and sound inexpensive, efficient and easy to accomplish.”

The Associated Press contributed

Holiday Shopping Tips

The FBI continues to remind shoppers to be wary of Internet fraud during the holiday shopping season. Scammers use many techniques to deceive potential victims, including creating fraudulent auction sales, reshipping merchandise purchased with a stolen credit card, selling fraudulent or stolen gift cards through auction sites at a discounted price and using phishing e-mails to advertise brand-name merchandise for bargain prices or e-mails to promote the sale of merchandise that is counterfeit.

In advance of the holiday season, the FBI, in partnership with the Merchant Risk Council (MRC), would like shoppers to be informed of the common scams that affect consumers and E-commerce. The MRC is an organization that works to increase networking and information sharing among merchants to better enable members to successfully fight online fraud.

Purchasing any new product or gift card on an auction or classified advertisement site where the price is significantly lower than any sale prices in retail outlets

Many of these sellers, especially for gift cards and tickets, have purchased these items with a stolen credit card. Most likely, the gift card or ticket will be deactivated by the time the recipient uses the card or ticket.

Never provide credit card numbers, bank account information, personally identifiable information or wire money to a person who advertises items on these sites at a too good to be true price. Many times, fraudsters will post a popular item to obtain this information, and the goods will never be mailed, but your card or identity will be used fraudulently later. If you make a purchase from these sites, we encourage you to check a seller’s ratings and feedback to ensure he or she is reputable.

Phishing and scam e-mails, text messages or phone calls

Many times, e-mails, texts or phone calls will look or sound like they are coming from a well-known retailer, stating a need to “verify” the full credit card number you used for a purchase or ask you to click a link to update personal account information. If you receive an e-mail that asks you to click a link to verify information, delete it. Type the retailer’s or financial institution’s website into a browser to log into your account. If the fraudster is insistent, ask him or her to read you the card number first or ask to call back. If it is a legitimate call, the company representative will have no problem with your calling back through the customer service line.

“One Day Only” websites featuring the sale of a “hot item”

During the holiday season, there will be an increase in websites created to sell specific items in high demand. Typically, the cardholders never receive the product, but the credit card information they entered is used for fraudulent purchases. It is important to only make purchases with companies and sellers who have a history and can be identified when searching reviews and ratings.

Postings of popular items for free or drastically reduced prices

There are many gift card offers on social media sites claiming to be from major retailers. These offers are typically used to gain access to consumers’ social media accounts either to log in to other accounts you may have tied to this account or to post illegitimate offers on your behalf. Purchasing an item at a reduced rate based on a posting from someone you do not know can often lead to a credit card compromise or the purchase of a counterfeit item.

“Work from home” offers, to act as a private reshipper, often fronting the shipping costs on behalf of the fraudster

Offers to work from home to reship items to another country or another person often means the goods were purchased with stolen credit cards. Having these goods shipped to your home and sending them to another person could have legal implications. Also, many times the money promised for completing this service is never paid. These scams can sound legitimate at first, so be leery of anyone offering a lot of money for a simple task.

Remember, if an offer seems too good to be true, it probably is. Consumers are urged to be very skeptical of people offering a great deal outside of any established retail business.

Tips

Here are some tips you can use to avoid becoming a victim of cyber fraud:

Do not respond to unsolicited (spam) e-mail.
Do not click on links contained within an unsolicited e-mail.
Be cautious of e-mail claiming to contain pictures in attached files, as the files may contain viruses. Only open attachments from known senders. Scan the attachments for viruses if possible.
Avoid filling out forms contained in e-mail messages that ask for personal information.
Always compare the link in the e-mail to the link you are actually directed to and determine if they actually match and will lead you to a legitimate site.
Log on directly to the official website for the business identified in the e-mail, instead of “linking” to it from an unsolicited e-mail. If the e-mail appears to be from your bank, credit card issuer, or other company you deal with frequently, your statements or official correspondence from the business will provide the proper contact information.
Contact the actual business that supposedly sent the e-mail to verify if the e-mail is genuine.
If you are requested to act quickly or there is an emergency, it may be a scam. Fraudsters create a sense of urgency to get you to act quickly.
Verify any requests for personal information from any business or financial institution by contacting them using the main contact information.
Remember if it looks too good to be true, it probably is.

To receive the latest information about cyber scams, go to the FBI website and sign up for e-mail alerts by clicking on the red envelope labeled “get FBI updates.” If you have received a scam e-mail, please notify the IC3 by filing a complaint at www.IC3.gov. For more information on e-scams, visit the FBI’s New E-Scams and Warnings webpage at http://www.fbi.gov/scams-safety/e-scams.

Be Aware Of Smartphone Malware

The IC3 has been made aware of various malware attacking Android operating systems for mobile devices. Some of the latest known versions of this type of malware are Loozfon and FinFisher. Loozfon is an information-stealing piece of malware. Criminals use different variants to lure the victims. One version is a work-at-home opportunity that promises a profitable payday just for sending out e-mail. A link within these advertisements leads to a website that is designed to push Loozfon on the user’s device. The malicious application steals contact details from the user’s address book and the infected device’s phone number.

FinFisher is a spyware capable of taking over the components of a mobile device. When installed the mobile device can be remotely controlled and monitored no matter where the Target is located. FinFisher can be easily transmitted to a smartphone when the user visits a specific web link or opens a text message masquerading as a system update.

Loozfon and FinFisher are just two examples of malware used by criminals to lure users into compromising their devices.

Safety tips to protect your mobile device:

When purchasing a smartphone, know the features of the device, including the default settings. Turn off features of the device not needed to minimize the attack surface of the device.
Depending on the type of phone, the operating system may have encryption available. This can be used to protect the user’s personal data in the case of loss or theft.
With the growth of the application market for mobile devices, users should look at the reviews of the developer/company who published the application.
Review and understand the permissions you are giving when you download applications.
Passcode protect your mobile device. This is the first layer of physical security to protect the contents of the device. In conjunction with the passcode, enable the screen lock feature after a few minutes of inactivity.
Obtain malware protection for your mobile device. Look for applications that specialize in antivirus or file integrity that helps protect your device from rogue applications and malware.
Be aware of applications that enable geo-location. The application will track the user’s location anywhere. This application can be used for marketing, but can also be used by malicious actors, raising concerns of assisting a possible stalker and/or burglaries.
Jailbreak or rooting is used to remove certain restrictions imposed by the device manufacturer or cell phone carrier. This allows the user nearly unregulated control over what programs can be installed and how the device can be used. However, this procedure often involves exploiting significant security vulnerabilities and increases the attack surface of the device. Anytime an application or service runs in “unrestricted” or “system” level within an operation system, it allows any compromise to take full control of the device.
Do not allow your device to connect to unknown wireless networks. These networks could be rogue access points that capture information passed between your device and a legitimate server.
If you decide to sell your device or trade it in, make sure you wipe the device (reset it to factory default) to avoid leaving personal data on the device.
Smartphones require updates to run applications and firmware. If users neglect this, it increases the risk of having their device hacked or compromised.
Avoid clicking on or otherwise downloading software or links from unknown sources.
Use the same precautions on your mobile phone as you would on your computer when using the Internet.

If you have been a victim of an Internet scam or have received an e-mail that you believe was an attempted scam, please file a complaint at www.IC3.gov.

Avoiding Black Friday Scams

FBI Tips on Avoiding Internet Fraud:

 

Tips for Avoiding Internet Auction Fraud:

  • Understand as much as possible about how the auction works, what your obligations are as a buyer, and what the seller’s obligations are before you bid.
  • Find out what actions the website/company takes if a problem occurs and consider insuring the transaction and shipment.
  • Learn as much as possible about the seller, especially if the only information you have is an e-mail address. If it is a business, check the Better Business Bureau where the seller/business is located.
  • Examine the feedback on the seller.
  • Determine what method of payment the seller is asking from the buyer and where he/she is asking to send payment.
  • If possible, purchase items online using your credit card, because you can often dispute the charges if something goes wrong.
  • Be cautious when dealing with sellers outside the United States. If a problem occurs with the auction transaction, it could be much more difficult to rectify.
  • Ask the seller about when delivery can be expected and whether the merchandise is covered by a warranty or can be exchanged if there is a problem.
  • Make sure there are no unexpected costs, including whether shipping and handling is included in the auction price.
  • There should be no reason to give out your social security number or driver’s license number to the seller.

Tips for Avoiding Non-Delivery of Merchandise:

  • Make sure you are purchasing merchandise from a reputable source.
  • Do your homework on the individual or company to ensure that they are legitimate.
  • Obtain a physical address rather than simply a post office box and a telephone number, and call the seller to see if the telephone number is correct and working.
  • Send an e-mail to the seller to make sure the e-mail address is active, and be wary of those that utilize free e-mail services where a credit card wasn’t required to open the account.
  • Consider not purchasing from sellers who won’t provide you with this type of information.
  • Check with the Better Business Bureau from the seller’s area.
  • Check out other websites regarding this person/company.
  • Don’t judge a person or company by their website. Flashy websites can be set up quickly.
  • Be cautious when responding to special investment offers, especially through unsolicited e-mail.
  • Be cautious when dealing with individuals/companies from outside your own country.
  • Inquire about returns and warranties.
  • If possible, purchase items online using your credit card, because you can often dispute the charges if something goes wrong.
  • Make sure the transaction is secure when you electronically send your credit card numbers.
  • Consider using an escrow or alternate payment service.

Tips for Avoiding Credit Card Fraud:

  • Don’t give out your credit card number online unless the site is a secure and reputable. Sometimes a tiny icon of a padlock appears to symbolize a higher level of security to transmit data. This icon is not a guarantee of a secure site, but provides some assurance.
  • Don’t trust a site just because it claims to be secure.
  • Before using the site, check out the security/encryption software it uses.
  • Make sure you are purchasing merchandise from a reputable source.
  • Do your homework on the individual or company to ensure that they are legitimate.
  • Obtain a physical address rather than simply a post office box and a telephone number, and call the seller to see if the telephone number is correct and working.
  • Send an e-mail to the seller to make sure the e-mail address is active, and be wary of those that utilize free e-mail services where a credit card wasn’t required to open the account.
  • Consider not purchasing from sellers who won’t provide you with this type of information.
  • Check with the Better Business Bureau from the seller’s area.
  • Check out other websites regarding this person/company.
  • Don’t judge a person or company by their website. Flashy websites can be set up quickly.
  • Be cautious when responding to special investment offers, especially through unsolicited e-mail.
  • Be cautious when dealing with individuals/companies from outside your own country.
  • If possible, purchase items online using your credit card, because you can often dispute the charges if something goes wrong.
  • Make sure the transaction is secure when you electronically send your credit card number.
  • Keep a list of all your credit cards and account information along with the card issuer’s contact information. If anything looks suspicious or you lose your credit card(s), contact the card issuer immediately.

Tips for Avoiding Investment Fraud:

  • Don’t judge a person or company by their website. Flashy websites can be set up quickly.
  • Don’t invest in anything you are not absolutely sure about. Do your homework on the investment and the company to ensure that they are legitimate.
  • Check out other websites regarding this person/company.
  • Be cautious when responding to special investment offers, especially through unsolicited e-mail.
  • Be cautious when dealing with individuals/companies from outside your own country.
  • Inquire about all the terms and conditions.

Tips for Avoiding Business Fraud:

  • Purchase merchandise from reputable dealers or establishments.
  • Obtain a physical address rather than simply a post office box and a telephone number, and call the seller to see if the telephone number is correct and working.
  • Send an e-mail to the seller to make sure the e-mail address is active, and be wary of those that utilize free e-mail services where a credit card wasn’t required to open the account.
  • Consider not purchasing from sellers who won’t provide you with this type of information.
  • Purchase merchandise directly from the individual/company that holds the trademark, copyright, or patent.

Tips for Avoiding the Nigerian Letter or “419” Fraud:

  • Be skeptical of individuals representing themselves as Nigerian or foreign government officials asking for your help in placing large sums of money in overseas bank accounts.
  • Do not believe the promise of large sums of money for your cooperation.
  • Guard your account information carefully.

Why Did Israel Murder Hamas’s ‘Chief of Staff’

GAZA — Israel has both admitted and denied murdering members of Hamas. Is Israel taking the lead from the United States and President Obama? The United States of America has started behaving exactly like the terrorists they seek to destroy. Sometimes the US gets their target, such as, Saddam Hussein or Osama bin Laden. Sometimes the US kills wedding ceremonies and children. In the most recent Israeli murders, they too killed at least two children.

Beware that you do not become that which you loath.

 

NEWS SOURCES

 

FROM THE JERUSALEM POST:
OPERATION PILLAR OF DEFENSE
Gazans fire 90 rockets; cabinet approves reserve call-up
IDF assassinates Hamas terror chief Ahmed Jabari and begins Operation Pillar of Defense, with intense aerial strikes throughout the Gaza Strip; 8 Palestinians killed in air strikes; IDF infantry forces deployed to Gaza border.
RELATED
Hamas: Assassination is a declaration of war
Beersheba residents hunker down for long night
IDF soldiers patrol near Gaza

Analysis: The battle for the South has begun
Hamas can accept deterrence or force IDF into ground offensive.
Prime Minister Binyamin Netanyahu calls early elec

Netanyahu talks to Obama, Ashton on Gaza operation
UN Security Council likely to meet to discuss violence.

LATEST UPDATES

05:07
UN Security Council holds emergency session on Israel raids
03:59
Gazans fire Grad towards Beersheba; Iron Dome intercepts
03:47
Obama speaks with Netanyahu, Morsi on Gaza escalation
02:59
Gazans fire 2 rockets at Beersheba; Iron Dome intercepts 1
02:48
IDF: Iron Dome has intercepted 28 rockets from Gaza so far