The following is the Disclaimer posted at this site: http://www.felonspy.com/. Believe it or not.
Disclaimer
We here at FelonSpy.com will never invade anyone’s privacy at all, but we do strive with daily passion and vigor working by the hour to insure that regular, non-criminal citizens (such as you and me, people who can vote an hold public office) have the best information possible to insure we have the knowledge we need to make qualified decisions about our own safety, our neighborhood, how closely we should be on the lookout against the criminal element around us, and our overall well being. We value our children as idyllic idols of the future in the same way we know you do, and it’s with these concerns in mind that we have put together this site. Thanks to us, you’ll always know what criminals live around you and how to protect yourself from this societal scum.
We hope to continue rolling out coverage city by city, state by state and nation by nation, but there are many places where we run in to obstacles. Some of these obstacles are “legal challenges” from the likes of attorneys, courthouses, law enforcement, those A-Holes at the ACLU and “the law” in general.
Apparently we care more about your well being than your own politicians and their stupid laws do, but that probably doesn’t come as too much of a surprise to you. Give money to anarchy societies anonymously, it’s the only way to protect yourself.
So here are some of the many ways we have to disclaim ourselves and this site:
Our data is not guaranteed, nor “official”, nor legally binding. Still, I think you know it’s pretty good, because it is. You can see how much work we dedicated to making it right, so we’re pretty solid, but not “guaranteed”.
Some municipalities and counties provide incomplete, outdated or inaccurate data from which we cull our information, so there may be places where addresses are incomplete or less-than-perfectly accurate, or the crime listed may be out of date, incorrect or otherwise since sealed, appealed or voided. We do our best, but we don’t always have access to the latest and best information, but winning in an appeal doesn’t mean the guy didn’t do it, does it?.
You should never use this site as cause to be a vigilante, even if you have been a victim and have a good 30-oz bat or unregistered firearm handy. Everyone loves a hero, there is no denying that, but if you rely on government records to put your hit-list together, it’s going to come back around to bite you in the butt every time, no thanks to “the man”. Use the database collection from this site instead as a general guideline and nothing more, and that’s our “disclaimer” (wink, wink).
When you see properties listed in the water, those are either incorrect addresses provided by your local government, or locations where the crime actually took place. We can’t correct all of them, but we do our best.
When you see an address listed in the middle of declared park lands, that is likely the last known location where this person committed a crime, or the last place the person was known to have been located.
None of the data we provide can be used in court, on television, radio or print media, or for any purposes other than your own curiosity and general information, unless otherwise stipulated in writing by one of our principal directors or data miners.
We do our best to provide safety and security for you, and we’ll keep doing it until the government sues us out of existence, which will sure as hell happen soon. Since we can’t actually promise our continued services we can only promise to flood you with arbitrary, unverified information so you can make some other decisions for yourself based accordingly. We’re only trying to help, and we work night and day to do just that.
Saturday, March 26, 2011
It’s Tracking Your Every Move and You May Not Even Know
A favorite pastime of Internet users is to share their location: services like Google Latitude can inform friends when you are nearby; another, Foursquare, has turned reporting these updates into a game.
But as a German Green party politician, Malte Spitz, recently learned, we are already continually being tracked whether we volunteer to be or not. Cellphone companies do not typically divulge how much information they collect, so Mr. Spitz went to court to find out exactly what his cellphone company, Deutsche Telekom, knew about his whereabouts.
The results were astounding. In a six-month period — from Aug 31, 2009, to Feb. 28, 2010, Deutsche Telekom had recorded and saved his longitude and latitude coordinates more than 35,000 times. It traced him from a train on the way to Erlangen at the start through to that last night, when he was home in Berlin.
Mr. Spitz has provided a rare glimpse — an unprecedented one, privacy experts say — of what is being collected as we walk around with our phones. Unlike many online services and Web sites that must send “cookies” to a user’s computer to try to link its traffic to a specific person, cellphone companies simply have to sit back and hit “record.”
“We are all walking around with little tags, and our tag has a phone number associated with it, who we called and what we do with the phone,” said Sarah E. Williams, an expert on graphic information at Columbia University’s architecture school. “We don’t even know we are giving up that data.”
Tracking a customer’s whereabouts is part and parcel of what phone companies do for a living. Every seven seconds or so, the phone company of someone with a working cellphone is determining the nearest tower, so as to most efficiently route calls. And for billing reasons, they track where the call is coming from and how long it has lasted.
“At any given instant, a cell company has to know where you are; it is constantly registering with the tower with the strongest signal,” said Matthew Blaze, a professor of computer and information science at the University of Pennsylvania who has testified before Congress on the issue.
Mr. Spitz’s information, Mr. Blaze pointed out, was not based on those frequent updates, but on how often Mr. Spitz checked his e-mail.
Mr. Spitz, a privacy advocate, decided to be extremely open with his personal information. Late last month, he released all the location information in a publicly accessible Google Document, and worked with a prominent German newspaper, Die Zeit, to map those coordinates over time.
“This is really the most compelling visualization in a public forum I have ever seen,” said Mr. Blaze, adding that it “shows how strong a picture even a fairly low-resolution location can give.”
In an interview from Berlin, Mr. Spitz explained his reasons: “It was an important point to show this is not some kind of a game. I thought about it, if it is a good idea to publish all the data — I also could say, O.K., I will only publish it for five, 10 days maybe. But then I said no, I really want to publish the whole six months.”
In the United States, telecommunication companies do not have to report precisely what material they collect, said Kevin Bankston, a lawyer at the Electronic Frontier Foundation, who specializes in privacy. He added that based on court cases he could say that “they store more of it and it is becoming more precise.”
But as a German Green party politician, Malte Spitz, recently learned, we are already continually being tracked whether we volunteer to be or not. Cellphone companies do not typically divulge how much information they collect, so Mr. Spitz went to court to find out exactly what his cellphone company, Deutsche Telekom, knew about his whereabouts.
The results were astounding. In a six-month period — from Aug 31, 2009, to Feb. 28, 2010, Deutsche Telekom had recorded and saved his longitude and latitude coordinates more than 35,000 times. It traced him from a train on the way to Erlangen at the start through to that last night, when he was home in Berlin.
Mr. Spitz has provided a rare glimpse — an unprecedented one, privacy experts say — of what is being collected as we walk around with our phones. Unlike many online services and Web sites that must send “cookies” to a user’s computer to try to link its traffic to a specific person, cellphone companies simply have to sit back and hit “record.”
“We are all walking around with little tags, and our tag has a phone number associated with it, who we called and what we do with the phone,” said Sarah E. Williams, an expert on graphic information at Columbia University’s architecture school. “We don’t even know we are giving up that data.”
Tracking a customer’s whereabouts is part and parcel of what phone companies do for a living. Every seven seconds or so, the phone company of someone with a working cellphone is determining the nearest tower, so as to most efficiently route calls. And for billing reasons, they track where the call is coming from and how long it has lasted.
“At any given instant, a cell company has to know where you are; it is constantly registering with the tower with the strongest signal,” said Matthew Blaze, a professor of computer and information science at the University of Pennsylvania who has testified before Congress on the issue.
Mr. Spitz’s information, Mr. Blaze pointed out, was not based on those frequent updates, but on how often Mr. Spitz checked his e-mail.
Mr. Spitz, a privacy advocate, decided to be extremely open with his personal information. Late last month, he released all the location information in a publicly accessible Google Document, and worked with a prominent German newspaper, Die Zeit, to map those coordinates over time.
“This is really the most compelling visualization in a public forum I have ever seen,” said Mr. Blaze, adding that it “shows how strong a picture even a fairly low-resolution location can give.”
In an interview from Berlin, Mr. Spitz explained his reasons: “It was an important point to show this is not some kind of a game. I thought about it, if it is a good idea to publish all the data — I also could say, O.K., I will only publish it for five, 10 days maybe. But then I said no, I really want to publish the whole six months.”
In the United States, telecommunication companies do not have to report precisely what material they collect, said Kevin Bankston, a lawyer at the Electronic Frontier Foundation, who specializes in privacy. He added that based on court cases he could say that “they store more of it and it is becoming more precise.”
Thursday, March 17, 2011
Do you use ATMs regardless of fees?
When I need to get some cash, I invariably head to the ATM at my bank in my hometown to replenish the always dwindling supply.
I can count on three fingers the number of times I've had to use an ATM not affiliated with my bank, and pay the fees that come with that convenience.
But I know some people who will use whatever ATM is handy, fees notwithstanding. They might change their behavior if they see higher fees coming their way.
CNN reports that some of the nation's biggest banks are testing out higher fees -- as much as $5 for non-customers. Add on the $2 or $3 that your own bank charges for going out of network, and a withdrawal of $20 could cost you closer to $30.
I know the location of at least a dozen of my bank's ATMs within a 10 or 15-mile radius of my home. Those 'little' $2 or $3 fees can add up quickly, and I'd rather head to my bank's ATMs and avoid them.
But not everyone is that lucky. Do you think before you get cash from an ATM? Or do you just figure that an extra $10 or $15 a month in 'convenience' charges are acceptable? And would a $5 charge stop you from getting cash from an out-of-network ATM, while a $2 or $3 charge doesn't?
I can count on three fingers the number of times I've had to use an ATM not affiliated with my bank, and pay the fees that come with that convenience.
But I know some people who will use whatever ATM is handy, fees notwithstanding. They might change their behavior if they see higher fees coming their way.
CNN reports that some of the nation's biggest banks are testing out higher fees -- as much as $5 for non-customers. Add on the $2 or $3 that your own bank charges for going out of network, and a withdrawal of $20 could cost you closer to $30.
I know the location of at least a dozen of my bank's ATMs within a 10 or 15-mile radius of my home. Those 'little' $2 or $3 fees can add up quickly, and I'd rather head to my bank's ATMs and avoid them.
But not everyone is that lucky. Do you think before you get cash from an ATM? Or do you just figure that an extra $10 or $15 a month in 'convenience' charges are acceptable? And would a $5 charge stop you from getting cash from an out-of-network ATM, while a $2 or $3 charge doesn't?
Saturday, March 12, 2011
FTC Releases List of Top Consumer Complaints in 2010
FTC Releases List of Top Consumer Complaints in 2010; Identity Theft Tops the List Again
The Federal Trade Commission today released the list of top consumer complaints received by the agency in 2010. The list showed that for the 11th year in a row, identity theft was the number one consumer complaint category. Of 1,339,265 complaints received in 2010, 250,854 – or 19 percent – were related to identity theft. Debt collection complaints were in second place, with 144,159 complaints.
The report breaks out complaint data on a state-by-state basis and also contains data about the 50 metropolitan areas reporting the highest per capita incidence of fraud and other complaints. In addition, the 50 metropolitan areas reporting the highest incidence of identity theft are noted.
For the first time, “imposter scams” – where imposters posed as friends, family, respected companies or government agencies to get consumers to send them money – made the top 10. The FTC also has issued a new consumer alert, “Spotting an Imposter”, to help consumers avoid imposter scams.
Rank Category Number of Complaints Percentage
1 Identity Theft 250,854 19%
2 Debt Collection 144,159 11%
3 Internet Services 65,565 5%
4 Prizes, Sweepstakes and Lotteries 64,085 5%
5 Shop-at-Home and Catalog Sales 60,205 4%
6 Imposter Scams 60,158 4%
7 Internet Auctions 56,107 4%
8 Foreign Money/Counterfeit Check Scams 43,866 3%
9 Telephone and Mobile Services 37,388 3%
10 Credit Cards 33,258 2%
More information is at: http://www.ftc.gov/opa/2011/03/topcomplaints.shtm
The Federal Trade Commission today released the list of top consumer complaints received by the agency in 2010. The list showed that for the 11th year in a row, identity theft was the number one consumer complaint category. Of 1,339,265 complaints received in 2010, 250,854 – or 19 percent – were related to identity theft. Debt collection complaints were in second place, with 144,159 complaints.
The report breaks out complaint data on a state-by-state basis and also contains data about the 50 metropolitan areas reporting the highest per capita incidence of fraud and other complaints. In addition, the 50 metropolitan areas reporting the highest incidence of identity theft are noted.
For the first time, “imposter scams” – where imposters posed as friends, family, respected companies or government agencies to get consumers to send them money – made the top 10. The FTC also has issued a new consumer alert, “Spotting an Imposter”, to help consumers avoid imposter scams.
Rank Category Number of Complaints Percentage
1 Identity Theft 250,854 19%
2 Debt Collection 144,159 11%
3 Internet Services 65,565 5%
4 Prizes, Sweepstakes and Lotteries 64,085 5%
5 Shop-at-Home and Catalog Sales 60,205 4%
6 Imposter Scams 60,158 4%
7 Internet Auctions 56,107 4%
8 Foreign Money/Counterfeit Check Scams 43,866 3%
9 Telephone and Mobile Services 37,388 3%
10 Credit Cards 33,258 2%
More information is at: http://www.ftc.gov/opa/2011/03/topcomplaints.shtm
Tuesday, March 8, 2011
Hackers steal $527,000 from LES FCU account at bank
BATON ROUGE, La. (3/8/11)--Computer hackers from the Ukraine made unauthorized transfers totaling nearly $527,000 from LES FCU, Baton Rouge, La., in September 2009 through the credit union's commercial account with Capital One, according to a lawsuit filed in U.S. District Court Thursday.
The hackers transferred the money by slipping an e-mail attachment with malware past a credit union accountant, according to the complaint filed against Capital One by the credit union's insurer, Fidelity & Deposit Co. of Maryland. The insurer reimbursed LES FCU for $321,873.
More than $200,000 of the siphoned funds were recovered before they could be claimed by the criminals at wire transfer locations worldwide, the court documents said.
Capital One is alleged to have permitted the unauthorized transactions after an LES FCU accountant received an e-mail purporting to be from the Internal Revenue Service (IRS) around Sept 14, 2009, according to the complaint.
The e-mail was from "a den of thieves," who directed the accountant to "an official-looking" website, said the complaint filed Thursday. At that website, a "key logger program" was secretly downloaded to the accountant's computer. The program allowed the thieves to obtain the credit union's Capital One user IDs and passwords.
On Sept. 16, the accountant accessed the credit union's Capital One account and noticed that nine unauthorized transfers had been made Sept. 15. Capital One mailed notifications to the credit union regarding the nine wire transfers processed, but did not attempt to contact the credit union directly. At 9:15 a.m. Sept. 16, LES FCU contacted Capital and reported the unauthorized transfers
The hackers transferred the money by slipping an e-mail attachment with malware past a credit union accountant, according to the complaint filed against Capital One by the credit union's insurer, Fidelity & Deposit Co. of Maryland. The insurer reimbursed LES FCU for $321,873.
More than $200,000 of the siphoned funds were recovered before they could be claimed by the criminals at wire transfer locations worldwide, the court documents said.
Capital One is alleged to have permitted the unauthorized transactions after an LES FCU accountant received an e-mail purporting to be from the Internal Revenue Service (IRS) around Sept 14, 2009, according to the complaint.
The e-mail was from "a den of thieves," who directed the accountant to "an official-looking" website, said the complaint filed Thursday. At that website, a "key logger program" was secretly downloaded to the accountant's computer. The program allowed the thieves to obtain the credit union's Capital One user IDs and passwords.
On Sept. 16, the accountant accessed the credit union's Capital One account and noticed that nine unauthorized transfers had been made Sept. 15. Capital One mailed notifications to the credit union regarding the nine wire transfers processed, but did not attempt to contact the credit union directly. At 9:15 a.m. Sept. 16, LES FCU contacted Capital and reported the unauthorized transfers
Monday, March 7, 2011
Your Television is Watching You
Data-gathering firms and technology companies are aggressively matching people's TV-viewing behavior with other personal data—in some cases, prescription-drug records obtained from insurers—and using it to help advertisers buy ads targeted to shows watched by certain kinds of people.
At the same time, cable and satellite companies are testing and deploying new systems designed to show households highly targeted ads.
The goal: emulate the sophisticated tracking widely used on people's personal computers with new technology that reaches the living room.
One of the most advanced companies, Cablevision Systems Corp., has rolled out a system that can show entirely different commercials, in real time, to different households tuned to the same program. It can deliver targeted ads to all the company's three million subscribers concentrated in New York, Connecticut and New Jersey.
In an early test of Cablevision's technology, the U.S. Army used it to target four different recruitment ads to different categories of viewers.
One group, dubbed "family influencers" by Cablevision, saw an ad featuring a daughter discussing with her parents her decision to enlist. Another group, "youth ethnic I," saw an ad featuring African-American men testing and repairing machinery. A third, "youth ethnic II," saw soldiers of various ethnicities doing team activities. An Army spokesman declined to comment.
Read more on how TV is watching us at: http://online.wsj.com/article/SB10001424052748704288304576171251689944350.html
At the same time, cable and satellite companies are testing and deploying new systems designed to show households highly targeted ads.
The goal: emulate the sophisticated tracking widely used on people's personal computers with new technology that reaches the living room.
One of the most advanced companies, Cablevision Systems Corp., has rolled out a system that can show entirely different commercials, in real time, to different households tuned to the same program. It can deliver targeted ads to all the company's three million subscribers concentrated in New York, Connecticut and New Jersey.
In an early test of Cablevision's technology, the U.S. Army used it to target four different recruitment ads to different categories of viewers.
One group, dubbed "family influencers" by Cablevision, saw an ad featuring a daughter discussing with her parents her decision to enlist. Another group, "youth ethnic I," saw an ad featuring African-American men testing and repairing machinery. A third, "youth ethnic II," saw soldiers of various ethnicities doing team activities. An Army spokesman declined to comment.
Read more on how TV is watching us at: http://online.wsj.com/article/SB10001424052748704288304576171251689944350.html
Saturday, March 5, 2011
To help all of you true lexiphiles
To help all of you true lexiphiles (lovers of language and the art of crisp idea expression), here are some wonderful new phrases . . . or maybe a repeat of some old ones.
Here they are:
To write with a broken pencil is pointless.
When fish are in schools they sometimes take debate.
A thief who stole a calendar got twelve months.
When the smog lifts in Los Angeles, U.C.L.A.
The professor discovered that her theory of earthquakes was on shaky ground.
The batteries were given out free of charge.
A dentist and a manicurist married. They fought tooth and nail.
A will is a dead giveaway.
If you don’t pay your exorcist you can get repossessed.
With her marriage, she got a new name and a dress.
Show me a piano falling down a mineshaft and I’ll show you A-flat miner.
You are stuck with your debt if you can’t budge it.
Local Area Network in Australia: The LAN down under.
A boiled egg is hard to beat.
When you’ve seen one shopping center you’ve seen a mall.
Police were called to a day care where a three-year-old was resisting a rest.
Did you hear about the fellow whose whole left side was cut off? He’s all right now.
If you take a laptop computer for a run you could jog your memory.
A bicycle can’t stand alone; it is two tired.
In a democracy it’s your vote that counts; in feudalism, it’s your Count that votes.
When a clock is hungry it goes back four seconds.
The guy who fell onto an upholstery machine was fully recovered.
He had a photographic memory which was never developed.
Those who get too big for their britches will be exposed in the end.
When she saw her first strands of gray hair, she thought she’d dye.
Acupuncture: a jab well done.
Here they are:
To write with a broken pencil is pointless.
When fish are in schools they sometimes take debate.
A thief who stole a calendar got twelve months.
When the smog lifts in Los Angeles, U.C.L.A.
The professor discovered that her theory of earthquakes was on shaky ground.
The batteries were given out free of charge.
A dentist and a manicurist married. They fought tooth and nail.
A will is a dead giveaway.
If you don’t pay your exorcist you can get repossessed.
With her marriage, she got a new name and a dress.
Show me a piano falling down a mineshaft and I’ll show you A-flat miner.
You are stuck with your debt if you can’t budge it.
Local Area Network in Australia: The LAN down under.
A boiled egg is hard to beat.
When you’ve seen one shopping center you’ve seen a mall.
Police were called to a day care where a three-year-old was resisting a rest.
Did you hear about the fellow whose whole left side was cut off? He’s all right now.
If you take a laptop computer for a run you could jog your memory.
A bicycle can’t stand alone; it is two tired.
In a democracy it’s your vote that counts; in feudalism, it’s your Count that votes.
When a clock is hungry it goes back four seconds.
The guy who fell onto an upholstery machine was fully recovered.
He had a photographic memory which was never developed.
Those who get too big for their britches will be exposed in the end.
When she saw her first strands of gray hair, she thought she’d dye.
Acupuncture: a jab well done.
Friday, March 4, 2011
Convert PDF to Word; Free and No Downloading
Using the PDF-to-Word conversion technology, you can quickly and easily create editable DOC/RTF files, making it a cinch to re-use PDF content in applications like Microsoft Word, Excel, OpenOffice, and WordPerfect.
Best of all, it's entirely free!
While it's not possible to replicate the exact formatting and appearance of the original file used in creating a PDF, we believe the free PDF-to-Word converter produces more accurate results than any other tool out there, including the most expensive desktop products.
The free online service is based on the industry-leading PDF-to-Word technology. Check out the service at their website at: http://www.pdftoword.com/
Best of all, it's entirely free!
While it's not possible to replicate the exact formatting and appearance of the original file used in creating a PDF, we believe the free PDF-to-Word converter produces more accurate results than any other tool out there, including the most expensive desktop products.
The free online service is based on the industry-leading PDF-to-Word technology. Check out the service at their website at: http://www.pdftoword.com/
25 Ways to Waste Your Money
Has your budget sprung a leak?
Nearly everyone has spending holes. And as with other kinds of leaks, you may have hardly noticed them. But those small drips can quickly add up to big bucks. The trick is to find the holes and plug them so you can keep more money in your pocket. That extra cash could be the ticket to finally being able to save, invest, or break your cycle of living from paycheck to paycheck.
Here are 25 common ways people waste money. See if any of these sound familiar, then look for ways to plug your own leaks:
1. Carrying a balance. Debt is a shackle that holds you back. For instance, if you have a $1,000 balance on a credit card that charges an 18% rate, you blow $180 every year on interest. Get in the habit of paying off your balance in full each month.
2. Overspending on gas and oil for your car. There's no need to spring for premium fuel if the manufacturer says regular is just fine. You should also check to make sure your tires are optimally inflated to get the best gas mileage. And are you still paying for an oil change every 3,000 miles? Many models nowadays can last 5,000 to 7,000 miles between changes, and some even have built-in sensors to tell you when it's time to change the oil. Check your manual to find the best time for your car's routine maintenance.
3. Keeping unhealthy habits. Smoking costs a lot more than just what you pay for a pack of cigarettes. It significantly increases the cost of life and health insurance. And you'll pay more for homeowners and auto insurance. Add in various other expenses, and the true cost of smoking adds up dramatically over a lifetime -- $86,000 for a 24-year-old woman over a lifetime and $183,000 for a 24-year-old man over a lifetime, according to "The Price of Smoking" (The MIT Press).
Another habit to quit: indoor tanning. There is now a 10% tax on indoor tanning services. As with cigarettes, the true cost of tanning -- which the World Health Organization lists among the worst-known carcinogens -- is higher than just the price you pay each time you go to the salon.
4. Using a cell phone that doesn't fit. How many people do you know who have spent hundreds of dollars on fancy phones, and then pay hundreds of dollars every month for the privilege of using them? Your phone is not a status symbol. It is a way to communicate. Many people pay too much for cell phone contracts and don't use all their minutes. Go to BillShrink.com or Validas.com to evaluate your usage and see if you can find a plan that fits you better. Or consider a prepaid cell phone. Compare rates at MyRatePlan.com.
5. Buying brand-name instead of generic. From groceries to clothing to prescription drugs, you could save money by choosing the off-brand over the fancy label. And in many cases, you won't sacrifice much in quality. Clever advertising and fancy packaging don't make brand-name products better than lesser-known brands
See 20 more money savings tips: http://finance.yahoo.com/banking-budgeting/article/112202/25-ways-to-waste-your-money?mod=bb-budgeting
Nearly everyone has spending holes. And as with other kinds of leaks, you may have hardly noticed them. But those small drips can quickly add up to big bucks. The trick is to find the holes and plug them so you can keep more money in your pocket. That extra cash could be the ticket to finally being able to save, invest, or break your cycle of living from paycheck to paycheck.
Here are 25 common ways people waste money. See if any of these sound familiar, then look for ways to plug your own leaks:
1. Carrying a balance. Debt is a shackle that holds you back. For instance, if you have a $1,000 balance on a credit card that charges an 18% rate, you blow $180 every year on interest. Get in the habit of paying off your balance in full each month.
2. Overspending on gas and oil for your car. There's no need to spring for premium fuel if the manufacturer says regular is just fine. You should also check to make sure your tires are optimally inflated to get the best gas mileage. And are you still paying for an oil change every 3,000 miles? Many models nowadays can last 5,000 to 7,000 miles between changes, and some even have built-in sensors to tell you when it's time to change the oil. Check your manual to find the best time for your car's routine maintenance.
3. Keeping unhealthy habits. Smoking costs a lot more than just what you pay for a pack of cigarettes. It significantly increases the cost of life and health insurance. And you'll pay more for homeowners and auto insurance. Add in various other expenses, and the true cost of smoking adds up dramatically over a lifetime -- $86,000 for a 24-year-old woman over a lifetime and $183,000 for a 24-year-old man over a lifetime, according to "The Price of Smoking" (The MIT Press).
Another habit to quit: indoor tanning. There is now a 10% tax on indoor tanning services. As with cigarettes, the true cost of tanning -- which the World Health Organization lists among the worst-known carcinogens -- is higher than just the price you pay each time you go to the salon.
4. Using a cell phone that doesn't fit. How many people do you know who have spent hundreds of dollars on fancy phones, and then pay hundreds of dollars every month for the privilege of using them? Your phone is not a status symbol. It is a way to communicate. Many people pay too much for cell phone contracts and don't use all their minutes. Go to BillShrink.com or Validas.com to evaluate your usage and see if you can find a plan that fits you better. Or consider a prepaid cell phone. Compare rates at MyRatePlan.com.
5. Buying brand-name instead of generic. From groceries to clothing to prescription drugs, you could save money by choosing the off-brand over the fancy label. And in many cases, you won't sacrifice much in quality. Clever advertising and fancy packaging don't make brand-name products better than lesser-known brands
See 20 more money savings tips: http://finance.yahoo.com/banking-budgeting/article/112202/25-ways-to-waste-your-money?mod=bb-budgeting
Online crime at second highest in decade
CUNA - FAIRMONT, W.Va. (3/4/11)--Just how pervasive has Internet crime become? In 2010, the Internet Crime Complaint Center (IC3) received 303,809 complaints--the second-highest total in IC3's 10-year history and an average of 25,317 complaints per month.
IC3, a repository for victim complaints, is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). It has received more than two million Internet crime complaints since it was established in 2000.
The three most common complaints:
Others included: computer crimes, 9.1%; miscellaneous fraud, 8.6%; advance fee fraud, 7.6%; spam, 6.9%; auction fraud, 5.9%; credit card fraud, 5.3%; and overpayment fraud, 5.3%.
Of those with dollar losses reported, 21.1% related to non-delivery of payment or merchandise; 16.6% were identity theft, 10.1% were auction fraud, and 9.3% were credit card fraud.
IC3, a repository for victim complaints, is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). It has received more than two million Internet crime complaints since it was established in 2000.
The three most common complaints:
- Nondelivery of payment or merchandise (14.4% of complaints);
- Scams using the FBI's name (13.2%); and
- Identity theft (9.8%).
Others included: computer crimes, 9.1%; miscellaneous fraud, 8.6%; advance fee fraud, 7.6%; spam, 6.9%; auction fraud, 5.9%; credit card fraud, 5.3%; and overpayment fraud, 5.3%.
Of those with dollar losses reported, 21.1% related to non-delivery of payment or merchandise; 16.6% were identity theft, 10.1% were auction fraud, and 9.3% were credit card fraud.
Text scams, other fraud reported by CUs
CUNA - MADISON, Wis. (3/4/11)--Credit unions in several states are reporting recent text, e-mail, and telephone scams urging consumers to divulge their account numbers. Also, two credit unions reported counterfeit checks, CUNA Mutual recently alerted credit unions about unauthorized wire transfers through the Bredolab Trojan malware, and one credit union reissued debit and credit cards after a theft at a gas station.
Among the reports:
Two credit unions--in Kansas and Pennsylvania--reported counterfeit checks circulating with their names.
Lenexa, Kan.-based CommunityAmerica CU's name is used on counterfeit cashier's checks, said an alert from the Federal Deposit Insurance Corp. CommunityAmerica does not issue cashier's checks; it issues official checks. The bogus checks include a routing number, 011007092, assigned to Boston (Mass.) Safe Deposit & Trust Co. The credit union's official checks are through Moneygram Payment Systems Inc. and use an account held in the Boston Safe Deposit & Trust Co. The fake items display a security feature statement embedded within darkened top and bottom borders, and the word "CASHIER'S CHECK" in the top center. Authentic checks have a blue cubed background,dark blue top border, and a security feature statement centered above the bottom order. Seven arrows precede the numeric dollar amount.
Also, Allegheny-Ludlum Brackenridge FCU in Brackenridge, Pa., said fraudulent checks with its name, address and ABA number are in circulation and use an account number from a closed account (Life is a Highway March 3). The check--from GALA GLOBAL in Andover, Mass.--is for $980 and is enclosed in a letter about GALA's Member Pulse Survey 2011 for a Walmart evaluation exercise. It asks the recipient to deposit or cash the check "preferably at your bank and NOT at any Walmart location (so the employees at Walmart won't be tipped off)."
Among the reports:
- In Pennsylvania, someone posing as Beaver Valley FCU, Beaver Falls, is texting people and asking for personal debit and credit card information (Associated Press Newswires March 3). Police began receiving calls about the scam Tuesday and called the numbers given in the text message. One goes to North Carolina and another to Massachusetts. Two people fell for the scam and gave account information but no fraudulent transactions have occurred yet. On Thursday New Brighton police reported six such calls. Scammers are contacting people with cell phone numbers in the 724 area code (TimesOnline.com March 3).
- ARC FCU in Altoona, Pa., told the Pennsylvania Credit Union Association recently that members received automated phone messages advising them of a problem with their debit/credit cards and instructing them to call in and enter their card number. Caller ID screens show the calls came from 1402, a number that is not associated with the credit union (Life is a Highway Jan. 31).
- In North Carolina, a text message purporting to be from Tarboro-based Telco CU informs recipients their account has been suspended and asks them to call a telephone number to verify account information. Several people who do not have Telco accounts contacted the Asheville Police Department after receiving the text (Asheville Citizen-Times March 3).
- Similar e-mail scams claiming something is wrong with an account are targeting Mobiloil CU members and nonmembers in Beaumont, Texas, said the Beaumont Police Department (Beaumont Enterprise Feb. 9).
- West Community CU, O Fallon, Mo., cancelled and reissued about 250 cards whose numbers were compromised when a credit card machine was stolen from a Mobil station in St. Louis. (KSDK.com Feb. 21).
- Security Service FCU, San Antonio, said that in January hundreds of people received automated calls from a 1-888 number about deactivated accounts and asking for account numbers (WOAI.com Jan. 31). The messages claim recipients' cards have been blocked and they must enter their account number and personal identification number to reactivate them. An example: "(888-891-2538) Hello. Call us now at 817-350-4570. Security Service FCU." Neither number belongs to the credit union.
Two credit unions--in Kansas and Pennsylvania--reported counterfeit checks circulating with their names.
Lenexa, Kan.-based CommunityAmerica CU's name is used on counterfeit cashier's checks, said an alert from the Federal Deposit Insurance Corp. CommunityAmerica does not issue cashier's checks; it issues official checks. The bogus checks include a routing number, 011007092, assigned to Boston (Mass.) Safe Deposit & Trust Co. The credit union's official checks are through Moneygram Payment Systems Inc. and use an account held in the Boston Safe Deposit & Trust Co. The fake items display a security feature statement embedded within darkened top and bottom borders, and the word "CASHIER'S CHECK" in the top center. Authentic checks have a blue cubed background,dark blue top border, and a security feature statement centered above the bottom order. Seven arrows precede the numeric dollar amount.
Also, Allegheny-Ludlum Brackenridge FCU in Brackenridge, Pa., said fraudulent checks with its name, address and ABA number are in circulation and use an account number from a closed account (Life is a Highway March 3). The check--from GALA GLOBAL in Andover, Mass.--is for $980 and is enclosed in a letter about GALA's Member Pulse Survey 2011 for a Walmart evaluation exercise. It asks the recipient to deposit or cash the check "preferably at your bank and NOT at any Walmart location (so the employees at Walmart won't be tipped off)."
Thursday, March 3, 2011
Do-it-yourself: Stop junk mail
Your name, address, and buying habits are a commodity that is regularly sold & traded on the open market. These days organizations you deal with virtually all sell your name unless you specifically ask them to stop. Here are some general techniques:
- Whenever you donate money, order a product or service, or fill out a warranty card, write in large letters, "Please do not sell my name or address". Most organizations will properly mark your name in the computer.
- Product warranty cards are are often used to collection information on your habits and income, for the sole purpose of targeting direct mail. They are not required in most situations - avoid sending them.
- On the telephone, ask "Please mark my account so that my name is not traded or sold to other companies".
- Your credit card company probably sells your name the most often -- keep reading for techniques to stop it.
- "Contests" where you fill in a little entry blank are almost always fishing expeditions for names. If you fill one out at a football game, for example, expect to get a catalog of football merchandise within a few months. Avoid these if you don't want the mail.
- Select a false middle name or initial for each charity or business you deal with. Keep track of which letter goes with which organization. You can also select a false road designator, "avenue, place, circle, street, highway, parkway, etc.". This step can be very revealing. Some guides recommend changing the spelling of your name, but this can lead to duplicate mailings.
Wednesday, March 2, 2011
Free Babysitting Provided in Wells Fargo Vault
Recently, a fourteen-month-old baby spent four long and frightening hours surrounded by safe deposit boxes after she was locked inside a Wells Fargo Bank vault in Conyers, Georgia.
Picture This. . . .
A little girl and her mother arrive at Wells Fargo Bank to visit with her grandmother, a bank employee. While mom and grandmother visited, the toddler wandered unnoticed into the safe deposit vault. As bad luck and poor security procedures would have it, the vault door time clock was set, the door was shut and the toddler was now locked inside. The baby immediately started to cry when the lights went out and was detected by a security camera monitoring the inside of the vault.
Police and fire department personnel arrived quickly. They pumped oxygen into the vault while awaiting for a police escorted vault door locksmith. After four tense hours of drilling through solid steel, the toddler was returned unharmed to her frantic parents and grandmother.
History Repeats Itself
A few years earlier, at another Wells Fargo (San Francisco) branch on Christmas Eve, the same “free overnight accommodations” were provided to another unsuspecting consumer. Daniel Goldberg, an 81-year-old attorney spent two nights (more than 40 hours) locked inside the bank’s vault. Fortunately for Wells Fargo, the attorney took it in stride and decided not to sue. Had he chosen to do so, Wells Fargo Bank might now be known as Goldberg National Bank.
Other Nationwide Lock-Ins
Unfortunately, these are not isolated incidents. They are only two of many such vault lock-in horror stories. There have been others nationwide, including a sweet 86-year-old lady from Tacoma, WA, a Georgia bank president, an eighteen-month-old baby boy and several other elderly box renters. One lock-in victim was even a dog belonging to the Chairman of the Board. The dog was in the facility on a Saturday afternoon when he decided to play hide-n-seek with his master. You can easily guess where he decided to hide. Each of these cases could have resulted in serious liability, injury or even death, all of which would mean significant losses for these institutions.
Picture This. . . .
A little girl and her mother arrive at Wells Fargo Bank to visit with her grandmother, a bank employee. While mom and grandmother visited, the toddler wandered unnoticed into the safe deposit vault. As bad luck and poor security procedures would have it, the vault door time clock was set, the door was shut and the toddler was now locked inside. The baby immediately started to cry when the lights went out and was detected by a security camera monitoring the inside of the vault.
Police and fire department personnel arrived quickly. They pumped oxygen into the vault while awaiting for a police escorted vault door locksmith. After four tense hours of drilling through solid steel, the toddler was returned unharmed to her frantic parents and grandmother.
History Repeats Itself
A few years earlier, at another Wells Fargo (San Francisco) branch on Christmas Eve, the same “free overnight accommodations” were provided to another unsuspecting consumer. Daniel Goldberg, an 81-year-old attorney spent two nights (more than 40 hours) locked inside the bank’s vault. Fortunately for Wells Fargo, the attorney took it in stride and decided not to sue. Had he chosen to do so, Wells Fargo Bank might now be known as Goldberg National Bank.
Other Nationwide Lock-Ins
Unfortunately, these are not isolated incidents. They are only two of many such vault lock-in horror stories. There have been others nationwide, including a sweet 86-year-old lady from Tacoma, WA, a Georgia bank president, an eighteen-month-old baby boy and several other elderly box renters. One lock-in victim was even a dog belonging to the Chairman of the Board. The dog was in the facility on a Saturday afternoon when he decided to play hide-n-seek with his master. You can easily guess where he decided to hide. Each of these cases could have resulted in serious liability, injury or even death, all of which would mean significant losses for these institutions.
Subscribe to:
Posts (Atom)