SurvivalRing

Rich Fleetwood on Survival & Preparedness - Founded/Established 1997

TIPS: Stop.Think.Connect. March Update (DHS)

Stop.Think.Connect.

MARCH 2013 UPDATE

IN THIS ISSUE

  • Protect Your Personal Information This Tax Season
  • DHS Spotlight: The U.S. Secret Service Electronic Crimes Task Force
  • Stop.Think.Connect. Campaign Launches in India  
  • Do You Know How to Secure Your Mobile Device? 

Tax Season

Protect Your Personal Information This Tax Season: More Information to Come

Be on the lookout for a joint message coming soon from Stop.Think.Connect. and the Internal Revenue Service (IRS) discussing safe and secure practices for electronically submitting your tax information. In the meantime, here are a few tips to get you started:

  • Don’t give personal information unless you know who is on the receiving end.
  • Look out for phony messages purporting to be from the IRS and don’t fall victim to tax scams.
  • Report phishing attempts to phishing@irs.gov.

To learn more about how to protect your information during tax season, please visitwww.irs.gov/identitytheft.


Secret Service Electronic Crimes Task Force Logo

DHS Component Spotlight: The U.S. Secret Service Electronic Crimes Task Force

In March 2012, the U.S. Secret Service, in coordination with U.S. Immigration and Customs Enforcement (ICE), arrested 19 individuals in nine states in“Operation Open Market.”  This was an investigation into transnational organized crime which operated on multiple cyber platforms and whose members bought and sold stolen and personal financial information from ordinary citizens. The group engaged in crimes such as identity theft and counterfeit credit card trafficking.

The Secret Service and ICE investigation and subsequent arrests demonstrate how cybercrime extends beyond state lines and operates in the virtual networks and systems that connect all of us.

Over the years, the way we manage and spend our money has changed to include fewer cash transactions and more electronic methods, such as direct deposit, automatic payments, and online banking.  Now that most financial transactions happen virtually, fraud artists to violent criminals are able to exploit technology to expand and diversify their criminal portfolio. Many crimes affecting individuals –including credit card fraud, identity theft, and embezzlement – are increasingly conducted, or at least facilitated, through the Internet.

As technology evolves, the scope of the Secret Service’s mission has expanded from its original counterfeit currency investigations to include emerging financial crimes.  The U.S. Secret Service has taken a lead role in mitigating the threat of financial crimes since the agency’s inception in 1865.

To identify and combat electronic crimes, the Secret Service’s Electronic Crimes Task Force provides a framework and collaborative crime-fighting environment that brings together federal, state, and local law enforcement, academia, and private industry.  The Secret Service continues to work to provide a safer and more secure and resilient cyber environment by arresting cyber criminals.

While the Secret Service and other law enforcement professionals across the country are working hard to combat cybercrime, emerging cyber threats require everyone, including members of the public, to take part in the shared responsibility to create a safer cyber environment.

Below are some tips that can help you have a safer and more secure online experience.                                 

  • Protect all devices that connect to the Internet. Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from viruses and malware.
  • Check website security. When banking and shopping, check to be sure the sites is security enabled with “https://” or “shttp://”
  • Beware of unsolicited email or suspicious websitesNever provide your credit card number, bank account information, or other personal information in response to an unsolicited e-mail or on suspicious Internet web sites.

Visit www.dhs.gov/stopthinkconnect or the Secret Service’s Frequently Asked Questions for more information.


Stop.Think.Connect. Launches in India

Stop.Think.Connect. Campaign Launches in India

In February, the Data Security Council of India (DSCI), in association with Facebook, Google, Kaspersky, Microsoft, and Fever 104 FM, launched the India edition of the Stop.Think.Connect. Campaign to help all digital citizens stay safer and more secure online.

The Campaign involves a college outreach program carried out in major cities such as Delhi, Bengaluru, Mumbai, and Kolkata. In the form of a street play competition for college students, the team that presents the best theatrical take on Internet safety receives a cash prize. The initiative aimsto create an Internet Safety movement especially amongst young users and hopes to empower citizens of India to stay safer and more secure online using the theme ‘Internet Safety and You’.

To learn more about the Stop.Think.Connect. India Campaign, visit www.stopthinkconnectindia.weebly.com, follow them on Twitter @India_STC, or like their Facebook page at www.facebook.com/StopThinkConnectIndia.


Smartphone Security

Do You Know How to Secure Your Mobile Device?

Think about the last time you used your smartphone. Did you check your email? Track your finances? Post a photo or check in to a location? Most likely, making phone calls is just one small part of how you use your mobile phone on a daily basis.

According to the 2011 Pew Internet Smartphone Adoption and Usage Survey, 87 percent of smartphone owners access the Internet or email on their handheld, including two-thirds (68 percent) who do so on a typical day. The Pew Internet report goes on to state that 25 percent of smartphone owners say that they mostly go online using their phone, rather than with a computer.

Additionally, hundreds of thousands of apps—many of them free—provide tools to use our phones to do everything from ordering take-out food to monitoring your exercise routine. However, the ease and accessibility of computing from your smartphone brings increased risks. We should follow simple tips for safeguarding our phones the same way we protect our computers and laptops.

The Federal Communications Commission’s (FCC) recently released Smartphone Checker designed to help the many smartphone owners who aren’t protected against mobile security threats. Click hereto access the Smartphone Security Checker by completing 10 quick and customized steps to secure your mobile device.

The FCC also offers these simple tips to secure your mobile device. For additional information on each of the tips or to download a copy, click here.

  • Set PINS and passwords. You should configure your phone to automatically lock after five minutes or less when your phone is idle, as well as use the SIM password capability available on most smartphones.
  • Do not modify your smartphone’s security settings. Altering your mobile phone’s factory settings undermines the built-in security features offered by your wireless service provider and smartphone manufacture making it more susceptible to an attack.
  • Backup and secure your data. Backing up your data such as your contacts, documents, and photos will allow you to conveniently restore the information if it is lost, stolen, or accidently erased.
  • Only install apps from trusted sources. Many apps from untrusted sources contain malware that once installed can steal information, install viruses, and cause harm to your phone’s contents.
  • Understand app permissions before accepting them. Make sure to also check the privacy settings for each app before installing.
  • Install security apps that enable remote location and wiping. Visit CTIA – The Wireless Association® for a full list of anti-theft protection apps.
  • Accept updates and patches to your smartphone’s software. By keeping your operating system current, you reduce risk of exposure to cyber threats.
  • Be smart on open Wi-Fi networks. When you access a Wi-Fi network that is open to the public, your phone can be an easy target of cybercriminals.
  • Wipe data on your old phone before you donate, resell, or recycle it. To protect your privacy, completely erase data off of your phone and reset the phone to its initial factory settings.
  • Report a stolen smartphone. The major wireless service providers, in coordination with the FCC, have established a stolen phone database. If your phone is stolen, you should report the theft to your local law enforcement authorities and then register the stolen phone with your wireless provider.

To learn more about mobile phone security, please visit www.fcc.gov. For more cyber resources and tip, please visit www.dhs.gov/stopthinkconnect.


Let us know what you think


Contact the Campaign

Content Protection by DMCA.com
Updated: March 21, 2013 — 11:49 am

The Author

Rich Fleetwood

Rich is the founder of SurvivalRing, now in it's 20th year, author of multimedia CDs and DVDs, loves the outdoors, his family, his geeky skill-set, and lives in rural Missouri, just a few miles from the Big Muddy. Always ready to help others, he shares what he learns on multiple blogs, social sites, and more. With a background in preparedness and survival skills, training with county, state, and national organizations, and skills in all areas of media and on air experience in live radio and television, Rich is always thinking about the "big picture", when it comes to helping individuals and families prepare for life's little surprises. Since 1997, he has provided guidance, authentic government survival history, and commentary on why we all need to get ready for that fateful day in the future, when we have to get our hands dirty and step in to save the day. He is an award winning videographer (2005 Telly Award), has received state and national scholarly recognition (2006 New Century Scholar and All USA Academic Team), and is a natural with computers, technology, gadgets, small furry mammals, and anything on wheels. Rich likes making friends, solving problems, and creating solutions to everyday issues. He doesn't mind mixing things up, when there is a teaching moment ready to happen. As a constitutional conservative, he's staying quite busy these days. The SurvivalRing Radio Show at www.survivalringradio.com will be coming back SOON!

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Connect With Us at
Twitter Twitter | FaceBook Facebook | LinkedInLinkedIn | Quora Quora | Instagram Instagram | Pinterest Pinterest | Youtube Youtube | Tumblr Tumblr
SurvivalRing © 2018
Contact Us | Advertise | Terms of Use | GDPR | TradeMarks | Privacy | Fair Use | Sitemap | F.T.C
Social Media Disclosure | Earnings Disclaimer | Anti Spam Policy | D.M.C.A.
Site Design by Richard Fleetwood - Founder / Director of SurvivalRing.org
Copyright © 1997-2018 SurvivalRing.org/SurvivalRing Media - All Rights Reserved. -
SurvivalRing is the Trademark (TM) & Service Mark (SM) of all SurvivalRing Media Projects
THIS WEBSITE HOSTED BY SURVIVALRING.ORG - Comments Welcome!