nEWS AND views

Sheriff seeks help finding ‘sick individual’ who put Easter eggs holding porn, toilet paper inside mailboxes amid coronavirus crisis.
By Katie Rice, Orlando Sentinel  Courtesy www.OrlandoSentinel.com


4/6/20  Some Flagler County residents are concerned after finding plastic Easter eggs filled with porn, among other things, in their mailboxes, and the sheriff fears whoever delivered them could be spreading coronavirus instead of Easter cheer.


Reports of suspicious packages led Flagler County deputies to discover the eggs inside residents’ mailboxes.
Each mailbox contained a single egg filled with a fish-shaped cracker, one sheet of toilet paper, a packet of powdered drink mix and a crumpled paper featuring “pornographic images."


“The person who did this is not only a very sick individual but could actually be spreading COVID-19 by their actions," Sheriff Rick Staly said in a written statement.


FCSO is investigating, and deputies asked anyone with information on the incident or relevant footage from their home security system to call 386-313-4911 or email tips@flaglersheriff.com and mention case number 2020-32323.


Florida man exposes himself to Apopka middle schoolers during online math class.
By K.C. Wildmoon  Courtesy WKMG News 6  and  www.CrimeOnline.com


4/5/20  A Florida man “Zoom-bombed” a middle school math class in Orange County, Florida, last week, and exposed himself to the students.
The Apopka Police Department is investigating but has not yet determined who the intruder was who interrupted the Wolf Lake Middle School virtual class.
Alexis Neely told News 6 her 14-year-old son was in the online classroom when the incident took place.


He told me that when they were in class, all of a sudden, a man came on the screen who was naked and had exposed himself to all the kids,” Neely said.
In a memo sent to parents, Principal Cynthia Haupt said school administration “handled the situation” but did not offer any details.


As the coronavirus pandemic spreads and schools are closed down, many classrooms have gone virtual. But with that technological step comes some difficulties.
As CrimeOnline previously reported, federal authorities have been warning about security weaknesses in the popular video conferencing app Zoom that allows such “Zoom-bombing” to take place. Both the company and law enforcement officials have provided suggestions for tightening security, including using the “waiting room” feature and requiring a password to enter a virtual meeting.


News 6 looked into other school systems in Florida to see how they were handling online instruction. Most were using a different app to provide instruction, but at least one — Brevard County public schools — said they asked teachers not to do live video sessions.

Parent's Guide To Gangs

Courtesy Florida Gang Investigators Association  www.FGIA.org


WARNING SIGNS

You should be concerned if your child:
Admits to gang involvement; is obsessed with one particular color of clothing or shows a desire for a particular logo over and over;
Wears sagging pants (this in and of itself is not indicative of gang activity);
Wears excessive jewelry with distinctive designs and may wear it only on either the right or left side of the body;
Is obsessed with gangster-influenced music, videos and movies to the point of imitation;
Withdraws from family with an accompanying change in demeanor;
Associates with undesirable and breaks parental rules consistently;
Develops an unusual desire for privacy and secrecy and may completely rearrange living quarters to create privacy;
Uses hand signs while with friends and practices them at home;

Or there is evidence of the appearance of:

* Physical injury (such as being beaten) and then child lies about the events surrounding the injury:
* Peculiar drawings or language on school books (may appear later as tattoos or brands);
* Unexplained cash or goods, i.e., clothing or jewelry;
* Possible use of alcohol and drugs with attitude change.

ADVISE YOUR CHILDREN THEY SHOULD NOT:

Associate with any gang members or “wannabe / gonnabe” gang members; identify or communicate with gangs; hang out near or where gangs congregate; approach strangers in cars who appear to want information or directions; wear gang related clothing where gangs are known to gather or traverse; wear initialed clothing such as BK – British Knights – a/k/a “Blood Killer” in high crime areas; use words like “crab” or “slob” (localized lingo may develop) anywhere gangs may be; i.e. malls, sporting events, etc.; attend any party or social event sponsored by gangs or their associates; take part in any graffiti activity or hang around where graffiti is present; or use any kind of finger or sign language in a public place.

​​F.B.I. Internet Crime Complaint Center :

Cyber Criminals Conduct Business Email Compromise through Exploitation of Cloud-Based Email Services, Costing US Businesses More Than $2 Billion 


Cyber criminals are targeting organizations that use popular cloud-based email services to conduct Business Email Compromise (BEC) scams. The scams are initiated through specifically developed phish kits designed to mimic the cloud-based email services in order to compromise business email accounts and request or misdirect transfers of funds. Between January 2014 and October 2019, the Internet Crime Complaint Center (IC3) received complaints totaling more than $2.1 billion in actual losses from BEC scams using two popular cloud-based email services. While most cloud-based email services have security features that can help prevent BEC, many of these features must be manually configured and enabled. Users can better protect themselves from BEC by taking advantage of the full spectrum of protections that are available.

DEFINITIONS

Cloud-based email services are hosted subscription services that enable users to conduct business via tools such as email, shared calendars, online file storage, and instant messaging.

Business Email Compromise is a sophisticated scam targeting businesses that perform electronic payments such as wire or automated clearing house transfers. The scam is frequently carried out when a subject compromises legitimate business email accounts through social engineering or computer intrusion techniques resulting in an unauthorized transfer of funds.

BACKGROUND

Over the last decade, organizations have increasingly moved from on-site email systems to cloud-based email services. Losses from BEC scams overall have increased every year since IC3 began tracking the scam in 2013. BEC scams have been reported in all 50 states and in 177 countries. Small and medium-size organizations, or those with limited IT resources, are most vulnerable to BEC scams because of the costs of robust cyber defense.

THREAT

There are a number of BEC scam variants. One of the most effective types is initiated through phishing emails designed to steal email account credentials. Cyber criminals use phishing kits that impersonate popular cloud-based email services. Many phishing kits identify the email service associated with each set of compromised credentials, allowing the cyber criminal to target victims using cloud-based services. Upon compromising victim email accounts, cyber criminals analyze the content of compromised email accounts for evidence of financial transactions. Often, the actors configure mailbox rules of a compromised account to delete key messages. They may also enable automatic forwarding to an outside email account.

Using the information gathered from compromised accounts, cyber criminals impersonate email communications between compromised businesses and third parties, such as vendors or customers, to request pending or future payments be redirected to fraudulent bank accounts. Cyber criminals frequently access the address books of compromised accounts as a means to identify new targets to send phishing emails. As a result, a successful email account compromise at one business can pivot to multiple victims within an industry.

Depending upon the provider, cloud-based email services may provide security features such as advanced phishing protection and multi-factor authentication that are either not enabled by default or are only available at additional cost.

RECOMMENDATIONS FOR END USERS

Enable multi-factor authentication for all email accounts.
Verify all payment changes and transactions in person or via a known telephone number.
Educate employees about BEC scams, including preventative strategies such as how to identify phishing emails and how to respond to suspected compromises.

RECOMMENDATIONS FOR IT ADMINISTRATORS

Prohibit automatic forwarding of email to external addresses.
Add an email banner to messages coming from outside your organization.
Prohibit legacy email protocols, such as POP, IMAP, and SMTP1, that can be used to circumvent multi-factor authentication.
Ensure changes to mailbox login and settings are logged and retained for at least 90 days.
Enable alerts for suspicious activity, such as foreign logins.
Enable security features that block malicious email, such as anti-phishing and anti-spoofing policies.
Configure Sender Policy Framework, Domain Keys, Identified Mail, and Domain-based Message Authentication Reporting and Conformance to prevent spoofing and validate email. Disable legacy account authentication.

WHAT TO DO IF YOU ARE A VICTIM

If you discover unauthorized payments, contact your financial institution immediately to request recall of the funds. Report attempted or actual fraudulent financial transfers to the Internet Crime Complaint Center at www.ic3.gov or to your local FBI field office, which can be found at www.fbi.gov/contact-us/field. The FBI may be able to assist financial institutions in the recovery of lost funds.ach year, millions of elderly Americans fall victim to some type of financial fraud, racking up more than $3 billion in losses annually. Criminals use a variety of methods to deceive these victims, including romance, sweepstakes, charity, technology support, grandparent, lottery, and government impersonation schemes, to name a few. In each case, perpetrators try to gain their targets’ trust and may communicate with victims via computer, through the mail, in person, and by phone, TV, and radio. With the elderly population growing in the United States, it is likely perpetrators will find more and more victims.