Thursday, July 31, 2014

Tor Says Someone Tried to Monitor Its Users



BOSTON Reuters - Tor, the Internet privacy protecting service, said on Wednesday it discovered a compromise on its network that indicated somebody was trying to monitor the activity of its users.

"While we don't know when they started doing the attack, users who operated or accessed hidden services from early February through July 4 should assume they were affected," Tor said in a blog entry.

Tor is an anonymity tool designed to protect the identity of Internet users by routing traffic through multiple nodes around the globe. It is used by human rights activists, criminals and others looking to evade surveillance.

Tor Says Someone Tried to Monitor Its Users



BOSTON Reuters - Tor, the Internet privacy protecting service, said on Wednesday it discovered a compromise on its network that indicated somebody was trying to monitor the activity of its users.

"While we don't know when they started doing the attack, users who operated or accessed hidden services from early February through July 4 should assume they were affected," Tor said in a blog entry.

Tor is an anonymity tool designed to protect the identity of Internet users by routing traffic through multiple nodes around the globe. It is used by human rights activists, criminals and others looking to evade surveillance.

Wednesday, July 30, 2014

Husband and Wife Arrested on Federal Fraud Charges



GREENSBORO, NC—Sandy and Casey Parsons were arrested today on a federal criminal indictment charging them with fraud, announced Ripley Rand, United States Attorney for the Middle District of North Carolina. The 76-count criminal indictment was unsealed today following the couple’s arrest by FBI and IRS-CI agents in Fayetteville, N.C.

The indictment alleges that, from February 2010 to August 2013, Sandy Parsons, 40, and Casey Parsons, 39, committed tax fraud, mail fraud, theft of government funds, and identity theft, and engaged in a conspiracy to defraud the government. The indictment alleges that the Parsons received government funded adoption assistance, Medicaid, Social Security, and Food and Nutrition Services benefits for a dependent that did not live with them and used the mail to commit the fraud. The indictment also alleges that Casey Parsons fraudulently used the identities of other persons as dependents and used other false information when preparing federal tax returns.

Sandy and Casey Parsons are charged with one count of conspiracy to defraud the government, which carries a maximum sentence of five years in prison and a $250,000 fine; twenty counts of theft of government funds, each of which carries a maximum sentence of five years in prison and a $250,000 fine; and twenty counts of mail fraud, each of which carries a maximum sentence of twenty years in prison and a $250,000 fine.

The indictment also charges Sandy Parsons with one count of aggravated identity theft, which carries a mandatory sentence of two years, consecutive to any other sentence, and a $250,000 fine; and one count of false statement to a government agency, which carries a maximum sentence of two years in prison and a $250,000 fine.

Casey Parsons is also charged with one count of false pretense in a health care matter, which carries a maximum sentence of five years in prison and a $250,000 fine; two counts of Social Security fraud, each of which carries a maximum sentence of five years in prison and a $250,000 fine; fifteen counts of aggravated identity theft, each of which carries a mandatory sentence of two years, consecutive to any other sentence, and a $250,000 fine; two counts of false statement to a government agency, each of which carries a maximum sentence of five years in prison and a $250,000 fine; six counts of aiding in the preparation of a false tax return, each of which carries a maximum sentence of three years in prison and a $250,000 fine; six counts of wire fraud, each of which carries a maximum sentence of twenty years in prison and a $250,000 fine; and one count of making false claim against the government, which carries a maximum sentence of five years in prison and a $250,000 fine.

Husband and Wife Arrested on Federal Fraud Charges



GREENSBORO, NC—Sandy and Casey Parsons were arrested today on a federal criminal indictment charging them with fraud, announced Ripley Rand, United States Attorney for the Middle District of North Carolina. The 76-count criminal indictment was unsealed today following the couple’s arrest by FBI and IRS-CI agents in Fayetteville, N.C.

The indictment alleges that, from February 2010 to August 2013, Sandy Parsons, 40, and Casey Parsons, 39, committed tax fraud, mail fraud, theft of government funds, and identity theft, and engaged in a conspiracy to defraud the government. The indictment alleges that the Parsons received government funded adoption assistance, Medicaid, Social Security, and Food and Nutrition Services benefits for a dependent that did not live with them and used the mail to commit the fraud. The indictment also alleges that Casey Parsons fraudulently used the identities of other persons as dependents and used other false information when preparing federal tax returns.

Sandy and Casey Parsons are charged with one count of conspiracy to defraud the government, which carries a maximum sentence of five years in prison and a $250,000 fine; twenty counts of theft of government funds, each of which carries a maximum sentence of five years in prison and a $250,000 fine; and twenty counts of mail fraud, each of which carries a maximum sentence of twenty years in prison and a $250,000 fine.

The indictment also charges Sandy Parsons with one count of aggravated identity theft, which carries a mandatory sentence of two years, consecutive to any other sentence, and a $250,000 fine; and one count of false statement to a government agency, which carries a maximum sentence of two years in prison and a $250,000 fine.

Casey Parsons is also charged with one count of false pretense in a health care matter, which carries a maximum sentence of five years in prison and a $250,000 fine; two counts of Social Security fraud, each of which carries a maximum sentence of five years in prison and a $250,000 fine; fifteen counts of aggravated identity theft, each of which carries a mandatory sentence of two years, consecutive to any other sentence, and a $250,000 fine; two counts of false statement to a government agency, each of which carries a maximum sentence of five years in prison and a $250,000 fine; six counts of aiding in the preparation of a false tax return, each of which carries a maximum sentence of three years in prison and a $250,000 fine; six counts of wire fraud, each of which carries a maximum sentence of twenty years in prison and a $250,000 fine; and one count of making false claim against the government, which carries a maximum sentence of five years in prison and a $250,000 fine.

Tuesday, July 22, 2014

Congress may remove safeguards protecting seniors from fraud



BY JOE SESTAK JoeSestak.com

JOHNSTOWN — A scam artist stops by your 92-year-old neighbor’s home and repeatedly convinces her to give him $200 on each visit for a “can’t lose” investment. Hearing about it, the local police persuade the scammer to end his fraudulent behavior, but then the city council orders the police to stop their interference with “free market” decisions. True?

Yes. Congress is about to vote on terminating a successful Department of Justice (DOJ) task force known as Operation Choke Point that protects our seniors from comparable financial fraud conducted on a national scale by a number of banks complicit with fraudsters.

Elder abuse – financial, physical and emotional – has been called the crime of the 21st century, an epidemic that is expanding at an alarming rate in Pennsylvania. With the second-highest percentage of seniors among states, the elderly Pennsylvanian who recently had $85,000 drained from his bank accounts as he slipped into dementia is far from an isolated incident.

I saw it in my district as a congressman when Wachovia Bank allowed fraudulent telemarketers to knowingly use the bank’s accounts to steal millions of dollars from elderly victims throughout Pennsylvania; a number of them were my constituents.

A civil court ordered Wachovia to provide restitution to the victims, but such bank-abetted fraud steals $3 billion a year from seniors.

Most banks are on the alert for such fraud, but Operation Choke Point was finally set up last year to crack down on senior financial abuse because there are those who abet billions of dollars of harm to vulnerable seniors.

Congress may remove safeguards protecting seniors from fraud



BY JOE SESTAK JoeSestak.com

JOHNSTOWN — A scam artist stops by your 92-year-old neighbor’s home and repeatedly convinces her to give him $200 on each visit for a “can’t lose” investment. Hearing about it, the local police persuade the scammer to end his fraudulent behavior, but then the city council orders the police to stop their interference with “free market” decisions. True?

Yes. Congress is about to vote on terminating a successful Department of Justice (DOJ) task force known as Operation Choke Point that protects our seniors from comparable financial fraud conducted on a national scale by a number of banks complicit with fraudsters.

Elder abuse – financial, physical and emotional – has been called the crime of the 21st century, an epidemic that is expanding at an alarming rate in Pennsylvania. With the second-highest percentage of seniors among states, the elderly Pennsylvanian who recently had $85,000 drained from his bank accounts as he slipped into dementia is far from an isolated incident.

I saw it in my district as a congressman when Wachovia Bank allowed fraudulent telemarketers to knowingly use the bank’s accounts to steal millions of dollars from elderly victims throughout Pennsylvania; a number of them were my constituents.

A civil court ordered Wachovia to provide restitution to the victims, but such bank-abetted fraud steals $3 billion a year from seniors.

Most banks are on the alert for such fraud, but Operation Choke Point was finally set up last year to crack down on senior financial abuse because there are those who abet billions of dollars of harm to vulnerable seniors.

Top 5 Cyber-Security, Fraud And War Predictions



The Fraud Institute® Releases Free Report : Top 5 Cyber-Security, Fraud And War Predictions by Anyck Turgeon

Premier security expert, M-CAT Enterprises CEO Anyck Turgeon, is recognized as a practitioner and victor over fraud, security and money laundering crimes. In a candid interview, Turgeon offers five cyber predictions about upcoming fraud technologies and security practices, evidentiary developments, exchanges, profiling and cyber-wars.

Austin, Texas USA, United States - July 21, 2014

/PressCable/ — The Fraud Institute released their free report today: Top 5 Cyber-Security, Fraud And War Predictions by Anyck Turgeon. This report reveals how cyber-fraud, security and war threats are uprising globally and affecting all of us. As corporations and governments to end-consumers are facing theft, freeze, seizure and redistribution of their hard-earned assets, Turgeon offers a refreshing and succint set of distinct solutions in five areas.

The Fraud institute owner explains: “for too long, people have been in the dark on the costs, problems and devastating impact of cyber-security, fraud And war challenges. In this report, Anyck Turgeon opens the curtains on the underground world and gives incredible insights to regular people they won’t find elsewhere.

Full Story and Source Here: http://www.digitaljournal.com/pr/2068439

Top 5 Cyber-Security, Fraud And War Predictions



The Fraud Institute® Releases Free Report : Top 5 Cyber-Security, Fraud And War Predictions by Anyck Turgeon

Premier security expert, M-CAT Enterprises CEO Anyck Turgeon, is recognized as a practitioner and victor over fraud, security and money laundering crimes. In a candid interview, Turgeon offers five cyber predictions about upcoming fraud technologies and security practices, evidentiary developments, exchanges, profiling and cyber-wars.

Austin, Texas USA, United States - July 21, 2014

/PressCable/ — The Fraud Institute released their free report today: Top 5 Cyber-Security, Fraud And War Predictions by Anyck Turgeon. This report reveals how cyber-fraud, security and war threats are uprising globally and affecting all of us. As corporations and governments to end-consumers are facing theft, freeze, seizure and redistribution of their hard-earned assets, Turgeon offers a refreshing and succint set of distinct solutions in five areas.

The Fraud institute owner explains: “for too long, people have been in the dark on the costs, problems and devastating impact of cyber-security, fraud And war challenges. In this report, Anyck Turgeon opens the curtains on the underground world and gives incredible insights to regular people they won’t find elsewhere.

Full Story and Source Here: http://www.digitaljournal.com/pr/2068439

Vulnerabilities in LZO and LZ4 compression libraries



Original release date: July 21, 2014

Recently disclosed vulnerabilities in the LZO and LZ4 compression libraries could allow remote code execution under certain circumstances. While these libraries are used by a large number of platforms and applications, not all programs may be vulnerable to exploitation.

US-CERT recommends that all developers who either implement or import the LZO or LZ4 libraries into their software check for susceptibility to CVE-2014-4608, CVE-2014-4715, and CVE-2014-4611.

Users and administrators should apply software security updates as they become available.

Vulnerabilities in LZO and LZ4 compression libraries



Original release date: July 21, 2014

Recently disclosed vulnerabilities in the LZO and LZ4 compression libraries could allow remote code execution under certain circumstances. While these libraries are used by a large number of platforms and applications, not all programs may be vulnerable to exploitation.

US-CERT recommends that all developers who either implement or import the LZO or LZ4 libraries into their software check for susceptibility to CVE-2014-4608, CVE-2014-4715, and CVE-2014-4611.

Users and administrators should apply software security updates as they become available.

Friday, July 18, 2014

Republicans to Justice Dept.: Stop targeting legal businesses in ‘Operation Choke Point’



House Republicans are ratcheting up pressure on the Justice Department to end a federal investigation into consumer fraud that they claim is forcing banks to close the accounts of gun dealers, payday lenders and other legal businesses.

Republicans held two hearings this week on the legality of “Operation Choke Point,” a probe into whether banks and payment firms are enabling merchants to illegally withdraw money from consumer accounts to boost their own take from processing fees.

Prosecutors are focusing on activities, such as Internet gambling and small-dollar lending, that regulators say have high rates of complaints from customers about money being taken out of their accounts without their permission, an indication of fraud. Since 2012, the Justice Department has launched at least 15 criminal and civil investigations and has issued 50 subpoenas to banks and payment firms.

Critics of the operation have painted it as an attempt by the Obama administration to shut down legitimate businesses that it deems undesirable.

“There is an unacceptable level of collateral damage,” Rep. Bob Goodlatte (R-Va.) said at a House Judiciary hearing on Thursday. “There appears to be a disconnect between statements from top officials and what is happening in practice.”


He said the committee has received reports of banks severing relationships with law-abiding customers whose business activities are considered high risk by regulators. Goodlatte said he suspects that banks are responding to pressure from regulators who are acting in concert with the Justice Department.

Republicans to Justice Dept.: Stop targeting legal businesses in ‘Operation Choke Point’



House Republicans are ratcheting up pressure on the Justice Department to end a federal investigation into consumer fraud that they claim is forcing banks to close the accounts of gun dealers, payday lenders and other legal businesses.

Republicans held two hearings this week on the legality of “Operation Choke Point,” a probe into whether banks and payment firms are enabling merchants to illegally withdraw money from consumer accounts to boost their own take from processing fees.

Prosecutors are focusing on activities, such as Internet gambling and small-dollar lending, that regulators say have high rates of complaints from customers about money being taken out of their accounts without their permission, an indication of fraud. Since 2012, the Justice Department has launched at least 15 criminal and civil investigations and has issued 50 subpoenas to banks and payment firms.

Critics of the operation have painted it as an attempt by the Obama administration to shut down legitimate businesses that it deems undesirable.

“There is an unacceptable level of collateral damage,” Rep. Bob Goodlatte (R-Va.) said at a House Judiciary hearing on Thursday. “There appears to be a disconnect between statements from top officials and what is happening in practice.”


He said the committee has received reports of banks severing relationships with law-abiding customers whose business activities are considered high risk by regulators. Goodlatte said he suspects that banks are responding to pressure from regulators who are acting in concert with the Justice Department.

N.C. Bankers Association Offers Reward for Asheville Bank Robbery



The Asheville Savings Bank at 5 Olde Eastwood Village Boulevard on U.S. Highway 74 East in Asheville was robbed at about 3:20 yesterday afternoon (July 17).

The North Carolina Bankers Association is offering a reward through its Robbery Reward Program for information leading to the arrest and indictment of any individuals who were involved. Anyone with information concerning the robbery should contact the FBI, confidentially and toll-free, at 800-209-2293 or submit a tip through the https://bankrobbers.fbi.gov website.

N.C. Bankers Association Offers Reward for Asheville Bank Robbery



The Asheville Savings Bank at 5 Olde Eastwood Village Boulevard on U.S. Highway 74 East in Asheville was robbed at about 3:20 yesterday afternoon (July 17).

The North Carolina Bankers Association is offering a reward through its Robbery Reward Program for information leading to the arrest and indictment of any individuals who were involved. Anyone with information concerning the robbery should contact the FBI, confidentially and toll-free, at 800-209-2293 or submit a tip through the https://bankrobbers.fbi.gov website.

Wednesday, July 16, 2014

Two Suspected Members of Credit Fraud Gang Arrested



Two alleged members of the credit card fraud gang that cost jewelers more than $1 million in losses have been arrested, according to the Jewelers’ Security Alliance.

The dual arrests came in separate incidents in Greensboro, N.C., and Houston after jewelers were alerted to the scam by JSA bulletins disseminated by the North Carolina Jewelers Association and Texas Jewelers Security Hotline.

In one instance, a retailer became suspicious of a customer and then saw his picture on the bulletin. After the suspect applied for a credit card, he was told that the company’s computers were down and left the store. The jeweler wrote down his license plate number, and the man was later arrested at another jewelry store.

Despite these arrests, JSA president John Kennedy advises jewelers to be on the lookout, noting that other gang members are still out there.

Two Suspected Members of Credit Fraud Gang Arrested



Two alleged members of the credit card fraud gang that cost jewelers more than $1 million in losses have been arrested, according to the Jewelers’ Security Alliance.

The dual arrests came in separate incidents in Greensboro, N.C., and Houston after jewelers were alerted to the scam by JSA bulletins disseminated by the North Carolina Jewelers Association and Texas Jewelers Security Hotline.

In one instance, a retailer became suspicious of a customer and then saw his picture on the bulletin. After the suspect applied for a credit card, he was told that the company’s computers were down and left the store. The jeweler wrote down his license plate number, and the man was later arrested at another jewelry store.

Despite these arrests, JSA president John Kennedy advises jewelers to be on the lookout, noting that other gang members are still out there.

Tuesday, July 15, 2014

New Kronos Banking Malware Advertised On Russian Forums



Criminals are advertising a new banking Trojan on Russian forums, one going for a hefty price and being marketed as a method of evading detection and analysis.

To date, however, security researchers have yet to obtain a sample of Kronos, which is available on a few forums for pre-order at a cost of $7,000.

Kronos does what most banking Trojans do: steals credentials and uses Web injects made for every major browser to modify legitimate banking websites. Once a user logs in, the web injects look for additional information from the victim, details that are generally not required upon log-in such as ATM PIN numbers or personal information to help with security questions.

New Kronos Banking Malware Advertised On Russian Forums



Criminals are advertising a new banking Trojan on Russian forums, one going for a hefty price and being marketed as a method of evading detection and analysis.

To date, however, security researchers have yet to obtain a sample of Kronos, which is available on a few forums for pre-order at a cost of $7,000.

Kronos does what most banking Trojans do: steals credentials and uses Web injects made for every major browser to modify legitimate banking websites. Once a user logs in, the web injects look for additional information from the victim, details that are generally not required upon log-in such as ATM PIN numbers or personal information to help with security questions.

Monday, July 14, 2014

New cyber fraud virus sparks police alert



Police are warning people to step up security to stop cyber fraudsters targeting their personal files, after attacks featuring a new computer virus.

The National Fraud Intelligence Bureau has recently received a number of reports relating to malicious software known as “Cryptowall”.

Cryptowall is a virus that can take over personal files such as images and documents once it has infected a computer. The virus can affect the computer through emails containing links or attachments, which once opened, will download the Cryptowall virus.

Once the malware scam has taken over a computer, a pop-up page will launch asking for a payment to receive an encryption key and for the software to be removed. However the encryption key is rarely given to the victim.

New cyber fraud virus sparks police alert



Police are warning people to step up security to stop cyber fraudsters targeting their personal files, after attacks featuring a new computer virus.

The National Fraud Intelligence Bureau has recently received a number of reports relating to malicious software known as “Cryptowall”.

Cryptowall is a virus that can take over personal files such as images and documents once it has infected a computer. The virus can affect the computer through emails containing links or attachments, which once opened, will download the Cryptowall virus.

Once the malware scam has taken over a computer, a pop-up page will launch asking for a payment to receive an encryption key and for the software to be removed. However the encryption key is rarely given to the victim.

Banking Malware Found on Google Play



San Francisco-based mobile security company Lookout disclosed last month it found a malware banking app in the official Google Play store. Called BankMirage, the app targeted customers of the Israeli financial institution Mizrahi Bank.

Curiously, the app harvested only user login names and apparently not passwords, according to a blog entry posted by Lookout security communication manager Meghan Kelly.

“It’s effectively a phishing attack,” Kelly wrote in her June 24 post.

BankMirage’s architecture was simple. The developer put a wrapper around the Bank Mizrahi app, nothing more; so, it masqueraded as the official Bank Mizrahi app.

“Once the user ID is stored the app returns a message to the user saying that the login failed and to, instead, reinstall the legitimate banking app from the Play Store,’ Kelly wrote.

Most mobile security experts have urged Android users to download apps only from Google Play and perhaps the Amazon Apps store, on the assumption that these tech behemoths effectively screen apps before putting them in front of users.

That advice remains valid, but as BankMirage illustrated, it is not guaranteed.


Banking Malware Found on Google Play



San Francisco-based mobile security company Lookout disclosed last month it found a malware banking app in the official Google Play store. Called BankMirage, the app targeted customers of the Israeli financial institution Mizrahi Bank.

Curiously, the app harvested only user login names and apparently not passwords, according to a blog entry posted by Lookout security communication manager Meghan Kelly.

“It’s effectively a phishing attack,” Kelly wrote in her June 24 post.

BankMirage’s architecture was simple. The developer put a wrapper around the Bank Mizrahi app, nothing more; so, it masqueraded as the official Bank Mizrahi app.

“Once the user ID is stored the app returns a message to the user saying that the login failed and to, instead, reinstall the legitimate banking app from the Play Store,’ Kelly wrote.

Most mobile security experts have urged Android users to download apps only from Google Play and perhaps the Amazon Apps store, on the assumption that these tech behemoths effectively screen apps before putting them in front of users.

That advice remains valid, but as BankMirage illustrated, it is not guaranteed.


Thursday, July 10, 2014

Source Technologies’ Latest MICR Printer Minimizes Risk of Fraud, Offers Significant Cost Saving



CHARLOTTE, N.C.--(Business Wire)--Source Technologies, a leading provider of integrated solutions for managing financial transactions and other secure business processes, announced the availability of its ST9717 magnetic ink character recognition (MICR) check printer – the company’s latest mid-level product under its ST9700 series of secure printers. The ST9717 is a desktop-class MICR printer designed for on-demand secure printing of checks and other negotiable documents, providing financial institutions and businesses with a level of security unrivaled in the industry.

The ST9717 features print speeds of up to 37 pages per minute, a first-time print rate of 6.5 seconds and duty cycle of up to 60,000 pages per month. While ideal for mid-size financial institutions and businesses with mid-level volumes, the printer offers the same MICR print quality and security features as Source Technologies’ high-volume printers and comes standard with USB, Parallel and Ethernet ports. The ST9717 also includes an 800 MHz processor, 256MB of standard memory, integrated duplex printing and 2.4-inch color display to keep information readily available.


Source and Full Story Here: http://www.digitaljournal.com/pr/2047068

Source Technologies’ Latest MICR Printer Minimizes Risk of Fraud, Offers Significant Cost Saving



CHARLOTTE, N.C.--(Business Wire)--Source Technologies, a leading provider of integrated solutions for managing financial transactions and other secure business processes, announced the availability of its ST9717 magnetic ink character recognition (MICR) check printer – the company’s latest mid-level product under its ST9700 series of secure printers. The ST9717 is a desktop-class MICR printer designed for on-demand secure printing of checks and other negotiable documents, providing financial institutions and businesses with a level of security unrivaled in the industry.

The ST9717 features print speeds of up to 37 pages per minute, a first-time print rate of 6.5 seconds and duty cycle of up to 60,000 pages per month. While ideal for mid-size financial institutions and businesses with mid-level volumes, the printer offers the same MICR print quality and security features as Source Technologies’ high-volume printers and comes standard with USB, Parallel and Ethernet ports. The ST9717 also includes an 800 MHz processor, 256MB of standard memory, integrated duplex printing and 2.4-inch color display to keep information readily available.


Source and Full Story Here: http://www.digitaljournal.com/pr/2047068

Microsoft Releases Security Advisory for Improperly Issued Digital Certificates



Microsoft has released a security advisory to address improperly issued SSL certificates that could be used in attempts to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. This issue affects all supported releases of Microsoft Windows.

Users and administrators are encouraged to review Microsoft Security Advisory 2982792 and apply the necessary updates.

Microsoft Releases Security Advisory for Improperly Issued Digital Certificates



Microsoft has released a security advisory to address improperly issued SSL certificates that could be used in attempts to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. This issue affects all supported releases of Microsoft Windows.

Users and administrators are encouraged to review Microsoft Security Advisory 2982792 and apply the necessary updates.

North Carolina Fugitive Wanted for Attempted Armed Robbery in Southeast Arrested



Putnam County Sheriff Donald B. Smith reports Tuesday that the man wanted on a parole violation warrant from North Carolina who is suspected of committing several violent felony crimes throughout Putnam County has been arrested.

Kenneth W. DeFreitas, 29, of Willmington, North Carolina, previously from Putnam Lake, is the suspect in multiple crimes over the past two months. His alleged crime spree includes two residential burglaries in Putnam Lake, an attempted armed robbery of the A&P food store in Southeast and an armed robbery of the Putnam County National Bank in Carmel.

North Carolina Fugitive Wanted for Attempted Armed Robbery in Southeast Arrested



Putnam County Sheriff Donald B. Smith reports Tuesday that the man wanted on a parole violation warrant from North Carolina who is suspected of committing several violent felony crimes throughout Putnam County has been arrested.

Kenneth W. DeFreitas, 29, of Willmington, North Carolina, previously from Putnam Lake, is the suspect in multiple crimes over the past two months. His alleged crime spree includes two residential burglaries in Putnam Lake, an attempted armed robbery of the A&P food store in Southeast and an armed robbery of the Putnam County National Bank in Carmel.

Tuesday, July 8, 2014

Putnam: Man charged in bank robbery, burglaries

A North Carolina man with ties to Putnam County has been arrested here for a bank robbery, the attempted robbery of a supermarket and two home burglaries, the sheriff's department said.

Kenneth DeFreitas, 29, also allegedly tried to grab the gun of an investigator while in custody, and is wanted in his home state on a on a parole violation.

According to a news release from the Putnam sheriff, DeFreitas' crime spree unfolded over the past two months. The home burglaries were both in Putnam Lake, where he had formerly lived, while the supermarket was the A&P store in Southeast. The bank robbery took place at the Putnam County National Bank in Carmel.

Investigators obtained an arrest warrant for DeFreitas, of Wilmington, North Carolina, in connection with the bank robbery and put out a nationwide bulletin about the case, the sheriff said. He was taken into custody July 3 in the Bronx and brought back to Putnam, where he was arraigned on the bank robbery charge, two counts of burglary and one count of attempted robbery.

Putnam: Man charged in bank robbery, burglaries

A North Carolina man with ties to Putnam County has been arrested here for a bank robbery, the attempted robbery of a supermarket and two home burglaries, the sheriff's department said.

Kenneth DeFreitas, 29, also allegedly tried to grab the gun of an investigator while in custody, and is wanted in his home state on a on a parole violation.

According to a news release from the Putnam sheriff, DeFreitas' crime spree unfolded over the past two months. The home burglaries were both in Putnam Lake, where he had formerly lived, while the supermarket was the A&P store in Southeast. The bank robbery took place at the Putnam County National Bank in Carmel.

Investigators obtained an arrest warrant for DeFreitas, of Wilmington, North Carolina, in connection with the bank robbery and put out a nationwide bulletin about the case, the sheriff said. He was taken into custody July 3 in the Bronx and brought back to Putnam, where he was arraigned on the bank robbery charge, two counts of burglary and one count of attempted robbery.

Microsoft Releases July 2014 Security Bulletin



National Cyber Awareness System:
Microsoft Releases July 2014 Security Bulletin
07/08/2014 02:46 PM EDT

Original release date: July 08, 2014


Microsoft has released updates to address vulnerabilities in Windows, Internet Explorer, and Microsoft Service Bus for Windows Server as part of the Microsoft Security Bulletin Summary for July 2014. Some of these vulnerabilities could allow remote code execution, elevation of privilege, or denial of service.

US-CERT encourages users and administrators to review the bulletin and apply the necessary updates.

Microsoft Releases July 2014 Security Bulletin



National Cyber Awareness System:
Microsoft Releases July 2014 Security Bulletin
07/08/2014 02:46 PM EDT

Original release date: July 08, 2014


Microsoft has released updates to address vulnerabilities in Windows, Internet Explorer, and Microsoft Service Bus for Windows Server as part of the Microsoft Security Bulletin Summary for July 2014. Some of these vulnerabilities could allow remote code execution, elevation of privilege, or denial of service.

US-CERT encourages users and administrators to review the bulletin and apply the necessary updates.

Monday, July 7, 2014

Robber's wig falls off during credit union heist in Wilson

WILSON, N.C. — Investigators are searching for an armed man whose wig disguise fell off as he robbed a State Employees Credit Union in Wilson on Monday morning.

Wilson police said the man walked into the credit union on Ward Boulevard at 10:45 a.m., displayed a weapon and demanded money. He was last seen on a bicycle behind the building.


Robber's wig falls off during credit union heist in Wilson

WILSON, N.C. — Investigators are searching for an armed man whose wig disguise fell off as he robbed a State Employees Credit Union in Wilson on Monday morning.

Wilson police said the man walked into the credit union on Ward Boulevard at 10:45 a.m., displayed a weapon and demanded money. He was last seen on a bicycle behind the building.


Wilson NC, SECU Robbed.



The SECU on 3990 Ward Blvd. was just robbed in Wilson around 11:00am. I will post more information as I get it.

Wilson NC, SECU Robbed.



The SECU on 3990 Ward Blvd. was just robbed in Wilson around 11:00am. I will post more information as I get it.

Tuesday, July 1, 2014

Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches



As digital technology transforms 21st century life, questions about privacy rights abound. The U.S. Supreme Court ruled on one such question in late June: if you are arrested, can the police search your cell phone without first obtaining a warrant?

No, according to the June 25, 2014, ruling in Riley v California. In considering the question, the court had to mesh established policy on search warrants together with an understanding of cell phone technology.

To help with that challenge, the justices turned to a variety of sources, among them the NIST Guidelines on Mobile Device Forensics. The unanimous court opinion, written by Chief Justice John Roberts, cites this document three times.

The ruling focuses on two separate cases in which police arrested suspects and searched their cell phones without first obtaining a search warrant. In both cases, state and federal prosecutors argued that the searches were justified to prevent the suspects from destroying evidence. Courts have long allowed that police can search an area within the suspect's immediate reach without a warrant.


Supreme Court Cites NIST Mobile Forensics Guide in Ruling on Cell Phone Searches



As digital technology transforms 21st century life, questions about privacy rights abound. The U.S. Supreme Court ruled on one such question in late June: if you are arrested, can the police search your cell phone without first obtaining a warrant?

No, according to the June 25, 2014, ruling in Riley v California. In considering the question, the court had to mesh established policy on search warrants together with an understanding of cell phone technology.

To help with that challenge, the justices turned to a variety of sources, among them the NIST Guidelines on Mobile Device Forensics. The unanimous court opinion, written by Chief Justice John Roberts, cites this document three times.

The ruling focuses on two separate cases in which police arrested suspects and searched their cell phones without first obtaining a search warrant. In both cases, state and federal prosecutors argued that the searches were justified to prevent the suspects from destroying evidence. Courts have long allowed that police can search an area within the suspect's immediate reach without a warrant.


Apple Releases Security Updates for OS X, Safari, iOS devices, and Apple TV



07/01/2014 10:49 AM EDT

Original release date: July 01, 2014


Apple has released security updates for Mac OS X, Safari, iOS devices, and Apple TV to address multiple vulnerabilities, some of which could allow attackers to execute arbitrary code with system privileges or cause an unexpected application termination.

Updates available include:
Security Update 2014-003 for OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, and OS X Mavericks 10.9 to 10.9.3.
Safari 6.1.5 and Safari 7.0.5 for OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, and OS X Mavericks v10.9.3.
iOS 7.1.2 for iPhone 4 and later, iPod touch 5th generation and later, or iPad 2 and later.
Apple TV 6.2 for Apple TV 2nd generation and later.

Users and administrators are encouraged to review Apple security updates HT6293, HT6296, HT6297, and HT6298, and apply the necessary updates to help mitigate these risks.

Apple Releases Security Updates for OS X, Safari, iOS devices, and Apple TV



07/01/2014 10:49 AM EDT

Original release date: July 01, 2014


Apple has released security updates for Mac OS X, Safari, iOS devices, and Apple TV to address multiple vulnerabilities, some of which could allow attackers to execute arbitrary code with system privileges or cause an unexpected application termination.

Updates available include:
Security Update 2014-003 for OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, and OS X Mavericks 10.9 to 10.9.3.
Safari 6.1.5 and Safari 7.0.5 for OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, and OS X Mavericks v10.9.3.
iOS 7.1.2 for iPhone 4 and later, iPod touch 5th generation and later, or iPad 2 and later.
Apple TV 6.2 for Apple TV 2nd generation and later.

Users and administrators are encouraged to review Apple security updates HT6293, HT6296, HT6297, and HT6298, and apply the necessary updates to help mitigate these risks.