Tuesday, September 07, 2004

Those Nasty 900 Numbers

According to CRTC rulings, Bell Canada cannot suspend or terminate local telephone service for failure to make payment of disputed long distance telephone charges as long as the customer makes payment of the legitimate local charges due and owing.

I just learned this, or I would not have paid Ma Bell for the following incident.

Back in December of 2001, I took in a neighbouring family with five children (including a newborn) that had been evicted from the house next door, as the shelters were full and I was one of the local churchworkers. Their son ran up a bunch of 900 calls from my phone to a sex line, all very brief in duration, while the adults were out of the room.

Later, when the bill arrived and the family were safely tucked away in Family Residence, I phoned up Bell and complained about these charges, because it was so obvious they were prank calls and nothing like my typical bills.

The rep told me that Bell refused to release anyone from this type of debt, saying they would have to cut off my service if I did not pay this bill of close to $400(and the kid's family certainly couldn't). She said she was sorry, but I was responsible for what other people did while they were in my home, and she did not wish to discuss any possibility of the charges being transferred to their account (unpaid).

She went on to tell me that Bell Canada had a reciprocal agreement with phone companies in other countries to pay for 900 charges, because there were no laws being broken in Canada, and that would apply to phone calls placed while using an internet connection as well.

She suggested I request a block on my phone line, and I asked why I had never been told about this before, and she said Bell did not advertise the service, but it was in place if I wanted to phone the Bell office and request it (she was unable to do this for me).

So be wary! If you have teens coming into the house, have that block put on. Another good reason is, if you have a dial-up connection, and one of those nasty little pop-up ads come on (phone sex, talk to a psychic, etc.) and you click the wrong button, you may wind up with a $350 charge on your phone bill for a call to Denmark that you never knew you made (or the 7-year old trying to play on PBS Kids). And then, you would have to fight it.

At least you know the CRTC's stand on the situation to help you if you have to fight Bell Canada.

Saturday, September 04, 2004

Computer Security Plan

It's a good idea to have a plan for protecting your computer's security. Here is the thinking behind mine.

Email Accounts

I use a public account at Mail.com, where I have my lifetime email address (name@email.com). But I pay an annual feel to have all the mail sent there routed to my ISP (Internet Service Provider) email address, which very few people know. This way, I can automatically set up filters against email addresses I don't want contacting me, before their email has a chance to get near my machine.

So email to Sherry_Smith@mail.com could be routed to totallycool1978@cogeco.com without anyone every knowing her private email address.

Keep other public addresses (FunAngel@hotmail.com) for use when you have to have contact with people you don't know personally or internet friends, and Sherry_Smith@mail.com for people you do know or trust to a fair extent. That way, when you read your personal email, you will recognize spam more easily, and of course,

NEVER OPEN ATTACHMENTS IF YOU DON'T KNOW WHO IS SENDING THEM! Even then, be wise...do you need to read every attachment you get (I used to receive pictures of nearly naked men until I got it through the sender's head that I really did not like strange beefcake!)

Get A Firewall

If you don't have one, make a folder and call it 'Downloads'. Go to Download.com and get a free personal version of Sygate Personal Firewall. When it is installed, it will ask you permission for each program attempting to connect to the internet. Say 'no' if you don't recognize a program, and see what happens. You may find some spyware is running from your machine this way, and you may have to allow these programs for other programs to run.

Get A Spyware Stopper

Now go back to Download.com and download LavaSoft's AdAware. This program will get rid of all the spyware that has been loaded on to your machine, unbeknownst to you! You have to run this at least once a week if you surf the Web, and after downloading and installing any new programs. Some freebies won't work without these components, but there are some that will download reroutes to casino sites, put sites into your links you don't want children clicking on, and even download animated couples coupling when you open your browser. (No thanks...I just had an orange...)

Get AntiVirus

If you really cannot affort a big-name anti-virus package like Norton, there are two excellent free services, covered by people who understand the need for keeping the internet virus-free as possible. Go back to Download.com and download AVG AntiVirus or Avast! AntiVirus. My preference is Avast! That having been said, if your computer ever acts strange when you boot it, but you don't receive an immediate update from its database, close your computer and wait a day.

This could simply mean a new virus is loose and they need a little more time to create the patch that will find and fix it before it does any damage to your PC. Trust me, this is much better than getting a virus like the My Doom that came out last January. I had to reformat my hard drive, and having to do that is not easy for non-techies, and is time-consuming.

Make Backups!

At some point in your life, you will probably have to have your hard drive reformatted. This is a pain, but sometimes necessary. What makes this easier is good backups. I back up my accounting program frequently. Every six months, I burn two CDs. One is all the programs I use (including the download file), and another is all my documents. If you burn a lot of music, you may want to make a third.

In one of those documents should be all the registration numbers and instructions for registration when I re-register the progams after reinstalling them. You can create such a document in Word, NotePad, or Excel. If you don't do this on your PC, keep this information handy in a notebook designated for this (and all computer notations you want to keep...like this post!

Plan on two days' worth of work if you have to reformat the hard drive (search Google for instructions) or between $45 and $100 to have a reputable computer store do it for you. Have your CDs handy, and reinstall your programs in the sequence of importance (operating system, firewall, antivirus, email programs, etc.).

If you don't have a CD burner on your machine, you won't be able to reinstall your programs this way, so the site addresses and registration numbers will come in very handy. If you have to take your machine into the shop, take all your installation disks with you so the techie there can reinstall your programs for you.

And back-up your document files onto diskettes.

If you need further help try using Google's search engine. There are many sites that offer detailed step-by-step instructions for working your way through problems.

If You Suspect You Are Being Hacked...

My best friend was hacked about a year before I was. We never knew who hacked into her computer, but it made her life hell. When I was hacked, it was by someone I knew who was a software engineer.

The first thing I noticed was my email started disappearing. My daily email went from close to 100 emails a day to maybe four. I knew something was up, but had no idea how to know for sure. Then came the day I received nothing. I phoned my ISP (by then my utilities had been cancelled) and learned my username and password had been changed by someone using my credit card number and date of birth as proof as to who I was. I then arranged a security code to be put on the file for me to use, should this ever happen again.

It's very important if you find yourself in this type of 'dispute'(because third party companies don't want to be involved, though the technical support people can be very supporitive and helpful), that you have your accounts given a security word or code anyone presenting themselves as you must have to change important information on credit cards, bank accounts, or anything else that, were they to be tampered with, could make your life unbearable.

And get a new credit card! One relative was shocked to find her credit card was maxed to the limit after she had left her husband, who then made extensive purchases over the internet (we are still wondering what he did with all that make-up!).

After learning what was going on in my case, I did a search in Google and found some people who were very helpful. They told me to get a firewall and gave me a few tips on how to use it, and to use screenshots, which is making a picture of what you see on the screen, and saving it as a visual document. You may need screenshots down the road as evidence, so save each one by its date. Don't ignore this advice, because if things get bad, you will need the evidence; without it, no-one will be able to help. If it turns out your screenshots won't be needed, you can always delete the files in a couple of years.

The next thing to happen was, my files at my office disappeared, but I was too unaccomplished to do much about that except inform the other staff about what was happening and try and get security tightened up. At home, however, my new firewall sent out an alarm that NetBus was trying to contact the internet.

NetBus

I'd heard of NetBus, so quickly did a search on Google and found out it was one of several very bad Trojan spy programs that could be operated by a remote user, who could run mine as if he were sitting at my keyboard, giving him the power to read everything I typed, delete programs, or rearrange the code in the operating system. (My hacker rearranged my hardware connections to strange ports, and later did bad things to the code in my operating system. The technician who spent hours saving a couple of databases for me said he had never seen anything like it in his life.)

I printed out instructions to get NetBus off my machine, taking screenshots of the file locations. The hacker's name was right there, which I did not understand at the time, but I learned that any files downloaded onto your computer by another computer will show the originating computer's name. Another reason why screenshots are important.

The logs in the firewall showed his computer's number (each computer has its very own identity). This number also shows up in the full headers of any email sent from his machine, unless he knows how to forge email addresses. Fortunately I had the numbers from his machine at his home as well as from his work. With these as evidence, and the screenshots, I was able to go to the police.

As I understand it, in Canada there is no law against 'domestic' hacking (i.e., your spouse's computer) from a personally-owned computer. In my case, the police were very concerned when they saw the piles of screenshots and read the stuff he had sent me, and because he had done this from his work, they were able to contact his corporation and inform them that one of their computers was involved in a criminal investigation. Within 24 hours he was laid off. The police also had me get a program that would back-trace suspicious activity, and that wound up being a big help. He tried hacking me again from his next place of work a couple of months later, and lost that job within two days of my forwarding the new screenshots to the detective on the case.

Since then, I have learned how to better protect myself without becoming paranoid.

I find it's worth it to pay a public account provider to forward my emails to my ISP's email account. That way, I have front-line filters in place to screen out senders I don't want contacting me; sadly, that may include people we knew in common who refused to believe what he was doing, and who continued to send out group emails with my address on them. Which raises another point.

Group Emails

If you send out emails to a group, use the BCC line for this, not the TO line, so that each person receives the email without seeing everyone else's email address. Not only does this ensure some privacy, but if someone replies back to you in a personal fashion, you will be ensured that no-one else will receive their reply. I had a good friend who hit the 'reply' button to someone who'd sent out a group mailing in which some employment issue was raised...she was looking for another job, and everyone in the group, including her boss, got the reply!!!

If you see you are on such a group, ask the sender to either use BCC for group mailings or to simply take you off their list, as you will only accept private emails from them. Because my hacker was such a seemingly harmless and quiet guy, some of our acquaintance would not believe all this was happening, and would not honour my request. I felt badly having to terminate communications with them, but my safety was far more important.

Filters

I now use filters on my computer, both in my email program and in my firewall. You can set up your firewall filters to block out specific computer numbers (found in the full headers of incoming email) as well as ranges. When spam does make it through to my machine, I go to ARIN WHOIS on the net, enter the number of the originating computer, find out the owners and range numbers of the spammers, and block those numbers in the firewall's rules. This prevents bad people using space on the computer to do bad things in cyberspace.

Public Accounts

If you must use HotMail or Yahoo, don't use your real name. Think of something arcane, something your hacker would never guess to search under. For example, if you've fallen in love with Thai noodle salad since your last personal contact with them, set up a new account at hotmail (or wherever) and try ColdNoodles@hotmail.com, or something that cannot distinguish you from anyone else. Contact only those people you implicitly trust not to be in contact with the hacker (or is not being spied on themselves simply because they are in touch with you), and give them your new addy over the phone or in person. In time, the email you get at the old address will dwindle. If the hacker should find you, get another new address and repeat the process. The last time mine tried that I am absolutely sure of, was after I had sold the computer to some friends far away, almost two years after I had discovered NetBus running.

ISPs

Another thing you could do is get a new ISP, but if you don't, get a new address and user password every so often, and make sure they ask for that security word. If you are having your mail rerouted, you won't be losing any email so long as you don't forget to update the forwarding address. My hacker was smart, though, and got an account with my ISP, so they could do nothing, him being a client, saying it was my word against his. So I changed to another ISP (so did he), and eventually just sold my computer and stayed off line for a while. Currently I have an ISP that is not in his area, with better policies regarding abuse. I chose a user name that would not show up on any searches under my name, and I changed the name on my new computer as well.
Psychology

It goes without saying that hackers are very smart, but they are code heads, kings of strange domains where only they can make and break the laws; their wars are with other code-heads when engaged in code battles. They may be so linear and literal in their thinking that typical relationships are unworkable. If a normal person doesn't like you, they just go away. These people are predators, highly intelligent stalkers, and if they are hacking against an individual, they are obsessive, and can't go away until they have won whatever the object of their game is.

Think of Ted Bundy, so charming and bright that no-one who knew him could believe he was the monster he was later proven to be. My hacker, like many computer geeks, was very convincing as to his harmlessness, and I had a hard time believing it myself, but the professionals involved were the first people to warn me as to how dangerous this situation was, because I was not the first person he had hurt or frightened. The sad part was that the support I received was almost all from police, legal professionals, and counsellors.

Sometimes it doesn't matter what friends and family think if bad things are happening to you and they aren't offering to help. Predators cut their prey away from the herd, to facilitate their attack, so it is no surprise to professionals when they alienate you from your family and friends. But the ultimate alienation is death. Many women in North America have died even while under the protection of restraining orders.

It is therefore up to you - your responsibility - to read the lay of the land, come to terms with the reality of the situation, and protect yourself.

Lethal Spam

As you are probably aware, a lot of what is happening on the Web these days is terrorism, and a lot of other stuff is just plain criminal activity (see What Is Phishing? below). You need to protect yourself, and this posting will help newbies learn how. Schedule some time to set this up, the first time you do it, and plan to visit the site regularly in future.

First disable pop-up ads! If your browser doesn't do this already, I suggest you download MyIE2 and use its pop-up blocker.

If you are on a dial-up conection, you will also need to request your telephone provider to put a block on all 900 numbers from your phone line. (This is a free service the phone companies do not tell you about until you've been burned. I only learned about it after a young visitor phoned a Carribbean sex line six times from another room while I was making his mum a coffee. That generated over $300, so you can see why the phone companies do nothing to help except offer the service to those who phone in their complaints!)

Regardless of having teens in your house, if you hit the wrong button trying to get rid of a 'click here' pop-up ad on your PC, your next phone bill may have a $350 U.S. phone charge for a call you never made, to a 900 number in Europe. Because Ma Bell honours her contracts with the phone companies of other countries, they kindly take your money to pay the overseas phone company, regardless of the fact some criminal activity has taken place - you will just have to take it up with Denmark's phone provider, while their client may not have broken any laws in Denmark...now you understand why international crime works!

Go to http://www.codephish.info to learn the latest in scams, and use the information there to update your settings in your:

1) email program's filters
2) browser's site restrictions
3) firewall's advanced rules.

How To Update Your Settings

Let's take the example of the job seekers scam, which I'll walk you through.

Go to your browser's Options/Internet Options/Security and click on Restricted Sites. Add:

http://globalcareerforyou.com
http://pro-screen.de
207.44.162.138.

Go to your email program and select the filter settings. Add a block to anything with the following in the message headers:

@globalcareerforyou.com
@pro-screen.de

Open your firewall and go to advanced rules (or similar settings) blocking all ISP numbers in the following range, and describe it as Job Seekers Scam:

207.44.162.45-207.44.163.2

***What is Phishing?
Phishing attacks use 'spoofed' e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc. By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince up to 5% of recipients to respond to them.


For more information, visit http://www.antiphishing.org/

Scared of Cyber-Bullies?

Scared of Cyber-Bullies?
----------------------------------------------------------------------
This companion article to a CBS "Early Show" program describes
"how the Internet is a new tool for schoolyard bullies." Includes
related articles on bullying and interactive features on education
in the U.S., protecting children online, and cyber crime.


http://www.cbsnews.com/stories/2004/05/11/earlyshow/living/parenting/main616717.shtml