Thursday, June 13, 2019

US Postal Service program " Informed Delivery" - Protect your address from mail theft

R. Coleman, PSCC, Pittsfield Twp. MI .,DPS, Crime Prevention observation of " Informed Delivery".

Over the last two weeks "Informed Delivery" has been in the news based on the ID Theft and the November 2018, report by the Secret Service of the arrest of seven (7) individuals in West Michigan involved with stealing ID information and creating credit cards to commit fraud.

It's reported that the individuals used Informed Delivery notification (digitally preview of mail online) for notification of the mail being delivered to the box before the homeowner retrieved their mail.

KrebsOnlineSecurity (https://krebsonsecurity.com/tag/informed-delivery/) has done extensive research on this issue .

While doing the research I went online to sign up to protect my address. There are several concerns I noticed on the site they ask for you to ID your self and respond to basic security questions that answers can be found on social media sites and for your personal "cell number" to verify that its you.

I wouldn't recommend  putting your cell number in this program, in the fine print they advise that they will sell it to 3rd party vendors which means unwanted calls to buy products or services. I opted for the hard copy to be mailed to my home with the code which came one week later.

Attached is one of several articles on this concern and there are others publish by cyber security experts that can be found online. I've also attached a link to the UPS website with details. I would recommend that homeowners speak with their local Post Master about this program but most of all "protect your address".

Scammers using USPS ‘Informed Delivery’ service to assist in Identity Theft and Fraud


 

By privacyrights.org

A little known service offered by the United States Postal Service (USPS) is helping criminals commit identity theft. USPS’s Informed Delivery service enables most residential postal customers to digitally preview their mail online on the morning of delivery.
Signing up for USPS’s Informed Delivery service requires providing your name, address and email. To validate your identity, you must answer four multiple-choice knowledge-based authentication (KBA) questions. Unfortunately, KBA is an unreliable method for authentication because the answers to many of these questions are available through data broker and social networking sites or from information leaked in data breaches. This provides an opportunity for criminals to create an account in your name.
According to an internal U.S. Secret Service Alert, Informed Delivery is being used by criminals “to identify and intercept mail, and to further their identity theft fraud schemes.” In addition to monitoring your mailbox for other important and valuable mail to steal, this means a thief could.
1.   apply for a credit card in your name

2.   have it sent to your home address

3.   steal it before you are able to retrieve your mail by using Informed Delivery to find out when the credit card will be delivered to your home

Here are some steps you can take to help prevent this from happening:

·         either sign up for Informed Delivery so you can monitor your own mail or request that it be blocked by sending an email to eSAFE@usps.gov with your name, address, phone number and email address

·         use a locked mailbox

·         freeze your credit reports to prevent the opening of new credit accounts in your name
US Postal Service - Informed-Delivery-The-Basics

Monday, May 20, 2019

MI AG Dana Nessel and MI Supreme Court Justices: MI Elder Abuse Task Force

Contact: Kelly Rossman-McKinney 517-335-7666

March 25, 2019
LANSING – Michigan Attorney General Dana Nessel joined with Supreme Court Justices Richard Bernstein and Megan Cavanagh, Midland County Prosecutor J. Dee Brooks, state legislators Rep. Brian Elder and Sen. Paul Wojno, and 72-year-old Macomb resident Dennis Burgio to announce the formation of the Michigan Elder Abuse Task Force.
“More than 73,000 older adults in Michigan are victims of elder abuse,” said Nessel.  “They experience physical abuse, financial exploitation, emotional abuse, or neglect.  The symptoms and treatment of abuse against our most senior population are complex and demand a concerted effort by this state to tackle what is an often unrecognized and unreported social problem.  That’s why we have brought together dozens of different organizations to work collectively and collaboratively to tackle the challenge.”
Elder abuse shares many of the dynamics of domestic abuse, including a vulnerable victim with emotional ties to the perpetrator, isolation from community resources and family support systems, and substantial underreporting as a result of fear, shame, humiliation, or misplaced affection.
Seventy-two-year-old Dennis Burgio was a victim of elder abuse.  The Macomb resident lost his entire savings because a close friend took advantage of their relationship.
”He was like the son I never had … I trusted him unconditionally,” said Burgio. “We loved him.” 
Burgio had to postpone his retirement for at least five years.  “I am fortunate. By the grace of God I can continue to work to rebuild some of my savings.  It is more difficult because my wife has health issues.  However, our family is supportive and able to help us.” 
Nessel urged Michigan residents to report any signs or concerns about elder abuse to her office, which has established an elder abuse hotline for anonymous tips: 800-24-ABUSE (800-242-2873) or online at www.mi.gov/elderabuse.
The state has initiated efforts to address these issues in the past, including a 1998 Supreme Court Task Force on Guardianships and Conservatorships and a 2007 Governor’s Task Force on Elder Abuse.  While some recommendations were adopted, there are still gaps to be filled, including protecting vulnerable adults from caregiver influence or undue influence, increasing maximum penalties for abusers, creating a special prosecutor for elder abuse, requiring mandatory reporting of deaths in facilities caring for vulnerable adults, and developing local level multi-disciplinary elder abuse community investigation teams.
More than 30 different organizations including law enforcement, state agencies, the Michigan House, Senate and Congressional delegation, and advocacy groups, have committed to being part of the task force.  The task force initiatives include requiring professional guardians to become certified, developing statutory basic rights for families, reviewing the process of a guardian removing a ward from his or her home, and limiting the number of wards per guardian.
“Prosecutors play a critical role in combating elder abuse in Michigan,” said Midland County Prosecutor J. Dee Brooks.  “We started our local task force in 2015 and since that time it has helped us successfully prosecute about 20 cases, mostly involving financial exploitation.”
Four members of the Michigan legislature will participate to ensure a strong legislative role as the task force identifies laws that may need to be strengthened or introduced.  The Republican chairs of the House and Senate Judiciary Committees – Sen. Peter Lucido and Rep. Graham Filler – will join Democratic legislators Sen. Paul Wojno and Rep. Brian Elder as active members of the task force. 
“The primary role of government is to keep the peace and to protect the public,” said Rep. Brian Elder. “Its highest calling is to protect its most vulnerable members.  In 2000, the legislature passed reforms of the probate code but there is more work to do to protect vulnerable adults subject to guardianships and conservatorships. I look forward to working with Rep. Filler in the House and Sens. Lucido and Wojno to pass legislation requiring guardian certification, basic rights for family members, and mandatory reporting by financial institutions just to name a few.”
“We need to strengthen Michigan laws designed to protect elder victims from exploitation and toughen our laws against the predators who commit these terrible acts,” added Sen. Pete Lucido. “Michigan needs to lead the country in protecting our elder citizens from those who bankrupt, abuse, or neglect them.  By joining forces with the Attorney General, the Supreme Court, and the Governor’s Office we can change the conversation across the country with new reforms here in Michigan.  We will send a clear and unified message that in Michigan our elders are highly valued and will receive the protection they have earned and that they deserve.  It is my privilege to serve on this task force.”
Two Supreme Court justices – Richard Bernstein and Megan Cavanagh – will represent the Court on the task force at the request of Chief Justice Bridget McCormack. “If the adult guardianship system is failing our moms and dads, we have to fix that,” said Chief Justice McCormack. “That’s why I have asked Justice Bernstein and Justice Cavanagh to take the lead on this task force with Attorney General Nessel.
“Working together, our goal is to ensure that Michigan’s aging population is receiving the protections promised by our laws,” said Michigan Supreme Court Justice Richard Bernstein. “Our Court is committed to taking action so that our adult guardianship system is providing proper care for vulnerable individuals.”
“Everyone with aging parents knows how hard it is to keep up with all the demands of daily life,” said Justice Cavanagh. “Strengthening court supervision of guardianships is an important step toward easing that burden and safeguarding the rights of older Michiganders”
The Michigan Supreme Court is involved in leading the task force because of its supervisory role over all Michigan courts and because probate courts are responsible for the appointment and supervision of adult guardians. In evaluating the system and making recommendations for change, the Court will be focused on three key questions: 1) Are proper legal procedures being followed? 2) Is the system transparent with the necessary data and records collected so that courts can properly review existing guardianships? And 3) Is there appropriate education and support for guardians, judges, and attorneys so that they are all able to fulfill their respective roles?
“This is such an important issue for our state, and we expect more people to join our efforts as we move forward,” said Nessel.  “In fact, when Congresswoman Debbie Dingell heard about our initiative this morning, she committed to playing an active role on the task force.”
The Elder Abuse Task Force will hold a series of hearings around the state starting Friday, June 14th in Kent County.  A hearing schedule will be issued at a later date.
###

Tuesday, April 2, 2019

MI Offers Guidance on CBD and Industrial Hemp, March 29th, '19

Michigan Offers Guidance on CBD and Industrial Hemp


Media Contact: LARA Communications 517-335-LARA (5272)
Email: mediainfo@michigan.gov
March 29, 2019 – The Bureau of Marijuana Regulation (BMR) and the Michigan Dept of Agriculture & Rural Development (MDARD) issued joint guidance today regarding CBD (cannabidiol) and industrial hemp.
From the Bureau of Marijuana Regulation:
  • CBD products produced from marijuana will not be regulated as marijuana if the THC content is below 0.3%.
  • Edible marijuana products containing CBD made by licensed processors may only be produced using CBD obtained from regulated sources. Currently, these regulated sources include state of Michigan licensed growers or processors under the MMFLA.
  • BMR is in the process of writing administrative rules under the MMFLA and MRTMA to determine the methods for industrial hemp grown under the Industrial Hemp Research and Development Act to be transferred to licensed marijuana facilities. Until the administrative rules are written, there is no authorized method for licensed facilities to obtain industrial hemp.
  • Only facilities licensed by the Bureau of Marijuana Regulation (BMR) under the MMFLA can commercially grow, process, and sell marijuana and marijuana products.
  • BMR does not regulate marijuana or marijuana products grown or produced by registered qualifying patients or designated primary caregivers under the MMMA or individuals over 21 for personal use under the MRTMA.
From the Michigan Department of Agriculture and Rural Development:
  • Any product derived from industrial hemp with a THC concentration above 0.3% is classified as marijuana and regulated under the laws that apply to those products through the Michigan Department of Licensing and Regulatory Affairs.
  • Products derived from industrial hemp, including CBD oil, fall under several different categories. Any substances that will be added to food or drink or marketed as dietary supplements must first be approved by the U.S. Food and Drug Administration for that intended use. At this time, the FDA has not approved CBD for use in food or drink or as a dietary supplement. Therefore, it’s currently illegal to add CBD into food products or drinks or sell it as dietary supplements.
  • GRAS (Generally Regarded As Safe) is a list of substances that the FDA considers safe to add to food. Hulled hemp seeds, hemp seed protein and hemp seed oil are considered GRAS, as of 12/20/18. CBD is currently not considered GRAS, as of 3/29/19. In Michigan, any food production falls under the Michigan Food Law and the licensing requirements within the law.
  • Growing industrial hemp will require a license from the Michigan Department of Agriculture and Rural Development (MDARD). MDARD is in the process of developing a licensing program for growers to meet the requirements of both state and federal laws to allow interstate commerce of the plants.
Definitions
  • Marihuana (legal term) or Marijuana (common term): the plant Cannabis sativa L. with delta-9-THC concentrations above 0.3%. Includes products made from the marijuana plant, but excludes stalks, products made from the stalks, and some products made from seeds.
  • Industrial Hemp: the plant Cannabis sativa L. with delta-9-THC concentrations below 0.3%. Includes products made from the industrial hemp plant. 
  • CBD (Cannabidiol): a substance derived from cannabis plants that does not have psychoactive effects.

Questions regarding marijuana should be directed to BMR:
Questions regarding industrial hemp should be directed to MDARD:

Monday, March 11, 2019

Federal Trade Commission : Keep tech support strangers out of your computer


If you need tech help with your computer, where do you go? Most of us probably search online. But your online search can lead you straight to scammers who scare you into thinking your computer is in dire need of repair...and then sell you costly security software that you don't need.

That’s just what happened in the FTC’s lawsuit against Elite IT Partners, Inc., announced today as part of a massive law enforcement sweep. According to the complaint, Elite bought key words on Google that let them target people searching for how to recover lost passwords. You’d fill out an online form and give your contact information. Then, says the FTC, Elite’s telemarketers would call and ask to get online access to your computer – supposedly to check for problems. Once they were in, the caller would show you fake “evidence” of viruses or other threats that, they said, had to be removed right away.

Then came the sales pitches. Elite allegedly got people – many of them older adults – to pay hundreds of dollars for unnecessary repairs and maintenance programs. If you find yourself in a similar situation, here are some steps you can take:
  • If you’re looking for tech support, go to a company you know and trust, or get help from a knowledgeable friend or family member. If you search online for help, search on the company name plus “scam,” “review,” or “complaint.”
  • If you get a phone call you didn’t expect from someone who says there’s a problem with your computer, hang up.
  • Never call a number in a pop-up that warns you of computer problems. Real security warnings will never ask you to call a phone number.
  • If you think there’s a problem with your computer, update its security software and run a scan.
If you spot a tech support scam, tell the FTC: www.ftc.gov/complaint. And learn more at www.ftc.gov/techsupportscams.

FTC Video:

Monday, March 4, 2019

It’s National Consumer Protection Week 2019


Welcome to National Consumer Protection Week (NCPW) 2019. This marks 21 years of commemorating the important work that the FTC, state attorneys general offices and many community partner organizations do to protect consumers across the country.

NCPW is a time to help people understand their consumer rights and make well-informed decisions about their money. Our team at the FTC works hard to shut down scams and sue those who break the law. But one of our best tools to protect consumers is education.

 You are a vital part of this effort. We need people like you, talking to those in your community about the issues that are affecting you. Whether it’s imposter scams, dealing with debt collection, or recovering from identity theft, the FTC has resources to help you start those conversations, and share important tips with your friends and family.

Looking to get even more involved? Find out how at FTC.gov/NCPW. Here, you’ll find tools to promote NCPW in your own community, as well as links to our partners’ websites with information about their initiatives and events.
Speaking of events, I’d like to remind you that we have some exciting social media events planned this week. I hope you’ll join us.

Wednesday, March 6th at 3pm EST: Twitter chat with The Department of Education’s office of Federal Student Aid
Join @FTC and @FAFSA on Twitter for a chat about how to avoid student loan repayment scams. Be part of the conversation using the hashtag #NCPW2019.

Thursday, March 7th at 12pm EST: Facebook Live with Social Security Administration
We’ll join our colleagues from the Social Security Administration (SSA) to discuss scams that involve people pretending to be SSA officials. Learn about these imposter scams and how to avoid them.

Friday, March 8th at 11am EST: Twitter chat with Identity Theft Resource Center
Join @FTC and @ITRCSD on Twitter for a chat about how you can protect yourself against tax identity theft this tax season. Follow along using the #NCPW2019 hashtag.

Last but certainly not least, check out this video of some Bureau of Consumer Protection staff celebrating NCPW. Please watch, enjoy and share with friends and family.


Wednesday, January 2, 2019

FTC - Michigan Residents don't fall prey to the "Social Security Number being suspended scam"


“This is what a Social Security scam sounds like”

December 27, 2018by Jennifer Leach
 
Acting Associate Director, Division of Consumer and Business Education, FTC

Earlier this month, we told you about a growing scam: people pretend to be from the Social Security Administration (SSA) and try to get your Social Security number or your money. That scam is now growing exponentially. To compare: in 2017, we heard from 3,200 people about SSA imposter scams, and those people reported losing nearly $210,000.

 So far THIS year: more than 35,000 people have reported the scam, and they tell us they’ve lost $10 million.

 Here’s what one of those scam calls sound like (click the link below for the article and audio)

 
Scammers are saying your Social Security number (SSN) has been suspended because of suspicious activity, or because it’s been involved in a crime. Sometimes, the scammer wants you to confirm your SSN to reactivate it. Sometimes, he’ll say your bank account is about to be seized – but he’ll tell you what to do to keep it safe. (Often, that involves putting your money on gift cards and giving him the codes – which, of course, means that your money is gone.)
 
Oh, and your caller ID often shows the real SSA phone number (1-800-772-1213) when these scammers call – but they’re faking that number. It’s not the real SSA calling.

Here's what to know:

 Your Social Security number is not about to be suspended. You don’t have to verify your number to anyone who calls out of the blue. And your bank accounts are not about to be seized. SSA will never call to threaten your benefits or tell you to wire money, send cash, or put money on gift cards. Anyone who tells you to do those things is a scammer. Every time.
 
The real SSA number is 1-800-772-1213, but scammers are putting that number in the caller ID. If you’re worried about what the caller says, hang up and call 1-800-772-1213 to speak to the real SSA. Even if the wait time is long, confirm with the real SSA before responding to one of these calls.
 
Never give any part of your Social Security number to anyone who contacts you. Or your bank account or credit card number.
If you get one of these calls, tell the FTC at ftc.gov/complaint

Thursday, December 13, 2018

Federal Trade Commission: Fake calls about your Social Security Number


The FTC is getting reports about people pretending to be from the Social Security Administration (SSA) who are trying to get your Social Security number and even your money. In one version of the scam, the caller says your Social Security number has been linked to a crime (often, he says it happened in Texas) involving drugs or sending money out of the country illegally. He then says your Social is blocked – but he might ask you for a fee to reactivate it, or to get a new number. And he will ask you to confirm your Social Security number.
In other variations, he says that somebody used your Social Security number to apply for credit cards, and you could lose your benefits. Or he might warn you that your bank account is about to be seized, that you need to withdraw your money, and that he’ll tell you how to keep it safe.
But all of these are scams. Here’s what you need to know:
  • The SSA will never (ever) call and ask for your Social Security number. It won’t ask you to pay anything. And it won’t call to threaten your benefits.
  • Your caller ID might show the SSA’s real phone number (1-800-772-1213), but that’s not the real SSA calling. Computers make it easy to show any number on caller ID. You can’t trust what you see there.
  • Never give your Social Security number to anyone who contacts you. Don’t confirm the last 4 digits. And don’t give a bank account or credit card number – ever – to anybody who contacts you asking for it.
  • Remember that anyone who tells you to wire money, pay with a gift card, or send cash is a scammer. Always. No matter who they say they are.
If you’re worried about a call from someone who claims to be from the Social Security Administration, get off the phone. Then call the real SSA at 1-800-772-1213 (TTY 1-800-325-0778). If you’ve spotted a scam, then tell the FTC at ftc.gov/complaint.

 

Monday, October 22, 2018

FTC Announces Kick-off to First Annual International Charity Fraud Awareness Week Oct. 22-26,'18

For Release    

 

The Federal Trade Commission, the National Association of State Charities Officials, and state charities regulators across the country are announcing the first annual International Charity Fraud Awareness Week (ICFAW), between October 22 and 26, 2018. ICFAW is a coordinated international campaign to help charities and consumers avoid charity fraud and promote wise giving. Consumers can follow the week’s events at #CharityFraudOut.

The FTC and its U.S. partners are joining the Charities Commission for England & Wales, which for many years has hosted its own Charity Fraud Awareness Week. This year, the event is expanding to other countries.

In addition to the U.S. participants in ICFAW, the Australian Charities and Not-for-profits Commission, the Charity Commission for Northern Ireland, the New Zealand Charities Service, and the Office of the Scottish Regulator are also joining in the international outreach effort. Key non-governmental participants include Chartered Accountants Worldwide, the UK’s Fraud Advisory Panel, and international charities Oxfam, British Council, and Amnesty International.
“Generous Americans gave more than $286 billion to charity last year. It’s important to raise awareness about charity fraud and promote wise giving, to ensure that consumers’ money goes where it is intended and helps those in need,” said FTC Chairman Joe Simons. “Joining forces with state and international partners makes all of our education efforts more effective.”

To promote awareness of the impact of charity fraud and the importance of wise giving, the FTC is releasing a new video, “Make Your Donations Count.” The video highlights the value of researching charities to avoid donating to a scam, provides tips people can follow to verify the charity before they donate, and directs people to visit FTC.gov/Charity for more information.

Be careful how you pay

  • If someone wants donations in cash, by gift card, or by wiring money, don’t do it. That’s how scammers ask you to pay.
  • To be safer, pay by credit card or check.
  • It’s a good practice to keep a record of all donations. And review your statements closely to make sure you’re only charged the amount you agreed to donate – and that you’re not signed up to make a recurring donation.
  • Before clicking on a link to donate online, make sure you know who is receiving your donation. Read Donating Through an Online Giving Portal for more information.

Keep scammers’ tricks in mind

  • Don’t let anyone rush you into making a donation. That’s something scammers do.
  • Some scammers try to trick you into paying them by thanking you for a donation that you never made.
  • Scammers can change caller ID to make a call look like it’s from a local area code.
  • Some scammers use names that sound a lot like the names of real charities. This is one reason it pays to do some research before giving.
  • Scammers make lots of vague and sentimental claims but give no specifics about how your donation will be used.
  • Bogus organizations may claim that your donation is tax-deductible when it is not.
  • Guaranteeing sweepstakes winnings in exchange for a donation is not only a scam, it’s illegal.
If you see any red flags, or if you’re not sure about how a charity will use your donation, consider giving to a different charity. There are many worthy organizations who will use your donation wisely.
Report scams to FTC.gov/complaint. Find your state charity regulator at nasconet.org and report to them, too. Share any information you have – like the name of the organization or fundraiser, phone number, and what the fundraiser said.

Organizations that can help you research charities

These organizations offer reports and ratings about how charitable organizations spend donations and how they conduct business:
The IRS’s Tax Exempt Organization Search tells you if your donation would be tax deductible.
You can find your state charity regulator at nasconet.org. Most states require the charity or its fundraiser to register to ask for donations.

 
Charity Scams video

Friday, October 19, 2018

CPAM 2018 Conference : Next Generation Training, "C.O.P."

Speaker, Daphne Levenson, Next Generation Training

Community Orienting Policing -  It is not a division, or position, It is a philosophy, attitude, and way of life.

3 pillars of C.O.P.
-Organizational change
-Problem solving
-Partnerships

Points of observation:
-Challenge for law enforcement and the current situation - what do we need to do for change to occur?
-Did police cause all social problems? No why are we being asked to solve them.
-Division of powers- local government, courts, child services, Code Enforcement. All of these divisions must work with the local police for C.O.P. to be effective.

-The Good Ole days—technology has changed policing , what is the real role of 9-1-1? Has it become overused for incidents that are not emergency related, yes this is where the rest of the community services play a vital role.

-Changes in our society - technology and it’s impact on the neighborhoods, families, and the media. The media is about making money and influence, not educating. What makes money ? Racism, police brutality, fear of government, disasters, celebrities.

-Sir Robert Peel - Metropolitan Police Act of 1829, the start of the public campaign to improve public law. 
And today's challenge - Organizational change :
-Admit we can’t handle it all
-Share info
-Make a plan / ask for help
-Work on their problems
-Call them out

Law enforcement agrees to prepared for and consider:
-trying new things
-seeing things differently
-use of technology
-being flexible
-share transparency
-fail / win - celebrate

Use of technology - texting 9-1-1 , what systems are available in your community?
-Security cameras on businesses, *home video security systems.
 
Problem solving - 10% of the criminals cause 55% of all crimes.

Fixing Broken Windows” -(Author's George L. Kelling and Catherine M. Coles ) book and research showed that if a community doesn’t take care of buildings, people, and the community there will be no change in reducing crime or people getting services that are needed to increase their well being.

CPTED - Crime Prevention Through Environmental Design (*info can be found @ NCPC)
-territorial reinforcing
-natural access control
-maintenance
-Natural surveillance

SARA - problem solving (*info can be found at the Center for Problem-Oriented Policing)
-Scanning
-Analysis
-Response
-Assessment

Next Generation Training

Interview w/ Daphne of Next Generation Training




Thursday, October 18, 2018

CPAM Conference: 2018 General Membership meeting 10/18/18


CPAM Officers: Andrew Kozal President opened the meeting at 12:15pm, members were provided with the agenda.  Reports were given by V.P. Adam Nothelfer, Secretary Julie Niemchik, Treasurer Dave Robinson had to leave the conference early and the financial report which was listed on the agenda was reviewed and given by the president.

Approval of the reports was recommended and motion carried.

-Members were encouraged to complete the feed back forms and evaluations from the conference .
Ideas /topics were requested for future quarterly meetings. Members were polled on the idea of hosting an advanced CPTED training. Most thought this was a good recommendation.

-Training: The training committee announced that the 2019-20 conference dates / sites were listed in the conference packet and designed to assist in planning for members.

General membership quarterly training: December / January quarterly, updates on CRASE training.

-Awards Committee update, Ian Graham, members were encourage to nominate members for recognition and special projects in their communities. Information on the award nominations are in the conference packet with time lines for submissions.

- Mini Grants, Rick Smediendorf,  CPAM members have access to a $300.00 mini grant for special projects. Members are encouraged to apply, the application is in the conference packet.

-Legislative Update, Rich Coleman
Federal- Safe Neighborhood Block grants Authorization Act for 2018, FY ‘18, funding $30.3 Billion, this Act will fund, FBI / Federal prisons / US Marshals / DEA / Bureau of ATF /State and local grants - $2,442.3 million / Homeland Security- $47.7 billion.

State of MI - Bill of most concern by MACP, Senate Bill #594, “Private Police Services”.

Upcoming events of interest: U of M Cyber Security Summit 10/25/18, Ann Arbor MI .
North American Cyber Security Conference, 10/29/18, Cobo Hall, Detroit MI.
November 9th, '18, "2018 Scams and Fraud- Impact on Vulnerable Seniors, Pittsfield Twp. DPS

-CPAM Opportunities: members were provided with information about opportunities to help with the CPAM organization efforts such as website content, outreach to agencies from around the state to help expand the membership, and other projects that may need assistance.

New Business - pending

Motion to close the meeting @ 1:10pm was approved.

CPAM 2018 Outstanding Achievers / Award Winners

Outstanding Crime Prevention  Practitioner of the Year
Deputy  Mandy Trevino Kent County Sheriff’s Office

Outstanding Volunteer Project
Mr. Brian Johnson, PhD

Outstanding Corporate Award
Tim and Teresa Sobie, Sobie Meats

Outstanding School Security Program
Mr. Dave Eichberg, Berrien Springs Public Schools

Special Project in the Field of Crime Prevention
Dennis & Pat Raap / Dave & Lois Koch, Coopersville Rotary Club

Outstanding. Contributions to the Crime Prevention Association of MI
Mr. Jeremy Huffman, Past CPAM President
Mr. Ritchie Coleman, Executive Board Member


















Wednesday, October 17, 2018

CPAM '18, Conference- Cyber Security -“Protect Young Eyes”

Mr. Chris McKenna, Founder of “Protecting Young Eyes" workshops - Desired outcomes for participants will gain a deep understanding of the impacts that technology is having on the social, relational, physiological, and emotional development of children today (increased empathy). Participants will walk away with a suite of possible solutions that can address or partially mitigate these (increased effectiveness).

This organization does workshops for students parents and communities. The greatest challenge is for parents to help monitor their children’s online activity.

Comments and highlights from the presentation:

FACT: All apps that are connected to “Twitter” will allow access to porn.

-200% increase in teen girl suicide from 1999 to 2014.

-“There is no such thing as passive parenting in the digital age, If you don’t talk to them Dr. Google will”.

-“A lot of parents complain that it’s really hard to be a parent in the digital age. Guess what ? It’s even harder being a kid.”

-“Parents who are “OBSERVANT, ENGAGED, and INFORMED" often have kids who learn to use technology will be more responsible, but they (parents) can't let their guard down.

 #1 violator of  trust - YouTube” — 2nd largest search engine, #1 is Google, Google owns YouTube”.

Subscribe to parent tech updates: text the word -protect-  to 66866

Know Your Kids: Assess their ability to handle the Internet responsibility, don't be afraid to ask the following questions or seek to find this information on their devices:

-Friend history
-Obedience history
-Curiosity level
-Heart condition
-Age

What is the right age for social media?  It is subjective, can they interact with others, do they have the ability to engage and have a conversation?

“Parents take early digital code of conduct device ownership,  talk to your teens often.”

Protect Young Eyes Blog post - Parents learn how to block porn from any device ( info posted on how to set up blocks on android and apple devices).

 #1 issue in Middle School - “ sexting”  —New program in Kent County MI, middle school students who are involved in “sexting” are required to take a four (4) hour webinar program.

FOMO - Fear of Missing Out,,,  the need to reply to every beep or notification of a text or message.
“We have to give our kids permission not to talk to nice people they don’t know online. #predatorproofyourchild.”

Protect Young Eyes Blog post - Warning for Parents -Are we over sharing with posting pictures of our children? By the time  a child turns 2 years old they will have a social media profile they they didn’t create.

The 5 most dangerous places on the Internet ( * parents go to the website for this info and more)

Safe Guard your Internet access explore using one of these programs:
-Mobicip
-Circle with Disney
-Bark. * used by school district across the county to monitor social media platforms.

Subscribe to Parent Tech Support updates : text the word -protect- to #66866
Resource : Digital Future initiatives ( DFinow.org)UIKeyInput

Interview w/ Chris about the role of parents and navigating digital devices.


Face Book

Twitter

Protect Young Eyes

CPAM 2018 conference workshop : Crisis Intervention Program Development

Presenter: Mr. Rafael X. Diaz President and CEO of Diaz Consulting

This presentation was designed to help Law enforcement develop / improve on the skills of working with mental ill - split second decisions are made based on education and training  and this program will help establish better skills.

The goal of the Diaz Consulting group is to bring in other disciplines such as social workers, psychologist and others to help with understanding the challenge of working with the mentally ill.

In 1987, a mentally ill person was shot in Memphis TN. This incident brought resources together to explore how to help address responding to citizen contacts with mentally ill persons. This brought about the development of the “Memphis Model”  a multi-jurisdictional approach to addressing mental illness.

The Michigan Model - (C.I.T. Crisis Intervention Team) a system of training and interdisciplinary cooperation designed to streamline the delivery of emergency mental health services. This is a 32 hour training course consisting of five categories, these five (5) areas include the foundation  components, community interaction,  De-Escalation techniques, and Real Time Scenarios.

PTSD- Post Traumatic Stress Disorder - Ward offered insight into the impact of officer safety based on the incidents he had been involved with and shot in the line of duty. Officers are trained on identifying what it is and the triggers that those experiencing the disorder may be showing.  Officer's are exposed to trauma on a daily basis and they are impacted by what they see and these incidents can and will never be erased from their memory. Debriefing techniques are important for emergency responders to help address the emotional impact of these types of incidents.

For  Veterans who are experiencing PTSD -VA Benefits are available- agencies are encouraged to work w/ the local VA hospital for assistance to work with military families.

Training opportunities for staff needs to have members from multiple disciplines in their respective community.

For more information on bringing this program to your agency please contact our CPAM site.

Interview w/ Rafael and Ward who presented at the CPAM conference:


Tuesday, October 16, 2018

Crime Prevention Association of MI 2018 Conference

Tuesday October 16th, 2018, CPAM members and guess opened the 2018 conference with our banquet and awards ceremony at the Great Wolf Lodge in Traverse City Michigan.




Our C.P.A.M., Officer's , Andrew Kozal, President  Kent County Sheriff Dept., Adam Nothelfer, Vice President, Saginaw Township Police Dept., Julie Niemchick Secretary , Grand Rapids Police Dept., Dave Robinson , Treasurer, Rockford Dept. Of Public Safety.

Training Committee members:
-Sandi Jones, Training Chair, Kent County Sheriff Dept.
-Brian Look,Training Committee, Wyoming Police Dept.
-Rick Smiedenddorf, Training and Membership Committee,
Berrien County / Oronko Twp. Police Dept.
-Ian Graham, Awards Chair, Rockford Dept. Of Public Safety


Our Keynote speaker's topic is "Your Noble Profession", Retired Chief Neal Rossow of Flat Rock Michigan who has served for forty (40) years in law enforcement working his way up through the ranks in several agencies. He currently is serving as the Director of Professional Development for the Michigan Association of Chiefs of Police and was recently given the responsibility for creating the Michigan Law Enforcement Accreditation Program.

Retired Chief Rossow provided an overview of the transition in policing, impacts of budget for personnel, equipment, and technology.   He was reassuring to those in attendance about how important the role of Community Policing is in /for our respective agencies and communities.

On behalf of the Crime Prevention Association of Michigan, we'd like to thank Retired Chief Rossow for his continued service to the law enforcement community and residents of the state of Michigan.

A special thank you to the sponsors for this year's event, Vanessa Andrus, Realtor Re/Max United, FOP Lodge #97, and the Gerald R.Ford Metro Lodge #97.


Wednesday, August 1, 2018

National Night Out, "Heighten Crime Prevention Awareness" Aug.7th, 2018

WHAT IS NATIONAL NIGHT OUT?

National Night Out is an annual community-building campaign that promotes police-community partnerships and neighborhood camaraderie to make our neighborhoods safer, more caring places to live. National Night Out enhances the relationship between neighbors and law enforcement while bringing back a true sense of community. Furthermore, it provides a great opportunity to bring police and neighbors together under positive circumstances.

Millions of neighbors take part in National Night Out across thousands of communities from all fifty states, U.S. territories and military bases worldwide on the first Tuesday in August (Texas celebrates on the first Tuesday in October). Neighborhoods host block parties, festivals, parades, cookouts and various other community events with safety demonstrations, seminars, youth events, visits from emergency personnel, exhibits and much, much more.

Click on the link to see if your community is participating in the 2018 effort. * Some agencies incorporate this event with other programs.

NNO Map


Medicare: Scams involving new Medicare Cards

*Michigan Seniors started receiving new cards in July of 2018:

When you’re enrolled in Medicare, you’ll get your red, white, and blue Medicare card in the mail. If you're automatically enrolled, you'll get your red, white, and blue Medicare card in the mail 3 months before your 65th birthday or your 25th month of getting disability benefits. Your Medicare card shows that you have Medicare health insurance. It shows whether you have Part A (Hospital Insurance), Part B (Medical Insurance) or both, and it shows the date your coverage starts.
Be sure to carry your card with you when you’re away from home. Let your doctor, hospital, or other health care provider see your card when you need hospital, medical or other health services.

New Medicare cards are coming

Medicare is mailing new Medicare cards to all people with Medicare now. Find out more about when your card will mail.
View an example of the current card.

10 things to know about your new Medicare card

  1. Your new card will automatically come to you. You don’t need to do anything as long as your address is up to date. If you need to update your address, visit your mySocial Security account.
  2. Your new card will have a new Medicare Number that’s unique to you, instead of your Social Security Number. This will help to protect your identity. 
  3. Your Medicare coverage and benefits will stay the same.
  4. Mailing takes time. Your card may arrive at a different time than your friend’s or neighbor’s.
  5. Your new card is paper, which is easier for many providers to use and copy.
  6. Once you get your new Medicare card, destroy your old Medicare card and start using your new card right away.
  7. If you’re in a Medicare Advantage Plan (like an HMO or PPO), your Medicare Advantage Plan ID card is your main card for Medicare—you should still keep and use it whenever you need care. And, if you have a Medicare drug plan, be sure to keep that card as well.  Even if you use one of these other cards, you also may be asked to show your new Medicare card, so keep it with you.
  8. Doctors, other health care providers and facilities know it’s coming and will ask for your new Medicare card when you need care, so carry it with you.
  9. Only give your new Medicare Number to doctors, pharmacists, other health care providers, your insurers, or people you trust to work with Medicare on your behalf.
  10. If you forget your new card, you, your doctor or other health care provider may be able to look up your Medicare Number online.

Watch out for scams

Medicare will never call you uninvited and ask you to give us personal or private information to get your new Medicare Number and card. Scam artists may try to get personal information (like your current Medicare Number) by contacting you about your new card. If someone asks you for your information, for money, or threatens to cancel your health benefits if you don’t share your personal information, hang up and call us at 1-800-MEDICARE (1-800-633-4227).  Learn more about the limited situations in which Medicare can call you.

How can I replace my Medicare card?

If you need to replace your card because it’s damaged or lost, sign in to your MyMedicare.gov account to print an official copy of your Medicare card. If you don’t have an account, visit MyMedicare.gov to create one.
If you need to replace your card because you think that someone else is using your number, let us know.

How do I change my name or address?

Medicare uses the name and address you have on file with Social Security. To change your name and/or address, visit your online my Social Security account.


Medicare.gov

FTC: Stopping Unsolicited Mail, Phone Calls, and Email

FTC Alert: Tired of having your mailbox crammed with unsolicited mail, including preapproved credit card applications? Fed up with getting telemarketing calls just as you're sitting down to dinner? Fuming that your email inbox is chock-full of unsolicited advertising? The good news is that you can cut down on the number of unsolicited mailings, calls, and emails you receive by learning where to go to "just say no."

Consumer Reporting Companies

If you decide that you don't want to receive prescreened offers of credit and insurance, you have two choices: You can opt out of receiving them for five years or opt out of receiving them permanently.
To opt out for five years: Call toll-free 1-888-5-OPT-OUT (1-888-567-8688) or visit www.optoutprescreen.com. The phone number and website are operated by the major consumer reporting companies.

To opt out permanently: You may begin the permanent Opt-Out process online at www.optoutprescreen.com. To complete your request, you must return the signed Permanent Opt-Out Election form, which will be provided after you initiate your online request.
When you call or visit the website, you'll be asked to provide certain personal information, including your home telephone number, name, Social Security number, and date of birth. The information you provide is confidential and will be used only to process your request to opt out.
If you don't have access to the Internet, you may send a written request to permanently opt out to each of the major consumer reporting companies. Make sure your request includes your home telephone number, name, Social Security number, and date of birth.

Experian
Opt Out
P.O. Box 919
Allen, TX 75013

TransUnion
Name Removal Option
P.O. Box 505
Woodlyn, PA 19094

Equifax, Inc.
Options
P.O. Box 740123
Atlanta, GA 30374

Innovis Consumer Assistance
P.O. Box 495
Pittsburgh, PA 15230

Direct Marketers

Telemarketing

The federal government's National Do Not Call Registry is a free, easy way to reduce the telemarketing calls you get at home. To register your phone number or to get information about the registry, visit www.donotcall.gov, or call 1-888-382-1222 from the phone number you want to register. You will get fewer telemarketing calls within 31 days of registering your number. Telephone numbers on the registry will only be removed when they are disconnected and reassigned, or when you choose to remove a number from the registry.

Mail and Email

Consumers can register at the Direct Marketing Association's (DMA) consumer website: www.DMAchoice.org for a processing fee of $2 for a period of ten years. Registering online is the fastest way to see results. DMAchoice offers consumers a simple, step-by-step process that enables them to decide what mail they do and do not want.
In addition, DMAchoice online offers registration for DMA's eMail Preference Service (reduce your unsolicited commercial email);
Mail-in registration:
If you do not wish to complete your registration online, you can register for DMAchoice by using the mail-in form that is online: fill out the DMAChoice Mail In Form with all required information, print it and mail to the address below.
Or, if you do not have access to the Internet, you can register by sending your name and address (with signature), along with a $3 processing fee (check or money order payable to DMA) to:
DMAchoice
Data & Marketing Association
P.O. Box 643
Carmel, NY 10512

Department of Motor Vehicles

The Drivers Privacy Protection Act allows states to distribute personal information only to law enforcement officials, courts, government agencies, private investigators, insurance underwriters, and similar businesses — but not for direct marketing and other uses.

FTC Alert: Government imposter scams


You get a text, call, or email from someone who says they’re with the government. They may claim to be a U.S. Marshal, saying you must pay a fine for missing jury duty. Or the IRS, saying that you owe thousands in back taxes. Some might threaten legal action, deportation, or arrest if you don’t pay up or give them your financial information.
In other cases, it sounds less scary and more like your lucky day. The call, text, or email will say you’ve won a prize, the lottery, or a grant — but you need to pay some fees or taxes to get your winnings.
 
These are all scams. Scammers will try to make it seem legitimate. They might give you a badge number, or even know information like the last four digits of your Social Security number. A Washington, D.C. area code on your caller ID also might seem convincing. But caller ID can be faked.
 
If someone calls, texts, or emails saying they’re with the government and you must pay, stop.
  • Never send money — especially by gift card, cash reload card, or money transfer. No government agency will threaten you or demand payment this way.
  • Don’t give out your personal or financial information to anyone who calls, texts, or emails.
  • If you sent money to a government imposter, contact the company you used to send the money (gift card company, cash reload card company, or wire transfer service) and tell them it was a fraudulent transaction. Ask to have the transaction reversed if possible.
  • Report it to the FTC at FTC.gov/complaint.
IRS Imposter Scam video 

U.S. Secret Service Releases Operational Guide for Preventing Targeted School Violence

Release Date: 
July 13, 2018
On July 12, 2018, the United States Secret Service National Threat Assessment Center released another tool in support of the effort to end the prevalence of targeted violence effecting the Nation, the world, and most importantly – our schools.  ENHANCING SCHOOL SAFETY USING A THREAT ASSESSMENT MODEL – An Operational Guide for Preventing Targeted School Violence, was developed to provide fundamental direction on how to prevent incidents of targeted school violence.
The guide provides schools and communities with a framework to identify students of concern, assess their risk for engaging in violence, and identify intervention strategies to mitigate that risk.
The Secret Service created the National Threat Assessment Center in 1998 to focus on research, training and threat assessments related to various forms of targeted violence. Following the tragedy at Columbine High School in April 1999, the Secret Service partnered with the Department of Education to study 37 incidents of targeted violence that occurred at elementary and secondary schools.  The goal of that study, the Safe School Initiative (SSI), was to gather and analyze accurate and useful information about the thinking and behavior of students who commit acts of violence.  The findings of the SSI led to the establishment of threat assessment programs in schools – something the Secret Service remains fervently committed to. 
“The Marjory Stoneman Douglas High School shooting tragedy served as the impetus to go beyond our past work and go in depth regarding the how - how do we solve this epidemic?” said Secret Service Director R. D. “Tex” Alles.  “The report truly is an operational guide and I am confident that if embraced and followed by our Nation’s communities and schools, that we will together reduce the occurrence of violence and the tragic loss of life.”
To ensure no school goes overlooked, the new guide is available to the public and for download at DHS.gov/school-safety-and-security and www.SecretService.gov.  The Secret Service National Threat Assessment Center will also be printing and distributing copies to schools across the country.
This report is not the end of the Secret Service’s work to prevent school shootings and targeted violence.  Work is currently underway to release an updated comprehensive study with an anticipated completion date in the spring of 2019.
 

What is Email Spoofing?

Wired Safety:
 
Spoofing is the term for falsified e-mail addresses that appear to come from a sender when in fact, the message is really being sent by a spammer. They can be difficult to spot and cause many problems, both for recipients and spoofed e-mail address owners.

How spoofing operates

E-mail spoofing can assume a variety of forms, but basically, a spoofed e-mail has appears to have been sent from one source when it actually was sent from another source entirely. Phishing attempts and e-mail worms typically use spoofed e-mail addresses to trick users into believing that an e-mail has come from a trusted source. The actual sender effectively hides behind a user's address by falsifying its routing information, making it appears to come from the legitimate user's account.
 
However, any replies to a spoofed e-mail go directly to the legitimate e-mail account (not the sender who has spoofed the e-mail) causing embarassment and inconvenience. The legitimate user can find their e-mail Inbox bombarded with viruses, bounced e-mail, flame e-mails and in some cases can have their account suspended or shut down by their Internet Service Provider (ISP) for violating its anti-spam policy.
 
Meanwhile, the sender avoids all of these consequences, leaving innocent users to deal with the aftermath.
 
How to tell a spoofed e-mail address from a legitimate e-mail address
 
It is extremely difficult to detect a spoofed e-mail address, at first glance. It is possible to identify a spoofed e-mail by carefully analyzing e-mail headers but generally, spoofed e-mail is not immediately detected as such.
 
There are several things to look out for regarding potentially spoofed e-mail addresses
 
Typically, spoofed e-mails will appear to come from a legitimate source and it is often only the content of the e-mail itself that can give the spoofer away. Banks and other financial orgaizations do not request personal information via e-mail - that is one of the most important things you can remember regarding all e-mail fraud (spoofing, spamming and phishing included).
 
Like spammers, spoofers use various ploys to trick users into opening their e-mails, anything from placing "Dear friend" or "Remember me" in the subject line - implying that the e-mail is from someone the user knows, to more generic subjects like, "Your money has been refunded" or "About your Web site."
 
Be wary of e-mail that appears to be from a legitimate source (like your bank) that asks you to update your personal information - it is almost certainly a phishing attempt and the official looking e-mail address will be spoofed.
 

How to tell if your e-mail address is being spoofed

 
You receive (sometimes angry) replies to e-mail you know you did not send.
You receive multiple bounced e-mail that you know you did not send.
Your ISP challenges you about violating its anti-spam policy.
What to do if you think you have received a spoofed e-mail or your e-mail address is being spoofed
 
Do not respond to a spoofed e-mail to complain because, it will only arrive in your own e-mail Inbox.
Send a copy of the spoofed e-mail to the spoofed e-mail sender's ISP. The e-mail address for this is usually or but if you are not sure, visit their ISP's Web site and search for the information - it will be there.
Send a copy of the spoofed e-mail you received to your ISP's abuse desk. The e-mail address for this is usually or but if you are not sure, visit your ISP's Web site and search for the information - it will be there.
Include full e-mail headers when you file a spoofing report. Find out how to read e-mail headers here.
Further assistance can be also obtained by contacting our organization via out contact form
Basic safety tips for preventing e-mail spoofing:
 
Use more than one e-mail addresses. One for personal e-mail and the other for mandatory fields in online forms and access areas.
Make your e-mail address difficult to guess. Spoofers will use every name combination they can find to send spam (known as "dictionary attacks"), so , although unattractive and possibly difficult to remember, might attract less spam than susan@yourisp.com. Generic e-mail addresses like will always attract spoofing, unfortunately.
 
Never post your real e-mail address anywhere online, such as newsgroups, online chat and online profiles.Use a "throwaway" e-mail address or disguise your e-mail address so that harvester bots cannot read it. Always check the privacy policy of any Web site that requests personal details, such as e-mail addresses. If the Web site is requesting this type of information and either does not provide an option to opt out or does not have a privacy policy, it is not wise to submit your information.
When you are responding via a Web site form, read it thoroughly.
Some Web sites who do include an opt out option usually require you to check a box to say that you agree to be sent e-mail (either from them or their associates). However, some of them ask that you uncheck a pre-checked box not to be sent e-mail and many consumers have fallen foul of that.
Never open e-mail and/or download attachments from anyone if you are not expecting them and if you must open an attachment - always virus scan it first.
Keep your operating system, anti-virus, anti-spyware and firewall software up to date.
Use any spam filters available by default from your ISP.
wiredsafety