Miscellaneous Safety Tips

Miscellaneous Safety Tips


Automobile Thefts

Most of the motor bikes are stolen when left outdoors unattended – both during day and nights. It was found in many cases that these vehicles did not have double locking system or good locks. During nights some thieves abandoned them as soon as the fuel tank goes dry. Some dismantle them, some sell them at a cheaper price without documents and many thieves use them to commit crimes again.

To avoid automobile thefts follow the tips:

  • Park your vehicle in the visual frame of a CC camera wherever possible.
  • Use wheel lock for two wheeler and change the locks every year.
  • Always park with the windows up and doors locked.
  • Do not give lift to strangers.
  • Use securing devises like steering lock, clutch lock, break lock etc.
  • Double check all doors.
  • Install loud alarm systems in your car.
  • Never leave the key dangling in the ignition.
  • Do not park in no parking areas.
  • Always have your vehicle insured.
  • Keep your vehicle secure. Thieves can make duplicate keys.
  • If possible have keep an eye on your vehicle during shopping if it does not have valet parking place.
  • Put cover over your vehicles when parked them outside your homes so it does not attract the attention of the thieves.
  • Do not leave valuables i.e. mobile phones, Laptops etc. inside the car even if it is locked.
  • Keep copies of your RC book, Insurance papers at one or two secure locations in your house for ready reference in case of theft. It is even better if you can keep their scanned copies or photographs in your mobile phone or cloud. IN case of theft, Dial 100 and inform the police immediately so that possible escape routes of the thief can be sealed and checking launched. Loss of time can result in the thief crossing the borders.

Mobile phone safety

How to Protect a Mobile Phone from Being Stolen
With mobiles or cell phones becoming fancier, more popular, and more expensive, they are increasingly liable to theft. Even then, many thieves are more interested in accessing your wireless service and potentially, stealing your identity. Unless you want to deal with all the hassles of getting a new phone (or paying for unauthorized charges on your bill) you’d do well to find out how to ensure that your phone finds its way back to you or at least, how you can make it difficult for thieves to get anything out of it.

1. Keep details. Make a record of all your phone information and keep this in a safe place. Include the following elements in the information:
Your phone number
The make and model
Color and appearance details
The pin or security lock code
The IMEI number (on GSM phones)

2. Add a security mark. Use an ultra violet pen to print your post code and house number onto both your mobile handset and battery. This makes it easily identifiable as your property if lost or stolen. It would also be good if you write your alternate contact number or email id on your phone. This would help the finder of your handset to contact you if he or she intents to return it. The ultra-violet pen marking will wear off every couple of months, so reapply it when you feel necessary.

3.Use the security lock code, or PIN feature, to lock your phone. This will make it less valuable to a thief and deny them access to personal numbers stored on your SIM card.

4. Register your phone with your network operator. If your phone is stolen, report the loss to them immediately. Using your IMEI number, they may be able to block your hand set and account details. Some wireless carriers are willing to do this, and some aren’t. If done, this will prevent anyone from using the phone across any network, even if the SIM card is changed.

5.Keep in mind that once the phone is disabled, it may not be able to be used again, even if you get it back.
Keep records of this call–the date, time, name of the person you spoke to, what they said, and their extension. Ask for confirmation in writing that your phone has been disabled. This is important in case the thief makes fraudulent charges on your account.

6.Have your phone number disabled. In addition to reporting your phone lost or stolen, you should also disable your phone number (not account) so that no further charges can be applied. This is in case the thief figures out how to access your account through another hand set, or in case the carrier is unwilling to block the handset. Remember that, as mentioned earlier, many thieves stand to benefit from using your service rather than selling your phone, especially between the moment they steal it and the moment you realize your phone is missing.

As in the previous step, keep detailed records of when you requested your account to be disabled.

7.Request an immediate, formal investigation from your carrier. Sometimes this can prevent (or at least delay) the carrier from launching a collections effort and tainting your credit, if things get ugly.

8.File a police report immediately. Time is money, literally. A thief can add over 10,000 to your cell phone bill in just hours by making international calls, and you might end up being asked to foot the bill. Some phone companies may require proof that the phone was actually stolen, versus it having been lost. A police report serves as evidence, which will make your wireless provider more cooperative, especially if insurance is involved.

9.Install anti phone theft software. Most of the smart phones have this facility in-built. There are suppliers that provide modern anti theft software for your phone. The software enables you to remotely contact your mobile and stay in control. For example, one of the recently published solutions for Symbian and Android is Theft Aware; others provide Windows Mobile or Blackberry support

10.Never let the phone get out of your sight. Unless you are sleeping of course, always have your eyes on the phone.


Identity Thefts

Ramesh got Vijay’s (victim) ID information like xerox copies of Ration card or driving license or phone bill or anything which has victim info. He changes the photo on the ration card and make a copy of it again. Later, Ramesh applies for a driving license on victim’s name with his own photo on it. Now Ramesh can open a Bank Account with that driving license and can apply for a credit card on his victim’s name and address. Unfortunately Ramesh is issued Credit Card, thanks to lax verification procedures. Now Ramesh uses the credit card to buy expensive things like jewelery, mobile phones, laptop, watches etc. After a while, Vijay will get the bill from the bank for all the purchases made by Ramesh….!

What is Identity Theft?

Identity theft is a fraud that involves stealing money or getting other benefits by pretending to be someone else. The person whose identity is used can suffer various consequences when they are held responsible for the perpetrator’s actions. Identity theft is a crime.

How criminals steal your identity?

In most cases, a criminal needs to obtain personally identifiable information or documents about an individual in order to impersonate them. They may do this by:

  • Stealing payment or identification cards, either by pick pocketing or surreptitiously by skimming through a compromised card reader
  • Remotely reading information from an RFID chip on a smart card, RFID-enabled credit card, or passport.
  • Browsing social network (MySpace, Facebook, Orkut etc) sites, online for personal details that have been posted by users
  • Stealing mail or rummaging through rubbish (dumpster diving)
  • Retrieving information from redundant equipment which has been disposed of carelessly, e.g. at public dump sites, given away without proper sanitizing etc.
  • Researching about the victim in government registers, internet search engines, or public records search services.
  • Eavesdropping on public transactions to obtain personal data (shoulder surfing)
  • Stealing personal information in computer databases (Trojan horses, hacking)
  • Advertising bogus job offers (either full-time or work from home based) to which the victims will reply with their full name, address, curriculum vitae, telephone numbers, and banking details
  • Infiltration of organizations that store large amounts of personal information
  • Impersonating a trusted organization in an electronic communication (phishing)
  • Obtaining castings of fingers for falsifying fingerprint identification.

What a criminal can do with stolen identity?

  • Apply for a credit card in your name;
  • Open a bank or building society account in your name;
  • Apply for other financial services in your name;
  • Run up debts (e.g. use your credit/debit card details to make purchase) or obtain a loan in your name;
  • Apply for any benefits in your name (e.g. housing benefit, new tax credits, pensions, health benefits etc)
  • Apply for a driving license in your name;
  • Register a vehicle in your name and use it for crime;
  • Apply for a passport in your name; or
  • Apply for a mobile phone connection in your name.

How can you protect yourself from ID theft?

The strongest protection against identity theft is not to identify at all – thereby ensuring that information cannot be reused to impersonate an individual elsewhere. Following are some tips;

Safety tips to avoid Identity Theft

  • Never disclose personal information to anyone you do not trust.
  • Do not provide your information until and unless you are sure about the caller. If in case of doubt you call them using the bank phone number.
  • Remember that banks always ask for specific characters like last 4 digits of your card
  • Ensure that your personal documents are always secure. Your personal documents include your bank account details, credit cards, driving license, card receipts, financial statements and even utility bills.
  • Periodically peruse your bank statements to check for any transactions that have occurred without your knowledge.
  • Dispose of financial statements, card receipts and other personal documents with utmost care. Tear or cut into pieces any such documents before trashing them.
  • Keep the authorities informed if you have lost any personal item. For example, report a stolen credit card.
  • Raise an alarm if you receive a telephone call or letter saying you have been approved or denied credit for accounts you know nothing about, or you receive a credit card statement for an account that you never opened.
  • While paying by credit card, never let it out of your sight.
  • Raise an alarm if the card is being swiped more than required, or if it is being scanned.
  • In case of a change in address, ensure to notify the correct address to all recipients who send you statements to your address.
  • Always sign up for SMS/eMail alerts while taking a Credit Card and on Online Banking transactions.
  • Always Erase CVV code from the backside of your Credit Card.
  • Be Careful while using your personal details like your ID, your Credit Card number etc in Online Shopping, the computer you may be using has SPYWARE or Online shopping site you using may be not secure.
  • Never save any personal information in your computer or laptop or under your desk or in CDs or in Flash Drives.
  • Don’t carry personal information such as pin numbers with you. Just remember them or store them in a secured way.
  • Make sure your letterbox is secured.

Financial Frauds

Financial fraud happens due to one or both of the following reasons:
1. Your greed
2. Your carelessness

  • Greed drives many investors to invest in unregistered or unlicensed activities for the sake of higher returns promised.
  • Carelessness can include getting swayed by advertisements, smooth talking of smart marketing agents or herd mentality of simply following a crowd.
  • Always remember that financial investments are fraught with risks. It is your responsibility as an investor, to assess the risks and take a decision. Quite often, the risk can be loss of total investment. Getting greedy to earn much higher interest than the organised banks can offer on fixed deposits can result in loss of entire principal amount.
  • Financial fraudsters operate in several guises. They may offer interest rates which are double that of bank FD rates or offer some exotic trees which they claim will earn several multiples of the investment in a short period or offer plots of land or a combination of the above. They employ smooth talking agents who get as much as 30% on the deposits/investments as their commission. So, some of these agents may offer some freebies also. Quite often, several depositors turn into agents when they see find the commission so lucrative. Often, it grows into a ponzi scheme – a multi level marketing scam.
  • Fraudsters often assume the avatar of social activists, philanthropists or deeply religious persons sponsoring expensive public rituals to instil confidence in their potential victims.
  • Some investors invest simply because every one else in the street/community is doing it.
  • Before you invest, learn to read the small print. At the very least, follow the following advice:
  • No person or company is allowed to collect deposits in any guise except with express permission from RBI. Flouting this is a serious white collar crime. Don’t invest, report the crime.
  • Even after issuing license, it is suspended by RBI when and if the licensee doesn’t fulfil RBI’s requirements in terms of returns to be filed or disclosures to be made. Names of such black listed firms are published from time to time on the net. The URL is: Following is the list of such blacklisted firms from Vijayawada:
  • In case you get suspicious about any solicited investment, please contact the police immediately by Dial 100 or contact Economic Offences Intelligence Wing at ……. We’ll verify and advise you free of cost.
  • Always remember:
    No firm can possibly give you return 1-2% more than the scheduled banks on a deposit.
  • Investment into shares/debentures/insurance linked units run their own risk. If you do not have knowledge of financial markets, do not invest just by following financial ‘advice’ dispensed by investment evangelists appearing on TV.
  • It is always safe to consult a financial consultant who works for a fee before you take decisions on your investment portfolio. Never trust free advice from unrelated individuals. It is always laced with hidden interests.

 

Cr. No: 131/10 U/s 420 IPC,4 & 5 OF APPDFE ACT 1999 of S.N.Puram PS:-

(UMA CHITS)

Occurred prior to 20.03.2010 at S.N. Puram and reported on 20.03.2010 at 14.00 hrs. in which, the complainant Budama Shankar s/o Raja Ratnam, 69 yrs. Vysya, Sri Ranga Residency, S.N. Puram reported that the accused Kanduru Uma Maheswara Rao s/o Subramanyam, 57 yrs. Brahmin running Uma Chit funds, collected amounts towards deposits and chits under inducements for prompt payment and after collecting amounts evaded repayment and cheated him to a tune of Rs.13,44,000/- with dishonest intention. The accused A-1 Kanduru Uma Maheswara Rao was arrested on 25.03.10 by C.I, CCS and sent for remand. On 13.04.2010 A-3 Kanduru Prakasham was arrested by C.I, CCS and sent for remand. A-4 Pidaparthi Bhadradri Sri Ramchandramurthy was arrested on 02.04.2010 by C.I, CCS and sent for remand. Case is UI for arrest of A-2 Kanduru Kanakadurga and for the examination of some more witnesses. The records and documents seized by the CI of CCS are to be verified. The other properties procured by the accused persons and his friends, family members have to be traced in order to recover the same in the interest of justice.

Cr. No: 133/10 U/s 420 IPC, 3,4,5OFAPPDFE ACT 1999 of S.N.Puram PS:-

(UMA CHITS)

Occurred prior to 22.3.2010 at S.N. Puram and reported on 22.3.2010 in which, the complainant Vellanki Jyothi Rani w/o Satya Hari Prasad, 56 yrs. Brahmaiah Pantulu street, S.N. Puram reported that the accused Kanduru Uma Maheswara Rao, Kanduru Kanaka Duga, Prakasam and Sri Rama Chandra Murthy being the Chairman and directors of Uma Chit Funds collected amounts towards deposits and chits under inducement of prompt repayment and later evaded repayment and cheated her to a tune of Rs.4,57,800/. A-1 Kanduri Uma Maheswarudu was arrested on 25.03.10 by C.I, CCS and sent for remand. On 09-04-2010, A1 was taken for Police custody for a period of 3 days. A3 Kanduru Prakasham was arrested on 13-04-2010 by CI CCS and sent for remand. A1 and A3 are released on Court bail in this case. A4 Pidaparthi Bhadradri Sri Ramchandra Murthy was arrested on 02-04-2010 by CI CCS and sent for remand. A2 is to be arrested and Some more witnesses are to be examined and Records, Documents seized by C.I CCS are to be verified.The other properties procured by the accused on the names of their family members and friends have to be traced and to recover the same in the public interest of Justice.

Cr.No:143/10 U/s 420,406 IPC 3,4,&5 OF APPDFE ACT 1999 of S.N.Puram PS:-

(UMA CHITS)

Occurred prior to 27.3.2010 at Kommu vari street and reported on 27.3.2010 at 22.30 hrs. in which, the complainant Varanasi Satyanarayana Sharma s/o V.V. Subba Rao, 56 yrs. Sri Nagar colony, Vijayawada reported that the accused Kanduru Uma Maheswarudu s/o Subramanyeswara Rao, 57 yrs. Kommu vari street, Satyanarayanapuram induced for prompt payment and collected amount towards deposit and later failed to repay amount and cheated him for a tune of Rs.88,00,000/- with dishonest intention. On 01.06.2010 the accused Kanduru Uma Maheswarudu was produced before the Hon’lble Court under PT Warrant. Case is UI for the examination of some more witnesses.

Cr. No: 163/10 U/s 420 IPC of S.N.Puram PS:-

Occurred prior to 11.4.2010 at Kommu vari street, Satyanarayanapuram and reported on 11.4.2010 at 10.30 hrs. in which, the complainant Arepaka Subba Rao s/o Nagabhushanam, 72 yrs. Viswa Brahmin, Siddhardha Nagar, Vijayawada reported that the accused Kanduri Uma Maheswar Rao, Malapaka Surya Prakasa Rao, Kalaga Veera Venkata Sirish Kumar induced for prompt payment and received an amount of Rs.2,60,000/- against promissory notes and later evaded payment and cheated him. On 01.06.2010 the accused Kanduri Uma Maheswarudu was produced before the Hon’lble court under PT Warrant. Case is UI for the examination of some more witnesses and apprehension of A-2 Malapaka Surya Prakasham and A-3. Kalaga Veera Venkata Sirish Kumar.

Cr. No: 183/10 U/s 420 IPC of S.N.Puram PS:-

(UMA CHITS)

Occurred prior to 19.4.2010 at Kommu vari street, S.N. Puram and reported on 19.4.2010 at 17.00 hrs. in which, the complainant Gunturu Srinivasa Murthy s/o G.L. Narasimham, 51 yrs. Papatla vari street, Gandhi Nagar reported that the accused Kanduri Uma Maheswarudu, Sri Rama Chandra Murthy, Prakasam, Kanaka Durga, Garlapati Seeta Rama Karunakar induced them for prompt payment and colluded with each other drafted some properties to the name of one Garlapati Seeta Rama Karunakar and cheated them with dishonest intention. On 01.06.2010 the accused Kanduri Uma Maheswarudu and A-3 Kanduri Prakasham were produced before the Hon’lble court under PT Warrant.Case is UI for the examination of some more witnesses and arrest of A-2, A-4 and A-5.

Cr. No: 184/10 U/s 420 IPC of S.N.Puram PS:-

(UMA CHITS)

Occurred prior to 19.4.2010 at Kommu vari street and reported on 19.4.2010 at 18.00 hrs. in which, the complainant Yandapalli Mogal Baba s/o Raja Rao, 42 yrs. S.N. Puram reported that the accused Kanduri Uma Maheswarudu, Kanaka Durga, Sri Rama Chandra Murthy collected amounts as deposits and purchased valuable properties and later colluded with other accused Male Nageswara Rao, Male Yogeswara Rao, Male Praveen Kumar, Penugonda Nalini Kumar drafted the properties on their name and cheated them with dishonest intention. On 01.06.2010 the accused Kanduri Uma Maheswarudu was produced before the Hon’lble court under PT Warrant. On 07.07.2010 the accuse A-8 kanduri Prakasham was also produced under PT warrant. Case is UI for the examination of some more witnesses and arrest of A-2 to A-7.

(UMA CHITS)


Safety in social networking sites

What are Social Networking sites?
Social networking sites, sometimes referred to as “friend-of-a-friend” sites, build upon the concept of traditional social networks where you are connected to new people through people you already know. The purpose of some networking sites may be purely social, allowing users to establish friendships or romantic relationships, while others may focus on establishing business connections.

What security implications do these sites present?

Social networking sites rely on connections and communication, so they encourage you to provide a certain amount of personal information. When deciding how much information to reveal, people may not exercise the same amount of caution as they would when meeting someone in person because

  • the internet provides a sense of anonymity
  • the lack of physical interaction provides a false sense of security
  • they tailor the information for their friends to read, forgetting that others may see it
  • they want to offer insights to impress potential friends or associates

While the majority of people using these sites do not pose a threat, malicious people may be drawn to them because of the accessibility and amount of personal information available on them. The more information malicious people have about you, the easier it is for them to take advantage of you. Predators may form relationships online and then convince unsuspecting individuals to meet them in person. That could lead to a dangerous situation. The personal information can also be used to conduct a social engineering attack. Using information that you provide about your location, hobbies, interests, and friends, a malicious person could impersonate a trusted friend or convince you that they have the authority to access other personal or financial data.

How can you protect yourself in Social Networking sites?

  • DO NOT SUBSCRIBE TO A SOCIAL NETWORK SITE UNLESS AND UNTIL YOU KNOW HOW IT OPERATES.
  • Limit the amount of personal information you post – Do not post information that would make you vulnerable (e.g., your address, information about your schedule or routine).
  • Remember that the internet is a public resource – Only post information you are comfortable with anyone seeing. This includes information in your profile and in blogs and other forums. Also, once you post information online, you can’t retract it. Even if you remove the information from a site, saved or cached versions may still exist on other people’s machines
  • Beware of strangers – The internet makes it easy for people to misrepresent their identities and motives. Consider limiting the people who are allowed to contact you on these sites. If you interact with people you do not know, be cautious about the amount of information you reveal or agreeing to meet them in person.
  • Be skeptical – Don’t believe everything you read online. People may post false or misleading information about various topics, including their own identities. This is not necessarily done with malicious intent; it could be unintentional, a product of exaggeration, or a joke. Take appropriate precautions, though, and try to verify the authenticity of any information before taken any action.
  • Check privacy policies – Some sites may share information such as email addresses or user preferences with other companies. This may lead to an increase in spam. Also, try to locate the policy for handling referrals to make sure that you do not unintentionally sign your friends up for spam. Some sites will continue to send email messages to anyone you refer until they join.

How to protect your children in Social Networking Sites

Children are especially susceptible to the threats that social networking sites present. Although many of these sites have age restrictions, children may misrepresent their ages so that they can join. By teaching children about internet safety, being aware of their online habits, and guiding them to appropriate sites, parents can make sure that the children become safe and responsible users.

A Parent’s Guide

Social networking sites can be as dangerous as answering the door to a stranger and you need to educate yourself on how to keep your child safe on networking sites.

Please read the following tips to help your kids use social networking sites safely

  • Help your kids understand what information should be private.
  • Explain that kids should post only information that you – and they – are comfortable with others seeing.
  • Use privacy settings to restrict who can access and post on your child’s website.
  • Remind your kids that once they post information online, they can’t take it back.
  • Talk to your kids about avoiding sex talk online.
  • Tell your kids to trust their gut if they have suspicions.
  • If they ever feel uncomfortable or threatened by anything online, encourage them to tell you.
  • Review your kid’s friends list frequently
  • Keep the computer in open area in the home so that you can see what your children are surfing.
  • Try to understand the privacy policy of each site.