Saturday, December 29, 2007

Will you be the next person arrested after a criminal borrows your identity?

With new Social Security verification laws on the horizon, up to 20 million illegal aliens are probably will have to come up with a legitimate identity in order to remain employed.

Up until now, anyone has been able to make up a number and pass it off with false identification. DHS (Department of Homeland Security) was supposed to begin going after businesses that employed people with "no match social security numbers" in September, but a law suit has temporarily blocked them from implementing the process.

Interestingly enough, one of the arguments is that Social Security records aren't accurate enough to ensure mistakes won't be made. This is probably a "no brainer" defense with all the fraud that exists with social security numbers.

Given that a lot of illegal immigrants look Hispanic, a lot of them will probably seek out legitimate identities of U.S. citizens with Hispanic surnames.

Hidden within the camoflauge that illegal immigration creates is a lot of criminal activity. When another person's identity is used to commit a crime, there is a potential that they are going to face more than financial problems after becoming a victim.

Here is a scary story -- possibly a premonition of things to come -- of a senior U.S. citizen, who obviously had his identity stolen by a criminal. The story also reveal why relying on social security numbers to identify people might lead to mistakes being made.

Eloisa Ruano Gonzalez of the Yakima Herald-Republic wrote:

It seemed like a bad dream when 72-year-old retiree Rafael "Ralph" Franco woke up to a loud pounding on his front door, opened it, and found four federal agents waiting to seize him.

The longtime Yakima resident was arrested about 6 a.m. on Nov. 28 at his South Second Street apartment. Immigration officers believed that Franco, a U.S. citizen, was an undocumented immigrant convicted of several alcohol- and weapon-related crimes.

Of course, Hispanic identities aren't the only ones used by criminals. In fact, there are more and more reports of innocent people being charged with crimes after a criminal assumes their identity, commits crimes and disappears into the mist after making bail or being released because the jail is full.

The issue of people wrongfully getting arrested because they are suspected of illegal immigration is probably only one small part of the overall problem.

Stealing personal and financial information and putting it on counterfeit documents has become an organized activity. I was recently in the Mission District of the sanctuary city of San Francisco and full sets were being offered, along with a variety of drugs for as little as $200.00. A full set is normally a drivers license, Social Security and green card.

Please note, I've personally seen this activity in other cities besides San Francisco. It's pretty much out in the open and little to nothing seems to be done about it.

Suad Leija -- the stepdaughter of the "Jefe" of an organized counterfeiting cartel --recently provided evidence to the government that counterfeiting documents is an extremely organized enterprise, which operates across the entire United States.

One of the more ironic things Suad was able to show the government was proof of her Uncle serving a prison sentence in Texas under an assumed name.

There is also considerable evidence that hackers have already stolen millions (billions?) of people's information and sell it pretty openly in anonymous Internet venues.

Put these two organized activities together and they will likely easily defeat any legislation requiring Social Security numbers to match.

I started this post with an observation about Hispanic identities being targeted, but the truth of the matter is that the 20 million or so illegal immigrants seeking legitimate identities is only one small part of a bigger problem. Even if the problem were simply related to illegal immigration -- people of Hispanic origin aren't the only ones crossing our borders illegally.

Figuring out exactly what country an illegal immigrant came from is difficult. Most of them aren't likely to reveal very many personal details. I was able to find a rather outdated study from DHS.gov that reveal some old statistics on the matter:

In October 1996, 15 countries were each the source of 40,000 or more undocumented immigrants (See Table 1). The top five countries are geographically close to the United States--Mexico, El Salvador, Guatemala, Canada, and Haiti. Of the top 15 countries, only the Philippines, Poland, and Pakistan are outside the Western Hemisphere. The estimated undocumented population from Poland has declined by more than 25 percent, from 95,000 to 70,000, since 1988, possibly reflecting changed conditions in that country over the last several years.
Sara Carter of the Washington Times did an article in August about a report she saw from the DEA (Drug Enforcement Administration) that people of Middle Eastern/South Asian descent were posing as Hispanics. The article alleged that a partnership was being formed by something they have in common, or trafficking narcotics.

Even with NATO having boots on the ground in Afghanistan, opium production is at an all time high. Most of this is allegedly being bought by the Taliban, who now seem to operate pretty freely from the tribal areas in Pakistan.

Criminals trafficking narcotics aren't the only ones using false identities. In fact, more and more, the use of false (other people's) identities is being used to facilitate all kinds of criminal activity.

Identity theft may very become the great facilitator (enabler) of more and more crime. If criminals are able to get away with using someone else's identity, we are going to see a lot of more people victimized.

As long as we continue to consider identity theft a "low priority issue," it will continue to grow and multiply like a cancer.

The bottom line is that until we start addressing the factors that make enable stealing and using information too easy, we aren't going to fix the problem.

Doing this is going to take the cooperation of everyone from the average citizen to executive types in major corporations and our leaders in government.

Yakima Herald-Republic story, here.
0 comments

Thursday, December 27, 2007

Symantec awarded $21 million award against Chinese Software Pirates

On Christmas Eve, Symantec announced a legal victory against Chinese pirates selling their cloned software at super cheap prices.

Please note, I stole the super cheap description from Symantec's video called, The 12 days of Christmas Spam." The super cheap tag can either refer to price, or the quality of counterfeit software (personal thought).

From the press release:

Symantec Corp. (NASDAQ: SYMC) today announced that it was awarded $21 million in damages against a large network of distributors selling counterfeit Symantec software.

The judgments were handed down by the United States District Court for the Central District of California in Los Angeles, CA in favor of Symantec against ANYI, SILI Inc., Mark Ma, Mike Lee, John Zhang, Yee Sha, and related defendants.

"Our customers are the real winners as a result of this case," said Scott Minden, director, Symantec Legal department. "A judgment like this is a crippling blow against these particular syndicates and will drive them even further underground, making it more difficult for them to sell directly to unsuspecting users. It complicates their ability to operate behind the guise as legitimate businesses."
The investigation conducted by Symantec in collusion with the FBI and Chinese authorities also led to some criminal charges being filed in China.

It appears that this particular case involved pirated software being made to appear as if it was the real deal. According to industry experts, the counterfeiting problem has increased 10,000 percent in recent history.

The software industry alone estimates it loses $40 billion a year because of pirated software. I wonder how many jobs this equates to?

Pirated (super cheap software) is also hawked via the millions (billions?) of spam e-mails attacking our in boxes in record amounts. Recently, Symantec issued a report based on the spam data they monitor revealing that over the current holiday season 71percent of all e-mail sent is spam.

Counterfeit software also can contain malware (malicious software), which can lead to your system becoming a zombie (part of a botnet to facilitate more spam) and even steal your personal and financial details. These details are then used to steal money either from you directly, or to steal money from financial institutions.

I'm sometimes amazed how a lot of current criminal activity ties in together via the digital world. All the average person needs to do is to watch all the spam messages they get and consider all the different schemes that are behind them. The schemes are nothing new, but the digital age has enabled criminals to reach out to more people than ever before.

Either this is occurring naturally, or someone pretty organized people are running operations along the lines of major corporations?

Besides the more personal dangers of buying pirated software, there is a lot of evidence the activity is making a lot of money for organized crime, rogue governments and terrorist groups, alike.

Press release from Symantec, here.
0 comments

Tuesday, December 25, 2007

Storm Worm bot-herders use scantily clad women in Santa attire to recruit zombies!

Here is a warning from Dancho Danchev about a site that might leave your computer with a worm.

The site invites a person to watch a bunch of scantily clad women in Santa attire for "free."

From the Mindstreams of Information blog:

Stormy Wormy is back in the game on the top of Xmas eve, enticing the end users with a special Xmas strip show for those who dare to download the binary. The domain merrychristmasdude.com is logically in a fast-flux, here are some more details :

Administrative, Technical Contact
Contact Name: John A Cortas
Contact Organization: John A Cortas
Contact Street1: Green st 322, fl.10
Contact City: Toronto
Contact Postal Code: 12345
Contact Country: CA
Contact Phone: +1 435 2312633
Contact E-mail: cortas2008 @ yahoo.com

In case you are less than technically astute (a lot of us are) the storm worm has been around for awhile. Wikipedia offers a good explanation of how it will trash a Windows system, here.

Downloading it normally leads to your computer becoming a spam spewing zombie controlled by a bot-herder. Of course, becoming infected also poses certain information theft risks, also.

Full post from Dancho, here.


(Screen shot courtesy of the Mindstreams of Information blog)

Update:

Found some more information on this on the SANS Internet Storm Center, which can be seen, here.

And apparently some splogs have been set up on blogspot to support this current storm on the Internet:

If you google for merrychristmasdude.com you'll see a number of spam blogs set up with that domain in their body and directing traffic to siski.cn (take a look for that in your proxy logs while you're at it.)

Visiting skiski.cn will redirect you over to shockbabetv.com and attempt to install a fake video codec, which itself appears to be a downloader to deliver more coal to your stocking.
IT also appears that the hackers behind this are moving on to New Years lures and a new domain.

Shortly before 1600 GMT 25-DEC-2007 we got a report indicating that the Storm Botnet was sending out another wave of attempts to enlist new members. This version is a New Years-themed e-card directing victims to "uhave post card.com." (spaces inserted to break the URL) NOTE: Please do not blindly go to this URL -- there is malware behind it.

Also reported SANS Internet Report Center, here.
0 comments

Sunday, December 23, 2007

Could buying that knock-off item fund the next terrorist attack?

While this story is from a British perspective, it reveals how the trade in counterfeit (knock-off) merchandise is funding some pretty nasty characters beyond the borders of the British Isles.

Richard Elias recently revealed in Scotland on Sunday:

The sale of fake CDs, DVDs, clothing and perfumes in Glasgow and other British cities is helping to raise money for one of the world's most-notorious terror outfits – the group held responsible for the slaughter of US journalist Daniel Pearl in 2002.

MI5 is now targeting British-based supporters of Jaish-e-Mohammed (JeM), a pro-Kashmiri group dedicated to gaining the disputed territory its independence. Its aims include the "destruction" of the United States and India.

This isn't the first time the words terrorist organization and counterfeit merchandise have been used in the same sentence. And in reality, the problem goes far beyond the borders of the United Kingdom.

A good video about the counterfeit problem by KRQE in New Mexico is posted on YouTube, which can be seen, here.

The video references a report by the IACC (Internation Anticounterfeiting Coalition). The IAAC stated in a white paper that:

Low risk of prosecution and enormous profit potential have made criminal counterfeiting an attractive enterprise for organized crime groups. Congress recognized organize crime’s increasing role in the theft of intellectual property when it made trademark counterfeiting and copyright piracy predicate acts under the federal RICO statute (see 18 U.S.C. § 1961). Recently, ties have been established between counterfeiting and terrorist organizations who use the sale of fake goods to raise and launder money.

Counterfeiting is becoming a worldwide problem that poses a threat to the economy and public safety. Unfortunately, a lot of people view it as a victimless crime and continue to support it by purchasing knock-off merchandise.

If you take the time to read the IAAC White Paper, it also reveals that a lot of countries that we do business with in the global economy are some of the biggest culprits.

And the biggest offender seems to be China!

This should be no surprise considering the amount of unsafe product being found at your local store coming from that country.

While there are obviously more players in all of this than terrorist organizations, supporting any of them with our business isn't in the public's best interests.

IAAC White Paper, here.

Scotland on Sunday story, here.
0 comments

Are Internet Check Scam Artists staging a December Surge?


(Picture of counterfeit financial instruments recently intercepted in the mail by an International law enforcement task force)

In the past several days, I've noticed a surge in counterfeit check alerts from the FDIC (Federal Deposit Insurance Corporation). From December 19th to the 21st, the FDIC issued 26 alerts from various financial institutions throughout the United States reporting counterfeit activity using their information.

These checks are used in all the different varieties of overpayment scams. The basic MO (method of operation) in these scams is to trick someone into negotiating a bogus financial instrument and sending the money back to the person behind the scam. The victim is offered a small part of the money for doing this.

Of course, they are held liable for all of it when the item is discovered to be fraudulent.

Some of the known varieties of the overpayment scams are the lottery, auction, secret shopper, romance and work-at-home (job) scam(s). Please note you can search any of these "scam" terms at the top of this page for more information.

Spam e-mail is normally the vehicle in which these scams are presented, however they show up in more traditional print venues (including junk mail) from time to time, also.

One thing to bear in mind is that counterfeit checks (cheques) often appear to be legitimate in verification systems. The reason for this is simple, they use legitimate account numbers.

Victims have even asked employees at their financial institution of choice if the instrument was legitimate. Sadly, the items are often so good that the person is told that they are real. A financial institution employee verifying an item offers you no guarantee that the item is good. The person passing the instrument is the one who is liable for it.

Another tricky thing is that many financial institutions will also give their customers credit for these items in their accounts. This often gives the victim a false sense of security and causes them to send the money back to the scammer before realizing what is going on.

Federal rules dictate that banks can only put holds for a specified period of time depending on what type of check it is. The people behind the scams know about this and take advantage of it.

Although the money can be sent in a lot of different ways, most scammers prefer the use of Western Union, or MoneyGram wire transfer services. The reason for this is once the money is picked up (often within minutes), there is no recourse for the person who sent it.

Besides counterfeit checks, we've seen other instruments counterfeited on an industrial scale and sent to unsuspecting people, also. The known items in circulation are have included Postal Money Orders, Travelers Express (MoneyGram) Money Orders, American Express Gift Cheques and Visa Travelers Cheques.

The end result of these scams is that the person negotiating the item will be held financially liable. People are also getting arrested in certain circumstances for passing these items, also.

The National Consumers League recently set up a site (fakechecks.org), which is a great reference on Internet scams involving checks (complete with visual presentations), here.

Here is a post, I wrote with more information on how to verify one of these items:

Tools to verify those too good to be true financial instruments you got in the mail

Please note that if the deal you are being presented is too good to be true, or you are being asked to wire money it probably isn't worth going to the effort of trying to verify the item.

Also note that these scams have become so sophisticated that there is no guarantee that any amount of verification can guarantee the item is legitimate!
0 comments

Friday, December 21, 2007

$500 reward for eBay pirates selling super cheap (counterfeit) software

The Software & Information Industry Association is willing to pay up to $500.00 to anyone, who inadvertantly buys pirated software off an auction site.

Software piracy is a huge problem. The International Anticounterfeiting Coalition estimates that counterfeiting is a $600 billion a year problem. They also estimate that the problem has grown 10,000 percent in the past two decades.

More specific to the counterfeit software part of the all of this was revealed in a Business Software Alliance (BSA) and IDA white paper released in May estimating the problem at $40 billion a year.

Pirated software might not work as well as it is supposed to and it might even contain malicious software, which is often referred to as crimeware. The person, who puts this on their system is likely to have all the personal and financial details stolen and become an identity theft statistic.

Microsoft has a site to help consumers identify counterfeit software. Earlier this month, they filed 52 lawsuits and referred 22 cases for criminal investigation based on an investigation -- jointly conducted with the FBI and Chineses authorities -- into a counterfeiting syndicate based out of China.

Microsoft has also worked with eBay and information is also available on their site on how to avoid buying counterfeit software, here.

A lot of pirated software is sold on auction sites. The Software & Information Industry Association (SIIA) has launched a campaign to go after this problem on auction sites because they believe a lot of auction consumers are being defrauded when pirated software is sold as the real McCoy.

From the SIIA press release on this campaign:

“The sale of pirated software doesn’t only hurt the software industry,” said Keith Kupferschmid, Senior VP Intellectual Property Policy & Enforcement. “It also hurts consumers. Consumers feel “taken” when they buy software, only to find out when it arrives that the software is a fake -- they did not get an instruction manual or can’t get support from the software company. The Don’t Get Mad, Get Even program is a way for unsuspecting buyers to get even with auction sellers who rip them off by selling them counterfeit software.”

SIIA press release on reward, here.

Counterfeiting is a huge problem which hurts economies (takes jobs) and funds organized criminal and some say (terrorist?) activity. It also puts the person, who inadvertantly buys it at a fair amount of personal risk. Everyone can help fight it by reporting it to the SIIA, or the other links I've included in this post.

Despite what some people believe, counterfeiting is far from a victimless crime!

SIIA home page, here.

BSA and IDA white paper on counterfeit software, here.
0 comments

Wednesday, December 19, 2007

MyTruston points out the two most important TIPS to protect your identity this season!

Tom Fragala at MyTruston wrote an interesting post about the two most important things to do during the season to avoid having a grinch (identity thief) ruin it for you.

From the MyTruston blog:

There are a lot of lists about identity theft flying around this time of year. 12 tips of Christmas, top 10 ways to protect yourself from identity theft...that kind of thing.

Well, to save you time and keep things simple (less is better), I am going to boil it all down to two tips that most of you probably already do. But please, make sure you are diligent in keeping up on these.
Can you guess what they are? In case you aren’t sure, I’ve provided a link so you can see if you were right.

MyTruston, the first identity service that doesn’t require that you compromise your personal information is growing, also. Yesterday, they announced a partnership with Trend Micro Systems, a leading provider of security software.

MyTruston is offering their identity theft service on a free 90 day trial if you purchase a gift card from Trend Micro Systems. The gift card also offers a nice discount on their much talked about software.

The nice thing about the free trial period is that you don’t have to worry about forgetting to cancel the deal and having your credit card “crammed” with recurring charges.

I'm frequently amazed at who some of the companies are that employ this marketing practice (cramming).

Another nice thing about the MyTruston service is that the prevention part of the service has always been free and you only pay for the recovery services.

If you were to shop around, I think you would find it is the best value in the growing field of paid identity theft protection services.

And when spending your hard earned money, it always pays to check around.
0 comments

Friday, December 14, 2007

Symantec reveals how the spammers are trying to steal Christmas

Kelly Conley announced the Christmas edition of Symantec's spam report on the company blog:

Here we are the end of another year. As 2007 rolls to a close the December State of Spam Report reviews this past month’s key trends and reflects on some of the year’s most notable spam events and trends.
The report notes that Bill Gates' prediction in 2004 that spam would be eradicated has proven not only to be wrong, but that the amount of spam circulating on the Internet has exceeded everyone's expectations (nightmares?).

This month, three out of every four e-mails sent is spam!

Spammers are even using MP3s, videos, and Google's alerts/searches to spread their seedy marketing ventures to Internet users.

Here are some of the highlights of the end-of-year report:

• Penny stocks use Thanksgiving holiday captions in subject line – spammers using common personal Thanksgiving-related words in the subject of emails

• Replica products a favorite for spammers this holiday season – replica gear has always been a spammer favorite. Spammers are marketing their wares using seasonal words in the subject lines of their mailings

• Spam begins to snowball – spammers collecting email addresses by using a funny .gif that shows a snowball hurtling at you through your computer

• Christmas freebie anyone? – spammers taking advantage of the season to market "free" gift cards for well known companies

• Seasonal lotto scams - in a scam targeted at UK end users, spammers have updated a lottery spam email for a Christmas Bonanza special

The current interest in celebrities like Britney Spears, Lindsay Lohan and the Osmonds were used as lures to get people to open spam e-mails hawking "questionably safe" drugs.

Spammers use whatever is trendy, popular or in the news to trick people into clicking on them. Here is one of the sicker examples of this seen recently:

An attack this month preyed on the public interest in the story of the missing British child, Madeleine McCann. The email contained a link to http://madeleine2007.notlong.com/, which redirected to http://internetwonderful.com/madeleine. The second site is designed to look similar to the official McCann family site, www.findmadeleine.com, however, it actually is set up to distribute a virus. The site also contains an unauthorized use of the Symantec logo and a number of Google ads for anti-virus products.

It should be noted that although the spam email also contains a link to the legitimate findmadeliene.com site, there is no connection between the spammers and the genuine site.

The report concludes it's findings with recognition of anti-spam efforts during the year, such as the FBI's Operation Bot Roast, the SEC's Operation Spamalot, ISP's sharing more information and security vendors employing new spam filter technologies.

We need to remember that spam is the vehicle used to spread 99.9 percent of the questionable marketing and scams on the Internet. Clicking on a spam e-mail can cause a person to become victim of anything from a financial scam to using a unsafe product that is a threat to their personal safety.

These reports serve a purpose, which is to educate the average person on what to watch out for and not click on a spam e-mail in the first place. Since it's Christmas and a lot of us are thinking about the young people in our lives, perhaps this is a good time to educate them on the growing problem of spam on the Internet!

I meet a few older people from time to time that might benefit from the education process, also.

Kelley Conley's blog post announcing the December report, here.

Symantec's December (year end) report on the state of spam, here.

On a lighter note, here is the YouTube video on the 12 days of Christmas Spam:

0 comments

Thursday, December 13, 2007

Counterfeit Visa Travelers Cheques in circulation!

Counterfeit financial instruments are circulated in a variety of Internet scams. The ploy is always to get someone to cash them and then wire the money back to the person behind the scam.

In the past couple of weeks, readers and other sources have brought to my attention that counterfeit Visa Travelers Cheques are in circulation.

Visa has provided resources to identify these instruments.

You can call them at 1-800-227-6811 to verify an item. This can also be done on-line, here.Visa also has a good interactive tool to identify the security features of the Visa Travelers Cheque, here.

The trick is to ALWAYS verify them before you negotiate them using your good name!

Some of the scams being used to trick people into cashing these items are known as work-at-home (job) scams, secret shopper, romance, lottery and auction scams.

A collective name for all of these scams that ask you to cash an item and send the money back to the scammer is called the advance fee (419) scam.

A lot of the sites dedicated to fighting scams are also seeing an alarming trend, which is that people are getting arrested for attempting to cash these items.

I recently had a conversation with the fine folks over at FraudAid about this trend.

A great (new) resource about all the counterfeit paper being circulated is FakeChecks.org.

People, who fall for these scams do so because they are lured with something that is too good to be true. The old saying is that if it is "too good to be true, it is NOT!"

Here are some other counterfeit instruments, I written about that are still in circulation:

Counterfeit MoneyGram Money Orders being passed via Internet Scams

Counterfeit Cashier's Checks Fuel Internet Crime

American Express Gift Cheques Being Circulated in Internet Scams

Counterfeit Postal Money Orders Showing Up in IScams Again

Here is a picture of counterfeit Visa Travelers Cheques that were sent to someone about a week ago. They were sent from the United Kingdom, however the scammer wanted the money wired to Nigeria.


(Photograph courtesy of Raleigh)
0 comments

Tuesday, December 11, 2007

Human beings are the reason for most security breaches!

If you think phishing is merely a financial crime, think again. Eleven employees at a nuclear research facility fell for a phishy e-mail, which appears to have been an attempt to steal information.

The New York Times reported:

A cyber attack reported last week by one of the federal government’s nuclear weapons laboratories may have originated in China, according to a confidential memorandum distributed Wednesday to public and private security officials by the Department of Homeland Security.

Although the article suggests China may behind this attempt, the article suggests they have plausible deniability:

Security researchers said the memorandum, which was obtained by The New York Times from an executive at a private company, included a list of Web and Internet addresses that were linked to locations in China. However, they noted that such links did not prove that the Chinese government or Chinese citizens were involved in the attacks. In the past, intruders have compromised computers in China and then used them to disguise their true location.

I guess it might have been a host of undesirables trying to steal this information. A lot of Internet misfits redirect through China to do their misdeeds on the Internet.

What's scary is that eleven employees at a Nuclear Research Facility clicked on a phisy e-mail and compromised sensitive material.

I recently wrote a post, where an official government audit revealed that 60 percent of IRS employees tested fell for a vishing scheme and gave up sensitive information.

Vishing is stealing information by telephone.

It was recently announced that private investigators are being indicted for vishing infomation in an illegal manner, sometimes referred to as pretexting.

All of these events would suggest that businesses and government organizations have a big opportunity when it comes to raising employee awareness on social engineering schemes that are used to compromise sensitive information.

IT also illustrates that human beings are the common cause for most breaches of security!

New York Times article, here.

Here are the two previous posts on the IRS vishing test and the indictment of private investigators for using social engineering techniques:

IRS audit reveals that the human factor is one the greatest threats to information (computer) security

Private Eyes charged with aggravated identity theft
0 comments

Monday, December 10, 2007

SIRAS offers guarantee that it will reduce retail crime

The reason SIRAS' product registration and smart return service perked my interest is because it protects people's privacy and is an effective means of reducing losses.

SIRAS tracks an inanimate object (merchandise) instead of a customer's personal information.

Now they are now offering a "guarantee" the technology will add dollars to a organization's bottom line by reducing fraudulent returns.

In their own words from the press release regarding this matter:

Electronic Product Registration, is putting its money where its mouth is with a unique Return On Investment (ROI) Guarantee for any company using SIRAS’s product registration and Smart Return service to manage their product returns and warrantees. The program, designed to eliminate any risk for companies interested in implementing SIRAS’s technology, guarantees that over the course of a year companies will save more money through deflected product returns than it spends in transaction fees.

In case you haven't had to refund any merchandise in a long time, most retailers require you to give them your personal statistics before they approve your return.

This information is all maintained in a database, where it might be exposed to a hacker, or probably more frequently, dishonest employee. Information is worth a lot of money to anyone, who knows where to sell it.

A dishonest Certegy employee recently got caught selling 8.5 million people's information to an undisclosed data-broker. Since the mysterious data-broker still hasn't been identified -- despite being listed as a co-conspirator in court filings -- we really aren't sure where these records went?

Certegy provides check verification services for a lot of merchants.

Personal and financial information is marketed in carder forums (chat rooms) on the Internet. Anonymous payment methods, such as wire transfers, PayPal and eGold add to the problem. They make it relatively easy to buy and sell stolen information.

It also isn't unknown for criminal organizations to plant, or recruit employees to steal information from within an organization.

The press release quotes Peter Junger (SIRAS CEO) as saying, "And in all cases, regardless of ROI, clients retain all of the valuable POS data collected."

This POS data also serves another important purpose. If the merchandise is found in a fencing operation, or on an auction site, it can still be tracked to the point-of-compromise.

This opens up opportunities to recover stolen merchandise and makes it more dangerous for the criminals fencing it.

Mesa Police Department tested these capabilities with SIRAS and FOX News did a story on it, which can be seen, here.

The technology, when deployed properly with a point-of-sale system can also identity fraudulent means of tender used to purchase merchandise.

SIRAS technology can be deployed by a merchant, or at the factory, itself.

They already makes their database available to law enforcement free-of-charge.

With all the identity theft and counterfeit ID available, using SIRAS reduces the possibility that an innocent customer will be wrongfully identified as an "undesirable" in a refund database.

Saying that, who knows how much of the information in these databases is one-hundred percent accurate anymore? With retail crime becoming more and more organized, the possibility exists that it is NOT.

One of the systems targeted in the TJX data-breach was their refund database. The information in this database is probably worth more than simple financial information because it contains the elements necessary to assume a person's identity.

It's relatively easy to shut down a bank account, or credit card number. Once a person's statistics are compromised, they can be at risk of identity theft for a long time.

Data breaches are becoming more expensive. TJX claimed a loss of $118 million in their second quarter earnings. Estimates vary widely on exactly how expensive data-breaches will become, but everyone agrees the cost of them is going up.

SIRAS seems more effective in resolving property crimes because it tracks the property, itself. It also protects customer privacy and protects a merchant from becoming the victim of a data-breach.

I doubt that SIRAS would make this guarantee if they weren't absolutely certain of the results. If they were wrong, I doubt they would be in business very long.

Press release from SIRAS, here.
0 comments

Saturday, December 8, 2007

FTC tutorial on how to protect sensitive business information

The FTC has released a training tool designed to help businesses protect sensitive information, which might be stolen to commit identity theft or fraud.

After taking a look at it, I found it to be simple, straight forward and effective way for a business to evaluate how well they are protecting information.

From the FTC release on this new tool:

Protecting the personal information of customers, clients, and employees is good business. The Federal Trade Commission has a new online tutorial to alert businesses and other organizations to practical and low- or no-cost ways to keep data secure.

The tutorial, “Protecting Personal Information: A Guide for Business,” at www.ftc.gov/infosecurity, takes a plain-language, interactive approach to the security of sensitive information. Although the specifics depend on the type of company and the kind of information it keeps, the basic principles are the same: any business or office that keeps personal information needs to take stock, scale down, lock it, pitch it, and plan ahead. The tutorial explains each of these principles, and includes checklists of steps to take to improve data security.

The tutorial supplements brochures, slide presentations, and articles on information security already on the Web site and available from the FTC for free. The agency is encouraging businesses and other organizations to share this important information with employees who handle personal information such as Social Security numbers, credit card numbers, financial account numbers, and other sensitive personal information.
Interestingly enough, I just did a post on a new report released by the IT Compliance Policy Group. Their findings were the organizations that suffer the fewest incidents of information theft have a few things in common, which is they keep their programs simple, and pick out the most critical items with a focus on risk. The organizations with the fewest incidents of data theft inspect these critical items more frequently, also.

The FTC tutorial gives some great guidance on how to identify the most critical items that are risk focused in an organization.

Common sense often is the best way to approach ensuring competent security.

Materials can be ordered for presentation purposes by following the link listed in the press release.

FTC press release, here.

A video presentation of this infomation can be seen, here.
0 comments

Private Eyes charged with aggravated identity theft

This isn't the first time private investigators have been caught using social engineering techniques to steal personal information. The Hewlett Packard case raised caused quite a bit of uproar about this last September.

Here is another case involving private investigators using illegal techniques to data mine information for their clients:

Ten people were indicted by a federal grand jury in Seattle in connection with a scheme to illegally obtain confidential information on more than 12,000 citizens across the country. To obtain confidential tax, medical and employment information, workers at BNT Investigations in Belfair, Washington, would pose as another individual to get government agencies including the IRS, the Social Security Administration, and various state employment security offices to provide confidential information. The year-long investigation dubbed, “Operation Dialing for Dollars,” also revealed that some workers posed as representatives of doctors’ offices to get medical or pharmacy records.
The private investigators used "pretexting," which is a social engineering technique designed to trick people into giving up personal and financial information. Criminals use the same technique to steal people's identities.

In fact, phishing, where an e-mail is sent impersonating a trusted or authority figure with the intent of stealing personal information is a form of "pretexting."

In this case, we might term what these private eyes did as "vishing," which is phishing using the telephone.

It appears that the U.S. Attorney's office agrees that this is little difference in the techniques used by these private eyes and is charging them all with aggravated identity theft.

The ten defendants are charged with Conspiracy and Wire Fraud. Seven of the defendants are charged with Fraudulent Elicitation of Social Security Administration Information. Six of the defendants are charged with Solicitation of Federal Tax Information. All ten defendants are charged with Aggravated Identity Theft. The three Washington defendants are scheduled to appear in U.S. District Court in Tacoma at 2:30 today.

These are the defendants indicted by the grand jury:

EMILIO TORRELLA, 36, Belfair, Washington
BRANDY N. TORRELLA, 27, Belfair, Washington
STEVEN W. BERWICK, 22, Belfair, Washington
VICTORIA J. TADE, 52, San Diego, California
MEGAN OSOSKE, 40, Beaverton, Oregon
DARCI P. TEMPLETON, 55, Houston, Texas
ESAUN G. PINTO, Sr., 33, Brooklyn, New York
PATRICK A. BOMBINO, 58, Brooklyn, New York
ROBERT GRIEVE, 67, Houston, Texas
ZIAD N. SAKHLEH, 26, Houston, Texas

The Torellas, who own BNT investigations, allegedly are the "phishy-investigators" who were selling this illegally obtained information to their peers nationwide.

The private investigators had been hired by attorneys, insurance companies and collection agencies to investigate the backgrounds of opposing parties, witnesses and benefit claimants, and to uncover assets or income. The TORRELLAs promoted their services to the private investigators.

BNT investigations targeted financial institutions and government agencies to get the information they were selling.

This makes me wonder how much the people paying for these services knew and to what extent they might be held liable?

Although, it doesn't appear that more sophisticated spying (identity theft?) techniques were used in this case, in the Hewlett Packard case investigators dropped software (malicious?) on computer systems to monitor the people they were "investigating."

Press release from the Western Washington U.S. Attorney's Office, here.
0 comments

Friday, December 7, 2007

Has hacking become too easy? Ask the child predator who just got 110 years for doing it!

Here is a hacker, who ended up in a lot of trouble after using malware to blackmail underage girls into creating pornography of themselves. The problem is it was probably a little too easy for him to obtain the tools, he used to pull his "hack" off!

This leads me to be slightly cynical that putting one person behind bars for 110 years is going to solve the overall problem, we are facing with the irresponsible use of technology.

Picked up this up from Sharon Gaudin (Computer World) courtesy of the NY Times:

A North Carolina man last week was sentenced to 110 years in prison after admitting that he and a co-conspirator hacked into computers used by young girls and used illicitly gained data to blackmail them.

Ivory D. Dickerson, 33, a civil engineer, admitted that he conspired with the other person to send emails or instant messages to underage girls as part of a scheme to trick them into opening a file containing the Bifrost trojan horse. The malware would give Dickerson and his co-conspirator control over the victim's computer, and they tried to use hacked information to coerce the girls into creating and then electronically sending them lurid photos of themselves, prosecutors said.

Dickerson used all the normal techniques to monitor his victims, such as keylogging software. He also had a tool, which enabled him to hack into web cameras and record what was going on.

This concerned me from a privacy perspective so I decided to see what would pop-up if I Googled "hacking webcams." To my utter amazement, I found some shocking results, which are pretty scary.

In fact, one site has a tutorial on how to hack webcams, using a Google search string.

In most instances, this can be prevented by password protecting whatever camera system you install.

Please note that criminals could use your cameras against you in a variety of ways that threaten both your privacy and safety.

Going back to the article about our hacker using BiFrost malware, a Sophos rep is quoted as saying:

The Bifrost malware, "is relatively easy to obtain," said Richard Wang, manager of SophosLabs U.S. "It's not something you need to pay for. Since we first saw it in April of 2005, we've seen over 1,200 different versions of this Trojan. The guys who write them are always trying to put up new versions to hide them from anti-virus software."

I'm guessing that Mr. Wang means the malware can be obtained from one of the hacking forums that seem to be out there (pretty easy to access) on the Internet.

So far as Mr. Dickerson, lock him up and throw the key away, preferably on a deserted island. Saying that, here is yet another example that it doesn't take a whole lot of skill to be a hacker nowadays. In fact, it seems to be a little too EASY!

It's a shame that parents now have to become computer security experts to ensure the safety of their children. Maybe the answer is to take a hard look at all the enabling factors we seem to see too much of these days?

ComputerWorld article (courtesy of the NY Times), here.

Fox News has a pretty telling video about the subject of webcam hacking, which can be seen, here.
0 comments

Thursday, December 6, 2007

Word of mouth is fraud's worst enemy!

FraudAid, a website dedicated to helping fraud victims has a saying, "Silence is fraud's best friend. Word of mouth is fraud's worst enemy. Pass the word!"

In a world, where fraud victims have a hard time getting anyone to even talk to them this saying makes a lot of sense.

FraudAid was conceived by a woman by the name of Annie McGuire, who fell victim to a fraud scheme, herself. Her personal story, which is told in great detail on the site proves that just about ANYONE can become a fraud victim.

In my personal dealings with victims, you would be surprised who has been scammed.

The problem is that most people -- especially those who think they should have known better -- rarely report that they have become a victim of fraud. FraudAid strives to educate all of us that the lack of communication enables fraudsters to victimize people (who if they have been made AWARE) might not be have been taken in by a fraud scheme.

Thus, the reason there seems to be so much fraud and the experts compiling all the statistics disagree on how much fraud exists. After all, "Silence is fraud's best friend."

The FTC just released their estimate of identity theft victims, which has raised a lot of speculation about how accurate their number is.

I have no doubt that the FTC did the best they could, but if fraud isn't reported, it's hard to quantify.

The FraudAid site is a wealth of information for someone, who is trying to seek help after becoming a victim. Of the greatest importance (in my opinion) is how to deal with the authorities.

One page on the site shows the average person how to write a narrative that will get the Police interested in going after your case.

It also goes into great detail on what law enforcement agency specializes in what type of fraud. This can be confusing for someone dealing with being victimized for the first time.

The site also addresses a growing phenomenon, which is how to avoid getting arrested after becoming a victim. With all the auction fraud and stolen financial information being sold wholesale, fraudsters have developed a need to launder the proceeds of their illicit transactions.

The way they do this is by tricking people to do it for them. This is accomplished by hiring them under "false pretenses" to negotiate all their illicit transactions and wire the money to them. This scam is often referred to as a work-at-home, job, or check-cashing scam.

Another variation, known as a reshipping-scam, tricks people into reshipping stolen merchandise.

In reality the victim is taking all the risk for the scammer -- and more and more often -- the rap for them when they get caught. Sadly enough, the end result is almost certain financial ruin and possibly being charged with a host of crimes including, check fraud, money laundering and receiving stolen goods.

Some of detailed information on the different scams that can be found on FraudAid include investment, Nigerian (419), sweetheart/romance, lottery sweepstakes, lottery, work-at-home, visa/green card, counterfeit check/money order and reshipping/package processing scams.

Also covered on the site is how to protect yourself and recover from identity theft. Many fraud victims later become a victim of identity theft when a fraudster sells all the information they've data-mined off them.

The site even contains information on child safety and human trafficking.

Backing all this up are a host of research tools for fraud, where to report it and how to take political action.

Annie is now backed up by a group of volunteers, one of whom, Karrie Brothers, assisted me with a lot of information on the current going-ons at FraudAid.

To grow this effort, Karrie and Annie are actively seeking volunteers to assist them. Being one of the few resources where a victim can turn to, they are getting a lot of business!

FraudAid gives a good explanation of why volunteers are needed and they are trying to grow their organization:

Fraud, by every measure, is one of biggest and fastest growing industries in the world.

One study values worldwide corporate fraud at over two trillion dollars. This is not counting consumer and Internet frauds for which there is no reliable assessment. Another study estimates that 6% of global product is laundered money.

The fraud industry is run by many, many skilled professionals. The anti-fraud industry is small and, by comparison, run by very few skilled professionals.

That's why if you have the skills you can make a real difference!

Fraud Aid, Inc. is a volunteer anti-fraud organization. We, as all other anti-fraud organizations, are out-numbered and need your help.

We have the frauds. Do you have the time?

To grow the organization, they are recruiting a wide range of volunteers with law enforcement, legal, IT and education experience. There are also opportunities for people with no experience, also.

Even if you think you are aware of all the fraud schemes out there, FraudAid is a great place to learn more about them. After all, if people weren't being taken in by the schemes, fraud would probably disappear pretty quickly!

If you want to learn more about FraudAid, the site can be seen, here.
0 comments

Tuesday, December 4, 2007

IT Policy Compliance Group issues study on data breaches and information theft

Today, the IT Policy Compliance Group released an interesting report on the state of compliance and how it relates to the growing phenomenon of information theft and data breaches.

The IT compliance group is a non-profit organization supported by the Computer Security Institute, Institute of Internal Auditors, ISACA, IT Governance Institute, Protiviti and Symantec. The report reflects the findings of more than 450 organizations that were surveyed.

To sum up the main findings in the report:

The most recent benchmark research conducted by the IT Policy Compliance Group (IT PCG) reveals an intimate relationship between financial outcomes, sustained competitive advantage, data protection, and regulatory compliance.

The core competencies for protecting sensitive data are the result of this research and show the practices, procedures, and organizational strategies being implemented by organizations with the least loss and theft of sensitive data. A company’s ability to sustain its competitive advantage is enabled by protecting its sensitive data, resulting in better customer retention while protecting the brand and reputation of the firm. Protecting sensitive data helps a company avoid revenue loss, market capitalization loss, and unnecessary expenses.

The findings in the report show that a lot of organizations are struggling with high rates of data loss and theft. 87 percent of them suffer data losses, or theft 3-12+ times a year. The remaining 13 percent with three or less occurrences have something in common - an efficient and workable compliance program.
The organizations with the fewest occurrences focus on 30 or fewer control objectives. This is in stark contrast to the organizations with a higher occurrence rate, who focus on 80 or more control objectives.

These organizations (with the fewest occurrences) have examined their control points, carefully selected the most important ones and remain focused on them.

Organizations with the fewest occurrences inspect their control points more frequently. The most compliant organizations with the fewest occurrences inspect them an average of every 19 days. Those organizations with the most occurrences inspect their control points on an average of every 230 days.

Data breaches and information theft are getting more and more expensive for the organizations, who suffer the unfortunate experience of having one happen to them:

Financial outcomes from the loss or theft of sensitive data include customer defections, revenue declines, declines in stock price for publicly traded firms, and additional expenses (see Why Compliance Pays: Reputations and Revenues at Risk, IT PCG, July 2007). Additional financial risk results from expenses incurred for litigation, litigation settlements, consumer credit counseling, investigations, data restoration, and necessary(and after-the-fact) get-well efforts. Averaging nearly 8 percent of revenue, the expected losses from benchmarks conducted with hundreds of organizations are mirrored by actual experience.

The report points out that one shoe doesn't fit all when a data breach occurs -- but there is little doubt that the cost is rising and will continue to do so -- as more public awareness is created from all the play some of these breaches get in the media.

Also acknowledged is that despite the large amount of reported data breaches, there are many more that are never discovered.

Information is worth money, whether it is used to commit financial crimes or gain a competitive edge over another organization. These undiscovered occurrences are more valuable to the people stealing the information because nothing has been done to counter the fact that they have it.

The recent TJX data breach -- which is now being estimated by some sources at up to 100 million records lost -- has already caused TJX to claim a $118 million loss in their second quarter earnings.

A key finding in the report includes the importance of the human factor. Anyone who has studied information theft, or data breaches knows that the human factor is often what compromises information.

I've often written that no amount of security is going to stop a motivated person, who has been given access to the information.

Social engineering techniques are also used by criminals to trick employees into either giving up the information, or downloading software to compromise it by more technical means.

A good example of this is a recent study issued by the Treasury Inspector General for Tax Administration's Office. The report revealed that 60 percent of the IRS employees tested compromised sensitive information via social engineering techniques routinely employed by criminals.

According to the ITPCG report, here are the different causes of data breaches/information theft revealed by the study:

The conduits through which sensitive data is being lost and stolen include data residing on PCs, laptops, and mobile devices; data leaking through email, instant messaging, and other electronic channels; and data that is accessed through applications and databases.
Notably, most of the methods listed above require some human interface to occur.

It never ceases to amaze me when I see another report, where a laptop, tape, or disc is lost containing sensitive information. Even worse, we still see occurrences where the information was even encrypted.

A case to point would be the recent occurrence in the United Kingdom, where unprotected discs containing the information of 25 million children were being sent snail mail.

The report goes into more depth on how information theft occurs and states:

After user error, the most common contributions to data loss and theft include violations of policy, Internet threats and attacks, lost and stolen laptops, IT vulnerabilities, and insufficient controls in IT. These sources of data loss and theft can be countered with a combination of policy violation sanctions and procedural and technical controls.
The report sums it's findings up with the sources of compliance deficiencies. It's findings were that five areas are directly related to IT security, three areas are related to IT function and may relate to IT security, and two others that are directly related to procedures and may or may not involve IT.

Today, besides people, IT technology is what runs most organizations. The reason for this is obvious, it reduces costs and makes things run more efficiently. Given this, when IT technology is used improperly it has made criminals more efficient and provides them with new avenues to commit crimes.

Saying that, this report has a lot of valuable information for anyone developing a compliance program to protect this asset (information).

The report cites the Attrition.org data loss archive as a resource. This is also a valuable resource for anyone looking at the growing phenomenon of data breaches/information theft.

Here is statement of purpose for the IT Policy Compliance Group from their site:

The www.ITpolicycompliance.com web site is dedicated to promoting the development of actionable, fact-based findings that will help professionals to better meet the policy and regulatory compliance goals of their organizations. Supported by members such as the Institute of Internal Auditors, the Computer Security Institute, and Symantec (collectively known as the IT-Policy Compliance Group), the web site focuses on delivering information that will assist in improving IT compliance results based on primary benchmark research.

The full report is available on the site.
0 comments

Sunday, December 2, 2007

Are criminal to criminal (C2C) networks making cyber crime too easy?

With the FBI's announcement of Operation Bot Roast II detailing the arrests of several bot-herders infecting computer systems on an International basis, it's become apparent that a lot of crime is going on with the click of a mouse.

One of the more amazing revelations to come forward from Operation Bot Roast II was that a teenager was described in the media as a "cyber crime kingpin." Most of the people arrested were under 30. This led me to wonder if our young people are getting smarter, or cyber crime is getting a lot easier to commit?

I ran into an article from ZDNet entitled, "The new battleground in cyber crime." It covered a lot of things, I already knew, but perhaps it hits on the reason cyber crime is growing at an explosive rate.

From the article written by Yuval Ben-Itzhak (originally published on News.com):

In an age where "data equals money," fortune has replaced fame as hackers' key motivation. Criminals are willing to pay top dollar for personal, financial, and corporate data collected by Trojans and other "crimeware."

The evidence is out there. Price lists discovered on the black market reveal that criminals are willing to pay $5,000 for a financial report, $500 for a credit card with PIN, and $150 for a driver's license ID.

With do-it-yourself malicious software packages available for $200, cybercriminals need neither deep pockets nor programming skills to compromise a Web site or steal sensitive financial data from an infected PC. Indeed, Finjan's security research confirms that crimeware toolkits have become cybercriminals' favorite weapon. The new business model is criminal-2-criminal (C2C)--attackers selling malicious code and stolen data to other criminal elements that profit from it.
The criminal to criminal (C2C) business model was a new term for me, but after thinking about it -- it describes exactly what we keep hearing is going on out there.

Yuval made another statement in his article, which is something I've tried to point out numerous times:

The cybercrime equation is simple: the longer the crimeware remains undetected, the higher the profit for the attackers.

When I say I've tried to point this thought out before, it was in reference to all the data breaches we see in the news. Once a data breach becomes transparent, the information probably isn't of very much use in the C2C business model, anymore.

Maybe that is why after a data breach, we rarely see anyone get caught using the information?

If this is true, the more we can monitor the C2C business model in real time, the more effective we will be in attacking the criminals behind it?

While investing a lot of resources dealing with the data breaches is probably necessary, it does little to solve the overall problem. The statistics are that once a data breach becomes transparent the information rarely gets used, if at all.

With litigation arising from some of these data breaches, the cost of revealing one is becoming cumbersome, also. I wonder what would happen if we started spending more money up-front going after what is going on right now? We might spend a lot less money cleaning up the mess, after the fact.

Unfortunately, the monetary resources allocated by most organizations to fight cyber, financial and information crime are often considered a necessary evil. The result is that the people dedicated to protecting us from these types of crimes are often some pretty over-worked individuals.

Please note that this is true in both the private and public sectors.

Couple this with certain marketing practices that make committing some of these crimes fairly easy and it's no wonder, we are facing an ever growing problem.

Perhaps, we should start rethinking how we go after this problem?

Yuval's article (which I consider an interesting read) can be seen, here.

Some of the reference material, he used in writing his article came from the security research people at Finjan. The interesting information in this report is available on the Internet, and can be seen by linking, here.
0 comments

Friday, November 30, 2007

How to spot a foreclosure scam

With 1-2 million foreclosures on the horizon, we are probably going to see a lot of shady characters advertise on lamp posts, classified ads, pay-per-click advertising and spam e-mails with questionable promises to rescue people in a difficult situation.

Apparently, the mortgage crisis is now so bad some are saying it's likely to cause a recession.

Foreclosure scams have been around for a long time, predating the current mortgage crisis.

Scams rarely change very much, they tend to disappear and then resurface when there is an event that makes them viable again.

For instance, the infamous Nigerian 419 scam which is frequently in the news can be traced to what was known as the Spanish Prisoner letter, which dates back to the early 1900s.

Advance fee is one of the more popular variations of a foreclosure scam, people are asked to pay a large fee up front and then get nothing for their money.

I had a reader send me an e-mail, where this was occurring and the intended victim was being asked to wire the money. Being asked to wire the money is common in all the advance fee type scams, because once it's wired the sender has very little recourse, if any at all!

I found an interesting article on the DOJ (Department of Justice) website published in 1998 by the American Bankruptcy Institute.

The report details the following types of foreclosure scams:

For the cost of a bankruptcy filing fee, a debtor can immediately obtain one of the most powerful injunctions available under American law: the automatic stay," the foreclosure scam task force pointed out. The task force report described bankruptcy foreclosure fraud as the practice of filing for bankruptcy to delay or defraud creditors, without intending to comply with the requirements for obtaining a bankruptcy discharge or completing a repayment plan.

The foreclosure scam most commonly associated with the West Coast is the fractional interest transfer. Typically, a partial interest--perhaps 5 percent or 10 percent--in property held by a homeowner facing foreclosure is transferred to a real or fictional entity already in bankruptcy. Because the property interest is then held by a bankruptcy debtor, the original owner's creditor cannot foreclose until the bankruptcy court lifts the automatic stay.

Some scams involve fractional interests transferred with the knowledge of the original property owner. Often, however, the original owner first transfers the property to the perpetrator of a foreclosure scam, who then transfers the fractional interest without the original owner's knowledge. Sometimes a property is moved from case to case as the stay is lifted; one residential property was linked to 24 different bankruptcy cases.

The task force report explained how one homeowner facing foreclosure was persuaded by a scam perpetrator to sign deeds of trust and grant deeds transferring fractional interests in her property. The homeowner paid the foreclosure consultant several hundred dollars per month so she could stay in her home. The fractional interest recipients included apparently fictitious individuals as well as homeless persons recruited for a fee to participate; eight recipients filed for bankruptcy one after the other. Each filing stayed foreclosure on the property, causing a 10-month delay between the first filing and the completed foreclosure.

Many more variations of bankruptcy foreclosure fraud are surfacing around the country. Probably the most widespread involves the use of foreclosure notices to identify individuals facing the loss of their homes. The scam perpetrator contacts the home owner, advertising "mortgage assistance" or "foreclosure counseling" and promising to work out the home owner's problems with the mortgagee or to obtain refinancing for an up-front fee typically ranging from $250 to $850. The perpetrator may direct the home owner to "fill out some forms," including a blank bankruptcy petition, or may collect the information needed to complete a petition later. The perpetrator subsequently files a bankruptcy petition in the home owner's name, after filling in the bankruptcy papers signed by the home owner or forging the home owner's signature. The bankruptcy petition invokes the automatic stay, the imminent foreclosure is postponed, and the home owner stops receiving collection calls and letters.

In most cases, the perpetrator does not tell the home owner about the bankruptcy petition, instead convincing the home owner that foreclosure activity has ceased because mortgage problems have been worked out. The perpetrator may tell the home owner that he or she might receive a notice from the court, which should be ignored. The home owner may even be told that the perpetrator has gone to court on the home owner's behalf. No one appears at the Section 341 meeting, the case is dismissed, the foreclosure goes forward, and the home is lost.

Permutations of this scam include the perpetrator's collecting monthly mortgage payments from the homeowner, falsely stating that they will be forwarded to the mortgagee. In these cases, each defrauded homeowner pays not only the up-front fee for "services," but also hundreds or thousands of dollars in mortgage payments.

In another increasingly common alternative, the scam perpetrator convinces the home owner to quit-claim the residence to the perpetrator or to sell the residence for a nominal fee such as $1. The home owner agrees to transfer title because he or she has little or no equity in the property. The perpetrator charges the home owner "rent" or a "consultant's fee" or "management fee" to stay in the residence while the mortgage problems are worked out, after which the home owner will be able to "apply for repurchase" of the property or share the profits if the perpetrator sells the property.

But it costs money for the perpetrators to file all of these bankruptcy cases. To avoid bankruptcy filing fees, some perpetrators transfer an interest of the home owner's quit-claimed property into the name of an existing bankruptcy debtor--perhaps a Chapter 11 business debtor across the country--in a variation of the fractional interest scam. Typically, the debtor learns that a property interest has been transferred into its bankruptcy estate when it is contacted by counsel for the property owner's secured creditor, who has learned it cannot foreclose because the property is owned by a bankruptcy debtor.

Full report from the American Bankruptcy Institute, here.

Reuters video (courtesy of YouTube) did an interesting piece that is more recent. In it they offer some pretty good advice to be EXTREMELY CAREFUL before signing any documents related to your home in any of these come-ons.

The end result could be losing your home to the person, who is claiming to help you!

You can view the video below:

0 comments

Operation Bot Roast II snares bot herders, worldwide!


Official FBI photo for Bot Roast II (Globe in a laptop)

This morning I read that a teenager in New Zealand had been arrested for allegedly being the kingpin behind an international cyber-crime network.

Because he was a juvenile when the crimes were being committed, the authorities aren't releasing his real name, but on the Internet he is known as "AKILL."

The Associated Press is reporting:

Police arrested the suspected teenage kingpin of an international cyber crime network accused of infiltrating 1.3 million computers and skimming millions of dollars from victims' bank accounts, officials said.

Working with the FBI and police in the Netherlands, New Zealand police arrested the 18-year-old in the North Island city of Hamilton, said Martin Kleintjes, head of the police electronic crime center. The suspect's name was not immediately available.

Kleintjes charged that the ring was responsible for stealing at least $20 million using bank account and login details detected by their illegal spyware.
I decided to do a little digging on this and the FBI announced on their site that this is part of Operation Bot Roast II.

It appears that more than a teenager is being taken down for victimizing millions of people, worldwide.

From the announcement on the FBI site:

In June, we announced the first phase of Operation Bot Roast, which pinpointed more than a million victimized computers and charged a number of individuals around the country with various cyber-related crimes.

Today, we’re announcing part two of this operation, with more results:

Three new indictments, including two this past month. In one case, we uncovered a denial of service attack on a major university in the Philadelphia area and then knocked out much of the botnet by disrupting its ability to talk to other computers.

Two previously charged criminals who pled guilty, including a California man who is a well known member of the botnet underground.

The sentencing of three others, including a pair of men who launched a major phishing scheme targeting a Midwest bank that led to millions of dollars in losses.
I discovered more information on Operation Bot Roast II in a FBI press release:

The FBI today announced the results of the second phase of its continuing investigation into a growing and serious problem involving criminal use of botnets. Since Operation 'Bot Roast' was announced last June, eight individuals have been indicted, pled guilty, or been sentenced for crimes related to botnet activity. Additionally, 13 search warrants were served in the U.S. and by overseas law enforcement partners in connection with this operation. This ongoing investigative effort has thus far uncovered more than $20 million in economic loss and more than one million victim computers.

FBI Director Robert S. Mueller, III said, "Today, botnets are the weapon of choice of cyber criminals. They seek to conceal their criminal activities by using third party computers as vehicles for their crimes. In Bot Roast II, we see the diverse and complex nature of crimes that are being committed through the use of botnets. Despite this enormous challenge, we will continue to be aggressive in finding those responsible for attempting to exploit unknowing Internet users."

The press release also has detail on the most current arrests:

1. Ryan Brett Goldstein, 21, of Ambler, Pennsylvania, was indicted on 11/01/07 by a federal grand jury in the Eastern District of Pennsylvania for botnet related activity which caused a distributed denial of service (DDoS) attack at a major Philadelphia area university. In the midst of this investigation the FBI was able to neutralize a vast portion of the criminal botnet by disrupting the botnet's ability to communicate with other botnets. In doing so, it reduced the risk for infected computers to facilitate further criminal activity. This investigation continues as more individuals are being sought.

2. Adam Sweaney, 27, of Tacoma, Washington, pled guilty on September 24, 2007 in U.S. District Court, District of Columbia, to a one count felony violation for conspiracy fraud and related activity in connection with computers. He conspired with others to send tens of thousands of email messages during a one-year period. In addition, Sweaney surreptitiously gained control of hundreds of thousands of bot controlled computers. Sweaney would then lease the capabilities of the compromised computers to others who launched spam and DDoS attacks.

3. Robert Matthew Bentley of Panama City, Florida, was indicted on 11/27/07 by a federal grand jury in the Northern District of Florida for his involvement in botnet related activity involving coding and adware schemes. This investigation is being conducted by the U.S. Secret Service.

4. Alexander Dmitriyevich Paskalov, 38, multiple U.S. addresses, was sentenced on 10/12/2007 in U.S. District Court, Northern District of Florida, and received 42 months in prison for his participation in a significant and complex phishing scheme that targeted a major financial institution in the Midwest and resulted in multi-million dollar losses.

5. Azizbek Takhirovich Mamadjanov, 21, residing in Florida, was sentenced in June 2007 in U.S. District Court, Northern District of Florida, to 24 months in prison for his part in the same Midwest bank phishing scheme as Paskalov. Paskalov established a bogus company and then opened accounts in the names of the bogus company. The phishing scheme in which Paskolov and Mamadjanov participated targeted other businesses and electronically transferred substantial sums of money into their bogus business accounts. Immigrations Customs Enforcement, Florida Department of Law Enforcement, and the Panama City Beach Police Department were active partners in this investigation.

6. John Schiefer, 26, of Los Angeles, California, agreed to plead guilty on 11/8/2007 in U.S. District Court in the Central District of California, to a four felony count criminal information. A well-known member of the botnet underground, Schiefer used malicious software to intercept Internet communications, steal usernames and passwords, and defraud legitimate businesses. Schiefer transferred compromised communications and usernames and passwords and also used them to fraudulently purchase goods for himself. This case was the first time in the U.S. that someone has been charged under the federal wiretap statute for conduct related to botnets.

7. Gregory King, 21, of Fairfield, California, was indicted on 9/27/2007 by a federal grand jury in the Central District of California on four counts of transmission of code to cause damage to a protected computer. King allegedly conducted DDoS attacks against various companies including a web based company designed to combat phishing and malware.

8. Jason Michael Downey, 24, of Dry Ridge, Kentucky, was sentenced on 10/23/2007 in U.S. District Court, Eastern District of Michigan, to 12 months in prison followed by probation, restitution, and community service for operating a large botnet that conducted numerous DDoS attacks that resulted in substantial damages. Downey operated Internet Relay Chat (IRC) network Rizon. Downey stated that most of the attacks he committed were on other IRC networks or on the people that operated them. Downey's targets of DDoS often resided on shared servers which contained other customer's data. As a result of DDoS to his target, innocent customers residing on the same physical server also fell victim to his attacks. One victim confirmed financial damages of $19,500 as a result of the DDoS attacks.
Recently, I did a post, Botnet owner faces 60 years in prison and a $1.75 million fine, which is about about John Schiefer (above).

The amount of damage bot herders have caused millions of people on the Internet is astounding. Even when you consider the amount of spam, the average Internet user has to deal with on a daily basis, these current arrests are good news for the Internet community. Spam is the vehicle in which most scams, misleading advertising and counterfeit goods are spread in the electronic world.

The FBI press release mentioned some great resources where the average person can learn how to avoid becoming the victim of a bot herder.

In closing, I would like to pass them on:

http://www.fbi.gov/
http://www.onguardonline.gov/
http://www.lookstoogoodtobetrue.com/
http://www.uscert.gov/
http://www.ic3.gov/

One not mentioned that is great (my opinion) is http://www.fakechecks.org/. A lot of the scams involving counterfeit checks start with a spam e-mail AND most spam is spread using botnets.

AP article on New Zealand teenage bot herder, here.

FBI press release on Bot Roast II, here.
0 comments

Thursday, November 29, 2007

American Greetings draws a line in the sand against ecard scams!

Recently, we've seen electronic greeting cards (ecards) loaded with malicious software sent out by the millions in spam e-mails. For the person, who accidentally opens one up, the end result is (probably) an unfortunate experience of one kind or another.

With the holidays upon us and spam levels increasing, we will more than likely see another rash of ecard spam (scams).

The unfortunate experiences range from having your system turned into a zombie (part of a botnet to send out more spam e-mails) to having all your personal details recorded with keylogging software and sent to scammers, who use it to make you an identity theft statistic.

Of course, people are also often tricked into giving up their details via social engineering techniques, also.

Symantec recently issued findings that 71 percent of all e-mails are spam. Breaking it down further, spam is the preferred vehicle to further fraud, phishing and financial misdeeds on the Internet.

Going back to the ecard scam phenomenon, a warm wish from someone is a pretty sneaky form of social engineering (deception) designed to trick someone into downloading something on their system they shouldn't have.

In response to this, American Greetings, recently launched a campaign to educate the common person how to tell if the greeting they receive is from a friend or a foe.

Here are some information bytes from their new page about what they have done to stop ecard scams:

AmericanGreetings.com has changed the format of all ecard notification emails sent to ecard recipients. Now legitimate ecard notification emails from us will have all of the following attributes:

The "from" will always show "Ecard from AmericanGreetings.com" as the display name and ecards@americangreetings.com as the email address. Make sure you check both the display name and email address of the email.

It should appear as the following: "Ecard from AmericanGreetings.com"

The subject line will always include the name of the individual sending the ecard. Make sure you recognize the individual in the subject line before clicking on any links. It should appear as the following:"John Smith has sent you an ecard from AmericanGreetings.com" ("John Smith" is the individual sending the ecard to you).

The email message will include the name and email address of the sender. Make sure you recognize the individual in the email message before clicking on any links.

We have made it easier to find the ecard pickup area on our site, so you can quickly and safely view your greeting without clicking on any email links. On AmericanGreetings.com, it is now located in the upper right-hand corner of the homepage (americangreetings.com)

They also offer some sage advice on how to avoid becoming a victim:

First and foremost, if there is any suspicion that you have received a fraudulent ecard email, do not click on any link.

If you have any doubt who the email is from, manually type in www.americangreetings.com after the http:\\ found in your Internet browser.

Then find the ecard pickup link (ours is found in the upper right-hand corner of our homepage: www.americangreetings.com) to safely view your ecard.
Last, but not least some pretty informative information on ecard scams in general:

A wide variety of websites and brands have been affected. While the subject line of the malicious ecard email tends to be generic, such as "You've received an ecard from a class-mate!" or "You've received a postcard from a family member," more recent examples include brand-specific messaging such as "Worshipper sent you a postcard from americangreetings.com." Also, the pickup link within a malicious ecard email is most likely always an IP address, such as 127.0.0.1, which is much different than the typically used pickup link from a legitimate ecard sender that starts off with the host name (e.g., americangreetings.com) and not a series of numbers. As of August 23rd, we have started observing fake emails where the link shows a host name (e.g., http://www.americangreetings.com) but the actual link goes to an IP address instead of americangreetings.com. To see if there is an IP address associated with the link, hover over it with your cursor. If you see a URL when hovering over the link that has a series of numbers, such as http://89.678.999.12, it is not a legitimate link and you should not click on it.
If you are interested in viewing the rest of this resource before you open an ecard, the page on their site can be seen, here.

Of note, they have some pretty good visual demonstrations that can be seen on the page.
0 comments

Wednesday, November 28, 2007

Search warrant of credit card fraudster's house reveals 185,000 stolen social security numbers from the VA


(DMV photo of Kim from the OC Register)

Not sure what's wrong with this picture, but it was recently discovered that a suspected gang member (Tae Kim) got himself a job as an auditor at the Veteran's Administration, despite the fact he had a criminal record, and stole 185,000 social security numbers.

The stolen social security numbers were discovered when a search warrant was done at his house after he was implicated for using stolen (skimmed) credit card information at a jewelry store.

One of the credit cards used contained the skimmed information of Marlon Wayans, a well-known actor.

Erika M. Torres of the OC Register reports:

A man who purchased $5,600 in jewelry at a store in Tustin using three fraudulent credit cards, one belonging to actor Marlon Wayans, was arrested Thursday in Los Angeles after a months-long investigation, said Tustin police Lt. John Strain.

The investigation also uncovered from his home computer about 1.8 million Social Security numbers from the U.S. Department of Veteran Affairs, where Kim had been employed as an auditor. Veterans Affairs' officials have said only 185,000 numbers are at risk because many were repeated in the file.

Apparently Kim quit his job at the Veteran's Administration after finding out that they planned to do a criminal background check on him.

Pretty scary that a federal agency doesn't vet their employees before hiring them and then gives them access to personal and confidential information.

While data breaches are daily staples in the news, this story might suggest there are many smaller ones that no one knows about.

Given that Kim is suspected of being a member of the Koreatown gangsters and was caught using counterfeit credit cards, I wonder if he was intentionally planted at the VA for the purpose of stealing information?

In the information theft world, it wouldn't be the first time a criminal outfit planted someone in an organization with the intent of stealing information.

Bob Sullivan at MSNBC did an article in 2004 quoting studies that showed that a large amount of the information stolen was due to insider theft, here.

Another more recent story in the news is an employee at Certegy, who is now pleading guilty to stealing 2.5 million peoples information, here.

OC Register Story on Mr. Kim, here.

This isn't the first time the Veteran's Administration has been the subject of sloppy security:

In May of 2006, they lost a laptop with 26.5 million people's information from an employee's house. It was later found and the FBI stated they were pretty sure that none of the information had been used.

In August of 2006, it was reported that one of their vendors lost a laptop with 38,000 people's information on it.
0 comments

Labels

"C" word (1) "do" (5) "J" (1) "J" from Wichita (2) "On with the Show" (1) "White" House (2) $10 million (1) $80 settlement (1) 02 Arena (1) 09 09 09 (1) 1 800 FLOWERS DOT COM (1) 1-800-Flowers.com (1) 10 Best Dressed List (5) 10 Stinkiest Celebrities (1) 10 Worst Dressed List (1) 10 Worst-dressed list (4) 10.75 Rock FM (1) 106.5 (1) 11th Hour (1) 12 Hour Screening (1) 13th Annual Arab Film Festival (1) 16 year olds (1) 1975 White Corvette (1) 1984 (2) 1st Amendment Rights (9) 1st Black President (5) 1st Dog (2) 1st Dude (1) 1st Lady (7) 2 Rodeo Drive (2) 2 week limited run (1) 2008 elections (1) 2008 Hot Company (1) 2008 Presidential Race (1) 2008 Product Innovation Award (1) 2008 Tomorrow’s Technology Today Award (1) 2009 Trends (1) 20th Century Fox (10) 24 (1) 24 hour fitness (3) 24 Hours (2) 24th Annual Asian Pacific Film Festival (1) 25th Annual Asian Pacific Film Festival (1) 27 Knockouts (1) 2nd Annual Tattoo Convention and Music Festival (3) 2nd Appellate Court Ruling (5) 2nd Degree Murder (2) 2nd Language Plot (1) 3 Biggest-told lies (1) 3 coins in Fountain (1) 3 Saisons (1) 3 Sisters (2) 32nd Annual Asian International Film Festival (2) 360 (1) 3d Glasses (1) 400 Meter Relay (1) 419 (2) 419 scams (1) 419eater (1) 42 Annual Country Music Awards (1) 44th President (1) 44th U.S. President (1) 49.82 seconds (1) 4th (1) 5 Day Festival (1) 5 Star Performance (1) 500 Days of Summer (1) 50th Anniversary (1) 60 minutes (1) 60th Annual Emmy Awards (1) 666 (3) 66th Annual Golden Globe Awards (1) 7 Day Funerals (1) 7 million viewers (1) 7-Eleven (1) 711 (5) 7th Annual Backstage at the Geffen (2) 7th Avenue (1) 7th Season (1) 81st Annual Oscar Awards (3) 81st Annual Oscars (2) 9/11 (5) 911 (21) 95.5 FM (1) 99 cent Daiquiris (1) 99 cent store (2) 9th Circuit Court of Appeals (3) a broooques (1) A Call to God (4) A collection of Poems (3) A Dog's Life (4) A good laugh (1) A List Actors (8) A Mad Mad Mad Mad World (1) A Profile of Judge Robert Beezer (1) A Quiet Little Marriage (2) a rose (3) a rumor of fraud (1) A-list stars (6) A.I.D.S (1) A.I.D.S. (5) A.I.D.S. Activism (3) A.I.D.S. Fundraiser (1) A.I.D.S. patients (1) A.I.D.S. virus (1) A.I.D.S. Walk Los Angeles (1) Aaron Spelling (2) ABBA (2) ABC (12) ABC News (1) ABC Television (1) ABC TV (4) Abercrombie and Fitch (3) Abs (1) Absolut (1) Abstract Art (19) abubakar atiku (1) abuse (2) Abuse of Power (2) Abuse of Power (3) AC Milan (2) Academy Awards (5) Academy of Arts and Sciences (11) Acafellas (1) Accenture Match Play (1) Access Hollywood (3) access systems (1) account takeovers (5) acfe (2) acid (1) Acting (9) Acting Classes (2) Acting Technique (4) Acting Workshops (1) Action Adventure Genre (18) Activist (2) Actor (12) Actor Contracts (2) Actors (14) Actors Union (3) Actress (5) Adam Lambert (18) Adam Lambert fans (3) Adam Rugel (1) Adam Weller (1) Addiction (8) Addictions (2) Adrian Bellani (1) Adrien Brody (6) Ads (3) adult services (1) Adult TV content (1) advance fee (2) advance fee (419) (12) advance fee 419 (9) advance fee credit card fraud (1) advance fee credit card schemes (1) advance fee fraud (4) advance fee scams (1) Adventure (1) Advertisers (5) advertising (1) Advice (1) adware (3) Aerial Images (1) Aero Theatre (2) AETV.com (1) AFF (1) affinion (1) Afghanistan (10) AFI (7) AFI Awards (1) AFI Dallas (21) AFI Fest (6) AFI Film Fest (3) AFI Film Festival (Los Angeles) (1) AFI LA (1) AFI Life Achievement Award (1) AFI Movies Of The Year (4) AFI Thesis Film (1) Africa (3) Afro American Security Guards (5) Afro Americans (3) Afro-American (1) Afro-Americans (1) After-party (2) Afterhours Nightclubs (5) AFTRA (3) Age Discrimination in Hollywood (1) aging (1) ahmadinejad (1) Ahmanson Theatre (1) Aid for AIDS (1) AIDS (1) Aishwarya Rai (1) al gore (1) al qaeda (3) al qaida (1) Al Unser Jr. (1) Alabaster Skin (1) Alan Doyle (1) Alan Jonsson Gavica (1) Alan Rosenberg (1) Alana Stewart (1) Alaska (4) Alaska Governor (5) Albania (1) Albert Einstein (1) Alcoholism (1) Aldo's Coffee Shop (1) alex eckelberry (6) Alex Ortiz (1) Alexa (1) Alfred Hitchcock (4) Alhambra (1) Alice Cooper (4) Alice Cooper Tribute Band (1) Aliens (2) Alive (1) All About Eve (3) All American Models (2) All Blow Out (1) All Blown Out (1) All Join In (1) All Saint's Church (1) All Stars Projects (2) Allan Rich (1) Allen Ginsberg (4) Allen Rosenberg (1) allergens (1) allergies (1) allet (1) almost genius (1) Alms for the poor (1) Alms to the Poor (1) Alta Cienega Motel (1) Alta Resources Inc. (1) Alternative energy (2) Alternative energy sources (1) Alvaro Puig (1) Amazing Grace (1) Amazing Jim Wilson (1) Amazon (1) AMEE Awards (1) America's Got Talent (1) American Airlines (3) American Art Form (1) American Ballet Theatre (1) American Bankruptcy Institute (1) american express gift cheques (1) American Federation of Teachers (1) American Film Institute (2) american greetings (2) American Hero (2) American Idol (45) American Idol Tour (3) American Idol. Erotica (1) American Novelty (1) American paper money (1) American past-times (1) American Transplants (1) Americans for Safe Access (4) Ameritrade (1) amnesty international (1) AMPTP (2) Amy Adams (1) Amy Vanderbilt (1) Anal employees (2) Ancient (1) Anderson Cooper (6) Andrea Bocelli (2) Andy Dick (3) Andy Warhol (8) Ang Lee (2) Angela Lansbury (2) Angelie Jolie (1) angelina jolie (1) Angels take flight (1) animal cruelty (1) animal grace (1) Animal Shelters (1) Animated Shorts (1) Animation (5) Anime (1) Ankle injury (1) Ann Landers (1) Anna Chi (3) Anne Hathaway (4) Annette Bening (1) annie mcguire (1) annualfreecreditreport.com (1) Anon (1) Anonymity (1) anonymous hot line (1) Anthony Hopkins (1) Anti Gay Sentiment (5) Anti Phishing Working Group (2) Anti-Abortion (2) Anti-American sentiment (1) Anti-Christ (2) Anti-gay (2) Anti-Gay Marriage Ban (4) Anti-Immigrant (1) anti-scammers (1) anti-trust (2) anti-war (1) anti-war protest (1) antibodies (1) Antiques (2) Antiques Roadshow (1) Appellate Court Judge (1) apple (1) April 18 (1) April 19 (1) April 21 (1) April 3 (1) apwg (3) Arab Culture (2) Architecture (6) Archtecture (1) Arclight Cinema (1) Arco (1) Ardas Yanik (1) Arizona (21) armenian organized crime (4) Army Fatiques (1) Arnold Schwarzenegger (8) Arrest Warrant (4) Arrests (1) Art (11) Art Deco (1) Art Exhibition (6) Art Galleries (1) Art Gallery Space (1) Art Museums (1) Art Patron (1) Artemus W. Ham Concert Hall (1) Arthritis Pain Relievers (1) Arthur Erickson (1) Artist (2) Artistic Temperment (1) artists against 419 (3) Artreach Dallas (1) Arts (3) ASA (3) Ashton Kutcher (7) Ashwin Ramakrishnan MD (1) Asian Actors (1) Asian Americans (2) Asian Pacific Film Festival (28) Asian Students (1) Asians (2) Aspen Santa Fe Ballet (1) Assault (2) asset protection (5) Associated Press (1) Associated Press Polls (1) association of cerified fraud examiners (4) Astrology (2) Asylum (1) AT and T park (2) Athletes (5) ATM Machine (2) atm skimming (2) atm skimming device (3) ATM surcharges (1) atm theft (2) Attorney General (1) Attorneys (1) attrition.org (8) Auction (7) auction fraud (32) auction scams (7) AUDI (5) Auditions (4) Audrey Skalbania (1) August 1st (1) August 1st Deadline (1) August 29 (1) August 29th (1) August 31 (1) Auspicious signs (2) Aussie Baum (1) aussiebum (1) Austin (1) Austin Film Festival (1) Australia (5) Australian Competition and Consumer Commission (1) Austria (1) Author (3) Authorization Policy (1) Auto Club (3) Automation (1) Avedon (1) Awards (1) Awareness (2) Ayn Rand (1) B List Actors (1) B Movies (4) ba-dump (1) Ba**s (1) Babe Warehouse (1) baby boomers (1) Baby Plopper (1) Baby Seller (1) Baby-sitting (1) Baby-Sitting Duties (1) Back Stabber (1) Back Stabbing Actors (1) Back Stabbing Oprah Winfrey (1) backlinks (1) Backlot (1) Backlot Film Festival (1) Backlot of Universal (3) BAD BAD BOY (2) Bad Breath (1) Bad Hair Days (8) Bad karma (1) Bad Lieutenant (2) Bad Luck (1) Bad Manners (7) Bad News (1) Bad Omens (1) Bad Service (2) Bad Sushi (1) badge of authority (4) badware (3) Bai Ling (7) Bail (3) bail out (1) Baldwin Street (1) Ball Busters (1) Ballet (3) Ballot Initiative (2) Ballots (1) Baltimore (1) Baltimore Bullet (1) Banana Republic (1) Bandwagon (1) bank fees (1) bank of america (1) Bank of Mellon (1) banking (131) Bankruptcy (2) barack obama (9) Barack Obama gay? (1) Barack Obama Quote of the Day (1) Barack Obama wordiest President (1) Barack Osama (1) Barbara Stanwyck (1) Barbara Streisand (7) Barbara Walters (6) Barbarella (1) Bargain Buffet (1) Bargains (1) Barista (2) Barnes and Noble (2) Barneys Beanery (1) Barracuda Networks (1) Barrick Endowment Fund (1) Barry Manilow (4) Baseball (28) Basic Plumbing (1) Basilica (1) Basketball (3) Bathing Suit (1) Batman (2) Battery (2) Battle for Terra (1) Battle of the Bands (4) BBB (2) Beach Boys (1) beaches (6) Bear Stearns (1) Beard (1) Beat Museum (2) Beat the Heat (3) Beatles (8) Beausoleil Island (1) Beauty (8) Beauty and the Beast (1) Beauty Pageants (4) Beauty Queen (3) Becks (1) Bedford (1) Beer (2) Beer Garden (4) Beer Strategies (1) before another 9-11 (1) Begging (1) Beijing (3) Beijing Olympic Games (2) Beijing Olympics (2) Beingness (3) Bel Air (5) Believe (3) Ben Affleck (4) Ben Wright (1) Bench Warmers (1) benefits fraud (1) Berlin and Beyond Film Festival (1) Berlin Festival (1) Best Actor (1) Best Actress in Drama (1) Best Buy (1) Best Comedy Show (6) Best Drama Show (1) Best Film (1) Best Romance (2) Best-Dressed Women (3) Beth Givens (1) betrothal (1) Bette Davis (3) Bette Midler (4) better business bureau (1) Better to Have Loved (2) Betty Lynn Buckley (1) Beverly Hills (19) Beverly Hills 213 (1) Beverly Hills Library (1) Beverly Hills Police Department (1) Beyonce (2) beyond katrina (6) Beyond the Bell Branch (1) Bi Lingual Nations (1) Biblical Prophecy (1) biden (1) Big Brother (3) Big Ears (1) Big Laughs (1) Big Meanie (1) Big Oil (1) Big swinging di** (1) Big Virt (1) Bijou Phillips (1) Bill Clinton (15) Bill Cosby (1) bill gates (1) Bill O'Reilly (2) Bill of Rights (4) bill richardson (1) bill-pay (1) Billboard (3) Billy Bush (2) Billy Crystal (1) Biltmore Hotel (1) Bimbo Babes (1) Binion's Casino (1) Binions Casino (1) Birds and the Bees (3) Bisexuality (3) Bite Me (1) Biz Stone (1) BJ Ostergren (2) black book of scams (1) Black Experience (1) Black Eyed Peas (1) Black Friday (1) Black Supremacy (1) BlackHat conference (1) Blackwater (2) Blair Singer (1) Bliss (2) Blog (9) Blog action day (1) blog stats (1) Blogger (4) blogger code of ethics (1) Blogger Style (4) bloggers (1) Blogosphere (1) Blogs (1) blogspot (2) Blood (2) BloodaPalooza (1) bloods (1) Bloodsuckers (1) Blossoms (1) Blow them away (1) Blow Up (1) Blues (2) Blues Music (1) Blush (2) Bo (1) Bo Svenson (1) Board of Supervisors (1) bob carr (1) Bob Dylan (5) Bob Gazzale (2) Bob Mackie (1) Bob Roberts (1) bob sullivan (1) Bobby Downes (1) Bobby Trendy (1) Body Art (2) Body Building (5) Body Odour (1) Body Smarts (1) boeing (1) Bogus Inheritance (1) Bohemian Luxury (1) bomb (1) bomb threats (1) Bomber Style Leather Jackets (1) Bon Jovi (4) Bonding (1) bonds (1) Boner (2) Bong (1) Boo Boo (1) Boo Hoo (1) Book Deals (2) Book of Changes (5) Book of Revelations (4) Book of Wisdom (17) Book Prizes (1) Book Signing (1) Book Soup (1) Booker T. Washington (1) Books (7) Boondog Saints (1) boosting (2) Booze (2) border (1) border insecurity (6) border patrol (1) border security (7) bot-herders (7) botnet (4) botnets (16) Botox (3) Bouquet (1) Bouquet Service (1) Bowling (3) Bowser Beer (1) Box Office (1) Boxing (3) Boy toy (2) Boycott (6) Bracebridge (1) Brack Obama (1) brad pitt (1) Brand X (3) Brandon Flowers (1) Brandy (1) Breach (1) Breach of Public Trust (1) Break the Silence (1) Breakfast (3) Breaking Dawn (1) Breast Reading (1) Brett Favre (3) Brewskie (3) Brian Beutler (1) brian krebs (3) brian ross (1) bribery (3) Bribes (1) Bridget Christina Sandmeier (1) Bridget Marquardt (1) Bridgett Bardot (1) Brigitte Bardot (1) British Music Invasion (3) Britney Spears (13) Broadway (5) Broadway Musical (7) Broadway Musicals (5) Broadway Stage Production (4) Brokeback Mountain (5) broken borders (1) Brooke Shields (4) Brothers Bloom (3) Brothers Bloom Adrien Brody (1) Bruce Bastian (1) Bruce Jenner (2) Bruce Springsteen (2) Bruce Weber (1) bruce willis (1) Bruises (1) BS (1) bsales (1) Buddha (15) Buddhism (3) Buddhist Bowl (1) Buddhist Teachings (2) Budget Crisis (2) Bull (1) bundling (1) Burger King (1) Burial Grounds (3) burma (1) Burning Bed (1) Bush (1) bush twins (1) Business Deals (1) business fraud (1) Business Software Alliance (2) Busted (1) Butch (1) Butterfly 100 Meter (1) Butterfly Medley (1) Butterfly Stroke (3) Butterfly Stroke World Record (2) Butts (1) buyer beware (1) buysafe (4) C2C (1) Cable (2) Cable Cars (5) Cable Entertainment (4) Cable TV (1) Cables (2) Cactus (1) Caesar (3) Caesar's Palace (7) Caesars Palace (3) Cafe (1) Cajun Food (1) Calendar (1) calgary (1) California (13) California Courts (1) California law (3) California Office of Privacy Protection (1) California State Bar (1) california state lottery (4) California Supreme Court (8) Californian's Against Hate (1) Californians Against Hate (1) Califronia (1) call center (2) call forwarding (1) call forwarding scam (1) Caller ID (1) Caller ID spoofing (2) caller ID+spoofing (1) Calpernia Addams (1) CALPIRG (1) Calvin Klein (7) Calvin Klein Jeans (2) Calvin Klein underwear (4) Cambodia (1) Cambridge Police Department (2) Camden House (1) Camel (1) Camp Freddy (1) Camp Wabanki (2) Campaign Contributions (1) Campaign Promises (1) Campus (1) can do (1) Can of Worms (2) canada (1) Canada Council (1) Canadian (3) Canadian Architect (1) Canadian Embassy (1) canadian fraud (1) Canadians (1) Cancer (8) Cancer Cells (1) Cancer Plaza (1) Candis Cayne (3) Candlelighters 19th Annual 5K and 1 Mile Race for Our Kids (1) Candye Kane (1) Cannabis (1) Cannes Film Festival (8) Cantonese (1) capital punishment (1) Capitalistic ethic (1) Capitol Hill (1) Car Dealerships (1) car theft (1) Car Wash to Stars (1) Carbon Footprint (1) card not present (1) Cardboard License Plates (1) carder forums (17) Cardiac Arrest (1) Cardigans (1) Caring (1) Carinne Leduc (1) Carl Ferris (3) Carl Jung (2) Carl Reiner (1) Carlos Santana (2) Carol Burnett (2) Carrot Top (1) CART-Indy Champion (1) Carton of Books (1) Casey Affleck (1) Cash pay outs (1) cash theft (1) Cashiers (1) Casino (6) Casinos (6) Castellana Grotte (1) Castillo Theatre (3) Casting (1) Casting Call (2) castlecops (4) castorena leija-sanchez (2) Castro District (14) Castro Theatre (9) casual sex (1) Cat Eye Glasses (1) Cat Fight (1) Cat-lovers (1) Cats (1) Caucasian Trends (1) Causes (1) caveat emptor (4) CBS (11) CBS News (1) CBS Report (1) CCTV Hack (1) CD (4) CD Release (5) CD's (3) Cecil B. DeMille Award (1) Cecile B. DeMille (1) Celebrities (2) Celebrity (7) Celebrity Gossip (28) Celebrity graves (1) Celine Dion (1) censorship (1) CEO (2) CEO Executive Director (1) cert (2) certegy (3) Certegy data breach (6) Certified Mail (1) Cesspool of Corruption (1) CFO (1) CG Imagery (1) CHAI (1) Chalk Repertory Theatre (3) Champion (1) Champion of Poker (1) Chanel (1) Change (2) Changes (1) Chanteuse (2) chargebacks (3) Charity (17) charity fraud (5) charity: water (1) charity+fraud (1) Charles Bronson (1) Charles Lynch (1) Charles Manson Murders (2) Charlie Chaplin (2) Charlie's Angels (1) Charlie's Aunt (1) Charo (1) Chastity Bono (5) Che (2) cheap (1) Cheap Bastards (2) Cheap Motel Rooms (5) Cheap software (2) check (1) check 21 (2) check cashing schemes (1) check fraud (24) Checkbook Journalism (2) checkfree.com (1) Cheesy Operations (1) Chekhov (1) chelsea clinton (1) Chelsea Handler (1) Chelsea Lately (3) cheque fraud (3) Cher (22) chic (6) Chicago (2) Chick Flicks (1) child abuse (1) Child Actors (1) Child Exploitation (1) Child Molestation (1) Child Molester (1) child pornography (6) child predators (4) Child Protective Services (2) Child rearing (1) child welfare (2) child+abuse (2) Childhood Memories (3) Children Dreaming (1) Children of Invention (4) Children's Hospital (2) China (27) Chinatown (8) Chinese (1) chinese earthquake (2) Chinese espionage (2) Chinese Food (1) chinese hackers (2) Chinese New Year (5) chip and PIN (1) Chocolate Buddha (7) Choice of Pearls (1) Chorus Singers (1) Chris Angel (1) Chris Brown (1) Chris Dowling (1) Chris Downey (1) Chris Farley (1) chris hansen (1) chris hoofnagle (1) Chris Isaacson (1) Chris Lemmon (1) Chris Noth (1) Chris Pine (2) chris soghoian (1) Chris Solimine (1) Chrisopher Snow (1) Christ (1) Christian Bale (2) Christian Faith (1) Christians (1) Christina Aguilera (3) Christina Applegate (1) Christina De Rosa (2) Christina DeRosa (2) Christina DeRose (1) christine jennings (1) Christine Jorgensen (1) Christmas (11) Christmas Carols (1) Christmas Gifts (3) Christmas Shopping (1) Christmas Spirit (1) Christopher Plummer (1) chronicles of dissent (2) Church (1) Church of Blessed Sacrament (1) Church of the Good Shepherd (1) Church Weddings (8) CIA (5) Cindy Cheung (1) CineVegas Film Festival (2) CineVegas Film Festival (2) Circuit Party (3) Circus Nighclub (1) Circus Tour (2) Cirque Du Soleil (1) citibank (1) Citizen Lab (1) City Controller of Los Angeles (1) City of West Hollywood (19) City of West Hollywood (12) Civic Center (2) Civil Rights Violations (9) Civilized Society (1) CKVU (2) Claimants (1) Claims Administrator (1) Clara Zetkin (1) Clark Gable (1) Clarke County Commissioners (2) class action law suit (4) Class Action Lawsuit (5) Class Action Suit (1) Class System (1) Class-Action Suits (1) Classic Films (2) Classical Music (4) Classics (2) Classsic Films (1) Claude Alexander Allen (1) Clay Aiken (1) Clean Water (3) Cleanliness (1) Clifford the Big Red Dog (1) Climate of Hate (2) Clint Eastwood (3) clinton (1) Clinton HIV/AIDS (1) Clinton HIV/AIDS Initiative (1) Clive Barnes (1) cloned vehicles (1) cloning (2) Cloris Leachman (1) Closet (2) Closeted-gays (2) Clothesline Project (1) Clothing Budgets (1) Club Dates (1) Cluster Fu** (1) CNN (8) Coach (1) Coachella Music Festival (2) Coalition Against Domain Name Abuse (1) Cocaine (14) Cocktail Dresses (1) Cocktails (4) codes (1) Coen Brothers (9) Coercion (2) Coffee (1) Cold Blooded Murder (2) Cold Cut Combos (1) Cold Food (1) Colgate (1) Colin Farrell (2) Colin Hanks (1) Collectables (2) Collected Poems (2) collection agency (1) Collection of Poems (13) Collections of Poems (1) Collectors (1) Color of Authority (4) Columnist (1) Comcast (1) Comeback (1) Comedy (30) Comedy Genre (9) Comedy Spoofs (2) Comic (4) coming out of closet (4) Commemorative Postage Stamp (1) Commercialism (3) Commissions (1) Common Sense (1) Communism (3) Compassion (7) Compassionate Heart (1) Compassionate use of Medical Marijuana (12) Competition (9) Complexions Contemporary Ballet (4) compliance (2) computer crimes (2) computer glitches (4) computer security (14) Computer snafus (1) Computer World (1) computeractive (1) computers (1) ComputerWorld (1) Conan (9) Conan the Barbarian (1) Conceptual Art (1) Concert (3) Concerts (19) Conde Nast (1) condoms (1) Condos (1) Conficker (1) confidence tricks (2) Confidential Information (1) Confirmation (1) conflict of interest (2) Congress (2) Congressman Joe Wilson (1) Consequences (1) Conservative (2) Conservatives (1) Constant (1) Constitutional Rights (2) Construction Sites (2) Consumer Action (1) Consumer Advocates (5) consumer affairs (1) consumer confidence (5) consumer fraud (1) consumer groups (1) consumer mistrust (1) Consumer Protection (2) Consumer Rights (6) consumer rip-offs (7) consumer safety (5) consumer trust (10) consumer+awareness (1) consumerinfo.com (1) Consumers (1) Consumers Union (6) Contemporary Art Museum (1) Content (1) Contest (2) Contestant (5) Continental Baths (1) Contract disputes (3) Contract Negotiations (1) Contract Talks (1) Contracts (2) Controversy (10) Convention (2) Conventions (1) Copyright Infringement (2) Coral (1) Coraline (3) Corn Flakes (1) corporate espionage (8) corporate fraud (1) corporate identity theft (9) corporate irresponsibility (2) corporate responsibility (1) Corrupt Cops (5) Corrupt Judge (4) Corruption (10) cory voorhis (2) Cost Plus (1) Costume Ball (1) Cougar Hookups (1) Cougars (1) Council of Fashion (3) Council of Fashion Designers of America (1) counterfeit (4) counterfeit american express gift cheques (6) counterfeit cashier's checks (10) counterfeit checks (8) counterfeit cheques (4) counterfeit documents (24) counterfeit goods (4) counterfeit ID (4) counterfeit merchandise (7) counterfeit money (3) counterfeit money orders (6) counterfeit MoneyGram money orders (2) counterfeit MoneyGram orders (1) counterfeit postal money orders (3) counterfeit travelers express moneygram money orders (2) counterfeit visa travelers cheques (3) counterfeit+check (1) counterfeit+money order (1) counterfeit+software (1) counterfeiting (3) Country and Western Music (7) Country Music (1) Country-Rock Sensation (1) Countrywide (1) coupon fraud (1) Coupons (4) Courtney Cox (1) Cover-up TV Series (1) Covergirl (2) Cowboys (6) Crafts (1) Craig Russell (1) craigslist (5) Creativity (2) credit alert (1) credit bureaus (4) credit card (3) credit card cloning (13) credit card fees (1) credit card forums (2) credit card fraud (62) credit card fraud. identity theft (3) credit card+fraud (2) credit cards (2) credit freeze (5) credit monitoring (2) credit repair (1) credit reports (2) credit+counseling (1) credit+repair (1) creditfyi (1) Crediting Author (1) crime (1) Crime Scene Exhibit (1) Crimes (3) crimeserver (2) crimeware (52) Criminal 2 Criminal (1) Criminal Charges (7) crips (1) Critics (1) critiques (5) CRM (1) cross border fraud (4) crotch hair (1) Crowns (1) Cruel and Unusual Punishment (1) Cruise (1) Cruises (2) Cruising (1) Cry me a River (1) Crystal Ball (1) Crystal Chiu (1) Crystal Face (1) crystal meth (1) crystalline soda straws (1) CSI (3) CSI Role (1) CT (1) Cuba (1) Cuisine (2) Cuisine Disaster (1) Culinary Delights (2) Cult Classic Films (2) Culture (16) Cup (1) Cup Stacking (1) currency (131) Curtis Lum (1) Custody Battle (3) customer espionage (1) customer trust (1) Customers (1) CVS (8) CVS Pharmacy (1) cyber attack (1) Cyber Attacks (5) cyber bullying (1) cyber crime (8) cyber ghouls (1) cyber monday (1) cyber safety (1) cyber terrorism (2) cyber warfare (4) cyber waste (1) cyber-warfare (3) cyber+crime (1) cyber+czar (1) cyber+security (1) cyber+warfare (1) cybercime (6) cybercrime (17) cybernasties (3) cybersquatting (2) CyberWars (1) Cybill Shepherd (1) D Day (1) D.U.I. (1) Dad for the Day (1) Daily News (1) Daily Newspaper (1) Daily Newspapers (1) Daisies (1) Dalai Lama (5) Dallas (11) Dallas AFI (3) Dallas Morning News (1) Dallas Police (1) Dallas Public Library (1) Dame Edna (2) dan kaminsky (1) Dan Quayle (1) Dance (11) Dance Lessons (1) Dance Workshop In Italy (1) Dancer (1) Dancho Danchev (1) Dancing (4) Dancing with the Stars (18) dangerous chinese products (3) Daniel Day Lewis (1) Daniel Radcliffe (4) Danke Schoen (2) Danny Boyle (4) Danzig (1) Daredevil Stunt Drivers (1) Dark Chocolate (2) Dark Comedy (1) Darnelle Cadet (1) Darwin's Theory (2) dastardly deeds (1) Data (2) data breach (18) data breach legislation (1) data breaches (58) data brokers (6) data mining (2) data security (3) data-breach (3) data+breach (4) data+security (1) datamining (1) Dave Boyle (2) Dave Letterman (18) Dave Letterman Late Show (16) Dave Letterman Show (1) Dave Mathews (1) David (1) David Beckham (9) David Bowie (1) David Duchovny (2) David Geffen (3) David Geffen Playhouse (7) David LaCrone (1) david lazarus (2) David Lynch (4) David Manchester (1) David Spade (1) Daw Aung San Suu Kyi (1) Daytime Soaps (2) DDLOS (1) ddos attack (4) De Neve Quad (1) de Young Museum (3) DEA (1) DEA raids (9) Dead Battery (1) Deadline for Film Entries (1) deal (1) Dear Amy (1) Death (13) Death Camp (1) Debbie Rowe (1) debit card (4) debit card fraud (42) debit card+fraud (2) Debix (2) Debt (2) December 12 (1) Deceptive Business Practices (6) deceptive marketing (1) deceptive+marketing (1) Decorating Etiquette (1) Decorum (2) Deep Ellum Arts Festival (1) Deep Throat (2) Deep-Fried Oreos (2) Defamation (1) default codes (1) Dehydrated skin (4) Delicious Yogurt Flavours (2) Delusion (1) Demi Moore (2) Democracy (2) Democrat (5) Democratic National Committe (1) Democratic Society (1) Democrats (16) Democrats Win (1) Dennis Blair (1) Dennis Hopper (5) Dennis Kucinich (1) Dennis Quaid (3) Dental Work (1) Dentistry (1) Depak Chopra (1) department of energy (1) Department of Homeland Security (1) Department of Justice (2) Departures (1) Depression (1) Dept. of Injustice (1) Deputy District Attorney (1) Derek Hough (1) derivatives (1) Deryl Dodd (1) Desert Oasis (5) Design (3) Designer (3) Designer Dress (2) Designer Fashions (30) Designer Sunglasses (3) Designers (1) Desmond Richardson (5) Desserts (4) Destiny (3) Dev Patel (1) Dexter (1) DGA (8) DHS (7) dialers (1) Diane Sawyer (2) Diaper Duty (1) Diet (5) Diets (2) Dim Sum Funeral (4) dinah greek (1) Dippity-do (1) Director (2) Director of National Intelligence (1) Director's Guild (2) Director's Guild of America (2) Dirty Dancing (4) dirty dozen tax scams (1) Dirty Laundry (1) Dirty Politics (29) Dirty Sexy Money (18) Disabled (1) disaster and charity scams (6) disaster fraud (3) Disc Jockeys (3) Disclosure (1) Disco (2) Discount Code (1) Discount Tickets (2) Discounts (2) Discovery Days (1) Discrimination (3) Disgruntled workers (1) dishonest employees (9) dishonest insider (1) dishonest politicians (3) dishonest tax preparer (1) Disney (8) Disney Rarities (1) Disobedient Dogs (1) Distinction in Theatre Award (1) Distraxion (1) Diva (2) Divas (1) Divest Investments from Iran (1) Divine (2) Divine Grace (32) Divine Grace of God (5) Divine Light (1) Divorce (5) diy kits (7) diy+kits (1) DJ (3) DKYN (1) DMV (2) DMX (1) DNA (1) dns (2) dns cache poisoning (1) do not call list (1) Do not suffer fools gladly (1) Doctorate (1) Documentaries (10) Documentary (10) Documentary Competition (1) Dodgers (9) Doggie Style Sex (10) Doggie-style (2) Doggie-style sex (1) Dogs and Cats (1) Doing (3) doj (5) Dolce Gabbana (1) domain names (2) Don Cheadle (1) Don King (1) Don Messer (1) Don Rickles (1) don young (1) Don't Ask Don't Tell (7) Donald Trump (8) Donations (5) Donny and Marie (1) Donovan Leitch Jr. (1) Doobie (2) Doors of Perception (1) DOS attack (1) Double Rose (1) Doubt (1) Doug Reinhardt (1) Doug Weston (1) Doughnuts (2) Doughnuts with sprinkles (2) Dove Award (1) Downadup (1) Dr. Conrad Murray (5) Dr. Glen Justice (1) dr. oz (1) Dr. Phil (1) Dr. Spock (3) dracula (1) Drag Queen (5) Dragon Dance (3) Dragon Dancers (2) Dragon Street (1) Drama (2) Dreadlocks (1) Dream Imagery (1) Dreams (1) Dressing Right (1) Drew Barrymore (2) Drew Waters (1) Drift Spa (1) drive by download (3) driver's licenses (1) Drought (1) Drug Cocktail (1) Drug Manufacturer (1) Drug OD (1) Drug Overdose (11) Drug Raids (1) Drug Smugglers (1) Drug Testing (1) drug trafficking (3) drug wars (1) Drugs (12) Drunk (1) Duchess of York (4) Dude (2) due diligence (3) DUI (21) dumb criminals (1) Dumbledore Gay (1) dumpster diving (1) Dustin Hoffman (2) DVD (3) DVD Release (7) Dwayne Johnson (1) Dwight Rhoden (1) Dykes on Bikes (5) E Entertainment (4) E Gold (1) E Mail Communication (1) E Verify (2) e-bay (1) e-card scam (1) e-cards (1) e-commerce (2) e-commerce fraud (3) e-commerce+fraud (1) E-Fencing (2) E-Gold (1) e-mail scam (2) Early Bird (1) earned income credit (4) Earth created in 7 days (1) Earth Day (2) Earth Plane (1) Earth's Atmosphere (1) Earthquake (6) Easter (3) eastern european organized crime (6) Eastern Philosophy (2) Eastern Religion (2) Eats (1) Eau de Julian (2) ebay (23) Ebony and Ivory (1) ebt cards (1) ecard scams (1) ecards (1) Ecology (3) Economic Opportunity (2) economic+crisis (1) economics (131) economy (6) Ed Harris (2) ed jew (1) ed royce (1) Ed Sullivan Show (5) Ed Wood (2) Edgerton Foundation (1) Edgerton Foundation Grants (1) Editing (1) Editorial Statements (1) Edmonton Oilers (1) Edna May Beazley (1) education (2) Edward "Eddie" Davidson (1) efcc (3) Effeminent (1) ego (1) Egyptian Theatre (4) Egyptian Tombs (8) EIP (1) EIS Decision (1) Elaine Wynn (3) elder abuse (2) Electic Shorts (1) Election (6) Election Campaign (2) Elections (2) Electrolytes (1) electronic checks (1) electronic frontier foundation (1) electronic jihad (1) electronic voting (1) Elegance (1) Elegant Suits (2) Eleni Skalbania (1) Elf Waves (1) Elijah Wood (1) eliot spitzer (1) Elizabeth Liang (3) Elizabeth Taylor (12) ELK (1) Ella Fitzgerald (1) Ellen DeGeneres (32) Ellen Fans (4) Elton John (6) Elvis Presley (7) email (3) Embarrassment (1) embezzlement (4) Embroidery (1) Emergency (5) Emma Thompson (1) Emmy Awards (2) Emperor has no clothes (1) employee absenteeism (1) employee dishonesty (4) employee theft (9) employer verification (1) Employment (3) employment fraud (2) employment verification (1) Emporio Armani (1) Empress Hotel (1) Encore (2) Encore Hotel (4) Encounters at the end of World (1) encrpytion (1) encyption (2) Enemies (1) Enertainment (1) Engineer (1) English (5) English please (3) Enlightenment (12) enron loophole (1) Entertainers (3) Entertainment (24) Entertainment Tonight (3) Entertainment Unions (1) Entetainment (1) Entourage (3) Environment (24) Epidemics (2) EPPIcards (1) Equal Rights (7) Equality (4) Equifax (2) ER (1) Eric Clapton (1) Eric Snyder MD (1) Erik David (1) Erik Prince (1) Ermenegildo Zegna (2) erotic (1) erotica (3) Escalating Violence (1) escorts (1) espionage (12) estonia (1) Eternal Healing Light (2) Eternity (1) Ethan Hawke (1) ethical hacking (1) Ethics (1) Etiquette (6) Etro (1) eurasian organized crime (2) European Fashion Trends (1) Eva Longoria Parker (1) Evil Club Empire (1) Evil Empire (1) Excellence (2) Excess (2) Exercise in Futility (1) Exfoliation (1) Exile (1) Exotic Cocktails (4) Exotic locales (1) Expedia dot com (4) Expenses (1) experian (2) Expired Driver License (1) Expletive Deletives (2) Exposure (1) Extension (1) extortion (2) Extra (1) Extra Care card (1) Extradition (1) Extravaganza (1) Extreme Skiing (2) Exxon (1) Eye Candy (1) eye-candy (1) eyelashes (1) Eyes of God (1) Fabric of Friendship (1) Face (1) Face Lift (2) Face Peel (1) Facebook (26) Faceless (2) Faceook (1) faggot (2) Failire to disclose (4) Fair Haired Individuals (1) Fairfax Avenue (3) Fairfax District (3) Fairies Fantasy and Fun (1) Faith (3) fake identification (2) fake websites (7) fakechecks.org (2) Fall Menswear (1) False Accusations (1) false prophets (1) Falun Gong (1) Fame (12) Fame and Fortune (2) Family Entertainment (3) Family Jewels (2) Family Seal of Approval (1) Family Zone (1) fannie mae (1) Fanny Brice (1) fans (3) Fantasy Package (1) Farragut North (2) Farrah Fawcett (2) Fashion (9) Fashion Haiku (1) Fashion Island (1) Fashion Victims (1) Fashionable Upper East Side (1) Fashionistas (4) fast flux (1) Fast Food (3) Fast Food Nation (2) Fast food take outs (3) Fat Tuesday (2) Fate (4) Father's Day (1) Fathers (1) faulty tire jack design (1) fbi (21) FBI Investigation (1) FCC (3) fda (4) FDA product recalls (1) FDIC. cyber crime (1) Feb 28 (1) February 26th (1) Federal Court (1) federal identity theft task force (7) Federal Law (2) federal reserve (1) Federal Tax (1) Federal Trade Commission (6) Fellatio (1) Felony (7) fema (7) fema fraud (1) Female Singing Icons (1) Female to Male (1) fencing (11) Fender Bender (1) Ferris Beuller's Day Off (3) Festish Nation (1) Festival (2) Festival of Fakery (1) Fetish (2) fidelity national information services (2) Fight (3) Fighter Pilot (1) figure Fixers (1) Film (5) Film Bio (2) Film Competitions (1) Film Critics (2) Film Director (4) Film Distribution (1) Film Festival (2) Film Festival Circuit (1) Film Festivals (8) Film Motifs (1) Film Noir (2) Film Retreads (1) Film Submissions (1) filmmakers (1) filmmaking (5) Films from New Europe (1) finance (131) financial crimes (66) financial crisis (4) financial fraud (1) financial misdeeds (9) financial repair (1) financial+crimes (4) financial+literacy (1) financial+misdeeds (4) Fine Arts Theatre (1) Fine Living with Martha Stewart (1) Finjan (3) Firefly (1) Firemean (1) First Pitch (1) First there is a Mountain (1) fixations (1) fixed income (1) Flamingo Road (1) Flasks (1) Flat Tires (1) Flavius Claudius (2) Flavius Claudius Julian's Blog (4) Fleeting Expletives (2) Flesh pots (1) FlexiSPY (1) Flipper (1) Floppy Hats (1) Flores Street (1) Florida (8) Florida popular vote (2) florida tjx arrests (1) Flowers (2) Flu Shots (1) Fluxhibition # 3 (1) FluxMuseum (1) follow (9) Follow me (3) Followiing (2) following (2) Food (2) Food Inc. (1) Fools (3) Football (7) Footlongs (1) Ford Motor Company (3) Ford Theatre (2) Foreclosure scams (4) Foreign Correspondent (1) Foreign Films (1) Foreigners in Los Angeles (1) foreplay (1) Forest Lawn (3) Forever Hollywood Cemetery (3) forex (1) forged documents (1) forged headers (1) Fort Worth (3) Forth Worth (1) Fortune 500 (1) Foster Care (2) Founding Fathers (1) Four Noble Truths (3) Four Seasons Maui Luxury Hotel (1) Fourth Judge (1) Fox (28) Fox Films (2) Fox Network (3) Fox Network News (1) Fox News (6) Fox News Chicago (1) Fox TV (17) Fragrance of Pop (1) France) (1) Franchise (1) Francis Ford Coppola (4) Frank Gehry (2) Frank Lloyd Wright (1) Frank Sinatra (1) Fraud (10) fraud alerts (1) fraud blog (14) fraud checks (1) fraud losses (1) fraud victims (3) fraud+artist (1) FraudAid (2) fraudnet (1) fraudulent refunds (2) Fred Hutchinson Cancer Center (1) Fred Karger (2) fred thompson (3) freddie mac (1) free (1) Free Advice (1) Free Bucks (1) Free Concert (2) free health care (1) Free Iran (1) Free Lynch Rally (1) Free Merchandise (2) Free Slot play (3) Free Speech (6) Free Tibet (1) Free Tickets (4) free trade (1) freecreditreport.com (2) Freedom (3) Freedom Fries (1) Freedom of Speech (1) Freemont Street (2) Freemont Street Experience (4) Freeway Emergencies (1) Fremont Steet Experience (1) Fremont Street (1) Fremont Street Experience (1) French (2) French Cuisine (1) French Loaf (1) Fresh Fish (3) Fresh Flowers (1) Fresh Succulent Fruit (2) Friend (1) Friends (8) Frozen Yogurt (2) Fruit (1) Fruit Toppings (1) Fruits and Vegetables (2) FSecure (1) FTC (28) FTC Telemarketing Sales Rule (1) Fuel (1) full of hot air (1) Fundraisers (4) Fundraisser (1) Funeral (4) Fur Trade (1) Future is Now (1) futures (1) G spot (1) Gabirol (1) gadolinium (1) Gail Cunningham (1) Gakona (1) Gala (4) Galaxy Soccer Team (7) Gallons (1) Gamble (1) Gambling (10) Gandhi Speaks (1) Gangs (2) Gangsters (3) gao (6) GAP (1) Garbage (2) Gardens (3) gartner (1) Gary Busey (2) Gary Cooper (1) gas gouging (3) Gas prices (2) Gas Pump (1) Gaslight (1) Gates (1) Gavin Newson (2) Gay (8) Gay Gulch (3) Gay Lifestyle (2) Gay Lifestyles (2) Gay Marriage (24) Gay Marriage Ban (5) Gay Men (1) Gay Pride (3) Gay Pride 2009 (1) Gay Protests (1) Gay Rumors (5) gay slurs (1) Gay themed films (1) Gay-owned Business (1) GE Money (1) GED (1) Gelsons (1) Gene Autry Museum (5) Gene Simmons (7) Gene Simmons Family Jewels (1) General Hospital (10) Genesis (1) Genevieve W (1) Geoff Eddington (1) George Burns (1) George Bush (1) George Carlin (1) George Clooney (9) George Cristy (1) George Harrison (2) George Maharis (1) George Melies (1) George Michael (5) George Miller (1) George Orwell (1) George Stephanopoulos (1) George Takei (1) George W. Bush (7) George Wada (1) georgia (1) Georgia Bay (1) Gerald Sternbach (1) German New Wave (1) Germany (4) Gerome Ragni (2) Gertrude Stein (2) Ghana (2) Ghost (1) Gianni Versace (1) Giant (23) Gideon Yu (1) gift card fraud (6) gift cheques (1) Gift of Healing (2) Gift of Prophecy (1) Gilda (1) gimme some truth (1) Giorgio Armani (4) Giorgio Emporio (2) girl scouts (1) Girls Next Door (1) Girls Night Out (1) Gisele Bundchen (1) Give Peace a Chance (2) Givenchy (1) Giving (7) glaad (1) Gladiator (2) Gladys Knight (1) Glee (11) glendale (1) Glitches (1) Glittering Galas (2) global economy (2) Global Green USA (2) Global tracking (2) Global Warming (3) Globe Theatre (1) Gloria Allred (1) Go Eat Los Angeles (1) Go-Go Girls (1) God (2) God of Manga (1) God's Bounty (1) God's Gifts (1) Godiva Chocolates (1) Gold Casket (1) Gold Coast (1) Gold Coast Hotel and Casino (1) Gold Olympic Medalist (9) Gold's Gym (2) Golden Gate Casino (1) Golden Globe Awards (6) Golden Palace Opera House (1) Golden Pay (1) Golf (4) Gone Baby Gone (2) Good Business (1) Good Business Practice (1) Good Bye (2) Good Manners (4) Good Morning America (2) Good Omens (5) Good Samaritan (1) Good Samaritans (1) Good Sport (1) Goodwill (2) Goofy (1) google (4) Gooks (1) GOP (1) Gore Vidal (1) Gossip (35) Gossip Maven (1) gossip overload (1) Gotcha (1) Gothic Horror Films (2) Gourmet Food (2) Government by the People (3) government contract fraud (2) government corruption (3) government espionage (1) Government Experiments (1) government fraud (10) government waste (10) Governor (4) Governor Schwarzenegger (2) Governor Bobby Jindal (1) Governor Jindal (1) Governor John Lynch (1) Governor Perry (1) Governor Rick Perry (1) Governor Schwarzenegger (2) GPS (1) GQ (1) Grab a Sandwich (1) Grace (1) Grace Cathedral (3) Grace Jones (1) Graffiti Daze (1) Grammy Awards (3) Grand Jury Prize (2) Grand Opening (4) Grants (2) Grassroots Movements (1) Grauman Chinese Theatre (2) grayware (1) Great Mauseoleum (1) Great Wall of China (1) Great White North (1) greed (6) Greek Gods (1) Green (2) Green Bay Packers (1) Green Beer (4) Green House Gases (1) Green Mayor (3) Greenback (1) Greenpeace (1) Greg Abbott (1) Gregg Schwenk (3) Gregory Peck (1) Greyhound (1) Gridiron (4) Groceries (3) Grocers (1) Grocery Stores (3) Gross Headline Stories (1) Grouch (1) Ground Zero (1) Group of 7 (1) Guess Who's Coming to Dinner (1) Guidance (1) Guilty (1) Guitar (5) Gus Van Sant (1) Gwyneth Paltrow (5) Gym (2) Gym Bunnies (2) H. R. 3046 (1) HAARP (1) Habbo (1) Hackers (9) hackershomepage.com (1) hacking (39) hacking webcams (1) Hair (3) Hair Gel (1) Hair Products (2) Hairspray (2) Hairstyles (1) Hal Prince (1) Half Breed (2) Half Moon Bay (1) Hall of Fame (1) Halle Berre (1) halliburton (1) hallmark (1) Halloween (3) Hamburgers (1) Hand Modeling (1) Hand-outs (1) Hangover feature film (1) Hank Wiliams Jr. (1) Hannaford Brothers (3) Hannah Montana (5) Happy Birthday (8) Happy Hour (1) Happy Mother's Day (1) Happy New Year (2) Happy Thanksgiving (1) Harassment (9) hard drive washing (1) Hard Rock Cafe (7) Hard Targets (1) Harlettes (1) Harrah's (1) Harrison Ford (1) Harry Potter (3) Harvey Fierstein (2) Harvey Levin (4) Harvey Milk (5) Hate crimes (2) Hawaii (3) hay fever (1) Hayworth Street (1) HCG (1) Head (4) Headliner (1) Healing Rain (2) Health (12) Health Insurance (7) health and safety (1) Health Care (4) Health Care Reform (4) Health Insurance Reform (1) Health Julian Ayrs (91) healthcare fraud (1) Healthcare Speech (1) Healthy (3) Heart (1) Heart Attack (3) Heart Attacks (1) Heart Throb (5) heartland payment systems (3) Heath Ledger (2) Heckled (1) Hef (1) Heidi Klum (4) Heiress (4) hells angels (1) Helpline (1) Henry Brilliant (1) Henry Fonda (1) Henry Kissinger (2) Henry Selick (2) henry waxman (1) Henry Winker (1) herb horner (1) Here Lounge (1) heredity (1) Hero (2) Heroes (3) heroin (1) hezbollah (1) Hi Fi Recordings (1) hidden fees (1) Hide and Seek (1) High Bird (1) High Noon (1) High Profile Productions (1) High Rents (1) High School Musical (1) High Society (1) Highway 101 (1) Highway Robbery (2) Hillary Clinton (13) Hillcrest Mardi Gras (2) Hilton Hotel (7) Hip (1) Hip-Hop (2) Hippies (9) Hiroshi Watanabe (2) His Holiness (2) History (5) Hit Album (3) Hit Records (1) Hits (3) HIV (3) HIV/AIDS (1) hoaxes (1) Hobbits (2) Hockey (1) Hog Town (1) Hogs Hollow (1) Hold Steady (1) Holding against one's will (1) Holidays (4) Holly Madson (1) Holly Terrace (2) Hollywood (10) Hollywood Film Industry (1) Hollywood Forever Cemetery (1) Hollywood Hills (2) Hollywood Legends (1) Hollywood Memorabilia (1) Hollywood Outdoor Cinema (1) Hollywood Phoney (1) Hollywood Producers (1) Hollywood Theatre (1) Hollywood Video Stores (1) Holy Bible (6) Holy Scriptures (3) Holy Spirit (6) home depot (1) home equity (1) Home Improvement (1) Home Show (1) homeland security (1) Homeless (14) Homicide (1) Homo 101 (4) Homo Secrets (1) Homoerotic (5) Homophobe (1) Homosexual Lifestyle (5) Homosexuality (5) Honky-Tonk (1) Honors (2) Hookers (1) Hootch (1) hormones (1) Horny (1) Horror Classics (3) Horror Films (2) Horror Genre (2) Horror-Comedy Genre (1) Horse Ranch (2) Hostility in Streets (1) hot line (1) Hotel Accomodation (1) Hotel Roosevelt (1) Hotels (19) hotmail accounts (1) hotspot (1) Hotwire (1) Hounded (1) house stealing (1) How did you get so rich (1) How to Change a Tire (1) Howard Beale (1) Howard Hughes (2) Howard Stern (4) Howl (4) HR-3997 (1) Hugh Hefner (3) Hugh Jackman (3) Human Art Series (1) human rights (1) Human Rights Violations (2) Humberville Poetry Slam (2) Humerside High (1) Humor (7) Humphrey Bogart (1) Hunk (2) Hurricane Gustav (1) hurricane ike (1) hurricane katrina (9) hurricane rita (5) Hydration (2) Hydrogen Nuclei (1) Hymn of Life (2) Hypocrite (1) I Get that A lot (1) I Got you Babe (1) i-jack (1) iC3 (2) ICE (9) ICE INS Police Force (5) Iceland (2) Icon (2) Ida Mae Holyoak (3) Ideas (2) identity force (1) Identity Theft (2) identity theft protection (4) identity theft protection services (3) identity theft recovery (6) identity theft recovery services (4) identity theft resource center (4) identity theft statistics (1) identity theft victims (4) identity theft+protection services (1) identity+theft (6) idiots (6) IgE (1) Ignorance (2) Ihara Consul General of Japan (1) Il Circo (1) illegal alien amnesty (1) illegal aliens (4) Illegal conduct (2) Illegal Immigrants (37) illegal immigration (24) Illegal search and Seizure (3) Illuminations Tour (1) Illusion (1) Illustrated Man (1) Image (1) imagine (1) Imagine Peace (1) Imagine Peace Tower (1) Immigrant Rights' Violations (2) Immigrant Scams (1) Immigrants (5) immigration bill (1) Imperialist Occupation (1) Impotence (1) In Concert (1) In the Closet (2) Inalienable (1) inauguration (1) Incarceration (1) income earning opportunities (1) incompetent box boys (2) Incompetent Staff (2) Inconvenient Truth (2) Independence (3) Independent Feature (3) Independent Film (3) Independent Films (4) India (1) Indian Mujahideen (1) Indianapolis (1) Indianapolis Racers (1) Indio (2) Indy 500 Winner (1) INew Beverly Cinema (1) Inexperience (1) inflation (1) infomation theft (6) information brokers (1) information industry (1) information security (13) information theft (24) information+theft (2) Inglorious Bastards (2) Inglorious Basterds (4) Inglourious Basterds (2) Inner Awareness (2) inner being (1) Inner Self (1) Inner Smile (1) Innocence (1) INS (1) Inside Job (1) Inside Out (1) insider theft (5) Insomniac Cinema (5) Inspirational (3) Inspirational Quotes (31) Instrumental (1) insurance fraud (2) intellectual property crimes (2) intellectual property+crimes (1) Intelligence (3) Intense Play (1) Interactive (1) interchange fees (1) internal audit (1) International Anticounterfeiting Coalition (4) International Woman's Day (1) Internet (18) internet abuse (1) Internet Crime (17) internet crime forums (1) Internet Crime Report (1) Internet Crimes Against Children Task Force (1) internet dangers (1) Internet Fraud (4) Internet fraud and abuse (1) internet hoax (1) Internet Journalilsts (1) Internet lunacy (1) Internet Scams (5) Internet Security (5) internet terrorism (3) Internet Viruses (6) internet+scam (1) Internment Camps (1) Interred (1) Interview (1) Interviews (2) Intimidation (2) Intimidation of a Witness (1) Intrigue (2) Intrusion (2) Investigation (1) investment scams (2) Ione Skye (1) ionosphere (1) IParliament (1) iphone (3) IQ (2) iran (2) Iran Nuclear Program (2) Iraq (12) iraq war (3) Ireland (1) Irish Jig (3) Iron Mountain (1) Irony (1) irregular warfare (1) irresponsible lending (1) irresponsible lending practices (1) irs (18) irs scams (1) Island Hotel (2) Isolation (1) ISP (1) IT legislation (1) IT Policy Compliance Group (3) It's in Good Taste (1) Italian (3) Italy (3) itinerary (1) ITpolicycompliance.com (1) iTunes (6) Itzik Galili (1) Jack Carter (1) Jack Kerouac (3) Jack Lemmon (2) Jack Nicholson (2) Jack-in-the-Box (3) Jackass (1) Jackie Curtis (1) Jackie O (1) Jacko in Hell (1) Jackpot (1) Jackson 5 (9) Jacqueline Kennedy Onassis (1) Jacumba (1) Jake Gyllenhaal (8) James Bond (1) James Caan (2) James Cameron (4) James Carville (1) James Dean (4) James Franco (7) James Rado (1) James Taylor (1) James Toback (1) James Tobak (1) Jane Fonda (1) Jane Russell (2) Janine Turner (2) Japanese (3) Japanese American Stories (1) Japanese Culture (1) Japanese Films (2) Jason Ritter (1) Jason Trawick (1) Java (5) Javelin (3) Jay Leno (21) Jay Leno Show. The Tattler (78) Jazz (4) Jealousy (1) jeanine pirro (1) Jeanne Cooper (1) Jeff Beacher (1) Jeff Beck (3) Jeff Bridges (12) jeff grass (2) Jeffrey Sanker (1) jennifer lopez (1) Jeremy Renner (3) Jérôme Kerviel (2) Jerry Brown (5) Jerry Lewis (1) Jerry Seinfeld (1) Jesse James (1) Jessica Simpson (2) Jesus (2) Jesus Christ (3) Jets (2) Jewellery (1) Jewels (1) Jewish (1) Jewish Rant (2) Jews (1) jihadist forums (1) Jim Donovan (1) Jim Morrison (4) Jimi Hendrix (1) Jimmy Carnicia (1) Joan Rivers (2) Joaquin Phoenix (3) Job Opportunities (2) job scams (12) job sites (1) Jock Straps (1) Jody Foster (2) joe arpaio (1) joe larocca (1) Joe Medicine Crow (1) Joe Wang (1) john culberson (1) John Dillinger (1) john edwards (2) John F. Kennedy (3) John Horn (1) John Landis (1) John Lennon (8) John Malkovich (3) John McCain (4) John McCain takes South Carolina (1) John McGuire (1) John Rando (1) John Rosenfield (1) john schiefer (1) John Travolta (10) John Wayne (1) John Wildman (4) John Wildman AFI Director of Press and Public Relations (1) Johnie's Broiler (1) Johnny Carson (2) Johnny Depp (6) Joint (3) Joke (1) Jokes (2) Jon Erik Hexum (1) Jon Gunn (1) Jon Vogel (1) Jonathan Rhys Meyers (1) Joseph (1) Joseph LaRocca (1) Josh Groban (2) Josh Olson (1) Journalism (1) Journalistic Ethics (3) Journalists (4) Joy (2) Joy of Shopping (1) Joyce Theatre (1) JP Morgan (1) Judge Alex Kozinski (1) Judge Andrew A. Hauk (1) Judge Greenwalk (1) Judge Joseph S. Biderman (1) Judge Rya W. Zobel (1) Judge Wu (1) judges (1) Judicial Performance (1) Judith Merril (2) Judy Garland (5) Juilan Ayrs (5) Juilan's Blog (1) Julia (1) Julia Child (1) Julian (1) Julian Ayrs (18) Julian 1st Emperor of Rome (1) Julian Ayrs (2040) Julian Ayrs 1st Annual 10 Worst Dressed Men List (1) Julian Ays (2) Julian's Blog (239) julie amero (3) Julie and Julia (2) julie l. myers (1) July 6th (1) July 7th (1) Jump Start (2) Jun Kim (1) June 18th (1) June 2009 (1) June 25 2009 (1) June 27th (1) June 7th (1) June Advertising Campaign (1) Junichi Suzuki (1) Jury (1) Just One LA (1) Justice (8) Justice Alex McDonald (1) Justices off their rockers (1) Justin Gaston (1) Justin Henry (1) Justin Kwon (1) Justin Timberlake (3) Justin Trudeau (1) Kansas (1) Kanye West (1) Karaoke (8) Karaoke ban (1) KARAOKE WITH KENNY VIP PARTY (1) Karate (2) Karen Kingsbury (1) Karl Lagerfeld (1) Karma (1) Karma Calling (1) Kate Linder (1) Katherine Hepburn (1) Kathryn Bigelow (8) Kathy Bee (1) katie couric (1) kazaa (1) kbr (1) Keanu Reeves (2) Keats (1) Keifer Sutherland (1) Kelly Lynch (1) Ken Garff Automotive Group (1) ken lay (1) Kendra Wilkinson (2) Kennedy assassination (4) Kenneth Turan (1) Kenny G (1) Kenny Karaoke (1) Kenny Loggins (4) Kenny Morse (1) Kenny Ortega (1) Kenny Rogers (2) Kevin Bacon (1) Kevin Dillon (1) Kevin Downes (1) keyloggers (11) kgb (1) Kick up Heels (1) Kid's Choice Awards (2) kidnapping (1) Kidney failure (1) Kids (2) Kids are Alright (1) Kids films (1) KIDS FIRST (2) KIDS FIRST Film Festival (1) Kids say the darndest things (1) Kill Bill (2) Killer Prescription Drugs (4) Killer Weed (1) Kim Novak (1) kim zetter (1) Kimbell Art Museum (2) Kin Ship Art Gallery (1) Kind of Pop (3) King of Pop (16) King of Speed (1) King Tut (2) Kink (2) Kinkos (1) Kirstin Stewart (1) Kiss (8) Kissi (1) Kitsilano Storage (1) Kitty Litter (1) KLOS (1) knock off goods (7) Knocked up. David Letterman Show (1) knockoff (1) Knowledge (2) KNX (1) Kodak (1) Kodak Theatre (7) Koreatown gangsters (1) Kou Shibasaki (1) Kramer vs. Kramer (1) KSNE (1) KSNE.com (1) Kudos (2) L'oreal (1) LA Children's Hospital (1) LA City Council (2) LA Convention Center (1) LA Pride 2009 (1) LA Times (11) LA Woman (1) labor (1) labor abuse (1) Labor Day Weekend (2) Labyrinth (1) ladies swimwear (1) Lady Byrd Johnson (1) Lady Luck (1) Laemmle (1) Laemmle Theatres (3) Lakers (4) Lamb of God (1) Lana Clarkson (1) Land Rover (1) Landon Brandon (1) Lao Tzu (1) LAPD (2) larceny (1) Larry King (3) Larry Sinclair (1) Lars and the Real Girl (1) Las Vegas (174) Las Vegas Boulevard (1) Las Vegas equila Fest (1) Las Vegas Police (1) Las Vegas Police Force (1) Las Vegas Strip (1) Las Vegas Tribute Party (1) Last Respects (3) Latino Elitist (2) Latino Vote (1) Latino Workers (1) Latinos (8) Latisse (1) Laughter (1) Laura Linney (1) Lauren Holly (1) Lauren Hutton (1) Laurier LaPierre (1) Law Abiding Citizens (1) Law Enforcement (6) law suit (1) Lawmakers (1) Laws of Universe (1) Lawsuit (4) Lawsuits (1) Lawyer Malpractice (1) Lawyers (3) lazarus (1) Lead Poison (1) Learning (1) Leather (2) Leather Jackets (3) Lebowski podcast (1) Lecture (1) Lee's Summit (1) Legal bozos (1) Legal Eagles (1) legal system (1) Legends (4) Legion of Honor (1) legislation (1) Lehman Brothers (1) Leisure (6) LEO (1) Leonardo Di Caprio (3) Leonardo DiCaprio (4) Leonardo DiCarpio (1) LERPnet (1) Lesbian (6) Lesbian Characters (1) Lesbians (2) Letches (2) Lethal Dose (1) Lethal Weapon (1) Letter (1) Levi Johnston (4) Lewd conduct in Public Place (1) Leyla Milani (1) LGBT (2) LGBT community (6) LGBTQ (1) Liability (1) Liam Neeson (1) Liberace (3) Liberace Museum (1) Liberals (1) lies (3) Life (1) Life Experience (2) Life of Luxury (1) Life threatening illness (1) Life's Spiritual Journey (2) lifelock (8) Lifestyles (1) Light (1) Light a Candle (1) LIght my Fire (1) Light Shows (2) Lightbulb (1) Like Dandelion Dust (1) Lillies (1) Lily Tomlin (2) limewire (1) Limited Release (1) linda foley (1) Linda Lovelace (1) Lindsay Lohan (43) Lindsay Mitchell (1) Lion Tamers (1) Lionsgate Films (1) Lipstick Lesbians (1) Liquor License (1) Liquor Sales (1) Literature (11) litigation (1) Little Ashes (2) Little Emperors (1) little people (1) Little Tokyo (2) Live From Forum in Alcapulco (1) Live Nation (1) LIVE PERFORMANCES (9) Live Shows (1) Live Stage Shows (15) Liza Minnelli (2) loan fraud (1) loan sharking (1) Lobbyists (3) Loggins and Messina (1) Logic (2) Logo (1) Long-term Engagement (3) Lorca (1) los angeles (1) Los Angeles Children's Hospital (1) Los Angeles City Council (1) Los Angeles Film Festival (1) Los Angeles Superior Court (1) Los Angeles Times (5) Los Angeles Times Festival of Books (9) loss prevention (10) Lothario (1) lottery bandit (1) lottery scams (16) Lotus Flower (1) Lou Diamond Phillips (1) lou dobbs (6) Lou Gossett Jr. (1) Lou Reed (1) Loud (2) Louis I. Kahn (1) Louisiana (1) Louisville (1) Lounge Lizards (2) Love (6) Love Letters (1) Love on rocks (1) Love that dare not speak its name (2) Lovely Rita Meter Maid (1) Low Calorie Dessert (1) lower classes (1) LSD (2) Lucille Ball (1) Luck of the Irish (4) Lucy in the Sky with Diamonds (1) Ludicrous Notions (1) Luis Miguel (1) Lunch Special (1) Luscious Organic Desserts (1) Luxury (3) Luxury Mansions (1) Luxury Suites (1) Lynn Chen (2) Machine Girl (1) Machismo (1) Macho Stance (1) MacKenzie Phillips (1) Macy's (3) Macy's Department Store (3) Madame Tussaud Wax Museum (4) Madmaxathon (1) Madonna (7) Maggie Smith (1) Magic (3) Magic Carpet Ride (1) Magnolia Theatre (1) Mahatma Gandhi (2) Maid Service (2) Maiden's Breast (1) Mail Delivery (1) mail fraud (1) Mail Tampering (1) mail theft (2) Mailbox Rentals (1) Main Street (1) Maintenance (2) Make up (1) Make-up (5) Male (1) Male Anatomy (2) Male Escort Service (1) Male Models (1) Male Nude (4) Male Underwear (1) Male Whores (1) Malibu (3) Malibu Bluffs (1) Malibu Bluffs Park (1) malicious code (3) malicious JavaScript injection (1) malicious prosecution (1) malicious software (2) malicious websites (1) Malicious Worms (5) malware (79) Mamma Mia (3) Man in the Mirror (1) Man of Steel (1) Man stud (1) Man Style (1) Manchester Hotel (2) Mandalay Bay (3) Mandarin (1) Mangione Aquatic Center (1) Manhood (1) Mann's Chinese Theatre (7) Mannequins (1) Mannerisms (2) Manners (2) manuel leija-sanchez (1) Maple Leaf Rag (2) Mapping Service (1) Marc Jacobs (1) Marc Shaiman (1) Marc Shalman (1) March 17th (2) March 19th (1) March 20th (1) March 3rd Elections (1) Marcia Clarke (1) mardi gras (1) margaret saizan (2) Maria Bello (1) Maria Shriver (1) Mariah Carey (1) maricopa county (1) Marie Osmond (1) Marijuana (1) Marilyn Manson (1) Marilyn Monroe (4) Mariner SUV (1) Marines (1) Mario Barth (1) Mark Ballas (1) Mark Burnett (1) Mark Wahlberg (7) Mark Zuckerberg (4) marketing (3) markets (1) Marlon Brando (4) Marlon Brandon (1) marlon wayans (1) Marriage (1) Martha Stewart (5) Martha Stewart Show (1) Martin Bosworth (1) Martin Luther King (1) Martin Luther King Jr (1) Martin Scorsese (3) Marvin Hamlisch (1) Mary Hart (1) Mary Martin memorabilia (1) Mary Steenburgen (1) Mary Wilson (1) Masaharu Fukuyama (1) Mask (1) Masquerade Room (1) Massage (2) masses (1) Mastercard (2) Mathew Modine (1) Mating rituals (1) Matt Damon (6) Matt Lauer (3) Matt Laurer (1) Mausoleum (1) Maverick Surf contest (1) Max Cure Foundation Roar for a Cure (1) May 26 (1) May 26th (4) May 6 (1) May 6th (4) Mayer Glassman and Gaines (1) Mayfair (1) Mayflower (1) Mayor Antonio Villaraigosa (2) mayor bloomberg (1) Mayor Gavin Newsom (6) Mayor Newsom (4) Mayor of Beverly Hills (1) Mayor of San Francisco (16) Mayor Villaraigosa (1) Mayweather verses Marquez (1) mcafee (2) McColo (1) McDonald's (7) McDonald's employees (2) MCRC blog (1) Meals (1) Meat Eaters (1) Medal of Freedom (1) Media (3) Media Blitz (2) medical identity theft (6) Medical Marijarijuana (2) Medical Marijuana (7) Medical phenomenon (1) Medical Records (1) Medical Research (3) medicare fraud (5) Medicinal Marijuana (1) Mediocrity opiate of masses (1) Meditation (5) Meek Shall Inherit the Earth (1) Meg Ryan (1) Mega Millions (1) Megastar (1) Mel Gibson (3) Melrose Avenue (3) Membership (3) Memogate (1) memorabilia (5) Memorablia (1) Memorials (3) Memories (4) Men's Fashion (1) Men's Swimwear (2) Menial Task Jobs (1) mens swimwear (1) Menswear (15) Mental Illness (2) Mentalist (1) Mercedes Benz (1) Merchandising (1) merchant bill of rights (1) merchant's payment coalition (1) Merck (4) Mercy Killings (1) Merde (1) Mermaids (1) Merry Christmas (1) Meryl Streep (6) mess (1) Messenger (1) Messiah (3) Metallica (1) Meter Maid (2) Metro (3) Metro Bus (3) Metro Rail (1) Metro Red line (1) Metrosexual Male (1) Mexican Independence Day (1) mexican organized crime (2) Mexicans (4) Mexico (6) Mexico City (1) MGM (1) MGM Grand (4) Michael Alcide (1) Michael Chen (1) Michael Chertoff (1) Michael Devous (1) Michael Douglas (3) Michael J. Fox (1) Michael Jackson (38) Michael Mann (1) Michael Maron (1) Michael Maron's Instant Makeover Magic (1) Michael Moore (2) Michael Phelps (23) Michael S. Hall (1) michael webster (1) Michelangelo Antonioni (2) Michelle Obama (11) Mick Jagger (2) Mickey Rourke (2) Microsoft (3) Middle East (3) Midnight Features (1) Midnight Screenings (1) Midnight Shows (1) Miguel Contrera Learning Complex (1) mike huckabee (1) mike rothman (1) Mike Smith (1) Mike Trevino (1) Mike Tyson (2) Milan (3) Miles to Go (1) Miley Cyrus (18) Military (12) Military Policy (1) Military Site (1) Milk (1) Million Bucks (1) Milorad Cavic (1) mind control (1) Ming Na (1) Minorities (1) Minute Men (1) Mio Takada (2) Mirage (1) mirror (1) Mirrors (1) misdeeds (1) Misdemeanors (1) Misquotes (1) Miss California 2009 (2) Miss Playboy (1) Miss Unverse Pageant (1) Miss USA Pageant (2) Mission Impossible (1) Mob (2) Mobile (1) Model (1) Mohammed Gadaffi (1) Moisturizer (1) Molly Mallone's (1) Mom Jeans (2) MoMa (1) Monaco (1) Money Grubbing Bit** (1) money laundering (6) money orders (1) money transfer scams (1) money.co.uk (1) moneyfactory.gov (2) MoneyGram (1) MoneyGram money orders (1) moneygram+money orders (1) Monica Lewinski (2) monopoly (1) monster.com (1) Montreal (2) Mood (1) Morenita (1) Morgan Freeman (1) Morgan Spurlock (1) Mormon (1) Mormon Church (1) Mormons (4) Morons (1) mortgage bubble (1) mortgage crisis (7) mortgage fraud (12) Mosco Chill (1) Moscow Chill (1) Mother (3) Mother's love (1) Motion Picture Academy of Arts and Sciences (6) Motley Crue (1) Motorcycle Cops (2) Motorcycles (1) Motorcyles (1) Motorists (2) Mountain's Edge (1) Mourn (1) Mourn Sins (1) mouthpiece (1) Movie (24) Movie Commentary Julian Ayrs (1) Movie Critics (3) Movie Previews (2) Movie Review (42) Movie Reviews (29) Movie Star (3) Movie Stars (2) Movies (38) Mozart (1) Mr. Blackwell (7) Mr. Brown (1) Mr. Vivacious (1) MRI (1) Mrs. John Lennon (1) Ms. Ukraine (1) MTV (5) Multi-Cultural (1) Multimillion Dollar prize (1) Murder (2) Murder Genre (1) Murder She Wrote (1) Muscone (1) MUSE Elementary (1) MUSE Lavender Faire (1) Museum (1) Museum of Anthropology (1) Music (27) Music Gigs (2) Music Business (2) Music Festival (1) music piracy (2) Music Stand (1) Music Videos (5) Musical Genius (1) Musicals (1) Musicians (3) Musings (2) Muskoka (1) Muslims (6) My Best Friend (1) My Life in Ruins (1) My New BFF (1) My Own Idaho (1) Myanmar cyclone (2) myexcusedabsence.com (1) myspace (3) Mysteries of the Heart (1) Mystery (2) Mysticism (1) mytruston (11) NACAC (1) Nae (2) Nail Polish (1) Naked (1) Naked Arnold Schwarzenegger (1) Naked Babes (1) Name Calling (1) Naoto Takenata (1) narcoterrorism (1) narcotics (1) Nasal Spray (1) Nascar (1) Nasher Sculpture Center (1) Nasher Sculpture Garden (1) Nasty Toilet Award (2) Natalie Cole (2) Nathan Burton (1) Nathanial Nuon (1) National Velvet (1) national consumers league (1) National Cyber Security Alliance (1) National Guard (1) National Historic Landmark (1) National Institute on Mental Health (1) National Lapoon (1) national retail federation (2) national security (5) National Sport (1) Native American Indian (1) NATO (2) Natural Bridge Caverns (1) Nature (3) Nature's Majesty (1) Navy Seal (3) Nazi slaughter (2) Nazis (2) NBC (14) NBC News (2) NBC Today Show (3) NBC TV (1) ncpw (1) Negotiations (1) Neiman Marcus (2) Nelson Skalbania (2) Nerds (1) Nerdy Characters (1) Network World buzz blog (1) Networking (1) networks and one suspect in the case has been identified as software engineer (1) Nevada (18) New Beverly Cinema (24) New CD (1) New Face (1) New Hampshire (1) New Line Productions (1) new orleans (3) New Release (1) New Year's Eve (1) New York (7) New York City (11) New York Fashion Week (2) New York Public Library (1) New York Times (3) New York Times Arts and Leisure Weekend (1) Newlywed game (1) Newport Beach (1) Newport Beach Festival (4) Newport Beach Film Festival (6) News Anchors (2) Newt Gingrich (2) NFCC (2) NFF (1) NHL Football (2) Nicholas Cage (3) Nick Shapiro (1) Nick Ut (1) Nicole Kidman (5) nigeria (1) nigerian fraud (9) Nigerian Scam Artists (1) nigerian scams (1) Nightclub (2) Nightclub Boutique (1) Nightclubs (1) nightmare (1) Nightmare Before Christmas (1) Niki Harris (1) Nikola Tesla (1) nina olson (1) Nine of Swords (1) Ninety-nine bottles of beer in the wall (1) Nipple play (1) Nisei Festival Week (1) NMRI (1) No Age (1) no beginning no end (1) No Courtesy for Clients (1) No Excuses (1) No Fags allowed (1) No Hats (1) No Limit Texas Hold 'em (1) no match ssn (2) no SSN credit cards (1) No Sunglasses (1) No Warning (1) Noah's New York Bagels (1) Nob Hill (4) Nobel Peace Prize (2) Nokia Mobile Phone (1) Nokia Theatre (7) nola (1) Non-Profit (2) Non-Union work (2) nonseminoma (1) Noor Awards (1) Nordstrom (1) Nordstrom's (1) norman hsu (2) Norman Reedus (1) North Korea (1) NorthPark AMC (1) NorthPark Mall (1) Northridge (1) Northridge Earthquake (2) Norwegian Nosedive (1) Nostrils (1) Not Gay (1) Novel (5) Novels (1) Now (1) Noxious Fumes (1) NRF (12) NSF/NSD (1) Nuclear Bombs (2) Nude Photos (1) Nude Schwarzenegger (1) Nudity (5) Numerologoy (1) Numerology (3) Nupitals (3) Nursing Homes (1) Nutrition (7) NY Times (1) NYC (9) O Organics Salad (1) O.J. Simpson (3) obama (3) Obesity in Children (2) Obituary (2) Obscenity charge (1) Obscured Faces (1) Obstructive Sleep Apnea (1) OC (1) OC Register (1) OCCRP (1) Octa-Mom (2) odd ball Security guards (2) Oddball behaviour (1) OE (1) Off the Record (1) Off the wall (1) ohio (2) Oil (12) oil companies (1) Oil Crisis (1) Oil Industry (2) oil prices (2) Oilers (1) OJ Simpson (1) OJ Simpson Trial (1) Olay (1) Olay Regenerist (1) Old Navy (1) Oliver Friedrichs (1) Oliver Stone (2) Olivia Maria Lopez (1) Olivia Newton John (1) Olympic Gold Medalist (7) Omaha Hi-Low Split-8 or Better (1) Omelet House (1) Ominous (1) On the Road (3) On the Wagon (1) on-line (5) One term President (1) OnGuardOnline.gov (1) Online Business Venture (1) online escrow fraud (1) online fraud (2) online lotto (1) Ontario (2) OPEC (1) open borders (1) Opera (3) operation bot roast II (1) Operation Avalanche (1) operation bot roast (1) Operation False Charity (1) Operation Homefront (1) Operation Ore (1) Operation Paper Tiger (4) opium (1) oprah (3) Oprah Winfrey (13) opt out (1) opt-out (4) Optic (1) options (1) Orange County (1) ORC (1) organized asian crime (1) organized crime (17) Organized Crime and Corruption Reporting Project (1) organized crime+retail (1) organized retail crime (16) organized retail theft (5) Orgeon Attorney General (1) Orion Pictures (1) Orlando Bloom (1) Orpheum Theatre (3) Orson Welles (4) Osama bin Laden (32) Osamu Tezuka (1) Oscar (4) Oscar Nominations (2) Oscar-winning film (1) Oscars (17) Oshawa (1) osofia (1) Ottawa (2) Out (2) Out of the Closet (5) Out of the mouths of Babes (1) Outer Aura (2) Outside Organisation (1) outsourcing (6) Oval Office (3) overpayment scams (4) Overseas Traffic (1) Oxygen Tanks (1) Oz (1) Ozone Layer (1) p2p (3) Pablo Picasso (4) Pacific Heights (1) Pacific NorthWest (1) paedophile (1) Pain (5) Painting (4) Palace Hotel (2) Palms Casino Resort (2) Palms Place (1) Pam Anderson (3) pam dixon (2) Pamela Anderson (6) Pancreatic Cancer (1) Panda Labs (1) Panel Discussions (5) Panhandlers (2) Paparazzi (9) paper weapons (13) Par-tay (3) Parade Magazine (1) Paramount Studios (4) Paranormal Activity (1) Pardon scandal (6) Parenthood (1) Parenting (1) Parents Television Council (1) Paris (4) Paris (not (1) Paris Hilton (27) Parking (1) Parking Fees (2) parking fines (1) Parking Meters (1) Pasadena (2) Passion (5) Passions (1) passwords (1) Patient rights (1) Patrice Fisher (1) patrick jordan (1) Patrick Swayze (3) Patrick Warburton (2) Patriot Act (2) Patriots (1) Patton Oswalt (1) paul allen (1) Paul Laudanski (1) Paul McCartney (4) paul young (1) Paula Abdul (7) paula zahn (1) Pavilions (11) Pavilions Grocery (8) Pay Day Blues (1) payment card cloning (2) payment card fraud (16) payment card fraud asset protection (1) payment card industry (2) payment card skimming device (1) payment card+fraud (1) paypal (6) PBS (10) PC glitches (1) PC World (1) pci data protection standards (12) pci data security standards (3) PCI DSS (2) Peacock Colors (2) Pearl (1) Pearl of Wisdom (1) Pedestrians (4) pedro castorena (1) Pee (2) peer to peer (1) Peerbhoy (1) Penelope Cruz (4) penis envy (6) Penny Slots (3) People's E-Mail Network (1) Per Diem (1) Perez Hilton (7) Perfection (1) Perfection of Souls (2) Perfume (3) Permanent Resident Status (1) Perry Twins (1) Persian (1) Personality Traits (1) personlity profiles (1) Perversity (2) Pet Foods (1) pet scams (2) PETA (5) Peter Bogdanovich (4) Peter Coyote (1) Peter Falk (1) Pets (2) Petty Behaviour (1) Petty Theft (1) PGA Tour (1) Phantom (1) Phantom of the Opera (2) Pharmaceuticals (2) Pharmacy (4) pharming (5) pharming malware (2) Phil Spector (1) Philadelphia (3) Philosophy (4) phishermen (4) phishers (1) Phishing (79) Phoney-Baloney (1) Photographs (3) Photography (2) Photos (1) Pia Shandel (1) Pianist (2) Piano Bars (1) Picasso (1) Picasso and the Masters (1) Pick up Lines (1) Pierce Brosnan (1) Pierre Elliot Trudeau (1) Piffle (1) Piggy Sheriff (1) Pigs (6) Pike Long Beach (1) Pimples (1) Pink (1) Pink's (1) Pinky Vodka (1) piracy (1) pirated software (3) pirt (4) Pit Bull (1) Placenta Wrinkle cream (1) Plagerism (2) Plain Janes (1) Plaintiff Liaison Counsel (1) Plan 9 from Outer Space (1) plants (1) Plastic Surgery (5) Play (2) Play Ball (3) Playboy (1) Playboy Bunny (1) Playboy Magazine (1) Playboy Models (1) Players Club (1) Pledge This (1) Plot Thickens (1) Podcast (1) Poetry (23) Poetry Snap (1) pogo was right (2) pogowasright (4) point of compromise (1) Poison (3) Poker (3) Polar Bears (1) Pole Dancing (1) Police Academy (1) Police Harassment (1) Police Harassment in Las Vegas (1) Police Officers (3) Police State (1) polish organized crime (1) Polite Society (1) Political Advisors (1) political corruption (1) Political Fundraising (3) political polls (1) Political Pundits (1) Political Thriller (3) politics (2) Polling (2) Polls (1) polysomnography (1) Pooch Parade (1) Pooh (1) Pool Party (4) Pooper Scoopers (1) Poor Standards (1) Pop Charts (8) Pop Culture (195) Pop Diva (16) Pop Hits (6) Pop Icon (18) Pop Icons (8) Pop Idols (5) Pop Singer (3) Pop Singers (3) Pop Star (24) Pop Stars (5) Pop Tunes (1) Pop Vocalist (3) PopCulture (1) popular vote (1) popularity (2) Porn (3) porn sites (3) Pornification (1) pornography (1) Port-a-Pottie (1) Portia de Rossi (3) Portia DeRossi (2) Portraits (4) Posh Spice (4) Postal Clerks (1) postal money orders (1) postcards.org (1) Postmaster General (1) Pot (1) Pot Dispensaries (3) Pot of Gold (1) potty mouth (2) Poverty (3) Pow wow (1) Power (2) power grid (1) power grids (1) PR (2) Prayers (2) Preamble (1) Precepts (1) Precious Moments (1) predators (1) Pregnancy (2) Premiere (4) prenuptial agreements (2) prepaid debit cards (1) Prescription (2) Prescription Drugs (7) President (1) President Barack Obama (71) President Bush (1) President Lyndon Johnson (1) President Obama (12) Presidential Candidate (3) Presidential look (1) Presidents (1) Press (1) pretexting (1) price gouging (3) Pride (1) Pride in One's Work (1) Priests of High Fashion (1) Prim (1) Prima Donna (2) Prince (8) Prince Harry (7) Prince of Pop (1) Prince William (17) Princess Yasmin Aly Khan (1) Prism (1) Pritzker Architectural Prize (2) Privacy (1) privacy friendly (1) Privacy Issues (1) Privacy Laws (2) Privacy Rights (1) privacy rights clearinghouse (8) Private Investigator (1) Prive (1) Prix de l'Arc de Triomphe (1) Producers (1) product recalls (1) Profane Love (1) Professional Liars (1) Professor (1) Professor Gates (1) Profile of Judge Fisher (1) Profile of Judge Judith C. Chirlin (1) Profile of Presiding Judge Robert Parkin Los Angeles Superior Court (1) Prohibition (1) project chanology (1) Project Runway (3) project safe childhood (1) Prom Night in Mississippi (1) Promises (1) Promotion (3) Promotions (1) Prop 215 (2) Prop 8 (12) Prop 8 Protests (7) property crimes (1) property flipping (2) propertyroom.com (1) Prophet (2) Propofol (1) Proposition 8 (18) Propositon 8 (1) Prose (17) prostitutes (1) prostitution (1) Prostrate Health (2) protection (1) Protest (2) Protesters (2) Protestors (4) Protests (6) Proud (1) Proud to be Democrat (1) Provisions (1) Provocative Poses (1) prying1 (1) psychic bond (2) Psycho (1) Publc Enemies (1) public records (1) Public Relations (1) public safety (1) Public Transportation (7) Publicity (4) Publicity Photos (1) Publicity Stills (1) Publishing (1) pump and dump (1) pump bandits (1) Pump it Yourself (1) Pump your Own (1) pundits (2) Punk (3) Punked (1) Puppetry (2) puppy scams (1) Pure of Heart (2) Purple Rain (3) Purveyors (1) push polling (1) Push-Button House (1) Qotes (1) Quakers (1) quatloos.com (1) Quebec (1) Quebecois (1) Queen (3) Queen Elizabeth II (12) Queen of Blogs (1) Queer Eye Guy Chef (1) Queer Traffic Sign (1) Quentin Tarantino (8) questionable ethics (1) Quin Hillyer (1) Quote (17) Quote of Day (2) Quote of the day (4) quotes (12) quotes of Julian Ayrs (1) r lee ermey (1) R.I.P. (13) Race (2) Racial Profiling (4) Racial Slurs (1) racism (11) Racist (2) Radio Disc Jockey (2) Radio Show (1) Radio Stations (1) Radio Talk Shows (3) Raelyn Campbell (1) Rage (1) Rainbow Power (1) Rainn Wilson (2) Rally (2) Rally for Kids with Cancer Scavenger Cup (2) Rally to raise funds (1) Ralph Lauren (2) Ralph Waldo Emerson (2) Randolph Duke (1) Rank (1) Rap Music (2) Rape (10) Rapid7 (1) Rapper (1) Raquel Welch (1) Rat Pack (2) Ratings (4) Ray Bolger (1) Raymond Nasher (1) RBS WorldPay (1) RCMP (1) real estate (1) Real People (1) reality (2) Reality Shows (10) Reality TV (5) Receiving (1) Recession (1) Recording Studio (1) Red Carpet (22) Red Carpet Event (6) Red Carpet Gala (3) Red Carpet Premiere (2) Red Carpet Premieres (2) red cross (1) Red Rock Casino (1) redirection (1) Redmond O'Neil (1) Reefer Madness (2) Reese Witherspoon (1) Reflection (4) Reflections (1) refund anticipation loans (2) refund fraud (6) refund systems (2) Regency Theatres (2) Regent Theatre (1) Regrets (1) Regulatory Compliance (1) Rehab (18) Rehearsal footage (1) Reincarnation (2) Relationships (5) Relay Races (1) religion (2) Religious Rights (1) Renaissance Art (1) Renaissance Hotel (1) Rendezvous (1) Renovated (1) Renovations (2) Repair (1) Representative Edward J. Markey (1) Representative Joe Wilson (1) Republican (10) Republican Convention (1) Republican Party (1) Republicans (14) Research library (1) reshipping scams (3) Residue (1) Resort Fees (4) Restaline (1) Restaurants (3) Restrictions (1) resveratrol (1) resveratrol ultra (1) retail crime (1) retail refund fraud (4) Retail Sales (2) retail security (1) Retail Stores (3) Retaliation (1) Retin A (1) Retirement (2) Revelations (1) Reverend Horton Heat (1) Review Journal (1) Reviews (1) Revolutioanaries (1) Revolution (2) Revolver (2) Rex Reed (1) RFID (4) Rian Johnson (2) Ric Wake (1) Rich Media (1) Richard and Annette Bloch (1) Richard Chamberlain (1) Richard Raddon (1) Ricky Martin (6) Ridley Scott (2) Right (1) Right to work State (1) Right Wing conspiracy (1) Rights Violations (4) Rihanna (2) rila (2) Ringo Starr (1) Rinko Kikuchi (1) Rio Casino (1) Rio Hotel (1) Rip Off (7) Rip-off Prices (1) Rita Hayworth (1) Rita Wilson (1) Rite Aid (1) Ritual (1) Ritz-Carlton Golf Club (1) Riviera (3) Road Hazard (1) Robert Benton (1) Robert DeNiro (2) Robert Downey Jr (5) Robert Duvall (1) Robert M. Cowan (1) Robert M. Knight (1) robert maynard jr. (5) robert morgenthau (1) Robert Pattinson (22) Robert Redford (2) Robert Siegel (1) Robert Soloway (1) Robert Towne (1) Robert Wright (1) Robertson Boulevard (1) Robin Laudanski (1) Robin Wright Penn (1) Robson Square (1) Robyn Gibson (1) Rochdale College (3) Rock 'n Roll Hall of Fame (7) Rock and Roll (5) Rock Bands (1) Rock Hudson (1) Rock Music (1) Rock Musical (1) Rock n Roll (4) Rock Phish (1) Rock Prophecies (2) Rock Slyde (2) Rock Wall (1) rock+phish (1) Rocket Norton (1) rockphishing (1) Rocky Horror Picture Show (1) Rodeo Drive (5) Roger Ebert (2) Roger Vadim (1) Rogue Cops (9) rogue trader (1) Rolling Stones (2) Rolls Royce (1) Roman Polanski (17) romance (16) Romance Genre (7) romance scams (11) romanian organized crime (4) romanian+organized+crime (1) Romantic Languages (1) Rome (1) Ronald McDonald (1) Ronald Reagan (1) Ronald Reagan Bldg. (1) Ronald Reagan Building (1) Rooftop Gardens (1) Rose Garden (2) Rosemary Poll (1) Rosemary's Baby (3) Rosencrantz and Guildenstern are Undead (1) Ross Stores (1) Rossie Grose (1) Route 66 (2) router (1) Royal Charges (5) rsa+security (1) RSVP (1) Ru Paul (1) Ruby Red Slippers (2) ruby tuesday (1) Rudi Gernreich (1) Rudolph Valentino (3) Rudy Giuliani (1) Rum (1) Rum Jungle (1) rumor (1) Runway (1) rush limbaugh (2) Russel Crowe (2) Russell Crowe (4) Russia (2) russian organized crime (3) Ryan Gosling (1) Ryan O'Neil (1) Ryan Seacrest (26) S.L.A.T.E. (1) Saba Shirazi (2) Sacred (1) Safe Sax (1) safe surfing (1) Safeway (10) SAG (5) SAG Commercial Contracts (1) SAG/AFTRA Commercial Negotiating Committee (1) Sage (1) Sages (1) Sahara Hotel and Casino (3) Sal Mineo (1) Sales (2) Salvador Dali (2) Salvation (2) Sam Spade (1) Same-Sex Marriage (7) Same-Sex Marriages (3) Same-Sex Unions (1) Samuel Taylor Coleridge (1) San Francisco (1) San Andreas Fault (3) San Andreas Fault The Tattler (5) San Diego (6) San Diego Film Festival (1) San Francisco (215) San Francisco Chronicle (1) San Francisco Main Library (2) San Francisco Police Department (2) Sandra Bernhard (1) Sandra Bullock (5) Sandra Day O'Connor (1) Sandy St. Peters (1) sans (3) Santa Claus (3) Santa Clause (3) Santa Monica (5) Santa Monica Blvd (3) Santa Monica Boulevard (1) Santa Monica Pier (2) sara carter (1) Sarah Jessica Parker (3) Sarah Palin (31) sarbanes oxley (1) Saturday Night Live (5) Savannah Sears (1) Save America (1) Save the Alpacas (1) Save the Planet (1) Sax Player (1) Saxophone Player (1) Say What? (2) Scam (1) scam+telemarketing (1) scambusters (1) scams (25) scamwarners (1) Scandal (25) Scandals (6) scareware (2) scholarship fraud (1) School of Visual Arts (1) Schwarzenegger smokes joint (1) Sci Fi Magazine (1) Sci-Fi thriller (1) Scientology (2) SciFi (1) Scott Rosenbaum (1) Scott Thorson (1) Scotty Alexander (1) Screen Actors Guild (3) Screenplay (2) Scriptures (2) Sculpture (1) Scuttlebutt (2) sean hannity (1) Sean Penn (3) sears (2) Seattle Coffee Giant (2) second chance eBay scam (1) Secret Admirer (1) Secret Service (5) secret shopper scam (2) secret shopper scams (7) Secretary of State (1) security (8) Security Guards (2) security incite (1) Security Issues at Binions Casino (1) security software (1) Sedative (1) Seeds of Time (1) Seinfeld (1) Self Discovery (1) Selling the Presidency (2) Senate House Dinner (1) Senator (1) senator chuck grassley (1) Senator Dianne Feinstein (1) Senator Edward Kennedy (2) senator feinstein (1) Senator Leahy (1) senior citizens (1) Senior Moment (1) September 12 (2) September 15 (1) September 16 (1) September 18 (2) September 19 (1) September 3 (1) September 9 2009 (1) Seraphine (1) Sergeant Dennis O'Connor (2) Sergeant Pepper's Lonely Hearts Club Band (1) Seth Ciferri (1) Settlement (1) Settlers (1) Sewage (1) sex (3) Sex fans (1) Sex Addicts (3) Sex and the City (2) Sex appeal (6) Sex Change Operation (2) sex changes (1) Sex Chronicles (4) Sex Education (3) Sex Stimulant (1) Sex Symbol (1) Sex Trade (1) Sexpot (1) Sexual Abuse (7) Sexual Identity (6) Sexual persuasion (1) Sexual Tease (1) Sexual Violence (10) Sexy (2) Sexy Back (1) Sexy Link (1) Sexy Male Models (1) Sexy Pubes (1) Sexy Underwear (1) sf chronicle (1) Sh** for Brains (1) Shannon Tweed (8) Shaq O'Neal (2) Shaq Vs. Michael Phelps (1) Share This (1) Shared Information (1) Sharing Info (1) Sharon Tate (6) Sharyl Attkisson (1) Shaun of the Dead (1) Shawari (1) Shell (2) Shelter (2) Shelters (1) Sheriff Baca (1) Shirley Chisholm (1) shoe (1) Shoes for the Stars (1) shoplifting (10) Shoppers (2) Shopping (7) Short Film Genre (1) Short Films (9) Shoshana Bean (1) Show (1) Show Biz (3) Shrimp Cocktail (1) Shrine Auditorium (1) Si (1) Siblings (2) SiCKO (1) Siddhartha (1) Siegfried and Roy (1) Sierra Leone (1) Sigmund Freud (2) Signs from God (1) SIIA (1) silaconfidence (1) Silence is Golden (1) Silent Auction (2) Silk (1) Silver Lake (1) Simon Beaufor (1) Simon Beaufoy (1) Simon Cowell (22) Simpsons (1) Sin City (9) Singapore (1) Singing (1) Sir Paul McCartney (1) SIRAS (4) Siren (1) Sissy (1) SITE (1) Sitting on fence (1) Six Pack (1) Sixties Activists (1) Sketching (1) skimming (11) skimming devices (3) Skin (3) Skin care (1) Skin care Products (2) Skin Flicks (1) Skin Lesions (1) Skin Peel (1) Skirts for Men (1) Skulduggery (1) Skype (1) Slasher (1) Slasher Movies (1) slave labor (1) Slave Trade (2) Slaves (1) Sleep Apnea (1) Sleep Disorders (2) Sleeping Disorders (1) Sleight of Hand (1) Slick Willy (2) Sloppy Seconds (1) Slot Machines (2) Slow Burn (1) Slumdog Millionaire (3) Slush Fund (1) smart phones (2) Smile (1) Smokey Robinson (1) smuggling (1) Snack Foods (2) sniffer packet (1) sniffing (1) Snobbery (1) Snobbles the Great (1) Snobs (2) Snort (1) Snotty Cashiers (3) Snotty Managers (1) Snow (2) So you think you can dance (2) Soccer (4) Soccer Stud (1) Social Climbers (6) Social Commentary (2) Social Drinking (1) social engineering (17) social hub (2) social hub network (2) Social Hubs (1) social injustice (2) Social Network (4) social networking (1) Social Networking Hub (1) Social Security (4) social security administration (3) social+networking (1) Societe Generale (2) Society (1) software piracy (4) Solar Energy (1) Sold Out (1) Sold Out Concert (1) Some Like it Hot (1) Sonia Sotomayor (1) Sonny and Cher (4) Sonny and Cher Show (1) Sonny Bono (2) Sony (3) Sony Classic Pictures (1) Sony Pictures Release (1) sophos (2) SOS (1) Sotomayor (1) Soul Mates (1) souls (1) South Africa (1) southern california fires (1) Spain (3) spam (39) spam agent (1) spam filters (4) spamhaus (1) spammers (2) spamming (1) Spanish (2) spanish prisoner (1) Spark of Life (1) spca (1) Speaking in tongues (1) spear phishing (7) special interests (3) Special Olympics (1) Special Room Rates (2) Special Status (1) speculators (2) Speech (4) Speeches (1) speedo (1) Speedway (1) Spell Check (1) spies (2) Spirit (1) Spiritual Leader (3) Spiritual Quotes (1) Spiritual Way (1) Spirituality (6) spoiled students (1) Spokesperson (2) spoofed websites (2) spoofing (9) Sports (17) Sports Illustrated (33) Spotlight (2) Spousal Support (1) Spring 2009 (1) Spring 2010 (1) Spring Break (1) Spring Menswear 2009 (1) sprinkles (1) Spy Thriller (4) spybot (1) spying (2) spyware (7) sri lanka (1) SSL (1) St. Francis Hotel (3) St. Mark's Square (1) St. Nick (1) St. Patrick's Day (5) Stage Performance (4) Stage Performances (4) Stage Production (1) Stage Productions (1) stalactites (1) Stale Rolls (1) Stalkers (2) stalking (2) Stand up Comics (4) stanford university (1) Staples Centre Memorial Service (5) Star Search (3) Star Trek (3) Star-crossed lovers (2) Starbucks (14) Stargate Universe (1) Starlet (6) State Attorney General (2) State Budget Fiasco (1) State of California (1) State Troopers (1) Station in life (1) statistics (1) Stats (1) Steadman (1) Steely Hard Sword (1) Stephanie Meyer (1) Stephen Baldwin (1) Stephen Hawkins (1) Sterling Hotel (1) Steve Harper (1) Steve Jobs (1) Steve Lopez (2) Steve Martin (1) steve swoda (2) Steve Wynn (7) Steven A. Soloway (1) Steven Spielberg (3) Stick up Butt (1) stimulus (1) Stimulus Package (1) Stink (1) stock market (2) stocks (1) stolen (1) stolen goods (1) stolen laptops (1) stop and shop (2) stopbadware.org (1) storm botnet (1) storm worm (2) Strangers (1) straw buyer (1) straw buying (1) Stray cat blues (1) Street Art (2) Street Enforcer (1) Street Legal (1) Street Performers (3) Strike (3) Stroke (1) Strutters Ball (1) Student Islamic Group of India (1) Studios (1) Studs (2) stuffy nose (2) Stupidity (1) Stuttering (1) Style (19) Style maven (1) suad leija (18) Submarine Dude (1) Submarine Sandwiches (1) Submissions (2) Suburban Housewives (1) Subway (5) Sugar Hangover (1) Suicide (2) Suits in Women's Wear (2) Summer (3) Summer Camp (3) Summer of 1969 (1) Summit Entertainment (1) Sun (1) Sun Block (1) sunbelt (1) sunbelt blog (6) Sunburn (1) Sundance (2) Sundance Film Festival (1) Sunscreen (1) Sunset Boulevard (2) Super Bowl (6) Superbowl (1) Superficial (1) Superhero (1) Superior Intellect (1) supervalu (1) Supreme Court (8) Supreme Court Justice (1) Supreme Court Nominee (2) Surf (1) Survival in Wilderness (1) Sushi (1) suspect (1) Suspect X (2) Suspense Thriller (2) Suzy Amis-Cameron (1) Swan Song (1) Sweat (1) sweepstakes scams (2) Sweet Bird of Youth (4) Sweetening (1) swift raids (1) Swim Competition (1) Swimmer's Build (3) Swimming Laps (2) Swimming lessons from Michael Phelps (1) Swimsuit Sale (1) Swine Flu (1) Swiss Alps (1) Swiss Authorities (4) Switzerland (1) Sword Play (1) symantec (22) symantec spam report (2) Symbol (1) Symbolism (1) Synonyms (1) synthetic identity theft (5) T Shirt Contest (1) t-shirt sale (1) T-shirts (1) T. Eaton (1) T. Griffin (1) Tabloid news (1) Tabloids (1) Tacky (1) Taipei Economic and Cultural Office (1) Taiwan Films (1) Take Law into own hands (1) take-out celebrity (1) Taken (1) Tal Sheyne (1) Talent (3) Talent is Talent (1) Tales of the City (4) Talk Show (4) Talk Show Host (14) Talk Shows (4) tamil tigers (1) Tantrums (1) Tanya Wright (1) Tao (5) Tao Beach (2) target (1) Taryn Manning (1) Tattler (1) Tattoo Artists (2) Tattoo Hollywood (1) Tattooed Under Fire (1) Tattoos (5) Tax Evasion (1) tax fraud (7) tax refund fraud (1) tax season scams (2) tax stimulus checks (1) tax+fraud (1) Taxi (1) taxpayer advocate (1) Taxpayers' Money Wasted (1) Teach (1) Teacher (1) Teaching (2) technical experts (1) Technology (3) Technorati (1) ted stevens (2) Teddy (1) Tee (1) Teen Awards 2009 (1) Teen Choice Awards (3) Teenagers (11) Tela Sofa (1) telecom fraud (2) telemarketing fraud (2) Teleplay (1) Tell alls (2) Temblors (1) Ten Percenters (1) Tent (1) tepes (1) Tequila Fest (1) Terminator Franchise (1) Terrorism (30) Terrorist (2) terrorist funding (3) Terrorists (3) Tesla coil (1) Testicles (1) Testicular Cancer (1) Texas (6) Texas Avery Animation Award (1) Texas Avery Award (1) Texas Star Award (2) Texasville (2) Text Messages (1) Thanksgiving (2) That's yes (1) THC (1) The Tattler (2) The Abbey (6) The Advocate (1) The American Institute of Wine and Food (1) The Arts (1) The Bangles (1) The Bear (1) The Beatles (6) The Big Apple (1) The Big Fan (1) The Big Lebowski (7) the big one (1) The Blob (1) The Bomb (1) The Burning Plain (2) The Chefsters (1) The Clash (1) The Cove (2) the Daily Planet (8) The Daily Planet. (1) The Dark Side (1) The Doors (3) The Ellen DeGeneres Show (6) The Ellen Show (2) the Environment (2) The Factory (1) The Forum (1) The Geffen Playhouse (2) The Ginger Girls (1) The Globe (1) The Godfather (2) The Great Buck Howard (1) The Great Gatsby (2) The Green Film (1) The Grove (11) The History of Violence (1) The Hot Peaches (1) The Hurt Locker (9) The In Crowd (1) The Insider (1) The Joint (1) The Killers (2) The Last Picture Show (1) The Lion King (2) The Lives of Others (1) The Living Dead (1) The Maid did it (1) the male animal (1) The Miracles (2) The Monkees (1) The Oscars (9) The Osmonds (1) The Other Side of Paradise (1) The Palace (1) The Palazzo (1) The Past (1) The Pearl (1) The Perfect Age of Rock 'N' Roll (1) The Plaza Hotel (5) the pragmatic cso (1) The Price is Right (1) the Province (1) The Quavers (1) The Rat Pack (1) The Right Thing To Do (1) The Rio (1) The Road Warrior (1) The Rocker (1) the Rose (1) The Tatter (12) The Tattler (2015) The Tattler Animal Rights Activists (1) The Tattler Julian's Blog (1) The Ting Tings (2) The Trevor Project (1) The Trinity (2) The Troubadour (1) The Venetian (4) The View (5) Theatre (3) Theatrical Agents (1) Theft (5) There is a Mountain (1) things Lebowski (1) Thirst (3) This is it (1) thong (1) Thought for the Day (1) Thoughtless cruel conduct (1) Threats (2) Thriller (7) Tibet (2) ticket purchases (1) Tickets (4) Tiger Woods (8) Tilda Swinton (2) Time Magazine (1) Time Twins (1) Time Warner (1) tina (1) Tinsel Town (1) Tinseltown (2) Tipper Gore (2) tips (1) Tirade (1) Tire changing (1) Titantic (1) tjx (4) TJX breach (2) tjx data breach (8) TMZ (28) Toasting surcharge (1) tobacco smuggling (1) Toby Froud (1) Today Show (1) todd davis (6) Token Lesbian (1) Tolerance (1) Toll Bridges (1) Tom Arnold (1) Tom Brady (2) Tom Cruise (6) Tom Fragala (12) Tom Hanks (2) TOM online (1) Tom Shu-Yu Lin (1) Tom Waits (1) Tommy Hilfiger (2) Tommy Lee (1) Tonight Show (6) Tony Danza (1) Tony Hamilton (2) Tony Stewart (1) too good to be true (10) Tootie and the Lip Girls (1) Top Ratings (2) Tori Spelling (2) Toronto (12) Toronto International Film Festival (1) Torture (2) Tourist Attractions (11) Tourist Trap (1) Tours (2) Town Hall Meeting (2) toxic (1) Toyo Miyatake (1) Toyo's Camera (1) Toys (5) TOYS R Us (1) Traces (1) Tracey Ullman (1) trading (1) Traffic Tickets (1) Trailer (1) Train Master (1) Training (1) Training Manuals (1) Trainmaster (1) Trans Fats (1) Trans Union (1) Transexual (1) Transformation (2) Transgenders (2) transparency (2) Transsexuals (1) transunion (1) Transvestite (1) Trash (1) Trash or Treasure (1) Travel (8) travelers cheques (1) Trazzler (1) treasury department (1) Treatment (2) trends (3) Trendy West Hollywood (9) Trendy Yogurt (2) triads (1) Trial (1) Tribeca Film Festival (2) Tribute to Hope (1) Tricky Dick (1) Tripping up (1) trojan (8) trojan horse (1) trojans (3) Tropicana (7) truisms (4) trust (5) Trust in the Lord (1) Trusted ID (2) Truston Identity Theft Services (10) Trustwave (1) Truth Hurts (1) Truthfulnesss (1) Truths (1) Trysts (1) TSA (2) Tucker Carlson (1) Tucker Sears (1) Turkey (2) Tuscany (2) Tuxedo Jackets (1) TV and Film Contracts (1) TV sitcoms (6) TV Talk Show Hosts (2) Tweaking (1) tweet (17) tweets (15) Twilight (29) Twitter (51) Twitter Escape (2) Twitter for Prizes (1) Twittering (1) TXU (1) Tyler Don Bryant (1) Tyra Banks (1) Tyra Richards (1) Tyrone Power (1) Tyson Documentary (1) Tze Chun (2) U.K. Release (1) U.S. Attorney General (2) U.S. Census (3) U.S. Competitions (4) U.S. Congress (3) U.S. Constitution (3) U.S. District Court (1) U.S. DOJ (1) U.S. Government (1) U.S. Immigration and Naturalization Service (27) U.S. Imperialist occupation (1) U.S. military (1) U.S. Post Office (2) U.S. Postal Inspectors (1) U.S. Postal Service (3) U.S. President (2) U.S. Presidents (2) U.S. Supreme Court (5) U.S. Tour (1) U.S. Troops (2) U.S. Voters (1) UC Irvine (1) UCLA (10) UCLA Cafeteria (1) UCLA Emergency Room (1) UCLA Medical Center (2) UCLA Medical Facility (1) ulian Ayrs (3) Ulterior Motives (1) Ultra Choice Awards (1) Ultrascan Advanced Global Investigations (1) Ultraviolet Rays (2) Unauthorized Telephone Charges (1) Uncle Sam (1) Underwear ads (1) Underwear Model (1) Unemployment (1) Union (1) Union Dues (1) Unions (1) Unisex (1) United Nations World Food Program (2) Universal Music Group (2) Universal Studios (2) University of Nevada (1) Universtity of Toronto (1) Unlawful Arrest (1) Unlawful Detainment (1) UNLV (1) Unprecedented (1) Unpresidential (1) unsecured borders (1) Unzipped (1) Updated Technology (1) Updates (1) Upstairs Downstairs (2) Urban Cowboy (1) urban legend (1) Urban Terrorism (1) Urinals (2) US Open (1) USCIS (1) USPIS (6) usss (5) Utah (2) utility fraud (1) V.B.S. (1) Val Kilmer (1) valentine (1) Valentine's Day (6) Valentino: the Last Emperor (1) Valet (1) Vampire (4) Vampires (10) Vancouver (4) Vancouver BC (7) Vanessa Redgrave (1) Vanity Fair (3) Variety (1) Vasarely (1) Vegas Entertainment (1) Vegas PBS (1) Vegetarian (1) Veggie Lite Sub (1) Veiled Threats (1) verizon (1) Verizon Wireless (2) Versace (1) Vertigo (1) veteran's administration (1) VHI (2) Viagra (1) Vibrations (1) Vice President (2) Vice Squad (1) Victims (1) victims advocate (1) victims rights (1) Victor George Holyoak (3) Victor Holyoak (1) Victor Holyoak Violin (1) Victoria Beckham (2) video piracy (1) Videos (1) Vietnam (2) Viggo Mortensen (1) Vigilante (1) Vin Scully (1) Vince Neil Ink (2) Vincent Price (2) Vine Street (2) Vintage (1) Vioxx (3) Vioxx Settlement Scam (1) VIP Followers rip-off (1) VIP Tickets (1) Virgin Mary (3) Virgin Mary of Guadalupe (1) Virgin Mobile (1) virtual kidnapping (1) Virtual Tours (1) virus (1) Visa (4) visa travelers cheque (1) vishing (16) Visionaries (3) Visitors (1) Vitamin Water (2) vlad (2) vlads (1) vladuz (6) Vogue (3) Voice-overs (2) VoIP (6) Volcano (1) Volunteers (2) Vons (2) voter fraud (3) Voters (1) Voting procedures (1) VP Joe Biden (1) Vulgarity (1) wacko employees (1) Wacko Festival Staffers (1) Wacko Web Surfers (1) Wagga Wagga (1) Wah Wah (1) Wake (1) wal-mart (1) Walk of Fame (7) WALL E (1) wall of sound (1) Wall Street Journel (1) Wallflower (1) walmart (5) Walrus (1) Walt Disney (2) Wangfujing Julian Ayrs (1) Want (3) War Memorial (2) war-driving (2) wardriving (1) Wardrobe (3) Wardrobe Advice (1) wards (1) Warner Brothers (7) Warrantless searches (1) Wash Away Pain (1) Washed out (1) Washington (6) Washington Correspondent (1) Washington D.C. (2) Washington Post (1) washington times (1) waste (2) watch (1) Watchtower Challenge (1) Water Conservation (1) Water Shortage (1) Water Sports (1) Waterboarding (1) Wawa (1) Wayne Gretzky (1) Wayne Newton (5) Wealth (1) weapons of mass disruption (1) Web Content (4) Web Site (3) Web Sites (3) websense (5) Wedding (9) Weed (1) WEHO (9) welfare fraud (4) Wendy Greuel (1) Wenesday September 23 screenings (1) Werner Herzog (5) West Coast Intellectual (1) West Hollywood (20) West Hollywood City Council (1) West Hollywood Halloween Carnaval (1) West Hollywood Postal Office (1) West Hollywood Postal Station (1) West Hollywood Sheriff's Department (4) West Hollywood Sheriffs (1) West Hollywood Starbucks (1) West Virginia (1) Western Genre (1) Western Shirts (4) western union (2) Westerns (2) Westwood (5) Wet Dreams (1) Whack (1) Whales (3) Whaling (1) What People Think (1) Whatever Works (1) Whistle-blower (1) whistleblower (2) White on Rice (1) white collar crime (1) White Dudes (1) White House (19) White on Rice (2) White Party (1) White Trailer Trash (1) Whitney Houston (2) Whitney Houston (1) Who's the Boss (1) Whole Foods (1) Wholesome Entertainment (1) Whoopi Goldberg (1) WHY (1) Wi-Fi (1) Wild Life Preserves (1) Wildlife Protection (1) will.i.am (1) William Clinton Foundation (1) William Drayton (1) William Forsythe (1) William Holden (1) william jefferson (2) william sullivan (2) Willie Mays (2) Wilshire Records (1) Wimping Out (1) Window Display (2) Window Dressing (2) Windows Genuine Advantage (1) Winds of Plague (1) Winds of September (1) Wine (2) Wine Sampling (1) Winners (1) Winning Ticket (1) Winona Ryder (1) wire transfer fraud (5) wire transfer+fraud (1) wired news (1) wireless connection (1) wireless technology (1) Wiretapping (1) Wisdom (7) Wish-Fulfilling Goddess (1) Wishy Washy (1) Wizard of Oz (2) Wizardry (1) Women (1) Women's Wear Daily (3) Woody Allen (2) Word of God (1) WordPress (6) work at home scams (1) Work Out Videos (4) work-at-home scams (7) workmen's comp fraud (1) World Apology Tour (2) World Championships (4) World Dance Movement (1) World Health Day (1) World Heavyweight Champion (1) World Largest Tattoo Convention (1) World Peace (1) World Plagues (1) World Politics (1) world privacy forum (3) World Series of Poker (1) World Trade Center (1) World War II (3) worldwide cooperation (1) worm (3) Worst Movie of Year (1) worst quotes (1) Wrath of God (1) Wrinkles (2) Wrinkly Old White Men (3) www.alertaenlinea.gov (1) www.ic3.gov (1) www.texasfightsidentitytheft.org (1) Wynn Resorts (5) xerox (1) xynoMedia Technology (1) Yachts (1) Yahweh (2) Yamgata Scream (1) Yanni (1) Yanni Voices (1) Yawn (1) Yellow Pages (1) Ying Yang (1) YMCA (1) YMCA After School All Stars (1) Yogurt Stop (1) Yoko Ono (9) York Street (1) You are my Sunshine (1) You Lie (1) you're fired (1) Young and Restless (1) Youth (2) Youth demographic (2) youtube (3) Yuugo Kanno (1) Yuval Ben-Itzhak (1) Yves Saint Laurent (1) Zaha Hadid (1) Zak Efron (3) Zane (1) zango (1) zapchast trojan (1) Zen (2) Zeppo's (1) zeus trojan (1) Zip Code 90069 (1) zombie computers (4) Zombie Movies (1) zombies (7) Zsa Zsa Gabor (7) zuftikar ramzan (1) Zulfikar Ramzam (1) Zulfikar Ramzan (1)