Sunday, December 21, 2008

Who Hacked the Halls of Congress?

Came across an interesting story about the halls of Congress being hacked in October 2006. Although no one knows or is saying, some speculate that the attack can be traced to the Chinese, who seem to get accused of hacking into a lot of government systems (worldwide). Of course, the Chinese officially deny these allegations.

Shane Harris of the National Journal reported the attack was initially discovered in one office, but cyber-investigators eventually traced it to eight members' offices, where one or more computers were infected. Besides this, seven committee offices, including the Commission on China, Ways and Means and the International Relations Committee were identified as having compromised computers in them. The International Relations Committee (now the Foreign Affairs Committee) had 25 infected computers and an infected server found in it.

The virus discovered was a trojan designed to allow malware (malicious software) to invade government machines and steal information. The investigation revealed that the trojan was probably downloaded by an employee, who clicked on a link in a spam e-mail. This method of dropping a virus on a computer is usually referred to as Phishing.

Phishing attacks are normally designed to steal personal and financial information, which is later used to commit financial crimes and identity theft. While most phishing attacks (from a historical perspective) have been financially motivated, we are now seeing more person/position-targeted attacks. This type of phishing is referred to as spear phishing or whaling. In April, there were reports of spear phishing attacks against corporate executives all over the country.

The unidentified hackers used a wide-array of attack methods and the malware was downloaded from random Internet addresses. It's suspected they were using other infected machines to launch the attacks, which makes the activity even harder to trace. In this latest instance, it makes sense; the intent was to steal confidential and sensitive information.

The article points out that there is a lot of evidence that the Chinese have "penetrated deeply" into both government and corporate systems.

Just hours before the Olympics, Joel Brenner, the top U.S. counterintelligence official, warned Americans to leave their smart phones and other wireless computer devices at home. He told CBS News that the public security services in China can turn on a cell phone and activate its microphone when the owner thinks it's off. In July, Senator Sam Brownback also warned that China was planning to mount a massive espionage operation on guests staying at major hotels during the Olympics.

Last year there was speculation in the press that Commerce Secretary Carlos Gutierrez's laptop was hacked during a visit to China and the information was used to hack into government computers. Even scarier, rumors abound that Chinese hackers have already attacked power grids and that they are developing a cyber-warfare capability.

The article's conclusion points to a just released Report of the CSIS Commission on Cybersecurity for the 44th Presidency. The study recommends that President Elect Obama establish a Cyber-Security Directorate in the NSC, who would direct a National Office for Cyberspace.

As a mere observer of all of this, I think President Elect Obama needs to take this report seriously. We need to remember (especially while a financial crisis is going on) that besides being a threat to National security, hacking also threatens our financial stability. Although this post points to the Chinese, they certainly aren't the only players in the International hacking game, and the problem it presents isn't going away. Sadly, some believe the problem is getting worse.

There is little doubt that change is needed in the way we address this problem and hopefully this is what will occur.
0 comments

Sunday, December 14, 2008

Keeping an ID Theft Victim's Information Private is Catching On



Tom Fragala, CEO of Truston Identity Theft Services, started his MyTruston identity theft and recovery product based on the principle that he didn't believe an identity theft victim should have to give up their information to a third-party to protect themselves. After all, most of this information gets stored in a database, which is one of main places (besides trash cans) identity thieves go to steal information.

Information stored on databases is legitimately bought and sold by information brokers all the time. Criminals sometimes pose as having a legitimate interest to access the information. Of course, there have also been cases of dishonest employees selling it without a so-called legitimate purpose. This makes it extremely difficult to determine exactly where any stolen information originally came from. At this point in time, so much information has been stolen, we routinely hear about it being sold in chat rooms right over the Internet.

It didn't make sense to Tom to put all this information in another place, where it could potentially be compromised again. Databases have created an ability to store more information than ever before and transfer it with a click of a mouse.

Having been an identity theft victim himself, Tom had some rather personal feelings on the subject. It should also be mentioned that Tom has spent thousands of hours being a personal advocate for victims of this crime.

Since launching the do-it-yourself tool — where you don't have to be an expert to protect yourself or recover from identity theft — it has received numerous awards and become a hot topic within the technology industry itself. Besides not having to be an ID theft expert — you don't have to expose any of your personal information to a third party and the protection aspect is and always has been free. There is a charge for using the recovery tool, which can be cancelled anytime. I'll tell you a secret about that last statement, further down.

I discovered the latest news that the Truston concept is catching on when reading Tom's blog, which is well worth a read if you are interested in identity theft or privacy issues. "Today we announced that our MyTruston product has been included in the portfolio of the Affinion Security Center, the largest provider of identity protection and privacy services. Affinion has nearly 35 years of industry experience and over 65 million members of their many products. Clients of their identity protection and privacy products include Wells Fargo, Bank of America and The Hartford Insurance. Truston's Software-as-a-Service technology is deeply integrated within the Affinion Security Center’s core solution platform, IdentitySecure," according to Tom himself.

Just the day before, Truston also announced a partnership with CreditFYI, which is a one-stop shop for the best credit card rates, best loan rates, as well as, to learn how to protect your good name and credit rating.

Besides Affinion Group and CreditFYI, Truston is a private label partner with Identity Force, which provides identity theft protection services to the U.S. Government. Truston has been given a Four-Star rating by PC Magazine and has received several awards. "Truston's awards include a 2008 Product Innovation Award, a Hot Company 2008 Award, being selected for 10 Companies to Watch in 2008 by the Pacific Coast Business Times, the 2008 Tomorrow's Technology Today award, and it was identified as a leader by Javelin Strategy & Research in their December 2007 identity theft market report," according to the press releases.

If you are interested in just how user-friendly the tool is, the Truston site has a tour you can take.

I've also had the pleasure of speaking with Tom on several occasions and beta tested the tool myself before it rolled out. I've covered this in several blog posts on Tom and the MyTruston identity theft tool.

Now for the secret I promised earlier in the post. I mentioned that using the tool always has been and always will be free, but there is a nominal charge for using he recovery services. The secret is that if you go directly to the Truston site - you can use everything free for 45 days. Last, but not least, this free trial doesn't require you give them a credit card (which will get charged if you forget to cancel) until after the trial expires.
0 comments

Most Internet Scams Start with Spam

I'm sure we've all noticed spam levels are slightly down, or that our spam filters seem to be working a little better. Nevertheless, spam continues to get through filters and for the next few weeks, a lot of it will have a holiday theme. Due to the sour economic situation, it's also likely going to take advantage of financial fears or the promise of a rescue from an already bad situation.

Since most unfortunate situations involving fraud, phishing, and financial misdeeds on the Internet start with a spam e-mail, it pays to use a little common sense and caution before falling for a too good to be true, or sometimes scary e-mail from an unknown source.

Last week, Symantec issued its December 2008 State of Spam Report. It predicts that although spam volumes are down after a lot of providers blocked access to sites hosted by McColo.com, we will likely see them rise again. Spam levels dropped a reported 65 percent after this happened. "McColo.com was allegedly hosting a significant number of botnet command-and-control systems'" according to the report. The bad news is that the report indicates the bad guys are moving elsewhere and that a number of them are hosting their efforts from IP addresses in (where else) China.

Getting back to the holiday season, the report notes that spammers are mimicking marketing come-ons from legitimate retailers offering holiday shopping deals. This makes it hard to distinguish exactly who is behind the e-mail. Sometimes the line between legitimate and illegitimate becomes a little blurry, which is something spammers have always taken advantage of.

The report also reveals a lot of links leading to malware infected sites in spam e-mails are using political themes to draw in their victims. Items related to Barack Obama are especially popular with spammers and scammers. In another twist to using Obama's good name, one spam campaign offered a Barack Obama coin, "a piece of history for only $9.95 plus shipping." This was an attempt to steal debit and credit card information.

Hot news stories were also used as lures to download malicious software. In particular, the recent Mumbai terrorist attacks pointed to links designed to infect machines. Ironically, a lot of this malware is designed to turn a computer into what is referred to as a "zombie," which when used in a botnet is used to send out even more spam.

While we haven't seen the holiday season pass, spammers of the scammer type are already using the IRS name to steal personal and financial information. The pre-tax season phishing scheme mentioned in the Symantec Report involved a come-on designed to snare people by telling them they had a tax refund or economic stimulus payment due to them. The link in these e-mails went to fake IRS site(s) — complete with offical logos — designed to steal personal and financial information.

The IRS isn't alone when it comes to having their good name spoofed. Just this week the FBI reported that their name was being used (yet again) in a campaign involving a typical Nigerian 419 scam. If an intended victim got leery after initially responding — they were threatened with "official consequences" should they fail to turn over the required personal and financial information.

Fear or scaring a victim into submitting to a scam is nothing new. In fact, some of it is now being referred to as Scareware. Scareware most frequently surfaces as a fake message claiming your computer is infected. In then offers to fix the problem for a nominal amount of money. My guess is that malware might actually be downloaded on a system by clicking on one of these come-ons.

Since it's hard to pay in cash over the Internet, anyone who pays on this form of extortion might have their method of payment stolen, also. Symantec recently released another report showing how many personal and financial details are for sale (super-cheap) on the Internet.

Alex Eckelberry of Sunbelt Software and the popular Sunbelt Blog just posted a visual presentation of scareware examples on his Flickr account.

There is little doubt that spam and its intended purposes have made the electronic world somewhat of a "virtual minefield" at times. It pays to make your computer bullet-proof by using good state of the art software from a legitimate vendor, but even if you are protected in this manner, you also need to protect yourself from social engineering schemes designed to lure a person into doing something they are going to regret later.

The Anti Phishing Working Group offers sage advice (from a variety of reputable sources) to the average person on how to avoid becoming a victim. Interestingly enough, they also recently released a report that is rather ominous stating the the number of crimeware spreading URLs are at an all-time high. Crimeware is another name for malware when it has a pure criminal intent.

To close this post, I'll point to a amusing video Symantec did on the 12 Days of Christmas Spam. It's probably best to end on a lighter note on what has become a serious problem.
0 comments

Saturday, December 6, 2008

Is the CheckFree Hack a New Information Theft Trend?

It was revealed earlier in the week that hackers had taken command and control of a free e-bill Web site called CheckFree.com. CheckFree offers their customers the ability to collect all their bills and pay them with a few clicks of a mouse.

CheckFree is one the larger companies in e-payment business and serves about 24.7 million customers. Given this, there is little doubt they have a large amount of personal and financial data passing through their site.

The hacking method appeared to be a little less than sophisticated. Someone stole the username and password to the site and put in changes that directed users to a page that installs malware on the user's machine. This was done by changing the address in CheckFree.com's domain name system (DNS) to redirect visitors to an Internet address in the Ukraine. Although CheckFree is still analyzing the malware, Brian Krebs at the Washington Post was able to quote Trend Micro as saying the malware was designed to steal user credentials.

The registrar, Network Solutions, was quick to claim there had been no breach of their system. At this point in the game — since no one knows or is saying -- my guess is that this statement probably means there was one that they don't know of at this time. Network Solutions did warn their customers about a phishing attack on their customers about a month ago. This has led to speculation that the credentials were stolen by information-stealing malware, or by social engineering (someone being tricked into giving them up).

The Washington Post story also mentions that U.S. Bank might have been affected by this attack, but isn't commenting. In a subsequent post in Security Fix (Washington Post), Brian Krebs noted that Internet security firm known as Internet Identity reported that 71 other domains were pointed at the Ukrainian domain in question during the attack.

Thus far, about 5,000 victims have been identified. As in the past, instances where identities were compromised are being offered free identity theft protection for their unfortunate circumstance.

I decided to look at the CheckFree site itself. The reason I did this is because whenever I see the word "free," especially in cyberspace, I've learned to be wary.

According to CheckFree.com, everything is free on their site except for fees charged for the use of credit cards and emergency (rush payments). On the site, they publish in bold phrases like "one easy," "secure location," "no charge," and "100% guarantee."

They even run an ad for FreeCreditReport.com on the main page of their site. Although I have to admit that the guitar dude FreeCreditReport.com uses on their ad is pleasing to the eye, the catch is that you automatically sign up for a service that charges you $14.95 a month. You can get around this by cancelling within the first seven days. If you read the fine print disclaimer on FreeCreditReport.com, it says, "ConsumerInfo.com, Inc. and FreeCreditReport.com are not affiliated with the annual free credit report program. Under a new Federal law, you have the right to receive a free copy of your credit report once every 12 months from each of the three nationwide consumer reporting companies. To request your free annual report under that law, you must go to http://www.annualcreditreport.com/." Most experts agree that a person can do the same thing these services offer for free and that most of them do not protect from all forms of identity theft.

I got a little off-track with the FreeCreditReport.com ad, but it amazes me how few people read the small print on guarantees. Because of this, I decided to check out some of the small print on the CheckFree site.

So far as the fraud guarantee — if you read the disclaimer — you have to notify them within two days of the transactions to limit your liability to $50.00. It's pretty unlikely that anyone falling for a fraud on a financial transaction is going to figure it out in two days.

It also guarantees payments will make it on time, as long as you send them within the time period specified in the service agreement. In looking at the service agreement, this is two days before the bill is due. Of course, they do offer rush payments for a fee.

So far as "secure location" statement, if hackers were able to get the admin username and password to their site, this assertion is, at the very best, questionable.

In a second post about this story in Security Fix (Washington Post), it brings up evidence that registrars have been identified by the cyber-criminal community as lucrative targets. This assertion is backed up by recent security studies on the security of domain registrars. This makes sense because some of these sites like CheckFree are a window to hundreds of financial institutions, protected by a single username and password.

I'm surprised no one has raised the question of whether or not the financial information — which presumably has to be stored for record keeping purposes — might have been compromised.

In my limited experience with domain registrars, I've run into some frustrating experiences when trying to report sites (sometimes laden with malware) that were set up for no other reason than to steal personal and financial information. I've found that if you want to get a quick response with some of them, you need to be persistent to the point of being a pest. Given that most fake sites are designed to only stay in operation for a short period of time before they move on, it's like playing a game of whack-a-mole. Because of these experiences, I'm not confident they will be quick to react to this new security challenge. Let's hope I'm wrong.

In the world where outsourcing and contracting have become the norm, it isn't surprising that financial institutions are using third-party platforms to perform financial transactions. Every time information is given to a third party, it makes protecting it more difficult. The reason for this is different standards for protecting information (especially when international borders are crossed) and the fact that back door access is being given to more and more people. In the end, it is human beings who come up with the schemes to steal, not computers.

Whether or not this becomes a trend or not probably depends on how financially lucrative this method of attack becomes for the hackers who did the dirty deed. Of course, if we learn from it and take immediate action, perhaps we can limit some of the damage that could occur. I guess time will be the best judge of that.
0 comments

Wednesday, December 3, 2008

How to Legally Buy Hot Merchandise


(Courtesy of PropertyRoom.com)

Auction sites like eBay and Craigslist are frequently criticized for the amount of stolen and counterfeit items being sold on their sites. Even worse, stories about their customers being scammed have become Internet folklore.

Now there is a site that openly advertises that it is selling stolen merchandise. Even better, when you buy hot merchandise off this site, you need not worry about the authorities showing up at your door in the wee hours of the morning with a search warrant. The reason for this is that the site is stocked by over 1500 Police Departments and is run by former law enforcement types.

The site, PropertyRoom.com is an e-version of the more traditional auctions held by Police departments to get rid of unclaimed stolen property. "With distribution and service centers nationwide, PropertyRoom.com specializes in the auction of stolen, seized, found and surplus goods and vehicles. Serving over 1,100 law enforcement agencies nationwide, we offer a fraud-free marketplace with superior customer support." according to the "about us" page on the site.

I decided to surf the site and it contains a wide array of goodies at cheaper prices than what I've seen being fenced (speculative) on other Internet auction sites. For instance, desktop computers being auctioned were being bid at well under $100, laptops were showing bids of $100 to $400 and iPods were being bid anywhere from about $16 to $150. Of course computers aren't the only items available on the site, which hawks all kinds of electronics, watches, jewelry, tools, cameras, cars and a host of other high theft items.

It is well known that criminals like to steal high value items that are easy to transport. They also tend to go after items that are popular and easy to sell (fence). If you are looking for popular items, this site is a good place to buy them at an almost too good to be true price, legally.

PropertyRoom.com also is in the fund raising business and will help charitable organizations raise money. All the costs of putting on the event are covered by PropertyRoom.com. I should also mention that some of the proceeds of the sales on the site help fund law enforcement agencies, who like the rest of us, are dealing with ever-dwindling financial resources.

They also maintain the only nationwide registry available to the general public for recovering lost or stolen goods. This service is completely free. You can register items that were stolen already, or your high value items that might be stolen at a later date. If they receive an item that matches what you have registered — your property will be returned to you. Try doing this at any of the other auction sites!

The Internet has opened new avenues for criminals to fence stolen merchandise. This has made it easier to sell stolen merchandise and there are many who believe that it contributes to the problem. The most recent survey by the National Retail Federation estimates that Organized

Retail Crime is a $30 billion a year issue. Their most most recent Organized Crime Survey showed that e-fencing on traditional auction sites has grown by six percent. In response to this, they are even pushing bills in Congress to force the auction sites to allow more access to law enforcement and retailers, who are attempting to shut down this activity.

Even the government has found some of their stolen merchandise available for sale on eBay and Craigslist.

Please remember this doesn't even take into account the billions of dollars of property stolen from ordinary people. It also doesn't take into account the ordinary people who are scammed on auction sites, either. I wouldn't worry about getting scammed on PropertyRoom.com — I'm pretty sure they cooperate with law enforcement to the fullest extent.

We all know money is tight this Christmas season and there are a lot of people trying to stretch their limited resources. PropertyRoom.com is a place where you can do it and be certain that you are not contributing to a growing problem.
0 comments

Friday, November 28, 2008

Home Equity ID Theft Ring Points to a Bigger Problem

On Monday, Federal authorities informed the public of a series of arrests where identity theft was used to steal the equity out of homes. I guess we've already lost so much money in the mortgage crisis, the identity thieves figured it wouldn't matter?

The four arrested on Monday were Derek Polk, Oluda Akinmola, Oluwajide Ogunbiyi, and Oladeji Craig. The four appeared in federal court in Los Angeles, Newark, Buffalo, and Springfield. Also arrested for home equity schemes between August and October were Daniel Yumi (Brooklyn), Yomu and Olokodana Jagunna (Queens), and Abayomi Lawal (Brooklyn).

Strangely enough — although no one in the mainstream media is saying — most of these names sound slightly foreign. Judging by the surnames my best guess is that they are originally from West Africa, probably Nigeria. Stories of Nigerian fraud are extremely popular in the media so I'm surprised no one took this opportunity to put that twist to this story.

In all fairness, in previous posts, I've lamented that fraudsters often pose as Nigerians or the media incorrectly pegs fraud as coming from Nigeria when it doesn't. There is no doubt Nigeria is known for a lot of fraud, but they didn't invent it and are not the only players in the game.

It should also be noted (out of fairness) that court documents reflect the federal authorities stating that this is the result of an investigation into a multi-national identity theft ring. There are a lot of fraud groups out there, both foreign and domestic, and many of the experts have concluded they are working together when it suits them.

The proceeds of these home equity scams were wired all over the world, including South Korea, Japan, China, Vietnam, Canada, and the United Kingdom. According to news accounts about $2.5 million was wired and the total take in the scheme was about $10 million.

Sadly — although this has been called out as a problem frequently — a lot of fodder (information) used in the scams was obtained by none other than public record searches. The public records used even contained credit applications, credit reports, and the victims' signatures, according to the FBI. BJ Ostegren — who was kind enough to give me a personal demonstration a while back — is the champion of exposing just how much of this information is out there for anyone to grab. If you want to see exactly how much information is available, her website is a good place to start.

Also mentioned in the criminal complaint was that fee-based Internet services were used to obtain some of the information. This is a huge business, which nets billions of dollars a year for the people selling it. I did notice that no one is saying which one of the services were used.

It should also be noted that information like this is bartered in forums on the Internet. Symantec just released a report showing how cheaply some of this information can be obtained. This type of activity is fairly well known and the FBI recently cracked one of the forums (Dark Market). This group allegedly racked up about $70 million in fraud, worldwide.

The individuals arrested in this scheme also used a lot of known technological fraud crutches, such as caller ID spoofing, prepaid cellular, and forwarding calls without the owner's knowledge. Tricking a phone company into forwarding calls is no problem for most fraudsters as little to no due diligence is performed before it is done. You can have your carrier block this feature, or password protect it (recommended) — however doing this is left entirely up to you. So far as caller ID spoofing — it's essentially legal — and anyone can purchase the means to do it right over the Internet.

There probably won't be any effort to change call forwarding, or caller ID spoofing as it is a lucrative income stream for telecom businesses.

You would think as long as we are in a world-class financial crisis, we might begin to wake up and smell the coffee? Although, we can't blame fraud as the cause of the entire crisis, I often wonder how much of a contributing factor it is. We've made identity theft too easy to do and hard to control. The people who committed this latest form of identity theft probably aren't the sharpest tools in the shed. They are just taking advantage of other people making a lot of money by making too much information available and not protecting it.

If you look in the mirror you might get an idea who suffers from this seeming inability to fix a growing problem. Even if you aren't victimized, we all pay for it in the end — either in an organization's expense line or in the form of a government bail-out.

I'll close with a with an interesting satire written by Phillip Maddocks, which came out in the Norwich Bulletin entitled, "Credit card fraud gangs say they can fix economy but need government loan." This satire is about the heads of several credit card gangs who are seeking a government handout to keep credit card fraud alive because it is beneficial to the economy.

Although this is a satire — it has a ring of truth to it!

Unfortunately, we allow a lot of dumb things to continue because someone thinks it's beneficial to the economy.
0 comments

E-Cards with a Dangerous Twist Spotted on the Internet


(Courtesy of Websense)

With the holiday season upon us, spam campaigns of a malicious nature will start springing up bearing yuletide greetings.

Just the other day, Websense sent out an alert that malicious software authors already are using social engineering techniques with a Christmas theme to compromise your home machine. The instance they are reporting uses spam e-mails offering free animated postcards.

Those unfortunate enough to attempt to get free e-cards will download a Trojan. The spam e-mails are spoofed to appear as if they come from postcard.org. The fact that malware (postcard.exe) is being installed on a machine is covered up with a xmas.jpg image.

Quite simply, once installed it allows cyber-scrooges to control your machine and or steal all the personal and financial information off it. The information is then normally used to steal money.

This type of attack is nothing new and seems to surface every year at this time. The next step in these campaigns normally are more personalized spam e-mails designed to do the same thing (download malware). Please note these e-mails are normally spoofed to appear as if they come from a legitimate e-card retailer.

Last year, American Greetings put up a page on their site to educate people how to spot and avoid falling victim to this type of attack. First and foremost, they recommend that if you are suspicious at all to go to the company site and try to pick up the greeting from there. Most (if not all) of the legitimate sites offer this service. The page on their site contains additional ways to identify "e-card garbage" and is well worth a look if you are unfamiliar with how to spot malware attacks using spam e-mails.

American Greeting put up this page after an attack on their brand. In this attack, some of the e-mails appeared to come from a known (trusted) person. My guess is this happened from an already compromised machine, where a spammer gained access to an address book and sent the e-mails out. Some forms of malware do this without any human interface.

I went to the Postcards.org site and thus far they have no warnings about this that I could find.

While the best thing to do is to avoid clicking on spam e-mail containing malware, the second best thing is to employ solid anti-virus software and a firewall from a reputable vendor like Websense, Sunbelt, or Symantec. Most of these vendors are on top of malware being issued in the wild (on the Internet) and they even share information with each other.
0 comments

Sunday, November 23, 2008

Outrageous Porn Pop-Up Case in Norwich is Over

If there were ever a modern case that could be compared to the Salem witch trials, it would be the effort to prosecute Julie Amero, a Norwich, Connecticut school teacher for (allegedly) exposing her students to pornography.

Julie was convicted on four counts of exposing kids to pornography after she turned on a spyware-infested (school-owned) machine and a flurry of porn pop-ups began appearing on the screen. Julie, who was merely a substitute teacher, didn't know what to do and the teenagers in her class witnessed the event.

Even worse, the school district had let their content filtering software expire. Computer experts later discovered the spyware infestation was caused by someone accessing a hairdressing site. Presumably, this site was accessed by a student, who wasn't aware of the spyware and didn't know the school district had let their content filtering expire.

On Friday, Alex Eckelberry, CEO of Sunbelt Software, announced that the Amero nightmare is over in his popular Sunbelt Blog. Sadly though, she still had to plead to a misdemeanor charge of disorderly conduct. The result was a $100 fine and she has had her teaching credentials revoked in Connecticut.

Considering in the initial trial she was facing a conviction on four felony counts — which could have netted her 40 years in the slammer — I suppose this is a win?

"She acquiesced to the lesser misdemeanor charge, and while it may have been a bitter pill to swallow, she can at least can move on now without this sick cloud hanging over her head. It was less than two years ago that Julie was facing felony charges with a maximum of 40 years in prison," according to Alex Eckelberry,

Alex and a host of people from the computer security industry, along with a pro bono attorney, William Dow, led the effort to expose this injustice and get Julie a new trial. The number of people who got involved in this is amazing and many of them are mentioned in Alex's blog post.

I found this case amazing since malicious and even so-called commercial sites infest unprotected machines with all kinds of "ware" on a daily basis. In this case, it was the industry that protects computers from unwanted "ware" that had to step in and educate the authorities that there was a problem with the intent in the case. Perhaps the authorities should have hired someone a little more knowledgeable in computers in the first place before attempting to prosecute Julie.

Sadly, Julie's health has been failing as a result of the stress induced by this prosecution. Even sadder, with all the real crime on the Internet, which rarely ever results in a prosecution, a lot of taxpayer money was wasted going after someone who most believe was completely innocent!

I've written a few posts about the Julie Amero story. It's ironic that Internet porn, which is allegedly controlled by organized crime, translated into a teacher being charged for turning on a computer for the first time. Even more ironic is that in those four years, very few, if any, of the people behind the actual problem have been brought to justice. Also, ironic was a WebMD survey that found that Internet porn reaches most children, including the age of the teenagers present in Julie's class that day. The truth is that most of the teenagers in the class have probably seen worse, unless they've never surfed the sometimes murky waters of the Internet.

The ironies in this case are many and in the end, history will write it that way.
0 comments

Saturday, November 22, 2008

Mortgage Casualties Flocking to the NFCC for Free Assistance!

There hasn't been a whole lot of good news on the economic front in recent weeks and the mortgage crisis has inspired our politicians to mortgage our grandchildren's future. Ironically, most of the experts believe it all started with what is being called the "mortgage crisis."

Even worse, the average person is merely a hostage in the equation because, without the bailouts, there is little doubt it would cause more pain and suffering for the common person. Still it's pretty disgusting to see corporate suit types getting millions of dollars in bonuses and showing up in Washington with their hands out after failing in their jobs. So far, we haven't seen much help for the people funding this massive bail-out, but if you look hard enough, there are a few places where an average person can get a little help free-of-charge.

The National Foundation for Credit Counseling (NFCC) is one of the few places helping the little people dig out of the mess that has been created by, in my opinion, a few greedy people. The NFCC is getting busier all the time, registering 70 percent more calls for help than they did last year in October. For the year, they are registering 30 percent more calls. Sadly, this statistic might reflect that more people are reaching out for help.

The NFCC has been around since 1951 and is considered the longest serving national nonprofit credit counseling organization. They provide free financial advice at over 850 offices located throughout the country. Consumers can take a Mortgages Reality CheckSM, a self-assessment test that determines one's risk of foreclosure. Year to date, statistics reflect a 33 percent increase in people taking this test. Even worse, those showing up in the red danger zone have increased 15 percent compared to last year. Statistics also reveal that the number of people seeking counseling from the NFCC has grown 63 percent over last year.

If you were to go by these statistics, the mortgage crisis is getting worse. To rise to the challenge, the NFCC has increased the staff of NFCC-Certified Credit Counselors 10 percent (almost 2,600). They have also increased the number of NFCC-Certified Housing Counselors by 25 percent.

“Arguably, we’re living in the worst economic times of our lifetime. Consumers are smart to reach out for help, and doing so sooner rather than later is always preferable. Whatever your financial problem may be, you do not have to go through it alone,” according to Gail Cunningham, spokesperson for the NFCC.

The NFCC can help people online, or by calling (800) 388-2227. For a Spanish-speaking counselor, call (800) 682-9832. Their website also has a Spanish version.
0 comments

Saturday, November 8, 2008

Telephone Call Offering to Lower Interest Rate is a Scam!

Cheap long distance, the ability to spoof caller ID and the credit crisis are being used to facilitate a scam called vishing. Although telephone (telemarketing) scams are nothing new, the term vishing probably came about because advances in telephone technology are being used to depart unsuspecting people of their hard-earned money.

The term vishing was coined from the word phishing. Internet scammers phish the waters of the Internet using spam e-mail as bait. Once a person falls for their "too good to be true" lure -- personal and financial information is stolen using social engineering (trickery) or malicious software designed to data-mine the information right off the infected machine. The personal and financial information is then used to commit financial crimes, which is often referred to as identity theft.

In the past week, I've received several calls where a computerized voice informs me that the offer to lower my interest rate is almost over. It then says to press "1" if I want to lower my interest rate.

I went ahead and pressed the number "1" to see what this "too good to be true" offer was all about. After a few seconds, a female voice came on and asked me if I was interested in lowering my interest rate. I told her I was and she asked me for the 800 number of my financial institution so she could verify my eligibility. Since this is public information, I went ahead and gave one to an institution, I no longer do business with. While I was digging up the number on the Internet, she made a lot of inquires about how many lines of credit I was behind on. After providing her with the 800 number, she asked me to give her all the credit card numbers that I wanted to lower the interest rate on.

At this point, I had very little doubt I was dealing with a scam designed to steal credit card numbers. At no point did she identify a financial institution -- and besides that -- no financial institution would make a cold call and ask for credit card numbers. Additionally, when was the last time a financial institution offered to lower an interest rate to an existing customer unless they were being bailed out by the government (taxpayer)?

I asked if she felt good about ripping people off and if I could speak to her supervisor. Of course, I was never referred to a supervisor and after cursing at me, she hung up. Trust me, from the vulgar language that was expressed, this call was not being recorded for training purposes!

In the past couple of years, we've seen reports of vishing. In the case, I'm writing about a dialer system is obviously being used. Dialers are used by collection agencies, telemarketing companies, political campaigns and even charities to direct calls to live employees. Basically, dialers screen the calls via computer to make the process more efficient.

Having never priced one, I decided to see what Google had to offer. I found them to be rather inexpensive starting at a mere few hundred dollars. There were also options to use already set-up systems on a cost-per-call basis.

Caller-ID spoofing services can be purchased legally and are used by a lot of legitimate companies to entice us to pick up calls. Because of this, it is probably wise not to put your faith in caller-ID.

Some blame VoIP (Voice over Internet Protocol) technology for vishing. VoIP has made calling long distance cheap.

So far as where the victim lists are obtained, they can be easily purchased. My phone number has been unlisted for over 20 years, but information brokers data-mine information from every source imaginable, including magazine subscriptions. Since these lists are worth money, companies who gather information routinely sell the marketing information they gather on all of us. It also isn't unknown for dishonest employees to sell information directly to criminals. Often this is done right on the Internet in chat rooms, which keeps the transaction fairly anonymous.

Recently, the FBI announced that they stung an Internet forum used to sell stolen information known as Dark Market. At it's peak, the group had 2500 registered members and it is estimated that they prevented losses of $70 million (worldwide) by cracking this case.

Even the IRS and Social Security have been impersonated in the past two years in vishing schemes.

InsideCRM magazine recently published an article detailing 50 ways to protect your privacy. This magazine represents the call center industry and has a stake in fighting vishing activity, which gives legitimate e-commerce a black eye. If you (like a lot of us) enjoy the hassle-free environment shopping at home, the article is a great educational resource.

The U.S. government has also set up a highly visual and interactive site to educate people about crimes being enabled by technology. Please note this site is available in Espanol, also.

While both of these sites are designed to cover computer security issues in addition to telecom type scams, we need to remember that a lot of these scams probably started before telephones or computers made them easier to do, as well as, more efficient.

Scams rely on human emotion and greed. Knowing this is the best way to prevent yourself from becoming a victim. The "too good to be true" principle coupled with "does the transaction make sense" is the best way to figure out whether an offer is legitimate or NOT!
0 comments

Sunday, October 26, 2008

Microsoft is NOT the Biggest Hacker in China!

Chinese surfers are crying foul at Microsoft's launch of the "Windows Genuine Advantage Program," which turns a screen black when it detects pirated software. It is believed up to 200 million computer users in China have counterfeit software on their machines.

China is well-known for being involved in the knock-off trade, as well as, selling dangerous and defective products in the global economy. The news has had a lot of stories about them censoring the Internet, violating user privacy and being involved in hacking on an industrial scale.

Ironically, Dhong Zengwhi, a Bejing lawyer, accused Microsoft of being the "biggest hacker in China with its intrusion into users' computer systems without their agreement or any judicial authority," according to the China Daily. His argument is that this will cause serious functional damage to users' computers and according to China's criminal law, Microsoft could be accused of breaching and hacking into computer systems. Zengwhi has filed a complaint with the Chinese government about this.

Does this mean Microsoft won't be able to out-source work to China?

I wonder if Mr. Zengwhi's opinion was when it was revealed that the Chinese were data-mining the communications of Tom-Skype users? Tom-Skype is the Chinese version of the popular Skype software, which allows people to communicate worldwide using the Internet.

Privacy violations in China aren't limited to Tom-Skype communications, either. During the recent Olympic games, the government openly monitored Internet communications, using the excuse of security to justify what many believe was censorship.

The allegation that Microsoft is the biggest hacker in China is questionable. Governments from all over the world have accused the Chinese of hacking into their systems and it isn't considered safe to carry a laptop, or even a smart-phone when visiting China. Recently, there was speculation that Commerce Secretary Carlos Gutierrez had his laptop hacked during a visit to China.

In fact, if you follow the news, the theft of intellectual property is often traced to the Chinese. The FBI has caught numerous Chinese agents stealing a lot of private and government information in the recent past.

Pirated software is a huge problem in the global economy. It is estimated that one third of all software being sold is counterfeit. A large percentage of the software sold on auction and even e-commerce sites is counterfeit, also. It isn't unknown for a consumer to think they are getting legitimate software when they are not.

Besides costing jobs and revenue to legitimate firms -- knock-off software can damage a machine, or even lead to information theft when malicious software is added to the mix.

I'm sorry that that certain people in China are outraged by Microsoft's solution to the theft of their property, but let's face it, they are hardly the biggest hacker in China.
0 comments

Thursday, October 9, 2008

Yahoo Software Engineer Accused of using Hacking Techniques in Terrorist Bomb Plots

In July, an Islamic terrorist group sent e-mail messages claiming responsibility for bombings in Indian cities before the acts took place. The messages were sent by hacking into unsecured wireless networks and one suspect in the case has been identified as software engineer, Mohammed Asghar Mansoor Peerbhoy, who is a Yahoo employee.

Peerbhoy allegedly made several work related trips to the U.S., while employed by Yahoo. It is alleged that he, along with two other Indian software engineers, were part of a media terror cell. One of the engineers has been identified as Atiq Iqbal and Mobin Kader Chaikh and Asif Basrudding Shaikh have been named as the techie connections in the case. One worked for an IT firm and the other was a qualified mechanical engineer. Fifteen people have been arrested in the case thus far.

One of the emails which the hackers sent can be viewed on deshgujarat.com.

The Times of India alleged that Peerbhoy admitted in an interrogation to attending a hacking course, where two foreigners were present. This was an ethical hacking course designed for training internet security workers. Ethical hacking courses are offered all over the place and given that India is part of the global economy, the tie between foreigners and terrorist activity is questionable.

The Indian authorities are stating that the wireless networks were hacked using a fairly well-known technique often referred to as wardriving. Once they secured an unsecured network (pardon the pun), they programmed the e-mails to be sent shortly before the blasts, according to the authorities.

Wardriving is a pretty simple hacking method where someone drives around until they find an unsecured signal. Most wireless cards have the capability of sniffing out available networks. Once an unsecured network is found - getting on it normally only requires the click of a mouse. Teen age hackers are known to engage in this activity for fun. In most cases, any wireless network can be made "hacker proof" by simply password protecting by using the instructions you get when you buy the router. Wardriving has recently been made a felony in the United States.

This story illustrates that you don't have to be very sophisticated to commit crime or terrorism with a computer. Quite often, pretty simple techniques can equate to devastating results. Much more sophisticated do-it-yourself hacking kits, which sometimes come with technical support, are easily obtained on the Internet black market.

Saying that, the end result in this case is tragic.

India has suffered a rash of bombings in recent history. The specific terrorist group behind the incidents in question is known as the Indian Mujahideen, known locally as the IM. It is believed to be affiliated with another Indian terrorist group known as Student Islamic Group of India (SIMI). The Indian government suspects SIMI has been penetrated by Al Qaeda.

Initial arrests in this case were made when Indian authorities tracked down suspects in the case after discovering cell phone numbers the group used and investigating them.
0 comments

Tuesday, October 7, 2008

How Using Pirated Software Turns People into Internet Crime Victims

The Business Software Alliance's October report called Online Software Scams: A Threat to Your Security reveals the dangers of buying or downloading pirated software. Sadly, pirated software doesn't always advertise that it is counterfeit and often appears to be the "real thing" to the untrained eye. This poses a clear and present danger to anyone shopping for software, whether it be on a e-commerce site, peer to peer (P2) site or at a more traditional shopping venue.

In the report's introduction it points to an actual example of how a misguided employee of the Wagner Resource Group of McLean Virginia used his office computer to download video and music files using Limewire and exposed the entire corporation to the dark side of the Internet. "In this case, the Wagner employee’s action set off a terrible chain reaction, opening up the firm’s computers to outsiders and exposing the names, dates of birth, and Social Security numbers of about 2,000 of the firm’s clients, including US Supreme Court Justice Stephen Breyer, according to the report.

Although many view downloading a video or music file as a victimless crime, the consequences can become personal when cyber criminals add a little malicious software (often referred to as crimeware) to the mix. Specifically, it can lead to identity (information) theft or turn a user's machine into a zombie, which is controlled remotely and used to commit other misdeeds on the Internet.

It is estimated that one-third of all software is counterfeit. In 2008, a study was conducted that revealed that if software piracy could be reduced by 10 percent in the United States it would generate 32,000 new jobs, 41 billion in economic growth and 7 billion in tax revenues.

A lot of pirated software is sold via downloads. When this occurs, the normal form of payment is a credit or debit card. This means that the person, who buys pirated software is providing this information to a criminal, who in turn might use it again or sell it to a third party. Like pirated software, credit/debit card information is sold on the Internet in underground chat rooms.

The report also covers another area, where Internet crime is known to flourish, or auction sites. In 2005, a study was done on software sold on eBay and roughly 50 percent of the items purchased had malicious/unwanted elements or had been tampered with.

While auction sites have worked with outside industries on preventing theft and abuse, they generally disclaim any responsibility for what occurs on their site. Additionally, there is little to no protection for the consumer buying these products (my opinion).

Because of this, the BSA is calling for auction sites to assume responsibility, step up the warning process on their sites and slow the process down by eliminating the "buy it now" process, which makes monitoring illegal sales nearly impossible.

The software industry isn't the only industry calling out issues with auction sites. In August, two bills were introduced to combat crime on auction sites, which were largely supported by the National Retail Federation. The sale of stolen or counterfeit goods in general has long been an issue on these sites. A good resource to learn about the danger of counterfeit goods in general is the International Anticounterfeting Coalition.

The BSA offers a lot of tips for consumers on how to avoid becoming a victim in their recently released report. It also offers a more visual means of learning by offering a video on the subject.

Suspected piracy can also be reported at http://www.bsacybersafety.com/ or by calling 1-888-NO-PIRACY.
0 comments

Sunday, October 5, 2008

TOM-Skype Communications - A Privacy Nightmare Come True

I've blogged frequently about the dangers of engaging in free trade with a not so free China. In the past couple of years -- we've seen an alarming amount of stories about dangerous and defective products, espionage, human rights violations, counterfeiting and privacy violations associated with the People's Republic.

The latest privacy violation was discovered by Nart Villeneuve from the University of Toronto's Citizen's Lab, who discovered that the Chinese were data-mining the communications of TOM-Skype users.

"Skype is software that allows users to make telephone calls over the Internet. Calls to other users of the service and to free-of-charge numbers are free, while calls to other landlines and mobile phones can be made for a fee. Additional features include instant messaging, file transfer and video conferencing," according to Wikipedia.

When Nart Villenueve forgot the password to his Chinese MySpace page and began looking at the Chinese version of Skype (TOM-Skype), he uncovered the massive privacy breach with TOM-Skype. His findings were that full chat messages (including those of Skype users communicating with TOM-Skype users) were being stored on servers in China. He also discovered that the data was being stored on insecure publicly-accessible webservers along with the encryption key needed to decrypt the information. The messages are tracked by keywords relating to what the Chinese would consider "sensitive political subjects." Analysis also revealed that information might be maintained by specific user names.

Also discovered was evidence of security problems at TOM Online, the Chinese company that owns TOM-Skype. Evidence was found that the servers have been compromised in the past and used to store pirated movies.It probably wouldn't be hard for a malicious attacker to access these stored communications, which include detailed user profiles.

Josh Silverman, the president of Skype, did a blog post discussing this subject. He was quick to point out that the only people being monitored were the parties using the TOM version of the software. Of course, this also includes anyone communicating with someone using the TOM version. He also claimed that Skype was unaware of this privacy breach until it was surfaced by the Citizen Lab.

Since September, Chinese Skype users have been directed to the TOM-Skype site to download the software. There has raised concerns that a trojan could be dropped on a user when downloading the Chinese version. A trojan is a form of malicious software, which can be used to steal all the information from a computer.

The full report from the Citizen Lab at the University of Toronto is an interesting read. While there is little doubt from this report that TOM-Skype is being used to track politically sensitive subjects, there are probably a lot of foreigners using TOM-Skype to communicate with loved ones while they work in China. This opens the door for personal information to be stolen and corporate espionage to take place.

Anyone using Skype to communicate with someone in China should be aware that they are being monitored and avoid revealing any personal or sensitive information.
0 comments

Tuesday, September 16, 2008

Improved OnGuardOnLine Site Teaches Cyber Safety to the Average Person



One of the better places for the average person to learn about the sometimes murky waters of the Internet is free and sponsored by the Federal Trade Commission. Although OnGuardOnline.gov and AlertaEnLinea.gov, its Spanish-language counterpart have been around for awhile -- some new and exciting improvements have been made to the site with a just released Web 2.0 redesign.

The new and improved site allows users to grab and embed games and videos, search for topics on the site, take a “show of hands” poll, and have a more interactive experience while learning how to avoid becoming an Internet crime statistic.

Articles and games covering sixteen topics -- including social networking, phishing, email scams and laptop security; plenty of buttons and banners you can post on your blog or website; free publications consumers and organizations can order; and links to the OnGuard Online partners from the public and private sector.

I should add that a lot of good people from both the government and private sectors have given resources and their valuable time to assist the Federal Trade Commission with this site. Industry and government partners -- include the U.S. Department of Justice, Office of Justice Programs, Department of Homeland Security, Internal Revenue Service, United States Postal Inspection Service, Department of Commerce, Technology Administration, Securities and Exchange Commission, National Cyber Security Alliance, Anti-Phishing Working Group, i-SAFE, AARP, National Consumers League, Direct Marketing Association, WiredSafety.org, The SANS Institute, The National Association of Attorneys General, Better Business Bureau, NetFamilyNews, CompTIA, National Crime Prevention Council, Association of College Unions International, and the Latinos in Information Sciences and Technology Association.

In my opinion, this represents a valuable partnership in dealing with the ever growing problem of crime on the Internet. This also represents a very credible collaboration of resources and industry experts (my humble opinion).

There is also a lot of material that businesses and organizations can use to educate their people with. Frequently, I get approached on this subject and I will continue to recommend this site as a valuable resource. Of course, the benefits for the individual person wanting to protect themselves, or become more knowledgeable are there (free for the taking), also.

If you are one of those businesses or organizations wanting additional matertials, you can get free OnGuard Online publications. For 50 or more copies, visit ftc.gov/bulkorder. If you need less than 50 copies, call 1-877-FTC-HELP.

0 comments

Monday, September 15, 2008

Virtual Kidnapping - A New Version of a Confidence Trick!

Not all the kidnappings in Mexico and the United States are real. The US Immigration and Customs division gets reports of virtual kidnappings, where the intent is to extort money, but the alleged victim is safe and sound.


The kidnappers appear to be able to find out who is traveling to Mexico and/or is coming into the US illegally. They then call a family member or loved one, claiming they have the tourist or illegal immigrant hostage and demand money for their safe return.

I happened to pick up this story on Fox News, which reported that Immigration and Customs in Phoenix gets a report about once a week of smugglers holding a hostage. Although 75 percent of them are real, about 25 percent are bogus, according to the story.

The reason the virtual scam works is probably that real cases of people being kidnapped are becoming commonplace south of the border. In April, CBS News reported that a hotline set up in Mexico City to deal with extortion cases had received 44,000 calls since December. The hotline statistics recorded were 22,851 extortion attempts avoided, 3,415 telephone numbers identified as being tied to extortionists, and 1,627 people who paid off the virtual kidnappers.

In another version of virtual kidnapping, an illegal immigrant already in the country is contacted and told that a family member is being held hostage in Mexico. It's not unknown for smugglers to hold onto a family member and extort money from illegal immigrants whom they have brought across the border. With all the real kidnapping going on, it makes sense that fake ones seem legitimate.

In April, the New York Times did another story on virtual kidnapping. In their article, they speculated that at least some of it was being done from Mexican prisons. Apparently, the guards look the other way as long as they get a cut of the action. The article also mentioned that besides virtual kidnapping, other telephone scams are rampant in Mexico, like the sweepstakes variety, a type of the infamous advance fee (419) scam.

Network World asked why this type of kidnapping is referred to as virtual. Paul McNamara wrote a interesting piece pointing out that the term "virtual" doesn't really fit in these cases. "The crime itself is horrific — beyond comprehension in its cruelty — so there's some hesitancy to complain about semantics. But this is a technology column and the underlying issue — society's tendency to blame modern-day bad deeds on technology instead of the bad-deed doers — is an important one," according to McNamara.

He makes a very good point: scams designed to part people from their hard-earned money didn't start with the computer age. Confidence tricks have been around for a long time and virtual kidnapping is merely that, a confidence trick. A good example is what is known as the Spanish Prisoner letter, where someone was tricked into thinking they were securing the release of a wealthy individual (who couldn't reveal their own identity) from prison in return for future compensation. This particular scam dates back to well over 100 years ago.

The Internet is full of too-good-to-be-true scams, which use greed to lure victims. Besides greed, fear is another lure scammers use. We see this on the Internet in threatening letters allegedly from government agencies, or even in what is known as the hit-man scam. In the hit-man scam, a person is intimidated into paying someone off to remove a contract that has supposedly been taken out on their life.

Scams using the telephone are becoming more and more common as well, dubbed "vishing." Here the telephone is used to perform confidence tricks of all sorts, and/or to steal personal and financial information later used in identity theft schemes.

This doesn't take away from the fact that a lot of people are victimized because of the not very secure situation we have on our border. It often seems that the criminals are more in control than the authorities, and besides confidence tricks, we see an overabundance of crimes that threaten public safety and, some say, our national security.

Until we take the control of the border away from criminals, we are going to continue seeing a lot of people victimized.

0 comments

Friday, September 12, 2008

Will Ike Spike Another Round of Price Gouging?

With Hurricane Ike headed for South Texas -- some are predicting that greedy businesses will gouge people by charging unfair prices for necessary goods and services.

Yesterday, the Texas AAA issued a press release encouraging people to report any suspected gouging. They noted in past disasters hotels, gas stations and convenience stores have been caught taking advantage of other people's unfortunate situation during a disaster. Goods that frequently have their prices artificially raised include gas, drinking water, batteries and food.

The Texas AAA recommends that if you think you have been gouged to keep your receipts and file a report with the Texas Attorney General. The Texas Attorney General has already warned that gougers will be prosecuted to the fullest extent of the law. Reports can be filed by telephone at 1-800-252-8011.

While Texas is the obvious place price gouging might occur, concerns are already being raised in other States about this. News4Jax.com in Florida, WTHR.com in Indiana and WIS10 in South Carolina are all running stories on gas gouging. There is even concern in Canada that Hurricane Ike will spark a round of gouging up there.

Most of these articles recommend contacting your state's Attorney General if you have concerns about gouging. Reports can also be filed with the Department of Energy.

Besides filing a report, there are resources to ensure you are getting the most out of your hard-earned money in your area. GasBuddy.com is a online means of finding the best prices in both the United States and Canada. In Canada, there is an interesting tool from the CCPA (Canadian Centre for Policy Alternatives) where you can see how much you are being gouged.

As a disclaimer, there are some who will argue that any suspected gouging is merely the result of natural events. Please note the people that argue this will probably be affiliated in some manner with Big Oil. Of course, other's might argue Big Oil has been gouging everybody for a long time. Of course, there is an argument that financial types have been playing around with the prices via speculation, also.

Sadly enough, despite a lot of frustration by the general public, Congress took off on vacation without addressing the public outcry on this issue. I'm not sure how much good reporting price gouging will do, but if enough people do, perhaps all the politicians crying foul about this issue will finally do something about it?

In my opinion, thus far, we've seen a lot of words but little action on this subject!
0 comments

Wednesday, September 10, 2008

Are Street Gangs using Check Fraud to Fund Themselves?

We keep hearing how white collar crime is becoming more organized. A recent story in Arizona shows how traditional gangsters are getting involved in white collar crime.

In 2006, Postal Investigators investigating checks being stolen from the mail tied the activity into one of the more violent street gangs operating in the Hermosa Park area of Phoenix. This led to one of the biggest street gang cases of the year.

Yesterday, Phoenix police and FBI agents began serving warrants on the gangsters involved in this activity. 102 were indicted in this operation. By the end of the day, they had 38 of them in custody. The arrests are being hailed as crippling the gang in the Hermosa Park area.

Of course, this doesn't mean that this gang wasn't involved in more traditional activity. Also confiscated in the arrests were "24 weapons, 18 cars and trucks, 43 pounds of marijuana and cocaine and Ecstasy," according to the story in the azcentral.com about this. In another story on this by ABC15.com, officials commented that several of the people arrested were connected to violent crimes in the area.

According to the authorities involved in this investigation, this gang is suspected of stealing more than $2 million dollars using stolen and counterfeit checks in the past couple of years.

Often legitimate checks stolen from the mail and other sources are counterfeited. Since the checks are copies of legitimate items, they often pass initial scrutiny at a financial institution.

In recent years, check fraud has exploded. Last year, an International task force monitored the mail in several countries and confiscated checks being produced overseas and mailed to several countries. Additionally, a wide array of check producing software and even the paper with anti-fraud security features can be bought in Office Supply stores and even on the Internet.

Another phenomenon that fuels check and many other types of fraud is the easy availability of counterfeit identification. The distribution and sale of counterfeit documents is also controlled by organized crime. I've written about this frequently and have spoken to Suad Leija and her husband, who have gone to considerable effort to educate the public (and the authorities) about how widespread and organized this activity is.

Suad's website, Paper Weapons has a lot of information on this subject.

Organized check fraud activity has been around for a few years. In 1996, Special Agent Keith Slotter of the FBI wrote a very telling paper on this subject. "The principal ethnic enterprises involved in illegal check fraud schemes include Nigerian, Asian (particularly Vietnamese), Russian, Armenian, and Mexican groups. The majority of the Vietnamese, Armenian, and Mexican organizations base their operations in California, especially in the Orange County, San Francisco, and Sacramento areas," according to the paper.

While the arrests in Phoenix represent a small part of the overall problem with check fraud -- it does point to the fact that organized criminals see check fraud as a lucrative income stream.
0 comments

Monday, September 1, 2008

Were Internet Scammers Preparing to Exploit Hurricane Gustav?

Gustav has passed and it seems like it wasn't as bad as it could have been. One positive aspect to it all was the emergency responders, who were on top of it this time. They really did a first-class job of ensuring the public's safety and deserve to be commended for their efforts.

Unfortunately, this might not be the case with everyone who was preparing for the worst Gustav might have dished out. Cyber criminals appear to have been positioning themselves on the Internet to divert as much of the relief money as they could get away with. And although it wasn't as bad as it could have been, we might still see these crooks try to take advantage of the situation.

Gary Warner, who is a blogger and computer forensics research type, recently posted a list of names that appear as if they might used to impersonate Gustav relief efforts on his blog. Some of the potential fraud domain names listed include contributiongustav.org, donategustav.org, donationgustav.org, gustav-relief.org, gustavassistance.org, gustavattorney.com, gustavclaims.net, gustavcontribution.org, gustavhelpers.org and gustavlawsuit.com. Many more of these domains can be seen on his blog post.

Gary also pointed to interesting package deal of domain names being offered on eBay. The seller has a 94.1 percent approval rating on eBay and offers to give 10 percent of the purchase price to a charity of the buyer's choice. Additionally, he assures anyone bidding on these names that their User ID will be kept private.

eBay isn't the only e-commerce place selling these domain names, I found some on DNForum.com, also. In fact, DomainPulse.com is reporting that 100 names related to Gustav were registered in less than 48 hours.

The good folks at the SANS Internet Storm Center are also keeping an eye on this activity and have an interesting diary going on about it. They are asking that anyone with any further information about this send them a quick note so they can stay on top of the subject and hopefully report it to the federal authorities.

Whether or not these domain names will be used for fraud is purely speculative at this point. However with the Louisiana Attorney General reporting that phishing attacks using Gustav as a lure have already started, it's probably only a matter of time before some of these sites are used in an attempt to dupe the general public. It should be noted that phishing is a time-tested method used to direct unsuspecting users to fraud websites, where they are tricked out of money via social engineering schemes or can even have malicious software dropped on their operating system. Becoming a Phish normally carries the risk of identity or information theft, also.

Identity theft isn't the only reason malware is dropped on a system. Often the intent is to take over a system and turn it into a member of a botnet so it can be used as a spam spewing zombie. It's always considered wise not to click on links received in e-mails from unknown sources.

The average person can check out if a charity is legitimate by visiting the Better Business Bureau Wise Giving Alliance, Charity Navigator or the American Institute for Philanthropy.

If you happen to detect a site that appears to be fraudulent, the socially responsible thing to do is to report it to Internet Crime Complaint Center.
0 comments

Sunday, August 24, 2008

How to buySAFE on the Internet


(Courtesy of buySAFE)

The Center for American Progress and the Center for Democracy and Technology recently released a report concluding that not enough is being done to protect the public from fraud on the Internet. "If problems such as malware, phishing, and spam are left unchecked, many consumers may lose trust and abandon e-commerce," according to the report.

What if a shopper could safely enjoy the convenience, lower prices and choices offered by the world of e-commerce, while avoiding all the fraud lurking on the Internet free?

In 2006, buySAFE entered the e-commerce scene with a unique concept, giving sellers the ability to become bonded and display the buySAFE seal on their site. Once a seller is bonded, the purchase is guaranteed up to $25,000.

The buySAFE guarantee covers virtually any loss that might occur during an online shopping transaction. This includes, but isn't necessarily limited to fraud, phishing and financial misdeeds.

Last month, they grew their concept with the buySAFE Shopping Advisor, which is a free software tool that rates the safety/security of all sites within a search term. The tool also points to sites sites with the buySAFE seal, which guarantees the transaction.

Shopping Advisor leverages buySAFE’s advanced technology and bonded merchant customer base to provide a fully closed-loop safe shopping experience. "There is nothing else like it in the world as it provides comprehensive safe shopping for consumers from search through purchase and beyond – guaranteed," according to Jeff Grass, buySAFE's CEO.

While buySAFE offers a free service to the e-consumer, they aren't in business to lose money. Some of the due diligence performed on every bonded merchant includes ensuring they have a SSL certificate and a privacy policy describing how they protect personal information. Additionally, bonded sellers are required to allow buySAFE access to inspect their business anytime they choose to do so.

Shopping Advisor provides a tool to analyze e-commerce sites and provides a safe shopping portal, which consists of bonded sellers, only. Once in the safe shopping portal every purchase is guaranteed within the limits of the bond buySAFE provides.

Shopping Advisor uses buySAFE's proprietary website inspection and assessment technology to analyze almost 100 different safety/security attributes of an e-commerce site. It then provides objective ratings on the site when searching with Google, Yahoo and MSN (Firefox is on the way). This allows the shopper to make an informed decision before forking over their hard-earned cash.

Within the Shopping Advisor tool is the Safe Shopping Portal providing alternative product choices from thousands of merchants that are protected with the buySAFE seal. It is within the Safe Shopping Portal that every purchase is guaranteed with a Bond of up to $25,000 and it's protected against identity theft, also.

Essentially, Shopping Advisor shows all the shopping opportunities for the search term listed, rates the sites in question and then gives the consumer the ability to make an informed buying decision. If the buyer chooses to buy a product via the Safe Shopping Portal, it is automatically guaranteed and the transaction is protected against identity theft for 30 days. When the buyer purchases an item from the Safe Shopping Portal, they automatically receive an e-mail with the specifics on the guarantee for their personal records.

buySAFE offers a lot of benefits to sellers, also. The biggest is which is what ensures any successful business, or the trust of it's customers. They've also added a cost-per-sale pricing model that has received positive feedback from the merchants using it. If a merchant needs more information on this, I'll refer them to Jeff Grass' blog, or the press release on this matter.

According to most if not all of the reports out there, Internet crime continues to grow and become more sophisticated. Saying that, no matter how sophisticated it becomes the primary motivation to commit cybercrime is money. This rings true from the most simple social engineering scheme to most sophisticated attacks using crimeware. What buySAFE has done is remove this primary motivator from the mix, or at least made it a lot less attractive to Internet fraudsters, charlatans and tricksters.

Shopping Advisor
takes this concept to the next level by providing the consumer with a tool to make an educated shopping decision without falling prey to the pitfalls of a too good be true come-on. Too good to be true lures are the common theme Internet fraudsters, charlatans and tricksters use to snare their prey. In other words, Shopping Advisor is a tool a consumer can effectively use to practice the principle known as caveat emptor, or buyer beware.

buySAFE is also offering a shopper referral program. They pay $1.00 for every user referred to Shopping Advisor. This is a great fundraiser opportunity for charities, sports leagues, churches or any good cause.
0 comments

Saturday, August 23, 2008

Cost Plus Customers Compromised in Data Security Incident

Cost Plus World Market is another retailer, where customers were unknowingly giving criminals access to their bank accounts when they made a purchase.

On July 22nd, the company announced that after a thorough investigation they learned the Electronic Funds Transfer devices (PIN pads) might have been been compromised at eight Southern California stores by unauthorized third parties.

Since then three additional stores have been identified as being compromised.

The first hint of trouble was in June when two employees reported unauthorized transactions on their debit cards. By early July, the banks were reporting a unusual amount of fraud accounts that had one thing in common, they had been used at Cost Plus.

I picked up this story in an article on SignonSanDiego.com published yesterday (08/22/08). The only other mention of it, I could find was in a report by FOX News on 7/22/08.

Both the SignonSanDiego.com article and the official press release state that only debit and not credit cards have been reported compromised. Given that the hardware compromised accepts both credit and debit cards for payment, my humble guess is that credit card information might have been compromised, also. The reality is that you need both a card number and a PIN to get cash. The other reality is that card numbers can often be used without a PIN. My guess is that (at least so far) the crooks behind this were after fast cash.

Cost Plus is working with their payment card processors and the banks to identify customers, who might have been compromised. They have also brought in a external data security vendor (Verizon Business/Cybertrust) to analyze their systems. PIN pads are being replaced in all their stores, nationwide.

Compromises involving PIN pads have become more frequent in recent years. Cases are now being seen despite the fact that the retailer was compliant with payment card industry security standards. Speculation is that this is done when the information is being transmitted internally before it is transmitted to a payment card processor. Once the internal system is compromised, the hackers use sniffer programs to gather all the information and a data compromise is born.

In the early reports of PIN pad compromises, the actual PIN pads were being replaced. The crooks would later come back and in and retrieve the PIN pad to gather the payment card information or pick up via a wireless connection.

Since then my speculation is that the hacking methods being used have become more sophisticated and PCI data protection standards -- designed to protect merchants from data compromises -- might no longer be 100 percent effective.

Data compromises cost the victim affected, the retailer and the financial institutions issuing the payment cards.

I tend to write on behalf of the victim and I wanted to point to an excellent article by Tom Fragala, where he analyzes the protections offered when using credit and debit cards. General consensus is that it is a lot safer to use a credit card from a consumer point-of-view. Note I'm saying this from a security point-of-view because too much credit card debt isn't always a good thing, but that's a whole other subject.

Tom is a fellow blogger, and the CEO of a privacy friendly identity theft protection service (Truston) that just won another in what is becoming a long string of awards. They also offer a 45 day (completely) free trial to use their services.

As long as there is a lot of money to be stolen from payment cards, criminals are going to be motivated to defeat security fixes.

The recent news that one of these retail hacking rings were caught and put behind bars probably will go a lot farther in preventing data compromises than security fixes, which seem to be counter-fixed, fairly frequently.

The eleven Cost Plus Stores known to have been compromised were San Diego (372 Fourth Avenue, San Diego, CA 92101); Oceanside (2140 Vista Way, Oceanside, CA 92054); La Jolla (8657 Villa La Jolla Drive Suite 117, La Jolla, CA 92037); Mission Viejo (28341 Marquerite Parkway, Mission Viejo, CA 92692); San Dimas (638 West Arrow Highway, San Dimas, CA 91773); Valencia (25676 North The Old Road, Valencia, CA 91381); Palm Desert (44-439 Town Center Way, Palm Desert, CA 92260); Oxnard (221 Esplanade Drive, Oxnard, CA 93030); Westlake Village (Thousand Oaks) (160 Promenade Way, Westlake Village, CA 91362); Tucson East (5975 E. Broadway, Tucson, AZ 85711); and Tucson (4821 North Stone Avenue Tucson, AZ 85704).

Cost Plus also has a FAQ page for people, who think they may have been compromised.
0 comments

Labels

"C" word (1) "do" (5) "J" (1) "J" from Wichita (2) "On with the Show" (1) "White" House (2) $10 million (1) $80 settlement (1) 02 Arena (1) 09 09 09 (1) 1 800 FLOWERS DOT COM (1) 1-800-Flowers.com (1) 10 Best Dressed List (5) 10 Stinkiest Celebrities (1) 10 Worst Dressed List (1) 10 Worst-dressed list (4) 10.75 Rock FM (1) 106.5 (1) 11th Hour (1) 12 Hour Screening (1) 13th Annual Arab Film Festival (1) 16 year olds (1) 1975 White Corvette (1) 1984 (2) 1st Amendment Rights (9) 1st Black President (5) 1st Dog (2) 1st Dude (1) 1st Lady (7) 2 Rodeo Drive (2) 2 week limited run (1) 2008 elections (1) 2008 Hot Company (1) 2008 Presidential Race (1) 2008 Product Innovation Award (1) 2008 Tomorrow’s Technology Today Award (1) 2009 Trends (1) 20th Century Fox (10) 24 (1) 24 hour fitness (3) 24 Hours (2) 24th Annual Asian Pacific Film Festival (1) 25th Annual Asian Pacific Film Festival (1) 27 Knockouts (1) 2nd Annual Tattoo Convention and Music Festival (3) 2nd Appellate Court Ruling (5) 2nd Degree Murder (2) 2nd Language Plot (1) 3 Biggest-told lies (1) 3 coins in Fountain (1) 3 Saisons (1) 3 Sisters (2) 32nd Annual Asian International Film Festival (2) 360 (1) 3d Glasses (1) 400 Meter Relay (1) 419 (2) 419 scams (1) 419eater (1) 42 Annual Country Music Awards (1) 44th President (1) 44th U.S. President (1) 49.82 seconds (1) 4th (1) 5 Day Festival (1) 5 Star Performance (1) 500 Days of Summer (1) 50th Anniversary (1) 60 minutes (1) 60th Annual Emmy Awards (1) 666 (3) 66th Annual Golden Globe Awards (1) 7 Day Funerals (1) 7 million viewers (1) 7-Eleven (1) 711 (5) 7th Annual Backstage at the Geffen (2) 7th Avenue (1) 7th Season (1) 81st Annual Oscar Awards (3) 81st Annual Oscars (2) 9/11 (5) 911 (21) 95.5 FM (1) 99 cent Daiquiris (1) 99 cent store (2) 9th Circuit Court of Appeals (3) a broooques (1) A Call to God (4) A collection of Poems (3) A Dog's Life (4) A good laugh (1) A List Actors (8) A Mad Mad Mad Mad World (1) A Profile of Judge Robert Beezer (1) A Quiet Little Marriage (2) a rose (3) a rumor of fraud (1) A-list stars (6) A.I.D.S (1) A.I.D.S. (5) A.I.D.S. Activism (3) A.I.D.S. Fundraiser (1) A.I.D.S. patients (1) A.I.D.S. virus (1) A.I.D.S. Walk Los Angeles (1) Aaron Spelling (2) ABBA (2) ABC (12) ABC News (1) ABC Television (1) ABC TV (4) Abercrombie and Fitch (3) Abs (1) Absolut (1) Abstract Art (19) abubakar atiku (1) abuse (2) Abuse of Power (2) Abuse of Power (3) AC Milan (2) Academy Awards (5) Academy of Arts and Sciences (11) Acafellas (1) Accenture Match Play (1) Access Hollywood (3) access systems (1) account takeovers (5) acfe (2) acid (1) Acting (9) Acting Classes (2) Acting Technique (4) Acting Workshops (1) Action Adventure Genre (18) Activist (2) Actor (12) Actor Contracts (2) Actors (14) Actors Union (3) Actress (5) Adam Lambert (18) Adam Lambert fans (3) Adam Rugel (1) Adam Weller (1) Addiction (8) Addictions (2) Adrian Bellani (1) Adrien Brody (6) Ads (3) adult services (1) Adult TV content (1) advance fee (2) advance fee (419) (12) advance fee 419 (9) advance fee credit card fraud (1) advance fee credit card schemes (1) advance fee fraud (4) advance fee scams (1) Adventure (1) Advertisers (5) advertising (1) Advice (1) adware (3) Aerial Images (1) Aero Theatre (2) AETV.com (1) AFF (1) affinion (1) Afghanistan (10) AFI (7) AFI Awards (1) AFI Dallas (21) AFI Fest (6) AFI Film Fest (3) AFI Film Festival (Los Angeles) (1) AFI LA (1) AFI Life Achievement Award (1) AFI Movies Of The Year (4) AFI Thesis Film (1) Africa (3) Afro American Security Guards (5) Afro Americans (3) Afro-American (1) Afro-Americans (1) After-party (2) Afterhours Nightclubs (5) AFTRA (3) Age Discrimination in Hollywood (1) aging (1) ahmadinejad (1) Ahmanson Theatre (1) Aid for AIDS (1) AIDS (1) Aishwarya Rai (1) al gore (1) al qaeda (3) al qaida (1) Al Unser Jr. (1) Alabaster Skin (1) Alan Doyle (1) Alan Jonsson Gavica (1) Alan Rosenberg (1) Alana Stewart (1) Alaska (4) Alaska Governor (5) Albania (1) Albert Einstein (1) Alcoholism (1) Aldo's Coffee Shop (1) alex eckelberry (6) Alex Ortiz (1) Alexa (1) Alfred Hitchcock (4) Alhambra (1) Alice Cooper (4) Alice Cooper Tribute Band (1) Aliens (2) Alive (1) All About Eve (3) All American Models (2) All Blow Out (1) All Blown Out (1) All Join In (1) All Saint's Church (1) All Stars Projects (2) Allan Rich (1) Allen Ginsberg (4) Allen Rosenberg (1) allergens (1) allergies (1) allet (1) almost genius (1) Alms for the poor (1) Alms to the Poor (1) Alta Cienega Motel (1) Alta Resources Inc. (1) Alternative energy (2) Alternative energy sources (1) Alvaro Puig (1) Amazing Grace (1) Amazing Jim Wilson (1) Amazon (1) AMEE Awards (1) America's Got Talent (1) American Airlines (3) American Art Form (1) American Ballet Theatre (1) American Bankruptcy Institute (1) american express gift cheques (1) American Federation of Teachers (1) American Film Institute (2) american greetings (2) American Hero (2) American Idol (45) American Idol Tour (3) American Idol. Erotica (1) American Novelty (1) American paper money (1) American past-times (1) American Transplants (1) Americans for Safe Access (4) Ameritrade (1) amnesty international (1) AMPTP (2) Amy Adams (1) Amy Vanderbilt (1) Anal employees (2) Ancient (1) Anderson Cooper (6) Andrea Bocelli (2) Andy Dick (3) Andy Warhol (8) Ang Lee (2) Angela Lansbury (2) Angelie Jolie (1) angelina jolie (1) Angels take flight (1) animal cruelty (1) animal grace (1) Animal Shelters (1) Animated Shorts (1) Animation (5) Anime (1) Ankle injury (1) Ann Landers (1) Anna Chi (3) Anne Hathaway (4) Annette Bening (1) annie mcguire (1) annualfreecreditreport.com (1) Anon (1) Anonymity (1) anonymous hot line (1) Anthony Hopkins (1) Anti Gay Sentiment (5) Anti Phishing Working Group (2) Anti-Abortion (2) Anti-American sentiment (1) Anti-Christ (2) Anti-gay (2) Anti-Gay Marriage Ban (4) Anti-Immigrant (1) anti-scammers (1) anti-trust (2) anti-war (1) anti-war protest (1) antibodies (1) Antiques (2) Antiques Roadshow (1) Appellate Court Judge (1) apple (1) April 18 (1) April 19 (1) April 21 (1) April 3 (1) apwg (3) Arab Culture (2) Architecture (6) Archtecture (1) Arclight Cinema (1) Arco (1) Ardas Yanik (1) Arizona (21) armenian organized crime (4) Army Fatiques (1) Arnold Schwarzenegger (8) Arrest Warrant (4) Arrests (1) Art (11) Art Deco (1) Art Exhibition (6) Art Galleries (1) Art Gallery Space (1) Art Museums (1) Art Patron (1) Artemus W. Ham Concert Hall (1) Arthritis Pain Relievers (1) Arthur Erickson (1) Artist (2) Artistic Temperment (1) artists against 419 (3) Artreach Dallas (1) Arts (3) ASA (3) Ashton Kutcher (7) Ashwin Ramakrishnan MD (1) Asian Actors (1) Asian Americans (2) Asian Pacific Film Festival (28) Asian Students (1) Asians (2) Aspen Santa Fe Ballet (1) Assault (2) asset protection (5) Associated Press (1) Associated Press Polls (1) association of cerified fraud examiners (4) Astrology (2) Asylum (1) AT and T park (2) Athletes (5) ATM Machine (2) atm skimming (2) atm skimming device (3) ATM surcharges (1) atm theft (2) Attorney General (1) Attorneys (1) attrition.org (8) Auction (7) auction fraud (32) auction scams (7) AUDI (5) Auditions (4) Audrey Skalbania (1) August 1st (1) August 1st Deadline (1) August 29 (1) August 29th (1) August 31 (1) Auspicious signs (2) Aussie Baum (1) aussiebum (1) Austin (1) Austin Film Festival (1) Australia (5) Australian Competition and Consumer Commission (1) Austria (1) Author (3) Authorization Policy (1) Auto Club (3) Automation (1) Avedon (1) Awards (1) Awareness (2) Ayn Rand (1) B List Actors (1) B Movies (4) ba-dump (1) Ba**s (1) Babe Warehouse (1) baby boomers (1) Baby Plopper (1) Baby Seller (1) Baby-sitting (1) Baby-Sitting Duties (1) Back Stabber (1) Back Stabbing Actors (1) Back Stabbing Oprah Winfrey (1) backlinks (1) Backlot (1) Backlot Film Festival (1) Backlot of Universal (3) BAD BAD BOY (2) Bad Breath (1) Bad Hair Days (8) Bad karma (1) Bad Lieutenant (2) Bad Luck (1) Bad Manners (7) Bad News (1) Bad Omens (1) Bad Service (2) Bad Sushi (1) badge of authority (4) badware (3) Bai Ling (7) Bail (3) bail out (1) Baldwin Street (1) Ball Busters (1) Ballet (3) Ballot Initiative (2) Ballots (1) Baltimore (1) Baltimore Bullet (1) Banana Republic (1) Bandwagon (1) bank fees (1) bank of america (1) Bank of Mellon (1) banking (131) Bankruptcy (2) barack obama (9) Barack Obama gay? (1) Barack Obama Quote of the Day (1) Barack Obama wordiest President (1) Barack Osama (1) Barbara Stanwyck (1) Barbara Streisand (7) Barbara Walters (6) Barbarella (1) Bargain Buffet (1) Bargains (1) Barista (2) Barnes and Noble (2) Barneys Beanery (1) Barracuda Networks (1) Barrick Endowment Fund (1) Barry Manilow (4) Baseball (28) Basic Plumbing (1) Basilica (1) Basketball (3) Bathing Suit (1) Batman (2) Battery (2) Battle for Terra (1) Battle of the Bands (4) BBB (2) Beach Boys (1) beaches (6) Bear Stearns (1) Beard (1) Beat Museum (2) Beat the Heat (3) Beatles (8) Beausoleil Island (1) Beauty (8) Beauty and the Beast (1) Beauty Pageants (4) Beauty Queen (3) Becks (1) Bedford (1) Beer (2) Beer Garden (4) Beer Strategies (1) before another 9-11 (1) Begging (1) Beijing (3) Beijing Olympic Games (2) Beijing Olympics (2) Beingness (3) Bel Air (5) Believe (3) Ben Affleck (4) Ben Wright (1) Bench Warmers (1) benefits fraud (1) Berlin and Beyond Film Festival (1) Berlin Festival (1) Best Actor (1) Best Actress in Drama (1) Best Buy (1) Best Comedy Show (6) Best Drama Show (1) Best Film (1) Best Romance (2) Best-Dressed Women (3) Beth Givens (1) betrothal (1) Bette Davis (3) Bette Midler (4) better business bureau (1) Better to Have Loved (2) Betty Lynn Buckley (1) Beverly Hills (19) Beverly Hills 213 (1) Beverly Hills Library (1) Beverly Hills Police Department (1) Beyonce (2) beyond katrina (6) Beyond the Bell Branch (1) Bi Lingual Nations (1) Biblical Prophecy (1) biden (1) Big Brother (3) Big Ears (1) Big Laughs (1) Big Meanie (1) Big Oil (1) Big swinging di** (1) Big Virt (1) Bijou Phillips (1) Bill Clinton (15) Bill Cosby (1) bill gates (1) Bill O'Reilly (2) Bill of Rights (4) bill richardson (1) bill-pay (1) Billboard (3) Billy Bush (2) Billy Crystal (1) Biltmore Hotel (1) Bimbo Babes (1) Binion's Casino (1) Binions Casino (1) Birds and the Bees (3) Bisexuality (3) Bite Me (1) Biz Stone (1) BJ Ostergren (2) black book of scams (1) Black Experience (1) Black Eyed Peas (1) Black Friday (1) Black Supremacy (1) BlackHat conference (1) Blackwater (2) Blair Singer (1) Bliss (2) Blog (9) Blog action day (1) blog stats (1) Blogger (4) blogger code of ethics (1) Blogger Style (4) bloggers (1) Blogosphere (1) Blogs (1) blogspot (2) Blood (2) BloodaPalooza (1) bloods (1) Bloodsuckers (1) Blossoms (1) Blow them away (1) Blow Up (1) Blues (2) Blues Music (1) Blush (2) Bo (1) Bo Svenson (1) Board of Supervisors (1) bob carr (1) Bob Dylan (5) Bob Gazzale (2) Bob Mackie (1) Bob Roberts (1) bob sullivan (1) Bobby Downes (1) Bobby Trendy (1) Body Art (2) Body Building (5) Body Odour (1) Body Smarts (1) boeing (1) Bogus Inheritance (1) Bohemian Luxury (1) bomb (1) bomb threats (1) Bomber Style Leather Jackets (1) Bon Jovi (4) Bonding (1) bonds (1) Boner (2) Bong (1) Boo Boo (1) Boo Hoo (1) Book Deals (2) Book of Changes (5) Book of Revelations (4) Book of Wisdom (17) Book Prizes (1) Book Signing (1) Book Soup (1) Booker T. Washington (1) Books (7) Boondog Saints (1) boosting (2) Booze (2) border (1) border insecurity (6) border patrol (1) border security (7) bot-herders (7) botnet (4) botnets (16) Botox (3) Bouquet (1) Bouquet Service (1) Bowling (3) Bowser Beer (1) Box Office (1) Boxing (3) Boy toy (2) Boycott (6) Bracebridge (1) Brack Obama (1) brad pitt (1) Brand X (3) Brandon Flowers (1) Brandy (1) Breach (1) Breach of Public Trust (1) Break the Silence (1) Breakfast (3) Breaking Dawn (1) Breast Reading (1) Brett Favre (3) Brewskie (3) Brian Beutler (1) brian krebs (3) brian ross (1) bribery (3) Bribes (1) Bridget Christina Sandmeier (1) Bridget Marquardt (1) Bridgett Bardot (1) Brigitte Bardot (1) British Music Invasion (3) Britney Spears (13) Broadway (5) Broadway Musical (7) Broadway Musicals (5) Broadway Stage Production (4) Brokeback Mountain (5) broken borders (1) Brooke Shields (4) Brothers Bloom (3) Brothers Bloom Adrien Brody (1) Bruce Bastian (1) Bruce Jenner (2) Bruce Springsteen (2) Bruce Weber (1) bruce willis (1) Bruises (1) BS (1) bsales (1) Buddha (15) Buddhism (3) Buddhist Bowl (1) Buddhist Teachings (2) Budget Crisis (2) Bull (1) bundling (1) Burger King (1) Burial Grounds (3) burma (1) Burning Bed (1) Bush (1) bush twins (1) Business Deals (1) business fraud (1) Business Software Alliance (2) Busted (1) Butch (1) Butterfly 100 Meter (1) Butterfly Medley (1) Butterfly Stroke (3) Butterfly Stroke World Record (2) Butts (1) buyer beware (1) buysafe (4) C2C (1) Cable (2) Cable Cars (5) Cable Entertainment (4) Cable TV (1) Cables (2) Cactus (1) Caesar (3) Caesar's Palace (7) Caesars Palace (3) Cafe (1) Cajun Food (1) Calendar (1) calgary (1) California (13) California Courts (1) California law (3) California Office of Privacy Protection (1) California State Bar (1) california state lottery (4) California Supreme Court (8) Californian's Against Hate (1) Californians Against Hate (1) Califronia (1) call center (2) call forwarding (1) call forwarding scam (1) Caller ID (1) Caller ID spoofing (2) caller ID+spoofing (1) Calpernia Addams (1) CALPIRG (1) Calvin Klein (7) Calvin Klein Jeans (2) Calvin Klein underwear (4) Cambodia (1) Cambridge Police Department (2) Camden House (1) Camel (1) Camp Freddy (1) Camp Wabanki (2) Campaign Contributions (1) Campaign Promises (1) Campus (1) can do (1) Can of Worms (2) canada (1) Canada Council (1) Canadian (3) Canadian Architect (1) Canadian Embassy (1) canadian fraud (1) Canadians (1) Cancer (8) Cancer Cells (1) Cancer Plaza (1) Candis Cayne (3) Candlelighters 19th Annual 5K and 1 Mile Race for Our Kids (1) Candye Kane (1) Cannabis (1) Cannes Film Festival (8) Cantonese (1) capital punishment (1) Capitalistic ethic (1) Capitol Hill (1) Car Dealerships (1) car theft (1) Car Wash to Stars (1) Carbon Footprint (1) card not present (1) Cardboard License Plates (1) carder forums (17) Cardiac Arrest (1) Cardigans (1) Caring (1) Carinne Leduc (1) Carl Ferris (3) Carl Jung (2) Carl Reiner (1) Carlos Santana (2) Carol Burnett (2) Carrot Top (1) CART-Indy Champion (1) Carton of Books (1) Casey Affleck (1) Cash pay outs (1) cash theft (1) Cashiers (1) Casino (6) Casinos (6) Castellana Grotte (1) Castillo Theatre (3) Casting (1) Casting Call (2) castlecops (4) castorena leija-sanchez (2) Castro District (14) Castro Theatre (9) casual sex (1) Cat Eye Glasses (1) Cat Fight (1) Cat-lovers (1) Cats (1) Caucasian Trends (1) Causes (1) caveat emptor (4) CBS (11) CBS News (1) CBS Report (1) CCTV Hack (1) CD (4) CD Release (5) CD's (3) Cecil B. DeMille Award (1) Cecile B. DeMille (1) Celebrities (2) Celebrity (7) Celebrity Gossip (28) Celebrity graves (1) Celine Dion (1) censorship (1) CEO (2) CEO Executive Director (1) cert (2) certegy (3) Certegy data breach (6) Certified Mail (1) Cesspool of Corruption (1) CFO (1) CG Imagery (1) CHAI (1) Chalk Repertory Theatre (3) Champion (1) Champion of Poker (1) Chanel (1) Change (2) Changes (1) Chanteuse (2) chargebacks (3) Charity (17) charity fraud (5) charity: water (1) charity+fraud (1) Charles Bronson (1) Charles Lynch (1) Charles Manson Murders (2) Charlie Chaplin (2) Charlie's Angels (1) Charlie's Aunt (1) Charo (1) Chastity Bono (5) Che (2) cheap (1) Cheap Bastards (2) Cheap Motel Rooms (5) Cheap software (2) check (1) check 21 (2) check cashing schemes (1) check fraud (24) Checkbook Journalism (2) checkfree.com (1) Cheesy Operations (1) Chekhov (1) chelsea clinton (1) Chelsea Handler (1) Chelsea Lately (3) cheque fraud (3) Cher (22) chic (6) Chicago (2) Chick Flicks (1) child abuse (1) Child Actors (1) Child Exploitation (1) Child Molestation (1) Child Molester (1) child pornography (6) child predators (4) Child Protective Services (2) Child rearing (1) child welfare (2) child+abuse (2) Childhood Memories (3) Children Dreaming (1) Children of Invention (4) Children's Hospital (2) China (27) Chinatown (8) Chinese (1) chinese earthquake (2) Chinese espionage (2) Chinese Food (1) chinese hackers (2) Chinese New Year (5) chip and PIN (1) Chocolate Buddha (7) Choice of Pearls (1) Chorus Singers (1) Chris Angel (1) Chris Brown (1) Chris Dowling (1) Chris Downey (1) Chris Farley (1) chris hansen (1) chris hoofnagle (1) Chris Isaacson (1) Chris Lemmon (1) Chris Noth (1) Chris Pine (2) chris soghoian (1) Chris Solimine (1) Chrisopher Snow (1) Christ (1) Christian Bale (2) Christian Faith (1) Christians (1) Christina Aguilera (3) Christina Applegate (1) Christina De Rosa (2) Christina DeRosa (2) Christina DeRose (1) christine jennings (1) Christine Jorgensen (1) Christmas (11) Christmas Carols (1) Christmas Gifts (3) Christmas Shopping (1) Christmas Spirit (1) Christopher Plummer (1) chronicles of dissent (2) Church (1) Church of Blessed Sacrament (1) Church of the Good Shepherd (1) Church Weddings (8) CIA (5) Cindy Cheung (1) CineVegas Film Festival (2) CineVegas Film Festival (2) Circuit Party (3) Circus Nighclub (1) Circus Tour (2) Cirque Du Soleil (1) citibank (1) Citizen Lab (1) City Controller of Los Angeles (1) City of West Hollywood (19) City of West Hollywood (12) Civic Center (2) Civil Rights Violations (9) Civilized Society (1) CKVU (2) Claimants (1) Claims Administrator (1) Clara Zetkin (1) Clark Gable (1) Clarke County Commissioners (2) class action law suit (4) Class Action Lawsuit (5) Class Action Suit (1) Class System (1) Class-Action Suits (1) Classic Films (2) Classical Music (4) Classics (2) Classsic Films (1) Claude Alexander Allen (1) Clay Aiken (1) Clean Water (3) Cleanliness (1) Clifford the Big Red Dog (1) Climate of Hate (2) Clint Eastwood (3) clinton (1) Clinton HIV/AIDS (1) Clinton HIV/AIDS Initiative (1) Clive Barnes (1) cloned vehicles (1) cloning (2) Cloris Leachman (1) Closet (2) Closeted-gays (2) Clothesline Project (1) Clothing Budgets (1) Club Dates (1) Cluster Fu** (1) CNN (8) Coach (1) Coachella Music Festival (2) Coalition Against Domain Name Abuse (1) Cocaine (14) Cocktail Dresses (1) Cocktails (4) codes (1) Coen Brothers (9) Coercion (2) Coffee (1) Cold Blooded Murder (2) Cold Cut Combos (1) Cold Food (1) Colgate (1) Colin Farrell (2) Colin Hanks (1) Collectables (2) Collected Poems (2) collection agency (1) Collection of Poems (13) Collections of Poems (1) Collectors (1) Color of Authority (4) Columnist (1) Comcast (1) Comeback (1) Comedy (30) Comedy Genre (9) Comedy Spoofs (2) Comic (4) coming out of closet (4) Commemorative Postage Stamp (1) Commercialism (3) Commissions (1) Common Sense (1) Communism (3) Compassion (7) Compassionate Heart (1) Compassionate use of Medical Marijuana (12) Competition (9) Complexions Contemporary Ballet (4) compliance (2) computer crimes (2) computer glitches (4) computer security (14) Computer snafus (1) Computer World (1) computeractive (1) computers (1) ComputerWorld (1) Conan (9) Conan the Barbarian (1) Conceptual Art (1) Concert (3) Concerts (19) Conde Nast (1) condoms (1) Condos (1) Conficker (1) confidence tricks (2) Confidential Information (1) Confirmation (1) conflict of interest (2) Congress (2) Congressman Joe Wilson (1) Consequences (1) Conservative (2) Conservatives (1) Constant (1) Constitutional Rights (2) Construction Sites (2) Consumer Action (1) Consumer Advocates (5) consumer affairs (1) consumer confidence (5) consumer fraud (1) consumer groups (1) consumer mistrust (1) Consumer Protection (2) Consumer Rights (6) consumer rip-offs (7) consumer safety (5) consumer trust (10) consumer+awareness (1) consumerinfo.com (1) Consumers (1) Consumers Union (6) Contemporary Art Museum (1) Content (1) Contest (2) Contestant (5) Continental Baths (1) Contract disputes (3) Contract Negotiations (1) Contract Talks (1) Contracts (2) Controversy (10) Convention (2) Conventions (1) Copyright Infringement (2) Coral (1) Coraline (3) Corn Flakes (1) corporate espionage (8) corporate fraud (1) corporate identity theft (9) corporate irresponsibility (2) corporate responsibility (1) Corrupt Cops (5) Corrupt Judge (4) Corruption (10) cory voorhis (2) Cost Plus (1) Costume Ball (1) Cougar Hookups (1) Cougars (1) Council of Fashion (3) Council of Fashion Designers of America (1) counterfeit (4) counterfeit american express gift cheques (6) counterfeit cashier's checks (10) counterfeit checks (8) counterfeit cheques (4) counterfeit documents (24) counterfeit goods (4) counterfeit ID (4) counterfeit merchandise (7) counterfeit money (3) counterfeit money orders (6) counterfeit MoneyGram money orders (2) counterfeit MoneyGram orders (1) counterfeit postal money orders (3) counterfeit travelers express moneygram money orders (2) counterfeit visa travelers cheques (3) counterfeit+check (1) counterfeit+money order (1) counterfeit+software (1) counterfeiting (3) Country and Western Music (7) Country Music (1) Country-Rock Sensation (1) Countrywide (1) coupon fraud (1) Coupons (4) Courtney Cox (1) Cover-up TV Series (1) Covergirl (2) Cowboys (6) Crafts (1) Craig Russell (1) craigslist (5) Creativity (2) credit alert (1) credit bureaus (4) credit card (3) credit card cloning (13) credit card fees (1) credit card forums (2) credit card fraud (62) credit card fraud. identity theft (3) credit card+fraud (2) credit cards (2) credit freeze (5) credit monitoring (2) credit repair (1) credit reports (2) credit+counseling (1) credit+repair (1) creditfyi (1) Crediting Author (1) crime (1) Crime Scene Exhibit (1) Crimes (3) crimeserver (2) crimeware (52) Criminal 2 Criminal (1) Criminal Charges (7) crips (1) Critics (1) critiques (5) CRM (1) cross border fraud (4) crotch hair (1) Crowns (1) Cruel and Unusual Punishment (1) Cruise (1) Cruises (2) Cruising (1) Cry me a River (1) Crystal Ball (1) Crystal Chiu (1) Crystal Face (1) crystal meth (1) crystalline soda straws (1) CSI (3) CSI Role (1) CT (1) Cuba (1) Cuisine (2) Cuisine Disaster (1) Culinary Delights (2) Cult Classic Films (2) Culture (16) Cup (1) Cup Stacking (1) currency (131) Curtis Lum (1) Custody Battle (3) customer espionage (1) customer trust (1) Customers (1) CVS (8) CVS Pharmacy (1) cyber attack (1) Cyber Attacks (5) cyber bullying (1) cyber crime (8) cyber ghouls (1) cyber monday (1) cyber safety (1) cyber terrorism (2) cyber warfare (4) cyber waste (1) cyber-warfare (3) cyber+crime (1) cyber+czar (1) cyber+security (1) cyber+warfare (1) cybercime (6) cybercrime (17) cybernasties (3) cybersquatting (2) CyberWars (1) Cybill Shepherd (1) D Day (1) D.U.I. (1) Dad for the Day (1) Daily News (1) Daily Newspaper (1) Daily Newspapers (1) Daisies (1) Dalai Lama (5) Dallas (11) Dallas AFI (3) Dallas Morning News (1) Dallas Police (1) Dallas Public Library (1) Dame Edna (2) dan kaminsky (1) Dan Quayle (1) Dance (11) Dance Lessons (1) Dance Workshop In Italy (1) Dancer (1) Dancho Danchev (1) Dancing (4) Dancing with the Stars (18) dangerous chinese products (3) Daniel Day Lewis (1) Daniel Radcliffe (4) Danke Schoen (2) Danny Boyle (4) Danzig (1) Daredevil Stunt Drivers (1) Dark Chocolate (2) Dark Comedy (1) Darnelle Cadet (1) Darwin's Theory (2) dastardly deeds (1) Data (2) data breach (18) data breach legislation (1) data breaches (58) data brokers (6) data mining (2) data security (3) data-breach (3) data+breach (4) data+security (1) datamining (1) Dave Boyle (2) Dave Letterman (18) Dave Letterman Late Show (16) Dave Letterman Show (1) Dave Mathews (1) David (1) David Beckham (9) David Bowie (1) David Duchovny (2) David Geffen (3) David Geffen Playhouse (7) David LaCrone (1) david lazarus (2) David Lynch (4) David Manchester (1) David Spade (1) Daw Aung San Suu Kyi (1) Daytime Soaps (2) DDLOS (1) ddos attack (4) De Neve Quad (1) de Young Museum (3) DEA (1) DEA raids (9) Dead Battery (1) Deadline for Film Entries (1) deal (1) Dear Amy (1) Death (13) Death Camp (1) Debbie Rowe (1) debit card (4) debit card fraud (42) debit card+fraud (2) Debix (2) Debt (2) December 12 (1) Deceptive Business Practices (6) deceptive marketing (1) deceptive+marketing (1) Decorating Etiquette (1) Decorum (2) Deep Ellum Arts Festival (1) Deep Throat (2) Deep-Fried Oreos (2) Defamation (1) default codes (1) Dehydrated skin (4) Delicious Yogurt Flavours (2) Delusion (1) Demi Moore (2) Democracy (2) Democrat (5) Democratic National Committe (1) Democratic Society (1) Democrats (16) Democrats Win (1) Dennis Blair (1) Dennis Hopper (5) Dennis Kucinich (1) Dennis Quaid (3) Dental Work (1) Dentistry (1) Depak Chopra (1) department of energy (1) Department of Homeland Security (1) Department of Justice (2) Departures (1) Depression (1) Dept. of Injustice (1) Deputy District Attorney (1) Derek Hough (1) derivatives (1) Deryl Dodd (1) Desert Oasis (5) Design (3) Designer (3) Designer Dress (2) Designer Fashions (30) Designer Sunglasses (3) Designers (1) Desmond Richardson (5) Desserts (4) Destiny (3) Dev Patel (1) Dexter (1) DGA (8) DHS (7) dialers (1) Diane Sawyer (2) Diaper Duty (1) Diet (5) Diets (2) Dim Sum Funeral (4) dinah greek (1) Dippity-do (1) Director (2) Director of National Intelligence (1) Director's Guild (2) Director's Guild of America (2) Dirty Dancing (4) dirty dozen tax scams (1) Dirty Laundry (1) Dirty Politics (29) Dirty Sexy Money (18) Disabled (1) disaster and charity scams (6) disaster fraud (3) Disc Jockeys (3) Disclosure (1) Disco (2) Discount Code (1) Discount Tickets (2) Discounts (2) Discovery Days (1) Discrimination (3) Disgruntled workers (1) dishonest employees (9) dishonest insider (1) dishonest politicians (3) dishonest tax preparer (1) Disney (8) Disney Rarities (1) Disobedient Dogs (1) Distinction in Theatre Award (1) Distraxion (1) Diva (2) Divas (1) Divest Investments from Iran (1) Divine (2) Divine Grace (32) Divine Grace of God (5) Divine Light (1) Divorce (5) diy kits (7) diy+kits (1) DJ (3) DKYN (1) DMV (2) DMX (1) DNA (1) dns (2) dns cache poisoning (1) do not call list (1) Do not suffer fools gladly (1) Doctorate (1) Documentaries (10) Documentary (10) Documentary Competition (1) Dodgers (9) Doggie Style Sex (10) Doggie-style (2) Doggie-style sex (1) Dogs and Cats (1) Doing (3) doj (5) Dolce Gabbana (1) domain names (2) Don Cheadle (1) Don King (1) Don Messer (1) Don Rickles (1) don young (1) Don't Ask Don't Tell (7) Donald Trump (8) Donations (5) Donny and Marie (1) Donovan Leitch Jr. (1) Doobie (2) Doors of Perception (1) DOS attack (1) Double Rose (1) Doubt (1) Doug Reinhardt (1) Doug Weston (1) Doughnuts (2) Doughnuts with sprinkles (2) Dove Award (1) Downadup (1) Dr. Conrad Murray (5) Dr. Glen Justice (1) dr. oz (1) Dr. Phil (1) Dr. Spock (3) dracula (1) Drag Queen (5) Dragon Dance (3) Dragon Dancers (2) Dragon Street (1) Drama (2) Dreadlocks (1) Dream Imagery (1) Dreams (1) Dressing Right (1) Drew Barrymore (2) Drew Waters (1) Drift Spa (1) drive by download (3) driver's licenses (1) Drought (1) Drug Cocktail (1) Drug Manufacturer (1) Drug OD (1) Drug Overdose (11) Drug Raids (1) Drug Smugglers (1) Drug Testing (1) drug trafficking (3) drug wars (1) Drugs (12) Drunk (1) Duchess of York (4) Dude (2) due diligence (3) DUI (21) dumb criminals (1) Dumbledore Gay (1) dumpster diving (1) Dustin Hoffman (2) DVD (3) DVD Release (7) Dwayne Johnson (1) Dwight Rhoden (1) Dykes on Bikes (5) E Entertainment (4) E Gold (1) E Mail Communication (1) E Verify (2) e-bay (1) e-card scam (1) e-cards (1) e-commerce (2) e-commerce fraud (3) e-commerce+fraud (1) E-Fencing (2) E-Gold (1) e-mail scam (2) Early Bird (1) earned income credit (4) Earth created in 7 days (1) Earth Day (2) Earth Plane (1) Earth's Atmosphere (1) Earthquake (6) Easter (3) eastern european organized crime (6) Eastern Philosophy (2) Eastern Religion (2) Eats (1) Eau de Julian (2) ebay (23) Ebony and Ivory (1) ebt cards (1) ecard scams (1) ecards (1) Ecology (3) Economic Opportunity (2) economic+crisis (1) economics (131) economy (6) Ed Harris (2) ed jew (1) ed royce (1) Ed Sullivan Show (5) Ed Wood (2) Edgerton Foundation (1) Edgerton Foundation Grants (1) Editing (1) Editorial Statements (1) Edmonton Oilers (1) Edna May Beazley (1) education (2) Edward "Eddie" Davidson (1) efcc (3) Effeminent (1) ego (1) Egyptian Theatre (4) Egyptian Tombs (8) EIP (1) EIS Decision (1) Elaine Wynn (3) elder abuse (2) Electic Shorts (1) Election (6) Election Campaign (2) Elections (2) Electrolytes (1) electronic checks (1) electronic frontier foundation (1) electronic jihad (1) electronic voting (1) Elegance (1) Elegant Suits (2) Eleni Skalbania (1) Elf Waves (1) Elijah Wood (1) eliot spitzer (1) Elizabeth Liang (3) Elizabeth Taylor (12) ELK (1) Ella Fitzgerald (1) Ellen DeGeneres (32) Ellen Fans (4) Elton John (6) Elvis Presley (7) email (3) Embarrassment (1) embezzlement (4) Embroidery (1) Emergency (5) Emma Thompson (1) Emmy Awards (2) Emperor has no clothes (1) employee absenteeism (1) employee dishonesty (4) employee theft (9) employer verification (1) Employment (3) employment fraud (2) employment verification (1) Emporio Armani (1) Empress Hotel (1) Encore (2) Encore Hotel (4) Encounters at the end of World (1) encrpytion (1) encyption (2) Enemies (1) Enertainment (1) Engineer (1) English (5) English please (3) Enlightenment (12) enron loophole (1) Entertainers (3) Entertainment (24) Entertainment Tonight (3) Entertainment Unions (1) Entetainment (1) Entourage (3) Environment (24) Epidemics (2) EPPIcards (1) Equal Rights (7) Equality (4) Equifax (2) ER (1) Eric Clapton (1) Eric Snyder MD (1) Erik David (1) Erik Prince (1) Ermenegildo Zegna (2) erotic (1) erotica (3) Escalating Violence (1) escorts (1) espionage (12) estonia (1) Eternal Healing Light (2) Eternity (1) Ethan Hawke (1) ethical hacking (1) Ethics (1) Etiquette (6) Etro (1) eurasian organized crime (2) European Fashion Trends (1) Eva Longoria Parker (1) Evil Club Empire (1) Evil Empire (1) Excellence (2) Excess (2) Exercise in Futility (1) Exfoliation (1) Exile (1) Exotic Cocktails (4) Exotic locales (1) Expedia dot com (4) Expenses (1) experian (2) Expired Driver License (1) Expletive Deletives (2) Exposure (1) Extension (1) extortion (2) Extra (1) Extra Care card (1) Extradition (1) Extravaganza (1) Extreme Skiing (2) Exxon (1) Eye Candy (1) eye-candy (1) eyelashes (1) Eyes of God (1) Fabric of Friendship (1) Face (1) Face Lift (2) Face Peel (1) Facebook (26) Faceless (2) Faceook (1) faggot (2) Failire to disclose (4) Fair Haired Individuals (1) Fairfax Avenue (3) Fairfax District (3) Fairies Fantasy and Fun (1) Faith (3) fake identification (2) fake websites (7) fakechecks.org (2) Fall Menswear (1) False Accusations (1) false prophets (1) Falun Gong (1) Fame (12) Fame and Fortune (2) Family Entertainment (3) Family Jewels (2) Family Seal of Approval (1) Family Zone (1) fannie mae (1) Fanny Brice (1) fans (3) Fantasy Package (1) Farragut North (2) Farrah Fawcett (2) Fashion (9) Fashion Haiku (1) Fashion Island (1) Fashion Victims (1) Fashionable Upper East Side (1) Fashionistas (4) fast flux (1) Fast Food (3) Fast Food Nation (2) Fast food take outs (3) Fat Tuesday (2) Fate (4) Father's Day (1) Fathers (1) faulty tire jack design (1) fbi (21) FBI Investigation (1) FCC (3) fda (4) FDA product recalls (1) FDIC. cyber crime (1) Feb 28 (1) February 26th (1) Federal Court (1) federal identity theft task force (7) Federal Law (2) federal reserve (1) Federal Tax (1) Federal Trade Commission (6) Fellatio (1) Felony (7) fema (7) fema fraud (1) Female Singing Icons (1) Female to Male (1) fencing (11) Fender Bender (1) Ferris Beuller's Day Off (3) Festish Nation (1) Festival (2) Festival of Fakery (1) Fetish (2) fidelity national information services (2) Fight (3) Fighter Pilot (1) figure Fixers (1) Film (5) Film Bio (2) Film Competitions (1) Film Critics (2) Film Director (4) Film Distribution (1) Film Festival (2) Film Festival Circuit (1) Film Festivals (8) Film Motifs (1) Film Noir (2) Film Retreads (1) Film Submissions (1) filmmakers (1) filmmaking (5) Films from New Europe (1) finance (131) financial crimes (66) financial crisis (4) financial fraud (1) financial misdeeds (9) financial repair (1) financial+crimes (4) financial+literacy (1) financial+misdeeds (4) Fine Arts Theatre (1) Fine Living with Martha Stewart (1) Finjan (3) Firefly (1) Firemean (1) First Pitch (1) First there is a Mountain (1) fixations (1) fixed income (1) Flamingo Road (1) Flasks (1) Flat Tires (1) Flavius Claudius (2) Flavius Claudius Julian's Blog (4) Fleeting Expletives (2) Flesh pots (1) FlexiSPY (1) Flipper (1) Floppy Hats (1) Flores Street (1) Florida (8) Florida popular vote (2) florida tjx arrests (1) Flowers (2) Flu Shots (1) Fluxhibition # 3 (1) FluxMuseum (1) follow (9) Follow me (3) Followiing (2) following (2) Food (2) Food Inc. (1) Fools (3) Football (7) Footlongs (1) Ford Motor Company (3) Ford Theatre (2) Foreclosure scams (4) Foreign Correspondent (1) Foreign Films (1) Foreigners in Los Angeles (1) foreplay (1) Forest Lawn (3) Forever Hollywood Cemetery (3) forex (1) forged documents (1) forged headers (1) Fort Worth (3) Forth Worth (1) Fortune 500 (1) Foster Care (2) Founding Fathers (1) Four Noble Truths (3) Four Seasons Maui Luxury Hotel (1) Fourth Judge (1) Fox (28) Fox Films (2) Fox Network (3) Fox Network News (1) Fox News (6) Fox News Chicago (1) Fox TV (17) Fragrance of Pop (1) France) (1) Franchise (1) Francis Ford Coppola (4) Frank Gehry (2) Frank Lloyd Wright (1) Frank Sinatra (1) Fraud (10) fraud alerts (1) fraud blog (14) fraud checks (1) fraud losses (1) fraud victims (3) fraud+artist (1) FraudAid (2) fraudnet (1) fraudulent refunds (2) Fred Hutchinson Cancer Center (1) Fred Karger (2) fred thompson (3) freddie mac (1) free (1) Free Advice (1) Free Bucks (1) Free Concert (2) free health care (1) Free Iran (1) Free Lynch Rally (1) Free Merchandise (2) Free Slot play (3) Free Speech (6) Free Tibet (1) Free Tickets (4) free trade (1) freecreditreport.com (2) Freedom (3) Freedom Fries (1) Freedom of Speech (1) Freemont Street (2) Freemont Street Experience (4) Freeway Emergencies (1) Fremont Steet Experience (1) Fremont Street (1) Fremont Street Experience (1) French (2) French Cuisine (1) French Loaf (1) Fresh Fish (3) Fresh Flowers (1) Fresh Succulent Fruit (2) Friend (1) Friends (8) Frozen Yogurt (2) Fruit (1) Fruit Toppings (1) Fruits and Vegetables (2) FSecure (1) FTC (28) FTC Telemarketing Sales Rule (1) Fuel (1) full of hot air (1) Fundraisers (4) Fundraisser (1) Funeral (4) Fur Trade (1) Future is Now (1) futures (1) G spot (1) Gabirol (1) gadolinium (1) Gail Cunningham (1) Gakona (1) Gala (4) Galaxy Soccer Team (7) Gallons (1) Gamble (1) Gambling (10) Gandhi Speaks (1) Gangs (2) Gangsters (3) gao (6) GAP (1) Garbage (2) Gardens (3) gartner (1) Gary Busey (2) Gary Cooper (1) gas gouging (3) Gas prices (2) Gas Pump (1) Gaslight (1) Gates (1) Gavin Newson (2) Gay (8) Gay Gulch (3) Gay Lifestyle (2) Gay Lifestyles (2) Gay Marriage (24) Gay Marriage Ban (5) Gay Men (1) Gay Pride (3) Gay Pride 2009 (1) Gay Protests (1) Gay Rumors (5) gay slurs (1) Gay themed films (1) Gay-owned Business (1) GE Money (1) GED (1) Gelsons (1) Gene Autry Museum (5) Gene Simmons (7) Gene Simmons Family Jewels (1) General Hospital (10) Genesis (1) Genevieve W (1) Geoff Eddington (1) George Burns (1) George Bush (1) George Carlin (1) George Clooney (9) George Cristy (1) George Harrison (2) George Maharis (1) George Melies (1) George Michael (5) George Miller (1) George Orwell (1) George Stephanopoulos (1) George Takei (1) George W. Bush (7) George Wada (1) georgia (1) Georgia Bay (1) Gerald Sternbach (1) German New Wave (1) Germany (4) Gerome Ragni (2) Gertrude Stein (2) Ghana (2) Ghost (1) Gianni Versace (1) Giant (23) Gideon Yu (1) gift card fraud (6) gift cheques (1) Gift of Healing (2) Gift of Prophecy (1) Gilda (1) gimme some truth (1) Giorgio Armani (4) Giorgio Emporio (2) girl scouts (1) Girls Next Door (1) Girls Night Out (1) Gisele Bundchen (1) Give Peace a Chance (2) Givenchy (1) Giving (7) glaad (1) Gladiator (2) Gladys Knight (1) Glee (11) glendale (1) Glitches (1) Glittering Galas (2) global economy (2) Global Green USA (2) Global tracking (2) Global Warming (3) Globe Theatre (1) Gloria Allred (1) Go Eat Los Angeles (1) Go-Go Girls (1) God (2) God of Manga (1) God's Bounty (1) God's Gifts (1) Godiva Chocolates (1) Gold Casket (1) Gold Coast (1) Gold Coast Hotel and Casino (1) Gold Olympic Medalist (9) Gold's Gym (2) Golden Gate Casino (1) Golden Globe Awards (6) Golden Palace Opera House (1) Golden Pay (1) Golf (4) Gone Baby Gone (2) Good Business (1) Good Business Practice (1) Good Bye (2) Good Manners (4) Good Morning America (2) Good Omens (5) Good Samaritan (1) Good Samaritans (1) Good Sport (1) Goodwill (2) Goofy (1) google (4) Gooks (1) GOP (1) Gore Vidal (1) Gossip (35) Gossip Maven (1) gossip overload (1) Gotcha (1) Gothic Horror Films (2) Gourmet Food (2) Government by the People (3) government contract fraud (2) government corruption (3) government espionage (1) Government Experiments (1) government fraud (10) government waste (10) Governor (4) Governor Schwarzenegger (2) Governor Bobby Jindal (1) Governor Jindal (1) Governor John Lynch (1) Governor Perry (1) Governor Rick Perry (1) Governor Schwarzenegger (2) GPS (1) GQ (1) Grab a Sandwich (1) Grace (1) Grace Cathedral (3) Grace Jones (1) Graffiti Daze (1) Grammy Awards (3) Grand Jury Prize (2) Grand Opening (4) Grants (2) Grassroots Movements (1) Grauman Chinese Theatre (2) grayware (1) Great Mauseoleum (1) Great Wall of China (1) Great White North (1) greed (6) Greek Gods (1) Green (2) Green Bay Packers (1) Green Beer (4) Green House Gases (1) Green Mayor (3) Greenback (1) Greenpeace (1) Greg Abbott (1) Gregg Schwenk (3) Gregory Peck (1) Greyhound (1) Gridiron (4) Groceries (3) Grocers (1) Grocery Stores (3) Gross Headline Stories (1) Grouch (1) Ground Zero (1) Group of 7 (1) Guess Who's Coming to Dinner (1) Guidance (1) Guilty (1) Guitar (5) Gus Van Sant (1) Gwyneth Paltrow (5) Gym (2) Gym Bunnies (2) H. R. 3046 (1) HAARP (1) Habbo (1) Hackers (9) hackershomepage.com (1) hacking (39) hacking webcams (1) Hair (3) Hair Gel (1) Hair Products (2) Hairspray (2) Hairstyles (1) Hal Prince (1) Half Breed (2) Half Moon Bay (1) Hall of Fame (1) Halle Berre (1) halliburton (1) hallmark (1) Halloween (3) Hamburgers (1) Hand Modeling (1) Hand-outs (1) Hangover feature film (1) Hank Wiliams Jr. (1) Hannaford Brothers (3) Hannah Montana (5) Happy Birthday (8) Happy Hour (1) Happy Mother's Day (1) Happy New Year (2) Happy Thanksgiving (1) Harassment (9) hard drive washing (1) Hard Rock Cafe (7) Hard Targets (1) Harlettes (1) Harrah's (1) Harrison Ford (1) Harry Potter (3) Harvey Fierstein (2) Harvey Levin (4) Harvey Milk (5) Hate crimes (2) Hawaii (3) hay fever (1) Hayworth Street (1) HCG (1) Head (4) Headliner (1) Healing Rain (2) Health (12) Health Insurance (7) health and safety (1) Health Care (4) Health Care Reform (4) Health Insurance Reform (1) Health Julian Ayrs (91) healthcare fraud (1) Healthcare Speech (1) Healthy (3) Heart (1) Heart Attack (3) Heart Attacks (1) Heart Throb (5) heartland payment systems (3) Heath Ledger (2) Heckled (1) Hef (1) Heidi Klum (4) Heiress (4) hells angels (1) Helpline (1) Henry Brilliant (1) Henry Fonda (1) Henry Kissinger (2) Henry Selick (2) henry waxman (1) Henry Winker (1) herb horner (1) Here Lounge (1) heredity (1) Hero (2) Heroes (3) heroin (1) hezbollah (1) Hi Fi Recordings (1) hidden fees (1) Hide and Seek (1) High Bird (1) High Noon (1) High Profile Productions (1) High Rents (1) High School Musical (1) High Society (1) Highway 101 (1) Highway Robbery (2) Hillary Clinton (13) Hillcrest Mardi Gras (2) Hilton Hotel (7) Hip (1) Hip-Hop (2) Hippies (9) Hiroshi Watanabe (2) His Holiness (2) History (5) Hit Album (3) Hit Records (1) Hits (3) HIV (3) HIV/AIDS (1) hoaxes (1) Hobbits (2) Hockey (1) Hog Town (1) Hogs Hollow (1) Hold Steady (1) Holding against one's will (1) Holidays (4) Holly Madson (1) Holly Terrace (2) Hollywood (10) Hollywood Film Industry (1) Hollywood Forever Cemetery (1) Hollywood Hills (2) Hollywood Legends (1) Hollywood Memorabilia (1) Hollywood Outdoor Cinema (1) Hollywood Phoney (1) Hollywood Producers (1) Hollywood Theatre (1) Hollywood Video Stores (1) Holy Bible (6) Holy Scriptures (3) Holy Spirit (6) home depot (1) home equity (1) Home Improvement (1) Home Show (1) homeland security (1) Homeless (14) Homicide (1) Homo 101 (4) Homo Secrets (1) Homoerotic (5) Homophobe (1) Homosexual Lifestyle (5) Homosexuality (5) Honky-Tonk (1) Honors (2) Hookers (1) Hootch (1) hormones (1) Horny (1) Horror Classics (3) Horror Films (2) Horror Genre (2) Horror-Comedy Genre (1) Horse Ranch (2) Hostility in Streets (1) hot line (1) Hotel Accomodation (1) Hotel Roosevelt (1) Hotels (19) hotmail accounts (1) hotspot (1) Hotwire (1) Hounded (1) house stealing (1) How did you get so rich (1) How to Change a Tire (1) Howard Beale (1) Howard Hughes (2) Howard Stern (4) Howl (4) HR-3997 (1) Hugh Hefner (3) Hugh Jackman (3) Human Art Series (1) human rights (1) Human Rights Violations (2) Humberville Poetry Slam (2) Humerside High (1) Humor (7) Humphrey Bogart (1) Hunk (2) Hurricane Gustav (1) hurricane ike (1) hurricane katrina (9) hurricane rita (5) Hydration (2) Hydrogen Nuclei (1) Hymn of Life (2) Hypocrite (1) I Get that A lot (1) I Got you Babe (1) i-jack (1) iC3 (2) ICE (9) ICE INS Police Force (5) Iceland (2) Icon (2) Ida Mae Holyoak (3) Ideas (2) identity force (1) Identity Theft (2) identity theft protection (4) identity theft protection services (3) identity theft recovery (6) identity theft recovery services (4) identity theft resource center (4) identity theft statistics (1) identity theft victims (4) identity theft+protection services (1) identity+theft (6) idiots (6) IgE (1) Ignorance (2) Ihara Consul General of Japan (1) Il Circo (1) illegal alien amnesty (1) illegal aliens (4) Illegal conduct (2) Illegal Immigrants (37) illegal immigration (24) Illegal search and Seizure (3) Illuminations Tour (1) Illusion (1) Illustrated Man (1) Image (1) imagine (1) Imagine Peace (1) Imagine Peace Tower (1) Immigrant Rights' Violations (2) Immigrant Scams (1) Immigrants (5) immigration bill (1) Imperialist Occupation (1) Impotence (1) In Concert (1) In the Closet (2) Inalienable (1) inauguration (1) Incarceration (1) income earning opportunities (1) incompetent box boys (2) Incompetent Staff (2) Inconvenient Truth (2) Independence (3) Independent Feature (3) Independent Film (3) Independent Films (4) India (1) Indian Mujahideen (1) Indianapolis (1) Indianapolis Racers (1) Indio (2) Indy 500 Winner (1) INew Beverly Cinema (1) Inexperience (1) inflation (1) infomation theft (6) information brokers (1) information industry (1) information security (13) information theft (24) information+theft (2) Inglorious Bastards (2) Inglorious Basterds (4) Inglourious Basterds (2) Inner Awareness (2) inner being (1) Inner Self (1) Inner Smile (1) Innocence (1) INS (1) Inside Job (1) Inside Out (1) insider theft (5) Insomniac Cinema (5) Inspirational (3) Inspirational Quotes (31) Instrumental (1) insurance fraud (2) intellectual property crimes (2) intellectual property+crimes (1) Intelligence (3) Intense Play (1) Interactive (1) interchange fees (1) internal audit (1) International Anticounterfeiting Coalition (4) International Woman's Day (1) Internet (18) internet abuse (1) Internet Crime (17) internet crime forums (1) Internet Crime Report (1) Internet Crimes Against Children Task Force (1) internet dangers (1) Internet Fraud (4) Internet fraud and abuse (1) internet hoax (1) Internet Journalilsts (1) Internet lunacy (1) Internet Scams (5) Internet Security (5) internet terrorism (3) Internet Viruses (6) internet+scam (1) Internment Camps (1) Interred (1) Interview (1) Interviews (2) Intimidation (2) Intimidation of a Witness (1) Intrigue (2) Intrusion (2) Investigation (1) investment scams (2) Ione Skye (1) ionosphere (1) IParliament (1) iphone (3) IQ (2) iran (2) Iran Nuclear Program (2) Iraq (12) iraq war (3) Ireland (1) Irish Jig (3) Iron Mountain (1) Irony (1) irregular warfare (1) irresponsible lending (1) irresponsible lending practices (1) irs (18) irs scams (1) Island Hotel (2) Isolation (1) ISP (1) IT legislation (1) IT Policy Compliance Group (3) It's in Good Taste (1) Italian (3) Italy (3) itinerary (1) ITpolicycompliance.com (1) iTunes (6) Itzik Galili (1) Jack Carter (1) Jack Kerouac (3) Jack Lemmon (2) Jack Nicholson (2) Jack-in-the-Box (3) Jackass (1) Jackie Curtis (1) Jackie O (1) Jacko in Hell (1) Jackpot (1) Jackson 5 (9) Jacqueline Kennedy Onassis (1) Jacumba (1) Jake Gyllenhaal (8) James Bond (1) James Caan (2) James Cameron (4) James Carville (1) James Dean (4) James Franco (7) James Rado (1) James Taylor (1) James Toback (1) James Tobak (1) Jane Fonda (1) Jane Russell (2) Janine Turner (2) Japanese (3) Japanese American Stories (1) Japanese Culture (1) Japanese Films (2) Jason Ritter (1) Jason Trawick (1) Java (5) Javelin (3) Jay Leno (21) Jay Leno Show. The Tattler (78) Jazz (4) Jealousy (1) jeanine pirro (1) Jeanne Cooper (1) Jeff Beacher (1) Jeff Beck (3) Jeff Bridges (12) jeff grass (2) Jeffrey Sanker (1) jennifer lopez (1) Jeremy Renner (3) Jérôme Kerviel (2) Jerry Brown (5) Jerry Lewis (1) Jerry Seinfeld (1) Jesse James (1) Jessica Simpson (2) Jesus (2) Jesus Christ (3) Jets (2) Jewellery (1) Jewels (1) Jewish (1) Jewish Rant (2) Jews (1) jihadist forums (1) Jim Donovan (1) Jim Morrison (4) Jimi Hendrix (1) Jimmy Carnicia (1) Joan Rivers (2) Joaquin Phoenix (3) Job Opportunities (2) job scams (12) job sites (1) Jock Straps (1) Jody Foster (2) joe arpaio (1) joe larocca (1) Joe Medicine Crow (1) Joe Wang (1) john culberson (1) John Dillinger (1) john edwards (2) John F. Kennedy (3) John Horn (1) John Landis (1) John Lennon (8) John Malkovich (3) John McCain (4) John McCain takes South Carolina (1) John McGuire (1) John Rando (1) John Rosenfield (1) john schiefer (1) John Travolta (10) John Wayne (1) John Wildman (4) John Wildman AFI Director of Press and Public Relations (1) Johnie's Broiler (1) Johnny Carson (2) Johnny Depp (6) Joint (3) Joke (1) Jokes (2) Jon Erik Hexum (1) Jon Gunn (1) Jon Vogel (1) Jonathan Rhys Meyers (1) Joseph (1) Joseph LaRocca (1) Josh Groban (2) Josh Olson (1) Journalism (1) Journalistic Ethics (3) Journalists (4) Joy (2) Joy of Shopping (1) Joyce Theatre (1) JP Morgan (1) Judge Alex Kozinski (1) Judge Andrew A. Hauk (1) Judge Greenwalk (1) Judge Joseph S. Biderman (1) Judge Rya W. Zobel (1) Judge Wu (1) judges (1) Judicial Performance (1) Judith Merril (2) Judy Garland (5) Juilan Ayrs (5) Juilan's Blog (1) Julia (1) Julia Child (1) Julian (1) Julian Ayrs (18) Julian 1st Emperor of Rome (1) Julian Ayrs (2040) Julian Ayrs 1st Annual 10 Worst Dressed Men List (1) Julian Ays (2) Julian's Blog (239) julie amero (3) Julie and Julia (2) julie l. myers (1) July 6th (1) July 7th (1) Jump Start (2) Jun Kim (1) June 18th (1) June 2009 (1) June 25 2009 (1) June 27th (1) June 7th (1) June Advertising Campaign (1) Junichi Suzuki (1) Jury (1) Just One LA (1) Justice (8) Justice Alex McDonald (1) Justices off their rockers (1) Justin Gaston (1) Justin Henry (1) Justin Kwon (1) Justin Timberlake (3) Justin Trudeau (1) Kansas (1) Kanye West (1) Karaoke (8) Karaoke ban (1) KARAOKE WITH KENNY VIP PARTY (1) Karate (2) Karen Kingsbury (1) Karl Lagerfeld (1) Karma (1) Karma Calling (1) Kate Linder (1) Katherine Hepburn (1) Kathryn Bigelow (8) Kathy Bee (1) katie couric (1) kazaa (1) kbr (1) Keanu Reeves (2) Keats (1) Keifer Sutherland (1) Kelly Lynch (1) Ken Garff Automotive Group (1) ken lay (1) Kendra Wilkinson (2) Kennedy assassination (4) Kenneth Turan (1) Kenny G (1) Kenny Karaoke (1) Kenny Loggins (4) Kenny Morse (1) Kenny Ortega (1) Kenny Rogers (2) Kevin Bacon (1) Kevin Dillon (1) Kevin Downes (1) keyloggers (11) kgb (1) Kick up Heels (1) Kid's Choice Awards (2) kidnapping (1) Kidney failure (1) Kids (2) Kids are Alright (1) Kids films (1) KIDS FIRST (2) KIDS FIRST Film Festival (1) Kids say the darndest things (1) Kill Bill (2) Killer Prescription Drugs (4) Killer Weed (1) Kim Novak (1) kim zetter (1) Kimbell Art Museum (2) Kin Ship Art Gallery (1) Kind of Pop (3) King of Pop (16) King of Speed (1) King Tut (2) Kink (2) Kinkos (1) Kirstin Stewart (1) Kiss (8) Kissi (1) Kitsilano Storage (1) Kitty Litter (1) KLOS (1) knock off goods (7) Knocked up. David Letterman Show (1) knockoff (1) Knowledge (2) KNX (1) Kodak (1) Kodak Theatre (7) Koreatown gangsters (1) Kou Shibasaki (1) Kramer vs. Kramer (1) KSNE (1) KSNE.com (1) Kudos (2) L'oreal (1) LA Children's Hospital (1) LA City Council (2) LA Convention Center (1) LA Pride 2009 (1) LA Times (11) LA Woman (1) labor (1) labor abuse (1) Labor Day Weekend (2) Labyrinth (1) ladies swimwear (1) Lady Byrd Johnson (1) Lady Luck (1) Laemmle (1) Laemmle Theatres (3) Lakers (4) Lamb of God (1) Lana Clarkson (1) Land Rover (1) Landon Brandon (1) Lao Tzu (1) LAPD (2) larceny (1) Larry King (3) Larry Sinclair (1) Lars and the Real Girl (1) Las Vegas (174) Las Vegas Boulevard (1) Las Vegas equila Fest (1) Las Vegas Police (1) Las Vegas Police Force (1) Las Vegas Strip (1) Las Vegas Tribute Party (1) Last Respects (3) Latino Elitist (2) Latino Vote (1) Latino Workers (1) Latinos (8) Latisse (1) Laughter (1) Laura Linney (1) Lauren Holly (1) Lauren Hutton (1) Laurier LaPierre (1) Law Abiding Citizens (1) Law Enforcement (6) law suit (1) Lawmakers (1) Laws of Universe (1) Lawsuit (4) Lawsuits (1) Lawyer Malpractice (1) Lawyers (3) lazarus (1) Lead Poison (1) Learning (1) Leather (2) Leather Jackets (3) Lebowski podcast (1) Lecture (1) Lee's Summit (1) Legal bozos (1) Legal Eagles (1) legal system (1) Legends (4) Legion of Honor (1) legislation (1) Lehman Brothers (1) Leisure (6) LEO (1) Leonardo Di Caprio (3) Leonardo DiCaprio (4) Leonardo DiCarpio (1) LERPnet (1) Lesbian (6) Lesbian Characters (1) Lesbians (2) Letches (2) Lethal Dose (1) Lethal Weapon (1) Letter (1) Levi Johnston (4) Lewd conduct in Public Place (1) Leyla Milani (1) LGBT (2) LGBT community (6) LGBTQ (1) Liability (1) Liam Neeson (1) Liberace (3) Liberace Museum (1) Liberals (1) lies (3) Life (1) Life Experience (2) Life of Luxury (1) Life threatening illness (1) Life's Spiritual Journey (2) lifelock (8) Lifestyles (1) Light (1) Light a Candle (1) LIght my Fire (1) Light Shows (2) Lightbulb (1) Like Dandelion Dust (1) Lillies (1) Lily Tomlin (2) limewire (1) Limited Release (1) linda foley (1) Linda Lovelace (1) Lindsay Lohan (43) Lindsay Mitchell (1) Lion Tamers (1) Lionsgate Films (1) Lipstick Lesbians (1) Liquor License (1) Liquor Sales (1) Literature (11) litigation (1) Little Ashes (2) Little Emperors (1) little people (1) Little Tokyo (2) Live From Forum in Alcapulco (1) Live Nation (1) LIVE PERFORMANCES (9) Live Shows (1) Live Stage Shows (15) Liza Minnelli (2) loan fraud (1) loan sharking (1) Lobbyists (3) Loggins and Messina (1) Logic (2) Logo (1) Long-term Engagement (3) Lorca (1) los angeles (1) Los Angeles Children's Hospital (1) Los Angeles City Council (1) Los Angeles Film Festival (1) Los Angeles Superior Court (1) Los Angeles Times (5) Los Angeles Times Festival of Books (9) loss prevention (10) Lothario (1) lottery bandit (1) lottery scams (16) Lotus Flower (1) Lou Diamond Phillips (1) lou dobbs (6) Lou Gossett Jr. (1) Lou Reed (1) Loud (2) Louis I. Kahn (1) Louisiana (1) Louisville (1) Lounge Lizards (2) Love (6) Love Letters (1) Love on rocks (1) Love that dare not speak its name (2) Lovely Rita Meter Maid (1) Low Calorie Dessert (1) lower classes (1) LSD (2) Lucille Ball (1) Luck of the Irish (4) Lucy in the Sky with Diamonds (1) Ludicrous Notions (1) Luis Miguel (1) Lunch Special (1) Luscious Organic Desserts (1) Luxury (3) Luxury Mansions (1) Luxury Suites (1) Lynn Chen (2) Machine Girl (1) Machismo (1) Macho Stance (1) MacKenzie Phillips (1) Macy's (3) Macy's Department Store (3) Madame Tussaud Wax Museum (4) Madmaxathon (1) Madonna (7) Maggie Smith (1) Magic (3) Magic Carpet Ride (1) Magnolia Theatre (1) Mahatma Gandhi (2) Maid Service (2) Maiden's Breast (1) Mail Delivery (1) mail fraud (1) Mail Tampering (1) mail theft (2) Mailbox Rentals (1) Main Street (1) Maintenance (2) Make up (1) Make-up (5) Male (1) Male Anatomy (2) Male Escort Service (1) Male Models (1) Male Nude (4) Male Underwear (1) Male Whores (1) Malibu (3) Malibu Bluffs (1) Malibu Bluffs Park (1) malicious code (3) malicious JavaScript injection (1) malicious prosecution (1) malicious software (2) malicious websites (1) Malicious Worms (5) malware (79) Mamma Mia (3) Man in the Mirror (1) Man of Steel (1) Man stud (1) Man Style (1) Manchester Hotel (2) Mandalay Bay (3) Mandarin (1) Mangione Aquatic Center (1) Manhood (1) Mann's Chinese Theatre (7) Mannequins (1) Mannerisms (2) Manners (2) manuel leija-sanchez (1) Maple Leaf Rag (2) Mapping Service (1) Marc Jacobs (1) Marc Shaiman (1) Marc Shalman (1) March 17th (2) March 19th (1) March 20th (1) March 3rd Elections (1) Marcia Clarke (1) mardi gras (1) margaret saizan (2) Maria Bello (1) Maria Shriver (1) Mariah Carey (1) maricopa county (1) Marie Osmond (1) Marijuana (1) Marilyn Manson (1) Marilyn Monroe (4) Mariner SUV (1) Marines (1) Mario Barth (1) Mark Ballas (1) Mark Burnett (1) Mark Wahlberg (7) Mark Zuckerberg (4) marketing (3) markets (1) Marlon Brando (4) Marlon Brandon (1) marlon wayans (1) Marriage (1) Martha Stewart (5) Martha Stewart Show (1) Martin Bosworth (1) Martin Luther King (1) Martin Luther King Jr (1) Martin Scorsese (3) Marvin Hamlisch (1) Mary Hart (1) Mary Martin memorabilia (1) Mary Steenburgen (1) Mary Wilson (1) Masaharu Fukuyama (1) Mask (1) Masquerade Room (1) Massage (2) masses (1) Mastercard (2) Mathew Modine (1) Mating rituals (1) Matt Damon (6) Matt Lauer (3) Matt Laurer (1) Mausoleum (1) Maverick Surf contest (1) Max Cure Foundation Roar for a Cure (1) May 26 (1) May 26th (4) May 6 (1) May 6th (4) Mayer Glassman and Gaines (1) Mayfair (1) Mayflower (1) Mayor Antonio Villaraigosa (2) mayor bloomberg (1) Mayor Gavin Newsom (6) Mayor Newsom (4) Mayor of Beverly Hills (1) Mayor of San Francisco (16) Mayor Villaraigosa (1) Mayweather verses Marquez (1) mcafee (2) McColo (1) McDonald's (7) McDonald's employees (2) MCRC blog (1) Meals (1) Meat Eaters (1) Medal of Freedom (1) Media (3) Media Blitz (2) medical identity theft (6) Medical Marijarijuana (2) Medical Marijuana (7) Medical phenomenon (1) Medical Records (1) Medical Research (3) medicare fraud (5) Medicinal Marijuana (1) Mediocrity opiate of masses (1) Meditation (5) Meek Shall Inherit the Earth (1) Meg Ryan (1) Mega Millions (1) Megastar (1) Mel Gibson (3) Melrose Avenue (3) Membership (3) Memogate (1) memorabilia (5) Memorablia (1) Memorials (3) Memories (4) Men's Fashion (1) Men's Swimwear (2) Menial Task Jobs (1) mens swimwear (1) Menswear (15) Mental Illness (2) Mentalist (1) Mercedes Benz (1) Merchandising (1) merchant bill of rights (1) merchant's payment coalition (1) Merck (4) Mercy Killings (1) Merde (1) Mermaids (1) Merry Christmas (1) Meryl Streep (6) mess (1) Messenger (1) Messiah (3) Metallica (1) Meter Maid (2) Metro (3) Metro Bus (3) Metro Rail (1) Metro Red line (1) Metrosexual Male (1) Mexican Independence Day (1) mexican organized crime (2) Mexicans (4) Mexico (6) Mexico City (1) MGM (1) MGM Grand (4) Michael Alcide (1) Michael Chen (1) Michael Chertoff (1) Michael Devous (1) Michael Douglas (3) Michael J. Fox (1) Michael Jackson (38) Michael Mann (1) Michael Maron (1) Michael Maron's Instant Makeover Magic (1) Michael Moore (2) Michael Phelps (23) Michael S. Hall (1) michael webster (1) Michelangelo Antonioni (2) Michelle Obama (11) Mick Jagger (2) Mickey Rourke (2) Microsoft (3) Middle East (3) Midnight Features (1) Midnight Screenings (1) Midnight Shows (1) Miguel Contrera Learning Complex (1) mike huckabee (1) mike rothman (1) Mike Smith (1) Mike Trevino (1) Mike Tyson (2) Milan (3) Miles to Go (1) Miley Cyrus (18) Military (12) Military Policy (1) Military Site (1) Milk (1) Million Bucks (1) Milorad Cavic (1) mind control (1) Ming Na (1) Minorities (1) Minute Men (1) Mio Takada (2) Mirage (1) mirror (1) Mirrors (1) misdeeds (1) Misdemeanors (1) Misquotes (1) Miss California 2009 (2) Miss Playboy (1) Miss Unverse Pageant (1) Miss USA Pageant (2) Mission Impossible (1) Mob (2) Mobile (1) Model (1) Mohammed Gadaffi (1) Moisturizer (1) Molly Mallone's (1) Mom Jeans (2) MoMa (1) Monaco (1) Money Grubbing Bit** (1) money laundering (6) money orders (1) money transfer scams (1) money.co.uk (1) moneyfactory.gov (2) MoneyGram (1) MoneyGram money orders (1) moneygram+money orders (1) Monica Lewinski (2) monopoly (1) monster.com (1) Montreal (2) Mood (1) Morenita (1) Morgan Freeman (1) Morgan Spurlock (1) Mormon (1) Mormon Church (1) Mormons (4) Morons (1) mortgage bubble (1) mortgage crisis (7) mortgage fraud (12) Mosco Chill (1) Moscow Chill (1) Mother (3) Mother's love (1) Motion Picture Academy of Arts and Sciences (6) Motley Crue (1) Motorcycle Cops (2) Motorcycles (1) Motorcyles (1) Motorists (2) Mountain's Edge (1) Mourn (1) Mourn Sins (1) mouthpiece (1) Movie (24) Movie Commentary Julian Ayrs (1) Movie Critics (3) Movie Previews (2) Movie Review (42) Movie Reviews (29) Movie Star (3) Movie Stars (2) Movies (38) Mozart (1) Mr. Blackwell (7) Mr. Brown (1) Mr. Vivacious (1) MRI (1) Mrs. John Lennon (1) Ms. Ukraine (1) MTV (5) Multi-Cultural (1) Multimillion Dollar prize (1) Murder (2) Murder Genre (1) Murder She Wrote (1) Muscone (1) MUSE Elementary (1) MUSE Lavender Faire (1) Museum (1) Museum of Anthropology (1) Music (27) Music Gigs (2) Music Business (2) Music Festival (1) music piracy (2) Music Stand (1) Music Videos (5) Musical Genius (1) Musicals (1) Musicians (3) Musings (2) Muskoka (1) Muslims (6) My Best Friend (1) My Life in Ruins (1) My New BFF (1) My Own Idaho (1) Myanmar cyclone (2) myexcusedabsence.com (1) myspace (3) Mysteries of the Heart (1) Mystery (2) Mysticism (1) mytruston (11) NACAC (1) Nae (2) Nail Polish (1) Naked (1) Naked Arnold Schwarzenegger (1) Naked Babes (1) Name Calling (1) Naoto Takenata (1) narcoterrorism (1) narcotics (1) Nasal Spray (1) Nascar (1) Nasher Sculpture Center (1) Nasher Sculpture Garden (1) Nasty Toilet Award (2) Natalie Cole (2) Nathan Burton (1) Nathanial Nuon (1) National Velvet (1) national consumers league (1) National Cyber Security Alliance (1) National Guard (1) National Historic Landmark (1) National Institute on Mental Health (1) National Lapoon (1) national retail federation (2) national security (5) National Sport (1) Native American Indian (1) NATO (2) Natural Bridge Caverns (1) Nature (3) Nature's Majesty (1) Navy Seal (3) Nazi slaughter (2) Nazis (2) NBC (14) NBC News (2) NBC Today Show (3) NBC TV (1) ncpw (1) Negotiations (1) Neiman Marcus (2) Nelson Skalbania (2) Nerds (1) Nerdy Characters (1) Network World buzz blog (1) Networking (1) networks and one suspect in the case has been identified as software engineer (1) Nevada (18) New Beverly Cinema (24) New CD (1) New Face (1) New Hampshire (1) New Line Productions (1) new orleans (3) New Release (1) New Year's Eve (1) New York (7) New York City (11) New York Fashion Week (2) New York Public Library (1) New York Times (3) New York Times Arts and Leisure Weekend (1) Newlywed game (1) Newport Beach (1) Newport Beach Festival (4) Newport Beach Film Festival (6) News Anchors (2) Newt Gingrich (2) NFCC (2) NFF (1) NHL Football (2) Nicholas Cage (3) Nick Shapiro (1) Nick Ut (1) Nicole Kidman (5) nigeria (1) nigerian fraud (9) Nigerian Scam Artists (1) nigerian scams (1) Nightclub (2) Nightclub Boutique (1) Nightclubs (1) nightmare (1) Nightmare Before Christmas (1) Niki Harris (1) Nikola Tesla (1) nina olson (1) Nine of Swords (1) Ninety-nine bottles of beer in the wall (1) Nipple play (1) Nisei Festival Week (1) NMRI (1) No Age (1) no beginning no end (1) No Courtesy for Clients (1) No Excuses (1) No Fags allowed (1) No Hats (1) No Limit Texas Hold 'em (1) no match ssn (2) no SSN credit cards (1) No Sunglasses (1) No Warning (1) Noah's New York Bagels (1) Nob Hill (4) Nobel Peace Prize (2) Nokia Mobile Phone (1) Nokia Theatre (7) nola (1) Non-Profit (2) Non-Union work (2) nonseminoma (1) Noor Awards (1) Nordstrom (1) Nordstrom's (1) norman hsu (2) Norman Reedus (1) North Korea (1) NorthPark AMC (1) NorthPark Mall (1) Northridge (1) Northridge Earthquake (2) Norwegian Nosedive (1) Nostrils (1) Not Gay (1) Novel (5) Novels (1) Now (1) Noxious Fumes (1) NRF (12) NSF/NSD (1) Nuclear Bombs (2) Nude Photos (1) Nude Schwarzenegger (1) Nudity (5) Numerologoy (1) Numerology (3) Nupitals (3) Nursing Homes (1) Nutrition (7) NY Times (1) NYC (9) O Organics Salad (1) O.J. Simpson (3) obama (3) Obesity in Children (2) Obituary (2) Obscenity charge (1) Obscured Faces (1) Obstructive Sleep Apnea (1) OC (1) OC Register (1) OCCRP (1) Octa-Mom (2) odd ball Security guards (2) Oddball behaviour (1) OE (1) Off the Record (1) Off the wall (1) ohio (2) Oil (12) oil companies (1) Oil Crisis (1) Oil Industry (2) oil prices (2) Oilers (1) OJ Simpson (1) OJ Simpson Trial (1) Olay (1) Olay Regenerist (1) Old Navy (1) Oliver Friedrichs (1) Oliver Stone (2) Olivia Maria Lopez (1) Olivia Newton John (1) Olympic Gold Medalist (7) Omaha Hi-Low Split-8 or Better (1) Omelet House (1) Ominous (1) On the Road (3) On the Wagon (1) on-line (5) One term President (1) OnGuardOnline.gov (1) Online Business Venture (1) online escrow fraud (1) online fraud (2) online lotto (1) Ontario (2) OPEC (1) open borders (1) Opera (3) operation bot roast II (1) Operation Avalanche (1) operation bot roast (1) Operation False Charity (1) Operation Homefront (1) Operation Ore (1) Operation Paper Tiger (4) opium (1) oprah (3) Oprah Winfrey (13) opt out (1) opt-out (4) Optic (1) options (1) Orange County (1) ORC (1) organized asian crime (1) organized crime (17) Organized Crime and Corruption Reporting Project (1) organized crime+retail (1) organized retail crime (16) organized retail theft (5) Orgeon Attorney General (1) Orion Pictures (1) Orlando Bloom (1) Orpheum Theatre (3) Orson Welles (4) Osama bin Laden (32) Osamu Tezuka (1) Oscar (4) Oscar Nominations (2) Oscar-winning film (1) Oscars (17) Oshawa (1) osofia (1) Ottawa (2) Out (2) Out of the Closet (5) Out of the mouths of Babes (1) Outer Aura (2) Outside Organisation (1) outsourcing (6) Oval Office (3) overpayment scams (4) Overseas Traffic (1) Oxygen Tanks (1) Oz (1) Ozone Layer (1) p2p (3) Pablo Picasso (4) Pacific Heights (1) Pacific NorthWest (1) paedophile (1) Pain (5) Painting (4) Palace Hotel (2) Palms Casino Resort (2) Palms Place (1) Pam Anderson (3) pam dixon (2) Pamela Anderson (6) Pancreatic Cancer (1) Panda Labs (1) Panel Discussions (5) Panhandlers (2) Paparazzi (9) paper weapons (13) Par-tay (3) Parade Magazine (1) Paramount Studios (4) Paranormal Activity (1) Pardon scandal (6) Parenthood (1) Parenting (1) Parents Television Council (1) Paris (4) Paris (not (1) Paris Hilton (27) Parking (1) Parking Fees (2) parking fines (1) Parking Meters (1) Pasadena (2) Passion (5) Passions (1) passwords (1) Patient rights (1) Patrice Fisher (1) patrick jordan (1) Patrick Swayze (3) Patrick Warburton (2) Patriot Act (2) Patriots (1) Patton Oswalt (1) paul allen (1) Paul Laudanski (1) Paul McCartney (4) paul young (1) Paula Abdul (7) paula zahn (1) Pavilions (11) Pavilions Grocery (8) Pay Day Blues (1) payment card cloning (2) payment card fraud (16) payment card fraud asset protection (1) payment card industry (2) payment card skimming device (1) payment card+fraud (1) paypal (6) PBS (10) PC glitches (1) PC World (1) pci data protection standards (12) pci data security standards (3) PCI DSS (2) Peacock Colors (2) Pearl (1) Pearl of Wisdom (1) Pedestrians (4) pedro castorena (1) Pee (2) peer to peer (1) Peerbhoy (1) Penelope Cruz (4) penis envy (6) Penny Slots (3) People's E-Mail Network (1) Per Diem (1) Perez Hilton (7) Perfection (1) Perfection of Souls (2) Perfume (3) Permanent Resident Status (1) Perry Twins (1) Persian (1) Personality Traits (1) personlity profiles (1) Perversity (2) Pet Foods (1) pet scams (2) PETA (5) Peter Bogdanovich (4) Peter Coyote (1) Peter Falk (1) Pets (2) Petty Behaviour (1) Petty Theft (1) PGA Tour (1) Phantom (1) Phantom of the Opera (2) Pharmaceuticals (2) Pharmacy (4) pharming (5) pharming malware (2) Phil Spector (1) Philadelphia (3) Philosophy (4) phishermen (4) phishers (1) Phishing (79) Phoney-Baloney (1) Photographs (3) Photography (2) Photos (1) Pia Shandel (1) Pianist (2) Piano Bars (1) Picasso (1) Picasso and the Masters (1) Pick up Lines (1) Pierce Brosnan (1) Pierre Elliot Trudeau (1) Piffle (1) Piggy Sheriff (1) Pigs (6) Pike Long Beach (1) Pimples (1) Pink (1) Pink's (1) Pinky Vodka (1) piracy (1) pirated software (3) pirt (4) Pit Bull (1) Placenta Wrinkle cream (1) Plagerism (2) Plain Janes (1) Plaintiff Liaison Counsel (1) Plan 9 from Outer Space (1) plants (1) Plastic Surgery (5) Play (2) Play Ball (3) Playboy (1) Playboy Bunny (1) Playboy Magazine (1) Playboy Models (1) Players Club (1) Pledge This (1) Plot Thickens (1) Podcast (1) Poetry (23) Poetry Snap (1) pogo was right (2) pogowasright (4) point of compromise (1) Poison (3) Poker (3) Polar Bears (1) Pole Dancing (1) Police Academy (1) Police Harassment (1) Police Harassment in Las Vegas (1) Police Officers (3) Police State (1) polish organized crime (1) Polite Society (1) Political Advisors (1) political corruption (1) Political Fundraising (3) political polls (1) Political Pundits (1) Political Thriller (3) politics (2) Polling (2) Polls (1) polysomnography (1) Pooch Parade (1) Pooh (1) Pool Party (4) Pooper Scoopers (1) Poor Standards (1) Pop Charts (8) Pop Culture (195) Pop Diva (16) Pop Hits (6) Pop Icon (18) Pop Icons (8) Pop Idols (5) Pop Singer (3) Pop Singers (3) Pop Star (24) Pop Stars (5) Pop Tunes (1) Pop Vocalist (3) PopCulture (1) popular vote (1) popularity (2) Porn (3) porn sites (3) Pornification (1) pornography (1) Port-a-Pottie (1) Portia de Rossi (3) Portia DeRossi (2) Portraits (4) Posh Spice (4) Postal Clerks (1) postal money orders (1) postcards.org (1) Postmaster General (1) Pot (1) Pot Dispensaries (3) Pot of Gold (1) potty mouth (2) Poverty (3) Pow wow (1) Power (2) power grid (1) power grids (1) PR (2) Prayers (2) Preamble (1) Precepts (1) Precious Moments (1) predators (1) Pregnancy (2) Premiere (4) prenuptial agreements (2) prepaid debit cards (1) Prescription (2) Prescription Drugs (7) President (1) President Barack Obama (71) President Bush (1) President Lyndon Johnson (1) President Obama (12) Presidential Candidate (3) Presidential look (1) Presidents (1) Press (1) pretexting (1) price gouging (3) Pride (1) Pride in One's Work (1) Priests of High Fashion (1) Prim (1) Prima Donna (2) Prince (8) Prince Harry (7) Prince of Pop (1) Prince William (17) Princess Yasmin Aly Khan (1) Prism (1) Pritzker Architectural Prize (2) Privacy (1) privacy friendly (1) Privacy Issues (1) Privacy Laws (2) Privacy Rights (1) privacy rights clearinghouse (8) Private Investigator (1) Prive (1) Prix de l'Arc de Triomphe (1) Producers (1) product recalls (1) Profane Love (1) Professional Liars (1) Professor (1) Professor Gates (1) Profile of Judge Fisher (1) Profile of Judge Judith C. Chirlin (1) Profile of Presiding Judge Robert Parkin Los Angeles Superior Court (1) Prohibition (1) project chanology (1) Project Runway (3) project safe childhood (1) Prom Night in Mississippi (1) Promises (1) Promotion (3) Promotions (1) Prop 215 (2) Prop 8 (12) Prop 8 Protests (7) property crimes (1) property flipping (2) propertyroom.com (1) Prophet (2) Propofol (1) Proposition 8 (18) Propositon 8 (1) Prose (17) prostitutes (1) prostitution (1) Prostrate Health (2) protection (1) Protest (2) Protesters (2) Protestors (4) Protests (6) Proud (1) Proud to be Democrat (1) Provisions (1) Provocative Poses (1) prying1 (1) psychic bond (2) Psycho (1) Publc Enemies (1) public records (1) Public Relations (1) public safety (1) Public Transportation (7) Publicity (4) Publicity Photos (1) Publicity Stills (1) Publishing (1) pump and dump (1) pump bandits (1) Pump it Yourself (1) Pump your Own (1) pundits (2) Punk (3) Punked (1) Puppetry (2) puppy scams (1) Pure of Heart (2) Purple Rain (3) Purveyors (1) push polling (1) Push-Button House (1) Qotes (1) Quakers (1) quatloos.com (1) Quebec (1) Quebecois (1) Queen (3) Queen Elizabeth II (12) Queen of Blogs (1) Queer Eye Guy Chef (1) Queer Traffic Sign (1) Quentin Tarantino (8) questionable ethics (1) Quin Hillyer (1) Quote (17) Quote of Day (2) Quote of the day (4) quotes (12) quotes of Julian Ayrs (1) r lee ermey (1) R.I.P. (13) Race (2) Racial Profiling (4) Racial Slurs (1) racism (11) Racist (2) Radio Disc Jockey (2) Radio Show (1) Radio Stations (1) Radio Talk Shows (3) Raelyn Campbell (1) Rage (1) Rainbow Power (1) Rainn Wilson (2) Rally (2) Rally for Kids with Cancer Scavenger Cup (2) Rally to raise funds (1) Ralph Lauren (2) Ralph Waldo Emerson (2) Randolph Duke (1) Rank (1) Rap Music (2) Rape (10) Rapid7 (1) Rapper (1) Raquel Welch (1) Rat Pack (2) Ratings (4) Ray Bolger (1) Raymond Nasher (1) RBS WorldPay (1) RCMP (1) real estate (1) Real People (1) reality (2) Reality Shows (10) Reality TV (5) Receiving (1) Recession (1) Recording Studio (1) Red Carpet (22) Red Carpet Event (6) Red Carpet Gala (3) Red Carpet Premiere (2) Red Carpet Premieres (2) red cross (1) Red Rock Casino (1) redirection (1) Redmond O'Neil (1) Reefer Madness (2) Reese Witherspoon (1) Reflection (4) Reflections (1) refund anticipation loans (2) refund fraud (6) refund systems (2) Regency Theatres (2) Regent Theatre (1) Regrets (1) Regulatory Compliance (1) Rehab (18) Rehearsal footage (1) Reincarnation (2) Relationships (5) Relay Races (1) religion (2) Religious Rights (1) Renaissance Art (1) Renaissance Hotel (1) Rendezvous (1) Renovated (1) Renovations (2) Repair (1) Representative Edward J. Markey (1) Representative Joe Wilson (1) Republican (10) Republican Convention (1) Republican Party (1) Republicans (14) Research library (1) reshipping scams (3) Residue (1) Resort Fees (4) Restaline (1) Restaurants (3) Restrictions (1) resveratrol (1) resveratrol ultra (1) retail crime (1) retail refund fraud (4) Retail Sales (2) retail security (1) Retail Stores (3) Retaliation (1) Retin A (1) Retirement (2) Revelations (1) Reverend Horton Heat (1) Review Journal (1) Reviews (1) Revolutioanaries (1) Revolution (2) Revolver (2) Rex Reed (1) RFID (4) Rian Johnson (2) Ric Wake (1) Rich Media (1) Richard and Annette Bloch (1) Richard Chamberlain (1) Richard Raddon (1) Ricky Martin (6) Ridley Scott (2) Right (1) Right to work State (1) Right Wing conspiracy (1) Rights Violations (4) Rihanna (2) rila (2) Ringo Starr (1) Rinko Kikuchi (1) Rio Casino (1) Rio Hotel (1) Rip Off (7) Rip-off Prices (1) Rita Hayworth (1) Rita Wilson (1) Rite Aid (1) Ritual (1) Ritz-Carlton Golf Club (1) Riviera (3) Road Hazard (1) Robert Benton (1) Robert DeNiro (2) Robert Downey Jr (5) Robert Duvall (1) Robert M. Cowan (1) Robert M. Knight (1) robert maynard jr. (5) robert morgenthau (1) Robert Pattinson (22) Robert Redford (2) Robert Siegel (1) Robert Soloway (1) Robert Towne (1) Robert Wright (1) Robertson Boulevard (1) Robin Laudanski (1) Robin Wright Penn (1) Robson Square (1) Robyn Gibson (1) Rochdale College (3) Rock 'n Roll Hall of Fame (7) Rock and Roll (5) Rock Bands (1) Rock Hudson (1) Rock Music (1) Rock Musical (1) Rock n Roll (4) Rock Phish (1) Rock Prophecies (2) Rock Slyde (2) Rock Wall (1) rock+phish (1) Rocket Norton (1) rockphishing (1) Rocky Horror Picture Show (1) Rodeo Drive (5) Roger Ebert (2) Roger Vadim (1) Rogue Cops (9) rogue trader (1) Rolling Stones (2) Rolls Royce (1) Roman Polanski (17) romance (16) Romance Genre (7) romance scams (11) romanian organized crime (4) romanian+organized+crime (1) Romantic Languages (1) Rome (1) Ronald McDonald (1) Ronald Reagan (1) Ronald Reagan Bldg. (1) Ronald Reagan Building (1) Rooftop Gardens (1) Rose Garden (2) Rosemary Poll (1) Rosemary's Baby (3) Rosencrantz and Guildenstern are Undead (1) Ross Stores (1) Rossie Grose (1) Route 66 (2) router (1) Royal Charges (5) rsa+security (1) RSVP (1) Ru Paul (1) Ruby Red Slippers (2) ruby tuesday (1) Rudi Gernreich (1) Rudolph Valentino (3) Rudy Giuliani (1) Rum (1) Rum Jungle (1) rumor (1) Runway (1) rush limbaugh (2) Russel Crowe (2) Russell Crowe (4) Russia (2) russian organized crime (3) Ryan Gosling (1) Ryan O'Neil (1) Ryan Seacrest (26) S.L.A.T.E. (1) Saba Shirazi (2) Sacred (1) Safe Sax (1) safe surfing (1) Safeway (10) SAG (5) SAG Commercial Contracts (1) SAG/AFTRA Commercial Negotiating Committee (1) Sage (1) Sages (1) Sahara Hotel and Casino (3) Sal Mineo (1) Sales (2) Salvador Dali (2) Salvation (2) Sam Spade (1) Same-Sex Marriage (7) Same-Sex Marriages (3) Same-Sex Unions (1) Samuel Taylor Coleridge (1) San Francisco (1) San Andreas Fault (3) San Andreas Fault The Tattler (5) San Diego (6) San Diego Film Festival (1) San Francisco (215) San Francisco Chronicle (1) San Francisco Main Library (2) San Francisco Police Department (2) Sandra Bernhard (1) Sandra Bullock (5) Sandra Day O'Connor (1) Sandy St. Peters (1) sans (3) Santa Claus (3) Santa Clause (3) Santa Monica (5) Santa Monica Blvd (3) Santa Monica Boulevard (1) Santa Monica Pier (2) sara carter (1) Sarah Jessica Parker (3) Sarah Palin (31) sarbanes oxley (1) Saturday Night Live (5) Savannah Sears (1) Save America (1) Save the Alpacas (1) Save the Planet (1) Sax Player (1) Saxophone Player (1) Say What? (2) Scam (1) scam+telemarketing (1) scambusters (1) scams (25) scamwarners (1) Scandal (25) Scandals (6) scareware (2) scholarship fraud (1) School of Visual Arts (1) Schwarzenegger smokes joint (1) Sci Fi Magazine (1) Sci-Fi thriller (1) Scientology (2) SciFi (1) Scott Rosenbaum (1) Scott Thorson (1) Scotty Alexander (1) Screen Actors Guild (3) Screenplay (2) Scriptures (2) Sculpture (1) Scuttlebutt (2) sean hannity (1) Sean Penn (3) sears (2) Seattle Coffee Giant (2) second chance eBay scam (1) Secret Admirer (1) Secret Service (5) secret shopper scam (2) secret shopper scams (7) Secretary of State (1) security (8) Security Guards (2) security incite (1) Security Issues at Binions Casino (1) security software (1) Sedative (1) Seeds of Time (1) Seinfeld (1) Self Discovery (1) Selling the Presidency (2) Senate House Dinner (1) Senator (1) senator chuck grassley (1) Senator Dianne Feinstein (1) Senator Edward Kennedy (2) senator feinstein (1) Senator Leahy (1) senior citizens (1) Senior Moment (1) September 12 (2) September 15 (1) September 16 (1) September 18 (2) September 19 (1) September 3 (1) September 9 2009 (1) Seraphine (1) Sergeant Dennis O'Connor (2) Sergeant Pepper's Lonely Hearts Club Band (1) Seth Ciferri (1) Settlement (1) Settlers (1) Sewage (1) sex (3) Sex fans (1) Sex Addicts (3) Sex and the City (2) Sex appeal (6) Sex Change Operation (2) sex changes (1) Sex Chronicles (4) Sex Education (3) Sex Stimulant (1) Sex Symbol (1) Sex Trade (1) Sexpot (1) Sexual Abuse (7) Sexual Identity (6) Sexual persuasion (1) Sexual Tease (1) Sexual Violence (10) Sexy (2) Sexy Back (1) Sexy Link (1) Sexy Male Models (1) Sexy Pubes (1) Sexy Underwear (1) sf chronicle (1) Sh** for Brains (1) Shannon Tweed (8) Shaq O'Neal (2) Shaq Vs. Michael Phelps (1) Share This (1) Shared Information (1) Sharing Info (1) Sharon Tate (6) Sharyl Attkisson (1) Shaun of the Dead (1) Shawari (1) Shell (2) Shelter (2) Shelters (1) Sheriff Baca (1) Shirley Chisholm (1) shoe (1) Shoes for the Stars (1) shoplifting (10) Shoppers (2) Shopping (7) Short Film Genre (1) Short Films (9) Shoshana Bean (1) Show (1) Show Biz (3) Shrimp Cocktail (1) Shrine Auditorium (1) Si (1) Siblings (2) SiCKO (1) Siddhartha (1) Siegfried and Roy (1) Sierra Leone (1) Sigmund Freud (2) Signs from God (1) SIIA (1) silaconfidence (1) Silence is Golden (1) Silent Auction (2) Silk (1) Silver Lake (1) Simon Beaufor (1) Simon Beaufoy (1) Simon Cowell (22) Simpsons (1) Sin City (9) Singapore (1) Singing (1) Sir Paul McCartney (1) SIRAS (4) Siren (1) Sissy (1) SITE (1) Sitting on fence (1) Six Pack (1) Sixties Activists (1) Sketching (1) skimming (11) skimming devices (3) Skin (3) Skin care (1) Skin care Products (2) Skin Flicks (1) Skin Lesions (1) Skin Peel (1) Skirts for Men (1) Skulduggery (1) Skype (1) Slasher (1) Slasher Movies (1) slave labor (1) Slave Trade (2) Slaves (1) Sleep Apnea (1) Sleep Disorders (2) Sleeping Disorders (1) Sleight of Hand (1) Slick Willy (2) Sloppy Seconds (1) Slot Machines (2) Slow Burn (1) Slumdog Millionaire (3) Slush Fund (1) smart phones (2) Smile (1) Smokey Robinson (1) smuggling (1) Snack Foods (2) sniffer packet (1) sniffing (1) Snobbery (1) Snobbles the Great (1) Snobs (2) Snort (1) Snotty Cashiers (3) Snotty Managers (1) Snow (2) So you think you can dance (2) Soccer (4) Soccer Stud (1) Social Climbers (6) Social Commentary (2) Social Drinking (1) social engineering (17) social hub (2) social hub network (2) Social Hubs (1) social injustice (2) Social Network (4) social networking (1) Social Networking Hub (1) Social Security (4) social security administration (3) social+networking (1) Societe Generale (2) Society (1) software piracy (4) Solar Energy (1) Sold Out (1) Sold Out Concert (1) Some Like it Hot (1) Sonia Sotomayor (1) Sonny and Cher (4) Sonny and Cher Show (1) Sonny Bono (2) Sony (3) Sony Classic Pictures (1) Sony Pictures Release (1) sophos (2) SOS (1) Sotomayor (1) Soul Mates (1) souls (1) South Africa (1) southern california fires (1) Spain (3) spam (39) spam agent (1) spam filters (4) spamhaus (1) spammers (2) spamming (1) Spanish (2) spanish prisoner (1) Spark of Life (1) spca (1) Speaking in tongues (1) spear phishing (7) special interests (3) Special Olympics (1) Special Room Rates (2) Special Status (1) speculators (2) Speech (4) Speeches (1) speedo (1) Speedway (1) Spell Check (1) spies (2) Spirit (1) Spiritual Leader (3) Spiritual Quotes (1) Spiritual Way (1) Spirituality (6) spoiled students (1) Spokesperson (2) spoofed websites (2) spoofing (9) Sports (17) Sports Illustrated (33) Spotlight (2) Spousal Support (1) Spring 2009 (1) Spring 2010 (1) Spring Break (1) Spring Menswear 2009 (1) sprinkles (1) Spy Thriller (4) spybot (1) spying (2) spyware (7) sri lanka (1) SSL (1) St. Francis Hotel (3) St. Mark's Square (1) St. Nick (1) St. Patrick's Day (5) Stage Performance (4) Stage Performances (4) Stage Production (1) Stage Productions (1) stalactites (1) Stale Rolls (1) Stalkers (2) stalking (2) Stand up Comics (4) stanford university (1) Staples Centre Memorial Service (5) Star Search (3) Star Trek (3) Star-crossed lovers (2) Starbucks (14) Stargate Universe (1) Starlet (6) State Attorney General (2) State Budget Fiasco (1) State of California (1) State Troopers (1) Station in life (1) statistics (1) Stats (1) Steadman (1) Steely Hard Sword (1) Stephanie Meyer (1) Stephen Baldwin (1) Stephen Hawkins (1) Sterling Hotel (1) Steve Harper (1) Steve Jobs (1) Steve Lopez (2) Steve Martin (1) steve swoda (2) Steve Wynn (7) Steven A. Soloway (1) Steven Spielberg (3) Stick up Butt (1) stimulus (1) Stimulus Package (1) Stink (1) stock market (2) stocks (1) stolen (1) stolen goods (1) stolen laptops (1) stop and shop (2) stopbadware.org (1) storm botnet (1) storm worm (2) Strangers (1) straw buyer (1) straw buying (1) Stray cat blues (1) Street Art (2) Street Enforcer (1) Street Legal (1) Street Performers (3) Strike (3) Stroke (1) Strutters Ball (1) Student Islamic Group of India (1) Studios (1) Studs (2) stuffy nose (2) Stupidity (1) Stuttering (1) Style (19) Style maven (1) suad leija (18) Submarine Dude (1) Submarine Sandwiches (1) Submissions (2) Suburban Housewives (1) Subway (5) Sugar Hangover (1) Suicide (2) Suits in Women's Wear (2) Summer (3) Summer Camp (3) Summer of 1969 (1) Summit Entertainment (1) Sun (1) Sun Block (1) sunbelt (1) sunbelt blog (6) Sunburn (1) Sundance (2) Sundance Film Festival (1) Sunscreen (1) Sunset Boulevard (2) Super Bowl (6) Superbowl (1) Superficial (1) Superhero (1) Superior Intellect (1) supervalu (1) Supreme Court (8) Supreme Court Justice (1) Supreme Court Nominee (2) Surf (1) Survival in Wilderness (1) Sushi (1) suspect (1) Suspect X (2) Suspense Thriller (2) Suzy Amis-Cameron (1) Swan Song (1) Sweat (1) sweepstakes scams (2) Sweet Bird of Youth (4) Sweetening (1) swift raids (1) Swim Competition (1) Swimmer's Build (3) Swimming Laps (2) Swimming lessons from Michael Phelps (1) Swimsuit Sale (1) Swine Flu (1) Swiss Alps (1) Swiss Authorities (4) Switzerland (1) Sword Play (1) symantec (22) symantec spam report (2) Symbol (1) Symbolism (1) Synonyms (1) synthetic identity theft (5) T Shirt Contest (1) t-shirt sale (1) T-shirts (1) T. Eaton (1) T. Griffin (1) Tabloid news (1) Tabloids (1) Tacky (1) Taipei Economic and Cultural Office (1) Taiwan Films (1) Take Law into own hands (1) take-out celebrity (1) Taken (1) Tal Sheyne (1) Talent (3) Talent is Talent (1) Tales of the City (4) Talk Show (4) Talk Show Host (14) Talk Shows (4) tamil tigers (1) Tantrums (1) Tanya Wright (1) Tao (5) Tao Beach (2) target (1) Taryn Manning (1) Tattler (1) Tattoo Artists (2) Tattoo Hollywood (1) Tattooed Under Fire (1) Tattoos (5) Tax Evasion (1) tax fraud (7) tax refund fraud (1) tax season scams (2) tax stimulus checks (1) tax+fraud (1) Taxi (1) taxpayer advocate (1) Taxpayers' Money Wasted (1) Teach (1) Teacher (1) Teaching (2) technical experts (1) Technology (3) Technorati (1) ted stevens (2) Teddy (1) Tee (1) Teen Awards 2009 (1) Teen Choice Awards (3) Teenagers (11) Tela Sofa (1) telecom fraud (2) telemarketing fraud (2) Teleplay (1) Tell alls (2) Temblors (1) Ten Percenters (1) Tent (1) tepes (1) Tequila Fest (1) Terminator Franchise (1) Terrorism (30) Terrorist (2) terrorist funding (3) Terrorists (3) Tesla coil (1) Testicles (1) Testicular Cancer (1) Texas (6) Texas Avery Animation Award (1) Texas Avery Award (1) Texas Star Award (2) Texasville (2) Text Messages (1) Thanksgiving (2) That's yes (1) THC (1) The Tattler (2) The Abbey (6) The Advocate (1) The American Institute of Wine and Food (1) The Arts (1) The Bangles (1) The Bear (1) The Beatles (6) The Big Apple (1) The Big Fan (1) The Big Lebowski (7) the big one (1) The Blob (1) The Bomb (1) The Burning Plain (2) The Chefsters (1) The Clash (1) The Cove (2) the Daily Planet (8) The Daily Planet. (1) The Dark Side (1) The Doors (3) The Ellen DeGeneres Show (6) The Ellen Show (2) the Environment (2) The Factory (1) The Forum (1) The Geffen Playhouse (2) The Ginger Girls (1) The Globe (1) The Godfather (2) The Great Buck Howard (1) The Great Gatsby (2) The Green Film (1) The Grove (11) The History of Violence (1) The Hot Peaches (1) The Hurt Locker (9) The In Crowd (1) The Insider (1) The Joint (1) The Killers (2) The Last Picture Show (1) The Lion King (2) The Lives of Others (1) The Living Dead (1) The Maid did it (1) the male animal (1) The Miracles (2) The Monkees (1) The Oscars (9) The Osmonds (1) The Other Side of Paradise (1) The Palace (1) The Palazzo (1) The Past (1) The Pearl (1) The Perfect Age of Rock 'N' Roll (1) The Plaza Hotel (5) the pragmatic cso (1) The Price is Right (1) the Province (1) The Quavers (1) The Rat Pack (1) The Right Thing To Do (1) The Rio (1) The Road Warrior (1) The Rocker (1) the Rose (1) The Tatter (12) The Tattler (2015) The Tattler Animal Rights Activists (1) The Tattler Julian's Blog (1) The Ting Tings (2) The Trevor Project (1) The Trinity (2) The Troubadour (1) The Venetian (4) The View (5) Theatre (3) Theatrical Agents (1) Theft (5) There is a Mountain (1) things Lebowski (1) Thirst (3) This is it (1) thong (1) Thought for the Day (1) Thoughtless cruel conduct (1) Threats (2) Thriller (7) Tibet (2) ticket purchases (1) Tickets (4) Tiger Woods (8) Tilda Swinton (2) Time Magazine (1) Time Twins (1) Time Warner (1) tina (1) Tinsel Town (1) Tinseltown (2) Tipper Gore (2) tips (1) Tirade (1) Tire changing (1) Titantic (1) tjx (4) TJX breach (2) tjx data breach (8) TMZ (28) Toasting surcharge (1) tobacco smuggling (1) Toby Froud (1) Today Show (1) todd davis (6) Token Lesbian (1) Tolerance (1) Toll Bridges (1) Tom Arnold (1) Tom Brady (2) Tom Cruise (6) Tom Fragala (12) Tom Hanks (2) TOM online (1) Tom Shu-Yu Lin (1) Tom Waits (1) Tommy Hilfiger (2) Tommy Lee (1) Tonight Show (6) Tony Danza (1) Tony Hamilton (2) Tony Stewart (1) too good to be true (10) Tootie and the Lip Girls (1) Top Ratings (2) Tori Spelling (2) Toronto (12) Toronto International Film Festival (1) Torture (2) Tourist Attractions (11) Tourist Trap (1) Tours (2) Town Hall Meeting (2) toxic (1) Toyo Miyatake (1) Toyo's Camera (1) Toys (5) TOYS R Us (1) Traces (1) Tracey Ullman (1) trading (1) Traffic Tickets (1) Trailer (1) Train Master (1) Training (1) Training Manuals (1) Trainmaster (1) Trans Fats (1) Trans Union (1) Transexual (1) Transformation (2) Transgenders (2) transparency (2) Transsexuals (1) transunion (1) Transvestite (1) Trash (1) Trash or Treasure (1) Travel (8) travelers cheques (1) Trazzler (1) treasury department (1) Treatment (2) trends (3) Trendy West Hollywood (9) Trendy Yogurt (2) triads (1) Trial (1) Tribeca Film Festival (2) Tribute to Hope (1) Tricky Dick (1) Tripping up (1) trojan (8) trojan horse (1) trojans (3) Tropicana (7) truisms (4) trust (5) Trust in the Lord (1) Trusted ID (2) Truston Identity Theft Services (10) Trustwave (1) Truth Hurts (1) Truthfulnesss (1) Truths (1) Trysts (1) TSA (2) Tucker Carlson (1) Tucker Sears (1) Turkey (2) Tuscany (2) Tuxedo Jackets (1) TV and Film Contracts (1) TV sitcoms (6) TV Talk Show Hosts (2) Tweaking (1) tweet (17) tweets (15) Twilight (29) Twitter (51) Twitter Escape (2) Twitter for Prizes (1) Twittering (1) TXU (1) Tyler Don Bryant (1) Tyra Banks (1) Tyra Richards (1) Tyrone Power (1) Tyson Documentary (1) Tze Chun (2) U.K. Release (1) U.S. Attorney General (2) U.S. Census (3) U.S. Competitions (4) U.S. Congress (3) U.S. Constitution (3) U.S. District Court (1) U.S. DOJ (1) U.S. Government (1) U.S. Immigration and Naturalization Service (27) U.S. Imperialist occupation (1) U.S. military (1) U.S. Post Office (2) U.S. Postal Inspectors (1) U.S. Postal Service (3) U.S. President (2) U.S. Presidents (2) U.S. Supreme Court (5) U.S. Tour (1) U.S. Troops (2) U.S. Voters (1) UC Irvine (1) UCLA (10) UCLA Cafeteria (1) UCLA Emergency Room (1) UCLA Medical Center (2) UCLA Medical Facility (1) ulian Ayrs (3) Ulterior Motives (1) Ultra Choice Awards (1) Ultrascan Advanced Global Investigations (1) Ultraviolet Rays (2) Unauthorized Telephone Charges (1) Uncle Sam (1) Underwear ads (1) Underwear Model (1) Unemployment (1) Union (1) Union Dues (1) Unions (1) Unisex (1) United Nations World Food Program (2) Universal Music Group (2) Universal Studios (2) University of Nevada (1) Universtity of Toronto (1) Unlawful Arrest (1) Unlawful Detainment (1) UNLV (1) Unprecedented (1) Unpresidential (1) unsecured borders (1) Unzipped (1) Updated Technology (1) Updates (1) Upstairs Downstairs (2) Urban Cowboy (1) urban legend (1) Urban Terrorism (1) Urinals (2) US Open (1) USCIS (1) USPIS (6) usss (5) Utah (2) utility fraud (1) V.B.S. (1) Val Kilmer (1) valentine (1) Valentine's Day (6) Valentino: the Last Emperor (1) Valet (1) Vampire (4) Vampires (10) Vancouver (4) Vancouver BC (7) Vanessa Redgrave (1) Vanity Fair (3) Variety (1) Vasarely (1) Vegas Entertainment (1) Vegas PBS (1) Vegetarian (1) Veggie Lite Sub (1) Veiled Threats (1) verizon (1) Verizon Wireless (2) Versace (1) Vertigo (1) veteran's administration (1) VHI (2) Viagra (1) Vibrations (1) Vice President (2) Vice Squad (1) Victims (1) victims advocate (1) victims rights (1) Victor George Holyoak (3) Victor Holyoak (1) Victor Holyoak Violin (1) Victoria Beckham (2) video piracy (1) Videos (1) Vietnam (2) Viggo Mortensen (1) Vigilante (1) Vin Scully (1) Vince Neil Ink (2) Vincent Price (2) Vine Street (2) Vintage (1) Vioxx (3) Vioxx Settlement Scam (1) VIP Followers rip-off (1) VIP Tickets (1) Virgin Mary (3) Virgin Mary of Guadalupe (1) Virgin Mobile (1) virtual kidnapping (1) Virtual Tours (1) virus (1) Visa (4) visa travelers cheque (1) vishing (16) Visionaries (3) Visitors (1) Vitamin Water (2) vlad (2) vlads (1) vladuz (6) Vogue (3) Voice-overs (2) VoIP (6) Volcano (1) Volunteers (2) Vons (2) voter fraud (3) Voters (1) Voting procedures (1) VP Joe Biden (1) Vulgarity (1) wacko employees (1) Wacko Festival Staffers (1) Wacko Web Surfers (1) Wagga Wagga (1) Wah Wah (1) Wake (1) wal-mart (1) Walk of Fame (7) WALL E (1) wall of sound (1) Wall Street Journel (1) Wallflower (1) walmart (5) Walrus (1) Walt Disney (2) Wangfujing Julian Ayrs (1) Want (3) War Memorial (2) war-driving (2) wardriving (1) Wardrobe (3) Wardrobe Advice (1) wards (1) Warner Brothers (7) Warrantless searches (1) Wash Away Pain (1) Washed out (1) Washington (6) Washington Correspondent (1) Washington D.C. (2) Washington Post (1) washington times (1) waste (2) watch (1) Watchtower Challenge (1) Water Conservation (1) Water Shortage (1) Water Sports (1) Waterboarding (1) Wawa (1) Wayne Gretzky (1) Wayne Newton (5) Wealth (1) weapons of mass disruption (1) Web Content (4) Web Site (3) Web Sites (3) websense (5) Wedding (9) Weed (1) WEHO (9) welfare fraud (4) Wendy Greuel (1) Wenesday September 23 screenings (1) Werner Herzog (5) West Coast Intellectual (1) West Hollywood (20) West Hollywood City Council (1) West Hollywood Halloween Carnaval (1) West Hollywood Postal Office (1) West Hollywood Postal Station (1) West Hollywood Sheriff's Department (4) West Hollywood Sheriffs (1) West Hollywood Starbucks (1) West Virginia (1) Western Genre (1) Western Shirts (4) western union (2) Westerns (2) Westwood (5) Wet Dreams (1) Whack (1) Whales (3) Whaling (1) What People Think (1) Whatever Works (1) Whistle-blower (1) whistleblower (2) White on Rice (1) white collar crime (1) White Dudes (1) White House (19) White on Rice (2) White Party (1) White Trailer Trash (1) Whitney Houston (2) Whitney Houston (1) Who's the Boss (1) Whole Foods (1) Wholesome Entertainment (1) Whoopi Goldberg (1) WHY (1) Wi-Fi (1) Wild Life Preserves (1) Wildlife Protection (1) will.i.am (1) William Clinton Foundation (1) William Drayton (1) William Forsythe (1) William Holden (1) william jefferson (2) william sullivan (2) Willie Mays (2) Wilshire Records (1) Wimping Out (1) Window Display (2) Window Dressing (2) Windows Genuine Advantage (1) Winds of Plague (1) Winds of September (1) Wine (2) Wine Sampling (1) Winners (1) Winning Ticket (1) Winona Ryder (1) wire transfer fraud (5) wire transfer+fraud (1) wired news (1) wireless connection (1) wireless technology (1) Wiretapping (1) Wisdom (7) Wish-Fulfilling Goddess (1) Wishy Washy (1) Wizard of Oz (2) Wizardry (1) Women (1) Women's Wear Daily (3) Woody Allen (2) Word of God (1) WordPress (6) work at home scams (1) Work Out Videos (4) work-at-home scams (7) workmen's comp fraud (1) World Apology Tour (2) World Championships (4) World Dance Movement (1) World Health Day (1) World Heavyweight Champion (1) World Largest Tattoo Convention (1) World Peace (1) World Plagues (1) World Politics (1) world privacy forum (3) World Series of Poker (1) World Trade Center (1) World War II (3) worldwide cooperation (1) worm (3) Worst Movie of Year (1) worst quotes (1) Wrath of God (1) Wrinkles (2) Wrinkly Old White Men (3) www.alertaenlinea.gov (1) www.ic3.gov (1) www.texasfightsidentitytheft.org (1) Wynn Resorts (5) xerox (1) xynoMedia Technology (1) Yachts (1) Yahweh (2) Yamgata Scream (1) Yanni (1) Yanni Voices (1) Yawn (1) Yellow Pages (1) Ying Yang (1) YMCA (1) YMCA After School All Stars (1) Yogurt Stop (1) Yoko Ono (9) York Street (1) You are my Sunshine (1) You Lie (1) you're fired (1) Young and Restless (1) Youth (2) Youth demographic (2) youtube (3) Yuugo Kanno (1) Yuval Ben-Itzhak (1) Yves Saint Laurent (1) Zaha Hadid (1) Zak Efron (3) Zane (1) zango (1) zapchast trojan (1) Zen (2) Zeppo's (1) zeus trojan (1) Zip Code 90069 (1) zombie computers (4) Zombie Movies (1) zombies (7) Zsa Zsa Gabor (7) zuftikar ramzan (1) Zulfikar Ramzam (1) Zulfikar Ramzan (1)