2014 FEBRUARY-APRIL Leon County Sheriff’s Office A publication of the Leon County Sheriff’s Office e b m e nu n o ph LCSO w e N for r 300 -3 6 0 )6 (850 New Year, New Number! In 2013, there were many changes that took place with respect to the Leon County Sheriff ’s Office Communications Section. All of Leon County is now under one consolidated dispatching entity housed at the Public Safety Complex off of Weems Road. This change has been a huge benefit for the citizens of our great Tallahassee community and has allowed the Leon County Sheriff ’s Office to serve individuals more quickly and provide more stream-lined assistance where and when it is needed most. With the change mentioned above, the Leon County Sheriff ’s Office has new telephone numbers. The new non-emergency number for the Leon County Sheriff ’s Office is 6063300. When you call this number, an operator will answer your call and ask you about the nature of your call and IN THIS ISSUE News from the SO................................page 2 FBI Child App.......................................page 3 Happy Holidays for Sick Children.. .......page 3 Thelma Thwartum....................................page 4 will forward you to the correct area or individual. After 7p.m. your call will automatically be forwarded to the Consolidated Dispatch Agency or C.D.A. If you call the C.D.A. at 6065800, you have a choice of who you would like to be dispatched to your call. If you would prefer a sheriff ’s deputy to be dispatched to you, please let the communications officer that you are speaking with know that you prefer a sheriff ’s deputy. Also, 9-1-1 is still the “go-to” number for emergencies, 24 hours a day, 7 days a week. E v e n though the number has changed, the Leon County Sheriff ’s Office is still offering the excellent community based law enforcement for all of Leon County and within the City of Tallahassee that we have been known forover the years Everyone here at the Leon County Sheriff ’s Office would like to thank you for your continued support and we wish everyone in the community a happy, healthy, safe and prosperous New Year. CCYS....................................................page 4 Cell Phones for Seniors........................page 5 Teen Driver Challenge..........................page 5 Bank Accout Breach.......................page 6 & 7 The Leon County Sheriff ’s Office needs your help in locating the following individuals, if you have information, please call 6063300. You may remain anonymous. See page 12 for additional wanted felons. Josember Portillo Hispanic Male DOB:01/23/1988 H: 6’01” W: 245 lbs Hair: Brown Eyes: Brown Failure to Appear, Possession of Child Pornography x 2, Possession with Intent to Promote Child Pornography William Nealy Black Male DOB: 04/04/1982 H: 5’08” W: 1757lbs Hair: Black Eyes: Brown Criminal use of ID, Grand theft x 2, uttering, Burglery of Structure x 2, Petit theft, Damage property-criminal mischief WANTED as of 2/4/2014 LCSO Adventure Camp.........................page 8 Sexual Predators..................................page 9 Kid’s Page..........................................page 11 Wanted Felons...................................page 12 2 2014 FEBRUARY-APRIL News From The Sheriff ’s Office More GOLD for the Pistol Team Deputies & K9 The ExplorKoda Honored er Pistol Team traveled to Wilmore By Purple Heart Kentucky on Saturday November Association 2nd to compete in the Scholastic Pistol Program (SPP) Regional Championships, hosted by the University of Kentucky Shooting Team. Our folks competed in the .22 Rimfire Senior Division taking First Place. The team is coached by Deputies Dustin Brock and Tom Stege. The shooters are Mason Reeves( Leon High Junior) , Chris Andrade (TCC), Jose Sanabria (ITT)and Michael Brigance (Home schooled Sophomore). They competed against teams from Michi- L-R Dep. Tyler Epstein, Sgt. Mike Reeves, Sheriff gan, Illinois, Kentucky, Tennessee and Florida. This is our team’s fourth com- Larry Campbell, Not pictured Dep. Ronn McMullen petition since forming and bringing home the gold each time. In October, at the Citizens Academy Graduation, Deputy Ronn McMullen, Deputy Tyler EpLeon County Sheriff ’s Explorer Post #15 gave back this Thanksgiving, by stein, Sergeant Mike Reeves and K9 contributing 20 turkeys to our senior citizens in Leon County who are in need. The Koda were recognized by the Naturkeys were directly given to recipients that were chosen by Good News Out- tional Military Order of the Purple reach Ministries. In addition to the turkeys, a box full of green beans, canned Heart Association Local Chapter cranberry, yams, stuffing, boxed mashed potatoes and gravy were also given 758, MOPH for their achievements to recipients. This community outreach helped support our seniors who may and sacrifices made in the line of duty. Deputy Ronn McMullen was not otherwise enjoy a delicious Thanksgiving meal. The Explorers made their presented with a brass statuette of deliveries on Tuesday November 26th to the Miccosukee Hills Apartments. K9 Koda by the Purple Heart AssoAll the citizens were happy to receive the Thanksgiving boxes along with a ciation. K9 Koda was killed in the special visit from line of duty this year while in serthe Leon County vice during a search for an armed Sheriff ’s Office and dangerous felon that was Explorer Post wanted for murder. Commander members. Way to Mike Ford of Purple Heart Association Local Chapter 758, MOPH and go Explorers on Purple Heart Association member making a brighter Dennis Foggy were on hand to holiday for these present the awards. folks! Explorers Community Support Initiative Crime Watch Publisher:Sheriff Larry Campbell Managing Editors:Capt. Jimmy Williams Lt. Nancy Burns Editor: Paige Forshay Safe Circulation:Dep. Tim Randolph & Dep. Jessica Ikner Crime Watch is published in February, May, August & November. Articles of interest are welcome. Publication of submitted materials are subject to review & space availibility. Article deadline is the tenth day of the month prior to the month of publication. Send articles, letters or suggestions to: Crime Watch c/o Leon County Sheriff ’s Office Post Office Box 727 Tallahassee, Florida 32302-0727 Telephone: (850) 606-3250 Fax: (850) 606-3252 Internet: www.leoncountyso.com E-mail: lcsocpu@leoncountyfl.gov 3 2014 FEBRUARY-APRIL in Your Hands You’re shopping at the mall with your children when one of them suddenly disappears. A quick search of the nearby area is unsuccessful. What do you do? Now there’s a free new tool from the FBI that can help. Our just launched Child ID app—the first mobile application created by the FBI—provides a convenient place to electronically store photos and vital information about your children so that it’s literally right at hand if you need it. You can show the pictures and provide physical identifiers such as height and weight to security or police officers on the spot. Using a special tab on the app, you can also quickly and easily e-mail the information to authorities with a few clicks. The app also includes tips on keeping children safe as well as specific guidance on what to do in those first few crucial hours after a child goes missing. We encourage you to share the word about this app with family and friends, especially during upcoming activities in your communities to raise awareness on crime and drug prevention. For its part, the FBI is working to publicize the app with the American Football Coaches Association (AFCA)—its long-time partner in the National Child Identification Program, which provides a physical kit to gather your child’s pictures, fingerprints, personal characteristics, and even DNA to keep with you in case of emergency. The AFCA is producing a public service announcement about the app and will spread the word at various football games during the upcoming season. Right now, the Child ID app is only available for use on iPhones and can only be downloaded for free from the App Store on iTunes, but we plan to expand this tool to other types of mobile devices in the near future. And we’ll be adding new features—including the ability to upload other photos stored on your smart phone—in the coming weeks and months. An important note: the FBI (and iTunes for that matter) is not collecting or storing any photos or information that you enter in the app. All data resides solely on your mobile device unless you need to send it to authorities. Please read your mobile provider’s terms of service for information about the security of applications stored on your device. Put your child’s safety in your own hands. Download the FBI’s Child ID app today. Source: www.FBI.gov Happier Holiday For Sick Children The holiday season got a little brighter for local children hospitalized at Tallahassee Memorial Hospital as the Leon County Sheriff ’s Office annual teddy bear event got underway. The Victim’s Advocate Unit organizes the event each year. There were several Sheriff ’s Office representatives from the jail, records, uniform patrol and the reserve unit to help spread the good cheer and a soft, cuddly teddy bear as well. This year there were thirty bears presented to the children. The bears were purchased from Kay Jewelers which benefitted the St. Jude’s Hospital for children. The Victim Advocate Unit also attended the Sheriff ’s Association Risk Management Fund event where they donated bears to the LCSO so that we could give them away to children at the Hope Community Center and the Salvation Army. Deputy Chad Holliday was in attendance and provided his support during the event. Thanks to everyone for making the event a huge success. 4 2014 FEBRUARY-APRIL CCYS: Working For Kids & Families Capital City Youth Services programs, which date back to 1975, began by providing for the basic needs of runaway and homeless youth, ages 10-17. Once established as a private, nonprofit agency, Capital City Youth Services (CCYS) has grown to include a continuum of services for runaway, homeless, truant, ungovernable, and other at-risk youth and their families. Services offered include outreach and prevention in the community, short-term residential care, case management, counseling (individual, family and group), and aftercare. Our success has been and will continue to be, measured by the level of satisfaction from the community and our clients, and the ongoing health of the families we serve. Our mission is to promote the healthy development of youth and families. CCYS is a private, non-profit corporation, funded in part by United Way of the Big Bend, the Department of Juvenile Justice, Florida Department of Child and Family Services, Department of Education, Department of Health and Human Services, Leon County, City of Tallahassee, and private donations. CCYS is a member of the Florida Network of Youth and Family Services, Southeastern Network of Youth and Family Services, and the National Network for Youth. CCYS GUIDING PRINCIPLES •PARTNERSHIP•FAMILY: We are committed to keeping families together whenever possible and to strengthening family systems. •YOUTH DEVELOPMENT: We value young people as vital resources and partners in finding solutions to both personal and social problems. Therefore, we work to help cultivate youth’s strengths and value their uniqueness. •RESPECT: We value all people and treat them with appreciation as we consider their needs. •RECOGNIZE INDIVIDUAL’S UNIQUE STRENGTHS: We recognize the diversity of human beings and appreciate the unique strengths, abilities, and contributions each person has to offer. We act in ways that reflect mutual respect and strive to overcome barriers to genuine human connectedness. •AFFILIATES: We recognize the importance of building collaborative partnerships with youth, families, staff, governmental agencies, public and private organizations, and businesses in our communities. •STANDARDS: We are dedicated to ensuring the highest standards of practice within our programs and our organization. •KNOWLEDGEABLE: We seek continuous improvement in our understanding, skills, and knowledge of client needs. We use this evergrowing awareness in our efforts to meet our client’s needs. This commitment to seeking knowledge applies to each individual, as well as the agency as a whole. •FLEXIBLE: We adapt to meet the Please see “CCYS” on page 5 5 “CCYS” from page 4 changing needs of the youth, families, and communities we serve. •INTEGRITY: We act in ways that are in harmony with our mission. •STEWARDSHIP, ACCOUNTABILITY & RESPONSIBILITY: We take seriously our responsibility for the health and well-being of those under our care. •COMPASSION: We demonstrate genuine caring for the youth, families, and communities we serve. •COURAGE: We exhibit both personal and organizational courage in our work - we take a stand and do the right thing for youth and families, even when it’s difficult and/or unpopular. WHAT WE DO We are committed to helping families in the Big Bend area. When kids or their families have a problem, we are there to support, comfort, and empower our clients as they deal with life. We strive to understand a family’s specific needs, develop a plan, and then use our knowledge of local resources to help get things back on track. Capital City Youth Services offers counseling and outreach services to youth and their families, and emergency shelter services to youth in crisis. We serve youth and families throughout the Big Bend area of North Florida, including Leon, Gadsden, Wakulla, Franklin, Liberty, Jefferson, Madison and Taylor Counties. All services are free and confidential. All of our programs focus on reaching out and helping youth and families 2014 FEBRUARY-APRIL who have found themselves in situations beyond their control. Among the services CCYS provides are CINS/FINS services, which are funded by the Department of Juvenile Justice through the Florida Network of Youth and Family Services. CINS stands for “Child In Need of Services” and FINS stands for “Family In Need of Services”. These are interventions designed to address behaviors that put youth at risk for delinquency. Services are provided to every county in Florida by CCYS and similar agencies. CCYS provides services through our programs to the following groups of youth & families: •Runaway and homeless youth that are scared, hungry, tired, and want to get off the streets •Children and young adults (ages 1017) who may be physically or emotionally abused or neglected and need a safe place to go •Youth that are in emotional crisis and feel they cannot resolve problems with their parent(s) while living at home •Youth with problems that keep them from attending school (truant) •Youth and families who want help improving communication CCYS offers several different categories of services: •Someplace Else programs provide shelter for Youths ages 10-17 •Family Place programs provide counseling for youths, adults, and families •Safe Place programs provide outreach, education, and runaway prevention, as well as immediate help for youth in crisis •Going Places program provides outreach and immediate help for homeless youth •Transitional Living Program is Coming Soon! our responsibility for the health and well-being of those under our care. •COMPASSION: We demonstrate There caring are many that would genuine foritems the youth, famibe very to have on here lies, and helpful communities wehand serve. at CCYS. If you donate,both or know •COURAGE: Wecan exhibit persomeone who would like to donate sonal and organizational courage the-list email initems our on work webelow, take please a stand and us or call 850/576.6000. do the right thing for youth and HYGIENEeven SUPPLIES families, when it’s difficult •Toothpaste, toothbrushes, Combs, and/or unpopular. Brushes, Belts, Shampoo,Conditioner WHAT WE DO Body Wash, Bars of Soap, Deodorant We are committed to help(male and female), Clothing (t-shirts, ing families in the Big Bend area. jeans, sweatsuits, shorts), Socks When kids or their families have a (new), Underwear (assorted sizes problem, we (winter are there toorsupport, new), Jackets - new lightly comfort, and empower our clients used) asSHELTER they deal with life. We strive EQUIPMENT to•Water understand family’s specifi Fountain, aCommercial Stove/ c needs, develop a plan, and then use Oven, Large Chest Freezer, Comour knowledge of local mercial Vacuum, Bookresources Shelves,to help get things backTowels, on track. Comforters,Blankets, Pillows, Capital City Youth Services Sheets (Twin), New Fish Tank and offFish ers counseling and outreach services to SUPPLIES youth and their families, YOUTH •Artsemergency and Craftsshelter Supplies, Movieto and services Passes, Gift Cards (Movies, Fun youth in crisis. We serve youthStaand tion, Museums, Bookstores, families throughout the Big Mall, Bend Restaurants, Board including Games, area of Northetc.), Florida, Playing Cards, Personal Diaries, CerLeon, Gadsden, Wakulla, Franklin, tifi cates for Haircuts, CDs light rock, Liberty, Jefferson, Madison and jazz, classical Taylor Counties. All services are OUTDOOR RECREATION EQUIPMENT free and confi dential. All of our pro•Balls, Jump Ropes, Frisbees, Tennis grams focus on reaching out and racquets and balls, Exercise bike, helping youth and families who Volleyball Net and Ball have found themselves in situations beyond their control. VOLUNTEER OPPORTUNITIES Among the services CCYS Interested in stepping out of your provides are and CINS/FINS services, comfort zone reaching into the which are funded by the Departlife of a child? Even a few hours a ment Justice through week of canJuvenile turn a young person’s life the Florida Network of Youth and around. More comfortable helping Family Services. CINS stands with the administrative load or fund-for “Child NeedHave of aServices” and raisingIn events? special talent FINS stands for “Family In Need teaching crafts or playing an instru-of Services”. These opportunities are interventions ment? Volunteer exist designed to address behaviors that in these areas and many others. GIve put at risk for delinquency. us ayouth call at 576-6000. Services are provided to every How Can You Help? 6 2014 FEBRUARY-APRIL How Your Bank Account Information Is Breached Technology can be seen as both a blessing and a curse, especially when it comes to your money. Over the holiday season many individuals became victims of a “breach”. With so many different ways criminals can gain access to your financial information, you always have to stay informed on the lastest tactics to separate you from your money. The following is inforamtion to help you understand the nature of the “breach” and how you can best protect yourself. PHYSICAL BREACH A physical breach involves the physical theft of documents or equipment containing cardholder account data such as cardholder receipts, files, PCs, Pointof-Sale terminals. Follow these steps to help protect your business from a physical breach: -Track technology inventory -Keep track of what you own and who has possession of the physical technology: Laptop, desktop computers and servers. -Any other technologies that may contain cardholder data such as Point-of-Sale equipment (stand-alone-dial-up terminals) -Any other physical asset that may contain cardholder data: Hardcopy, faxes, credit card receipts Secure Technology Once you have recorded the technology your organization owns and who has possession, secure it: -Engrave or affix asset tags to laptops and any Point-of-Sale equipment used to process credit cards. -Lock desktops to desks. -Institute a policy requiring laptops to be locked away at the end of the business day. -Ensure your computer server/data center is in a locked room -Use lock boxes, safes or locking file cabinets to store sensitive hardcopy documents, especially credit card receipts. Monitor Physical Access Monitor and restrict physical access where your technology is stored and used to process cardholder data: -Computer rooms with servers involved in the credit card acceptance chain -Credit card receipt storage rooms -Mail order processing areas Best practices include: -Monitor employees who use Point-of-Sale terminals and convey clearly-defined restrictions to them -Install cameras at computer room entrances and exits as well as check-out lanes where Point-of-Sale terminals are posi- tioned. -Define procedures to monitor the cameras and keep recorded footage for at least three months. -Require ID badges for access to sensitive data centers -Maintain a log of visitors to sensitive facility areas (video recordings of who accessed these areas can help determine cause and liability in a data security incident) -Educate employees and enforce security policies The Payment Card Industry Data Security Standard or PCI DSS requires organizations to educate employees about security policies and practices, which could include: -Defined procedures and restrictions on access and usage of technology involved in the processing of credit cards -Encryption used during transmission of cardholder data across open public networks -Destruction of media containing cardholder or sensitive data -Restricted versus non-restricted areas -Distinguishing visitors from employees -Ensuring all credit card transactions processed through Point-of-Sale devices are settled and purged from device on a daily basis A physical breach can also involve terminal scams. This involves individuals attempting to tamper with merchant Point-of-Sale terminals in order to gain access to card data contained in the device or to perpetrate fraud using the device. Merchants and branch locations have reported attempted terminal scams involving phone calls received by merchants in which the caller attempts to reprogram client terminals. In one instance, a caller claimed to be from a company called Payment System. The caller said he needed to adjust the merchant’s credit card machine over the phone. When asked, the hacker gave a name and non-working phone number. The caller also wanted to talk with the owner of the company, but quickly hung up when questioned. In another scenario a caller who claims to be from the wholesale division of Visa or MasterCard, says the merchant now qualifies for a wholesale rate versus the retail rate currently being assessed. The caller makes an appointment to meet with the merchant (where the terminal is located) to discuss and adjust the rates. If you are contacted by someone using these or similar methods, do not allow anyone to modify your terminals until you verify the request. Call your banks’ customer service number on your statement to report the incident and verify the request, whether it is by phone or in person, pertaining to your terminals. You will be asked to provide: Terminal type, Payment application, PIN-pad device, if applicable and as much information as you have about the caller, such as the caller’s name and telephone number. ELECTRONIC BREACH An electronic breach is the unauthorized access or deliberate attack on a system or network environment (at a business or its third party processor) where cardholder data is processed, stored or transmitted. This can be the result of acquiring access, via Web servers or Web sites, to a system’s vulnerabilities through application-level attacks. Examples of system vulnerabilities: -Unsecured Remote Access – both vendor and employee, remote access should only be available on demand -Unsecure network configurations – poorly configured or lack of firewalls and poor monitoring of access -Lack of proper password management – using weak passwords that are easily detected by hackers or vendor default passwords -Improper storage of allowed cardholder data and storage of prohibited cardholder data (full track data and CVV2/CVS)Encryption mismanagement or lack of encryption when transmitting cardholder data -Lack of or expired anti-virus, anti-spyware and anti-malware software -Lack of proper access restrictions to cardholder data systems Methods used in electronic breaches: A packet sniffer is an application that intercepts and logs traffic passing over a digital network or part of a network. This is a standard tool that has been used in network troubleshooting and analysis Please see “BREACHED” on page 7 7 2014 FEBRUARY-APRIL “BREACHED” from page 6 for many years. Unfortunately this tool is increasingly being used by fraudsters to collect card data in transit inside merchants’ networks.How does it work? -Full magnetic stripe credit/debit card data is read and recorded in transit in the authorization process -Credit/debit card data does not have to be stored within merchant’s system -Utilizes a variety of legitimate Windows® file names -Difficult to detect by virus security detectors -Can be removed at any time by fraudster Structured Query Language (SQL) injection is a technique used to exploit ecommerce Web sites and Web-based applications that manage card accounts (e.g., PIN updates, monetary additions, account holder updates). How does it work? -Malicious code is inserted into user-input variables that are connected to or paired with SQL commands and executed -SQL injections assist hackers in infiltrating a company’s website and ultimately their core processing network where no sensitive data exits, then they navigate to systems where the card data is stored or transmitted Among the most dangerous of so-called “spyware,” key logging interjects programs into a merchant’s network systems using malware which is then used to count and record data entry key strokes. Some more sophisticated programs can also capture screenshots containing data even though no data is typed. This can allow fraudsters to obtain direct access to card data or to the system passwords that lead to it. The card data obtained is then used in fraudulent transactions. How does it work? -Simple programs can be written in a couple of days; sophisticated ones take longer -Capture and record everything the user is doing: keystrokes, mouse clicks, sites visited, even files that are opened without data being typed -Difficult to detect by virus security detectors This type of malware is becoming more and more prevalent in data compromise events as the method used in obtaining credit card information. Both malware applications are used in conjunction with each other to extract full magnetic stripe data from volatile memory, otherwise known as “RAM”. How does it work? -The memory dumping malware continuously copies payment process memory to an output file -The memory parsing malware then schedules memory dumps and parses output file for full track data These steps can help protect your business against the compromise of systems and network environments that contain or transmit cardholder data: -Never store prohibited cardholder data such as track data or card security codes on payment applications or in credit card processing environments. -Use only secure Web and database servers. Ensure that all systems, including Web and database servers, are routinely updated with the current vendor security patches. -Utilize strong, up-to-date anti-virus, antispyware and anti-malware software -Avoid “easy to guess” or system default passwords. Utilize strong administrative password management software so only authorized persons can access them. -Validate your payment applications’ compliance with the Payment Application Data Security Standard (PA-DSS) or undergo a Payment Card Industry Data Security Standard (PCI DSS) code review. -Segment system and network environments where cardholder data is processed, stored or transmitted away from public networks such as the Internet. -Implement firewalls where necessary. Be sure that firewalls are properly configured to only allow inbound and outbound traffic that is necessary to day-to-day business. -Secure remote access applications and enable two-factor authentication as required by the PCI DSS. Remote access to systems should only be available on-demand. -Schedule network scans for vulnerabilities and take immediate action to remediate the weakness when a vulnerability is identified. Other recommendations: -Establish standard company procedures for systems log management to include: -Centralized logging, Daily review of logs -Protection of logs from un-authorized access, Keep a history of logs for at least the length of time required by the PCI DSS -Review and amend vendor contracts to include PCI DSS fundamental security practices. It is recommended that merchants only use third party providers that understand and operate in compliance with the PCI DSS SKIMMING BREACH Skimming involves the capture and recording of card magnetic stripe data using an external device which is sometimes installed on a merchant’s Point of Sale System (POS). Skimming can also involve a dishonest employee utilizing an external device to collect the card mag- netic stripe data. The data is then used to create counterfeit credit and debit cards. How is it done? -Restaurants and bars are common scenes for skimming because the perpetrator has physical possession of the victim’s credit card. In this situation, the perpetrator often uses a device so small it can fit in the palm of your hand to read and store data encoded in the magnetic stripe on the back of the victim’s credit card. The perpetrator may also use a small keypad device to record the three or four-digit security code printed in the signature box. -Skimming can also involve PIN-debit transactions. In some cases, the perpetrator places a device over the card slot on an ATM to read the magnetic stripe as cardholders pass their cards through it. These devices are often used in conjunction with pinhole cameras to record the cardholder’s unique personal identification number (PIN). -Skimming may involve tampering with vulnerable Point-of-Sale terminals and PIN-pad equipment. Typically, a perpetrator inserts a device into the terminal or PIN-pad at the merchant location, then uses it to collect credit card and PIN data. -The petroleum industry experiences a high occurrence of skimming. Perpetrators take advantage of widespread pay-atthe-pump devices, often targeting highvolume locations to access the pump’s card reader technology without detection. In a matter of minutes, a skimmer attaches a device that records data encoded on the card’s magnetic stripe. Pinhole cameras are sometimes used to record the cardholder’s PIN while the device is capturing card data. How to minimize potential for skimming: -Closely monitor handling of cards when employees have frequent physical possession of credit cards out of view of the cardholder. -Closely monitor activity on Point-of-Sale terminals and PIN-pad devices. -Regularly check equipment for attached skimming devices or evidence of tampering. -Ensure you are not using a known vulnerable Point-of-Sale terminal or PIN-pad device by contacting your credit card processing service provider -Petroleum businesses should have procedures to monitor activity at outdoor Pointof-Sale pumps. This must include opening devices regularly to check for tampering or installed skimming devices. Source: http://merch.bankofamerica.com/datasecurity/data-compromise/types-of-breaches 8 2014 FEBRUARY-APRIL Tax Season and Identity Theft As April 15th quickly approaches, many Leon County residents are busy preparing their 2013 income tax returns. Unfortunately, some people who have already submitted their returns are receiving this news from the IRS – a tax return using their social security number has already been filed. The Leon County Sheriff ’s Office has received calls from victims seeking advice on what to do, now that their personal information has been stolen and their tax records compromised. Below are scams you should be aware of, and what you can do if you find yourself a victim of Identity Theft this tax season. Electronic Filing – Armed with stolen Social Security numbers, identity thieves have filed thousands of tax returns and collected billions of dollars in tax refunds through electronic filing. Many businesses, including medical facilities, financial institutions, your place of employment, and genealogy websites ask for your SSN. Don’t be afraid to ask them how they protect this valuable information. Tips: Your social security number defines you, so be careful who you give it to, file your taxes early, and check your credit regularly. Fake Websites or Emails – Creating a website that looks just like a legitimate tax preparer’s website or the IRS is simple. According to Scambusters.org there are approximately 5000 phony websites, hosted in more than 50 countries who claim to be a part of or linked to the IRS. Imagine the information you give these phony sites when you log on to file your tax returns thru them. Phishing emails claiming to be from the IRS are also circling around enticing victims to resubmit their tax return so that “invalid account records can be corrected for purposes of deposit”. Tips: If you receive an unsolicited email that appears to be from either the IRS or an organization closely linked to the IRS, such as the Electronic Federal Tax Payment System (EFTPS), report it by sending it to phishing@irs.gov. The IRS does not initiate contact with taxpayers by email to request personal or financial information. Return Preparer Fraud About 60 percent of taxpayers will use tax professionals this year to prepare and file their tax returns. Most return preparers provide honest service to their clients. But as in any other business, there are also some who prey on unsuspecting taxpayers. In 2013, every paid preparer needs to have a Preparer Tax Identification Number (PTIN) and enter it on the returns he or she prepares. Tips: Stay away from preparers who promise larger than normal tax refunds, charge a percentage or want you to split the refund to pay the preparation fee, encourage you to place false information on your return, such as false income, expenses and/or credits. Finally, if you believe your personal information has been stolen and used for tax purposes contact the IRS Identity Protection Specialized Unit, immediately. For more information, visit the special identity theft page at www.IRS. gov/identitytheft. If you have questions about Identity Theft or if you have received a fraudulent phone call, email or letter and would like to report it, please contact the LCSO at 850-606-3300. 9 2014 FEBRUARY-APRIL Sexual Predator Notification Chapter 943, Florida Statutes allows local law enforcement to release certain information concerning sexual offenders. The below information is being provided to inform the citizens of Leon County of those sexual offenders who live in the community. The information should not be used to harass the sexual offender, to vandalize their property, or to facilitate any other crime against them. For a complete listing and photograph of sexual offenders in Tallahassee and Leon County, you may contact the FDLE Hotline at 1-888-357-7332 or visit their webpage. Name and addresses verified as of: 02/24/2014 TRAVIS WILLIAM MARSHALL DERRICK GERALD ADRIAN JAMES ANTHONY MICHAEL JAMES DANIEL JOHN JAMES CHARLES DARIUS KEVIN DARREN KELLY TRAVIS RONALD RICKY LEO LEE WILLIAM JASON STEVEN JEFFREY THEODORE ROBERT MATTHEW KENNETH DAMIEN RONALD ANTHONY EARL DALE SHAWN PAUL NORMAN DANNY PAUL MICHAEL LEROY GEORGE MICHAEL LANCE EXTERMEADE ROBERT VICTOR SAMUEL GREGORY HILTON DANIEL KENNETH LARRY BRIAN RAYMOND ANDREW FRANK EDWARD JEFFERY ROBERT BOBBY JOSHUA TIMOTHY BENJAMIN HOWARD LARRY JUSTIN JERRY WILLIAM JAMES RONALD STEPHEN LUCAS RICHARD JAMES ROY BARRON JAMES DANIEL GEORGE BALDWIN BOUKNECHT BRUNI HENRY NEILSEN ROBINSON BRYANT CAESAR HINES JONES LANGNEHS MILLS RANKIN RIGGS ROBINSON SYMONETTE ALEXANDER ARNOLD BRANCH BRANTLEY BRUCE BUTLER CHILDS CROWLEY FLETCHER GATES GEORGE HUDSON JONES LEAHY MADISON MANN MATHIS NEALY NELSON OSBORN SAFFORD SWATTS WILLIAMS WILLIS BAXLEY BEEL COLLINS COUSNARD FARLIN GIVENS JONES KERCE PUIATTI SMITH WARD WILLIAMS EVANS YOUNG FOSTER JONES MERESSE BELVIS RICHARDS CAMERON CODY COE HARVELL HAVEARD JENKINS LYLES ODEL ROGAN SPILLERS TROTMAN WASHINGTON BURTON LOWERY SCULLEY WESCOTT WINGER GANYARD GLOSCH SAMPSON GILES POSEY WRIGHT 2604 BRIGHTON RD 2420 CASTLETOWER RD 1401 RAMBLE BRK APT A 2222 MAGNOLIA CIR APT B 480 W TENNESSEE ST 1410 SHALLOW BRK APT D 2501 OLD BAINBRIDGE RD APT B 6285 BOMBADIL DR 1548 MERRY OAKS CT 2425 MCWEST ST 6472 HOODED BAY CT 2110 TAMERLANE DR 6980 RED GUM CT 1305 PULLEN RD 2047 LONGVIEW DR 3898 GAFFNEY LOOP 6517 ELLENMAN LN 1224 EPPES DR APT 4 1605 ATKAMIRE DR 1224 EPPES DR 1224 EPPES DR 306 WHITE DR APT D4 1224 EPPES DR 5738 PINE PARK CIR 1224 EPPES DR APT 5 1224 EPPES DR 2969 CREEK INDIAN LN 2416 JACKSON BLUFF RD APT 6A 5207 ELLSWORTH TRCE LOT 14 5713 AENON CHURCH TRL 1440 NASHVILLE DR 1224 EPPES DR 1327 PEPPER DR APT 3 2937 GREENON LN 635 DUNN ST 1224 EPPES DR 1224 EPPES DR 3113 W TENNESSEE ST 1224 EPPES DR 314 HAYDEN RD APT 25 2709 DEEP FOREST RD 6552 SPRINGHILL RD 3618 S LAKEWOOD DR 2990 BANTRAM RD 3406 MIZELL ST 5963 BUTTON WILLOW LN 3586 SUNDOWN RD 4017 WOOD DR 3705 WOODVILLE HWY 2682 LOW RIDGE LN 2205 FRANKLIN OAKS LN 3927 CRAWFORDVILLE RD # B-53 3573 CHATELAINE DR 2881 BALTIC AVE 4364 SAFARI RUN 3141 LOOKOUT TRL 2925 SPRINGFIELD DR 5566 SULLIVAN RD 3440 WHIPPORWILL DR 14984 GRASSHOPPER TRL 1840 BABY FARM CIR 1717 SUNBEAM LN 8048 BABY FARM RD 1448 KATIE LOIS RD 1632 HIGHLAND ST APT 9 1565 CALDWELL DR 303 BIG RICHARD RD 542 OSCEOLA ST APT 5 19339 COTTON PATCH RD 6700 OLD BARN RD 1521 LAKE AVE 2643 CHANDALAR LN 9556 APALACHEE PKWY APT 15 3791 MATT WING RD 9556 APALACHEE PKWY RM 8 4042 APALACHEE PKWY LOT 1 8006 RED EAGLE DR 8026 BLUE SMOKE DR 14855 FAIRBANKS FERRY RD 1695 CANADIAN GEESE TRL 13580 CAPITOLA RD 3713 ROCKBROCK DR APT 9 32301 32301 32301 32301 32301 32301 32303 32303 32303 32303 32303 32303 32303 32303 32303 32303 32304 32304 32304 32304 32304 32304 32304 32304 32304 32304 32304 32304 32304 32304 32304 32304 32304 32304 32304 32304 32304 32304 32304 32304 32310 32305 32305 32304 32305 32305 32305 32305 32305 32305 32305 32305 32308 32308 32309 32309 32309 32310 32310 32310 32310 32310 32310 32310 32310 32310 32310 32310 32310 32310 32310 32311 32311 32311 32311 32311 32312 32312 32312 32317 32317 32311 Cell Phones For Seniors The Leon County Sheriff ’s Office and Sheriff Larry Campbell kicked off the “Cell Phones for Seniors Program” back in 2004 and presented cell phones to twelve senior Leon County residents. The purpose of this program is to enhance the well being of seniors by offering accessibility and use of a cell phone for the sole purpose of contacting 9-1-1 in case of emergency. Requirements for qualifying for the program are as follows: -Citizens 60 years of age or older. -Demonstrate physical or financial need. -Live in his/her own apartment or home. The supply of cell phones relies on the amount of people donating their old cell phones and chargers. At this time, the Leon County Sheriff ’s Office has donated 77 of their surplus cell phones to the program, but they are asking the community to check their junk drawers, homes and offices for extra cell phones to donate. Requirements for donations of cell phones and chargers are as follows: -Cell phones must be less than two years old. -All information should be erased from the memory and the phone should be “unlocked”. -Donors are asked to place the cell phone and charger in a zip lock bag for easier handling and to prevent the cord from tangling. The “Cell Phones for Seniors Program” is administered through the Leon County Sheriff ’s Office Crime Prevention Unit. Donations of cell phones may be made at the Leon County Sheriff ’s Office, 2825 Municipal Way. For additional information, to donate or seek qualification for a cell phone, please call 6063300. 10 2014 FEBRUARY-APRIL Teen Driver Challenge by: Deputy Jessica Ikner Sheriff Campbell is committed to the safety of the community to include our most precious commodity, our youth. As a result, he has implemented a number of programs directing the efforts of the Sheriff ’s Office to provide education and training to protect them. These programs have targeted issues that concern parents, and now Sheriff Campbell is continuing to offer a program specifically designed for the teen driver. The program is known as “The Teen Driver Challenge.” The Challenge is backed by the Florida Sheriff ’s Association and supported by the Sheriff. The Teen Driver Challenge is the result of a committee assembled by the Florida Sheriff ’s Association, including law enforcement driving instructors from around the state and the Leon County Sheriff ’s Office. The committee identified that 25% to 30% of teen drivers will be involved in a crash during the first year of driving. Traffic crashes are the NUMBER ONE CAUSE OF DEATH AMONG TEENS and cause billions of dollars in loss annually. The Teen Driver Challenge is an effective program providing information and first hand experience. If confronted with emergency situation students who complete this course will have the knowledge and skills to react accordingly and reduce the chance of becoming a statistic. With those statistics alone it was imperative that the committee address ways to reduce the risk our teens have in driving and build a program to provide instruction by Florida Department of Law Enforcement Certified Driving Instructors. The Teen Driver Challenge is NOT an advanced driving course. It is a DEFENSIVE DRIVING PROGRAM that covers the following topics and driving exercises. Topics {4 hours – Classroom} -Vehicle Dynamics, Human Factors, Responsibility, Liability, Drug and Alcohol Use, Night Driving, Aggressive Driving and Road Rages Driving Exercises {8 hours-Driving Range} Threshold, ABS, and Emergency, Braking, Evasive Maneuvers, Cornering, Backing, Forward and Reverse Serpentine, Figure 8, Off Road Recovery, Skid Control Requirements to Attend: -Child must be between the ages of 15-19 (15 years old with a restricted license or 16 years old with a Drivers License) -Have a valid Florida Drivers License -Have access to a safe vehicle -The vehicle operated must have proof of insurance. -Child and Parent must sign a waiver of liability prior to taking this course. The classroom sessions will be held at the Leon County Sheriff ’s Office in the Citizens Academy Classroom. The practical will be held at the Pat Thomas Law Enforcement Driving Range. Please send inquires to Sgt. Rob Reisinger. Sgt. Reisinger can be reached at (850) 606-3254 or reisingr@leoncountyfl.gov ALL classes were full last year so sign up early. We will be accepting additional information to be placed on a waiting list. The person(s) completing the online information will need to indicate which class they are interested in attending and they will be added to that waiting list. 11 2014 FEBRUARY-APRIL 12 2014 FEBRUARY-APRIL PRSRT STD U.S. Postage PAID Tallahassee, FL. Permit No. 871 SHERIFF Larry Campbell LEON COUNTY POST OFFICE BOX 727 TALLAHASSEE, FL 32302-0727 TO: THE LEON COUNTY SHERIFF’S OFFICE IS AN EQUAL OPPORTUNITY EMPLOYER The Leon County Sheriff ’s Office needs your help in locating the following individuals, if you have information, please call 606-3300. You may remain anonymous. Linda Stalans White Female DOB: 12/03/1968 H: 5’04” W: 150lbs Hair: Hazel Eyes: Brown Violation of probation x5, Dealing in stolen property x5, Defrauding pawnbroker x5, Grand Theft Kevin Broome White Male DOB: 07/10/1970 H: 6’00” W: 190 lbs Hair: Brown Eyes: Brown Burglary with Assault/battery, Battery touch or strike Micah Cooke Clinton Herring White Male DOB: 10/22/1987 H: 5’10” W: 160 lbs Hair: Brown Eyes: Brown Grand Theft Black Male DOB:10/13/1967 H: 6’01” W: 185 lbs Hair: Black Eyes: Brown Grand Theft WANTED as of 02/04/2014