CW Feb-apr 2014.indd - Leon County Sheriff`s Office

advertisement
2014 FEBRUARY-APRIL
Leon County Sheriff’s Office
A publication of the Leon County Sheriff’s Office
e
b
m
e nu
n
o
ph LCSO
w
e
N
for
r
300
-3
6
0
)6
(850
New Year,
New Number!
In
2013,
there were many
changes that took place
with respect to the Leon County
Sheriff ’s Office Communications Section. All of Leon County is now under
one consolidated dispatching entity
housed at the Public Safety Complex
off of Weems
Road.
This
change has been
a huge benefit for
the citizens of our
great
Tallahassee community
and has allowed
the Leon County
Sheriff ’s Office to
serve individuals more quickly
and provide more
stream-lined assistance where and
when it is needed most.
With the change mentioned
above, the Leon County Sheriff ’s Office has new telephone numbers. The
new non-emergency number for the
Leon County Sheriff ’s Office is 6063300. When you call this number, an
operator will answer your call and ask
you about the nature of your call and
IN THIS ISSUE
News from the SO................................page 2
FBI Child App.......................................page 3
Happy Holidays for Sick Children.. .......page 3
Thelma Thwartum....................................page 4
will forward you to the correct area
or individual. After 7p.m. your call
will automatically be forwarded to
the Consolidated Dispatch Agency
or C.D.A. If you call the C.D.A. at 6065800, you have a choice of who you
would like to be dispatched to your
call. If you would prefer a sheriff ’s
deputy to be dispatched to you,
please let the communications officer that you are speaking with know
that you prefer a sheriff ’s deputy.
Also, 9-1-1 is still the “go-to” number
for emergencies, 24 hours
a day, 7 days
a week.
E v e n
though the
number has
changed, the
Leon County
Sheriff ’s Office is still
offering the
excellent
community based law enforcement
for all of Leon County and within the
City of Tallahassee that we have been
known forover the years
Everyone here at the Leon
County Sheriff ’s Office would like to
thank you for your continued support and we wish everyone in the
community a happy, healthy, safe
and prosperous New Year.
CCYS....................................................page 4
Cell Phones for Seniors........................page 5
Teen Driver Challenge..........................page 5
Bank Accout Breach.......................page 6 & 7
The Leon County Sheriff ’s Office
needs your help in locating the
following individuals, if you have
information, please call 6063300. You may remain anonymous. See page 12 for additional
wanted felons.
Josember Portillo
Hispanic Male DOB:01/23/1988
H: 6’01”
W: 245 lbs
Hair: Brown Eyes: Brown
Failure to Appear, Possession of Child
Pornography x 2, Possession with
Intent to Promote Child Pornography
William Nealy
Black Male DOB: 04/04/1982
H: 5’08”
W: 1757lbs
Hair: Black Eyes: Brown
Criminal use of ID, Grand theft x 2, uttering, Burglery of Structure x 2, Petit theft,
Damage property-criminal mischief
WANTED as of 2/4/2014
LCSO Adventure Camp.........................page 8
Sexual Predators..................................page 9
Kid’s Page..........................................page 11
Wanted Felons...................................page 12
2
2014 FEBRUARY-APRIL
News From The Sheriff ’s Office
More GOLD for the Pistol Team Deputies & K9
The ExplorKoda Honored
er Pistol Team traveled to Wilmore
By Purple Heart
Kentucky on Saturday November
Association
2nd to compete in
the Scholastic Pistol Program (SPP)
Regional Championships, hosted by
the University of
Kentucky Shooting Team. Our folks
competed in the
.22 Rimfire Senior Division taking First Place. The team is coached by Deputies Dustin Brock and Tom Stege. The shooters are Mason Reeves( Leon
High Junior) , Chris Andrade (TCC), Jose Sanabria (ITT)and Michael Brigance
(Home schooled Sophomore). They competed against teams from Michi- L-R Dep. Tyler Epstein, Sgt. Mike Reeves, Sheriff
gan, Illinois, Kentucky, Tennessee and Florida. This is our team’s fourth com- Larry Campbell, Not pictured Dep. Ronn McMullen
petition since forming and bringing home the gold each time.
In October, at the Citizens
Academy Graduation, Deputy
Ronn McMullen, Deputy Tyler EpLeon County Sheriff ’s Explorer Post #15 gave back this Thanksgiving, by stein, Sergeant Mike Reeves and K9
contributing 20 turkeys to our senior citizens in Leon County who are in need. The Koda were recognized by the Naturkeys were directly given to recipients that were chosen by Good News Out- tional Military Order of the Purple
reach Ministries. In addition to the turkeys, a box full of green beans, canned Heart Association Local Chapter
cranberry, yams, stuffing, boxed mashed potatoes and gravy were also given 758, MOPH for their achievements
to recipients. This community outreach helped support our seniors who may and sacrifices made in the line of
duty. Deputy Ronn McMullen was
not otherwise enjoy a delicious Thanksgiving meal. The Explorers made their
presented with a brass statuette of
deliveries on Tuesday November 26th to the Miccosukee Hills Apartments.
K9 Koda by the Purple Heart AssoAll the citizens were happy to receive the Thanksgiving boxes along with a ciation. K9 Koda was killed in the
special visit from
line of duty this year while in serthe Leon County
vice during a search for an armed
Sheriff ’s
Office
and dangerous felon that was
Explorer
Post
wanted for murder. Commander
members. Way to
Mike Ford of Purple Heart Association Local Chapter 758, MOPH and
go Explorers on
Purple Heart Association member
making a brighter
Dennis Foggy were on hand to
holiday for these
present the awards.
folks!
Explorers Community Support Initiative
Crime Watch
Publisher:Sheriff Larry Campbell Managing Editors:Capt. Jimmy Williams Lt. Nancy Burns Editor: Paige Forshay Safe Circulation:Dep. Tim Randolph & Dep. Jessica Ikner
Crime Watch is published in February, May, August & November. Articles of interest are welcome. Publication of submitted materials are subject to review & space availibility.
Article deadline is the tenth day of the month prior to the month of publication.
Send articles, letters or suggestions to: Crime Watch c/o Leon County Sheriff ’s Office Post Office Box 727 Tallahassee, Florida 32302-0727
Telephone: (850) 606-3250 Fax: (850) 606-3252 Internet: www.leoncountyso.com E-mail: lcsocpu@leoncountyfl.gov
3
2014 FEBRUARY-APRIL
in Your Hands
You’re shopping at the mall
with your children when one of
them suddenly disappears. A quick
search of the nearby area is unsuccessful. What do you do?
Now there’s a free new tool
from the FBI that can help. Our just
launched Child ID app—the first
mobile application created by the
FBI—provides a convenient place
to electronically store photos and
vital information about your children so that it’s literally right at
hand if you need it. You can show
the pictures and provide physical identifiers such as height and
weight to security or police officers
on the spot. Using a special tab on
the app, you can also quickly and
easily e-mail the information to authorities with a few clicks.
The app also includes tips
on keeping children safe as well as
specific guidance on what to do in
those first few crucial hours after a
child goes missing.
We encourage you to share
the word about this app with family and friends, especially during upcoming activities in your
communities to raise awareness
on crime and drug prevention.
For its part, the FBI is working to
publicize the app with the American Football Coaches Association
(AFCA)—its long-time partner in
the National Child Identification
Program, which provides a physical kit to gather your child’s pictures, fingerprints, personal characteristics, and even DNA to keep
with you in case of emergency. The
AFCA is producing a public service
announcement about the app and
will spread the word at various
football games during the upcoming season.
Right now, the Child ID app
is only available for use on iPhones
and can only be downloaded for
free from the App Store on iTunes,
but we plan to expand this tool to
other types of mobile devices in
the near future. And we’ll be adding new features—including the
ability to upload other photos
stored on your smart phone—in
the coming weeks and months.
An important note: the FBI
(and iTunes for that matter) is not
collecting or storing any photos or
information that you enter in the
app. All data resides solely on your
mobile device unless you need to
send it to authorities. Please read
your mobile provider’s terms of
service for information about the
security of applications stored on
your device.
Put your child’s safety in
your own hands. Download the
FBI’s Child ID app today.
Source: www.FBI.gov
Happier Holiday For Sick Children
The holiday season got a little brighter for local children hospitalized at
Tallahassee Memorial Hospital as the Leon County Sheriff ’s Office annual teddy
bear event got underway. The Victim’s Advocate Unit organizes the event each
year. There were several Sheriff ’s Office representatives from the jail, records, uniform patrol and the reserve unit to help spread the good cheer and a soft, cuddly
teddy bear as well.
This year there were thirty bears presented to
the children. The bears were purchased from
Kay Jewelers which benefitted the St. Jude’s Hospital for children. The
Victim Advocate Unit also attended the Sheriff ’s Association Risk Management Fund event where they donated bears to the LCSO so that we
could give them away to children at the Hope Community Center and
the Salvation Army. Deputy Chad Holliday was in attendance and provided his support during the event. Thanks to everyone for making the
event a huge success.
4
2014 FEBRUARY-APRIL
CCYS: Working For Kids & Families
Capital City Youth Services programs, which date back
to 1975, began by providing for
the basic needs of runaway and
homeless youth, ages 10-17. Once
established as a private, nonprofit
agency, Capital City Youth Services
(CCYS) has grown to include a continuum of services for runaway,
homeless, truant, ungovernable,
and other at-risk
youth and their
families.
Services offered include
outreach
and prevention in
the community,
short-term residential care, case
management,
counseling (individual, family and
group), and aftercare. Our success
has been and will continue to be,
measured by the level of satisfaction from the community and our
clients, and the ongoing health of
the families we serve. Our mission
is to promote the healthy development of youth and families.
CCYS is a private, non-profit corporation, funded in part by
United Way of the Big Bend, the
Department of Juvenile Justice,
Florida Department of Child and
Family Services, Department of
Education, Department of Health
and Human Services, Leon County,
City of Tallahassee, and private donations. CCYS is a member of the
Florida Network of Youth and Family Services, Southeastern Network
of Youth and Family Services, and
the National Network for Youth.
CCYS GUIDING PRINCIPLES
•PARTNERSHIP•FAMILY: We are committed to keeping families together
whenever possible and to strengthening family systems.
•YOUTH DEVELOPMENT: We value
young people as vital resources
and partners in finding solutions to
both personal and social problems.
Therefore, we work to help cultivate youth’s strengths and value
their uniqueness.
•RESPECT: We value all people and
treat them with appreciation as we
consider their needs.
•RECOGNIZE INDIVIDUAL’S UNIQUE
STRENGTHS: We recognize the diversity of human beings and appreciate the unique strengths, abilities,
and contributions each person has
to offer. We act in ways that reflect
mutual respect and strive to overcome barriers to genuine human
connectedness.
•AFFILIATES: We recognize the importance
of building collaborative partnerships with
youth, families, staff,
governmental agencies, public and private
organizations,
and
businesses in our communities.
•STANDARDS: We are
dedicated to ensuring
the highest standards of practice
within our programs and our organization.
•KNOWLEDGEABLE: We seek continuous improvement in our understanding, skills, and knowledge
of client needs. We use this evergrowing awareness in our efforts to
meet our client’s needs. This commitment to seeking knowledge applies to each individual, as well as
the agency as a whole.
•FLEXIBLE: We adapt to meet the
Please see “CCYS” on page 5
5
“CCYS” from
page 4
changing
needs of the
youth, families, and
communities we serve.
•INTEGRITY: We act in ways that are
in harmony with our mission.
•STEWARDSHIP, ACCOUNTABILITY
& RESPONSIBILITY: We take seriously our responsibility for the health
and well-being of those under our
care.
•COMPASSION: We demonstrate genuine caring for the youth, families,
and communities we serve.
•COURAGE: We exhibit both personal
and organizational courage in our
work - we take a stand and do the
right thing for youth and families,
even when it’s difficult and/or unpopular.
WHAT WE DO
We are committed to helping
families in the Big Bend area. When
kids or their families have a problem,
we are there to support, comfort,
and empower our clients as they deal
with life. We strive to understand a
family’s specific needs, develop a
plan, and then use our knowledge
of local resources to help get things
back on track.
Capital City Youth Services
offers counseling and outreach services to youth and their families, and
emergency shelter services to youth
in crisis. We serve youth and families throughout the Big Bend area of
North Florida, including Leon, Gadsden, Wakulla, Franklin, Liberty, Jefferson, Madison and Taylor Counties. All
services are free and confidential. All
of our programs focus on reaching
out and helping youth and families
2014 FEBRUARY-APRIL
who have found themselves in situations beyond their control.
Among the services CCYS
provides are CINS/FINS services,
which are funded by the Department of Juvenile Justice
through the Florida Network
of Youth and Family Services. CINS
stands for “Child In Need of Services”
and FINS stands for “Family In Need
of Services”. These are interventions
designed to address behaviors that
put youth at risk for delinquency. Services are provided to every county in
Florida by CCYS and similar agencies.
CCYS provides services
through our programs to the following groups of youth & families:
•Runaway and homeless youth that
are scared, hungry, tired, and want to
get off the streets
•Children and young adults (ages 1017) who may be physically or emotionally abused or neglected and
need a safe place to go
•Youth that are in emotional crisis
and feel they cannot resolve problems with their parent(s) while living
at home
•Youth with problems that keep
them from attending school (truant)
•Youth and families who want help
improving communication
CCYS offers several different categories of services:
•Someplace Else programs provide
shelter for Youths ages 10-17
•Family Place programs provide
counseling for youths, adults, and
families
•Safe Place programs provide outreach, education, and runaway prevention, as well as immediate help
for youth in crisis
•Going Places program provides outreach and immediate help for homeless youth
•Transitional Living Program is Coming Soon!
our responsibility for the health and
well-being of those under our care.
•COMPASSION: We demonstrate
There caring
are many
that would
genuine
foritems
the youth,
famibe very
to have on
here
lies,
and helpful
communities
wehand
serve.
at CCYS. If you
donate,both
or know
•COURAGE:
Wecan
exhibit
persomeone
who
would
like
to
donate
sonal and organizational courage
the-list
email
initems
our on
work
webelow,
take please
a stand
and
us
or
call
850/576.6000.
do the right thing for youth and
HYGIENEeven
SUPPLIES
families,
when it’s difficult
•Toothpaste,
toothbrushes,
Combs,
and/or unpopular.
Brushes, Belts, Shampoo,Conditioner
WHAT WE DO
Body Wash, Bars of Soap, Deodorant
We are committed to help(male and female), Clothing (t-shirts,
ing families in the Big Bend area.
jeans, sweatsuits, shorts), Socks
When kids or their families have a
(new), Underwear (assorted sizes problem,
we (winter
are there
toorsupport,
new), Jackets
- new
lightly
comfort,
and
empower
our
clients
used)
asSHELTER
they deal
with
life.
We
strive
EQUIPMENT
to•Water
understand
family’s specifi
Fountain, aCommercial
Stove/ c
needs,
develop
a
plan,
and
then
use
Oven, Large Chest Freezer, Comour
knowledge
of local
mercial
Vacuum,
Bookresources
Shelves,to
help
get things backTowels,
on track.
Comforters,Blankets,
Pillows,
Capital
City
Youth
Services
Sheets (Twin), New Fish Tank
and
offFish
ers counseling and outreach services
to SUPPLIES
youth and their families,
YOUTH
•Artsemergency
and Craftsshelter
Supplies,
Movieto
and
services
Passes,
Gift
Cards
(Movies,
Fun
youth in crisis. We serve youthStaand
tion, Museums,
Bookstores,
families
throughout
the Big Mall,
Bend
Restaurants,
Board including
Games,
area
of Northetc.),
Florida,
Playing
Cards, Personal
Diaries,
CerLeon,
Gadsden,
Wakulla,
Franklin,
tifi
cates
for
Haircuts,
CDs
light
rock,
Liberty, Jefferson, Madison and
jazz, classical
Taylor
Counties. All services are
OUTDOOR
RECREATION
EQUIPMENT
free
and confi
dential. All
of our pro•Balls,
Jump
Ropes,
Frisbees,
Tennis
grams focus on reaching out
and
racquets and balls, Exercise bike,
helping youth and families who
Volleyball Net and Ball
have found themselves in situations beyond their control.
VOLUNTEER OPPORTUNITIES
Among the services CCYS
Interested in stepping out of your
provides
are and
CINS/FINS
services,
comfort zone
reaching into
the
which
are
funded
by
the
Departlife of a child? Even a few hours a
ment
Justice
through
week of
canJuvenile
turn a young
person’s
life
the
Florida
Network
of
Youth
and
around. More comfortable helping
Family
Services.
CINS
stands
with the administrative load or fund-for
“Child
NeedHave
of aServices”
and
raisingIn
events?
special talent
FINS
stands
for
“Family
In
Need
teaching crafts or playing an instru-of
Services”.
These opportunities
are interventions
ment? Volunteer
exist
designed
to address
behaviors
that
in these areas
and many
others. GIve
put
at risk for delinquency.
us ayouth
call at 576-6000.
Services are provided to every
How Can You Help?
6
2014 FEBRUARY-APRIL
How Your Bank Account Information Is Breached
Technology can be seen as both
a blessing and a curse, especially when it
comes to your money. Over the holiday
season many individuals became victims
of a “breach”. With so many different ways
criminals can gain access to your financial
information, you always have to stay informed on the lastest tactics to separate
you from your money. The following is inforamtion to help you understand the nature of the “breach” and how you can best
protect yourself.
PHYSICAL BREACH
A physical breach involves the
physical theft of documents or equipment
containing cardholder account data such
as cardholder receipts, files, PCs, Pointof-Sale terminals. Follow these steps to
help protect your business from a physical
breach:
-Track technology inventory
-Keep track of what you own and who has
possession of the physical technology:
Laptop, desktop computers and servers.
-Any other technologies that may contain cardholder data such as Point-of-Sale
equipment (stand-alone-dial-up terminals)
-Any other physical asset that may contain
cardholder data: Hardcopy, faxes, credit
card receipts
Secure Technology
Once you have recorded the technology
your organization owns and who has possession, secure it:
-Engrave or affix asset tags to laptops and
any Point-of-Sale equipment used to process credit cards.
-Lock desktops to desks.
-Institute a policy requiring laptops to be
locked away at the end of the business day.
-Ensure your computer server/data center
is in a locked room
-Use lock boxes, safes or locking file cabinets to store sensitive hardcopy documents, especially credit card receipts.
Monitor Physical Access
Monitor and restrict physical access where
your technology is stored and used to process cardholder data:
-Computer rooms with servers involved in
the credit card acceptance chain
-Credit card receipt storage rooms
-Mail order processing areas
Best practices include:
-Monitor employees who use Point-of-Sale
terminals and convey clearly-defined restrictions to them
-Install cameras at computer room entrances and exits as well as check-out lanes
where Point-of-Sale terminals are posi-
tioned.
-Define procedures to monitor the cameras and keep recorded footage for at least
three months.
-Require ID badges for access to sensitive
data centers
-Maintain a log of visitors to sensitive facility areas (video recordings of who accessed
these areas can help determine cause and
liability in a data security incident)
-Educate employees and enforce security
policies
The Payment Card Industry Data
Security Standard or PCI DSS requires organizations to educate employees about
security policies and practices, which
could include:
-Defined procedures and restrictions on
access and usage of technology involved
in the processing of credit cards
-Encryption used during transmission of
cardholder data across open public networks
-Destruction of media containing cardholder or sensitive data
-Restricted versus non-restricted areas
-Distinguishing visitors from employees
-Ensuring all credit card transactions processed through Point-of-Sale devices are
settled and purged from device on a daily
basis
A physical breach can also involve
terminal scams. This involves individuals attempting to tamper with merchant
Point-of-Sale terminals in order to gain access to card data contained in the device
or to perpetrate fraud using the device.
Merchants and branch locations have reported attempted terminal scams involving phone calls received by merchants in
which the caller attempts to reprogram
client terminals. In one instance, a caller
claimed to be from a company called Payment System. The caller said he needed to
adjust the merchant’s credit card machine
over the phone. When asked, the hacker
gave a name and non-working phone
number. The caller also wanted to talk
with the owner of the company, but quickly hung up when questioned. In another
scenario a caller who claims to be from
the wholesale division of Visa or MasterCard, says the merchant now qualifies for
a wholesale rate versus the retail rate currently being assessed. The caller makes an
appointment to meet with the merchant
(where the terminal is located) to discuss
and adjust the rates.
If you are contacted by someone
using these or similar methods, do not allow anyone to modify your terminals until
you verify the request. Call your banks’
customer service number on your statement to report the incident and verify the
request, whether it is by phone or in person, pertaining to your terminals. You will
be asked to provide: Terminal type, Payment application, PIN-pad device, if applicable and as much information as you
have about the caller, such as the caller’s
name and telephone number.
ELECTRONIC BREACH
An electronic breach is the unauthorized access or deliberate attack on a
system or network environment (at a business or its third party processor) where
cardholder data is processed, stored or
transmitted. This can be the result of acquiring access, via Web servers or Web
sites, to a system’s vulnerabilities through
application-level attacks.
Examples of system vulnerabilities:
-Unsecured Remote Access – both vendor
and employee, remote access should only
be available on demand
-Unsecure network configurations – poorly configured or lack of firewalls and poor
monitoring of access
-Lack of proper password management –
using weak passwords that are easily detected by hackers or vendor default passwords
-Improper storage of allowed cardholder
data and storage of prohibited cardholder
data (full track data and CVV2/CVS)Encryption mismanagement or lack of encryption
when transmitting cardholder data
-Lack of or expired anti-virus, anti-spyware
and anti-malware software
-Lack of proper access restrictions to cardholder data systems
Methods used in electronic breaches:
A packet sniffer is an application
that intercepts and logs traffic passing
over a digital network or part of a network.
This is a standard tool that has been used
in network troubleshooting and analysis
Please see “BREACHED” on page 7
7
2014 FEBRUARY-APRIL
“BREACHED” from page 6
for many years. Unfortunately this tool
is increasingly being used by fraudsters
to collect card data in transit inside merchants’ networks.How does it work?
-Full magnetic stripe credit/debit card data
is read and recorded in transit in the authorization process
-Credit/debit card data does not have to
be stored within merchant’s system
-Utilizes a variety of legitimate Windows®
file names
-Difficult to detect by virus security detectors
-Can be removed at any time by fraudster
Structured Query Language (SQL)
injection is a technique used to exploit ecommerce Web sites and Web-based applications that manage card accounts (e.g.,
PIN updates, monetary additions, account
holder updates). How does it work?
-Malicious code is inserted into user-input
variables that are connected to or paired
with SQL commands and executed
-SQL injections assist hackers in infiltrating a company’s website and ultimately
their core processing network where no
sensitive data exits, then they navigate to
systems where the card data is stored or
transmitted
Among the most dangerous of
so-called “spyware,” key logging interjects
programs into a merchant’s network systems using malware which is then used to
count and record data entry key strokes.
Some more sophisticated programs can
also capture screenshots containing data
even though no data is typed. This can
allow fraudsters to obtain direct access to
card data or to the system passwords that
lead to it. The card data obtained is then
used in fraudulent transactions. How does
it work?
-Simple programs can be written in a couple of days; sophisticated ones take longer
-Capture and record everything the user
is doing: keystrokes, mouse clicks, sites
visited, even files that are opened without
data being typed
-Difficult to detect by virus security detectors
This type of malware is becoming more
and more prevalent in data compromise
events as the method used in obtaining
credit card information. Both malware
applications are used in conjunction with
each other to extract full magnetic stripe
data from volatile memory, otherwise
known as “RAM”. How does it work?
-The memory dumping malware continuously copies payment process memory to
an output file
-The memory parsing malware then schedules memory dumps and parses output file
for full track data
These steps can help protect
your business against the compromise of
systems and network environments that
contain or transmit cardholder data:
-Never store prohibited cardholder data
such as track data or card security codes
on payment applications or in credit card
processing environments.
-Use only secure Web and database servers. Ensure that all systems, including
Web and database servers, are routinely
updated with the current vendor security
patches.
-Utilize strong, up-to-date anti-virus, antispyware and anti-malware software
-Avoid “easy to guess” or system default
passwords. Utilize strong administrative
password management software so only
authorized persons can access them.
-Validate your payment applications’ compliance with the Payment Application
Data Security Standard (PA-DSS) or undergo a Payment Card Industry Data Security
Standard (PCI DSS) code review.
-Segment system and network environments where cardholder data is processed, stored or transmitted away from
public networks such as the Internet.
-Implement firewalls where necessary. Be
sure that firewalls are properly configured
to only allow inbound and outbound traffic that is necessary to day-to-day business.
-Secure remote access applications and
enable two-factor authentication as required by the PCI DSS. Remote access to
systems should only be available on-demand.
-Schedule network scans for vulnerabilities and take immediate action to remediate the weakness when a vulnerability is
identified. Other recommendations:
-Establish standard company procedures
for systems log management to include:
-Centralized logging, Daily review of logs
-Protection of logs from un-authorized access, Keep a history of logs for at least the
length of time required by the PCI DSS
-Review and amend vendor contracts to
include PCI DSS fundamental security
practices. It is recommended that merchants only use third party providers that
understand and operate in compliance
with the PCI DSS
SKIMMING BREACH
Skimming involves the capture
and recording of card magnetic stripe
data using an external device which is
sometimes installed on a merchant’s Point
of Sale System (POS). Skimming can also
involve a dishonest employee utilizing an
external device to collect the card mag-
netic stripe data. The data is then used to
create counterfeit credit and debit cards.
How is it done?
-Restaurants and bars are common scenes
for skimming because the perpetrator has
physical possession of the victim’s credit
card. In this situation, the perpetrator often uses a device so small it can fit in the
palm of your hand to read and store data
encoded in the magnetic stripe on the
back of the victim’s credit card. The perpetrator may also use a small keypad device
to record the three or four-digit security
code printed in the signature box.
-Skimming can also involve PIN-debit
transactions. In some cases, the perpetrator places a device over the card slot on an
ATM to read the magnetic stripe as cardholders pass their cards through it. These
devices are often used in conjunction with
pinhole cameras to record the cardholder’s unique personal identification number
(PIN).
-Skimming may involve tampering with
vulnerable Point-of-Sale terminals and
PIN-pad equipment. Typically, a perpetrator inserts a device into the terminal or
PIN-pad at the merchant location, then
uses it to collect credit card and PIN data.
-The petroleum industry experiences a
high occurrence of skimming. Perpetrators take advantage of widespread pay-atthe-pump devices, often targeting highvolume locations to access the pump’s
card reader technology without detection.
In a matter of minutes, a skimmer attaches
a device that records data encoded on the
card’s magnetic stripe. Pinhole cameras are
sometimes used to record the cardholder’s
PIN while the device is capturing card data.
How to minimize potential for skimming:
-Closely monitor handling of cards when
employees have frequent physical possession of credit cards out of view of the
cardholder.
-Closely monitor activity on Point-of-Sale
terminals and PIN-pad devices.
-Regularly check equipment for attached
skimming devices or evidence of tampering.
-Ensure you are not using a known vulnerable Point-of-Sale terminal or PIN-pad
device by contacting your credit card processing service provider
-Petroleum businesses should have procedures to monitor activity at outdoor Pointof-Sale pumps. This must include opening
devices regularly to check for tampering or
installed skimming devices.
Source: http://merch.bankofamerica.com/datasecurity/data-compromise/types-of-breaches
8
2014 FEBRUARY-APRIL
Tax Season and Identity Theft
As April 15th quickly approaches, many Leon County
residents are busy preparing their
2013 income tax returns. Unfortunately, some people who have
already submitted their returns
are receiving this news from the
IRS – a tax return using their social
security number has already been
filed. The Leon County Sheriff ’s
Office has received calls from victims seeking advice on what to do,
now that their personal information has been stolen and their tax
records compromised. Below are scams
you should be
aware of, and
what you can
do if you find
yourself a victim of Identity
Theft this tax
season.
Electronic Filing
– Armed with
stolen
Social
Security numbers, identity thieves have filed
thousands of tax returns and collected billions of dollars in tax refunds through electronic filing.
Many businesses, including medical facilities, financial institutions,
your place of employment, and
genealogy websites ask for your
SSN. Don’t be afraid to ask them
how they protect this valuable
information. Tips: Your social security number defines you, so be
careful who you give it to, file your
taxes early, and check your credit
regularly.
Fake Websites or Emails
– Creating a website that looks
just like a legitimate tax preparer’s
website or the IRS is simple. According to Scambusters.org there
are approximately 5000 phony
websites, hosted in more than 50
countries who claim to be a part of
or linked to the IRS. Imagine the
information you give these phony
sites when you log on to file your
tax returns thru them. Phishing
emails claiming to be from the IRS
are also circling around enticing
victims to resubmit their tax return
so that “invalid account records
can be corrected for purposes of
deposit”. Tips: If you receive an unsolicited email that appears to be
from either the IRS or an organization closely linked to the IRS, such
as the Electronic Federal Tax Payment System (EFTPS), report it by
sending it to phishing@irs.gov. The
IRS does not initiate contact with
taxpayers by email to request personal or financial information.
Return Preparer Fraud About 60 percent of taxpayers will
use tax professionals this year to
prepare and file their tax returns.
Most return preparers provide
honest service to their clients. But
as in any other business, there are
also some who prey on unsuspecting taxpayers. In 2013, every paid
preparer needs to have a Preparer
Tax Identification Number (PTIN)
and enter it on the returns he or
she prepares. Tips: Stay away from
preparers who promise larger than
normal tax refunds, charge a percentage or want you to split the
refund to pay the preparation fee,
encourage you to place false information on
your return,
such as false
income,
expenses and/or
credits.
Finally,
if
you
believe
your personal
information
has been stolen and used
for tax purposes contact
the IRS Identity Protection
Specialized Unit, immediately. For
more information, visit the special
identity theft page at www.IRS.
gov/identitytheft.
If you have questions
about Identity Theft or if you have
received a fraudulent phone call,
email or letter and would like to report it, please contact the LCSO at
850-606-3300.
9
2014 FEBRUARY-APRIL
Sexual Predator Notification
Chapter 943, Florida Statutes allows local law enforcement to release certain information concerning sexual offenders.
The below information is being provided to inform the citizens of Leon County of those sexual offenders who live
in the community. The information should not be used to harass the sexual offender, to vandalize their property, or
to facilitate any other crime against them. For a complete listing and photograph of sexual offenders in Tallahassee
and Leon County, you may contact the FDLE Hotline at 1-888-357-7332 or visit their webpage. Name and addresses
verified as of: 02/24/2014
TRAVIS
WILLIAM
MARSHALL
DERRICK
GERALD
ADRIAN
JAMES
ANTHONY
MICHAEL
JAMES
DANIEL
JOHN
JAMES
CHARLES
DARIUS
KEVIN
DARREN
KELLY
TRAVIS
RONALD
RICKY
LEO
LEE
WILLIAM
JASON
STEVEN
JEFFREY
THEODORE
ROBERT
MATTHEW
KENNETH
DAMIEN
RONALD
ANTHONY
EARL
DALE
SHAWN
PAUL
NORMAN
DANNY
PAUL
MICHAEL
LEROY
GEORGE
MICHAEL
LANCE
EXTERMEADE
ROBERT
VICTOR
SAMUEL
GREGORY
HILTON
DANIEL
KENNETH
LARRY
BRIAN
RAYMOND
ANDREW
FRANK
EDWARD
JEFFERY
ROBERT
BOBBY
JOSHUA
TIMOTHY
BENJAMIN
HOWARD
LARRY
JUSTIN
JERRY
WILLIAM
JAMES
RONALD
STEPHEN
LUCAS
RICHARD
JAMES
ROY
BARRON
JAMES
DANIEL
GEORGE
BALDWIN
BOUKNECHT
BRUNI
HENRY
NEILSEN
ROBINSON
BRYANT
CAESAR
HINES
JONES
LANGNEHS
MILLS
RANKIN
RIGGS
ROBINSON
SYMONETTE
ALEXANDER
ARNOLD
BRANCH
BRANTLEY
BRUCE
BUTLER
CHILDS
CROWLEY
FLETCHER
GATES
GEORGE
HUDSON
JONES
LEAHY
MADISON
MANN
MATHIS
NEALY
NELSON
OSBORN
SAFFORD
SWATTS
WILLIAMS
WILLIS
BAXLEY
BEEL
COLLINS
COUSNARD
FARLIN
GIVENS
JONES
KERCE
PUIATTI
SMITH
WARD
WILLIAMS
EVANS
YOUNG
FOSTER
JONES
MERESSE
BELVIS
RICHARDS
CAMERON
CODY
COE
HARVELL
HAVEARD
JENKINS
LYLES
ODEL
ROGAN
SPILLERS
TROTMAN
WASHINGTON
BURTON
LOWERY
SCULLEY
WESCOTT
WINGER
GANYARD
GLOSCH
SAMPSON
GILES
POSEY
WRIGHT
2604 BRIGHTON RD
2420 CASTLETOWER RD
1401 RAMBLE BRK APT A
2222 MAGNOLIA CIR APT B
480 W TENNESSEE ST
1410 SHALLOW BRK APT D
2501 OLD BAINBRIDGE RD APT B
6285 BOMBADIL DR
1548 MERRY OAKS CT
2425 MCWEST ST
6472 HOODED BAY CT
2110 TAMERLANE DR
6980 RED GUM CT
1305 PULLEN RD
2047 LONGVIEW DR
3898 GAFFNEY LOOP
6517 ELLENMAN LN
1224 EPPES DR APT 4
1605 ATKAMIRE DR
1224 EPPES DR
1224 EPPES DR
306 WHITE DR APT D4
1224 EPPES DR
5738 PINE PARK CIR
1224 EPPES DR APT 5
1224 EPPES DR
2969 CREEK INDIAN LN
2416 JACKSON BLUFF RD APT 6A
5207 ELLSWORTH TRCE LOT 14
5713 AENON CHURCH TRL
1440 NASHVILLE DR
1224 EPPES DR
1327 PEPPER DR APT 3
2937 GREENON LN
635 DUNN ST
1224 EPPES DR
1224 EPPES DR
3113 W TENNESSEE ST
1224 EPPES DR
314 HAYDEN RD APT 25
2709 DEEP FOREST RD
6552 SPRINGHILL RD
3618 S LAKEWOOD DR
2990 BANTRAM RD
3406 MIZELL ST
5963 BUTTON WILLOW LN
3586 SUNDOWN RD
4017 WOOD DR
3705 WOODVILLE HWY
2682 LOW RIDGE LN
2205 FRANKLIN OAKS LN
3927 CRAWFORDVILLE RD # B-53
3573 CHATELAINE DR
2881 BALTIC AVE
4364 SAFARI RUN
3141 LOOKOUT TRL
2925 SPRINGFIELD DR
5566 SULLIVAN RD
3440 WHIPPORWILL DR
14984 GRASSHOPPER TRL
1840 BABY FARM CIR
1717 SUNBEAM LN
8048 BABY FARM RD
1448 KATIE LOIS RD
1632 HIGHLAND ST APT 9
1565 CALDWELL DR
303 BIG RICHARD RD
542 OSCEOLA ST APT 5
19339 COTTON PATCH RD
6700 OLD BARN RD
1521 LAKE AVE
2643 CHANDALAR LN
9556 APALACHEE PKWY APT 15
3791 MATT WING RD
9556 APALACHEE PKWY RM 8
4042 APALACHEE PKWY LOT 1
8006 RED EAGLE DR
8026 BLUE SMOKE DR
14855 FAIRBANKS FERRY RD
1695 CANADIAN GEESE TRL
13580 CAPITOLA RD
3713 ROCKBROCK DR APT 9
32301
32301
32301
32301
32301
32301
32303
32303
32303
32303
32303
32303
32303
32303
32303
32303
32304
32304
32304
32304
32304
32304
32304
32304
32304
32304
32304
32304
32304
32304
32304
32304
32304
32304
32304
32304
32304
32304
32304
32304
32310
32305
32305
32304
32305
32305
32305
32305
32305
32305
32305
32305
32308
32308
32309
32309
32309
32310
32310
32310
32310
32310
32310
32310
32310
32310
32310
32310
32310
32310
32310
32311
32311
32311
32311
32311
32312
32312
32312
32317
32317
32311
Cell Phones For
Seniors
The Leon County Sheriff ’s
Office and Sheriff Larry Campbell
kicked off the “Cell Phones for Seniors Program” back in 2004 and presented cell phones to twelve senior
Leon County residents. The purpose
of this program is to enhance the
well being of seniors by offering accessibility and use of a cell phone for
the sole purpose of contacting 9-1-1
in case of emergency. Requirements
for qualifying for the program are as
follows:
-Citizens 60 years of age or older.
-Demonstrate physical or financial
need.
-Live in his/her own apartment or
home.
The supply of cell phones relies on the amount of people donating their old cell phones and chargers. At this time, the Leon County
Sheriff ’s Office has donated 77 of
their surplus cell phones to the program, but they are asking the community to check their junk drawers, homes and offices for extra cell
phones to donate. Requirements for
donations of cell phones and chargers are as follows:
-Cell phones must be less than two
years old.
-All information should be erased
from the memory and the phone
should be “unlocked”.
-Donors are asked to place the cell
phone and charger in a zip lock bag
for easier handling and to prevent the
cord from tangling.
The “Cell Phones for Seniors
Program” is administered through
the Leon County Sheriff ’s Office
Crime Prevention Unit. Donations
of cell phones may be made at the
Leon County Sheriff ’s Office, 2825
Municipal Way. For additional information, to donate or seek qualification for a cell phone, please call 6063300.
10
2014 FEBRUARY-APRIL
Teen Driver Challenge
by: Deputy Jessica Ikner
Sheriff Campbell is committed to the safety
of the community to include our most precious commodity, our youth. As a result, he has implemented
a number of programs directing the efforts of the
Sheriff ’s Office to provide education and training to
protect them. These programs have targeted issues
that concern parents, and now Sheriff Campbell is
continuing to offer a program specifically designed
for the teen driver. The program is known as “The
Teen Driver Challenge.” The Challenge is backed by
the Florida Sheriff ’s Association and supported by
the Sheriff.
The Teen Driver Challenge is the result of a
committee assembled by the Florida Sheriff ’s Association, including law enforcement driving instructors
from around the state and the Leon County Sheriff ’s
Office. The committee identified that 25% to 30%
of teen drivers will be involved in a crash during the
first year of driving. Traffic crashes are the NUMBER
ONE CAUSE OF DEATH AMONG TEENS and cause billions of dollars in loss annually.
The Teen Driver Challenge is an effective
program providing information and first hand experience. If confronted with emergency situation
students who complete this course will have the
knowledge and skills to react accordingly and reduce the chance of becoming a statistic. With those
statistics alone it was imperative that the committee
address ways to reduce the risk our teens have in
driving and build a program to provide instruction
by Florida Department of Law Enforcement Certified
Driving Instructors.
The Teen Driver Challenge is NOT an advanced driving course. It is a DEFENSIVE DRIVING
PROGRAM that covers the following topics and driving exercises.
Topics {4 hours – Classroom}
-Vehicle Dynamics, Human Factors, Responsibility, Liability, Drug and Alcohol Use, Night Driving, Aggressive Driving and Road Rages
Driving Exercises
{8 hours-Driving Range}
Threshold, ABS, and Emergency, Braking, Evasive Maneuvers, Cornering, Backing, Forward and Reverse Serpentine, Figure 8, Off Road Recovery, Skid Control
Requirements to Attend:
-Child must be between the ages of 15-19 (15 years old
with a restricted license or 16 years old with a Drivers
License)
-Have a valid Florida Drivers License
-Have access to a safe vehicle
-The vehicle operated must have proof of insurance.
-Child and Parent must sign a waiver of liability prior to
taking this course.
The classroom sessions will be held at the Leon
County Sheriff ’s Office in the Citizens Academy Classroom. The practical will be held at the Pat Thomas Law
Enforcement Driving Range.
Please send inquires to Sgt. Rob Reisinger. Sgt. Reisinger can be reached at (850)
606-3254 or reisingr@leoncountyfl.gov
ALL classes were full last year so sign
up early. We will be accepting additional information to be placed on a waiting list. The
person(s) completing the online information
will need to indicate which class they are interested in attending and they will be added
to that waiting list.
11
2014 FEBRUARY-APRIL
12
2014 FEBRUARY-APRIL
PRSRT STD
U.S. Postage
PAID
Tallahassee, FL.
Permit No. 871
SHERIFF Larry Campbell
LEON COUNTY POST OFFICE BOX 727
TALLAHASSEE, FL 32302-0727
TO:
THE LEON COUNTY SHERIFF’S OFFICE IS AN EQUAL OPPORTUNITY EMPLOYER
The Leon County Sheriff ’s Office needs your help in locating the following individuals, if you have information, please call 606-3300. You may
remain anonymous.
Linda Stalans
White Female DOB: 12/03/1968
H: 5’04”
W: 150lbs
Hair: Hazel
Eyes: Brown
Violation of probation x5, Dealing
in stolen property x5, Defrauding
pawnbroker x5, Grand Theft
Kevin Broome
White Male DOB: 07/10/1970
H: 6’00”
W: 190 lbs
Hair: Brown Eyes: Brown
Burglary with Assault/battery,
Battery touch or strike
Micah Cooke
Clinton Herring
White Male DOB: 10/22/1987
H: 5’10”
W: 160 lbs
Hair: Brown Eyes: Brown
Grand Theft
Black Male DOB:10/13/1967
H: 6’01”
W: 185 lbs
Hair: Black Eyes: Brown
Grand Theft
WANTED as of 02/04/2014
Download