Author Archives: Stephen Green

ICI Completes Swiss based company investigation

ICI investigated the Berny Cornfield and Robert Vesco OSI Switzerland based company and its international financial fraud.  ICI’s CEO, Earl Johnson, met with Berny Cornfield in the UK following his release from prisson.

Vesco lived for years as a successful banker in the Bahamas,. Eventually, the U S government made an effort to have him arrested and deported to the US.  He escaped the Bahamas on his boat and arrived in Cuba, Castro managed to steal all of Vescos stolen millions, and Vesco died in Cuba totally broke.

Financial fraud is even more of a criminal concern today, especially with the vulnerability of cryptocurrencies and involvement in ransom cyber-attacks.  Companies who have made the decision to operate within the virtual world are at a higher risk.  Let ICI mentor for your business and evaluate its vulnerability to cyber attack .  ICI can also conduct in-depth background investigations of personnel and others at every level, domestic or international.

International Consultants and Investigations, Inc has over twenty five years of service to the domestic and international business community and has a proven records of success on behalf of its clients.

  IDENTITY THEFT…IT’S THE CRIME THAT KEEPS ON TAKING

LAST YEAR IDENTITY THEFT COST CONSUMERS IN THE U.S. ALMOST FIVE BILLION DOLLARS.

EARL JOHNSON, CEO OF ICI COMPANIES HAS A FEW SELF-DEFENSE STRATEGIES TO STOP THIS CRIME BEFORE IT HAPPENS TO YOU!

1. THE INTERNET POSES A HUGE THREAT.  HERE ARE SOME OF THE THINGS YOU HAVE TO BE AWARE OF:

a) don’t store credit card info on a website

b) don’t open or respond to unwanted email or email from a party you don’t know.  This can unleash a “worm” air virus on your computer that will disable your system and/or allow hackers to get in.

c) make sure you are on a secure page when shopping on the Internet.

d) use just one credit card exclusively for internet shopping

e) utilize virus and security protection.  These can be purchased or provided for free by firms like Microsoft for users of their operating system.

2. ATMs, ALMOST EVERYONE USES THEM AND WHAT ARE SOME OF THE THREATS YOU FACE USING THEM?

a) do not use convenience store ATMs or those not provided by a financial institution.

b), choose a pin number that’s hard to crack

c) always make sure no one is looking over you shoulder while you’re using an ATM

d) make sure the ATM hasn’t been tampered with

e) use ATSMs that are in trafficked and well lit areas and not isolated or hidden from view

3. YOUR PHONE CAN ALSO EXPOSE YOU TO IDENTITY THEFT.

WHAT ARE SOME PRECAUTIONS YOU CAN TAKE?
a) do not give out personal info over the phone if you didn’t initiate the call own know the party you’re speaking to

b) register with a national do not cal system

c) don’t offer up your social security, credit card or bank account numbers unless you know who you’re speaking to

d)  do not send money over currency apps or give credit/debit card info to parties you don’t know.  Current scams revolve around grand children in trouble needing money, “Medicare” or “IRS” calls threatening legal action if “past due balances” aren’t remitted immediately or any other call from a bank or financial institution requesting verification of account numbers, PIN numbers, etc.

4. RECENTLY, THERE HAVE BEEN SOME CHANGES TO THE FAIR CREDIT REPORTING ACT WHICH WILL ENABLE EVERYONE TO OBTAIN ONE FREE CREDIT REPORT A YEAR.

a) consumers are entitled to a free copy of their credit report every 12 months.  All three of the credit reporting agencies are required by law to fulfill the request.  Log onto consumer.gov for more info or refer to ICI’s website  icicompanies.com

Earl Johnson, CEO of ICI, reacts to CIA Director’s Comment

Recently the CIA Director addressed a Congressional committee on Capitol Hill. His report provided the Agency’s assessment of cyber threats and recent attacks on the United States. A key point addressed was Cyber security and the serious threats that  ISIS and other enemies of the US pose.

Business leaders, as well as the public, need to fully understand the potential problems we face as a nation due to cyber threat. Becoming educated regarding this issue and available solutions is paramount.  Earl Johnson, the CEO of International Consultants and Investigations, Inc., agrees with what was discussed at the Committee. He was quoted saying that key points were mentioned and that all businesses have to take the threats of Cyber Crime seriously. Preventative Cyber Security measures are available and need to be implemented.

For further information as to how ICI Cyber Solutions can fully prepare and protect you or your business against Cyber attacks contact: www.icicompanies.com

Emergency Response For Foreign Businessmen and Students

EMERGENCY RESPONSE

 

International consultants and Investigations (ICI) provides the following services to
foreign businessmen and students living or visiting the United States:

Necessary information for travel relating to potential environmental alerts, Terrorism
threats, law enforcement contact, medical concerns prior to, during, or after the
scheduled time of travel/arrival into the United States.

Advise for crisis prevention and access to the Overseas Safety News alert monitor.

Crisis Management Emergency Service: ICI’s emergency service intelligence program
Provides the necessary advice to prevent exposure to a potential crisis. In case there
May be a hazard to the person’s life and body an agent shall be dispatched as needed.

ICI will respond and /or organize a response service once notified of an emergency or
potential problem and concern for the visiting person’s safety.

ICI provides licensed, trained, insured and bonded agents to respond to any situation
involving a visiting person in need of counseling, or assistance.

ICI agents are trained first responders, either currently in Law Enforcement or retired.
Able to assist in VIP protection, counseling, support during a crisis, provide shelter,
emergency care, and direct communication with family members.

ICI agents are able to respond to any area within the United States within hours, in major
Cities less then an hour.

ICI will enter into an agreement to provide emergency response agents to any
government agency, educational institution, or company interested in providing
emergency services to their citizens, students, and employees.

ICI Concludes Assignment on Behalf of the Japanese Government

PRESS RELEASE

International Consultants and Investigations (ICI) announces the successful conclusion of an assignment on behalf of the Japanese Railway System.

ICI provided information and arranged meetings for visiting representatives from Japan with Amtrak and the Metropolitan Railway System of New York City.  ICI’s mandate was to establish meetings with key personnel of the New York Rail transportation system and obtain information relating to biological, radiological and counter-terrorism technology to assist in the preparation of the 2008 G8 Conference held in Japan.

For 2009 ICI has secured an assignment to facilitate interviews and provide material on biological, radiological and counter-terrorism for the Fire and Disaster Management Agency (FDMA) of the Ministry of Internal Affairs and Communications of Japan.  The meetings and research will assist in the creation of training manuals, development of exercise scenarios, model plans and protocols for civilian population protection in the event of B/R terrorism.

This includes referencing the necessity for the Japanese government to collect and analyze information from around the globe to create and implement practical and effective countermeasures against B/R terrorism.  ICI will organize meetings on behalf of Japan’s FDMA with the United States Department of Homeland Security, Washington DC Fire Department Homeland Security Division, MTA and the Amtrak Rail System.  With ICI’s assistance and direction, the Ministry (FDMA) will be able to avail itself of the expertise of these recognized agencies during their trip to Washington, DC.

International Consultants and Investigations, Inc. are headquartered in New York City, NY,  USA.  ICI is a member of the Council of International Investigators.  The company can be reached at 212.582.3115 or via email: [email protected].

Online Vaccine Scams: Homeland Security Investigations, INTERPOL Issue Public Warning

Online Vaccine Scams: Homeland Security Investigations, INTERPOL Issue Public Warning

Source: ICE Newsroom bulletin
MARCH 24, 2021WASHINGTON, DCINTELLECTUAL PROPERTY RIGHTS AND COMMERCIAL FRAUD, COVID-19

Online vaccine scams: Homeland Security Investigations, INTERPOL issue public warning

‘Be vigilant, be skeptical, be safe’

WASHINGTON — Homeland Security Investigations (HSI)and INTERPOL have joined forces to warn the public against purchasing alleged COVID-19 vaccines and treatments online.

With criminal groups producing, distributing and selling fake vaccines, the risks to the public are clear: these can include buying a product which not only does not protect against COVID-19, but poses a serious health hazard if ingested or injected. Such products are not tested, regulated or safety-checked.

Legitimate vaccines are not for sale. They are strictly administered and distributed by national healthcare regulators.

“Counterfeit vaccines threaten the health of consumers who are duped by nefarious actors seeking to exploit the pandemic situation for financial gain. HSI and its law enforcement partners will vigorously investigate and seek prosecution for criminals taking advantage of the public’s quest for COVID-19 vaccinations and those who endanger the lives of the very people the vaccines are intended to protect,” said HSI Assistant Director, and Director of the National Intellectual Property Rights Coordination Center, Steve Francis.

Anyone buying these products online also runs the risk of potentially giving their money to organized criminals.

Crime wave

“From the very beginning of the pandemic, criminals have preyed on people’s fears in order to make fast cash. Fake vaccines are the latest in these scams, which is why INTERPOL and HSI are warning the public to be extra vigilant,” said INTERPOL Secretary General Jürgen Stock. “Anyone ordering a vaccine online rather than obtaining it from their national provider, will be buying a fake product.”

“The networks behind these crimes have global ambitions. No country or region can fight this type of crime alone. INTERPOL is assisting law enforcement around the world to both identify criminal networks and to dismantle them,” added Secretary General Stock.

Following a global alert issued by INTERPOL in late 2020 the world police body recently announced the first internationally linked arrests and seizures in connection with fake vaccines after criminal networks were disrupted in China and South Africa.

INTERPOL has also been receiving additional information on fake vaccine distribution and scam attempts targeting health bodies, including nursing homes.

“HSI will continue to work with INTERPOL to coordinate investigations targeting every level of the transnational criminal organizations trafficking in counterfeit COVID-19 vaccines,” added Francis.

Online scams

An emerging trend has seen cybercriminals set up illicit websites claiming to be legitimate national and/or world organizations offering pre-orders for vaccines against the COVID-19 virus. These websites offer payments in bitcoins and other payment processing methods.

Using trademark logos of major pharmaceutical companies producing approved COVID-19 vaccines, the fake websites are suspected of being used to conduct phishing attacks and/or dupe victims into giving charitable donations.

In addition to opening up their computer to cyberattacks when attempting to purchase alleged COVID-19 vaccines online, people also run the risk of having their identity stolen.

In December 2020, HSI seized two websites purporting to be those of biotechnology companies developing treatments for the COVID-19 virus. Instead they appeared to have been used to collect the personal information of individuals visiting the sites, in order to use the information for criminal purposes, including fraud, phishing attacks, and/or deployment of malware.

Ransomware attacks have also been conducted against hospitals, laboratories, local governments and other targets, remotely blocking computer systems and demanding a payment to release them.

Given the need for a global response against these types of cyber-enabled fraud and financial crime, INTERPOL created the Global Financial Crime Task Force (IGFCTF) in 2020 with member countries in order to enhance international cooperation and innovation with public and private sector partners.

To report suspected illicit criminal activity or fraudulent schemes related to the COVID-19 pandemic, email [email protected].

Domestic and International Background Investigations

NY Lic: 11000095379

Certified CII: M887

INTERNATIONAL CONSULTANTS & INVESTIGATIONS, INC.

Website:  www.icicompanies.com

 

ICI provides domestic background Investigations for a fee of $250.00 which also includes credit reports.  Copy of a driver’s license and social security number is required.

International fees are quoted based on the country of origin.

The consent form you will receive is only required for credit reports and must be legible and completed in full.

  LICENSED IN NEW YORK, CERTIFIED INTERNATIONAL INVESTIGATORS (CII).

Contact numbers:  212-582-3115 NY – 866-977-3700 Intl. – 917-609-1026 Mobil.

Email: [email protected]

 

Earl R Johnson PhD, CII

President

 

 

ATM Users – Beware!

ATM Users – Beware!

ATM users be advised, this counterfeit $20.00 bill, seen below, is one of 100 inserted into an ATM machine in one stack; this is what placed it out of order.  The perpetrators planned to recover an advance fee from the bank of $200.00 utilizing a bank account opened with a stolen identity. This is just one scam involving the ATM machines of major financial institutions as well as the smaller regional banks.

CONCERNS:

First main concern:  bad guys will intentionally place a machine out of order utilizing a jamming device to set up an armed robbery while a technician is repairing the system.  The bank customer may also be forced at gunpoint to withdraw money by an armed robber who will remove the “jam”.  This, unfortunately is more common than most expect, especially at night in remote locations.  Remember,   each ATM machine contains substantial amounts money and is, therefor, a popular target for thieves.

Second main concern: there are mutable capabilities provided bad guys via high tech to obtain your personal data including your account information even as you use the machine.  Avoid using machines not owned by financial institutions such as those found in bodegas, convenience stores, etc.

In the past, a criminal could steal the whole ATM machine.   Mega structures containing these machines have made it very difficult if not impossible to succeed at that.  More reason, therefor, for you to be concerned that you are the “soft” target.

You must be always alert, avoid late night visits to ATM’s in areas of large shopping malls; especially stand alone island machines.  Make sure you observe the surrounding area looking for individuals standing around, often under the influence of alcohol or drugs.  At drive-up machines, as you approach the kiosk, be aware of occupied cars in an overlook position within the area of the ATM.

While utilizing an ATM system: 1) maintain due diligence, make sure you’re not being watched and/or someones has not sidled up to you, 2) If you drove up to a system, once again keep your eyes open for approaching individuals during or persons loitering in a automobile or being a column, 3) avoid machines not operated by financial institutions and 4) If possible avoid late night visits to utilize the ATM system.

Emerging Cyber Security Threats, 2021 and Beyond – Part 3

Internet of Things – The internet of things is exploding. Everything around us is becoming “intelligent” and connected. From the refrigerator that tells us when we need to buy more food, to the connected thermostats and light bulbs in our homes, everything is getting a chip inside. This means that hackers have new ways to get into our homes. There have been many reports of a hacker taking control of a baby monitor and was talking to the child through the internet. Home camera systems allow for hackers to watch our every move. They know when we are home, and when we are not.

One of the major areas of concern for IoT security is with medical devices. There have been numerous recent cases of vulnerabilities with connected medical devices that lacked security to keep hackers from making changes to medication dosages.

With the internet of things, we must begin to have a standard of security before allowing these technologies in our home. We are constantly researching new “IoT” items and looking for the vulnerabilities. We work with manufacturers to plug these security holes.

Mobile vulnerabilities – There are now malware and ransomware specifically designed for mobile devices that can lock your device or steal data from it. Hackers are using smart phone vulnerabilities to track people with GPS. We have found many cases where people were surveilled by criminals after having their phone infected. Hackers are also using ransomware to lock your smartphone and ask for money to unlock it. In some cases, this malware allows the criminals to steal valuable banking data from your device which can give them access to your bank account.

With many businesses having Bring Your Own Device (BYOD) policies, enterprises must be aware of the risks of mobile devices being active on business networks. With the lines between business and personal usage of mobile devices being blurred, there is an increase for the business that allows personal devices to be used for business purposes.

Careers in cyber security – There is a tremendous shortage of qualified candidates with cyber security skills. There is an estimated 1 million unfilled cyber security jobs across the globe. By 2025, it is expected that there will be over 1.5 million vacancies unfilled.

In the US, not a single one of the top 10 computer science universities require a cyber-security course in order to graduate. Higher education needs to begin to start cyber security education programs in order to give the workforce of the future the skills they need to succeed.

As the world becomes more connected and reliant on technology, the need for cyber security will only grow. Now is the time to start getting involved, start educating, and start securing the future.

Emerging Cyber Security Threats, 2021 and Beyond – Part 2

There is no denying that the world of cybercrime has changed the way businesses think about security. Not only do you need to consider physical security but also your digital security. Everything in your business is at risk if the business has an internet connection. Intellectual property, trade secrets, personal data, financial data are just a few of the things that hackers will try to steal.  This essay continues our discussion on Cyber Security threats, 2021 and beyond:

Ransomware – Ransomware is becoming a household name. Ransomware is a computer infection that encrypts the data on your computer and asks for money for the decryption keys. While ransomware is becoming much more of a mainstream cybercrime today, believe it or not, it has existed since 1989 when the first version was mailed out to the participants of a World Health Organization conference on a 5 ¼ inch disks and the victims had to mail the ransom to a Post Office Box in Panama.

The use of digital currencies like Bitcoin have replaced the old ways of collecting funds. Due to the anonymity of Bitcoin and other digital currencies,  tracking down perpetrators of ransomware is more difficult. While Bitcoin does have an indelible ledger of transactions where you can track the flow of the money, there are no names associated with the accounts in the ledger.

The newest versions of ransomware steal your files before locking them. We have seen a large number of attacks that have stolen critical data out of the businesses, schools or hospitals.

Ransomware has seen a 165% increase during 2020: the UK reports that Britons are seeing more than 2000 attacks per day. The makers of Emotet and Trickbot are rumored to have made over $325 million in ransom since the first version.

Denial of Service attacks – Political statements seem to be the main motivator for Distributed Denial of Service (DDoS) attacks and countries like Turkey have seen incidents increase to over 30,000 occurrences each day. The US has overtaken all other countries as the main target for attackers and cyber criminals have attacked news agencies, corporations and governments around the world in an effort to take their computer systems and websites offline.

A common misconception about DDoS attacks is that they only affect a business with a website which is inaccurate. A DDoS attack aimed at a business can shut down its outgoing internet access by flooding the connection with so much incoming traffic that nothing goes out. This means that all cloud services will be inaccessible and email will not be delivered,

Email phishing schemes – Phishing schemes are used to target individuals with online access to bank accounts, credit cards, etc. and they have become a major source of information and money for cyber criminals. The new term “whaling” has been coined for large attacks. In the US, we have seen emails appearing to come from a company CEO requesting wire transfers from the accounting departments to pay urgent invoices which have resulted in the money being remitted to fake vendors. Other attacks have targeted the Human Resources Department asking for information about employees. These attacks have led to leaks of social security numbers and other sensitive employee data. Mattel lost $3 million in a phishing scheme that appeared to be a legitimate invoice for goods that turned out to be fake. Luckily for Mattel, they were able to recover the funds with the assistance of the Chinese authorities. Most companies are not as fortunate.

Known Vulnerabilities – Most firewalls require a reboot following patching so most companies schedule quarterly, bi-annual, or annual updates. This regularity in scheduling leaves enterprises open to attack.

The Panama Papers leak, for example, has been attributed to outdated, unpatched software running customer portal and email servers.

The list of known vulnerabilities is growing each day and information about these vulnerabilities has become public knowledge.  Microsoft reported cyber criminals targeting so-called “zero-day vulnerabilities” impacting Microsoft Internet Explorer and HP’s 2019 Cyber Risk Report found that 44% of breaches in 2019 came from vulnerabilities that are two to four years old. This indicates that enterprises are not taking updating the hardware and software on a regular basis seriously – even the “big boys” are vulnerable.