Showing posts with label shadow puppets. Show all posts
Showing posts with label shadow puppets. Show all posts

Sunday, August 2, 2020

Ways Fraudsters Can Fool You

Ways Fraudsters Can Fool You




Thank you for visiting my blog! Here I strive to empower you with cyber security awareness and DIY puppet activities. If you find this content helpful, please sign up for my FREE monthly safety newsletter at https://shadowworldpresent.wixsite.com/safe.

A segment of my web series "Cyber Brats" was recently shown at the StringsNThings virtual puppet festival from San Pedro, CA in July! Be sure to check it out above!


2019 was a profitable year for fraudsters. Nationwide, they targeted their deceptive tactics at slightly over 16 million consumers. Based on the statistics from the Federal Trade Commission, identity theft alone saw a lost of 17 billion dollars.

This year, with the avalanche of the COVID-19 paralyzing our economic system, con artists has already taken advantage of cooking up new types to take advantage of the uncertainty.  Stories relating to unproven treatments, medicines, fake contact tracing agencies, and so many more hideous acts has sprung up around the country.

Next year, when the tallies for this year is compiled by the FTC, Better Business Bureau, and AARP, I'm sure the figures from last year will show an increase.

Vigilance is the key to decreasing our vulnerabilities to fraud and I found what better way than to share 13 common scams listed by AARP. By comprehending the basics safeguards in protecting out our finances, we can adapt to making better decision in the course of our daily lives.

At the bottom preceding this content I will also include links to resources that can either help you with a concern or provide additional information regarding online safety.

Identity Theft



Why does identity theft occur? Have you ever given that much thought why computer criminals do this? Here our 2 primarily reasons. 
  • To falsely apply for a credit card
  • To use someone's profile to get government benefits. 

How is this done?

  • An example of phishing takes form when you are asked to clear a bank account problem by verifying it with a social security number, bank routing number, or birth date. 
  • Gather information by dumpster diving. This can also be taken from inside the office or social media websites.
  • Fake job listings can also trick you into voluntarily sharing sensitive information on a job application. Fraudsters harvest this data and will use or market the contents on the dark web for profit. 


Investment Fraud

Gold Coin Scam 

Scammers will use the struggling economy to pitch this false narrative. You are urged to invest in gold and silver coins because they will eventually spike up in value. These so called precious metals are sold at a 300 to 500% mark up which means you will lose rather than reap the benefits. 

Free Lunch

The goal is to convince you to show up at a seminar and invest in a great investment right away. You are not given the option to thing it through and if you don't commit, you will miss out on the opportunity. The truth is they want your hard earned money and they are gone like the wind. 

Oil and Gas Scams

The ploy is to convince you that a company is using a new technology to drill for oil in an area not frequented prior. Never will they inform that legitimate energy investments carry risks. Also don't expect them to indicate they are a registered broker or registered with the state. 

Additional Scams You Should Know About


Fake Checks

Out of the woodwork you get this call informing you that you won a big prize! But there is a handling fee! They expect you to pay it because they are sending you a cashier check that will cover the processing fee. Ultimately, this check does not clear you are stranded without your prize after paying the fee. Talk about bummer. 

Tech Support

A phone call or pop up on your computer screen tells you your system is infected with a virus. These con artists want you to contact them and give them remote access to your device. What they really want to do is install a real virus and charge you to remove it. Afterwards, they might compel you to buy a useless computer maintenance program. 

Disaster-Related Charity Fraud

This is a prime example of scammers chasing headlines to line their pockets. They do this at the expense of victims who are really in need of help. Beware of phone websites, suspicious calls, and questionable emails. 

Sweetheart Scams

Dating websites is a beehive for con artists seeking to build an emotional connection to victims. Once this is done, he or she asks for money. These internet criminals have no intentions on ever meeting their victims and will resort to communicating via instant messaging and plain old emails.

Timeshare Properties

If you are looking to cash in on your timeshare company there just happens to be a company claiming to have a specific buyer interested. Just pay an upfront fee to proceed. After you do this, this contact person disappears and you are left scratching your head after signing all that paperwork that looked alright to you. 

The Grandparent Scam

What grandparent can refuse a grandchild in some sort of legal trouble. This false narrative comes by way of phone call in the middle of the night from thugs purporting to be a relative in trouble. Victimized grandparents have lost thousands of dollars to the type of scams.  (Just call the parents or the police department in question to confirm the story first!)

Foreign Lottery Scam

It's impossible to win. They are illegal here in the United States. Of course their agenda is to have you pay "taxes" or  a "processing fee" claim your earnings. Please don't wire anything. You didn't win the lottery. 

General Tips

  • Protect your Social Security Number and Personal Information
  • Monitor Your bills and financial statements
  • Check your Credit Reports
  • Safeguard Personal Identification Numbers (PINs and Passwords)

Online Communication

Did you know your can report or forward suspicious emails to the Federal Trade Commission at spam@uce.gov? 

U.S Mail

Protect your incoming mail. You can stop pre-approved credit cards by calling 1-888-OPT-OUT or visiting https://www.optoutprescreen.com

You can also cut down on junk mail at https://www.dmachoice.org

Do Not Call Registry 1-888-382-1222 or https://www.donotcall.gov

Verify charities at https://www.give.org or at https://charitynavigator.org

Thank you again for visiting my blog! Here I strive to empower you with cyber security awareness and DIY puppet activities. If you find this content helpful, please sign up for my FREE monthly safety newsletter at https://shadowworldpresent.wixsite.com/safe.

Stay Safe and Stay Secure!

Ken Harris
Cyber Brats Title Card










Wednesday, July 8, 2020

Email and Phishing Scams






Thank you for visiting my blog! Here I strive to empower you with cyber security awareness and DIY puppet activities. If you find this content helpful, please sign up for my FREE monthly safety newsletter at https://shadowworldpresent.wixsite.com/safe.

I just released a funny adult puppet video about a prize scam! Be sure to check it out below!



Email and Phishing Scams


Last year in the U.S alone, an estimated 16 million victims lost 17 billion dollars to identity theft. That’s just one type of scam. 

I’m sure if AARP, the Better Business Bureau, and other organizations intended to protect the financials security of Americans, combined all their figures from reported swindles, the final tally would be mind-blowing. 

Now with the COVID-19 pandemic creating fear and uncertainty everywhere, con artists are conjuring up new ways to squander people’s finances and personal information. 

This gives them motivation to reach out with offers too good to be true and the impersonation of government agencies to steal personal information. 

Email and phishing cons are just some of the tactics these criminals apply. Cyber attackers send thousands, if not millions of emails daily. They are not sure who get these messages; but their objective is to trick a victim into some call of action. It includes the following.

  •  Clicking on a link
  • Opening an attachment
  • Completing a form




A harmless action can get you tangled. 

Since scammers are attempting to “phish” as many victims as possible, their messages are usually directed to “Dear Customer” or other generic greeting. 

The bad guys creates a strong sense of urgency or curiosity to the receiver. They pretend be an official organization like a bank or may impersonate a local, state, or federal agency. 

Generally, these fake senders will have grammar or spelling mistakes in the content of these email messages. Another clue to look out for is if the email originated from a personal email account such as an @gmail.com address. Also, by looking at the top left, the “From Email Address” line may appear like it generated from an official organization. But the “Reply-To-Address” is someone’s personal email account. 

Here are some other clues that should raise red flags.

  • Messages requesting highly sensitive information like credit card number or password.
  • You receive a message from someone you know but the tone or message does not sound like him or her. 

It is easy for a scammer to create an email that appears to be from a friend or coworker. If the message includes a clickable link, you can hover your mouse cursor over it to reveal the link’s true destination. 

Make this a common practice to confirm if you being directed to a legitimate website. Even on many mobile devices, pressing to hold the link will also show the true destination. Instead of clicking on a link, you can type the website address directly into your browser. 

Why respond directly to a suspicious email claiming to be your bank when you can use the browser? 

I wouldn’t open any attachments I wasn’t expecting. The last thing I want is opening an infected attachment and subjecting my computer to malware. Not all antivirus can detect malware. 

Take care to not expose sensitive information when using email or messaging. Email features, such as auto complete, make it easy for you to mistakenly email the wrong person. 

Once you send an email out, you cannot retract it. Also, be careful with the “Email Reply-All Feature” thread as you may not want to respond to an entire group of people who received the same email. 

Learn more about scam prevention with my use of puppets at https://shadowworldpresent.wixsite.com/safe

My Youtube channel has many more videos on cyber security awareness and scams at 

PS If you haven't already check out AARP's  Scam Tracking map at https://www.aarp.org/money/scams-fraud/tracking-map/ to checking on existing scams in your area. Vigilance is key!

Sunday, June 14, 2020

Introduction to DIY Shadow Puppets








Thank you for visiting my blog! Here I strive to empower you with cyber security awareness and DIY puppet activities. If you find this content helpful, please sign up for my FREE monthly safety newsletter at https://shadowworldpresent.wixsite.com/safe.




It is simple to stage a shadow puppet show. 

Do your kids enjoy arts and craft? Do they like to tell stories? Are they fascinated by the interactions of light and shadows? 

This is easier thank you think. Of course it will requires some exploration, trial by error, and creativity (kids can surely help you with that compartment) with some supplies collecting dust in your attic, basement, or garage. 

You will need these items.
  • Card Stock Paper
  • Scissors
  • Bamboo Skewers (to operate puppet)
  • Brass Fasteners (for puppets with movable limbs)
  • Electric Tape
  • Cardboard Box
  • Desk Lamp or other light source
  • wax paper or parchment paper for theatre screen




A Shadow Prop Blast Off!

Without relying on much technology, you can make simple shadow puppets to fit any story your kids can dream of. Literally, you can construct your own theatre out of a card board box of any size to bring silhouettes to life. 

Before we proceed Astronaut Buddy Getto and his copilot Zatrix from outer space has transmitted a brief message from outer space about the history of shadow puppets. 






Aside from a lack of solitude between Buddy and Matrix, shadow puppets can allow poetic evening shows and build lasting memories.

If you prefer not to use a box for a theatre, you can still cast shadows on walls with a bed lamp using different shapes and animals. Either way, imaginations will soar.

Preparations

  • Devote about 10 minutes to think about story theme and to look for shapes or figures online or in damaged children books. 
  • You shouldn't go over 30 minutes in cutting out the puppets
  • It will take about 20 minutes to install theatre (If you wish to have one) and cut out a circle (size of a large tape) in the rear to connect light source (I used a desk lamp).

Activity

If you wish to put on a live show for family and friends with a theme geared for very young children, I would recommend the duration of it not to exceed past 10 or 15 minutes. Children have short attention spans and will want to participate! 

The location of the performance should be indoors, preferably in a room that can easily be made dark. 



Light

When I started off doing shadow puppetry a few years ago, it felt like I was involved in some interactive science test. A lot of time was spent I experimenting with different light and learning how it worked to produce the best effects. 

Light travels fast! 186,000 miles per second, or 300,000 km per second if memory serves me right. When an object blocks the path of light, like a cut out paper figure, it creates a shadow. 

When the puppet is move back away from the screen, it appears bigger. If is shifted forward, it becomes smaller. 

Storytelling

You can choose an existing story or make up your own. Here are some suggestions to get the creative juices flowing. 
  • Does the story involve people, animals, or both? 
  • Who are the good guys and the bad guys? 
  • Is the tale happening long ago or nowadays? 
  • Where does it take place? Forest? Savannah? City? Mountains? 
  • Ensure the story is simple so that kids can tell it without a script. 
  • Come up with a cool title for your story and names for your characters. 

All Characters on Deck: Finding Images


Shadow Puppetry is a story told in shadows. You will need a silhouette for every character, prop, and set in your story. Identify the shapes you need. 

1. To accommodate varied scenes and enough twists, use at least 3 characters. For example, one hero and two villains which can be animals or humans. Utilize 3 different backgrounds items such as a tree, house, castle, etc. 

2. If you are having difficulty with finding figures, just go on the internet and type animal shape or whatever easy-to-cut-out character you can find. 

3. Select images with simple silhouettes. Shapes with lots of small legs or pieces to cut out in the middle  are difficult to make and product less distinct shadows. 

4. Resize images before printing them. Ensure each element is right relative size to other elements (for example; a cat should not be bigger than a lion).

5. Cut out with scissors. Use a craft knife for delicate areas. Children will need assistance with more detailed objects. 

Astronaut Buddy Getto

TIPS

You can hold printed shape over cardstock and cut the puppet out that way. If you opt to cut the arms and legs out separately, you well need a punch holder and brass fastener to reconnect the limbs. 

An Alternative Theatre

If the card board box or wall is not to your liking, you can use a portable coat rack as a stage. 

Wrap a white bed sheet tightly around the coat rack. Fix it to the frame with hair clips or clothes pins. Now, you can take your mobile theatre anywhere in the house. Don't forget a LED clamp for light source! 

Sound Effects

If you want to put a spin to your imagination, you can add sound effects for your show. Sticks, drums, shaking water bottles, and other noises can bring a sense of awe from your audience. 


Maybe you can do something like this. 




Richard Bradshaw is the most well know shadow puppeteer. His videos actually inspired me and you may see some hints in this short video! 



I hope you enjoyed this! 

If you find this content helpful, please sign up for my FREE monthly safety newsletter at https://shadowworldpresent.wixsite.com/safe.

Cyber Brats Episode : Targeted Attacks







Article highlighting conference

  My latest article in the Point of View Community Magazine highlights my experience performing and speaking at the 13th Annual Florida Pros...