Home‎ > ‎Be Alert‎ > ‎


Updated 06/16/2017
                         ... THINGS LOOK STRANGE
   "Hovering" over an item involves moving the mouse over
   text, pictures and links within the document but NOT
   clicking on anything. This will result in the ACTUAL versus
   SHOWN link that is hidden behind the text, pictures or
   links within the document.

      TIP 1: Computer people, like so many others, do not find value in using long strings of
                numbers and letters to help them get back to what they did on a computer as you
                may never remember it. That is the point of the "Bad Guys" ... make their creations
                appear to be Operating System files so that other IT people won't go there to wipe
                it out.  This is a
RED FLAG of something very wrong.

      TIP 2: When you realize all the links being revealed to you are the same, this is a clear
                RED FLAG.  The link to order an item, see a picture or unsubscribe will NEVER be
                the same link

 Big Operation uses a Personal or Foreign E-mail Account?
  1.  Would Microsoft send you an e-mail from newflash@Apple.com ?  Highly unlikely.
     Yet people ignore these little things which are SCAM
    RED FLAGS that something
     is very wrong with the e-mail and content.

  2.  Big US Entity doing business ONLY in the US uses Foreign E-mail Account?
     The FHA (Federal Housing Authority) would use their own e-mail server to send notices
     out encouraging people to refinance and NOT an e-mail address in the United Kingdom.
     The US-based FHA would not use a non-profit foreign-based e-mail account service and
     would not use an e-mail account containing cryptic characters in the e-mail address.
     These are
    RED FLAGS you do not want to miss as they are so easily spotted.
              Actual e-mail address displayed: xb-G4p1-ol4@iQ1e6jE.ostioviltif.org.uk

 Why are there multiple pairs of the "<" and ">" signs in their e-mail address?
 This is NOT a legal e-mail address but can be inserted by the sender. This is possible due to
 the how the early e-mail systems were designed. Hopefully those in charge, the Internet
 Engineering Task Force, will redesign the rules and process for greater traceability and
 enhanced security.  These are
RED FLAGS which prevent you from using your e-mail tools
 the how the early e-mail systems were designed. Hopefully those in charge, the Internet
 Engineering Task Force, will redesign the rules and process for greater traceability and
 enhanced security.  These are RED FLAGS which prevent you from using your e-mail tools
 to block these e-mails due to the illegal characters.

   First problem, The Bad Guys do NOT have to use a legal or legitimate e-mail Address. In fact, no one
   has to as this is an old design defect way back when in the early days.  There were only a few hundred
   people using this in the United States and the World at that time. One ever thought about validating
   the e-mail address from the sender, only the e-mail address for the recipient.

   E-mail addresses are easy to come by as you can use them for a few days before someone catches
   on to you having hacked into their computer system and created an e-mail service on their computer.
   You see a legitimate company name and assume it is legitimate.  Not always the case.  Look how long
   the e-mail address is and the complexity.  These are often the signs of a system being hacked and
   used inappropriately.  The computer may also be a new website that was turned on and the computer
   was working but the owner had not started doing any work with the computer yet.

   I'm an IT person and IT people like to keep things simple, clean and easy to remember. We do not
   create files that are 30 or more characters ... we most likely won't remember it.  The bad guys, they
   only need to remember it for perhaps an hour before they stop using that computer and let it do the
   criminal acts they have setup.  Thus long names with letters and numbers that do not make any sense
   are often the work of The Bad Guys.

   A frequent scam e-mail may make a occurrence which poses as an e-mail from a government agency
   regarding outstanding:
        1)  Toll Charges
        2)  Parking Tickets
        3)  Unspecified Offence

   The e-mails have no specific information about you, your vehicle or location to that you will create
   a possible time when you may have created this problem.  There IS AN ATTACHMENT to help you
   understand what to do, where to go and how to resolve this manner.

   Government agencies as a general rule, or per the law, CAN NOT use e-mail for legal matters. They are
   often required to use the United States Postal Service for delivery of all notifications.  The Bad Guys
   can't send you a letter without revealing their location, they can't send you an attachment in a letter,
   and their scams are generally shutdown faster than the letter would arrive to you anyway.

   Second, notice the e-mail is sent to you but your name never appears in the document, nor does your
   address, information about your car if that is involved in this matter and of course no location.
   This is difficult to get right without tipping you off to their scam so they do not provide it.

   Any e-mail you receive that does not have information about you WITHIN the e-mail itself is a good
   potential for a scam
.  If they have the information to generate a legal document for the attachment
   they have the information to address you directly in the e-mail.