Robert Siciliano

Last updated
Robert Siciliano
Robert L. Siciliano.jpg
Self-portrait photograph
Born (1968-05-25) May 25, 1968 (age 56)
Occupation(s)Author, Security Analyst
Notable work“Identity Theft Privacy” (2018), [1] “The Safety Minute” (2003) [2]
Website safr.me

Robert Siciliano (born May 25, 1968) is an American security analyst, author and media personality. He delivers presentations throughout the United States and Canada on identity theft protection and personal security, [3] including self-defense. [4]

Contents

Siciliano has appeared on United States–based television programming such as The Today Show , Anderson Cooper 360° , CNN, MSNBC, Fox News, CNBC, Inside Edition , Tyra Banks Show , Sally Jesse Show, Montel Williams , Maury Povich Show , Gayle King Show and the Howard Stern Show . [5] In addition, he has been quoted in American news print publications such as USA Today , Forbes , Cosmopolitan , Good Housekeeping , The New York Times , Los Angeles Times , Washington Times , Chicago Tribune , Boston Globe , and Entrepreneur. [5] Siciliano serves on the board of directors for the Identity Theft Resource Center, [6] contributes to the Realtor Safety Initiative Team for Realtor Safety Week, [7] and is a regular keynote speaker at security-related events.

Life and career

Robert Siciliano grew up in and around Boston, Massachusetts. Robert earned his certification in Private Investigations from Boston University, as well as his certificate as a Certified Speaking Professional from the NSA (National Speakers Association). [8] For the last 20+ years, Siciliano has been refining his rhetoric, content, message to carry out his mission of informing the public on the issues and solutions surrounding security issues. [5]

Talk show host Montel Williams was the first to broadcast Siciliano nationally. [5] Show producers worked with Siciliano to develop scenarios where he would socially engineer his way into resident's homes in Elizabethtown, New Jersey, posing as a utility worker. [9]

After the September 11 attacks, Siciliano provided commentary as a news correspondent in regards to many security issues such as school shootings, [10] workplace violence, privacy issues, [11] child abductions, and travel security. [12]

In September 2009, Siciliano conducted an experiment that tested the ease of buying and deploying a retail ATM and as a result raised a few eyebrows in the ATM industry. He was able to purchase an ATM for US$750.00 on Craigslist.org, then program and deploy the retail ATM without any red tape or paperwork registration. [13]

On April 15, 2013, Siciliano ran the 117th edition of the mass-participation Boston Marathon as a charity runner for Boston Children's Hospital. Roberts experience during the bombing was chronicled by the Boston Globe. [14]

Keynotes

Books authored

Siciliano is the author of five books:

  1. Siciliano, Robert. The Safety Minute: How To Be Safe In The Streets At Home And Abroad So You Can Save Your Life! 1996. SafetyZone Press. Boston, MA. ISBN   0-9648126-2-2
  2. Siciliano, Robert. The Safety Minute: Living On High Alert; How To Take Control Of Your Personal Security And Prevent Fraud. 2003. SafetyZone Press. Boston, MA. ISBN   0-9648126-7-3
  3. Siciliano, Robert. 99 Things You Wish You Knew Before Your Identity Was Stolen. 2011. McAfee. Florida, NY. ASIN   B0060GBP8Y [28]
  4. Siciliano, Robert. 99 Things You Wish You Knew Before Your Mobile Device Was Hacked. 2012. McAfee. Florida, NY. ISBN   1937801195 [29]
  5. Siciliano, Robert. Identity Theft Privacy. 2018. Tross Consulting. Tempe, AZ. ISBN   978-0-9969500-8-4.

He has also contributed to the development of five other books, including ones such as Protect your business against threats internally and externally [30] and Riches In Niches, How to make it big in a small market. [31]

Related Research Articles

<span class="mw-page-title-main">Automated teller machine</span> Electronic telecommunications device to perform financial transactions

An automated teller machine (ATM) is an electronic telecommunications device that enables customers of financial institutions to perform financial transactions, such as cash withdrawals, deposits, funds transfers, balance inquiries or account information inquiries, at any time and without the need for direct interaction with bank staff.

<span class="mw-page-title-main">Phishing</span> Form of social engineering

Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim navigates the site, and transverses any additional security boundaries with the victim. As of 2020, it is the most common type of cybercrime, with the FBI's Internet Crime Complaint Center reporting more incidents of phishing than any other type of cybercrime.

Bank fraud is the use of potentially illegal means to obtain money, assets, or other property owned or held by a financial institution, or to obtain money from depositors by fraudulently posing as a bank or other financial institution. In many instances, bank fraud is a criminal offence.

Cheque fraud or check fraud refers to a category of criminal acts that involve making the unlawful use of cheques in order to illegally acquire or borrow funds that do not exist within the account balance or account-holder's legal ownership. Most methods involve taking advantage of the float to draw out these funds. Specific kinds of cheque fraud include cheque kiting, where funds are deposited before the end of the float period to cover the fraud, and paper hanging, where the float offers the opportunity to write fraudulent cheques but the account is never replenished.

<span class="mw-page-title-main">United States Postal Inspection Service</span> Federal law enforcement agency

The United States Postal Inspection Service (USPIS), or the Postal Inspectors, is the federal law enforcement arm of the United States Postal Service. It supports and protects the U.S. Postal Service, its employees, infrastructure, and customers by enforcing the laws that defend the United States' mail system from illegal or dangerous use. Its jurisdiction covers any crimes that may adversely affect or fraudulently use the U.S. Mail, the postal system, or postal employees. With roots going back to the late 18th century, the USPIS is the oldest continuously operating federal law enforcement agency.

<span class="mw-page-title-main">Fair and Accurate Credit Transactions Act</span> U.S. federal law

The Fair and Accurate Credit Transactions Act of 2003 is a U.S. federal law, passed by the United States Congress on November 22, 2003, and signed by President George W. Bush on December 4, 2003, as an amendment to the Fair Credit Reporting Act. The act allows consumers to request and obtain a free credit report once every 12 months from each of the three nationwide consumer credit reporting companies. In cooperation with the Federal Trade Commission, the three major credit reporting agencies set up the web site AnnualCreditReport.com to provide free access to annual credit reports.

<span class="mw-page-title-main">Lebanese loop</span> Fraud device used on ATMs

A Lebanese loop is a device used to commit fraud and identity theft by exploiting automated teller machines (ATMs). In its simplest form, it is a strip or sleeve of metal or plastic which blocks the ATM's card slot, causing any inserted card to be apparently retained by the machine, allowing it to be retrieved by the fraudster when the card holder leaves.

A credit freeze allows an individual to control how a consumer reporting agency is able to sell personal financial identity data. The credit freeze locks the data at the consumer reporting agency until the individual gives permission for the release of the data.

A money mule, sometimes called a "smurfer", is a person who transfers money acquired illegally, such as by theft or fraud. Money mules transfer funds in person, through a courier service, or electronically, on behalf of others. Typically, the mule is paid for services with a small part of the money transferred. Money mules are often recruited on-line under the guise of legitimate employment, not aware that the money they are transferring is the product of crime. Similar techniques are used to transfer merchandise illegally.

An identity score is a system for detecting identity theft. Identity scores are increasingly being adopted as a means to prevent fraud in business and as a tool to verify and correct public records.

LifeLock by Norton was an American software company active from 2005 to 2017. The company was best known for its eponymous LifeLock identity theft prevention software, now sold by Gen Digital after the latter acquired LifeLock in 2017. LifeLock's system monitors for identity theft, the use of personal information, and credit score changes.

<span class="mw-page-title-main">Credit card fraud</span> Financial crime

Credit card fraud is an inclusive term for fraud committed using a payment card, such as a credit card or debit card. The purpose may be to obtain goods or services or to make payment to another account, which is controlled by a criminal. The Payment Card Industry Data Security Standard is the data security standard created to help financial institutions process card payments securely and reduce card fraud.

Richard Todd Davis, also known as Todd Davis, is the cofounder of LifeLock, an American identity theft protection company based in Tempe, Arizona, that became a subsidiary of Symantec in 2019.

<span class="mw-page-title-main">Albert Gonzalez</span> American computer hacker and criminal

Albert Gonzalez is an American computer hacker, computer criminal and police informer, who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATM numbers from 2005 to 2007, the biggest such fraud in history. Gonzalez and his accomplices used SQL injection to deploy backdoors on several corporate systems in order to launch packet sniffing attacks which allowed him to steal computer data from internal corporate networks.

Trusteer is a Boston-based computer security division of IBM, responsible for a suite of security software. Founded by Mickey Boodaei and Rakesh K. Loonkar, in Israel in 2006, Trusteer was acquired in September 2013 by IBM for $1 billion.

<span class="mw-page-title-main">Armenian Power</span> Armenian-American crime syndicate

Armenian Power 13, also known as AP, the Armenian Mob, or Armenian Mafia is an Armenian criminal organization and street gang founded and currently based in Los Angeles County, California. They are involved in drug trafficking, murder, assault, fraud, identity theft, illegal gambling, kidnapping, racketeering, robbery and extortion. They are believed to have around 200 members and hundreds of associates, according to the U.S. attorney’s office. They are also well known for their connections with the Mexican Mafia.

Identity theft involves obtaining somebody else's identifying information and using it for a criminal purpose. Most often that purpose is to commit financial fraud, such as by obtaining loans or credits in the name of the person whose identity has been stolen. Stolen identifying information might also be used for other reasons, such as to obtain identification cards or for purposes of employment by somebody not legally authorized to work in the United States.

<span class="mw-page-title-main">Carding (fraud)</span> Crime involving the trafficking of credit card data

Carding is a term of the trafficking and unauthorized use of credit cards. The stolen credit cards or credit card numbers are then used to buy prepaid gift cards to cover up the tracks. Activities also encompass exploitation of personal data, and money laundering techniques. Modern carding sites have been described as full-service commercial entities.

Terry Cutler is a Canadian cyber security expert and teacher, often described as an "ethical hacker" for his long term work with cyber security and protection. Cutler is the founder, former CTO, and current CEO of Cyology Labs and the vice-president of cyber security at SIRCO. He is also the creator of "The Course On Internet Safety". Cyology Labs's focal point is cyber security and data safety. Prior to founding Cyology Labs in 2015, Cutler founded Digital Locksmiths, Inc. focusing on data security of cloud and mobile solutions. Cutler is an often cited source on Cyber security and has been featured on various televisions shows across Canada. He describes himself as a "cyologist", a trademarked term of his own invention for a person who works in cyber security.

Cryptocurrency and crime describe notable examples of cybercrime related to theft of cryptocurrencies and some methods or security vulnerabilities commonly exploited. Cryptojacking is a form of cybercrime specific to cryptocurrencies that have been used on websites to hijack a victim's resources and use them for hashing and mining cryptocurrency.

References

  1. Siciliano, Robert (2018-07-23). Identity Theft Privacy. Tross Publishing. p. 129. Retrieved 26 May 2019.
  2. Siciliano, Robert (2003-05-28). The safety minute : living on high alert : how to take control of your personal security and prevent fraud. Safety Zone Press. p. 153. ISBN   9780964812673 . Retrieved 26 May 2019.
  3. "Experts say laptops are the weak link in data security". Help Net Security. 13 September 2006. Retrieved 17 June 2019.
  4. "Expert Interview with Robert Siciliano on Identity Theft". Mint. 25 June 2014. Retrieved 17 June 2019.
  5. 1 2 3 4 99 things you wish you knew before-- your identity was stolen : your guide to protecting yourself from identity theft and computer fraud. The 99 Series 2011. 2011-10-01. p. 201. ISBN   978-0983212294.
  6. Lacey, Charity (2 October 2014). "Robert Siciliano of IDTheftSecurity.com Joins ITRC Board of Directors". Identity Theft Resource Center. Retrieved 26 May 2019.
  7. "Safety Resources for Associations and Brokerages". www.nar.realtor. 15 March 2012. Retrieved 26 May 2019.
  8. "The Switch to the Chip Card – One Year Later". MasterCard Social Newsroom. Retrieved 26 May 2019.
  9. "Home safe home". SheKnows. 17 March 2008. Retrieved 17 June 2019.
  10. "Homeland Security gives pointers on surviving shooting sprees | | dailyitem.com". www.dailyitem.com. Retrieved 17 June 2019.
  11. "How the FBI Cracked the iPhone Case … With a Little Help From Outside". HowStuffWorks. 7 April 2016. Retrieved 26 May 2019.
  12. "New Trends in Travel Security". Travel + Leisure. Retrieved 17 June 2019.
  13. Leyden, John (2009-11-18). "Second-hand ATM trade opens up fraud risk". www.theregister.co.uk. Retrieved 26 May 2019.
  14. Teitell, Beth (2013-05-09). "Some agonize over fleeing Marathon bombing scene". BostonGlobe.com. Retrieved 26 May 2019.
  15. "Western States Director Education Foundation". WSDEF. 2005-11-01. Archived from the original on 2008-10-11. Retrieved 2010-03-31.
  16. "NACM Midwest". Nacmchicago.org. 2007-04-19. Retrieved 2010-03-31.
  17. "Conference Schedule". Marealtor.net. Retrieved 2010-03-31.
  18. "Industrial Asset Management Council". IAMC. Archived from the original on 2010-06-13. Retrieved 2010-03-31.
  19. "Meeting Professionals International". Mpiweb.org. Archived from the original on 2012-09-03. Retrieved 2010-03-31.
  20. Archived September 2, 2006, at the Wayback Machine
  21. "Bankers' bank event focuses on tech security, ID theft | North America > United States from". AllBusiness.com. Retrieved 2010-03-31.
  22. "Get Your Game On at Realcomp's Tools Expo by Attending Robert Siciliano's Presentation…". realcomp.moveinmichigan.com. Retrieved 17 June 2019.
  23. "Protect Your Wealth Summit October". Parady Financial. Retrieved 17 June 2019.
  24. "Realtors Highlight the Importance of Defending Against a Data Breach". Athens CEO. Retrieved 17 June 2019.
  25. "Identity Theft Big Topic at Fall Leadership Development Conference". Michigan Credit Union League. Retrieved 17 June 2019.
  26. "Chicago BTA Q1 2015 Chapter Meeting". Chicago Business Travel Association. Retrieved 17 June 2019.
  27. "Agent & Client ID Theft Security & Awareness – Triple Play REALTOR® Convention & Trade Expo". Realtors Triple Play. Retrieved 17 June 2019.
  28. 99 Things You Wish You Knew Before Your Identity Was Stolen, Amazon, retrieved September 11, 2012
  29. Siciliano, Robert (2012), 99 Things You Wish You Knew Before Your Mobile Device Was Hacked, DocUmeant, ISBN   978-1937801199
  30. Friedmann, Susan (2009). Riches in Niches: How to Make It Big in a Small Market: Easy Read Comfort Edition. ReadHowYouWant.com. p. 143. ISBN   9781442956933 . Retrieved 26 May 2019.
  31. Friedmann, Susan (2009). Riches in Niches: How to Make It Big in a Small Market: Easy Read Comfort Edition. ReadHowYouWant.com. p. 143. ISBN   9781442956933 . Retrieved 17 June 2019.

Appearances in media