The first meeting of the Cabernet Neighborhood Watch Committee was held on November 8, 2022 at 6:00 p.m. in the Raleys meeting room. Altogether, there were 15 people in attendance from our community in Cabernet Highlands.

Officer Andelin from Reno Police Department was on hand to offer assistance and advice on how best to proceed with forming and maintaining a neighborhood watch committee. He spoke with the attendees, querying their concerns. Many of the issues centered around car burglary and speeders.

Also present was Reno City Councilperson Bonnie Weber. Ms. Weber Hosted a meeting at Alice Smith School several weeks ago to promote Neighborhood Watch groups throughout Ward 4. She is committed to community outreach programs and has been instrumental in several improvements in the North Valleys.

Overall, the crime rate in our neighborhood has been typically very low. However, as the North Valleys continue to grow, the goal of the Neighborhood Watch group is to ensure the security of all our neighbors. Neighborhood Watch programs through, “Neighbors helping Neighbors” ensures the peaceful enjoyment of our homes and families.

The outcome of the first meeting was to establish a series of ongoing meetings to assist with teaching our neighbors better ways to ensure safety for their families and property; to encourage greater participation from more people; to provide communication resources through web page, email, and phone trees that inform people in our community; and to request from local agencies solutions to reduce traffic problems and crime going far into the future.

Officer Andelin spoke on the importance of reporting issues to our community leaders through local agencies.

For Emergencies call 911

For Non Emergencies call 775 334-2121

All others call Reno Direct 775 334-4636

Other sources of neighborhood information were discussed. Some suggestions were to attend the Neighborhood Advisory Board meetings held on the third Thursday of each month. Information is available via Reno City Neighborhood Advisory Board page at: https://www.reno.gov/community/your-neighborhood/ward-4

The next meeting of the Cabernet Neighborhood Watch group is tentatively scheduled for December 5, 2022 at 6:00 p.m. in the Raleys community room.

For information or to get involved, please contact Pat Shea or sign up on the website providing contact information.

Pat Shea 775 721 6742 pat100shea@gmail.com

Minutes Archive

News Archive

News, Safety Pat News, Safety Pat

Fraud Targeting Seniors

O’Keefe Media Group Uncovers More Evidence Of Campaign Finance Fraud Targeting Seniors

A citizen journalist working with the O’Keefe Media Group recently uncovered more evidence of what appears to be campaign finance fraud targeting senior citizens.

Mr Rubio

In March, OMG founder James O’Keefe traveled to Maryland and spoke with residents whose names and addresses were linked to tens-of-thousands in donations to ActBlue and other left-wing organizations or political candidates. Almost all residents said that they had donated to ActBlue and other campaigns, though all denied making large contributions.

Federal Election Commission data analyzed by Election Watch, a citizen journalist group, revealed that hundreds of senior citizens across the nation had been making hundreds and, in some cases, thousands of individual donations to ActBlue and other campaigns.

One senior citizen had made 1,009 individual donations for a total of $18,849.77 since 2022. While she did say that she had made donations to ActBlue and Joe Biden’s election campaign, she vehemently denied having donated more than $18,000 and was shocked by the news.

A citizen journalist in New Jersey recently uncovered additional evidence of likely campaign finance fraud targeting senior citizens in New Jersey.

Campaign Finance Fraud

One elderly woman began sobbing after being informed that over $86,000 had been donated to left-wing political campaigns in her name. “86-thousand-dollars? Oh my, that’s…I… I did that?” the distraught senior citizen said. Over 5,300 individual donations had been made in her name over the course of two years. The donations ranged from just one dollar, all the way up to $5,000.

“I don’t remember giving hundreds of dollars to Pelosi. I was just giving more like 10 dollars, I don’t remember,” the woman said while looking at the list of contributions made in her name.

On September 30, 2022, 108 donations were listed in her name. “In one day? No wonder they keep contacting me as if I’m – and they keep giving me recognition as if I’m one of the best that they have,” she said.

Another woman was shocked to learn that she had supposedly been donating to ActBlue every other day in 2021 and 2022. She stated that this was impossible since she works six days a week as a nurse.

In April, Senator Marco Rubio (R-FL) called for an investigation into ActBlue following the revelations. “I write to urge the Federal Election Commission (FEC) to investigate the purported presence of widespread fraudulent donations being reported to the commission by ActBlue, a Democratic campaign conglomerate,” Rubio wrote in a letter to the FEC.

“I urge the commission to investigate ActBlue’s reporting and insufficient security guardrails,” the letter went on to say.



Read More
News, Safety Pat News, Safety Pat

Cyber Threats

This is not the typical security issue discussed in the domain of Neighborhood Watch. However, in recent years, we see our home lives disrupted by ever increasing attacks on our financial and social media accounts.

There are many subjects that I could address each week. As I have long been in the computer business, I have chosen cybersecurity threats as my subject.

What is a cybersecurity threat?

Any technique to acquire sensitive personal information is a cybersecurity threat. Cyber Security is any act or technique you chose to use to protect those same accounts.

This gives us two areas we need to address. First what is a threat. Second, how to defend against a threat.

Here is a short list of the various types of Cyber threats:

Computer Viruses

Threat

This is the most well know of all cyber threats. A computer program written to alter the way a computer operates. These programs are loaded on to your computer without your permission or knowledge. Once on your computer, the virus replicates and executes itself. This is when the damage begins.

Protection involves a careful evaluation of free software and download from file sharing sites. Email from unknown senders are a popular method to deliver a virus to you computer.

Protection

Most modern web browser today have security settings that can be invoked to defend against online threats. One of the best ways to fend off viruses is up-to-date antivirus software. There are many vendors of anti-virus software, and some are free. I personally use 2 that are free; Sophos and AGV.

Spyware

Threat

Any program that monitors your online activities or installs programs without your consent to capture personal information is a spyware package. While this may be difficult to hear, reading the terms and condition of a software package or website is a good way to develop an understanding of how your online activity is being tracked. We are all being tracked online. Adware, while mostly benign, tracks your online activity to show you relevant product ads that you may find interesting. Google and Facebook are under investigation the last couple of years for monitoring, collecting and the selling user account personal information.

Protection

Anti-virus software with Spyware protection. Again AVG Anti-virus software is a free package.

Hackers and Predators

Threat

People, not computers, are responsible for all cyber threats. Hackers and predators are computer programmers who victimize other for their own profit and greed. The break into computer to steal, change or destroy information in form of cyber terrorism. They can compromise your credit card, bank accounts, lock you out of your computer and steal your identity. All of these things have happened to me personally. Online tools with your bank, credit card provider, and internet service provider can help protect against Identity theft.

Protection

Call you credit card provider and ask to enroll in their security program. On all of my cards that service is free. Call your bank and ask to be enrolled in their security program. These services have caught at least 5 incidents in the last year where someone was using my card information in Florida and Las Vegas.

Phishing

Phishing Scams

Threat

Posing as a trusted person or business is the trade craft of the email phishing attack. Phisher attempt to collect sensitive financial or personal information through fraudulent email or text messaging. Phishing attack are by far the most successful method to accomplish a computer security breach.

Protection

Antivirus programs with identity theft protection can be ‘taught’ to recognize phishing threats.

I look for several key elements in the email that are ‘tells’ of a phishing email.

1)Message is sent from a public email domain

  • Legitimate companies do not use @gmail.com. Even Google does not use @gmail.com

2) Domain name is misspelt

  • I bet you have seen this recently; msonlineservices@microsfrtfonline,com. The spelling error is deeply embedded in the domain name

3) Email is poorly written

Why are so many phishing email so poorly written?

  • Scammers aren’t very good at writing.

  • Many are from non-English speaking countries

  • Current technology for language translators programs have some issues with syntax

4) Suspicious links and attachments

  • “Payload” is the term used for Links and attachments delivered in phishing emails

  • Think of Payload as a bomb.

  • Do not click on suspicious links or attachments (even if it is from someone you know)

5) Message creates a sense of urgency. These are some messages I have seen in the last week.

  • “Your email account will be closed”

  • “Your computer may be infected so click here immediately”

  • “This deal will expire in 60 seconds”

Many of these hacks seem to come from a friend or business you know citing a reference to a link or photo they wish you to see. A good habit to adopt is to roll over the (From Name) to see if it is really from a trusted source. Many times the email address will NOT be from your friend.









Read More