Friday 12 August 2011

Visa Card Violated Phishing Scam

Outline
Email purporting to be an alert from Visa Europe claims that the recipient's Visa card has been violated and that he or she should follow a link to validate card details.

Brief Analysis
The email is not from Visa and the claim that the recipient's card has been violated is untrue. The message is a phishing scam. People who fall for the ruse and click the link will be taken to a bogus website that asks them to provide their Visa card details and other personal information. Scammers can then collect this information and use it for credit card fraud and identity theft.


 Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 19th April 2011
First published: 19th April 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Example From: Visa Europe Alert
Subject: New Alert: Visa Card Violated

Dear Customer.


Additional security on our website bring unity and combined strength to our commitment to provide exceptional card in the United Kingdom,


it's strongly required that you should Validate your Visa Card Details. click the Validate link below


Validate card details now


This email was sent automatically please do not respond



Detailed Analysis

Screenshot of scam email According to this email, which claims to be from the European branch of credit card provider Visa, the recipient's Visa card has been violated. The message advises that it is "strongly required" that the user follow a link to validate his or her card details.


However, the email is not from Visa and the claim that the recipient's Visa card has been "violated" is untrue. In fact, the message is a typical phishing scam designed to steal financial and personal information from Visa users.


Those who fall for the trick and click the link in the scam email are taken to a bogus website designed to resemble a genuine Visa webpage. In an effort to create the illusion that the fake page is legitimate, the scammers have incorporated genuine-looking Visa logos, trademarks and formatting.


Once on the fake website, the victim is asked to input his or her Visa card number, password and other sensitive personal information, ostensibly as a means of verifying the account and rectifying the supposed card violation. All information provided on the fake website can then be collected by the criminals operating the scam and used to make fraudulent credit card transactions and identity theft.


Criminals have regularly targeted Visa card users in similar phishing scams over the last few years. Neither Visa nor any of its participating financial intuitions will ever send customers an unsolicited email that asks them to follow a link or open an attached file and provide account details. Any message that makes such a request should be treated with suspicion.


Similar scams target users of many other financial institutions as well as Visa. If you receive an unsolicited email purporting to be from a company, service, or financial institution that claims that you must update your personal or financial details, do not follow any links in the message. Do not open any attachments that come with the email. It is unlikely that any legitimate entity will ask for your personal and financial information via an unsolicited email. If in doubt about a message you have received, always check with the institution directly rather than following a link or opening an attachment.


 


 

Warning - ALDI External 4-in-1 Hard Drive Contains Built In Malware

Outline
Circulating warnings claim that a 4-in-1 Hard Drive device sold at Australian ALDI stores contains malware.

Brief Analysis
The claims in the warnings are true. AusCERT and other reliable sources have confirmed that an old version of the Conficker malware is installed on the ALDI External 4-in-1 Hard Drive devices. ALDI has reportedly now withdrawn the devices.


 Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 2nd August 2011
First published: 2nd August 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Example Subject: Aldi Computer device warning

PRODUCT WARNING


ALDI External 4-in-1 Hard Drive, DVD, USB and Card Reader Device $99


Reads and writes both CD and DVD Pre-installed 320GB hard drive
Built-in USB hub and card reader Perfect for notebooks Plug and play


This device contains malware. One of ALDI?s special buys from Thursday 28 July.


Device can steal data from computer systems and enable remote access to the attached computer system.


Ensure your computer?s anti-virus software is up to date.



Detailed Analysis
Warnings that are currently circulating via email and social media claim that a Hard Drive device sold by Aldi stores in Australia contains malware. One such circulating warning takes the form of a Queensland Police Intelligence Bulletin originally intended for internal police use only. According to the warnings, the "ALDI External 4-in-1 Hard Drive, DVD, USB and Card Reader Device" comes with malware already installed that can steal information from attached computers and allow third parties remote access.


The claims in the warnings are true. On July 28, 2011, The Australian Government Stay Smart Online Alert service published an alert about the issue which notes:

Aldi stores are currently selling an External 4-in-1 Hard Drive, DVD, USB and Card Reader which may contain malware. If infected, your personal and/or business information may be accessed for fraudulent or illegal purposes (eg, identity theft).
The Australian Computer Emergency Response Team (AusCERT) has also published an alert about the devices. According to AusCERT, the devices contain an old variant of the notorious Conficker malware which was first launched back in 2008. Given its age, most up-to-date antivirus scanners should be able to detect and deal with this threat.

If you have bought and used one of these devices, you may wish to format the hard drive on the device and conduct a full virus scan of your system. Alternatively, return the device to ALDI. ALDI has now issued a voluntary public recall of the devices, although, at the time of writing, the devices were still being promoted via the company's website.


The malware was probably installed unintentionally on the hard drives via infected computers in the factory where the devices were produced.


 


 

Unsubstantiated Rumours Claim Michelle Obama is Pregnant

Outline
Circulating rumours claim that US First Lady Michelle Obama is pregnant with the couple's third child.

Brief Analysis
The rumours are currently unsubstantiated. Despite claims in some pseudo news outlets, there has been no official announcement confirming the pregnancy.


 


Example Subject: Michelle Obama is pregnant

WASHINGTON - The White House announced today that Michelle Obama is pregnant with the couple?s third child.


?Michelle Obama is pregnant,? White House sources said. Outgoing White House Press Secretary, Robert Gibbs, told reporters today that he would not confirm or deny the rumor. But WWN has confirmed that Michelle Obama is about two months into her pregnancy and the President and First Lady expect to have the baby sometime in late July, 2011.


There was a great deal of mystery about the whereabouts of the President and First Lady on Election Night this year. There were many rumors about where they might be - but now we know. The happy couple was spending quality time together, making a new baby.


The last time a baby was born in the White House was Patrick Bouvier Kennedy. He was born on August 7, 1963 and only lived two days. Patrick was the youngest child of President John F. Kennedy and First Lady Jacqueline Bouvier Kennedy and brother to Caroline Kennedy and John F. Kennedy Jr.


Read full article



Detailed Analysis
According to rumours that are currently rocketing around Twitter and Facebook along with other blogs, forums and social networks, US First Lady Michelle Obama is pregnant with the couple's third child. Details of the rumours vary, but some claim that the baby will be born in July 2011. Some versions also claim that the pregnancy has been announced by the White House.


However, at the time of writing, these rumours remain unsubstantiated and may well be without substance. Despite claims in some versions of the rumour, there certainly has not been any announcement confirming the pregnancy from the White House or any other official entity. Although such rumours have circulated since as far back as 2009, they seemed to have gained new life after a "news" story about the supposed pregnancy was published on the Weekly World News website on January 25, 2011. Weekly World News is notorious for publishing absurd, outlandish and totally inaccurate information that it attempts to palm off as genuine news stories. Many of the "news" items on the site are simply made up and have no basis in fact whatsoever. Weekly World News is the online version of a notorious tabloid newspaper of the same name long renowned for publishing utterly fanciful stories disguised as news articles.


For example, another "news" item currently featured on the Weekly World News site makes the utterly absurd claim that McDonald's is planning to build a store on the Moon which will open by 2015. And, in January, 2011, Weekly World News published a completely false story that claimed that Facebook was shutting down in March. Soon after the story was published, it escaped its original context, spawned several mutated versions, and began circulating via Facebook, Twitter and email. It continues to circulate still, causing angst and consternation among many die hard Facebookers who think they are about to lose their beloved network.


Many visitors to the site will quickly realize that the stories it features are factually dubious at best and are not intended to be taken seriously. However, when such stories begin circulating outside their original context, it seems that many more recipients are apt to take them seriously.


Of course, the Weekly World News site's record for publishing false information does not necessarily mean that Michelle Obama is NOT pregnant. But, at least until such time as President Obama and the White House make an official announcement confirming the First Lady's pregnancy, any such claims are simply speculation.


It should be noted that the widespread 2009 pregnancy rumours turned out to be unfounded. Only time - or an official and credible announcement - will tell if the current crop of rumours has any more substance.


 

Unfounded Facebook Rumour- Bob Howard Pedophile Warning

Outline
Circulating Facebook message warns that a 48 year old pedophile named Bob Howard is posing as a 14 year old on Facebook in order to make contact with children.

Brief Analysis
This bogus warning is without merit and should not be reposted. It is one more variant in a series of unsubstantiated and damaging rumours that claim that pedophiles are attempting to contact children via Facebook. While this variant names a person called Bob Howard, other versions have used the names of other men. An earlier, virtually identical, version used the name Harry Graham rather than Bob Howard. There is no credible evidence to back up the claims in these messages. Spreading scurrilous and unfounded rumours such as this can unfairly damage the reputation of innocent people.


 Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 28th April 2011
First published: 28th April 2011
Article written by Tasawer Abbas
Example PARENT ALERT AND ALL YOU KIDS THAT ARE MY FRIENDS..... There is someone called Bob Howard friend requesting kids on facebook at the moment, posing as a 14yr old, when actually he is a 48 yr. old pedophile. He is known to the police. Please be aware and tell everyone you know. We must keep our kids safe....please, please copy and repost


Detailed Analysis
This "warning", which is circulating very rapidly around Facebook and other social networks, claims that a 48 year old pedophile named Bob Howard is pretending to be a 14 year old with the goal of befriending innocent children. According to the message, the man is "known to police". The message asks recipients to repost the information to other users as a means of helping to keep children safe.


However, this warning is yet another totally unsubstantiated pedophile rumour. There are no credible police or media reports that support the claims in the message. In fact, this message is just a revamped version of an earlier - equally unfounded - "warning" that claimed that the 48 year old pedophile was a man named Harry Graham. Note the virtually identical wording of the two warnings:

There is someone called harry graham friend requesting kids on facebook at the moment, posing as a 14yr old when actually he is a 48yr old peadophile. He is known 2 the police. Please be aware and tell everyone u know. We must keep our kids safe - please copy and paste.
Clearly, some malicious prankster has simply substituted the name "Bob Howard" for the name "Harry Graham" before relaunching the "warning" on Facebook. Moreover, several other false pedophile warnings have circulated during the last year. In September 2010, a similar warning began circulating that accused a man named Thierry Mairot of attempting to contact children on Facebook to talk about sex. A later variant of the "warning" changed the name of the accused to Thomas Cowling.

And, "Bob Howard" is actually a very common name. There are a large number of people with that name who have profiles on Facebook. In fact, a great many people in the world share that name. The warning message makes no effort whatsoever to identify which particular "Bob Howard" it is accusing. Thus, many people that share the name may be unfairly tarnished by this baseless rumour, especially if they happen to be Facebook users. Unfortunately, Facebook is becoming a perfect vehicle for destructive scuttlebutt such as this.


The Internet makes it very easy for faceless cowards to make unfounded accusations against others, while remaining anonymous. They may never be required to justify their accusations in any way. If malicious individuals want to discredit, embarrass or annoy someone, or indeed destroy his or her reputation, all they may have to do is create a damaging rumour and post it on Facebook or other social networks.


And even a hint of pedophilia or perversion is often enough to raise great ire and concern among parents and others who care for children. Thus, such accusations, even if totally unfounded, can be a very powerful weapon when wielded by unscrupulous individuals or groups intent on character assassination. Once started, rumours like this can take on a life of their own. Even if the original accuser belatedly learns that his or accusations were wrong, it may well be impossible to stop the further spread of the rumour as it continues its destructive journey.


Of course, it is vitally important to keep our children safe online. However, passing on baseless rumours will do nothing whatsoever to help protect children. Destroying someone's reputation by passing on nonsensical warnings is certainly not going to help keep our kids safe online. A much more productive method is simply to very closely monitor the activities of children when they are online. Better still, don't let young children use adult social networks like Facebook at all.


 

Editor's Note:
Given that this article discusses a slightly altered version of other, virtually identical, bogus pedophile warnings discussed on Hoax-Slayer, parts of the article's content have been adapted from earlier articles.

'Uniform Traffic Ticket' Malware Email

Outline
Email claiming to be a notification of a traffic ticket for speeding from the New York State Police urges the recipient to print out the ticket contained in an attached file and post it to the Town Court.

Brief Analysis
The message is not from police and the attachment does not contain a speeding ticket. The attachment contains malware.


 Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 6th July 2011
First published: 6th July 2011
Article written by Tasawer Abbas


Example From: Police agency Subject: UNIFORM TRAFFIC TICKET New York State ? Department of Motor Vehicles
UNIFORM TRAFFIC TICKETNEW YORK STATE POLICE

Local Police Code

THE PERSON DESCRIBED ABOVE IS CHARGED AS FOLLOWS

Time: 7:25 AM
Date of Offense: 07/02/2011


IN VIOLATION OF
NYS V AND T LAW Description of Violation:
SPEED OVER 55 ZONE
TO PLEAD, PRINT OUT THE ENCLOSED TICKET AND SEND IT TO TOWN COURT, CHATAM HALL., PO BOX 117


Email incudes an attached file named "Ticket.zip"



Detailed Analysis
This email, which purports to be from the New York State Police, claims that the recipient has been charged with speeding in violation of New York State law. The message advises recipients wishing to plead the case to print out a traffic ticket contained in an attached file and mail it to the Town Court at Chatam Hall.


However, the message is certainly not from New York State Police and the attachment does not contain a speeding ticket. In fact, the attachment contains a trojan that, if opened, can install itself on the user?s computer. Typically, such trojans are able to contact a remote server and download further malware that can steal information from the infected computer and allow criminals to control it from afar.


In this case, the criminals responsible for the malware emails obviously hope that their message will panic people into opening the attachment without due care and attention. A great many of the people who receive one of these widely distributed emails will not have even been in New York on the date specified. Thus, at least some, fearing a major error by the police, are likely to immediately open the attachment with the intention of sending off the supposed ticket and pleading their innocence. Such simple - but often quite effective - social engineering tricks have proved very useful for scammers over many years.


Police departments are very unlikely to send people traffic violations via unsolicited emails. This tactic is similar to another current malware campaign in which recipients are instructed to open an attached file in an email purporting to be from the IRS.


Be very cautious of any unsolicited email that claims to be from police or a government department and instructs you to open an attached file or follow a link. Such tactics are commonly used by criminals intent on distributing malware or tricking recipients into divulging personal and financial information via phishing scams.


 

Trees Cocooned in Spider Webs After Pakistan Floods

Debunking email hoaxes and exposing Internet scams since 2003!

Hoax-Slayer Logo Hoax-Slayer Logo

DividerDivider
                   
DividerDivider

Site Navigation


Outline
Circulating message claims that a series of attached photographs show trees cocooned in spider webs after millions of spiders climbed up into trees to take refuge from floods in Pakistan.

Brief Analysis
The photographs are genuine. A number of publications including National Geographic have reported that the widespread and prolonged flooding in Pakistan during 2010 drove millions of spiders into trees to spin their webs. While the spider theory remains the most credible, it should be noted that some commentators have suggested that the webs were made by moth larvae rather than spiders.

Bookmark and Share Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 11th May 2011
First published: 11th May 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Example Subject: Trees Cocooned in Spiders Webs

This is interesting ? the first image doesn?t even look real! It looks like something out of an illustrated book...

Pakistan trees cocooned with spider webs 1

An unexpected side-effect of the flooding in parts of Pakistan has been that millions of spiders climbed up into the trees to escape the rising flood waters. Because of the scale of the flooding and the fact that the water has taken so long to recede, many trees have become cocooned in spiders? webs.

People in this part of Sindh have never seen this phenomenon before, but they also report that there are now less mosquito?s than they would expect, given the amount of stagnant, standing water that is around. It is thought that the mosquito?s are getting caught in the spiders? webs thus reducing the risk of malaria, which would be one blessing for the people of Sindh, facing so many other hardships after the floods.

Pakistan trees cocooned with spider webs 2

Pakistan trees cocooned with spider webs 3

Photo credit: Russell Watkins, U.K. Department for International Development. More images


Detailed Analysis
These eerily beautiful photographs circulate via email, blogs and social media. The description that comes with the images claims that they depict webs woven by millions of spiders that escaped to the safety of trees in response to widespread and prolonged flooding in Pakistan during 2010.

The photographs are genuine. A March 2011 report on the National Geographic website notes:

Trees shrouded in ghostly cocoons line the edges of a submerged farm field in the Pakistani village of Sindh, where 2010's massive floods drove millions of spiders into the trees to spin their webs.

Beginning last July, unprecedented monsoons dropped nearly ten years' worth of rainfall on Pakistan in one week, swelling the country's rivers. The water was slow to recede, creating vast pools of stagnant water across the countryside.

And a March 2011 article published on Wired Science also reports on the phenomenon:
The unprecedented flooding in Pakistan in the latter half of 2010 disrupted the lives of 20 million people, but it also affected the country's arachnid population.

With more than a fifth of the country submerged, millions of spiders climbed into trees to escape the rising floodwater. As the water has taken so long to recede, the trees quickly became covered in a cocoon of spiderwebs. The result is an eerie, alien panorama, with any vegetation covered in a thick mass of webbing.

However, some commentators have suggested that the webs may have been created by moth larvae rather than spiders. Certainly, the webbing created by moth pupae such as that of the Ermine moth is reminiscent of the web covered trees shown in the above photographs. Nevertheless, it remains more likely that the Pakistan tree webs were indeed created by spiders as originally reported. Spider expert Joe Lapp reports on a similar phenomenon that occurred in Texas in 2007. In a comment on the Wired Science story about the Pakistan tree webs, Lapp suggests that the spider primarily responsible for the webs was likely to be a a Long-jawed orbweaver of the genus Tetragnatha. Lapp also suggests that the cause and effect in the reports made be wrong, noting:
We aren't seeing these webs because the spiders are escaping the flood. We are seeing these webs because the floods are producing huge numbers of flies (presumably midges and mosquitoes). The spiders that lived in these trees did tremendously well as a result.
Reports also indicate that the unprecedented spider activity may be helping to control the mosquito population in Pakistan after the flood. The Wired Science article notes:
However, the unusual phenomenon may be a blessing in disguise. Britain?s department for international development reports that areas where the spiders have scaled the trees have seen far fewer malaria-spreading mosquitos than might be expected, given the prevalence of stagnant, standing water.
Bookmark and Share

References
Pictures: Trees Cocooned in Spider Webs After Flood
Millions of Spiders in Pakistan Encase Entire Trees in Webs
Dr Who-like scenes on housing estate as moths create ghostly mass of webs
Journaling the Giant Webs of 2007
The ghost trees of Pakistan: Spider webs cocoon branches in creepy after-effect of floods

comments powered by Last updated: 11th May 2011
First published: 11th May 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer




View the original article here

Video Showing Man Taken by Killer Whale

Outline
A viral video appears to show a man taken by a killer whale as he walks along a beach.

Brief Analysis
The video is not real footage and the man was not eaten by the killer whale. In fact, the video is a TV ad for La Sirena, a retail chain located in the Dominican Republic.


 Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 19th May 2011
First published: 19th May 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Example Subject: ....... for a killer whale, Just a walk on the beach.

Be careful when walking the beach...



Detailed Analysis
This "viral" video which circulates via Youtube, social networks and email, appears at first glance to show a man standing on a beach near the water's edge suddenly taken and eaten by a killer whale.


However, fear not, the video is not real footage of a killer whale attack on a human and the man was not actually eaten. In fact, the video is a TV advertisement for La Sirena, a chain of retail stores located in the Dominican Republic. The ad copy at the end of the video reads "No todos los lapices dan suerte solo el lapiz la suerte de La Sirena" which, translated to English means "Not all pencils give you luck, just the pencil "La Suerte" from la Sirena".


The strange talk of pencils may seem a little baffling. However, it apparently makes reference to La Sirena's previously aired "Lucky Pencil" promotion. The Lucky Pencil was a character created by the company as a Back To School promotional campaign. The promotion claimed that you can "learn the whole world" with "The Pencil of Luck" and gave people the chance of winning prizes such as laptops or trips away.


Thus, the Killer Whale ad is apparently just a part of this "Lucky Pencil" promotional campaign.


 

Unfounded Rumour - Facebook Friend Request Warning - People Trying to Access Photos of Children

Outline
"Urgent" message circulating on Facebook warns users not to accept friend requests from Ponce Martin, Lorraine Miyama, Dario Murgiondo, Montaldo G, Blue Belen, Julieta Montaldo, Jester Fan, Luly Carbal or Martina Di Stefano because these people are trying to access photos of children.

Brief Analysis
There is no evidence whatsoever that supports the claims in this absurd and pointless warning. Many Facebook users share the names specified in the message. Spreading such scurrilous nonsense will do nothing other than damage the reputations of innocent people.


 Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 29th July 2011
First published: 29th July 2011
Article written by Tasawer Abbas
Example DO NOT accept friend requests of these people: PONCE MARTIN, LORRAINE Miyama, DARIO MURGIONDO, Montaldo G, BLUE BELEN, JULIETA Montaldo, Jester FAN, Luly CARBAL, MARTINA DI STEFANO They are trying to access photos of children. Copy and paste on your wall! URGENT!!!! !!!!!! !!!!!!!!!!


Detailed Analysis
Yet another breathless paedophile warning is rocketing around social network Facebook. According to this "urgent" message, finished off with dozens of exclamation marks presumably to drive home just how terribly important it is, a group of sinister people with the names Ponce Martin, Lorraine Miyama, Dario Murgiondo, Montaldo G, Blue Belen, Julieta Montaldo, Jester Fan, Luly Carbal and Martina Di Stefano are trying to access photos of children. To thwart these would be evildoers, recipients are advised not to accept friend requests from any of them.


However, there is no evidence to support the claims in this supposed warning. There are no credible reports that suggest that any of those named in the message have been attempting to access children's photographs inappropriately. Like the many other similar "warnings" that have preceded it, this message is nothing more than a scurrilous rumour and passing it on will do nothing whatsoever to protect children from online predators.


A fundamental problem with such warnings is that a great many people around the world are likely to share the names of those listed as perpetrators. Searches reveal that, on Facebook alone, there are dozens of users that have the same names as those specified in the "warning". Thus, even if a person named in one of these warnings did do something wrong, many others who share that name are likely to be unfairly affected by such accusations. Such unfounded accusations can potentially ruin the reputations of entirely innocent individuals. For this reason, sending on totally unsubstantiated accusations such as this is irresponsible and reprehensible. It is simply immoral to repost a message in a public arena that accuses a person of wrongdoing without even the vaguest shred of evidence to support such an accusation.


Moreover, the tactic described in this warning is in fact rather absurd. Why would those intent on accessing photographs of children risk exposure and discovery by trying to get to such images by making friends via Facebook? Especially by using their real names and Facebook profiles? Literally hundreds of thousands of images of children are available via a simple search engine image search. And of course there is a vast array of websites, magazines, books, catalogues and other publications that contain images of children, all of which can be accessed anonymously.


We all have a responsibility to protect children online. However, sending on silly and utterly unfounded rumours that have the potential to hurt innocent people is certainly NOT going to help protect children. A much more sensible and effective course of action is to closely monitor your children's activities on Facebook and the Internet in general. Better yet, in the case of younger children, don't let them use Facebook at all. And, of course, be careful of what images and material you post on your Facebook account in the first place and ensure that your privacy settings are adequate for your circumstances.


 

UK Post Office Online Reward Program Phishing Scam

Outline
Email purporting to be from Post Office United Kingdom claims that the recipient has received a cash reward via the Post Office United Kingdom Online Reward program. The recipient is instructed to follow a link in the message and enter his or her "bonus code" on a website form in order to claim the reward.

Brief Analysis
The email is not from the UK Post Office and the claim that the recipient is eligible to receive a cash reward is untrue. The email is a phishing scam designed to steal personal and financial information from recipients via a bogus website.


 Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 15th February 2011
First published: 15th February 2011
Article written by Tasawer Abbas


Example Subject: E-mail Bonus #152040

Greetings from Post Office United Kingdom


Welcome to the Post Office United Kingdom Online Reward program, the first and largest loyalty program in the world!


We are proud to inform you that today, The UK Post Office rewarded you. Please take the 4 steps survey. For your effort you will be rewarded you with ?


Your bonus code is P742UK2910


Please track your Bonus Code in to:


[Link removed]


and follow the reward steps.


Thank you very much for your help and your patient and hope you will enjoy the UK Post Office reward program in the future.


Sincerely,
Sandra [Removed]


UK Post Office Reward Department



Detailed Analysis
According to this email, which claims to be from the United Kingdom Post Office, the recipient has been selected to receive a cash reward as part of the "Post Office United Kingdom Online Reward program". To claim the reward, the recipient is instructed to click a link in the email and enter personal and financial information, along with his or her "bonus code" into a website form.


However, the message is not from the UK Post Office and the promised reward does not exist. Those who fall for the ruse and follow the link will be taken to a fraudulent website designed to steal both their personal information and their credit card details. The link in the email is disguised to resemble a genuine UK Post Office web address. The bogus website includes graphics, formatting and secondary links designed to make it resemble the genuine UK Post Office website.


If a victim clicks on the link in the scam email, he or she will be first asked to provide name, contact and other personal details via a form on the bogus website as shown in the following screenshot:


Once the user has filled in this form and clicked the "Submit" button, he or she will then be taken to a second page that asks him or her to enter the "Bonus Code" included in the scam email:


Next, the victim will be taken to a third page that reloads the personal information submitted in the first form but also requests credit card details including the user's credit card account password:


After the "Submit" button on the final form is clicked, the bogus website will display a brief "Thank-you" message before redirecting the user to the genuine UK Post Office website. Because the scam sequence eventually takes the victim to the genuine post office website, he or she may not initially realize that skulduggery is afoot. Meanwhile, all information submitted on the bogus website will be sent to Internet criminals who can use it to commit credit card fraud and identity theft.


One quick giveaway that the bogus website is not what it claims to be is the fact that the form asking for personal and financial details is not on a secure (https) server. No legitimate organization would ever ask for such sensitive information via an unsecure webpage.


This phishing scam is quite similar to a recent spate of survey phishing scams that promise recipients substantial fees for participating in brief online surveys. As in this case the purpose of these survey scams is to trick people into handing over their credit card details and other personal information. Internet users should be very cautious of any unsolicited email that claims that they can receive a cash payment or reward simply by filling in a short survey or providing their personal information. If you receive such an email, do not follow any links in the message or open any attachment that it may contain. Do not provide any information to the senders of the message either via a website form or by replying to the email. 

UPS Uniforms Hoax

Outline
Message claims that a large quantity of UPS uniforms has recently been bought on eBay and that the uniforms could be used by criminals or terrorists posing as delivery drivers.

Brief Analysis
The claims in the warning are false. The story is an urban legend that has been circulating for at least a decade and has no basis in fact.

Detailed analysis and references below example. 

Scroll down to submit comments
Last updated: 11th May 2011
First published: 21st September 2003
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Example Subject: UPS Uniforms "WARNING" - a heads-up message

UPS Uniforms


Government Warning regarding purchase of UPS uniforms:


There has been a huge purchase, $32,000 worth, of United Parcel Service (UPS) uniforms on eBay over the last 30 days. This could represent a serious threat as bogus drivers(terrorists) can drop off anything to anyone with deadly consequences! If you have ANY questions when a UPS driver appears at your door they should be able to furnish VALID I.D.


Additionally, if someone in a UPS uniform comes to make a drop off or pick up, make absolutely sure they are driving a UPS truck. UPS doesn't make deliveries or pickups in anything, except a company vehicle. If you have a problem, call your local law enforcement agency right away!


TAKE THIS SERIOUSLY! Tell everyone in your office, your family, your friends, etc. Make people aware so that we can prepare and/or avoid terrorist attacks on our people! Thank you for your time in reviewing this and PLEASE send to EVERYONE on your list, even if they are friend or foe. We should all be aware!


Kimberly Bush-Carr
Management Program Specialist
U.S.Department of Homeland Security
Bureau Customs and Border Protection
Washington, DC 20229



Detailed Analysis
At face value, this email warning sounds frighteningly plausible. However, it is nothing more than an urban legend that has been circulating in one form or another for at least a decade. Current submissions indicate that this hoax email is once again gaining momentum.


The message was not sent by the U.S. Department of Homeland Security or any other government agency. Nor is there any record of large purchases of United Parcel Service uniforms on eBay. According to a 2003 Washington Post article, the claims in the message have been denied by UPS, the FBI and eBay.

The FBI has debunked several similar UPS stories since the Sept. 11, 2001, terrorist attacks. UPS spokeswoman Susan Rosenberg in Atlanta says the e-mail has been "thoroughly investigated" by the FBI and local law enforcement. "It is the urban legend of missing uniforms," she says.

EBay spokesman Kevin Pursglove also says the UPS story "comes up empty."

Moreover, eBay has for several years restricted listings of government, mass transit, and shipping-related items, including uniforms. eBay's Government, transit, and shipping-related items policy page specifically states that shipping company uniforms, including those from DHL, Federal Express (FedEx), and United Parcel Service (UPS) are not allowed to be listed or sold on eBay in compliance with "strict federal regulations banning or restricting the sale of government, transit, and shipping-related items".

And, even if individual uniform items somehow slipped through this restriction, a large quantity of UPS uniforms listed for sale would certainly have been noticed and blocked before purchase.


In the past, eBay did allow the sale of UPS uniforms. In fact, rumours about large purchases of UPS uniforms may have sprung from the presence of such listings on various auction sites. The apparent willingness by some bidders to pay very high prices for such uniforms may also have raised suspicions and further fuelled the rumours. However, thorough investigation by the FBI found no evidence linking the purchase of these uniforms to terrorist activities. Furthermore, although some uniforms were bought, there were no reports to back up the claims that very large quantities of uniforms were purchased over one thirty day period.


There are several slightly different versions of the message, all referring to large purchases of United Parcel Service uniforms on eBay. Later versions tack on the signature of one "Kimberly Bush-Carr" from Homeland Security, apparently to add a bogus sense of authority to the story.


In April 2011, the hoax gained undeserved credibility after the Los Angeles Police Department's West Valley Division inadvertently sent out a copy of the false warning via the nixle alert service. Nixle is a service that provides "secure alerts free from your local police" to its subscribers. The LAPD quickly realized its error, and published the following update on nixle just 73 minutes after the bogus alert was posted:

UPS Uniforms *** UPDATE ***

Unfortunately the info re: UPS Uniforms came from another Law Enforcement Agency in the State of California purporting the validity of the information. This "INFO" is, apparently an Internet myth.


However, the advice is good in that you should always verify the delivery service has arrived with their own company vehicle.


Our deepest APOLOGIZES from the LAPD WVY Area !!!

Unfortunately, it seems that the LAPD's quickly rectified error was still enough to give the old hoax a new lease of life. Recent submissions indicate that the story is once again circulating rapidly. I have also received several highly critical messages from readers who claim that my analysis is wrong because the information has been "confirmed by the LAPD".

Of course, criminals have used government and company uniforms to help them commit misdeeds in the past and are bound to do so again. Uniforms can help us to identify certain employees such as law enforcement personnel or postal workers, but a uniform alone is not enough to conclusively verify the wearer. If in doubt, we should always verify the wearers of such uniforms by other means.


That said, passing on this bogus warning will only cause unnecessary fear and alarm among recipients and waste the time of those obligated to answer queries about its claims from concerned citizens.


 

Water Bottle Car Fire Warning

Outline
Message warns that a water bottle left inside a car on a sunny day could ignite the upholstery and start a fire.

Brief Analysis
The information in the message is true. Given the right kind of plastic container and the right environmental conditions, sun shining through a water bottle can indeed lead to combustion. A round plastic bottle filled with clear water can act as a lens that concentrates the sun's energy on one point.


 Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 27th April 2011
First published: 7th February 2008
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Example Subject: Starting fire with water

Or how I nearly burnt my car down


It's simple really...we do it all the time



...and I'd encourage you to try this at home...it drives home the message quite effectively when it is demonstrated!!


Paper doesn't burn that easily


 


But that doesn't mean it won't...


 


Car upholstery was another matter altogether...


 


Each of these burns took less than 7 seconds!


 


Contributing factors
. Angle of sunlight
. Shape and clarity of bottle
. Bottle full of water
. Readily inflammable material


What can you do?
. Don't leave bottles in vehicles (or near windows in buildings) ? cover them up if you have to.
. Better still...use purpose-built water bottles which are not made of clear glass or plastic
. Share this within the business
. Share it with your family and friends
. PS ? you now know another way to start a fire in a survival situation!



Detailed Analysis
According to this warning, which is currently circulating via email and social media, leaving a filled plastic water bottle in a vehicle on a sunny day has the potential to start a fire inside the car. The message includes several photographs depicting how sunlight shining through a water bottle could potentially generate enough heat to start combustion. The last photograph shows several upholstery burns allegedly caused by a water bottle.


Given the right kind of plastic container and the right environmental conditions it is true that sun shining through a water bottle can lead to combustion. A round plastic bottle filled with clear water can act as a lens that concentrates the sun's energy on one point. Basically, the bottle acts like a magnifying glass. This magnifying effect can be easily seen if one looks at an object through a full bottle. As many of us will recall from childhood experiments, it is not at all difficult to burn holes in paper or dry leaves using a magnifying glass.


Thus, if the sun's energy is concentrated through a water bottle on to combustible material, then it is possible that fire could result. I conducted experiments using the same kind of bottle featured in the above photographs and I found that, by focusing the sun's rays through the bottle onto a thin plastic sheet, I could quite easily burn holes. The following photographs illustrate the results of one of my experiments. A hole was burned through the plastic after around 30 to 40 seconds of placing the bottle. A small indentation was also melted into the hard plastic tool-case that I used to support the bottle and plastic sheet:


The phenomenon has also been captured on video by the New Zealand television program Fair Go. The program discusses damage caused to the upholstery of a Jeep Cherokee. The owner of the vehicle, Mark Gillings, first noticed the potential danger when he left a full plastic water bottle in the Jeep's backseat bottle holder on a sunny day. He subsequently reported the issue to the media and motoring groups in New Zealand.

An April, 2007 article on the program's website notes:

Mark Gillings of Queenstown came back to his car after a few hours fishing to find a burn mark on the back seat of his Chrysler Jeep Cherokee. It turned out that a full 1.25-litre Pump water bottle, which was sitting in the rear seat centre drinks holder, had focused the sun's rays like a magnifying glass on the seat about three centimetres from the holder.
Further investigation revealed a number of other cases in New Zealand. Thus, it seems clear that the phenomenon is real and the warning message is valid.

That said, according to the New Zealand Motor Industry Association, none of the reported cases actually lead to a car fire. In every instance, the damage was limited to small burn marks on the upholstery. Moreover, the majority of plastic water bottles have a series of surface ridges or indentations that seem to effectively disperse the sun's rays so that no one point can become heated enough to ignite. I conducted experiments with several types of plastic bottles, but I could only burn holes using those with clear, smooth tops. However, it should be noted that the "Pump" brand and other clear-topped plastic bottles like the one shown in the photographs are available in many Australian supermarkets. Also, there is a very large range of bottle styles available and some styles may only be distributed in specific countries or regions. Due to these factors, I could only experiment on a relatively small selection of bottle styles. And of course, the range of styles is even larger if you factor in plastic containers that originally held other liquids that may be reused for water, glass bottles, and bottles that hold clear liquids other than water. It is therefore probably safest to assume that any bottle has the potential to become a burning lens given the right environmental conditions.


Although incidents like the one reported in the warning message are probably quite rare, the potential for a serious car fire caused by a plastic water bottle certainly cannot be dismissed. Thus, the warning is worth heeding. As a precaution, it is advisable to remove plastic water bottles from cars left in the sun or cover them so that they cannot act as lenses.


 


 






 

Tsunami Deep Sea Creatures Email

Outline
Email with a number of attached photographs of strange deep-sea creatures claims that the creatures were washed up as a result of the March 2011 Japanese Tsunami. A much earlier version claimed that the creatures were washed up after the December 2004 Southeast Asian Tsunami.

Brief Analysis
The creatures depicted in the photographs are real and the photographs are genuine. However, the creatures did not wash up as a result of a tsunami as claimed in these messages. In fact, the pictures were taken during the NORFANZ scientific research voyage undertaken during May and June, 2003.

Detailed analysis and references below example. 

Scroll down to submit comments
Last updated: 20th April 2011
First published: 12th January 2005
Article written by Tasawer Abbas


Example:(Submitted, April, 2011) Subject: Creatures Found At Seaside After JAPAN TSUNAMI

Everyone knows, the tsunami in Japan was devastating, both in the loss of life and economically to the region. However, now that the cleanup is underway in the region, deep sea creatures that live too deep to be studied are being found scattered throughout the wreckage. These creatures were washed up on shore when the waves hit.


Example:(Submitted, January, 2005) Subject: Phuket Deep Sea Creatures - Found At Seaside After TSUNAMI

As everyone knows, the tsunami in Southeast Asia was devastating both in the loss of life and economically to the region. However now that the clean up is underway in the region, deep sea creatures that live too deep to be studied are being found scattered throughout the wreckage. These creatures were washed up on shore when the waves hit.


Amazing what lives so far below the surface isn't it? It is ironic how terrible human tragedy and natural disaster can lead to unprecedented expansion of scientific knowledge.


The theory is the tsunami created enough vertical currents to sweep these deep living creatures to the surface quickly. The gases in their blood expanded rapidly causing death (like divers ascending too quickly).


Editor's Note: The email came with the same series of photographs that are shown in the more recent example above.



Detailed Analysis
The message shown in the first example above claims that the strange deep sea creatures featured in the accompanying photographs were brought to the surface as a result of the devastating tsunami that hit Japan in March 2011. The original version of the message (second example above), which began circulating in January 2005, claimed that the creatures were washed ashore as a result of the Southeast Asian tsunami of December 2004.


However, neither claim is true. In fact, the photographs were circulating online months before the 2004 tsunami struck.


The creatures depicted in the photographs are real but they have no connection whatsoever to either tsunami. The pictures were taken during the NORFANZ scientific research voyage undertaken during May and June, 2003. Information about the voyage published on Australia's Department of Sustainability, Environment, Water, Population and Communities explains:

NORFANZ was a joint Australian-New Zealand research voyage carrying leading Australian, New Zealand and other international scientists to explore deep sea habitats and biodiversity in the Tasman Sea. The scientists explored deep sea habitats around seamounts and abyssal plains around Lord Howe and Norfolk Islands through to northern New Zealand. Australia?s National Oceans Office (now part of the Marine Division of the Department of the Environment and Heritage) and the New Zealand Ministry of Fisheries each committed half a million dollars to the four-week voyage. The voyage collected biodiversity samples, DNA tissue samples, seabed habitat data, photographs and video on seamounts at depths between 200 metres and 1.2 kilometres, and surveyed free-swimming animals that live in the water masses above and around these seamounts. The main objective of the expedition was to provide baseline information on the nature and potential vulnerability of these unique habitats and their biodiversity. The results have given us a much better understanding of the species that live on and around the deep seamounts and ridges throughout the Tasman Sea.
The photographs can be viewed in their original context by visiting the NORFANZ Creature Feature pages.

White Van with Red Dragon Abduction Alert Messages

Outline
Various messages claim that a child has been abducted by someone driving a white van with a red dragon on it.

Brief Analysis
The claims in these messages are so far unsubstantiated. There are no credible news reports about an abduction like the one described. Different versions of the message name different locations for the supposed abduction. Some versions claim a little girl was abducted. Others claim that both a boy and a girl were abducted.


 Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 14th March 2011
First published: 14th March 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Examples If someone sees a white van with a red dragon on it phone the police straight away and tell them where it is because a little girl has just been abducted 15 minutes ago at crown point north! (Denton)
if someone sees a white van with a red dragon on it phone the police straight away and tell them where it is because a little girl has just been abducted 15 minutes ago at crown point north! (Denton) Sftbc but please broadcast!! She needs finding....
**URGENT** EVERYONE PAY ATTENTION AND COPY AS YOUR STATUS NOW PLEASE If someone sees a white van with a red dragon on it phone the police straight away and tell them where it is because a little girl has just been abducted less than an hour ago from the crown bard pub in rhyl!!!!!!
very important... Please re-poot this... about 6.30pm 2nite in woodend a man in a white van with a red dragon on the side abducted a little girl outside woodend park and a 7yr old boy called jamie... apparantly the police have been aware of this suspicious van!!! PLEASE KEEP YOUR EYES OUT 4 THIS VAN AND CALL THE POLICE IMMEDIATELY... THERE KIDS NEED FINDING
If any one sees a white van with a red dragon on it phone police straight away and tell them were it is because a little girl has just been abducted about an hour ago outside wood end park, Tamworth. And a 7 year old boy called jamie. Please broadcast !! They really need finding. The reg of the van is T686 BJW. Please pass this onto as many people as you know.

Detailed Analysis
A series of child abduction alert messages are currently circulating around social networking websites Facebook and Twitter and via email. The messages describe a child abduction involving a white van with a red dragon on its side and ask recipients to report sightings of the van to police immediately. There are several versions of the message circulating. Some claim that two young children were abducted; a boy named "Jamie" and a young, unnamed, girl. Others claim that just the one child - a girl - was abducted. The locations of the alleged abduction also vary. Several localities in the UK are listed in different versions of the message, including Wood End Park, Tamworth, Crown Bard pub, Rhyl, Crown Point North, Denton and Wednesfield, Wolverhampton. One version lists the registration number of the van as being T686 BJW.


The claims in these messages so far remain unsubstantiated and may well be untrue. I could not find any news or police reports about a child abduction that took place in any of the locations mentioned in the various versions of the message. In fact, I could find no reports at all in the UK media that describe an abduction involving a white van with a red dragon or the registration T686 BJW. It seems barely credible that the only information about a child abduction would consist of vague and garbled reports that circulate via social media posts.


Moreover, the posts do not list a specific date, but suggest that the supposed abduction took place just a few minutes or hours ago. This ensures that such messages retain their "urgency" and give the illusion that they contain up-to-date information. Often, messages like these will continue to circulate for months or years after they first appeared.


To be worthwhile, abduction alerts must contain accurate and verifiable information about the circumstances of the incident and state exactly when and where the abduction took place. Given that there is no evidence to support the abduction claims put forward in these vague and conflicting messages, sending them on is likely to be counterproductive.


The posts are reminiscent of a long-running "Amber Alert" hoax that falsely claimed that a child had been abducted by a man driving a "2006 Mitsubishi Eclipse".


 


References
Facebook rumours and inaccurate postings
Amber Alert Hoax - Mitsubishi Eclipse With Plate Number 98B351

comments powered by Last updated: 14th March 2011
First published: 14th March 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Best Regards,


Your Friend



 

Yahoo Account Phishing Scams Emails

Outline
Email claims that the recipient must supply account details within five days or his or her Yahoo account will be closed.

Brief Analysis
The email is not from Yahoo. The message is a phishing scam designed to trick recipients into sending their Yahoo account details to Internet criminals.


 Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 17th March 2011
First published: 9th June 2008
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Example Subject: Dear E-mail Account Owner,

Dear E-mail Account Owner,


This message comes from your (EMAIL SERVICE PROVIDER) messaging admin center to All yahoo E-mail Account owners. We are currently improving our Database and E-mail Account Center and creating more certainty for our Legal Service clients. At this moment we are upgrading our data base so that there will be more space for new customers and increasing the surf on the Internet. To prevent your Email address not to be de-activated and to enable it upgraded, you need to assist us by sending the information below to enable us upgrade it, so that your email account status were flect in our database as a very active, useful and legal email account.Do send to us the below information to enable us upgrade your Account, else your email account will lost in a short time.


First Name:
Last Name:
Date of Birth:
Email Address:
E-mail password:
Alternative Email:


WARNING!!! E-MAIL OWNERS who refuses to upgrade his or her account within Five days after notification of this update will permanently be deleted from our data base and can also lead to malfunctioning of the client or user's account and we will not be responsible for loosing our account.


Thanks for your understanding as it is geared towards serving you better.


Email Messaging Support Team


Warning Code: ID67565434.
Note: This message is for yahoo mail user only


? 2011 Microsoft Privacy


Terms of use
Yahoo Member Service



Detailed Analysis
According to this email, the recipient's Yahoo account will be deleted permanently unless he or she replies with account details within five days. The email asks for the account holder's username and password and other personal information and claims to be from the Yahoo "Email Messaging Support Team".


However, the message is not from Yahoo and the claim that the recipient's account will be closed if he or she does not reply is untrue. In fact, the message is a phishing scam designed to steal account information from recipients. Those who follow the instructions in the email will actually be supplying their account details directly to scammers. Once they receive the requested details, the criminals responsible can then access the victim's Yahoo account directly, including email and any personal information stored within the account.


These criminals often use such hijacked accounts to launch further scams and spam campaigns. One such ruse is designed to trick contacts of the victim into sending money to online criminals. Once they have gained access to the hijacked account, the scammers will then send emails to all of the people on the account's contact list. These emails will falsely claim that the account holder is in a very difficult situation and desperately needs financial assistance. Usually, such emails claim that the account holder is stranded in another country without money or travel documents due to a robbery or lost baggage.


Yahoo would never request account details such as usernames and passwords via an unsolicited email. Moreover, Yahoo already has methods in place to deal with inactive accounts. It certainly would not send out emails threatening customers with account closures if they do not supply account information within one week. Any unsolicited email claiming to be from Yahoo that requests sensitive information such as usernames and passwords is quite likely to be a phishing scam.


Yahoo has warned customers about phishing scams in an article on its website. If you receive this email or a similar one, do not reply to the email or supply any of the information requested. Do not click on any links in such messages as they may lead to fake web pages that are designed to look like genuine Yahoo login pages. Login details and any other information supplied on these fake web pages can be collected by scammers and used for fraud and identity theft.


Scammers have used this tactic to steal account information from users of other popular email providers, including Hotmail, Gmail and several others.


Although its intention is more sinister, this email is similar to a long running series of hoaxes that claim that the recipient's Yahoo or Hotmail account will be closed down if the message is not forwarded to others within a specified time frame.


A very similar phishing scam from 2008:
Subject: WARNING!!! VERIFY YOUR YAHOOMAIL ACCOUNT NOW

Dear Account User,


You are advise to verify your account details below to enable us upgrade your account. E.G Your YahooMail ID, Password, Date Of Birth etc.


In failure of doing this, you will Automatically lose your YahooMail Account.


Thanks for using YahooMail


Account Alert

VERIFY YOUR YAHOOMAIL ACCOUNT NOW TO AVOID IT BEING CLOSE!!!

Dear Account User,
This message is from YahooMail message center to all YahooMail account owners and premium account owners. We are currently upgrading our data base and e-mail account center. We are deleting all unused YahooMail account to create more space for new accounts.


To prevent your account from closing, you will have to verify it below before One (1) week from now!


VERIFY YOUR YAHOOMAIL ACCOUNT NOW TO AVOID CLOSE!!!


YahooMail ID:.........................


Password:...............................


Your Birthday:.......................


Your Country or Territory:...........


Warning!!! Account owner that refuses to update his or her account before One (1) week of receiving this warning will lose his or her account permanently.


Sincerely,
YahooMail Team


 

References
Friend Stranded in Foreign Country Scam Emails
Hotmail Account Closure Phishing Scam
Gmail Account Phishing Scam
Webmail Account Phishing Scam
Yahoo Account Deletion Hoax
How can I recognize a phishing email?

comments powered by Last updated: 17th March 2011
First published: 9th June 2008
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Best Regards,


Your Friend


 

Wrench 3D Printing Viral Video

Outline
Viral YouTube Video purportedly depicts an adjustable wrench being 'replicated' via a 3D printer.

Brief Analysis
The video is genuine. The 3D printing technology featured in the viral video is certainly real. 3D printing is an emerging technology that is likely to have a profound effect on our everyday lives. 3D printers can already produce complex objects with interlocking and moving parts, including wrenches like the one depicted in the video. (Note that there is an apparent anomaly in the video that has made some commentators question its authenticity. This anomaly is explained in the detailed analysis below.)


 Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 13th July 2011
First published: 13th July 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Example Subject: Fwd: FW: 3D PRINTER .......Well worth watching

An absolute must watch. American ingenuity at it's finest......



Detailed Analysis
This viral video showing the three dimensional printing of an adjustable wrench, is circulating rapidly via websites, social media and email. The video features theoretical physicist David Kaplan visiting 3D printing technology company Z Corporation where the process is demonstrated by the company's Vice President of Product Management, Joe Titlow. The clip show the "printing" of a replica wrench, which, when complete, is used to tighten a nut in the same way that a "real" wrench would be used.


3D Printing is certainly real and it is quite possible to "print" complex objects ? even those with moving or interlocking parts. 3D printing is an emerging technology that has become more and more sophisticated over the last few years. In fact, 3D printing technology is likely to fundamentally change both the manufacturing industry and, ultimately, the way we live our lives.


An article about 3D printing and its potential impact by Michael Weinberg describes the technology thusly:

So what is 3D printing? Essentially, a 3D printer is a machine that can turn a blueprint into a physical object. Feed it a design for a wrench, and it produces a physical, working wrench. Scan a coffee mug with a 3D scanner, send the file to the printer, and produce thousands of identical mugs.

While even today there are a number of competing designs for 3D printers, most work in the same general way. Instead of taking a block of material and cutting away until it produces an object, a 3D printer actually builds the object up from tiny bits of material, layer by layer. Among other advantages, this allows a 3D printer to create structures that would be impossible if the designer needed to find a way to insert a cutting tool into a solid block of material. It also allows a 3D printer to form general-purpose material into a wide variety of diverse objects.


Because they create objects by building them up layer-by-layer, 3D printers can create objects with internal, movable parts. Instead of having to print individual parts and have a person assemble them, a 3D printer can print the object already assembled. Of course, a 3D printer can also print individual parts or replacement parts. In fact, some 3D printers can print a substantial number of their own parts, essentially allowing them to self-replicate.

A number of companies, including Z Corporation, manufacture and sell a range of 3D printers at surprisingly affordable prices. At this point in the rapid evolution of this technology, 3D printing is most commonly used for creating realistic models, prototypes and parts. However, the potential applications are virtually endless and, as the technology becomes more and more sophisticated, we are likely to see more and more such applications put into practice.

Thus, it is certainly possible to "replicate" complex objects, including adjustable wrenches, as depicted in this viral video.


There is an anomaly in the video that has caused some observers to question its authenticity. The main point of contention has been that the wrench recreated by the 3D printer does not appear to be exactly the same as the wrench that David Kaplan took in to be copied and had scanned. The "printed" wrench has a ring at the top of the handle rather than a hole in the handle like the original wrench. However, this apparent anomaly is simply because the 3D scan of the wrench was redesigned in some ways before the copy was produced. A post on the Z Corporation Facebook Page addresses the concerns of a viewer who noticed the anomaly, noting:

[W]hile you are correct in noting the variances between the scanned and printed wrenches, we were certainly not trying to cheat or pull a fast one on viewers. Rather, the objective and message of that particular portion of the video was to demonstrate how easy it is to make changes to a scanned part using 3D software (we were changing the color of the part at the time). Indeed this is the most common way that engineers work with scanned parts ? get it into 3D software first: then stretch this, add that, print and see if you?re satisfied with the results ? a basic iterative design process. We are strong proponents of iterative design because that process produces better results. Even if no changes were made to the basic structure of the tool, it is very common for engineers to modify a scanned file, for example, to complete the internal workings of a moving part that might not be visible to the scanner. It?s not cheating or deception, just normal processes familiar to users of all 3D scanners. Obtaining a near-exact replica of an object is entirely possible even though that was not shown in the video.
And a YouTube comment on the video posted by a person claiming to be a Z Corporation employee concurs:
As the Z Corp employee in this clip, I can assure you that this is most certainly not faked. The differences you noticed between the original wrench and the printed one were done to demonstrate that once scanned, the geometry can be digitally edited - and then printed. (This is the normal workflow for most of our customers today) In the interest of time, the producers cut the explanation of the editing down.)
In any case, regardless of your take on this particular video, the fact remains that 3D printing is very real, and increasing in sophistication every day. There is simply no doubt that 3D printing technology is already able to produce copies of complex objects such as adjustable wrenches and much more besides.

 


References
Z Corporation
Object 3D printers
T WILL BE AWESOME IF THEY DON?T SCREW IT UP
Z-Corporation Facebook Page
3D Printer - YouTube

comments powered by Last updated: 13th July 2011
First published: 13th July 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Best Regards,


Your Friend



 

Western Union 'Too Many Login Attempts' Phishing Scam

Outline
Email purporting to be from money wire service Western Union claims that the recipient's account has been locked due to "multiple failed login attempts" and that the recipient must login via a link in the message and answer questions in order to restore account access.
Brief Analysis
The email is not from Western Union. In fact, the message is a phishing scam designed to steal account login details and credit card information from Western Union customers.
 Detailed analysis and references below example.
Scroll down to submit comments
Last updated: 6th June 2011
First published: 6th June 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer

Example Subject: Account locked due to too many login attempts.

Detailed Analysis
According to this email, which claims to be from money wire service Western Union, the recipient's Western Union account has been locked because the company's "Online Security System" has detected multiple failed login attempts. The message claims that the security system has temporarily locked the account as a security measure and instructs the recipient to click a link to follow the "account unlocking procedure".
However, the email is certainly not from Western Union and the claim that the recipient's account has been locked is untrue. In fact, the message is a phishing scam designed to allow Internet criminals to steal account login credentials and credit card details from Western Union customers.
Those who fall for the ruse and click the link in the message are taken to a fraudulent website login page designed to mirror the appearance of the real Western Union website. After they provide their Western Union username and password on the fake site, they are then taken to a second bogus webpage where they are asked to provide credit card information, supposedly as a means of verifying their identity. Once the bogus "verification" process is completed, the bogus site automatically redirects to the real Western Union website, possibly leaving victims completely unaware that they have just handed over their account and credit card details to online fraudsters.
Armed with this stolen information, the scammers can then login to the victim's real Western Union account, collect other personal and financial information stored there and use the account for further fraudulent activities. They also have the victim's credit card details, which they can use for credit card fraud or sell to other criminals.
As in many other phishing scam attempts, the scammers have mirrored the company's logos, colour scheme and usual formatting on both the scam email and the fake web pages. The email is in fact one large graphic rather than text, possibly in an attempt to avoid phishing filters. In a further attempt to put potential victims off the scent, the scammers have used a web address for their fake website that is very similar to the genuine Western Union site address.
However, also like many other phishing scams, the fake site does not use a secure (https:) page for its supposed verification form. Any page that asks for financial information such as credit card details on a non-secure site should be treated with suspicion.
Western Union customers have been regularly targeted by phishing scammers in the past. Western Union will not send you an unsolicited email asking for your login and credit card details.


References
Phishing Scams - Anti-Phishing Information
Difference Between http & https
Western Union Unauthorized Transaction Phishing Scam
Western Union - Protect Yourself from Fraud
comments powered by Last updated: 6th June 2011
First published: 6th June 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer



ATM Security Advise Message Enter PIN In Reverse to Call Police

Outline
Message claims that if you are forced by robbers to withdraw money from an ATM, you can secretly alert police by entering your PIN in reverse.

Brief Analysis
The claims in the message are false. Reverse PIN technology does exist. However, it has not yet been implemented by any banks. At this time, entering your PIN in reverse will NOT call police.


 Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 10th August 2011
First published: 3rd October 2006
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Example 1:(Submitted, September 2006) Subject: Reverse pin number to call police

I just found out that should you ever be forced to withdraw monies from an ATM machine, you can notify the police by entering your Pin # in reverse. The machine will still give you the monies you requested, but unkown to the robber, etc, the police will be immediately dispatched to help you. The broadcast stated that this method of calling the police is very seldom used because people don't know it exists. It might mean the difference between life & death. Hopefully, none of you will have to use this, but I wanted to pass it along just in case you hadn't heard of it. Please pass it along to everyone possible.


Example 2:(Submitted, June 2009) Subject: ATM USE: This is a useful TIP ...

In the spite of armed robbery, here is something you may really need.


WHEN A THIEF FORCES YOU TO TAKE MONEY FROM THE ATM, DO NOT ARGUE OR RESIST, YOU MIGHT NOT KNOW WHAT HE OR SHE MIGHT DO TO YOU.


WHAT YOU SHOULD DO IS TO PUNCH YOUR PIN IN THE REVERSE, I.E IF YOUR PIN IS 1254, YOU PUNCH 4521.


THE MOMENT YOU PUNCH IN THE REVERSE, THE MONEY WILL COME OUT BUT WILL BE STUCK INTO THE MACHINE HALF WAY OUT AND IT WILL ALERT POLICE WITHOUT THE NOTICE OF THE THIEF.


EVERY ATM HAS IT, IT IS SPECIALLY MADE TO SIGNIFY DANGER AND HELP.


NOT EVERYONE IS AWARE OF THIS.


FORWARD THIS TO ALL YOUR FRIENDS AND THOSE YOU CARE FOR.



Detailed Analysis
This email forward claims that if criminals force you to withdraw money from an ATM, entering your PIN in reverse will automatically alert police.


The technology that makes this possible does exist. However, so far, banks have not implemented it. Thus, at the time of writing, if you are forced to withdraw money against your will, the chance that the ATM you are using will have the reverse pin technology installed is virtually nil.


©iStockphoto.com/George Clerk


If you are forced by robbers to withdraw money from an ATM, entering your PIN in reverse will NOT alert police Back in 1994, Joseph Zingher from Chicago began developing ATM software that would silently call police if a PIN was entered in reverse. Since then, Zingher has spent years trying to sell the idea to banks in the United States without success. Several US states have explored the idea, but it is yet to be implemented. In 2004, the US state of Illinois passed legislation requesting that banks install reverse-pin safety technology in their ATMs. However, banks were not legally required to do so, and displayed little interest in using the system. In 2009, another bill was put forward in Illinois that would make implementation of the safety PIN mandatory for banks in that state. According to information published on the Illinois General Assembly website the bill was "Re-referred to Assignments" in March 2009.


Zingher and others continue to push for the implementation of reverse pin or similar consumer safety systems at ATMs. The concept is sound, and such technology may well increase ATM security, discourage forced withdrawal crime and possibly even save lives, if it was widely used.


That said, many people have raised doubts about the effectiveness of such a system. Commentators have suggested that the system would fail if a customer's PIN was the same backwards as it was forwards, such as the number "4334" or if the PIN was four identical digits such as "8888". However, Zingher maintains that customers with such PIN's would be protected using alternative methods such as the "Inside-OutPIN and the Plus-1PIN". Others have noted, that even if an ATM sent a silent alarm indicating that a robbery was in progress, the criminals would likely have well and truly fled the scene by the time police arrived. Some banking spokespeople have criticized the proposed system, suggesting that if it was made mandatory, criminals as well as customers would know about it and it would therefore do little to deter criminals. They have also suggested that a panicked victim of a violent ATM robbery might have trouble correctly entering a PIN in reverse and thereby risk further antagonizing the criminals when the ATM displayed an error message and no money was dispensed. Furthermore, they point out that people regularly make mistakes when entering their PIN's and this could lead to false alarms that would waste the time of police. However, Zingher scoffs at such concerns and maintains that his system would significantly increase customer safety and reduce ATM crime.


In an increasingly security conscious consumer market, it may not be too long before banks decide that such technology is financially viable or legislation forces them to act.


Until then however, forwarding this message is ill advised. Since it is extremely unlikely to work, the "advice" in this message could actually be dangerous. Forcing a victim to withdraw money from an ATM is a high-risk, violent crime. If a victim enters a reverse pin at an ATM that does not have the safety PIN system installed, he or she will receive an error message and no money will be dispensed. This delay could antagonize the criminal and increase the risk of violent retaliation.


Moreover, if banks were to install a safety PIN system, they would provide information to their customers explaining the new system and how to use it. The message claims that the system is seldom used because "people don't know it exists". However, it is absurd to suggest that a bank would go to the considerable expense of implementing a safety PIN system and then not bother to tell their customers about it.


The original version of the message (Example 1 above) mentioned a "broadcast" as the source of the information. This may refer to a September 2006 WOAI San Antonio News story on the subject. The video cited the case of a San Antonio man who was forced to withdraw money from several ATMs and explained the concept of reverse-pin technology as a means of countering such crimes. However, the story very clearly stated that such technology is not yet being used.


An updated version of the message (Example 2 above) strays even further from the truth. Like the earlier version, this later variant also falsely claims that all ATM's already have the reverse PIN technology implemented. However, it also makes the claim that, if a victim of ATM bandits did enter his or her PIN in reverse, the money would get stuck coming out while the machine secretly alerted police. To my knowledge, this stuck money "feature" has never been part of the Safety PIN proposal and it is very unlikely that it would be included in any working version of the system. In fact, such a feature could considerably heighten the danger to the victim. If the money did become stuck during the transaction, the robber would then suspect that the victim had entered the PIN in reverse thereby alerting police and may then take violent retaliatory action against the victim.


To reiterate, although such technology exists, and legislation in some jurisdictions may eventually force their banks to begin using it, the system is NOT currently in use. Entering your PIN in reverse at an ATM will NOT call police and will only result in an "incorrect PIN" error message. Thus, this email contains dangerous misinformation and it should not be forwarded. If and when banks begin to install reverse PIN technology at ATMs it is sure to be well publicized. If your own bank begins using such a system, it will almost certainly let you know about it directly.


 


References
Banking on ATM safety
ELECTRONIC FUNDS-DURESS PIN
ZICUBED ATM SAFETYPIN
Halfbakery: Panic PIN
ATM software aimed at reversing crime

blog comments powered by Last updated: 10th August 2011
First published: 3rd October 2006


Write-up by Brett M.Christensen




 

Fee Scam Facebook 2011 Sweepstakes Online Lottery

Outline
Message purporting to be from Mark Zuckerberg of Facebook, claims that the recipient has won $1,000,000 in the Facebook 2011 Sweepstakes online lottery.

Brief Analysis
The message is certainly not from Facebook. In fact, it is a scam designed to trick recipients into sending money and personal information to criminals.


 Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 14th July 2011
First published: 14th July 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Example Subject: Facebook Lottery

Facebook Inc.
1601 S. California Ave.
Palo Alto
CA 94304
United States.


This is to inform the bearer that You have won the sum of $1,000,000.00(One Million US Dollars) OUR 2011 SWEEPSTAKES (Facebook Inc ) This is a bonus to promote our users worldwide through this online lottery, which is fully based on an electronic selection.


We hereby approve you a lump sum of $1,000,000.00(One Million US Dollars) in Cash Credit File- ILP/HW 47407/02 from the total cash prize for eight lucky winners in this category.


HOW TO CLAIM YOUR PRIZE: Simply contact your Fiduciary Agent Name - Marc Andreessen E-mail address - facebookwin2011@live.com


Please quote your reference, batch and winning number which can be found on the top left corner of this notification as well as your full name, address and telephone number to help locate your file easily.


Thank you for using www.facebook.com
Yours faithfully,
Mark Zuckerberg
Online coordinator for Facebook
Online lottery
www.facebook.com
-----



Detailed Analysis
According to this email, which purports to be from none other than Facebook founder himself Mark Zuckerberg, the recipient has won the sum of one million dollars in the 2011 Sweepstakes lottery organized by Facebook. The message claims that the winners were via an electronic selection system. The lucky winner is instructed to contact the "Fiduciary Agent" in order to claim the prize.


However, the email is certainly not from Mark Zuckerberg or anyone else at Facebook and the claim that the recipient has won a million dollars is a lie. In fact, the email is a typical advance fee lottery scam designed to fool unwary users into sending their money and personal information to Internet criminals.


Those who fall for the ruse and contact their assigned "Fiduciary Agent" will soon be asked to send upfront fees that are supposedly required to allow the release of the - sadly nonexistent - prize money. The scammer will claim that the fees are required to cover a range of entirely imaginary expenses such as insurance premiums, banking fees, delivery charges, taxes and legal costs. The scammer will insist that, under no circumstances, can these fees be deducted from the prize itself, supposedly due to legal or insurance constraints. Further requests for fees may continue until victims run out of money or finally realize that they are being scammed.


In some cases, the scammers will also ask their victims to supply a large amount of personal or financial information, ostensibly as a means of verifying identity and their right to claim the "prize". The scammers may be able to harvest enough information to allow them to steal the identities of their victims.


Advance fee lottery scams such as this have been around for many years. Although the most common vector for such scam attempts has generally been email, advance fee scammers also use SMS, fax, surface mail and messages sent via social media as avenues for reaching potential victims. Advance fee scammers often hijack the names of high profile people or entities - in this case "Mark Zuckerberg" and "Facebook" - as a means of making their false claims seem more believable. Other advance fee lottery scams have falsely claimed to be from Microsoft, Google, Yahoo, FIFA, and the IRB, just to name a few. Other Facebook versions of the scam have also been distributed in recent months.


Despite wide spread publicity about such scams, many people around the world still fall victim to them every day. If you receive a message claiming that you have won a large prize in a lottery or promotion that you have never entered, it is quite likely to be an advance fee scam. Be very wary of any claims that your email address or name was collected online and randomly selected as the winner in some prize draw that you have never heard of. This is not how legitimate lotteries or promotions operate. If you receive such a message, do not reply or contact the "agent" as requested. Do not follow any links or open any attachments that may come with such messages.


 


References
Email Lottery Scams - International Lottery Scam Information
Phone Text Message Lottery Scams
Microsoft World Lottery Scam
Google 10th Anniversary Awards Lottery Scam
Yahoo Awards Scam Email
FIFA 2010 World Cup Lottery Scam
Rugby World Cup Advance Fee Lottery Scam
Facebook Grant Award Advance Fee Scam

comments powered by Last updated: 14th July 2011
First published: 14th July 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer




 

eBay 'Trusted Selling with Identity Confirmation' Phishing Scam

Outline
Message purporting to be from John Canfield of eBay Trust & Safety claims that eBay is implementing a new safety initiative called Trusted Selling with Identity Confirmation and members must therefore follow a link to update their password and other account information.

Brief Analysis
The message is not from John Canfield or eBay. The email is a phishing scam designed to trick recipients into divulging their eBay account details to Internet criminals.


 Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 28th July 2011
First published: 28th July 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Example Subject: eBay System Update: Identity Confirmation

Dear eBay member,


eBay recently announced a new safety initiative called Trusted Selling with Identity Confirmation that will help to protect members from unauthorized listings in that seller's name. All these measures are made concerning your security.


Please take a minute to update your contact information: Make the Identity Confirmation now


To protect the Community against this type of fraud, beginning today, eBay will start noting which computers members typically use to conduct their buying and selling activity.


Now more than ever, having a current Secret Password on file with eBay is vital to the safety of the Community and to your business. A wrong or outdated Secret Password may delay your ability to list items or respond to your customers, if eBay cannot verify your identity.


Sincerely,
John Canfield
Senior Director, eBay Trust & Safety



Detailed Analysis
According to this email, which purports to be from eBay Senior Director for Trust & Safety, John Canfield, eBay members must follow a link and confirm their identity because a new safety initiative called Trusted Selling with Identity Confirmation is being implemented. The message claims that members must ensure that they have a "current Secret Password" on file with eBay so that the new system can correctly verify their identity.


However, the email is certainly not from John Canfield or any other eBay staff member. In fact, the message is a phishing scam that attempts to trick recipients into visiting a bogus website and disclosing their eBay login credentials and other personal information.


Those who fall for the ruse and click the link are taken to a fraudulent website designed to look like a genuine eBay page and asked to login with their username and password. If they proceed as instructed and "login" on the bogus site, they will then be asked to provide further personal and financial information, ostensibly as a means of verifying their identity in order to comply with the new security system. At the end of this process, they may be automatically redirected to a genuine eBay site and therefore may not immediately realize that they have submitted information on a fake website.


Meanwhile, the criminals operating the phishing attack will collect the information submitted by their victim and use it to hijack his or her real eBay account. They may also use other private and financial information collected during the scam to commit further fraud and steal their victim's identity.


In this case, the scammers have fraudulently used the name of a real eBay director and a real, albeit outdated, security initiative as a means of making their claims seem more believable. In fact, parts of the scam message are lifted verbatim from a genuine security announcement from John Canfield that was published back in April 14, 2008. The announcement discussed the "Trusted Selling with Identity Confirmation" initiative, which was designed to protect members of the eBay community from becoming victims of fraud. The announcement requested users to update their registered phone numbers, noting:

Now more than ever, having a current phone number on file with eBay is vital to the safety of the Community and to your business. A wrong or outdated phone number may delay your ability to list items or respond to your customers, if eBay cannot verify your identity.
The scammers have twisted the above request to fit their own agenda by claiming that users must update their passwords rather than their phone numbers. Thus, in this case, the criminals have attempted to use a legitimate announcement regarding a real security initiative as a cover story for their fraudulent activities.

In fact, eBay is a regular target for phishing scammers and many different methods have been used to trick eBay users into handing over their account details. eBay will never ask you to provide personal information via an unsolicited email that uses a generic greeting such as "Dear eBay member". Be wary of any message purporting to be from eBay that claims that you must follow a link or open an attachment in order to update account details. Note that genuine eBay messages will always appear in the "My eBay - Messages" section of the eBay website while scam messages will not.


 


References
A Message from John Canfield
eBay Phishing Scam
Question About eBay Item Phishing Scam
eBay - Phishing emails

comments powered by Last updated: 28th July 2011
First published: 28th July 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer




 

Bogus Health Warning - Scratch Card

Outline
Message warns people not to use fingernails to scratch off the coating on scratch tickets because the coating contains a substance called "Silver Nitro oxide" that can cause skin cancer.

Brief Analysis
The information in the warning message is untrue. The coating on scratch tickets is made of specialized latex inks. There are no credible references to a compound called "Silver Nitro oxide". There are no credible medical or scientific reports that suggest that scratch ticket coating has been linked to skin cancer. There are no credible references to an organization known as the "Medical Research Authority of the US". The warning is a hoax and should not be forwarded.


 Detailed analysis and references below example.

Scroll down to submit comments
Last updated: 11th August 2011
First published: 11th August 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer


Example ATTENTION. .....Medical research Authority of the US have found that new cancer in human beings caused by 'Silver Nitro oxide'. Whenever u buy recharge cards or calling cards don't scratch them with ur nail as it contain 'silver nitro oxide' coating and can cause skin cancer. Copy and paste this status and spread awareness please

Detailed Analysis
According to this health alert, which is circulating vigorously via social media and email, an organization identified as the Medical Research Authority of the US has discovered that the removable coating on scratch tickets can cause skin cancer. The message claims that a substance contained in the coating called 'silver nitro oxide' is the cancer causing agent. The warning advises people against using their fingernails to remove scratch ticket coating because of this supposed cancer risk.


However, there is no credible support whatsoever for the claims made in this supposed health alert.


The coating on scratch tickets is not made from a substance called 'silver nitro oxide'. In fact, I could not find any evidence that such a compound even exists. There are two chemical compounds with similar names. One is Nitrous oxide, more commonly known as laughing gas, which has been used as an anesthetic in medical procedures since the 1840's and is also used in rocketry and to enhance engine power in motor racing. The other is Nitric oxide, a diatomic gas that plays a role as a cell signaling molecule in mammals and is also used as an intermediate in the chemical industry. Neither of these compounds is used to create the coating on scratch tickets. In fact, the coating is created from specialized latex or UV inks. A technical article about the material used in such coating published on Quora notes:

The material is known as a UV ink. Not the ink that becomes visible under UV light as is referred to on Wikipedia, but an ink that 'dries' under UV radiation.

UV inks are essentially a mixture of colored monomers and oligomers (the individual chemical units that eventually form 'polymers' ) and reaction 'photo-initiators' that become active when exposed to UV radiation. The monomers and oligomers form a viscous liquid, thus serving simultaneously as the 'pigment' and 'solvent' of a conventional ink; they do not need an organic solvent as a fluid base, and do not 'dry' in air like typical solvent-based inks. On exposure to UV light, the initiators set off the polymerization reaction, rapidly cross-linking the monomers and oligomers into a solid 'plastic' polymer, in a process known as 'curing'. This polymerization process also inspired the alternative naming of UV inks as 'latex inks'.


[.....]


The production of scratch-off tickets is a two-step process - a substrate is covered by a thick, smooth layer of UV ink coating, and then printed with a special 'scratch-off' black/silver UV ink (scratch-off inks can sometimes be solvent-based ). An optional third step could involve printing text or images over the scratch-off area, with yet another type of UV ink.

There is no mention of a chemical called silver nitro oxide being used in these UV inks. Nor are there any credible reports that suggest a link between inks used on scratch tickets and cancer.

Furthermore, there are no credible references to an organization known as the Medical Research Authority of the US. The closest I could find is the US based Biomedical Advanced Research and Development Authority (BARDA). But, not at all surprisingly, there is no information on the BARDA website that supports the claims in this hoax message in any way.


Scratch tickets of various types are these days just about everywhere. On any one day vast numbers of people in dozens of countries are likely to be happily scratching away, often using their fingernails as scratching tools. So, of course, any credible link between scratch ticket coating and cancer - even a tenuous one - would have certainly been widely publicized by the main stream media and medical authorities. In reality, there is nary a trace of such media or medical reports.


Thus, this supposed health warning is nothing more than one more sad bit of utterly pointless Internet junk and certainly should not be reposted.


 


References
Nitrous oxide
Nitric oxide
What is the material used to make the silver scratch-off area on prepaid cards and lottery tickets?
Biomedical Advanced Research and Development Authority

comments powered by Last updated: 11th August 2011
First published: 11th August 2011
Article written by Brett M. Christensen
About Brett Christensen and Hoax-Slayer