DNS Auto Glass Responds to Hidden Camera Investigation
May 2, 2012
by Katie O’Mara, komara [at] glass [dot] com
A recent hidden camera investigation into the DNS Auto Glass location in Louisville, Ky., has been making news in the Louisville area. The report, done by WAVE 3, allegedly caught a sales representative employed with the Louisville DNS Auto Glass shop committing insurance fraud.
According to video from the television station, the salesman was attempting to file a claim with an insurance company for a windshield replacement when the windshield only suffered a small, repairable crack.
“There was never a claim filed and it was not put through insurance. There was never a job set up or an appointment made,” says Jeff Searles, owner of DNS Auto Glass.“We are still in the process of investigating this. The salesperson that was represented on the video cannot be found to exist in any of our referral sources. It’s not a name on any of our rosters. The former employee that they spoke to was very disappointing because I am not sure where he got his information from. I was very perplexed that he didn’t feel like the policies applied to him.”
“It is impossible for anybody to control or have all of their employees do everything right 100 percent of the time,” says Searles. “We can just direct them and support the authorities and that’s all that we can do.”
Searles said that if an investigation showed any fraud they would immediately terminate the offending employee and cooperate with the proper authorities.
“We actually reward our technicians for finding fraud because we don’t want anything to do with it,” says Searles. “Our last line of defense to ensure our integrity is the technician. They are told when they get there if there is no damage to not put the windshield in, notify the dispatch and take pictures.”
DNS Auto Glass uses computer software and Searles confirmed that technicians take photos that are uploaded and available for viewing.
“We are inspected regularly. We have yet to have one formal complaint to us from any insurance company as it relates to fraud,” says Searles. “We don’t want to do it wrong. If someone is committing fraud then we want to know about it.”
The Kentucky Department of Insurance is currently considering the television station’s report.
DNS Auto Glass has nine locations throughout Florida, Kentucky, South Carolina, New York and Connecticut.
Online privacy is a hot issue. People expect to be able to surf the Web and use the Internet without compromising their privacy in the process, but the sites and services people use may be monitoring their online behavior. This may seem like an infringement of privacy to some, however, what they don’t realize is that they agreed to be watched.
The average Internet user visits more than 2,500 websites and online services per month. Virtually every one of them has a privacy policy of some sort. You might have to dig (a lot) to actually find it, but it’s there somewhere. By visiting the site or using the service you’re tacitly agreeing to the terms of the privacy policy whether you read it or not.
How many privacy policies have you read from beginning to end? Probably zero. One source reports that legal and tech researchers estimate it would take an entire month to read all of the privacy policies for the sites an average person visits in a year. Are you willing to invest that kind of time? Of course not.
Nobody is really–unless they’re a legal or tech researcher getting paid to do so–and the sites and services know that up front. They know that they can bury shady activity and surreptitious monitoring of online activity into the privacy policy because nobody is going to read it, and the use of the site or service signals your acceptance of the policy and gives silent consent for them to engage in spying on you.
In many cases, the information gathered isn’t even used by the site itself. It is collected as a side business and sold to third-party data brokers who then correlate and analyze the data to paint demographic pictures that can be marketed to advertisers, health insurers, and other entities.
Internet service providers, search engines, email services, and other online services may all be monitoring your online behavior. They know where you connect from, the type of device or operating system you use, whom you communicate with, the information you seek online, and the websites you visit. It’s OK that they collect such data, though; because you agreed to it when you accepted the privacy policy you didn’t read.
What should you do? Or–better yet–what can you do? Technically, you should read the privacy policies so you know what you’re getting into. That’s time consuming, and highly impractical, though.
Instead, try to limit your online activity to sites and services you trust. Those sites and services are most likely monitoring your activity to some extent as well, but a reputable website will use the information only for its own purposes to improve the experience for you as opposed to selling it to the highest bidder (or all of the bidders).
If you’d like to shield your online activity from spying, you can use the private browsing mode of your Web browser. All of the major browsers have an optional mode that prevents tracking cookies and wipes the browser history to conceal your online tracks.
Canada’s Videotron is launching a new advertising campaign focusing on one of its main differentiators: superior customer service. The unwitting stars of the commercials are surreptitiously filmed Videotron technicians. The humorous campaign underscores Videotron’s excellent service and its employees’ determination to provide the best possible customer experience. It will run in English and French versions.
Twenty-one technicians were unknowingly put to the test by fake customers, with comical results. The scenes highlight the things that set Videotron apart: same-day installation, evening installation, installation of all services in one visit, service demos by the technician, and 30-day money-back guarantee.
What the commercials show, first and foremost, is the extent to which Videotron employees are genuinely dedicated to pleasing the customer. “Our conscientious technicians are ambassadors for Videotron and its values,” said Manon Brouillette, President, Consumer Market. “We are very proud of them. They have achieved an impressive 96% customer satisfaction rate1 and this campaign is a tip of the hat to their great work.”
The Technician Trap
With moving season approaching, Videotron has set up the Technician Trap website (technicienspieges.com) to make life easier for customers. Visitors to the site will be able to view the new commercials, as well as long versions, “making of” videos and cutting-floor footage, which will be posted on the site in the course of the campaign. They will also find practical advice and an array of useful tools, such as online address change and Videotron Smart Find, the easy way to search for information about merchants in their new neighbourhood.
A cybersecurity consulting firm has documented the existence of a China-based espionage operation that has infiltrated the
computer systems of at least 22 organizations in the government and private sectors in the U.S., Europe and Asia.
But the biggest surprise was how the compromised entities reacted when notified of the breach by e-mails, which were followed
up by phone calls.
“Not a single company actually responded. No one said ‘thank you,’ no one said give me more information, how did you do this,
nothing,” Adam Vincent, chief executive of Cyber Squared, said Tuesday. “Either we notified the wrong people or people didn’t
care. I’m not sure which.”
Cyber Squared won’t disclose the names of the organizations that seemed to ignore what the firm found to be a sophisticated
attack, most likely sanctioned or sponsored by some entity within China.
The victims included U.S. public policy think tanks, North American technology companies, European food safety, environmental
and maritime organizations, East Asian economic policy and diplomacy groups, and international mining organizations and law
firms. What was stolen from these organizations is not known.
The reason Cyber Squared believes the attacks were state sanctioned or sponsored is because all the victims were tied to Chinese
strategic interests. For example, one organization was involved with efforts in the U.S. government to sell F-16 fighter jets
to Taiwan, an action China opposed. Another was involved with efforts in the United Nations to minimize greenhouse gas emissions
within the international maritime industry.
In many ways, the operation was a classic example of what the security industry calls an advanced persistent threat, which
means the attackers studied each organization closely in order to tailor the attack to specific people. The cyber criminals
constantly updated the malware used in order to hide from antivirus software and other security technology found on most organizations’
networks.
Cyber Squared was introduced to the espionage operation in September 2011, when an organization connected to the Taiwan discussions
received e-mail with an address that closely resembled the name of a senior executive. The missive, sent from a popular U.S.
Web mail service, contained a link to a Web site that directed the victim to download a malicious file. The e-mail was sent
within 32 hours after Congress received a bill that would authorize the jet sale to Taiwan.
The simplicity of the original e-mail and malware masked a highly sophisticated operation that would subsequently download
software tools and file-stealing applications that could spread through a corporate network in secrecy, Vincent said. Attackers
often wait to launch their best malware after they’ve infiltrated a system. “They’re not going to bring their A-game, if they
only need C-players.”
While Cyber Squared could only identify 22 organizations, it believes dozens more have been compromised by the cyber criminals,
who are capable of managing spy operations in each compromised organization at the same time “like moving pieces on a chessboard,”
Vincent said.
Union heavyweight Paul Howes has renewed his attack on China’s trading practices, calling for an inquiry into allegations of cyber espionage.
The AWU national secretary says Australian manufacturers and food producers are being forced to compete on an uneven playing field.
He says China is engaging in “possibly illegal” practices by undervaluing its currency, dumping products onto international markets and even spying on competitors.
“Other countries, most particularly China, have again been flouting their WTO obligations in regards to intellectual property theft and hacking,” Mr Howes said in his keynote address to a national convention of Australian vegetable growers in Hobart.
“China has been accused of using industrial espionage as part of economic policy by stealing company secrets to attack foreign competitors.
“A strong government response to this would involve a full-scale inquiry into allegations of cyber espionage, and lodging a case with the World Trade Organisation.”
Mr Howes has previously criticised the devaluation of the yuan and said on Friday it could be as much as 40 per cent below its market value.
He said that was contributing to an overvaluation of the Australian dollar which was hurting sectors of the economy.
“By refusing to remove to a freely floating currency the Chinese are flouting the world’s rules in order to give themselves a significant trade advantage,” he said.
“China must take its new role as an emerging power in the world seriously and adopt the rules that successfully allowed it to emerge as an economic powerhouse.”
Mr Howes said Australia could only take advantage of the huge growth expected in Asia if it avoided “Dutch disease”, an influx of money into the mining sector alone.
“The danger … is that in the meantime we allow industries such as manufacturing, food and vegetable production to drift,” he said.
“It’s all well and good to talk about becoming the food bowl of Asia but we must take decisive action now to prepare ourselves.”