This 1937 Canadian-made ("Built in the British Empire") cork-platened Model A Royal De Luxe portable typewriter, serial number A-689650, was given to me in 2011 by leading Australian war historian, Professor Bill Gammage*. It was sold to Bill's father by Sydney Pincombe Pty Ltd of Sydney in 1938, four years before Bill was born in Orange, New South Wales. Bill went on to research and write about the fight for rights and justice in Turkey and Australia.
At the root of my vulnerability to this cyber attack was my frustration in not being able to get rid of the "MyStart" extension from Google Chrome. After all this drama was over, I finally found how easy it was to get rid of it - only adding to the annoyance of the whole thing. Earlier, through the control panel on my computer, I had been directed to a program which promised to clean "IncrediBar" off my machine for good - at a cost of $US40. Having scanned my computer with this "SpeedMaxPc" program, and apparently having "fixed" a range of problems, I then received the phone call from the scammers. Under the impression that "SpeedMaxPc" was a Microsoft-approved program, I was therefore "open" to the suggestion from the scammers that several problems had been reported to Microsoft. The scammers' timing was, by sheer chance, perfect. This YouTube video shows exactly what happened to me:
The same sequence of events was reported by Jerome Segura on April 11 this year on a Malwarebytes blog. Read the report here.
Microsoft's Safety & Security Center says, “Avoid tech support phone scams: Cybercriminals don't just send fraudulent email messages and set up fake websites. They might also call you on the telephone and claim to be from Microsoft. They might offer to help solve your computer problems or sell you a software license. Once they have access to your computer, they can do the following: 1. Trick you into installing malicious software that could capture sensitive data, such as online banking user names and passwords. They might also then charge you to remove this software. 2. Take control of your computer remotely and adjust settings to leave your computer vulnerable. 3. Request credit card information so they can bill you for phony services. 4. Direct you to fraudulent websites and ask you to enter credit card and other personal or financial information there.
"Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fixes.
Once they've gained your trust, Cybercriminals might ask for your user name and password or ask you to go to a website to install software that will let them access your computer to fix it. Once you do this, your computer and your personal information is vulnerable.
"If someone claiming to be from Microsoft tech support calls you: Do not purchase any software or services. Ask if there is a fee or subscription associated with the "service." If there is, hang up. Never give control of your computer to a third party unless you can confirm that it is a legitimate representative of a computer support team with whom you are already a customer. Take the caller's information down and immediately report it to your local authorities. Never provide your credit card or financial information to someone claiming to be from Microsoft tech support.
"If you think that you might have downloaded malware from a phone tech support scam website or allowed a cybercriminal to access your computer, take these steps: Change your computer's password, change the password on your main email account, and change the password for any financial accounts, especially your bank and credit card. Scan your computer with the Microsoft Safety Scanner to find out if you have malware installed on your computer. Install Microsoft Security Essentials. (Microsoft Security Essentials is a free program. If someone calls you to install this product and then charge you for it, this is also a scam.) Note: In Windows 8, Windows Defender replaces Microsoft Security Essentials. Windows Defender runs in the background and notifies you when you need to take specific action. However, you can use it anytime to scan for malware if your computer isn’t working properly or you clicked a suspicious link online or in an email message.
"There are some cases where Microsoft will work with your Internet service provider and call you to fix a malware-infected computer -such as during the recent cleanup effort begun in our botnet takedown actions. These calls will be made by someone with whom you can verify you already are a customer. You will never receive a legitimate call from Microsoft or our partners to charge you for computer fixes."
What the Australian Competition and Consumer Commission says:
"Computer cold call virus scam – scammers outsmarted! October 2012: Joint action between three international regulators has thwarted a massive global phone scam, with US authorities winning court orders to close down and freeze funds of imposters posing as Microsoft employees offering to fix PC viruses. The Australian Communications and Media Authority (the ACMA), the US Federal Trade Commission and the Canadian Radio-television and Telecommunications Commission collaborated to share key intelligence about the operations of the Microsoft imposters. his scam was one of the most commonly reported scams in 2011, with computer hacking scams contributing more than 23 per cent to the total scam reports to the ACCC. SCAMwatch urges you to remain alert – this type of scam continues to do the rounds, with scammers impersonating other well known and trusted companies or government agencies to slip under your radar. If you receive a call out of the blue from a stranger requesting access to your computer, money or your personal details, just hang up.
"How these scams work" You receive a call out of the blue from someone claiming to be from (or have a relationship with) Windows or Microsoft and that they have detected a virus on your computer. To confirm the diagnosis, the caller asks you to open Windows Event Viewer on your machine to check if it is infected. Several error messages are listed and this reinforces their claims, even though errors are common and usually harmless. The caller tells you that these are of significant concern and offers to refer you to a ‘technician’ who could fix the problem—for a fee. At this point, you’re offered a number of solutions that seem to make perfect sense. Depending on the intent of the particular scammer involved, the ‘technician’ might: 1. Install an antivirus program on your computer—typically the kind that you can download for free from reputable companies—and charge up to $250 for the service. 2. Ask for your credit card details but install nothing. Your details might then be sold to other parties or used for fraudulent purposes. 3. Install malware on your computer—this enables your computer to be controlled remotely for other illegal and harmful activities. 4. Access and steal personal and financial details from your computer.
Follow-up scam: Scammers have also been known to make follow-up calls to people who initially fell victim to the scam. In these calls the scammer falsely claims to be from a foreign government, foreign law enforcement body, or from your bank, and offers to recover the money that you initially lost— in return for a fee."Protect yourself. Suspect: Don’t accept anything at face value—if it sounds unlikely or too good to be true, it probably is. Think: Recognise the signs—if you’re being pressured to act, disclose personal details or send money to a stranger, it’s almost certainly a scam. For example, Microsoft never makes unsolicited phone calls about its products. Report: Act quickly—tell SCAMwatch and stop scammers in their tracks. Ignore: Never respond. Just hang up, or delete the SMS or email after reporting."
*William Leonard "Bill" Gammage AM was born in Orange, New South Wales, in 1942. He is an Australian academic historian, Adjunct Professor and Senior Research Fellow at the Humanities Research Centre of the Australian National University in Canberra. He went to Wagga Wagga High School and then to ANU. He was on the faculty of the University of Papua New Guinea and the University of Adelaide. He is a fellow of the Australian Academy of Social Sciences and deputy chair of the National Museum of Australia. Gammage is best known for his book The Broken Years: Australian Soldiers in the Great War, which is based on his PhD thesis written while at the ANU. It was first published in 1974, and re-printed in 1975, 1980, 1981 (the year in which Peter Weir's film, Gallipoli, came out), 1985 and 1990. The study revives the tradition of C.E.W. Bean (who used a Corona 3 portable typewriter). Bean was Australia's official historian of World War I, one who focused his narrative on the men in the line rather than the strategies of generals. Gammage corresponded with 272 Great War veterans, and consulted the personal records of another 728, mostly at the Australian War Memorial. He has written several other books about the experiences of soldiers in World War I, including three definitive books about Australian soldiers in the war. In 1998, Gammage joined the Humanities Research Centre at the ANU as a senior research fellow for the Australian Research Council, working on the history of Aboriginal land management. His scope was cross-disciplinary, working "across fields as disparate as history, anthropology and botany". In the subsequent 13-year period he researched and wrote the book The Biggest Estate on Earth: How Aborigines made Australia, released in October 2011. It won the 2012 Prime Minister's Prize for Australian History in the Prime Minister's Literary Awards. As a historical adviser on Gallipoli, Gammage has worked on many documentaries and his writing is cited as an authoritative source on Australia's participation in World War I. For the film Gallipoli, Gammage was employed as the military adviser and he worked on the text that Australia's leading playwright David Williamson turned into the screenplay for the film. In 2005 Gammage was made a Member of the Order of Australia.
Perhaps it may seem ironic that I have used for this typecast a typewriter given to me by an expert on Gallipoli and World War I, a war in which Australians fought and died for freedom. Freedom to do what? To use the Internet and in doing so innocently fall prey to cyber attacks from such vicious, nasty, shit-rotten criminals? What sort of freedom is that? Americans, Australians and New Zealanders died in their tens of thousands in two world wars to preserve law, order and justice - and we finish up with this!