Heather Jo Johns is on a Global Mission Federal Binding!

Screenshot_2017-08-12-20-59-14-1-1  Press Release              No Kill Date

August 12,2017            Contact: Heather

214-310-1328

 

#CEO of Aubshealthysmartline.com Heather Jo Johns 

We will be moving our corporation to #Canada soon!

Right no we have an #MOU #World  #Alliance to help over 1.26 #BILLION people around the world primarily every country in #Africa and 10 other #Countries! #Next we plan to  meet with all the #Ambassador from every #country to help implement #law for new #technology since the #WHO #WORLDHEALTHORGANIZATION has recognized #staticelectricty as a #Global Issue. We have the #Solution #President of the #africanchambersofcommerce aubshealthysmartline.com  

Let our family help yours! Visit our site today and live Healthy and Smart!

Posted in Uncategorized | Leave a comment

RF Security Tip #23 Scare Tactics how they are used and how to document and associate with crime

 

Heather Jo Johns is a Master Security Officer x3 trained who secures her family daily and the author of the Newest Security Tips Book that will be on the market by the end of this year RF REINFORCEMENT SECURITY TIPS! Heather has written these tips with a group of other professionals in the security and private investigator industry who have worked with the elite organizations of the world to help serve and protect our country such as the FBI, CIA,US PROTECTIVE SERVICES, SECRET SERVICE, PRESIDENT OF THE UNITED STATES and THE WHITE HOUSE COMMUNICATIONS AGENCY . Heather has started this book on the account of her personal experiences and all the crime and terror that has hit our country. The question is how will we keep our families safe? People will be taught through this tips booklet on easy steps that they can take to help prevent crime from happening to their family members. Heather will be open for interviews to discuss the book for interview and give her advice and view on crime and terror today. Get excited she is one of the best in the United States and has a passion and a fire for keeping people safe and educating people and families as her family are all in Politics and affiliates and associated of the White House. Heather knows their safety is a priority and so is your families. Lets go!  Its time for a change!

scare tac·tic

ske(ə)r ˈtaktik/
noun
plural noun: scare tactics
  1. a strategy intended to manipulate public opinion about a particular issue by arousing fear or alarm.

Scare Tactics are usually used to put out a subliminal message depending on the situation that is at hand and what is going on around you. If you know for a fact that the scare tactic that has been used is a subliminal message towards you and is associated with any crime where there could be federal charges or charges period you must document the information and submit it as soon as possible and the safest timely manner. If you’re not able to deliver the information yourself you need to give the information to someone else to deliver to the proper authorities and News, Public. People use scare tactics that’s threats as well too and if the scare tactic that actually took place was a fact and actual event such as attempted murder or murder and you have that evidence you need to submit it because the criminals will be prosecuted and charged period. How to tell if it is a scare tactic or not is if it directly reflects a situation that has been threatened towards you from an organized crime group or person also look for keywords that are associated with yourself ,places, dates. Make sure that you have all the necessary documents so that investigators will have an easy job if the investigation is already been taking place and you have the proper documentation of evidence notes pictures audio visual videos it will make their job a lot easier and also make the job lot easier when it comes to the judge and the jury make sure you have it in a nice PowerPoint format or documented in an organized professional manner when submit it. You don’t have to live in fear because of a scare tactic if you have done nothing wrong you have nothing to be scared of if you have done something wrong you should be scared.

Nevertheless Justice will always be served no matter what the plot plan and scheme is as long as it’s already documented this will be great for prevention. People tell on themselves really  and I’m sure if someone used to scare tactic against you that they verbally threatened you before rather it be in person through an informant, subliminal message,music or video. You will be able to recognize and Associate the criminals so that they can be prosecuted. Rather it be Nationally or Internationally

Posted in Uncategorized | Leave a comment

RF Security Tip #21 Threats of Judicial Corruption, Misconduct, Fraud, Bribery How to document

 

 

Heather Jo Johns is a Master Security Officer x3 trained who secures her family daily and the author of the Newest Security Tips Book that will be on the market by the end of this year RF REINFORCEMENT SECURITY TIPS! Heather has written these tips with a group of other professionals in the security and private investigator industry who have worked with the elite organizations of the world to help serve and protect our country such as the FBI, CIA,US PROTECTIVE SERVICES, SECRET SERVICE, PRESIDENT OF THE UNITED STATES and THE WHITE HOUSE COMMUNICATIONS AGENCY . Heather has started this book on the account of her personal experiences and all the crime and terror that has hit our country. The question is how will we keep our families safe? People will be taught through this tips booklet on easy steps that they can take to help prevent crime from happening to their family members. Heather will be open for interviews to discuss the book for interview and give her advice and view on crime and terror today. Get excited she is one of the best in the United States and has a passion and a fire for keeping people safe and educating people and families as her family are all in Politics and affiliates and associated of the White House. Heather knows their safety is a priority and so is your families. Lets go!  Its time for a change!

 

Has someone or a organized crime group threatened you or your family saying that they will bribe a judge or manipulate the judicial system for their advantage or to try to set you up? Have you heard songs or seen videos with this type of information from people connected to you? If you have you need to document the information and submit it asap to the FBI or any other federal official in a timely manner. Powerful messages can be relayed to you through informants about a plot, plan and scheme . These are federal charges especially if they are associated with a federal conspiracy against a person or a group. Not only for the person using misconduct, corruption and fraud but also for the group that is threatening. Better safe than sorry

Posted in Uncategorized | Leave a comment

RF Reinforcement Security Tips #20 Credit Card Fraud

Heather Jo Johns is a Master Security Officer x3 trained who secures her family daily and the author of the Newest Security Tips Book that will be on the market by the end of this year RF REINFORCEMENT SECURITY TIPS! Heather has written these tips with a group of other professionals in the security and private investigator industry who have worked with the elite organizations of the world to help serve and protect our country such as the FBI, CIA,US PROTECTIVE SERVICES, SECRET SERVICE, PRESIDENT OF THE UNITED STATES and THE WHITE HOUSE COMMUNICATIONS AGENCY . Heather has started this book on the account of her personal experiences and all the crime and terror that has hit our country. The question is how will we keep our families safe? People will be taught through this tips booklet on easy steps that they can take to help prevent crime from happening to their family members. Heather will be open for interviews to discuss the book for interview and give her advice and view on crime and terror today. Get excited she is one of the best in the United States and has a passion and a fire for keeping people safe and educating people and families as her family are all in Politics and affiliates and associated of the White House. Heather knows their safety is a priority and so is your families. Lets go!  Its time for a change!

 

 

 

11 Types Of Credit Card Fraud

 

By Michael Bennett

 

Views: 7514

 

Credit card fraud comes in many different shapes and forms, including fraud that involves using a payment card of some description, and more. The reasons for credit card fraud also vary. Some are designed to obtain funds from accounts, while others wish to obtain goods for free. Furthermore, it is very important to understand that credit card fraud is linked closely to identity theft. According to the Federal Trade Commission, some 5% of all people over 16 in this country have been or will be the victim of identity theft. Additionally, at the last count in 2008, it was found that there had been a 21% growth in prevalence of identity theft. On the other hand, the percentage of identity theft cases related to credit card fraud decreased, which is a positive thing and a credit to law enforcement professionals and the general public as a whole.

 

It seems that about 0.1% of all credit card transactions are fraudulent, which equates to a huge financial loss. Some 12 billion credit card transactions were conducted in 2009, of which about 10 million were fraudulent. Additionally, it was found that 0.04% of all accounts that were active monthly were fraudulent. These proportions have not changed much over time. It is a positive thing to know, however, that there are now more sophisticated methods of detecting fraud and stopping it. Unfortunately, the actual amount in losses continues to be in the billions.

 

But credit card fraud is not just one single action. In fact, there are many different forms out there. Below are the 11 most common forms of credit card fraud. It is important to remember that there are more, particularly as hackers and identity thieves are becoming more proficient at taking people’s financial data online.

 

1. Application Fraud

 

Application fraud generally happens in conjunction with identity theft. It happens when other people apply for credit or a new credit card in your name. They will usually first steal supporting documents, which are then used to substantiate their fraudulent application. Banks have various safeguarding measures in place to stop this type of fraud from happening. The most important one is requiring original documentation only. Additionally, they will often telephone employers to confirm identity. Unfortunately, criminals will frequently forge documents and provide false telephone numbers for places of employment. Unfortunately, there are always ways around certain safeguarding measures.

 

2. Electronic or Manual Credit Card Imprints

 

A second form of credit card fraud is experienced through credit card imprints This means that somebody skims information that is placed on the magnetic strip of the card. This is then used to encode a fake card or to complete fraudulent transactions.

 

3. CNP (Card Not Present) Fraud

 

If somebody knows the expiry date and account number of your card, they can commit CNP fraud against you. This can be done through phone, mail or internet. It essentially means that somebody uses your card without actually being in physical possession of it. More and more and often, merchants will require the card verification code, making CNP fraud slightly more difficult, but if a fraudster can get your account number, they probably know that number too. Additionally, there are only 999 possible combinations for the verification code. As such, many criminals attempt to order items of very low amounts until they figure out the right number. Be on the lookout, therefore, for small payments on your statements.

 

4. Counterfeit Card Fraud

 

Counterfeit card fraud is usually committed through skimming. This means that a fake magnetic swipe card holds all your card details. This fake strip is then used to create a fraudulent card that is fully functional. Essentially, it is an exact copy, which means fraudsters can simply swipe it in a machine to pay for certain goods. This type of fraud can also be committed by someone who knows your card details. They can use this information to create a so-called ‘fake plastic’. Here, the magnetic strip or the chip on the card doesn’t actually work. However, it is often easy enough to convince a merchant that there is something wrong with the card, at which point they will enter the transaction by hand.

 

5. Lost and Stolen Card Fraud

 

The next possible type is lost and stolen card fraud. Here, your card will be taken from your possession, either through theft or because you lost it. The criminals who get their hands on it will then use it to make payments. It is difficult to do this through machines, as they will require a pin number. However, it is easy enough to use a found or stolen card to make online purchases. It is for this reason that it is vital that you cancel your cards as soon as you realize they are missing.

 

6. Card ID Theft

 

Card ID theft happens when the details of your card become known to a criminal, and this information is then used to take over a card account or open a new one. Your name will be used for this. This is one of the most difficult types of fraud to identify and to recover from, because it can take a long time before you even know that it has happened.

 

7. Mail Non-Receipt Card Fraud

 

This type of fraud is also known asnever received issue or intercept fraud. In this case, you were expecting a new card or replacement one and a criminal is able to intercept these. The criminal will then register the card and they will use it to make purchases and more.

 

8. Assumed Identity

 

With assumed identity fraud, a criminal will use a temporary address and a false name to obtain a credit card. There are a number of systems in place with banks for protection against this type of fraud. For instance, they will ask new customers to provide account references and these will be check to ascertain that they are genuine. Additionally, they could ask for such things as birth certificates, original copies of driver’s license or passports and so on. They often ask for these things before they will send a card out.

 

9. Doctored Cards

 

A doctored card is a card whereby a strong magnet has erased its metallic stripe. Criminals do this and then manage to change the details on the card itself so that they match those of valid cards. Naturally, this card won’t work when a criminal tries to pay for something. However, they will then use their charm to convince a merchant to just enter the details of the card manually.

 

10. Fake Cards

 

It takes a lot of time, skill and effort to create fake credit cards, but that doesn’t stop a determine criminal. A card has to meet certain complex security features and cards are becoming increasingly advanced, meaning this is much harder to do. There is the magnetic strip, the chip and, often, holograms. However, someone who is skilled can forge this type of cards using fake names and numbers and will make transactions with the card. The card isn’t actually linked to an account, so the credit card company will not pay for the transaction since they cannot link it to a specific user. By that time, however, the criminal will be long gone with their purchases.

 

11. Account Takeover

 

Account takeover is actually one of the most common forms of credit card fraud. Basically, a criminal will somehow manage to get hold of all of your information and relevant documents. This is usually done online. They will then contact the credit card company and pretend to be you, asking them to change the address. They will provide ‘proof’ of identity, since they have hacked through or otherwise obtained, your personal details. A replacement card will then be sent to the fake address, and the criminal will be able to make charges.

 

Unfortunately, it isn’t rare for this type of fraud to occur. It is important, therefore, that you are aware of what they are and you must be able to take the appropriate steps to prevent criminals from committing credit card fraud against you. Protecting your personal information is the most important element of that. This means common sense steps such as using strong, unique passwords and not leaving documents in plain sight.

 

 

 

Posted in Uncategorized | Leave a comment

RF Reinforcement Security Tip Leak #20 Informants

 

 

 

Heather Jo  Johns is a Master Security Officer x3 trained who secures her family daily and the author of the Newest Security Tips Book that will be on the market by the end of this year RF REINFORCEMENT SECURITY TIPS! Heather has written these tips with a group of other professionals in the security and private investigator industry who have worked with the elite organizations of the world to help serve and protect our country such as the FBI, CIA,US PROTECTIVE SERVICES, SECRET SERVICE, PRESIDENT OF THE UNITED STATES and THE WHITE HOUSE COMMUNICATIONS AGENCY . Heather has started this book on the account of her personal experiences and all the crime and terror that has hit our country. The question is how will we keep our families safe? People will be taught through this tips booklet on easy steps that they can take to help prevent crime from happening to their family members. Heather will be open for interviews to discuss the book for interview and give her advice and view on crime and terror today. Get excited she is one of the best in the United States and has a passion and a fire for keeping people safe and educating people and families as her family are all in Politics and affiliates and associated of the White House. Heather knows their safety is a priority and so is your families. Lets go!  Its time for a change.

 

in·form·ant
  1. a person who gives information to another.
    • another term for informer.
    • a person from whom a linguist or anthropologist obtains information about language, dialect, or culture.

Informants are used everyday not only by law enforcement to inform and get information on people breaking the law and cases.

Do you ever wonder how people who do not want to be directly associated with a crime such as bribery get the message across to others? They use informants to deliver the message. They may use family members, friends or even pay strangers to either get information or give information. You need to be aware if someone is trying to get you to be apart of something that evolves harming others that you will be liable and responsible for your part in whatever is taking place rather it’s delivering a message or being a part of the crime itself such as a conspiracy. Be careful not to divuldge information to strangers.

I have had many informants come to me to give me messages from others and Threats if you listen closely they will name drop and let you know their affiliations. You need to write down and document this information with as many clues as you can. If they use social media they may leave evidence their where you can screen shot and site and reference the source. Also keep recordings and note conversations.

Also people who have been in trouble previously usualy will not care to be associated. BRIBERY is 15 years in Prison.

 

Posted in Uncategorized | Leave a comment

RF REINFORCEMENT SECURITY TIPS LEAK #19 MURDER & ATTEMPTED MURDER

 

Heather Jo  Johns is a Master Security Officer x3 trained who secures her family daily and the author of the Newest Security Tips Book that will be on the market by the end of this year RF REINFORCEMENT SECURITY TIPS! Heather has written these tips with a group of other professionals in the security and private investigator industry who have worked with the elite organizations of the world to help serve and protect our country such as the FBI, CIA,US PROTECTIVE SERVICES, SECRET SERVICE, PRESIDENT OF THE UNITED STATES and THE WHITE HOUSE COMMUNICATIONS AGENCY . Heather has started this book on the account of her personal experiences and all the crime and terror that has hit our country. The question is how will we keep our families safe? People will be taught through this tips booklet on easy steps that they can take to help prevent crime from happening to their family members. Heather will be open for interviews to discuss the book for interview and give her advice and view on crime and terror today. Get excited she is one of the best in the United States and has a passion and a fire for keeping people safe and educating people and families as her family are all in Politics and affiliates and associated of the White House. Heather knows their safety is a priority and so is your families. Lets go!  Its time for a change

The United States federal government (in comparison to the separate states) applies the death penalty for crimes: treason, terrorism, espionage, federal murder, large-scale drug trafficking, and attempting to kill a witness, juror, or court officer in certain cases.

https://en.wikipedia.org/wiki/Capital_punishment_by_the_United_States_federal_government

 

I HAVE HAD BOTH OF THESE OFFENSES HAPPEN TO PEOPLE I KNOW IN MY FAMILY RECENTLY. WHEN MURDER IS INVOLVED JUST LIKE A CONSPIRACY THERE IS NO STATUES OF LIMITATIONS. IF YOU HAVE INFORMATION ON TIPS PLEASE SUBMIT TO THE FBI IN A TIMELY MANNER WHEN YOUR SAFETY AND YOUR FAMILY SAFETY IS NOT AT RISK.  IF YOU HAVE INFORMATION ON POTENTIAL THREATS ON ANY OF THE ABOVE LISTED  YOU NEED TO DOCUMENT THE TIME PLACE AND THE PEOPLE THAT WERE CONNECTED, AFFILIATED AND INVOLVED.

PROPERLY CITE AND REFERENCE ALL INFORMATION FOUND.

Posted in Uncategorized | Leave a comment

RF Reinforcement Security Tip Leak #18 TimeLine

 

Heather Jo  Johns is a Master Security Officer x3 trained who secures her family daily and the author of the Newest Security Tips Book that will be on the market by the end of this year RF REINFORCEMENT SECURITY TIPS! Heather has written these tips with a group of other professionals in the security and private investigator industry who have worked with the elite organizations of the world to help serve and protect our country such as the FBI, CIA,US PROTECTIVE SERVICES, SECRET SERVICE, PRESIDENT OF THE UNITED STATES and THE WHITE HOUSE COMMUNICATIONS AGENCY . Heather has started this book on the account of her personal experiences and all the crime and terror that has hit our country. The question is how will we keep our families safe? People will be taught through this tips booklet on easy steps that they can take to help prevent crime from happening to their family members. Heather will be open for interviews to discuss the book for interview and give her advice and view on crime and terror today. Get excited she is one of the best in the United States and has a passion and a fire for keeping people safe and educating people and families as her family are all in Politics and affiliates and associated of the White House. Heather knows their safety is a priority and so is your families. Lets go!  Its time for a change

b. A representation or exhibit of key events within a particular historical period, often consisting of illustrative visual material accompanied by written commentary, arranged chronologically.

http://www.thefreedictionary.com/timeline

 

TAKE PICTURES, CITE, REFRENCE KEEP RECORDINGS AND SONGS ALL IN YOUR TIMELINE

WHY KEEP A TIMELINE IF YOU’VE BEEN TARGETED? LESS WORK FOR INVESTIGATOR.

EXAMPLE:1 IF SOMEONE TRIED TO TALK YOU INTO PROSTITUTING AND ESCORTING AND YOU DID NOT AGREE AND THEN THEY TRY TO SET YOU UP BECAUSE THEY KNOW YOU RECORDED ANS DOCUMENTED THE CONVERSATION THEN U HAVE EVIDENCE.TIMELINE THAT EVENT TO SEE WHAT HAPPENS AFTER

2. IF SOMEONE TRIES TO RAPE YOU AND THEY ARE RELATED AND ASSOCIATED WITH A GROUP OR PERSON ND THEY WANT YOU TO PROSTITUTE AND HAVE OFFERED YOU MONEY ON SEVERAL OCCASIONS BUT YOU REFUSE AND YOU LET THE PEOPLE KNOW.
TIMELINE THAT EVENT. THEY MAY NOT WANT THEIR FRIEND TO GET IN TROUBLE.

3. PEOPLE MAKE SONGS ABOUT ACTUAL EVENTS AND PEOPLE AND IF YOUR IN THE INDUSTRY AND A NEW SONG COMES OUT AND YOU FEEL LIKE ITS TARGETING YOU ALSO TIMELINE.

ITS ALWAYS UP TO THE JUDGE AND JURY BUT AT LEAST YOU HAVE THE EVIDENCE AND FACTS OF WHY YOU WOULD BE TARGETED.

FYI STAY CLEAR OF FRAUDS! 😋

THERE’S NO STATUTE OF LIMITATIONS ON CONSPIRACY SO HAVE THE FACTS

 

 

 

Posted in Uncategorized | Leave a comment