Font Size A A A
Thames Valley Alert Thames Valley Alert
Click here to sign up to Thames Valley Alert Click here to login to your Thames Valley Alert account
Click here to sign up to Thames Valley Alert Click here to login to your Thames Valley Alert account

Crime Update Wednesday 24th May 2017 - Windsor

Alert message sent 24/05/2017 14:41:00

Information sent on behalf of Thames Valley Police

This message is dated Wednesday 24th May 2017 for Windsor.
Neighbourhood Page:
For your Neighbourhood Page - CLICK HERE
23/5  Tuesday 7 p.m.  Vansittart Park, Vansittart Road.  A group of youths have walked through the park snapping off all the new trees which had been planted by the Borough.
23/5 – 24/5  Tuesday 4.45 p.m. / Wednesday 10.50 a.m.  Osborne Road.  Car tyres slashed for third time this year.  Ongoing situation.
23/5  Tuesday 2 p.m. / 5.30 p.m.  Alexandra Road.  Transit van front passenger window smashed.  The thief reached in and stole a MOBILE PHONE LEFT ON THE PASSENGER SEAT
9/5 – 23/5  Bell Lane.  Bike shed broken into and 3 bikes stolen.  1.  A dark blue, Carrera, hybrid bike.  2.  A white mountain bike.  3.  A pink, mountain bike.
Neighbourhood page:
For your Neighbourhood Page - CLICK HERE
19/5 – 23/5  Friday / Tuesday Ellison Close.  Attempted garage break.  The owner has found their garage door bent and twisted as someone has attempted to force open the door.  No entry gained.
Neighbourhood Page:
neighbourhood Page:
For your Neighbourhood Page - CLICK HERE
22/5 – 23/5  Monday 11 p.m. / Tuesday 7 a.m.  The Avenue, Wraysbury. Burglary.  Thieves have climbed over a rear fence into the garden and forced a rear door into a garden room.  Apple Mac, apple external hard drive and video camera stolen.
23/5  Tuesday 6.30 p.m. / 8.15 p.m.  The Drive Wraysbury.  Thieves smashed a side and rear car window and stole 2 children’s scooters.
Eyes, ears.....and Brain
Jeff, Welcome back! Hope you had a great time.
A new scam, at least to me:
Phone call with a female of Asian origin on the other end. Calling about “the high volume of nuisance calls” I am receiving. I can’t make out where or what company she’s calling from, despite asking several times, due to her accent.
I string her along and after a couple of minutes she passes me to her “area manager” who proceeds to talk about supplying me with a call blocker to fit to my phone, guaranteed to block all nuisance calls. ( He didn’t say whether that included him!!) For this service I’ll be charged £1.99 a month for 5 years whilst using this device.
At this point I get the catch before he goes any further. No doubt he’d want my bank details to ostensibly open a direct debit but to then actually be able to clean the account out.
At that point I terminated the call.
Hope this might help any unwary readers.
Many thanks Malcol, the TPS – Telephone Preference Service – offered by BT does exactly this FOR FREE !  You could also consider the BT Call Blocker Phone ranging from £25 up for cordless.
Hi Jeff,
Perhaps too much to display, but the best, clear-language, description of the various threats that plague the internet. (Almost as much as would frighten the timid from using it unfortunately!).
Courtesy of IBM Trusteer Rapport - service that many banks offer FOC
A phishing attack is when the attacker builds a phony website (the phishing site) that looks exactly like a website you know and trust (for example your bank's website). The attacker then lures you to visit the phishing website (for example by sending you a fraudulent email). When you arrive at the phishing website you mistakenly believe that this is the real website. As soon as you try to sign into the phishing website, the attacker grabs your login credentials and can now use them to login to the real website, impersonate you and initiate fraudulent transactions.
A pharming attack is when the attacker causes your computer to go to fraudulent website each time you type a real website's name in your web browser address bar. The attack accomplishes this using various techniques such as infecting your desktop with malware or by compromising servers in your ISP's network. Once you arrive at the fraudulent website and try to sign in, the attacker grabs your login credentials and can now use them to login to the real website, impersonate you and initiate fraudulent transactions.
A Keylogger is malicious software that hides itself inside your computer. The keylogger records keystrokes (i.e. each time you type something on the keyboard) and then sends this information to the attacker. By grabbing your sign-in credentials and other sensitive information and sending them to an attacker, keyloggers enable an attacker to login to your accounts, impersonate you and initiate fraudulent transactions.
Man in the Middle:
Man in the middle is an advanced variation of Phishing and Pharming attacks. In this particular attack you sign into the website and start working all the while entirely unaware that all the information exchanged between you and the website is passing to the attacker. The attacker can view any private information and can alter your transactions. For example, if you request to transfer a certain amount of money to a specific payee, the attacker can change the payee's identity and have the money transferred to a different account.
Man in the Browser:
"Man in the Browser" is malware that resides inside your browser in the form of an add-on (e.g. toolbar, BHO, browser plug-in). This malware controls everything that happens inside your browser. It is capable of reading sensitive information such as your sign-in credentials and passing them to the attacker. It can also generate transactions on your behalf, such as transferring money from your account to the attacker's account.
Screen Capturing:
This term refers to malware that takes pictures of your computer screen and sends them to the attacker. Screen shots can include your account details, balance, and even credentials when the website uses keypads for login.
Session Hijacking:
This term refers to malware that steals your session parameters with a specific website and sends this information to the attacker. These session parameters can then be used by the attacker to take over your session with the website and to bypass the authentication process that is required to log into the website.
Hope useful,

NEXT:- One I have received before in my Police email in-box….from Ban Ki-Moon at the United Nations !!!
If I would like to contact Mr. Frank Oliver of Zenith Bank Nigeria, I will receive $5m !  All I need to send him is:
‘When Contacting Him Send To Him your
(1) Your Valid Direct Tel/ Mobile/Fax Number.
(2) Your Full Name:
(3) Current Resident Address.
(4) Your Private E-mail Address.
(5) Your Occupation:
(6) Your Age and Sex:
(7) Your Nationality:
(8) Your Monthly Income:
(9) Driving license or your passport copy or your working id card:
(10)Your Next of Kin.
Thanks and God bless you and your family’.
NEXT: A letter scam from Lesley !
Hi Jeff,
I enclose a letter and envelope received this morning with our post (via Royal Mail).  It is clearly a scam but appears to have been posted in Spain, not sure if anyone has reported this source before but thought it might be good to warn people as some could be taken in by this.
The letter is from Pintos & Salgado – Abogados (lawyers).  They say it is ‘utterly confidential and top secret’.  The letter asks for help top secure 11,500.00 Euros from the account of the late Mr. Morgan Welland – an ex pat.  Apparently he died of cancer and a stroke !  The lawyer cannot trace any family, so is turning to a respectable citizen, to help him extricate the money from the bank without the authorities being aware………etc.etc. !!
No-one would fall for this surely……???
Message sent by
Jeffrey Pick (Police, NHW & Community Msg Co-ordinator, Windsor & Maidenhead LPA)

Message tag words

Back to previous page
Click here to tweet this message to your followers

Discuss this alert message

Please see terms below before using this feature
Please be aware that the facility above is a Facebook service, posting your views will make some of your Facebook information visible to everyone (as with any Facebook activity).

The system administrators (VISAV Limited) monitor the content added. Any misuse or objectionable material should be reported to

The views expressed do not represent the views of the system administrators who are VISAV Limited, the Police, Neighbourhood Watch and other Information Provider using this service.