Amazon lockers are a great new idea, allowing people to pick up their parcels when it suits them. Now, Amazon has announced that it’s rolling out the scheme across the Staples chain, too.
The lockers are stupidly simple. You can even have your locker code texted to you when your order arrives. It doesn’t cost anything-standard, one-, and two-day shipping is available for free if you’re on Prime. If you have the need for a surrogate mailbox, using Lockers is pretty much a no-brainer.
Amazon has already partnered with other stores in the US— including 7-Eleven, Rite-Aid, Safeway, and Walgreen’s—but Staples is a biggy. Just don’t mention that Amazon is stealing custom from right under its nose, because that would be rude—and at any rate, you can be sure some serious cash is changing hands to set this scheme up. [Reuters]
Early Tuesday morning, federal officials raided four Phoenix, Ariz. properties, seized 21 cars and arrested three women accused of running the largest counterfeit coupon ring in the country.
The mission involved a joint effort by the FBI, local police, and a roster of manufacturing giants that included Procter & Gamble, PepsiCo and Hershey, which were among dozens affected by the scheme, according to industry watchdog Coupon Information Corp.
“These aren’t ’50 cent off’ coupons. These are ‘free item’ coupons,” Police Sergeant Dave Lake said. “For Iams, you get this coupon from her for $10 and you can get a $70 item…If you can get an unlimited number of those, think how this grows.”
Unraveling the scheme
There’s no telling how badly businesses were burned, but police estimate they’ve lost hundreds of millions of dollars. Here’s how manufactures helped tip investigators off to the fraud, according to AZ Central:
“Police said approximately four years ago high-quality copies of manufacturer’s coupons began surfacing in the United States from an unknown source. The victim companies teamed with Coupon Information Corp. and hired private investigators to find where the coupons were being sold in the country. The investigators found several market re-entry points, with the most prolific one located in Arizona.”
That’s where Robin Ramirez, 46, Amico Fountain, 42, and Marilyn Johnson, 62, allegedly ran the bulk of their business, using a fake website and eBay to sell consumers fraudulent coupons at a deeply discounted rate.
How the plan worked
In order to receive the free or discounted coupons, users were “invited” to join the site and given a 100 percent guaranteed return if the deals were rejected at the point of sale.
The website domain may sound familiar. “Savvy Shopper” magazine sends out real coupons to consumers each week, but officials say the scammers simply borrowed the brand to make their scheme seem more legitimate.
While none of the consumers who purchased the coupons will face charges, counterfeit coupons could easily land the people and businesses that unwittingly purchase them in hot water.
“Coupon buyers expose themselves to the possibility of becoming involved with counterfeits, stolen property or other criminal activities,” Miller said in a statement. “They may also expose themselves to additional risk by providing their names, home addresses and financial information to organized crime rings.”
The key to avoiding counterfeit coupons is simple: Don’t buy them.
Here are some other tips CIC passes along to consumers:
-Beware of invalid disclaimers, such as “You not paying for the coupons, but for the time and effort it took to clip them.”
-Be wary of any coupon emailed to you by anyone but the manufacturer or its authorized distributor
-If a coupon is visible on a computer screen, it is probably counterfeit
-Free product coupons are seldom, if ever, distributed on the Internet.
DON’T MISS: 13 clever uses for household items >
If Kenneth G. Lieberthal were anything but a China expert at the Brookings institution, his travelling-in-China security procedures would read like the product of a paranoid mind that watched too many spy movies as a kid:
He leaves his cellphone and laptop at home and instead brings “loaner” devices, which he erases before he leaves the United States and wipes clean the minute he returns. In China, he disables Bluetooth and Wi-Fi, never lets his phone out of his sight and, in meetings, not only turns off his phone but also removes the battery, for fear his microphone could be turned on remotely. He connects to the Internet only through an encrypted, password-protected channel, and copies and pastes his password from a USB thumb drive. He never types in a password directly, because, he said, “the Chinese are very good at installing key-logging software on your laptop.”
Talk about overkill, right? Well he’s not alone. The Times reports that these seemingly paranoid precautions are par for the course for just about anyone with valuable information including government officials, researchers, and even normal businessmen who do business in China.
But what about the rest of us? I may not have any valuable state secrets or research that needs protecting but that doesn’t mean I want the Chinese government snooping on my internetting when I visit my grandparents (especially when the consequences can be so severe). In the past, I’ve relied on a combination of VPNs, TOR, and password-protecting everything I can, but now it sounds like even that isn’t enough. Or maybe it’s totally overkill given my general unimportance in the grand scheme of things. Dear readers, I ask you, how much security is enough when it comes to the average person on vacation? [NY Times]
What looks like the card slot from a Chase Bank ATM is actually a sophisticated card skimmer removed from a branch in West Hills, California. And police believe a 3D printer may have been used to create it.
Those green bulbous card slots that were supposed to make it very difficult for a card skimmer to be attached to an ATM have turned out to be just a minor inconvenience for sophisticated thieves. Investigators believe this skimmer—which perfectly fits over the ATM’s regular slot— was created from a mould that came from a 3D printer. Which means those behind this particular ATM scheme had some very expensive tools at their disposal.
In addition to being a perfect replica of the ATM’s standard card slot, this skimmer incorporates a small pinhole camera that starts recording the PIN pad whenever a card is inserted. On the underside is a series of holes that investigators believe allowed the thieves to download data and footage, but the complex electronics on the inside may have been salvaged from a cellphone, giving this skimmer wireless connectivity. So in the future, like in many situations, make sure you take a good look at the hardware before you stick your thing in the slot. [KrebsonSecurity via BoingBoing]
Dr. Augustine Fou is Digital Consigliere to marketing executives, advising them on digital strategy and Unified Marketing(tm). Dr Fou has over 17 years of in-the-trenches, hands-on experience, which enables him to provide objective, in-depth assessments of their current marketing programs and recommendations for improving business impact and ROI using digital insights.
Collaborators – Digital Profs
- Netflix vs Blockbuster - Perfect example of an industry replaced by a more efficient version of itself
- The JKWeddingDance video was real; the viral effect was MANUFACTURED - Post 1 of 2
- Coke vs Pepsi vs Dr Pepper
- Marketing Costs Normalized to CPM Basis for Comparison
- Facebook advertising metrics and benchmarks
- Try On New Glasses in Warby Parker's Virtual Booth
- The Grand Unified Theory of Marketing(tm) - Digital String Theory
- 90-9-1 or 1-9-90 Rule of Social Media Participation
- Did you Google Bing too?
- Brand Advertisers: Escaping an Ecosystem of Digital Advertising Fraud
- #SESNY: Toward a Performance Mindset for All Advertising
- Tips for Marketers Selecting a Digital Agency
- Context Is Not King or Queen; It's Just Necessary
- 2013 New Year's Digital Marketing Resolutions
- The Good, Bad, and Ugly of Online Campaign Ratings and eGRPs
- Why You Should Banish the Net Promoter Score Immediately
- Digital Strategy To-MAY-to vs. To-MAH-to
- The Agency-Client Relationship is Forever Changed
- Targeting vs. Privacy - Who Will Win?
- May 2015 (4)
- April 2015 (32)
- March 2015 (57)
- February 2015 (79)
- January 2015 (86)
- December 2014 (69)
- November 2014 (98)
- October 2014 (150)
- September 2014 (109)
- August 2014 (44)
- July 2014 (92)
- June 2014 (118)
- May 2014 (173)
- April 2014 (130)
- March 2014 (247)
- February 2014 (167)
- January 2014 (222)
- December 2013 (167)
- November 2013 (111)
- October 2013 (116)
- September 2013 (214)
- August 2013 (210)
- July 2013 (200)
- June 2013 (87)
- May 2013 (87)
- April 2013 (70)
- March 2013 (114)
- February 2013 (89)
- January 2013 (136)
- December 2012 (96)
- November 2012 (130)
- October 2012 (147)
- September 2012 (93)
- August 2012 (93)
- July 2012 (112)
- June 2012 (71)
- May 2012 (82)
- April 2012 (80)
- March 2012 (122)
- February 2012 (114)
- January 2012 (129)
- December 2011 (60)
- November 2011 (54)
- October 2011 (29)
- September 2011 (17)
- August 2011 (30)
- July 2011 (18)
- June 2011 (19)
- May 2011 (23)
- April 2011 (23)
- March 2011 (52)
- February 2011 (69)
- January 2011 (108)
- December 2010 (82)
- November 2010 (67)
- October 2010 (68)
- September 2010 (44)
- August 2010 (101)
- July 2010 (61)
- June 2010 (28)
- May 2010 (28)
- April 2010 (26)
- March 2010 (33)
- February 2010 (21)
- January 2010 (13)
- December 2009 (4)
- November 2009 (2)
- October 2009 (14)
- September 2009 (6)
- August 2009 (19)
- July 2009 (34)
- June 2009 (11)
- May 2009 (4)
- April 2009 (6)
- March 2009 (13)
- February 2009 (32)
- January 2009 (25)
- December 2008 (1)
- October 2008 (1)
- June 2008 (1)
- November 2007 (1)