Scam Update [8/16/12]: Developer of Technician Deployment wrote a blog post here …
The tech world was abuzz over the weekend after a tech posted on a LinkedIn group that Technician Deployment Services had him listed as a resource at their website. He never had a business relationship with them and the information that they held on him was inaccurate and fabricated. All tech profiles at the above site had varying amounts of inaccurate work orders listed and canned stats for each tech was flush at 85 percent.
The data that TDS utilizes is at least five months old.
Technician Deployment Services (TDS) is a Spokeo-type website where technician data has obviously been harvested from various tech platforms (via public search interfaces with Geo-locate tools). The data that TDS utilizes is at least five months old and does not match the techs with their fields of expertise.
On one tech forum a technician exchanged some emails with TDS “Mark” requesting details about why TDS claims that he ran 60+ calls for them. Mark responded that he did not track which platform he ran the calls from but insisted it was from one of the reputable tech platforms.[ref] Tech Companies that have been in business for two or more years and have stability in the tech industry. [/ref] He also responded in an email to one of the techs that the tech had run a few Dell system calls for them – and the tech commented that he had never run Dell calls for two of the reputable tech platforms. Mark rebutted stating that he has limited info after the merger of the reputable tech platform databases with his own.
Recently, TechCaddie requested removal of his tech profile from TDS and sent me this TDS Voice mail response from Mark (current phone# 832.303.9151); note the voice comparison with this TSWW YouTube video. Mark has a tendency to note reputable companies in his response to techs who query him. One lie is built upon another, this is how scam artists operate.
Charles Johnson, Charles A. Johnson, Adam Johnson, Chuck Johnson, Charles J. Adams), is a scam artist.[ref]Ripoff Report http://www.ripoffreport.com/directory/Charles-Johnson.aspx [/ref]He is currently running two companies that I am aware of:
1. Technician Deployment Services (TDS)
I could not find TDS legally registered in any of the states that Mark haunts but he has a virtual office in Manhattan at 45 Rockefeller Plaza. His YouTube video: We Have The World’s Most Advanced Portal is psychologically frightening.
2. Technology Services Worldwide (TSWW)
is delinquent…and they have a website filled with lies. They are not with listed with the BBB and NASA is not one of their clients. [website was taken offline]
Content/Web Theft/Intellectual Property Theft
Both sites are ripoffs of other sites on the web, with bits and pieces stolen from brands and patched together to make both sites appear genuine.
Both sites are ripoffs of other sites on the web, with bits and pieces stolen from brands and patched together to make both sites appear genuine. Online criminals like Mark (a.k.a.
Charles Johnson, Charles A. Johnson, Adam Johnson, Chuck Johnson, Charles J. Adams) are a dime a dozen, though he is a bit dumber than the rest. He is certainly not an expert at covering his digital content-theft tracks, but appears to be quite adept at disguising his geographical location.
TSWW is “revolutionizing[ref] http://wn.com/techniciandeployment [/ref]the industry” by stealing videos from Concert Technologies and from ServiceMax[ref] http://www.tswsupport.com/Meeting/WhyOurTechnologyWorks.html.[/ref]too. Check out this partial client list and compare it with the client list over at Vantage Technology Development.
My Fake Profile
Nothing is happening with Polly – her profile is still blank…
I could not stand the suspense of being left out of Mark’s database, so I created Polly Wood on Tuesday (she has an 85% default performance rating). Nothing is happening with Polly – her profile is still blank, though she is currently listed in the site search at TDS. Two new techs were recently added this week, respectively: # 410362 and #410363.
Take Action! – A Lesson From The Infosec Community
Gregory Adams of Ligatt Security (web archive) was finally dismantled by the #infosec community for a long history of plagiarizing content without attribution or permission. Once claiming to be the Worlds #1 hacker and even copy/pasting a book about it!
It is the common opinion of industry experts that Evans and his company have little real knowledge beyond pedestrian hacking techniques found in plagiarized books and beginner hacking texts. LIGATT offers products that are simply bloated version of common tools such as ping and nmap.[ref]
Rothke, Ben. Lessons from LIGATT. July 11, 2011.
Date of Access:August 9, 2012 . Retrieved from: http://infosecisland.com/blogview/15064-Lessons-from-LIGATT.html[/ref]
The Infosec community had him banned from speaking at security conferences and was able to carry out a successful Twitter campaign under the #Ligatt hash tag to expose and contain him.
To eventually stop online criminals like Mark, it will take tremendous action and energy from the tech community.
To eventually stop online criminals like Mark, it will take tremendous action and energy from the tech community. Merely complaining in forums will not achieve anything. Tech action should involve collecting a repository of information on his misdeeds, bombarding his social profiles with validated accusations, reporting falsified information (such as Microsoft Gold Certified Partner, Cisco Select Certified Partner claims at his site), and contacting state officials (Attorney General).
Always make sure that the company you are handing your tech profile to is legitimate and well known in the tech realm.
5 Key Characteristics Of A Reputable Tech Company
- They are searchable via the major search engines: Google, Bing, Yahoo.[ref]Edit suggested by George Jenkins of I’ve Been Mugged[/ref]
- They have a physical address.
- Their business is registered with the Secretary of State and their status is active and in good standing.
- WHOIS for their company domain does not hide behind a privacy mask.