Hello everyone,
I wrote about this problem awhile ago but the word is not getting out and here is a prime example that happened in the local area.If you have a child in school you need to check this out and help spread the word to your local school boards.
Schoolboard Snafu
Monday, December 11, 2006
Tuesday, November 14, 2006
Beware of The Double Whammy!!
This particular brand of ID Theft can not only end up costing you money but can also place you in physical danger
Medical ID Theft
Medical ID Theft
Thursday, October 05, 2006
As I Predicted the Advent of New Technologies
The latest I saw is a double threat and also a bit amusing. Cellphone thefts are up dramatically and loosing one can be devestating with all the personal info they contain.
Stolen Phones Holler For Help
Stolen Phones Holler For Help
Saturday, September 23, 2006
Tips On How To Protect Your PC
Fast Facts
The Commerce Department found that since 2001 the department's 15 operating units had lost track of 1,137 laptop computers.
--------------------------------------------------------------------------------
Read More ID Theft News Here
The Commerce Department found that since 2001 the department's 15 operating units had lost track of 1,137 laptop computers.
--------------------------------------------------------------------------------
Read More ID Theft News Here
Friday, September 22, 2006
Protecting Your Personal Data
Hello,
I came across this great article from consumer reports which is really eye-opening.
October 2006
Your privacy for sale
CR Quick Take
Large data brokers have your numbers--Social Security, phone, and credit cards. They might also know about the drugs you take, what you buy, your political party, and your sexual orientation. When we investigated this secretive industry, we discovered:
• Data brokers are willing to sell even your most sensitive information to paying customers, some of them crooks.
• When CR staffers asked to see their own files, they received scant information. One report contained 31 errors.
• The federal government is a steady customer of the data collectors, but there’s no way to know what it collects or exactly how much it pays.
• Pretexters, who lie to get information about you and sell it to anybody, operate largely free of regulation.
Until Valentine’s Day weekend 2005, Elizabeth Rosen had never heard of ChoicePoint. But ChoicePoint, it turns out, knew plenty about her.
That’s when Rosen, a nurse, received a letter and found out that the Alpharetta, Ga., company had collected information about her. Among the sensitive items it had: her Social Security number, records of her insurance claims, her current and past addresses, and her employment history. Now ChoicePoint was informing her that it had inadvertently disclosed her information--and that of 165,000 other Americans--to a group of criminals. What galls Rosen more, she says, is that all along, ChoicePoint itself “was profiting by collecting and selling confidential information about me without my knowledge or consent.”
ChoicePoint, which has $1 billion in annual revenues, is only one entity in a vast and secretive data industry that feeds on private information about you and millions of other Americans. Its inhabitants include corporate mastodons with access to millions of public records; swarms of private investigators, some of whom lie to obtain confidential information; and hundreds of companies selling background checks, profiles, and address lists, all to meet the surging demand from business, law enforcement, and, increasingly since 9/11, the federal government.
The data collectors say that they’re not prying but speeding the retrieval of public records for both consumers and law enforcement, allowing businesses to cut their risks for fraud and helping marketers to zero in on customers who really want their products. “More than two-thirds of what we do is regulated by state and/or federal law,” says Chuck Jones, a spokesman for ChoicePoint.
Federal privacy and data-security laws such as the Fair Credit Reporting Act and the Gramm-Leach-Bliley Act do guard some categories of data, including information used to determine eligibility for credit or insurance. But a 2006 investigation by the U.S. Government Accountability Office (GAO) concluded that such protections are limited and that Congress should require information resellers to safeguard all sensitive personal information.
Indeed, CR’s three-month investigation found that the practices of the data collectors can rob you of your privacy, threaten you with ID theft, and profile you as, say, a deadbeat or a security risk. Worse, there’s no way to find out what they are telling others about you. When our reporters requested their own records, they were told that they could not see everything that was routinely sold to businesses. The meager information they did receive was punctuated with errors.
How CU uses your data
Like many other publishers, Consumers Union, the nonprofit publisher of Consumer Reports, engages in database marketing and has established policies to protect customer information. CU rents and exchanges its mailing list and currently pays data brokers to enhance its customer database with supplemental data to assist in marketing and fund-raising campaigns. Information shared excludes Social Security numbers, driver’s license numbers, financial account numbers, and credit- and debit-card information.
CU publicizes its opt-out policy in each issue of Consumer Reports, describing how readers may request that their names not be released to other mailers. And it adheres to guidelines for the use of customer names set forth by the Direct Marketing Association. CU uses information gathered from subscribers who respond to its surveys, polls, or questionnaires only in aggregated form as source material for Consumer Reports articles and never for marketing purposes.
For complete Ratings and recommendations on appliances, cars & trucks, electronic gear, and much more, subscribe today and have access to all of Consumer Reports
I came across this great article from consumer reports which is really eye-opening.
October 2006
Your privacy for sale
CR Quick Take
Large data brokers have your numbers--Social Security, phone, and credit cards. They might also know about the drugs you take, what you buy, your political party, and your sexual orientation. When we investigated this secretive industry, we discovered:
• Data brokers are willing to sell even your most sensitive information to paying customers, some of them crooks.
• When CR staffers asked to see their own files, they received scant information. One report contained 31 errors.
• The federal government is a steady customer of the data collectors, but there’s no way to know what it collects or exactly how much it pays.
• Pretexters, who lie to get information about you and sell it to anybody, operate largely free of regulation.
Until Valentine’s Day weekend 2005, Elizabeth Rosen had never heard of ChoicePoint. But ChoicePoint, it turns out, knew plenty about her.
That’s when Rosen, a nurse, received a letter and found out that the Alpharetta, Ga., company had collected information about her. Among the sensitive items it had: her Social Security number, records of her insurance claims, her current and past addresses, and her employment history. Now ChoicePoint was informing her that it had inadvertently disclosed her information--and that of 165,000 other Americans--to a group of criminals. What galls Rosen more, she says, is that all along, ChoicePoint itself “was profiting by collecting and selling confidential information about me without my knowledge or consent.”
ChoicePoint, which has $1 billion in annual revenues, is only one entity in a vast and secretive data industry that feeds on private information about you and millions of other Americans. Its inhabitants include corporate mastodons with access to millions of public records; swarms of private investigators, some of whom lie to obtain confidential information; and hundreds of companies selling background checks, profiles, and address lists, all to meet the surging demand from business, law enforcement, and, increasingly since 9/11, the federal government.
The data collectors say that they’re not prying but speeding the retrieval of public records for both consumers and law enforcement, allowing businesses to cut their risks for fraud and helping marketers to zero in on customers who really want their products. “More than two-thirds of what we do is regulated by state and/or federal law,” says Chuck Jones, a spokesman for ChoicePoint.
Federal privacy and data-security laws such as the Fair Credit Reporting Act and the Gramm-Leach-Bliley Act do guard some categories of data, including information used to determine eligibility for credit or insurance. But a 2006 investigation by the U.S. Government Accountability Office (GAO) concluded that such protections are limited and that Congress should require information resellers to safeguard all sensitive personal information.
Indeed, CR’s three-month investigation found that the practices of the data collectors can rob you of your privacy, threaten you with ID theft, and profile you as, say, a deadbeat or a security risk. Worse, there’s no way to find out what they are telling others about you. When our reporters requested their own records, they were told that they could not see everything that was routinely sold to businesses. The meager information they did receive was punctuated with errors.
How CU uses your data
Like many other publishers, Consumers Union, the nonprofit publisher of Consumer Reports, engages in database marketing and has established policies to protect customer information. CU rents and exchanges its mailing list and currently pays data brokers to enhance its customer database with supplemental data to assist in marketing and fund-raising campaigns. Information shared excludes Social Security numbers, driver’s license numbers, financial account numbers, and credit- and debit-card information.
CU publicizes its opt-out policy in each issue of Consumer Reports, describing how readers may request that their names not be released to other mailers. And it adheres to guidelines for the use of customer names set forth by the Direct Marketing Association. CU uses information gathered from subscribers who respond to its surveys, polls, or questionnaires only in aggregated form as source material for Consumer Reports articles and never for marketing purposes.
For complete Ratings and recommendations on appliances, cars & trucks, electronic gear, and much more, subscribe today and have access to all of Consumer Reports
Thursday, August 31, 2006
Don't Let Spyware Sneak Up On You
By: Howard Goff
You decide to make an online purchase from a reputable Internet site, so you add the items to your virtual shopping cart and head to the checkout. You enter your billing address, your credit card number, your card's expiration date, even your card's 3-digit authorization number. Without even knowing it, you could have provided an identity thief all of the information he or she needs to rack up charges on your account if your computer is infested with a type of spyware known as keyloggers.
Keylogger software keeps track of every letter, number, or symbol you type. Then, the information is transferred from your computer to a third-party. While keyloggers are bad enough, they are only one of over a dozen types of spyware being used by hackers and identity thieves today. What's worse is that your computer could be infected at this moment, and you may not even realize it. In October 2004, America Online and the National Cyber-Security Alliance conducted a survey about spyware. Eighty percent of respondents found spyware on their computers and 89% of those individuals never knew it was there.1
While some spyware is relatively harmless, other examples can leave you vulnerable. For example, in August 2005 Sunbelt Software discovered a spyware scheme using a program known as CoolWebSearch which was allowing information from a user's computer to be sent to a central collection point without his or her knowledge. The type of information collected included Internet activity, credit card numbers, instant message conversations, travel plans, and more. Thousands of people were potential victims of identity theft thanks to this one program.
Now how do you stop yourself from being sucked into a spyware scam? There are two answers to that question.
First, you should install anti-spyware software on your computer. This type of software can detect spyware and can help you eliminate it from your system. However, you need to realize that even the best anti-spyware software is not full-proof because identity thieves and hackers are always revising their spyware so it won't be detected. Keeping your anti-spyware software up-to-date can help reduce this risk.
Second, you need to practice safer Internet behavior. For example, only download programs from trustworthy web sites and never agree to install anything on your computer unless you know specifically what it is. Keeping your Internet Explorer updated is also a good idea because security weaknesses in the browser are often used by spyware to gain access to your personal online activities.
The bad news is that spyware is only one method of stealing your identity. If you want to learn how to protect yourself from spyware and other methods or if you've been a victim of identity theft and need to know what steps to take now, you need to read Identity Theft: A Resource Guide from PCSecurityNews.com. The ebook is available at http://www.PCSecurityNews.com.
You decide to make an online purchase from a reputable Internet site, so you add the items to your virtual shopping cart and head to the checkout. You enter your billing address, your credit card number, your card's expiration date, even your card's 3-digit authorization number. Without even knowing it, you could have provided an identity thief all of the information he or she needs to rack up charges on your account if your computer is infested with a type of spyware known as keyloggers.
Keylogger software keeps track of every letter, number, or symbol you type. Then, the information is transferred from your computer to a third-party. While keyloggers are bad enough, they are only one of over a dozen types of spyware being used by hackers and identity thieves today. What's worse is that your computer could be infected at this moment, and you may not even realize it. In October 2004, America Online and the National Cyber-Security Alliance conducted a survey about spyware. Eighty percent of respondents found spyware on their computers and 89% of those individuals never knew it was there.1
While some spyware is relatively harmless, other examples can leave you vulnerable. For example, in August 2005 Sunbelt Software discovered a spyware scheme using a program known as CoolWebSearch which was allowing information from a user's computer to be sent to a central collection point without his or her knowledge. The type of information collected included Internet activity, credit card numbers, instant message conversations, travel plans, and more. Thousands of people were potential victims of identity theft thanks to this one program.
Now how do you stop yourself from being sucked into a spyware scam? There are two answers to that question.
First, you should install anti-spyware software on your computer. This type of software can detect spyware and can help you eliminate it from your system. However, you need to realize that even the best anti-spyware software is not full-proof because identity thieves and hackers are always revising their spyware so it won't be detected. Keeping your anti-spyware software up-to-date can help reduce this risk.
Second, you need to practice safer Internet behavior. For example, only download programs from trustworthy web sites and never agree to install anything on your computer unless you know specifically what it is. Keeping your Internet Explorer updated is also a good idea because security weaknesses in the browser are often used by spyware to gain access to your personal online activities.
The bad news is that spyware is only one method of stealing your identity. If you want to learn how to protect yourself from spyware and other methods or if you've been a victim of identity theft and need to know what steps to take now, you need to read Identity Theft: A Resource Guide from PCSecurityNews.com. The ebook is available at http://www.PCSecurityNews.com.
Has Someone Stolen Your Identity?
Here Are 8 Ways to Tell
By: Howard Goff
Right now, someone could be using your identity to start a new credit card, to get a loan, to drain your checking or savings account. In some cases, you might not find out about the theft for weeks, sometimes even months. Unfortunately, the longer it takes to discover the crime, the more damage will be done and the harder it will be to rectify that damage.
Thankfully, there are some ways for you to detect identity theft before the problems progress too far. Below are some of those methods.
1. Errors on your credit report – By checking your credit report yearly, you'll be able to determine if anyone is opening up accounts in your name without your permission. Otherwise, you may not learn there is a problem until you need to take out credit.
2. Mail problems – One of the least-technological ways to commit identity theft is stealing mail. If you aren't receiving mail or if you aren't getting items in the mail that you are expecting, such as credit card bills, then you may be a victim of identity theft.
3. Being rejected for credit you didn't request – As you may already know, if a creditor rejects your request for credit, he or she must send you a letter in the mail explaining the reason for the rejection. If you begin getting these letters, but you haven't been requesting credit, then that's a good sign someone is using your identity.
4. Being the victim of pretexting – Pretexting is a scheme involving the Internet or the telephone. Someone contacts you claiming to be a legitimate organization's representative, then they'll ask for your personal information, possibly a PIN number or a checking account number. If that has happened to you and you've given out that information, then there's a good chance you'll be a victim in the near future.
5. Changes in your credit balances or checking account amounts – Unexplained changes in any of your financial accounts should be a big signal to you that something is not right. That's why it's a good idea to check all of your balances weekly and compare them to your estimates. As soon as you spot a discrepancy, you need to follow up with your financial institution.
6. Being denied credit – Sadly, some people don't discover they have been identity theft victims until they go to buy a car, get a second mortgage, or open a new credit card. If you thought you had good credit but are getting denied, then it's a good time to check your credit reports, even if you've already done your yearly check.
7. Being contacted by debt collectors – When you start getting calls or letters about unpaid debts, which you don't recall having, you should never automatically pay them. Instead, send a written request for more information about the debt. By law, the creditor must supply you with this information.
8. Having some types of spyware on your computer – While not all spyware leads to identity theft, you need to realize that it can pose a serious threat to your privacy. Your passwords, credit card information, and online activities could have been monitored by unknown third parties, which leave you vulnerable to an attack.
If you want to learn more about how to detect and prevent identity theft or if you have been an identity theft victim, you need to read Identity Theft: A Resource Guide from PCSecurityNews.com. The ebook is available at http://www.PCSecurityNews.com.
By: Howard Goff
Right now, someone could be using your identity to start a new credit card, to get a loan, to drain your checking or savings account. In some cases, you might not find out about the theft for weeks, sometimes even months. Unfortunately, the longer it takes to discover the crime, the more damage will be done and the harder it will be to rectify that damage.
Thankfully, there are some ways for you to detect identity theft before the problems progress too far. Below are some of those methods.
1. Errors on your credit report – By checking your credit report yearly, you'll be able to determine if anyone is opening up accounts in your name without your permission. Otherwise, you may not learn there is a problem until you need to take out credit.
2. Mail problems – One of the least-technological ways to commit identity theft is stealing mail. If you aren't receiving mail or if you aren't getting items in the mail that you are expecting, such as credit card bills, then you may be a victim of identity theft.
3. Being rejected for credit you didn't request – As you may already know, if a creditor rejects your request for credit, he or she must send you a letter in the mail explaining the reason for the rejection. If you begin getting these letters, but you haven't been requesting credit, then that's a good sign someone is using your identity.
4. Being the victim of pretexting – Pretexting is a scheme involving the Internet or the telephone. Someone contacts you claiming to be a legitimate organization's representative, then they'll ask for your personal information, possibly a PIN number or a checking account number. If that has happened to you and you've given out that information, then there's a good chance you'll be a victim in the near future.
5. Changes in your credit balances or checking account amounts – Unexplained changes in any of your financial accounts should be a big signal to you that something is not right. That's why it's a good idea to check all of your balances weekly and compare them to your estimates. As soon as you spot a discrepancy, you need to follow up with your financial institution.
6. Being denied credit – Sadly, some people don't discover they have been identity theft victims until they go to buy a car, get a second mortgage, or open a new credit card. If you thought you had good credit but are getting denied, then it's a good time to check your credit reports, even if you've already done your yearly check.
7. Being contacted by debt collectors – When you start getting calls or letters about unpaid debts, which you don't recall having, you should never automatically pay them. Instead, send a written request for more information about the debt. By law, the creditor must supply you with this information.
8. Having some types of spyware on your computer – While not all spyware leads to identity theft, you need to realize that it can pose a serious threat to your privacy. Your passwords, credit card information, and online activities could have been monitored by unknown third parties, which leave you vulnerable to an attack.
If you want to learn more about how to detect and prevent identity theft or if you have been an identity theft victim, you need to read Identity Theft: A Resource Guide from PCSecurityNews.com. The ebook is available at http://www.PCSecurityNews.com.
How to Check Your Credit Report for Evidence of Identity Theft
How to Check Your Credit Report for Evidence of Identity Theft
By: Howard Goff
Imagine finding the home of your dreams. It's the perfect location, the perfect style, even the perfect price. Excitedly, you start the loan application process. You know this part of the process will be easy since you've always paid your bills on time and only have one credit card which you pay off every month in full. To your surprise, however, your application is refused because multiple credit cards have been taken out in your name, maxed out, and never paid. Your credit is ruined, and your dream home will never be a reality thanks to an identity thief.
This scenario may be hypothetical, but similar situations happen to people all over the country daily. Many people are victims of identity theft and don't even realize it until they need to use their credit for something, such as buying a car or a home. However, it doesn't have to be that way. If you check your credit reports yearly, you can make sure that no unauthorized activities are ruining your credit.
Now that you can receive a copy of your credit report free, the only possible excuse for not monitoring it is that you can't understand how to read it and that's what we're going to discuss now.
The credit report is divided into four parts. The first part contains your personal information, such as name, social security number, and employer. You may want to check over this part for mistakes, but if you're interested in catching identity theft activity you won't find the evidence here.
Instead, one of your focuses should be on the second part of the report. This is your credit history, which includes a list of all your creditors. For each account, you'll find the date the account opened, the type of account it is, the amount the account was originally for, the amount still owed, the amount of the payments, the status of the account, and your payment history. Go over each entry in this section of your report carefully. If you find any accounts which you do not remember opening, make note of them. If any information, such as amount owed, on the accounts does not match your expectations, then make a note of that also.
Once you've reviewed the credit history portion, you'll find the public records section. Again, this probably won't be of much use to you if you're tracking down identity theft evidence because it includes liens, bankruptcies, etc. However, do make sure the information in this section is accurate. Some lenders believe that almost 80% of all credit reports do contain some types of errors and since this section is important you want it to be accurate.
The last section – the Inquiry section – should also be evaluated carefully. You see, each time you or a potential creditor checks your credit report, a note of that inquiry is made in this section. Victims of identity theft are likely to see a number of inquiries, which he or she cannot account for. Now do keep in mind that there are two types of inquiries reported in this section. The “soft” inquiries, as they are called, refer to inquiries made by potential creditors that you did not request. For example, a credit card company may check your credit history before sending you an offer for a gold card. The “hard” inquiries are the ones you need to be interested in because these are the inquires that you supposedly requested. If there's anything on that report you don't agree with, then make a note of it.
Once you have checked your report, contact the credit bureau and the creditors about any mistakes or discrepancies you notice. If you think you've been a victim of identity theft and need to know what steps to take next or if you want more suggestions on how not to become a victim, you need to read Identity Theft: A Resource Guide from PCSecurityNews.com. The ebook is available at http://www.PCSecurityNews.com.
By: Howard Goff
Imagine finding the home of your dreams. It's the perfect location, the perfect style, even the perfect price. Excitedly, you start the loan application process. You know this part of the process will be easy since you've always paid your bills on time and only have one credit card which you pay off every month in full. To your surprise, however, your application is refused because multiple credit cards have been taken out in your name, maxed out, and never paid. Your credit is ruined, and your dream home will never be a reality thanks to an identity thief.
This scenario may be hypothetical, but similar situations happen to people all over the country daily. Many people are victims of identity theft and don't even realize it until they need to use their credit for something, such as buying a car or a home. However, it doesn't have to be that way. If you check your credit reports yearly, you can make sure that no unauthorized activities are ruining your credit.
Now that you can receive a copy of your credit report free, the only possible excuse for not monitoring it is that you can't understand how to read it and that's what we're going to discuss now.
The credit report is divided into four parts. The first part contains your personal information, such as name, social security number, and employer. You may want to check over this part for mistakes, but if you're interested in catching identity theft activity you won't find the evidence here.
Instead, one of your focuses should be on the second part of the report. This is your credit history, which includes a list of all your creditors. For each account, you'll find the date the account opened, the type of account it is, the amount the account was originally for, the amount still owed, the amount of the payments, the status of the account, and your payment history. Go over each entry in this section of your report carefully. If you find any accounts which you do not remember opening, make note of them. If any information, such as amount owed, on the accounts does not match your expectations, then make a note of that also.
Once you've reviewed the credit history portion, you'll find the public records section. Again, this probably won't be of much use to you if you're tracking down identity theft evidence because it includes liens, bankruptcies, etc. However, do make sure the information in this section is accurate. Some lenders believe that almost 80% of all credit reports do contain some types of errors and since this section is important you want it to be accurate.
The last section – the Inquiry section – should also be evaluated carefully. You see, each time you or a potential creditor checks your credit report, a note of that inquiry is made in this section. Victims of identity theft are likely to see a number of inquiries, which he or she cannot account for. Now do keep in mind that there are two types of inquiries reported in this section. The “soft” inquiries, as they are called, refer to inquiries made by potential creditors that you did not request. For example, a credit card company may check your credit history before sending you an offer for a gold card. The “hard” inquiries are the ones you need to be interested in because these are the inquires that you supposedly requested. If there's anything on that report you don't agree with, then make a note of it.
Once you have checked your report, contact the credit bureau and the creditors about any mistakes or discrepancies you notice. If you think you've been a victim of identity theft and need to know what steps to take next or if you want more suggestions on how not to become a victim, you need to read Identity Theft: A Resource Guide from PCSecurityNews.com. The ebook is available at http://www.PCSecurityNews.com.
Identity Theft's Young Victims:
How to Protect Your Children's Identities
By Howard Goff
When we think of identity theft, children are probably not the first victims we might imagine. Unfortunately, more and more kids are being targeted for this crime, and the culprits may not be who you think. Right now, approximately 4% of all identity theft cases involve children, which means roughly 400,000 kids a year are having their futures ruined without their knowledge.
In an article on MSNBC.com, a 24-year old man explained that by the age of 10, his identity had been used to accumulate almost $250,000 in debt and to commit a felony. Another victim, a 9-year old boy, received a collection notice for a $2,000 debt.
Unlike most identity theft victims, however, these two individuals know exactly who was responsible for committing this crime: their fathers. According to the article, almost two-thirds of all child-related identity theft cases are committed by family members.
A child becomes a victim, in most cases, because someone else uses their social security number and name to open a credit card or to have utilities turned on. While the information can be used in other ways, those are two of the most common. And, because children aren't interested in their credit history until they turn 18 or older, most never even realize the crime has been committed until years after the theft started.
There are some ways to protect your child against potential identity theft:
· Keep their social security number locked up in a secure location – If criminals don't have access to your child's social security number, they can't steal it. Never carry their card in your purse or wallet where it could easily be lost or stolen. Never share the number with another family member or anyone else who does not have a professional need to know.
· Ask to not have their SSN listed on insurance cards – Many insurance companies list social security numbers on their cards. If yours does, then contact them and ask to use a different number.
· Do not allow your child to know his or her SSN until its necessary – Young children have no reason to know their social security numbers or to have access to their SSN card. Keep those documents safe and private until your child needs them. Children are often tempted to reveal more than they should to friends, family members, even strangers.
· Check their credit report – While a yearly check of their report may not be necessary unless you suspect a problem, it's a good idea to periodically check your child's credit reports for activity. Your child shouldn't have anything listed at all, but if anything does show up contact the credit bureau and the listed creditors immediately.
Additionally, if you are a parent you should NEVER use your child's social security number fraudulently. Not only are you committing a crime, but you are also making your child's life more difficult. Furthermore, if you know or suspect that someone is wrongly using their child's personal information, then you should contact the authorities. Don't sit idly by while they ruin that child's future.
If you want more information on preventing, detecting, or rectifying identity theft problems for children and adults, then you need to read Identity Theft: A Resource Guide from PCSecurityNews.com. The ebook is available at http://www.PCSecurityNews.com.
By Howard Goff
When we think of identity theft, children are probably not the first victims we might imagine. Unfortunately, more and more kids are being targeted for this crime, and the culprits may not be who you think. Right now, approximately 4% of all identity theft cases involve children, which means roughly 400,000 kids a year are having their futures ruined without their knowledge.
In an article on MSNBC.com, a 24-year old man explained that by the age of 10, his identity had been used to accumulate almost $250,000 in debt and to commit a felony. Another victim, a 9-year old boy, received a collection notice for a $2,000 debt.
Unlike most identity theft victims, however, these two individuals know exactly who was responsible for committing this crime: their fathers. According to the article, almost two-thirds of all child-related identity theft cases are committed by family members.
A child becomes a victim, in most cases, because someone else uses their social security number and name to open a credit card or to have utilities turned on. While the information can be used in other ways, those are two of the most common. And, because children aren't interested in their credit history until they turn 18 or older, most never even realize the crime has been committed until years after the theft started.
There are some ways to protect your child against potential identity theft:
· Keep their social security number locked up in a secure location – If criminals don't have access to your child's social security number, they can't steal it. Never carry their card in your purse or wallet where it could easily be lost or stolen. Never share the number with another family member or anyone else who does not have a professional need to know.
· Ask to not have their SSN listed on insurance cards – Many insurance companies list social security numbers on their cards. If yours does, then contact them and ask to use a different number.
· Do not allow your child to know his or her SSN until its necessary – Young children have no reason to know their social security numbers or to have access to their SSN card. Keep those documents safe and private until your child needs them. Children are often tempted to reveal more than they should to friends, family members, even strangers.
· Check their credit report – While a yearly check of their report may not be necessary unless you suspect a problem, it's a good idea to periodically check your child's credit reports for activity. Your child shouldn't have anything listed at all, but if anything does show up contact the credit bureau and the listed creditors immediately.
Additionally, if you are a parent you should NEVER use your child's social security number fraudulently. Not only are you committing a crime, but you are also making your child's life more difficult. Furthermore, if you know or suspect that someone is wrongly using their child's personal information, then you should contact the authorities. Don't sit idly by while they ruin that child's future.
If you want more information on preventing, detecting, or rectifying identity theft problems for children and adults, then you need to read Identity Theft: A Resource Guide from PCSecurityNews.com. The ebook is available at http://www.PCSecurityNews.com.
Don't Be Betrayed By Your Cellphone
Hello, I saw this today and it touches everyone so I have to get the word out. If you own a cellphone,blackberry,etc. you really need to read this report
Cellphone Betrayal
Cellphone Betrayal
Thursday, August 24, 2006
Inrenet banking Issues
Hello,
I sae a really interesting piece on the news on how banks were fighting Id Theft overseas. I think we should follow their lead and upgrade. Also on the page below there is an icon on cyber crime on the left side of the page with lots of good info.
Fighting Cyber Crime
I sae a really interesting piece on the news on how banks were fighting Id Theft overseas. I think we should follow their lead and upgrade. Also on the page below there is an icon on cyber crime on the left side of the page with lots of good info.
Fighting Cyber Crime
Monday, August 14, 2006
Welcome To The Personal Finance Carnival
I hope everyone will find my blog helpful and informative. Please feel free to comment.
Welcome Carnivals
Welcome Carnivals
Wednesday, August 09, 2006
Sunday, August 06, 2006
Thursday, June 29, 2006
Laptop with Missing VA Records is Found
It's been missing since May 3,2006 but now it's back. That's the good news.
VA Laptop Recovered
See More Bad News Here
VA Laptop Recovered
See More Bad News Here
Wednesday, June 28, 2006
Tuesday, June 27, 2006
On The Front Lines
This site is great reference and get a bit more technical if it's the info you're seeking.
Anti-CyberCrime Website
Anti-CyberCrime Website
Saturday, June 24, 2006
Another Bungled Job By U.S. Govt.
It seems it's getting worse and almost now a daily occurance. They say no fraud is detected yet but it takes about a year before you'l find out if you've been taken for a ride. Also more than 1 person at a time can use your info so if it was on the web in front of billions of eyes lets say just 10 take advantage. Let's do the math 10 id thieves X 28,000 honest folks = 280,000 fake accounts plus there is no telling how many individual charges to each. This will take years to clean up and at what costs???
See More Here
See More Here
Wednesday, June 21, 2006
Learn All About The Pretext
I saw a piece on the news which is closely related to ID Theft at this time it's not illegal but it should be. Tell me what you think!!
Learn About Pretext
Learn About Pretext
Monday, June 19, 2006
Oh-NOOOOOOO Not Again!!
It's about time for Congress to do their job and step in to institute a standard protocol in govt. handling of personal info and very stiff penalties imposed if they are not followed I'm talking 30 yrs minimum. To do this is not rocket science and they have to put a plug in the dam NOW!!!
Id Bungle In DC
Id Bungle In DC
Thursday, June 15, 2006
Wednesday, June 14, 2006
Fema Hoodwinked For $1.5 Billion
Hello Everyone,
Some claim I'm just an alarmist but my earlier posts up to this point will bear out my claims that it'll only get worse. Today's latest story verifies it.
FEMA Pays Big Time
Some claim I'm just an alarmist but my earlier posts up to this point will bear out my claims that it'll only get worse. Today's latest story verifies it.
FEMA Pays Big Time
Friday, June 09, 2006
Thursday, June 08, 2006
Are You Really Surprised;-)???
Data theft hit 80 percent of active military (6/5/06)
Social Security numbers and other personal information for as many as 2.2 million U.S. military personnel -- including nearly 80 percent of the active-duty force -- were among the data stolen from the home of a Department of Veterans Affairs analyst ...
Latest Revelations
Social Security numbers and other personal information for as many as 2.2 million U.S. military personnel -- including nearly 80 percent of the active-duty force -- were among the data stolen from the home of a Department of Veterans Affairs analyst ...
Latest Revelations
Tuesday, June 06, 2006
Now Bad News For Active Personnel
Hello,
I'm not sure when this nightmare will end as with everyday the news seems to get worse. To be sure it'll take years for this big mess to be cleaned up. The latest revelation is now that in addition to 26.5 million veterans possibly being caught up in ID Theft.
Stolen ID Data Includes 50,000 Active Troops | June 06, 2006
Thursday, June 01, 2006
Special Alert For 26.5 Million Veterans
Hi Everyone,
It still boggles my mind when I see a govenment snafu such as this and then it's covered up for a couple of weeks and still no one seems accountable. Also the damage caused by this leak will go on for years to come. Latest releases now state it's worse than first thought as your name,address,ssn number,birthdate and phone no were included in the data stolen.If you don't know what's going on yet this is must read info. It affects us all as we all know or had someone in the military.
Anyway here are links to all the info you need to know.
Govt Website
Discuss Veteran Id Theft
CNN Updates
It still boggles my mind when I see a govenment snafu such as this and then it's covered up for a couple of weeks and still no one seems accountable. Also the damage caused by this leak will go on for years to come. Latest releases now state it's worse than first thought as your name,address,ssn number,birthdate and phone no were included in the data stolen.If you don't know what's going on yet this is must read info. It affects us all as we all know or had someone in the military.
Anyway here are links to all the info you need to know.
Govt Website
Discuss Veteran Id Theft
CNN Updates
Friday, May 05, 2006
Monday, May 01, 2006
A New Wrinkle In The Game??
There is a new manisfestation or twist to Identity Theft known as -Car Cloning . For more info read below now!!!
Car Cloning Info
Car Cloning Info
Saturday, April 01, 2006
Ten Steps to Reduce Your Risk of Identity Theft
Ten Steps to Reduce Your Risk of Identity Theft
11/17/05
By: Howard Goff
You've probably heard about identity theft on television or read about it in the newspaper, and you may already be aware of the damage these crimes can cause victims and their families. What you may not know is how to protect yourself from these attacks. Below you'll find ten steps that can help you minimize your chances of becoming another identity theft statistic.
1. Invest in a shredder – Never throw anything away without shredding it first. Identity thieves will dig through dumpsters and trash bags looking for credit card receipts, voided checks, paid bills, credit card offers, and other items which provide them with your personal information.
2. Mail everything from the post office – Leaving your outgoing mail in or on your mailbox is an invitation to have it stolen by an identity thief. Not only can they get all of your personal information from the check, but they can even alter the check and cash it themselves. Instead, drop it by the post office or another mailbox.
3. Use a post office box – Incoming mail is also a target for identity thieves. Your bills, checks, even junk mail can be used by these thieves to steal your personal information. If you have a post office box, then your mail will be delivered safely to that box.
4. Have a non-published phone number – Some identity thieves will also use the telephone in an attempt to get your personal information. For example, one scam involved a caller telling a person he or she had won a government grant that was going to be directly deposited into their checking account. Of course, the caller needed the person's checking account number to deposit the money. If your phone number isn't available, then you won't be harassed by these calls.
5. Check your accounts weekly – If you don't already, you need to get in the habit of checking the balances of all your financial accounts on a weekly basis. Waiting for monthly statements isn't good enough because by then your account could have been completely drained.
6. Check your credit report yearly – Every year, you should request free copies of your credit report and check them for any errors, such as credit cards or loans you never took out. If you find out now that someone is using your identity, you can start correcting the problem before you need to use your own credit.
7. Memorize PIN numbers and passwords – Never write down your PIN numbers or passwords. No place is a safe place to keep these important pieces of information. Keep them in your memory so no one can steal them. Also, make them more complicated than an ordinary word or your birthday. It shouldn't be easy for anyone to guess.
8. Keep only basic information on checks – Your checks should only include basic information about you, such as your name and address. Your social security number should never be printed on your checks. If it is, then you're basically handing over the keys to your identity to any thief who comes in contact with your check.
9. Eliminate unwanted credit card offers – Those credit card offers you throw away can be used by identity thieves. They simply have to complete the application and change the address to have a card sent to them in your name. You should shred them, but you can also call 1-888-567-8688 or visit http://www.optoutprescreen.com to opt-out of the credit card offer mailing list so you'll stop receiving them.
10. Carry only necessities – Never carry anything in your purse or wallet that isn't necessary, such as extra deposit slips, social security cards, birth certificates, etc. The more personal information your purse or wallet contains the more valuable it will be to an identity thief if it is lost or stolen.
Although we only promised ten steps, we're throwing in an extra one to help you protect yourself even further.
11. Go electronic – Bank statements, most bills, and many other documents can all be viewed electronically so you never have to worry about them being stolen out of your mailbox or your trash. Contact your financial institution, credit card companies, and utility providers about the availability of this option. As an extra bonus, many of these businesses offer incentives to individuals who sign up for these electronic programs.
These steps are only some of the ways you can protect yourself from identity thieves. For even more suggestions on reducing your risk or details on what to do if you've been an identity theft victim, you need to read Identity Theft: A Resource Guide from PCSecurityNews.com. The ebook is available at PC Security News
Thursday, February 02, 2006
Special Alert - Are You A Zombie???
There is a new trend developing though it's been around awhile is picking up momentum fast. Find out more here now!!!
Learn About Zombies Now!!!
Learn About Zombies Now!!!
Tuesday, January 17, 2006
Warning- You Have Been Datamined!!!
Here are everyday occurances which we really don't think about but can have profound effects.
Read More Here
Read More Here
Warning Data Burglars
This is also part of the problem which is closely related but not being addressed. You can see my article all about it in the next post.
See More Here
See More Here
Monday, January 16, 2006
Identity Theft Statistics Cases per year
Most identity theft cases are still not reported to the police so exact numbers are impossible to guage.
Up to 700,000 people in the United States may be victimized by identity bandits each year, according to the Justice Department (during press release- 2002 Federal Trade Commission Study). Recent reports now talk about 10,000,000 victims.
The Secret Service estimates that in 1997 consumers lost more than $745 million due to identity theft. These days it is probably in the billions.
A recent report on identity theft warned that there is likely to be "mass victimization" of consumers within the next two years. The report said consumers should be extra careful to monitor all their financial transactions for unexplained account activity, withdrawals, or fund transfers.
Identity theft is the fastest growing crime in America. The average victim spends 175 hours and $1000.00 repairing the damage.
The U.S. Federal Trade Commission says that identity theft is its number one source of consumer complaints - 42 percent of all complaints, in 2001.
" Every 79 seconds, a thief steals someone's identity, opens accounts in the victim's name and goes on a buying spree."
-CBSnews.com, 1/25/2001
A study by Gartner Group reveals that 1 in 50 consumers has suffered identity theft. The survey, conducted by Gartner Inc., also indicates consumers are so concerned about the problem that they are calling for changes in the way electronic transactions are performed.
According to the FTC's figures, ID theft is the most popular form of consumer fraud, in part because it is the most profitable. ID thieves stole nearly $100 million from financial institutions last year, or an average of $6,767 per victim.
Free PC Scan Here
Hello,
Have you noticed your computer running slower than ever?
The reason for that may have to do with online advertisers adding SpyWare or AdWare to your computer without your knowledge. "Spyware" is a common term for files that are installed on your system without your knowledge that allow companies to monitor your Internet activity. "AdWare" is software that will show you popup ads over and over. What they don't tell you, however, is how these files can be extremely dangerous to your PC and could cause major problems with your PC.
We are offering every computer owner, including yourself, the opportunity to scan your computer to see how many "SpyWare" infections your PC has free of charge.
To scan your computer for free, click here:
Free Scan Here
Our goal is to put an end to shady online advertising so that Internet users can enjoy the World Wide Web without having their privacy intruded upon.
We urge you to run the free scan!
Click Here To Begin Scan:
Free Scan Here
Thank you for your time, and we hope that we have been of some help.
Have you noticed your computer running slower than ever?
The reason for that may have to do with online advertisers adding SpyWare or AdWare to your computer without your knowledge. "Spyware" is a common term for files that are installed on your system without your knowledge that allow companies to monitor your Internet activity. "AdWare" is software that will show you popup ads over and over. What they don't tell you, however, is how these files can be extremely dangerous to your PC and could cause major problems with your PC.
We are offering every computer owner, including yourself, the opportunity to scan your computer to see how many "SpyWare" infections your PC has free of charge.
To scan your computer for free, click here:
Free Scan Here
Our goal is to put an end to shady online advertising so that Internet users can enjoy the World Wide Web without having their privacy intruded upon.
We urge you to run the free scan!
Click Here To Begin Scan:
Free Scan Here
Thank you for your time, and we hope that we have been of some help.
Thursday, January 05, 2006
Identity Theft (R&R)?
Identity Theft (R&R)?
One of the hottest buzzwords in the news today is Identity Theft which is now reaching epidemic proportions...
Identity theft is the most prolific crimes committed today and it knows no boundaries. So by now most people know of the problem but are unaware of how it all got started.
It's basically what's old is new again thus the teaser ID Theft R&R??? Which stands for Retrospective and Rebirth.
Its started back in the 60's which was a time of conflict and change the Vietnam war and Civil Right protesters and the Underground mainly SDS and the Weathermen among others.
During this time to avoid the military draft you could goto Canada,Mexico or to college. But a cheaper and more eficient option arose by assuming a new identity and staying in this country.
This was easily done by reading the obituaries and finding one close to your age getting the vital info and applying for the birth certificate from there drivers liscense and so on.
There are still a few left from this era as from time to time you'll see on the news an arrest of someone who disappeared 25 yrs ago. The war ended in 1975 and so the threat of the draft ended so there was a brief respite. In the background at this time was the Internet which was a sleeping giant waiting to be stirred.
It was now 1985 and PC's were now penetrating the home and the Net was beginning to be commercialized. Identity theft was once again making a comeback but it was still largely an one on one event. Finally reaching 1990 the net was beginning to flourish with the infancy of the dot-com boom. The world is now truly becoming a global village. By 1996 ther were in excess of 300,000 annual reports of this crime and it's beeen growing daily. Like anything else in the world it reflects all of it's community both good and bad. Identity theft was now splitting into 2 main camps.
The first being 1 on 1 events where you come into contact with the theft personally either through physical contact or lost personal info,phishing, or spyware on your computer.
The second is wholesale theft of info by hackers breaking into bank and credit card companies where thousands to millions of people are compromised all at once.
As recently as a few years ago the technique of dumpster diving was perfected where you'd go to a dumpster behind a business bank ,dept store ,restaurant and look for cc reciepts. But this has now been replaced by spyware which is software which invades your computer to access all your acct info and phishing which is an email sent to you representing maybe your bank or cc company requesting acct. info to which if you respond lose your money.
To check or elimiminate spyware from your computer goto spybot.com which is an excellent free tool. As for phishing a good rule of thumb is if contacted and not absolutey sure it's a company or person you do business with just hang up or you can call them back so you know who your in contact with.
If you do become a victim it can be likened to entering a blackhole as you go in but never really sure when you'll get out. The personal costs can be excessive and and can take years to clear up.
On a positive note I see whole new industries popping up to combat the problem with plenty of growth for them in the future.
Anti-spyware, biometrics, insurance, prevention, and detection to name a few. For more info goto:
Spyware Remover Information - Discover and eliminate spyware adware and other evil programs that are lurking on your PC. Keep your information and browsing behavior private! Reduce SPAM. Award winning software from reputable vendors.
Welcome To My Web Portal
Identity theft is a problem that has been swept under the rug for too long and it's time for us to take a stand. This blog will help lots of folks out there please feel free to post any questions or insights. I've experienced first-hand of what happens but more on that later. But first -please read my article published a number of months ago.
Subscribe to:
Posts (Atom)