Online Identity Theft Protection



             


Saturday, May 31, 2008

Credit Report and Identity Theft

Time to check your credit reports? Check your credit reports from the three main consumer credit reporting agencies.

A lot of people don???t understand the seriousness of taking the necessary precautions to prevent identity theft or fraudulent charges on their credit report,

The federal government passed a law that all credit reporting agencies provide one free credit report per year, per person. So it won???t cost a thing to access your credit report./
Once you receive your report, you can check for I.D. theft as well as bills that aren't yours.. So, if they have suspicious charges on their report they can take appropriate action as soon as possible.

Obtaining and carefully checking your credit report with safeguard you from identity theft .

You should obtain a credit report once a year to check for possible identity theftt and accuracy of your purchases. Your credit score will effect interest rates and even qualifying for loans, so don't be embaressed by a faulty score when obtaining a loan.

The three national credit bureaus are Equifax, TransUnion and Experian. Each produce the same numerical credit report score.

To obtain a copy of your credit report, you must provide the following in writing:
1) Full name, including any previous names
2) Current address
3) Previous address (if needed for five-year credit history)
4) Social Security number
5) Date of birth
6) Signature.




Remember, you are entitled to a free credit report once a year. Be vigilient, check for identity theft and inaccurate reporting.

Your credit report effects you in many ways, don't become an identity theft statistic.

 

Labels: , , ,

Friday, May 30, 2008

Tometa Software Releases "TrackSweeper.net" as a Countermeasure to Identity Theft and Computer Privacy Issues.


Spokane custom software development company Tometa Software has released its new software "TrackSweeper.net"; software that cleans a computer's activity log and internet history ensuring personal information stays private.

Spokane, WA April 27, 2006 - Tometa Software is set to release its version of an "internet history washer" with TrackSweeper.net, a software application which will delete temporary internet files and computer activity logs ensuring personal information and computer activity remains private.

"Most computer users don't understand the importance of keeping personal information secure on a home PC or notebook computer. The average PC holds a great deal of information that if not properly removed may cause a harmful invasion of privacy or potentially worse," said Brandon Marchand Tometa Software CEO.

Unlike the popular anti-virus and internet security available, TrackSweeper.net cleans the files on your computer that are automatically created that may contain personal and computer history information.

"TrackSweeper.net quickly eliminates unneeded system files, cashed internet files, and helps keep your computer running smoothly without the strain of unneeded files clogging it up," explains Brandon Marchand. "This eliminates potential vulnerabilities that the average computer user isn't even aware of, ensuring personal information remains secure."

TrackSweeper.net is available for download and is priced at $19.95. Bulk order discounts are available. More information about TrackSweeper.net is available at http://tometasoftware.com/products_tsnet.asp

About Tometa Software:

Tometa software is a rapidly growing, privately held next-generation custom and retail software provider based in Spokane, Washington. A company on the move, they are poised to become the leader in the increasingly sophisticated software industry. Tometa Software is a Microsoft Gold Certified Partner, an elite business partner having demonstrated the highest level of proficiency of Microsoft technologies.

Labels: , , , ,

Thursday, May 29, 2008

Identity Theft, Credit Reports, & safely disposing of computers


To say that Identity Theft has reached epidemic proportions in the UK doesn't appear to be any exaggeration on the facts which are commonly bandied about... even by totally responsible organisations.

If, as I read, 80% of Councils have reported problems... and 25% of people have been directly, or indirectly affected... then taking basic steps for your own safety should be an automatic procedure nowadays. With the advent of separate paper collections by many councils, it is easy for those who wish to obtain information to rummage through the bins or boxes, to look for personal details.

A shredder, I would say, is a basic necessity... and you can get a perfectly adequate electric strip-cut model which does up to 5 sheets of paper at a time [with paper container incorporated] for less than ?10 if you shop around. I purchased mine from Morrisons supermarket and have had it for well over two [fingers crossed] trouble free years.

If you don't possess a shredder, then at least tear off all names and addresses from your envelopes and destroy all letters, etcetera, which have your details on. I would burn, or shred and dispose of in two separate rubbish collections, all old credit, debit, or shop cards.

As well as these basic steps you will have, hopefully, found many useful tips and further information on the Identity Theft page at http://www.best-uk-electrical-appliances.com where you perhaps obtained this extra information.

Direct link to our Identity Theft info at Best UK electrical appliances

***

If you have a computer with any personal details on it, I can do no better than refer you to the helpful article below... please read and consider VERY CAREFULLY the all information included. Computers soon become out of date, or become less efficient due to many different problems. Consider what is stored on your computer... there are bound to be passwords for something or other, there are names and addresses, and perhaps personal details - even banking details - which could help a potential identity fraudster obtain access to your financial records, credit cards, or even to steal your identity.

Identity Thieves Find Treasure In Your Trash

- by Jim Edwards

(c) Jim Edwards - All Rights reserved http://www.thenetreporter.com -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Imagine this scenario...

After serving you well for three to five years, your old computer earns a well-deserved retirement.

You transfer all your old files to your new computer, delete them from the hard drive, and pack the old computer off to the trash heap, sell it, or give it away.

Sounds innocent enough until you stop to consider that you may have just given away your social security number, all your passwords, your credit card numbers, bank statements, financial records, and every other bit of sensitive data you ever maintained on that computer.

With computers getting cheaper by the day, many folks now find themselves replacing old machines with newer, faster models.

But understand one thing: just hitting the delete button to get rid of sensitive files basically rates the same as putting a bank statement in your trash can without shredding it - anybody can reach in and pull it out.

In fact, with inexpensive over-the-counter data recovery software (the kind you can buy to recover files you delete accidentally), virtually anybody can fire up your old hard drive and start pulling off data even though you "deleted" it.

This creates a veritable field day for identity thieves who comb through junk yards for old computers and attend computer shows buying up used hard drives by the dozens.

Whether selling it, giving it away, or tossing it on the junk heap, when it's time to replace your computer with a newer model, you basically have three options for permanently wiping out your data.

First Option:

Many computers come with recovery disks that will completely format the hard drive and return it to its original "factory-fresh" state. Using this approach makes a great option when you plan to give away or sell the computer.

Second Option:

Use a software program designed to erase your hard drive, or at least totally destroy your deleted files.

You can find one fr^e at www.active-disk-wiper.com that claims to completely erase your deleted files without affecting Windows or your other programs.

Third Option:

In keeping with the times, the third option requires a disclaimer.

Only attempt this with safety glasses, a flak jacket, and under close professional, adult supervision.

Unplug your computer and let it cool off.

Take off the cover and remove the hard drive.

Bash the hard drive with a hammer until it looks like a pancake!

That should render it completely resistant to any would-be identity thief armed with even the latest data recovery software.

Physical destruction of the hard drive rates about as secure as you can get in protecting your deleted files from prying eyes.

But before you take drastic action on the computer, remember that your "trash" may just represent a dream come true for someone who can't afford a new one.

Try to find a child, a student, or a struggling parent who could really use your old computer and would consider it a real blessing.

Finding the right new home for it could well change someone else's life forever.

--- Jim Edwards is a syndicated newspaper columnist (http://www.TheNetReporter.com) and is the author of several best-selling ebooks, information products and software programs. Jim also publishes the *World-Famous* www.IGottaTellYou.com Multi-Media Newsletter!

? Guaranteed Response Marketing, LLC P.O. Box 878 Lightfoot, VA 23188 -=-=-=-=-=-=-=-

This email is never sent without permission.

___________________________________________ ___________________________________________

Just as we used to have remember to be vigilant with our physical property... locking doors and windows, putting anything we value out of sight, cancelling deliveries when on holiday, using security lights... plus many more day to day precautions are automatic necessities. But NOW we ALSO have to consider our intellectual property and even our unique being.

Whatever you have created on your computer is uniquely yours, don't leave it open to abuse or theft any more than you should leave about your credit/debit cards, household bills, or any other important documents which hold your personal details.

Just two more mentions... be extremely careful when answering your home telephone, there are those who can, and will, ask you, deviously, to confirm your name and/or address... and from that they can find out all your private details, and manage to steal your identity.

Sorry, three more... don't ever fall for the lottery win or other scam which requires you to send money or details to get your 'winnings'... finally, if you are selling any big value item [like a car] don't believe that a bankers draft is necessarily safe and don't fall for the scam where you accept a signed payment which is larger than the required amount, and you are expected to give back the overpayment in cash. You will have lost the item you were selling, plus the cash... and the cheque or bankers draft will be worthless.

Take care out there!

Copy and paste the following web address to your browser to check out the full page where some of this information [plus lots more] is available online... http://www.best-uk-electrical-appliances.com/IdentityTheftandCreditReports.html

Labels: , , , ,

Wednesday, May 28, 2008

Prevent identity theft


When your personal data gets in the wrong hands, you can expect the worse. Identity theft is a huge problem that affects thousands of Americans each week. Rather than fighting to reduce the damage, you should think ahead and prevent identity theft before it costs you money, time and energy.

Of course, this means that you have to familiarize yourself with the potential dangers you are exposed to when documents containing personal information are accessed by thieves. The best way to prevent identity theft is to be aware of all your personal ID numbers, such as bank accounts, driver's license numbers, SSN, credit card numbers and so on.

Do not share or lose important documents There are many ways in which a thief can get access to your personal information. Once they have access to it they will pretend to be your legal representatives and will operate all sorts of transactions using your identity. You can however prevent identity theft by always being aware of the whereabouts of your personal information. Make sure to store all important documents in a safe and hidden spot in your home and keep on eye on them while at work. Do not share sensitive information with people that claim to be representatives from a bank or any other institution - check them out first and see if they really are who they claim to be. Being a little suspicious with anyone demanding personal information is one of your best defenses against identity theft.

Proper document disposal prevents identity theft Beware of "dumpster divers" - a name used for thieves that retrieve personal information from the garbage you throw out of your home or workplace. Try to prevent identity theft by making sure documents, envelopes, faxes and printed e-mails are disposed of properly - by using a paper shredder - nut just crumpled up and thrown in the waste basket. There are various effective paper shredder models available on the market and they will increase the security of your discarded documents. In fact, shredders are an accessory required by the new 2005 FACTA law for any business that has one or more employees.

Online identity theft techniques Spoofing tricks the user into giving the perpetrator personal information, such as credit card numbers, the social security number, diver's ID and so on. Internet identity theft is even more dangerous than regular ID theft, where the thief steals personal documents or recovers personal information from the garbage. With a stolen wallet, you are at least aware that you might become a victim of identity theft. On the other hand, the Internet identity theft schemes will leave you clueless and it might take months before you discover the theft. E-mail spoofing uses addresses and headers that make the e-mail seem like it was sent by a trusted source. IP spoofing allows thieves to get unauthorized access to a PC while link alteration redirects users to the hacker's site. Here are a few tips, recommended by the FBI, that will allow you to decrease the chances of falling a victim to Internet identity theft.

Tips on avoiding ID theft Access websites cautiously - especially if you follow a link from an e-mail. Internet identity theft is often triggered by unsolicited mail - never give out any personal information to such e-mails. Some spoofing techniques warn you that your account (e-mail, Pay Pal and any other type of account) is in danger of being terminated if you do not provide your password or other information - be aware of such schemes. Online payment is quick and easy, but always go with a trusted intermediary and payment processor. Your ISP should learn about any form of internet identity theft, which will enable them to prevent future problems. Secure sites begin with a "https" in the URL address bar. There should also be a lock symbol (icon) in the bottom part of your browser.

For a complete treadmill info portal, please visit http://www.identity-theft-facts.com

For a complete treadmill info portal, please visit {a rel="nofollow" href=" http://www.identity-theft-facts.com"} Identity theft facts

Other resources you might find interesting: Exercise Heaven Search Engine Optimization Heaven

Labels: , , , ,

Tuesday, May 27, 2008

Identity theft, a horror story


Identity theft. The most damaging of criminal acts

Mary Jones was a good friend and neighbor. She worked for her church as much as she could while being a good wife and mother to her 3 your kids. It was a Monday morning and she went out to pick up the mail as she did every day. This Monday there was a huge amount of junk mail, which she threw out. What she did not see mixed in with the junk was a bank statement.

Tuesday night the trash went out to the curb ready for pick up the next morning. She was doing the same things that all her neighbors did, nothing different. What she did not see was a shadowy figure (we will call him Joe) in the small hours of the morning working his way down the street, digging in trash bin after trash bin. A passerby would mistake Joe for a bum and not look twice, not even ask himself why a bum was in a nice area like this.

Joe stuffs bits and piece in his bag and moves on. . Next day he is sorting through his haul and discovers a bank statement belonging to Mary Jones. Gold mine, he has what he needs. Off he goes and takes the information from Mary's statement and goes to work on his computer. He files a change of address for Mary and once that comes in he has control He now orders a credit card or as many credit cards as he possibly can. Once these start to arrive he is off shopping on Mary's dime. Mary continues with her happy life with no idea that her world is about to come crashing down on her head and her families.

See, it is not only Mary who is affected here. Her Husband Bill is a successful business owner who employ's 25 of their friends and has done so for the past 8 years. The credit scores on Mary's reports start to crash as the late notices come in on bills they did not even know they had. Mary and Bill's credit reports are tied together, which is common with married couples. Now Bills score is taking a nosedive. Bill's business runs on credit and has a good record over the years. However now a supplier rejects his credit request for new supplies. The business falters and eventually gets to a point where he is on a cash only operating basis. The business and family cash flow is not huge. It has given them a good life over the years but not made them rich. Bills business is not faltering and he now has to lay off several of his friends, as he can no longer get the operating capital he needs.

After 9 months of fighting the debts and trying to pay the bills it gets to a point of no return. They can't keep going. The bills are out of control and the house is now at risk as the mortgage is 3 months behind. The bottomed out credit score will not even allow them to get an apartment. Mary has been on the phones to the banks, credit card companies and credit reporting agencies but nothing is resolving. A lawyer is out of the question. The money is gone. Their lives are in ruins. All because of a careless mistake and a criminal identity thief who could not care less. He has long since moved on and is working on many other Mary's.

A scary hypothetical story but variations of this have been the lot of many identity theft victims. Have you ever had your identity stolen or even thought about it? It is one of he most damaging crimes out there. This is due to the fact that the criminals use it to steal money from you, under your name, and destroy your credit rating and good name everywhere they can before they finally discard the identity and move onto another victim.

The end result of this is hundreds, thousands maybe tens of thousands of unauthorized purchases dollars on your credit card that you now have to pay for. The fact that you can't pay for it only increases the damage as now all the late payments go onto your credit report. The more of this that happens, the worse the end result. Many people have had their lives totally destroyed by an identity thief.

Ever tried to rent an apartment without a credit check. Ever tried to get another credit card, buy a car, buy a home, and do anything at all that involves using your credit. Good luck. You will find you have very few friends in the credit world when you have a low credit score and even less friends when your credit score is off the bottom due to 20 purchases that were made using your credit card with our your permission. Getting a bunch of 30-day late marks every month on your credit report is about as bad as it gets. Go try and rent a house or buy a car with a score like that.

Ok, now go any try and get it fixed. Call the credit bureaus and tell them your story and how it is not your fault and you have filed a police report and done all you know how to do and please will they correct the reports now and put yours back to like it was before. Believe me you will fly before they will do this for you.

It now becomes your problem totally and completely to handle this mess and you have no friends on the inside to help you. You now have no credit, can't get credit and can't do anything that requires a credit check, as you will come up looking like the criminal yourself. It does not matter that the mess was made be someone who stole your identity, it is on your report and all the talk and reasons why from your end will not recreate the financial trust you had before.

Scary stuff. This is a hypothetical situation but all to real. The following advice is excerpted from the www.socialsecurity.gov site. Identity thieves get your personal information by: Stealing wallets, purses and your mail (bank and credit card statements, pre-approved credit offers, telephone calling cards and tax information); Stealing personal information you provide to an unsecured site on the Internet, From business or personnel records at work and personal information in your home; Sorting through trash for personal data; Posing as someone who legitimately needs information about you, such as employers or landlords; or Buying personal information from "inside" sources. For example, an identity thief may pay a store employee for information about you that appears on an application for goods, services or credit. Show your card to your employer when you start a job so your records are correct. Then, put it in a safe place. DO NOT carry your card with you. If you find out that someone is using your identity you can report it to the Federal Trade Commission at www.consumer.gov/idtheft

If you think someone is using your number for work purposes, you should contact Social Security. One way to find out whether someone is using your number in order to work is to check your Social Security Statement. The Statement lists earnings posted to your Social Security record. If you find an error on your Statement, contact Social Security right away. What if I think someone is using my number and creating credit problems for me? If someone used your Social Security number to get credit, Social Security cannot fix your credit record. To fix your credit record: Call the creditors who approved the credit (follow up with a letter). File a police report. Contact the fraud department of the major credit bureaus. Ask: To have a flag placed on your record, requiring creditors to contact you before approving additional credit using your name and number; How long your account will be flagged and how you can extend the flag, if necessary; and To have a statement added to your credit report--include your name, explain the problem and provide a telephone number where someone can call you. Request a copy of your credit report from each major credit bureau and check to see if it contains any entries you do not know about. If you are denied credit, you may be entitled to a free copy of your report. The major credit reporting agencies are: www.equifax.com www.experian.com www.tuc.com

Contact Social Security in addition to using their website, you can call toll-free at 1-800-772-1213. If you are deaf or hard of hearing, you may call our TTY number, 1-800-325-0778.

As a final note if you have stolen or lost valuables please click this link to http://www.osldb.com to place the data in a very secure web site and this will allow others to help you find them.

CTW Inc is the owner of the http://www.officialstolenlost.com web site. The company founders have done red carpet security for celebrity events, movie premiers, large concerts, general event security & personal celebrity security. We have extensive experience with private investigations with the legal profession. Personal and home security have become our specialty. Free articles at http://www.osldb.com

Labels: , , ,

Saturday, May 24, 2008

Identity Theft - Are you Vulnerable?


Identity theft is a common occurrence in our society. For most people, identity theft is something that happens to another person that is careless. However, identity theft can strike anyone, including people that take precautions. Although you can never guarantee that identity theft will not strike you, here are some the ways to reduce the risk that your identity will be stolen.

Identity theft is defined as when a person steals your real world identity in order to commit fraud. Identity theft affects millions of people each year and can cause financial damages and big headaches to people that have had their identity stolen.

Identity can occur in several ways, through hackers stealing personal information from large companies such as credit card companies or data wholesalers, by a computer user unknowingly divulging personal information to criminals and by merchants having access to your account details and personal information.

Many people are completely vulnerable when a bank or data wholesaler loses your information. There is nothing usually a private citizen can do since they do not control how the information is kept and transferred. Millions of people at once can be exposed to identity theft through these types of compromises. The best way to protect yourself is to check your credit report at least once a year to determine if any other entity tried to take out a loan or credit card without your authorization.

If you are notified by a company that your identity may have been compromised or see suspicious activity on your credit report, contact all three credit reporting agencies to make them aware that an identity theft has occurred. They will usually lock down your report and will not let credit cards and other financial institutions allow new credit or loans without checking with you first.

If you are surfing online, be careful who you give your personal information too. Many times emails are sent to you that look legitimate asking for personal or financial information. Never click on any links in your email. Always close your email, open up a new browser window and contact the company directly. These types of emails are called spoofing and they phish or look for unsuspecting people to give them their personal and financial information which is then used to commit fraud.

Another way your identity can be stolen is by merchants that process your transactions. There are some cases where a restaurant or gas station steals personal and credit card information from its customers. Although very difficult to stop, make sure that you give your credit card to businesses that are very transparent and have a low risk of fraud. So if you would like to reduce the risk of identity theft, take note of the above suggestions.

The Spywaredude keeps you informed with up to date information on Spyware, Adware, Malware and Viruses that can affect your computers operation. Vist the Spywaredude to read the latest news.

Labels: , , ,

Thursday, May 22, 2008

Identity Theft Surge Likely to Create Multiple Employment Opportunities in IT Security


A recent survey conducted by the United States Department of Justice indicates that identity theft is indeed on the rise. Affecting millions of households in the U.S each year, identity theft costs have now soared well above $6 billion per year. The study confirms that roughly three percent of all U.S. households experienced some sort of ID theft during the first half of the calendar year 2004. While this particular method of illegally obtaining personal information for the purpose of financial gain only accounts for a percentage of the total losses resulting from identity theft, it represents an undermining of the online banking systems that many financial institutions have undertaken great expense to implement. Countering the surge in identity theft, many banking firms and other lenders are relying on an influx of recent and future graduates of IT security degree programs to spearhead efforts to thwart would be offenders who seek to commit criminal activity through electronic means. Whether the supply of IT security professionals is able to meet the current and future demands of the marketplace, however, is unknown. With identity theft and other data loss concerns becoming more commonplace in the information technology sector, an increased likelihood exists that security positions within the field will become harder to fill in the upcoming years. As IT security is a constantly evolving milieu, the need for well trained, competent systems management professionals is likely to extend into other sectors of information security as well. Not only are individuals at risk, institutions have also lost millions of dollars due to inadequate information security protocols. For those seeking a career opportunity, database security may represent one of the safest bets for future job security. According to the United States Department of Labor, "Employment (for computer security specialists) is expected to increase much faster than the average as organizations continue to adopt increasingly sophisticated technologies". While the future technologies implemented to effectively counter identity theft are unknown at this time, the need for qualified security personnel is an almost certainty. In a world where cyber crime is steadily rising, one can only hope that the professionals needed to design and implement advanced security measures needed to combat identity theft will be available to protect the resources of consumers and institutions alike.

Earn a Degree in IT Earn a degree online on our other site. Click here to read other articles about online education

Labels: , , ,

Wednesday, May 21, 2008

Identity Theft Protection Safety Precautions

Identity theft has become the fastest growing criminal activity in the 20th Century, replacing illegal drug sales. For the perpetrators, it offers the highest profit margin with the least risk. In fact, according to one expert, it is estimated that fewer than 1-in-700-identity crimes actually result in a conviction.

In the United States alone, Identity theft has reached $53 billion dollars a year. Consumers are directly shouldering about $5 billion of that, but the rest, which is paid by businesses and retailers, is passed on indirectly to consumers who are paying more for goods and services.

How BIG is this Problem?

In recent months, there has been a rash of reports about big thefts, where criminals are stealing identities in mass quantities. Banks, credit card companies and businesses that house servers storing passwords or other sensitive, private information have all reported ?break-ins? that happened through the use of Trojan viruses and other online hacking methods ? resulting in the loss of millions of pieces of information being stolen. There have also been instances of the information just getting ?lost?, of employees selling it and other lax security measures resulting in the same thing ? thieves having access to your identity.

What do Thieves Want?


- Your Name
- Date of Birth
- Home Address
- Phone Numbers
- Social Security Number
- Driver?s License Number
- Credit Card Numbers
- CW2 Security Code (the number on the back of your credit card)
- Your Credit Report
- ATM Cards
- Telephone Calling Cards
- Mortgage Details

Where Are They Getting All Your Information?

High-tech methods include online thefts from:


- Banks
- Credit-Reference Agencies
- Retailers
- Credit Card Networks
- Data-Brokerage Companies
- Payment Processing Companies
- Phone Companies
- Schools
- Your Employer
- Doctors, Clinics and Health Departments
- Government Agencies

But there are still low-tech methods that are effective as well:


- Dumpster Diving
- Mail Theft
- Retail Theft
- ?Phishing?/pretexting/pretending
- Purse/Wallet Theft

What are Thieves Using Your Information For?


- Making charges to your existing credit cards
- Opening new credit cards in your name
- Having phone or utilities turned on
- Withdrawing money from your existing bank accounts
- Employment purposes
- Driver?s Licenses
- Tax Fraud
- Social Service benefits
- Student loans
- Business or Personal loans
- Health care
- Mortgage loans/leases
- Auto loans
- Using your ID when caught committing a crime

How Can You Protect Yourself?


- Keep a photocopy of all your credit cards, bank account numbers and investment account numbers in a safe place
- Keep your credit card receipts ? don?t throw them away in a public place
- Put a ?fraud alert? on all your credit reports
- If you apply for credit and the card doesn?t arrive on time, call the card issuer
- Choose difficult to guess PIN numbers or passwords. (Don?t use birth dates, your mother?s maiden name, pet?s name, etc.)
- Never give personal information to anyone who sends you an email, a letter or calls you asking for it
- Shred any personal information ? such as bills, credit card or bank statements, even pre-approved credit applications before throwing them away
- Don?t use the ATM machine if someone is watching you
- Pay attention to what?s going on around you ? cell phones often have cameras in them. If someone is standing close by you with a cell phone while you're entering a PIN number at the ATM or in line at the grocery store, block their view
- Review your bills each month for unusual or suspicious charges. If there?s something you don?t remember or doesn?t seem right, call the creditor right away
- Check your credit report at least once a year
- Store your cancelled checks safely, or better yet, have the bank do it. You can always get a copy if you need one.
- Don?t leave your purse in plain sight when driving
- Keep your valuable locked in the trunk or glove box when driving
- Make all personal information on your laptop or computer password protected
- Don?t carry information about your PIN numbers, passwords and account numbers in your purse or wallet; or at least don?t make them easily identifiable as to which account they belong to

Warning Signs that Your Identity Has Been Stolen:


- Although you have good credit, a loan application is denied, or you?re refused extended credit requests
- You are suddenly contacted by a debt-collection agency
- Your purse or wallet has been stolen, or your house broken into
- There is unfamiliar activity on your credit report

What to do if it Happens to You:


- If your purse or wallet is stolen, call the police immediately, and file a report. Make sure that you?re given a report number
- Contact your bank, credit card and other credit extending companies and report the theft
- Close the accounts
- Contact the credit-reporting companies in your area, and report the theft.
- Review your credit report every 90 days for the next year for suspicious activity
- If there is fraudulent activity, have it removed immediately and monitor your credit report every 90 days for the next year
- Put everything in writing, and follow up with your credit card companies, banks, and credit reporting agencies. Keep copies of all supporting documents
- File a report with the Federal Trade Commission
- Change the passwords on your existing accounts and create new ones for new accounts

Identity theft is real, and it?s a growing problem, and it could happen to you. Although there are no guarantees that you can keep your information safe, by paying attention to the risks and taking proactive steps to protect yourself, you can minimize your chances of someday having an ?identity crisis?. Good luck!



 

Labels: , , , ,

Tuesday, May 20, 2008

Identity theft - one of the most overhyped fears of our time

A leading identity theft expert used the credit industry?s annual conference to show that the government has massively over-hyped public fear of the extent of identity fraud to sell its Identity Cards Bill.

He also urged the credit industry not to join the bandwagon by selling over-priced prevention products to over-anxious consumers, and to help combat the crime by supporting victims more readily.

Barry Stamp, Joint Managing Director of
checkmyfile.com, presented to leading credit industry figures at the Institute of Credit Management?s National Conference.

He showed how the government?s estimated figure of ?1.72bn worth of losses to the UK economy, caused by identity fraud, has been massively over-inflated. In particular, these include the costs of security checks for routine government functions and losses that reasonably cannot be included within the general understanding of identity fraud.

This has whipped up public fear and in doing so is likely to obtain wider public support for the introduction of identity cards.

?The largest single component of the government?s ?1.72bn estimate is ?504.8m worth of losses relating to plastic card fraud, taken from the figures reported in April 2005 by APACS. Closer examination of the APACS figures show that losses from identity fraud account for just over 7% of overall card fraud, so the true losses are only ?36.9m. This example is one of many that clearly illustrates how the government has used a creative approach to the definition of what is and is not included within identity theft losses,? said Stamp.

?Going on to include the ?62.8m cost of the measures to counter identity fraud when processing passport applications, and another ?34.8m for things like unpaid fines where the offender doesn?t turn up at court are further examples of how the definition has been stretched?.

?In reality, identity fraud is a fast growing crime, but losses in the UK are probably running closer to ?150m at the moment?.

Stamp warned: ?While the risk is real, and consumers need to increase their awareness, there really is no excuse for the government to strike fear of falling victim to identity theft into consumers for political advantage. If the credit industry exploits that fear to promote over-priced identity theft protection products to replace waning income streams from payment protection insurance, then that would be totally unacceptable.?

?If the problem is as large as it is claimed to be, then I would very much like to know why Police resources have not been strengthened to combat the crime. Of the many hundreds of cases of identity theft that checkmyfile.com has reported to the Police, not one has been pursued to court action.?

?Any consideration of the effectiveness of identity cards should also bear in mind the state of some of our existing national databases.? says Stamp. ?In the UK, our government just isn?t very good at collecting personal data or maintaining it, so what reasonable person might assume that the National Identity Register might be any different? In the UK we don?t even have a central point of reference to check whether cards or any other identification documents are lost or stolen, as exists in other countries, nor have I seen any plans to build one.?

Stamp, author of ?Identity Theft, Prevention and Victim Assistance?, and whose company checkmyfile.com provides consumers with access to a wide range of databases, and supplies identity restoration services to a leading insurance company, urged credit managers who attended the ICM National Conference to follow the lead of some lenders who offer free identity theft prevention advice and to work together to combat the crime.

Philip King, the newly appointed Director General of the ICM, fully supports such an industry initiative. He said: ?Credit managers working together have shown in the past that losses from criminal actions, such as mortgage fraud, can be prevented by sharing intelligence. Identity theft presents a very similar challenge to our industry and we now need to focus on addressing the issue professionally?.

Labels: , , , ,

Don't Be an Identity Theft Victim: E-mail Safety Tips

Remember the good old days: To send a picture to your family, you had to put it in envelope, mark the envelope "Photos-Do Not Bend" (which, apparently in some languages means "Bend this"), then find their mailing address, hunt for stamps, try to guess how many to use, then wait 3-37 business days for them to receive it. You business owners out there, remember trying to get your client that important proposal, having to get everything typed up and signed before 4 pm to make sure it went out overnight? Then, remembering at 4:15 that you forgot to include that important page.

My how we have grown. E-mail is a truly invaluable tool. What would we do without it! Now, we use it to send pictures to friends and family instantly. We use it to request more information about that vacation we want to take. Office coworkers use it to communicate with one another and businesses use it to communicate with customers and vendors. E-mail is fun and very cost efficient. But, it is not very secure. It is one of the main ways of transmitting viruses and other malicious software from computer to computer. Also, it is possible for your e-mail to be read by someone other than your intended recipient. E-mail is really like sending a postcard through the mail. Anyone can read what you write on a postcard. Knowing that, you would never write "secret" stuff on a postcard and that same rule should apply to your e-mail.

This article is the second in our series "Protect your Data Online and in the Office". Remember, a thief first needs your data in order to steal your identity. That is what we want to prevent. The first article in our series dealt with creating good, strong passwords. Now, we will offer some tips and suggestions that will help keep you safe while using e-mail. But first, where did e-mail come from?

A Very Brief History of E-mail
Very basic e-mail actually first appeared on scene in early 1960s. However, it only worked with a certain type of computer and so was not feasible for the masses. But then, in the early 1990s, the modern version of e-mail began to take shape. America Online and Delphi began to connect their corporate e-mail systems to the Internet and viola, the modern e-mail standard was born. Now anyone could send a certain number of e-mails each month for around $10 (can you imagine having to pay for e-mail?). Today, estimates on the number of e-mails send each day range from a little over 2 billion (yes, that is "billion") to 60 billion. Wow! That is allot of communication. It also provides plenty of opportunity for unscrupulous people to spread viruses and harvest sensitive data. So, lets see how we can limit our risk while using e-mail.

E-mail Attachments
Be skeptical of attachments. Even if you know the person sending you the message, if you are not expecting an attachment, don' t open it. The attachment may contain nasty little programs know as "letterbombs." One of these could easily render your computer useless. The best course of action is to contact the sender and ask them if they sent you a file. They can then verify that it was indeed from them. Then, you can decide to open it or not. If you decide to open it, make sure your anti-virus software is operating and is up-do-date. This may be an inconvenience, but it is much better than possibly installing a trojan horse program or a virus.

Links In Your E-mail Message
Be skeptical of links to web sites that may be included in the e-mail. You must make sure the link will lead you to where you think it will. The link may say it will lead you to the "E-Bay" site, for example. However, in reality, it might lead you to a questionable web site. Rather than clicking on any link within your e-mail message, copy the URL and paste it into your web browser. Here's how:

    ? While in the e-mail, highlight the entire link in question and press Ctrl-C.
    ? Open your web browser.
    ? Highlight the text contained in the address bar at the top and press Ctrl-V.
    ? Read the text carefully and make sure it looks safe. Sometimes the underlying URL is different from what appears in the e-mail message.

Install an anti-spoofing program like Spoofstick. It is a great little program that will alert you if you are about to go to a questionable site.

Personal Data
Never transmit credit card, bank account, social security number, passwords or any other information you consider private via e-mail. Remember, it is really like sending a postcard.

"But I got this email from my bank. They told me that I had to update my account information or it will be suspended", you may say. Amazingly, thousands fall for this. While the e-mail may look official, right down to the institution's logo, it is most likely a scam. Don't fall for it. Financial institutions will not do this sort of thing via e-mail. Most likely, they will send you a letter in the mail, requesting that you update your information. However, if you think that the request may really be legitimate, call them on the phone at the number that you have on record. Then you will be sure if the request is valid.

Passwords
Change your passwords often. This does not take long and goes a long way to protecting your data. See our article "Tips for Creating Good Passwords" for more information on this important step.

Spam
This is probably the number one complaint that clients have. While it is almost impossible to completely avoid spam, here are some things that can limit your exposure:

    ? Never reply to spam. Sometimes there is an "unsubscribe" link at the bottom of the message. However, if you click it, you are probably just signifying to the spammer that he has found a legitimate address and he will be sure to send you more spam.
    ? Enable your e-mail software's spam filtering features. This varies from e-mail program to e-mail program. Consult the help section of the software that you use for more information.
    ? Do not post your e-mail address on any web page. Programs called "harvesters" routinely search the Internet for e-mail addresses to gather and sell to spammers.
    ? Use a free e-mail account address (such as through Yahoo, MSN, Google) when filling out web forms. These addresses are free and, in most cases, they are very good at spam filtering.
    ? When filling out a web form, make sure to uncheck any box indicating you would like to receive "additional information" or "production information from related vendors" (unless you want to receive such correspondence).

Using Public Computers
When using a public computer at a library or coffee shop, for example, make sure you sign out when you are done. That way, the next user will not be privy to your account information. Also, make sure you close the browser you were using when you are ready to end your Internet session. Some computers are setup to automatically remove private information when they are closed. If you are not sure, ask the administrator.

In Conclusion
Hopefully, this article provided you with some new ideas regarding e-mail safety. Common sense and a healthy dose of skepticism will go a long way to keeping you and your data safe. Use caution when revealing personal information, such as account numbers or passwords, to anyone you meet in cyberspace because they may not be who they claim to be.

Next in the series will be an article discussing some software that will help to keep you safe. Make sure to bookmark our blog and check back for that article.

Labels: , , , ,

Monday, May 19, 2008

Protecting Your Banking Details - Stop Identity Theft !


It would seem that the computer is becoming a bigger and bigger part of our lives each and every day. There's good reason for that perception... it's true. One specific area that is becoming incredibly popular is online banking. Customers love it because it is very convenient and a great time saver. The banks love it because it automates a great many functions for them and cuts down on their overhead.

The number one concern of anyone that deals with online banking should be security. Putting your personal information over the Internet can be risky, there is no denying that. Fraud and identity theft have become huge problems in the modern age. There are any number of hackers and thieves out there in cyberspace just waiting to prey on innocent people.

Fortunately for us, the financial institutions of the world are very aware of this problem and are working aggressively to combat it. There was a time when a bank's chief security concern was whether they would be robbed or not. I think we've all seen the old movies about Bonnie & Clyde, John Dillinger and the like... to say nothing of the daring train robberies of the wild west. Now banks face a new and much deadlier challenge than ever before, and instead of wearing a mask and using a gun, the bad guys are now invisible and use keyboards.

Identity theft has now become so prevalent that thieves are rifling through garbage to attain any information that they can use to steal from their unsuspecting victims. With this said, there are some simple, common sense approaches that will go along way to securing personal bank information.

1. Do not share your passwords with anyone.

2. Keep important documents locked in a safe or safety deposit box.

3. Shred documents that you no longer need.

4. If you bank online, make sure your bank is using a secure, encrypted site (It's OK to ask what security features they employ).

5. When using an ATM make sure no one can see the codes you enter.

These are a just a few of the things that can be done to keep banking information secure and avoiding possible crimes against you. While many of these seem to be glaringly obvious, all to many times they are taken for granted or just plain ignored. It is at these times when the criminals are at their best. Individuals that grow careless and complacent are exactly what they look for. Don't be counted as one of the them.

For more Identity Theft Articles please visit http://www.real-articles.com/Category/Identity-Theft/216

Labels: , , ,

Saturday, May 17, 2008

Tips to Avoid Identity Theft


What is rampant, spreading like wildfire and can kill life as you know it? No, not a deadly virus (but close). Answer: Identity theft. My stepson, Aaron, was a victim of identity theft recently. Someone stole his bank cards, deposited fake checks into his account, then withdrew cash. The deposited fraudulent checks and overdraft charges hurt his credit, and he's slowly recovering and rebuilding his score.

Tips to avoid identity theft: 1. Buy a shredder. Aggressively protect your social security, credit card or bank numbers. 2. Use a lock-in mailbox. This isn't 100% safe, but it's much safer than one without a lock. 3. Protect your out-going mail. Get it into the box or the hands of a postal clerk. Heavily trafficked offices often have out-going mail in the entryway. While this may save time, it's not safe. 4. Keep receipts and compare to your statements when they come once a month. Banks make mistakes all the time. 5. Keep financial documents under lock and key (at the bank or in a home safe). 6. Don't give out your social security card--ever. 7. Know what's in your wallet. Do you know how many credit cards are in your wallet? 8. Don't discuss detailed financial information on a cordless or cell phone. That information can be intercepted. 9. Monitor your credit reports. You can sign up for a monitoring service or do it yourself periodically. Your credit is one of your assets, so protect it.

If someone steals your credit card information, get help from these reputable resources-- Federal Trade Commission www.consumer.gov/idtheft or 877-382-4357 Identity Theft Resource Center at www.idtheftcenter.org 858-693-7935 Privacy Rights Clearinghouse www.privacyrights.org or 619-298-3396

Labels: , , ,

Don't Be an Identity Theft Victim: Tips for Creating Good Passwords


According to recent studies, up to 7 million people per year (yes, that is "million") are victims of identity theft in the United States alone. That is more than 19,000 per day and nearly 800 per hour. Wow! While some feel that these figures may be greatly inflated, they still are sobering. Regardless of the actual number per year, we still need to protect ourselves from this problem. Many, though not all, of the yearly victims become so because they are not as careful with their sensitive data as they should be. Carelessness is all a thief needs to make a victim.

CCT offers this article "Tips for Creating Good Passwords." This will be the first article in the CCT Tip Series entitled "Protect your Data Online and in the Office". Please give us your feedback. Feel free to leave comments and suggestions.

The chain of protection is only as strong as its weakest link. Many times, the weakest link is a poor password. One of our clients recently told me that at one time, every computer in their office had a password of "password". Obviously, that offered as much protection as a screen door on a submarine. A password is the first step to safeguarding yourself and protecting your sensitive data.

Password No-Nos

    Here are a few things to avoid when making your password:

    1. DO NOT include words that can be found in the dictionary in any language. Believe it or not, there are dictionaries for password cracking. They are filled with, not only words and names, but also number and letter combinations, such as 11111 and abc123. If your password is super simple, like "champ" or "bigtime", it can easily be guessed.

    2. DO NOT use only letters or only numbers.

    3. DO NOT use names of spouses, children, girlfriends, boyfriends or pets.

    4. DO NOT use phone numbers, birthdates or, even worse, your Social Security number.

    5. DO NOT use the same word as your log-in, or any variation of it.

    6. DO NOT give out your password to friends or family members (especially children) who could pass them on to other less trustworthy individuals.

    7. DO NOT store written passwords in your desk, under your keyboard or, worst of all, on a bright, yellow sticky note on your monitor. Sure, this is nice to have in case you forget your password. However, it also can provide easy access to your computer for thieves.

    8. DO NOT provide your password over e-mail even if a trusted company or individual requests it. Internet "phishing" scams might use fraudulent e-mail to entice you into revealing your user names and passwords so criminals can access your accounts, steal your identity, and more. E-mail security will be discussed in a future article.

    9. DO NOT use the same password for multiple accounts. If someone gets one password, they could gain access to many of your accounts.

    10. DO NOT enable the Save Password Option. You may see a dialog box which asks you if you want the computer to remember the password you just entered. In this case, your best bet is to choose NO. If you select YES, anyone who uses your computer could also use your pre-saved passwords on these accounts.

Ok. Now we know a little about what we should avoid. Let's learn a little about what is involved in making a good password:

Proven Methods of Great Password Creation

    Follow these tips and you will be well on your way to creating a safe, secure password:

    1. DO make your password at least 8 characters long. This would apply to your PC on your desk and any Online account that you have that requires a password. A password of this length and containing a mix of upper and lowercase letters (more on this in the next step)will take about 2 years to crack.

    2. DO choose a phrase or combination of words to make the password easier to remember. For example, take a phrase that you can remember. Let's use "Where Oh Where Has My Little Dog Gone." Now, take the first letter of each word in that phrase and you come up with: WOWHMLDG. Now, mix in some lowercase letters and you get: wOWhmLdG. For even more security, add some punctuation to the mix: wOW^hm%LdG. That is a very strong password and yet it is fairly easy for the owner to remember.

    3. DO change passwords regularly. Ideally, every few months you should create new, strong passwords for all of your accounts. This can help keep hackers off balance if they're monitoring a Web site that you visit frequently.

    Changing your password for your Online accounts

    Web sites have a variety of policies that govern how you can access your account and change your password. Look for a link (such as "your account") somewhere on the site's home page that goes to a special area of the site that allows password and account management.

    Changing the password for your office computer

    You can usually find information about how to create, modify, and access password-protected user accounts, as well as how to require password protection upon startup of your computer in the Help files of your operating system, or online at the operating system software manufacturer's Web site. For example, if you use Microsoft Windows XP, online help can show you how to manage passwords, change passwords, and more. Mac users can go here for more information.

I am sure that some of you may think that the suggestions mentioned in this article might be a little extreme. However, stop and consider this: In the time it took you to read this article, 53 people in the United States became victims of identity theft. Many of them because they were careless with their sensitive data. A secure password is the first step in making yourself safe online and in the office.

Next in our series, we will discuss "How to be Safe While Using Email." Be on the lookout for that article.

Crystal Coast Technologies is a web design team headquartered in Swansboro North Carolina. We specialize in Flash web design and database driven e-commerce. Our blog contains more tips and the latest tech news, including security alerts.

Labels: , , ,

Friday, May 16, 2008

Identity theft - A true story! - Don't be a victim.


About 10 or so years ago I received a call from the Inland Revenue office. They said that they would like to visit me to talk to me about my working status and my National Insurance contributions.

Naturally I was quite nervous about their visit as I did not know what it was all about. They said that they were not at liberty to discuss the details with me over the telephone.

When they arrived we sat down and talked. They explained to me that they had received two National Insurance contributions from two different individuals sharing the same name. I was confused and still did not fully appreciate what they meant.

After further explanation I realised that my identity had been stolen. In simple terms there were two of me in the UK system.

As our discussion progressed I was told that I had to provide proof of my identity, imagine that, having to prove that you are who you say you are. It was quite a daunting experience. After I provided all the necessary and required documentation they told me that they were satisfied and that they will now follow up their investigations with the other gentleman involved.

Some months later the Inland Revenue contacted me to confirm that they had got to the bottom of this mystery and confirmed that the case was closed.

This incident happened a number of years ago when the Internet was not as well used for information as it is now used today.

I have since then discovered a website that you can use to check to make sure that your identity has not been cloned or stolen.
 

Ken Ajoku is the Senior Partner of http://www.kajoku.biz , a company dedicated to GROWING businesses by as much as 300%.

Click the following link NOW to hear the actual story and to check for FREE that your identity has not been cloned.

http://www.kajoku.biz/Help_Protect_Yourself_From_Identity_Fraud.php

Labels: , , , ,

Tuesday, May 13, 2008

Identity Theft Safety First


To avoid becoming the next victim of identity theft you must place safety first. Identity theft is one of the leading crimes today that is claiming the control of millions of people and costing us a fortune to recover from the crime. You heard me right; it is costing us a fortune, since we make of the loss of identity theft by paying higher costs for foods, gas, products, and so forth. When a person loses their identity, they become a long-living victim, since the victim pays for the crime that the thief acted upon.

It is unfortunate that we are in a world were the victim often pays more than the criminal for a crime, thus putting safety first is the only way we can protect our self from the criminals and the enforcers that force the victims to pay.

Crime in itself is constant, thus identity crime, is when a person takes hold of another person's information and utilizes it to make purchases, open accounts, escape crimes, commit additional crimes, and so forth. When a person gains hold of your identity it is an ongoing process to gain control of your life. Unfortunately, few states offer identity theft victims the ability to FREEZE the credit reports, and when I say unfortunately...I mean that not all states have this law available. Freezing the credit reports is the best way to protect your identity further, since if you are allowed to Freeze the accounts, only you will have access to those reports. Some states place a Fraud Alert on the credit reports, which provides no protection to you, and it makes you look bad.

If you are victim of identity theft, learn the steps to take to prevent ongoing activity. The first step is to contact the authorities and provide them all information available to you about the crime. Next, you will need to go online and report the crime to the government. The Federal Trade Commission has a site online that enables you to file a complaint, which the information is handed over to the FBI and government officials, who have put up an identity theft team force to find the perpetrators. The act of filing the complaint is essential, since the FBI and government can reach further to find the perpetrator over the local authorities. A victim of identity theft should also request copies of their credit reports and alert the companies that they were robbed of their identity. The person should also close any accounts in their names and immediately contact their credit card providers, letting them know they are a victim of identity theft.

To protect your self from identity theft it is important to learn the steps to protect yourself. Companies' offline and online have a legal obligation to you, to keep information giving to them private from other companies' and individuals, however, there are companies' offline and online they disregard the law and will sell, lease or give your information to other companies or individuals. It makes sense to conduct a background check on any service provider or company to make sure that the source is reputable. If you are making purchases offline at department stores make sure, the company has a good reputation.

Recently, a store opened in our area that offered equipment and services to the community, however, the person was not a reputable source, and thus anyone giving their information to this person was at risk. As you can see, anyone can be the perpetrator of identity theft. Although, no one was affected by this person symptoms were available that did hold potential risks.

Nowadays, we cannot trust anyone with our personal information. Putting safety first can prevent thieves from taking control of our lives. Thus, do not give your social security number or other information over the phone lines, unless you know for sure who these people are. Even then, you should use caution, since cellular phones and cordless phone lines can produce leakages, especially if the neighboring area has Scanners or other devices that make it possible to listen in to conversations conducting over the phone.

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: , , , ,

Monday, May 12, 2008

Identity Theft Tips


Identity theft is an ongoing crime, that in the year of 2004 alone more than eleven million victims lost their identity. Now that we are in recession, the world is in chaos more so than ever and many people are desperate to survive.

Some thieves start as innocent citizens in the environment that have been pushed beyond their ability to cope with stress and stressors, thus allow criminal thinking to win them over and a crime in the making. Other thieves practice, since it is a form of entertainment, while other thieves have deeper motives behind that act.

Thus to fight identity theft the greatest tip of all is to learn all you can about the crime and steps to take in protecting your identity. The tip will include learning steps to take if you become the next victim of identity theft. You should also prepare you mentality, since it will be challenged throughout the trial of identity theft.

If you have taking all the steps to prevent identity theft, learn more tips to help you to keep fighting. If you are victimized by identity theft learn all you can to prevent further damage to your life.

What thieves do with identities? When a thief takes an identity, he/she can open bank accounts in your name, apply for jobs and credit cards in your name, and file bankruptcy in your name. The list is only a selected choice of what thieves do with identities, since some identity thief will kill in your name.

Identity thieves can change your address and credit card and bank accounts, as well as sending your statements and bills to various addresses to confuse the law, thus slowing the process of learning who is the identity theft victim. Thieves can open cellular phone and land-base phone accounts in your name, or request utility hook-ups. Identity thieves can also open banking accounts, write checks, draining the accounts, and continue writing checks that instigates another crime, which you may face penalty.

Thieves will do various things with your identity, including handing you over to the law if they are caught. This means that if the thief is caught and fails to appear in court, you may be summons to court. The criminals could also get a driver license in your name, and if they are pulled over for, drinking and driving...guess who is in trouble.

We live in this cruel and vicious world and most times victims are persecuted, accused and pay more for a crime than any single criminal will ever pay. The law protects the rights of criminals, while victims' rights are fewer, and will do what they can for the criminal, while seating the victim in the shadows.

If you find you are victimized by identity theft, learn assertiveness, organizing skills, and the will to keep fighting. Online you will find all the information you need to learn the steps to fight the long battle of identity theft. To help your mental status visit the online discussion boards and talk freely about your situation without giving out personal information, including name and phone numbers. Make up a superficial name and ride with the rest of the victims of identity theft. Counselors may help, but they cannot restore your life.

Therefore, one of the greatest of the great tips to fight identity theft is to ALWAYS, keep witnesses and evidence linking you to where you say you are. If you have written evidence and witnesses, if you have to appear in court for what the trader did to you, thus you will have ammunition to fight the criminal and law. Remember, you are the victim of a crime and NO ONE is going to search harder and work harder than you to get the criminal put behind bars. Unfortunately, if the criminal is caught, the law will probably give him less time than you will spend recovering your identity and the criminal will pay less for the crime that what the general population will pay for the ongoing crime; still a measure of justice is there. Finally, do not forget...GOD provides the ultimate justice of any crime committed against you, so laugh at the law if the perpetrator of identity theft against you receives fifteen years for his crime, since the real justice is coming.

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: ,

Saturday, May 10, 2008

Identity Theft Crimes


The cost of identity theft crimes is ranging in the billions, since everyday someone is robbed of their identity. The FBI, Police Departments around the world, Government and other teams are joining to fight the ongoing crime of identity theft, however, the stronger the fight the more these groups of authorities fall behind.

Down through the centuries criminals have always managed to stay one-step ahead of the authorities. Today, these criminals are taking advantage of technology development and moving even two-steps ahead. Identity theft is one of the leading crimes around the globe and the more authorities battle the crime, the more identity thefts move in to take away someone else's life.

When a person is robbed of their identity is a long, hard fight to restore the life, yet in some cases, the person never receives their identity back. When a person does receive their identity back, it leaves a void in their life. During the battle to recover your identity, you will feel angry, frustrated, hopeless, stressed, and so forth and you will feel like you are left alone in life. You are not alone since thousands of others are also victims of identity theft, thus the only partners you have are those battling with you. The authorities work to fight identity theft, however little movement is made to progress toward apprehension, since most criminals are far too intelligent to get ahead of. Criminals outside of the Internet are likely to be caught sooner than those that steals identities over the World Wide Net. Thus, the World Wide Net is less guarded by authorities than many believe; therefore, the criminals are less apt to be apprehended.

If you are not an identity theft victim yet, make sure you do everything you can to guard your self from becoming the next victim. As a victim myself, I have fought more than seven years with little result and the perpetrator in one instance was never caught.

If you become a victim of identity, theft, be prepared to battle throughout the rest of your lifetime. Be sure to contact the three B's right away and let them know that you believe that your identity was stolen. The Credit Bureaus will put up a Fraud Alert once they are notified, thus you will need to step up when this alert is activated and ask them to FREEZE your accounts. Freezing the accounts will provide you hope whereas fraud alerts will only add to the distress you are already feeling from the crime. Fraud alerts only alert the creditors that someone has possibly tampered with your account, while a Freeze on your account will enforce the creditors to look more into your situation if you apply for credit in the future.

Once you have alerted the credit bureaus that you are possibly a victim of identity theft, make sure you close any accounts that the theft may possibly have access to...bank accounts, credit card accounts, department cards; et cetera should all be closed immediately. If you notice any bills on your credit cards, checking accounts of other accounts notify the provider and dispute the charges immediately. Delaying to take action will only worsen the situation.

It is important to keep guard over your checking accounts, saving accounts, credit cards and other accounts at all times to make sure no activity is in movement that you have not issued. Keep all PIN numbers, ID numbers, Social Security Card and other information in a secure area and do not allow anyone access to those numbers unless you have no doubt in your mind you can trust the source.

After my identity was stolen, I lost self-respect, confidence and felt that my privacy was non-existing. In fact, it affected me so dramatically that my body alone felt completely violated. Identity theft crimes are one of the worst crimes that could be committed against another individual. In fact, as a victim of rape and a victim of identity theft, I preferred to have been raped again rather than lost my identity. I compared the two, since it will give you an insight of what to prepare for if someone steals you identity.

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: , , , ,

Thursday, May 8, 2008

Protect Your Self Now from Identity Theft


Protect Your Self Now from Identity Theft

Protecting your self now from identity theft is the best thing you will ever do in your lifetime. Companies are now working to fight identity theft by adding new software programs that supposedly adds additional protect, however when you give out your information over the World Wide Web you are always at risk. Thus, in this article we will inform you of the steps you will need to take to protect your self from identity theft.

Steps Never give your personal information out on the World Wide Net, unless you know the company is trustworthy and has encryptions to secure the site. Still, you may want to consider ordering products or paying bills by use of Money Orders, rather than checks. Recently, I learned from a friend living in England that UK postal workers were caught selling personal information to immigrants so that these people can remain living in the UK. Thus, I have not received a steady collection of information as of yet, still, it is something to consider, since thieves come in all forms. The Criminal Justice Departments try to blame the crimes on the poor, however, most crimes committed are acted out by less suspicious people, such as lawyers, doctors, postal workers, et cetera. Continuing the steps you should NEVER respond to Phishing or Spam Mails, since the mails often have potential thieves sending them. Phishing Mails slightly differ from Spam mail, in that the sender will send out an email claiming that your accounts are frozen or pending stop. Some of the mails have links, which direct the receiver to a site that appears to be a legitimate account site. Thus, banks, creditors and lenders already have your information, thus giving information to these mails will only land you in a whirl of problems in most instance. Spam mails or other types of Phishing Mails may propose winnings. NEVER open or give personal information to anyone via email. It is important to change your PIN numbers and Passwords randomly. Changing the codes will confuse the server, thus it will help prevent identity theft. Few people claim that changing your Password and Pin Numbers every six months will help; however, I recommend random changing of the codes for additional protection.

As a victim of identity theft, I learned the hard way of how to protect, prevent further activities and so forth. Restoring trust after your identity is stolen is next to impossible. Still, I do not set my self up by allowing my lack of trust to control my life.

If you are ordering online make sure you know the companies worth. Conducting a background check of any company online is easy and only takes a few minutes. To conduct a background check, visit the Better Business Bureau Site by typing in the search engine BBB.

When making purchases with credit/debit cards, checks or other types of cards make sure no one is watching you when you type in your PIN numbers or Passwords. If someone is standing over you when you are making a purchase, I recommend changing your Pin number and/or Password right away. I become suspicious when at a store using my debit cards to make purchases. Often the customer standing behind me is watching and it annoys me, and sometimes the clerk watches the transaction. I immediately alert them, letting them know that this is a personal transaction and no one has the right to watch me type in my PIN number. Thus, I change my passwords and PIN numbers randomly to prevent identity theft.

It is important to conceal your personal information at all times. If you carry a wallet and/or purse make, sure you know where your valuables are at all time. Personally, recalling numbers in your mind rather than carrying them in your material possessions is safer. In other words, remember your Social Security Number at least and store the card in a safe place. You should never give your Social Security Number over the phone lines, however when contacting the Social Security Administration you will have no choice.

Finally, taking all the steps to prevent identity theft includes learning all the details as possible about the crime.

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: , , , , ,

Wednesday, May 7, 2008

Phishing Email Identity Theft Alert


Phishing mails are similar to Spam Mails; however, the modus operandi is different all together. The similarity is that Spam and Phishing Mails are both annoying and hold potential threats of stealing identities. The characteristics of the mails are what separate Phishing and Spam mails.

Phishing is fraudulent mail that attempts to swindle identities, by gaining confidence of the receiver. The "Department of Justice" has put up alerts on such mails that inform the consumers to pay attention to the mails. The mails are sent to nearly every email box in the world, and the soul purpose is to steal. The emails may include luring information however; the information is fraudulent and should be ignored. The sender wants the receivers to respond to the mails and may include links to click where the receiver will provide his/her personal or confidential information. The mail may have information that upsets the reader, thus it is another type of strategy, which the sender utilizes to force the receiver to respond.

The mail may state "your account is being suspended," or it may claim "you have won x amount of cash, please respond now.'

Knowing which company is legit is important and learning how they make offers to consumers is just as important to help you avoid identity theft. Companies that claim you have won prizes will not ask for extensive information, rather they only ask for minimal information. Thus, when you receive Phishing Mails or Spam Mails the sender already has a degree of information on you from random selections, and when you answer the mails, you are only giving the sender the information he/she needs to claim your identity.

Always know your credit card lenders phone numbers and bank numbers, thus when you receive one of these mails call the company immediately at the original phone number and ask if they have sent you mail. Personally, I delete any mail that comes to my box, regardless of who the sender is, unless I know it is from my business or school. As a student, most of my work is done online, thus this too opens doors for perpetrators, since payments to the school are often required at the school. However, I disregard any commands to send payments online and send my payments through postal mail. Still, this is scary.

In the UK, a friend informed me that postal workers are stealing identities and selling the information to thieves so that they can stay in England. I do not know the level of truth in this allegation at this point; however, anything is possible when it comes to identity theft. I am ready to instruct anyone paying bills to pay a low cost for Money Orders and submit your bill payments, since your check has enough information available that anyone can gain control of your accounts.

Thieves come in all forms, including postal workers, utility clerks, court clerks, judges, lawyers, doctors, mothers, fathers, spouses, et cetera. Likewise, victims come in the same form.

Few samples of Phishing Mails include information such as "Closed Account." The email address may appear to come from genuine banks. Recently, phishing mails came from "FDIC" claiming that the account holder's 'account has been frozen." The receiver was asked to click on the link provided in the body of the email and provide pertinent information now. Thus, the email continued to threaten the emotions of the receiver by claiming that the head nacho man has instructed the bank to discontinue any activity by you, under a particular Act.

Few Phishing Mails request the receiver to download attachments with claims to store "Internet Billing Notice" and once the receiver downloads, they find them self in a whirl of problems, since Viruses, Trojans, or other nasty contaminates are attached to the mail. The contaminate in turn redirects to the receivers "email contact list."

EBay is another area where perpetrators frequent and have even put forth the effort to steal identities or gain from the auction provider's clientele. The Internet unfortunately, is the single most dangerous area where identity thieves frequent. Therefore, protect your self by learning more about identity theft and how to protect your self from the crime that is claiming millions of identities each year.

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: , , , , ,

Tuesday, May 6, 2008

Internet Mail Identity Theft


Internet mail is one of the main sources that perpetrators of identity theft utilize to gain access to personal information. The perpetrator may send threatening mails, or mails that seem appealing. Spam or Phishing emails are linked to identity thieves and arrive in millions of mailboxes worldwide. Not one of us is singled out to become the next victim. Rather, identity thieves focus on getting identities to gain, instead of worrying about whom they are stealing the identity from.

Few thieves will target a specific company or person, especially if they are aware of the worth of the accounts. Thus, these thieves are acting on greed and intend to get rich by stealing someone else's identity. The dispatcher of such mails are challenging the receiver by deception hoping the receiver will give out personal information, such as banking routing numbers, bank numbers, PIN and passwords, Social Security Numbers and other precious information that the thief can utilize to gain control over your identity.

Added emails that you may want to bear in mind are Spam mails that often assert that you have won x amount of cash, please act now to receive your prize. Logic should tell you that if you have not joined a contest or gave your information over the phone lines or internet, then chances are you have not won a prize. Recently, I received various mails claiming that I have won $32,000 and is requested to pay the tax on the winning, and to please respond now to receive your prize. DELETE. Other mails followed claiming that I could receive scholars or grants to attend such and such college, to earn my degree act now by providing my personal information. NOT!

After my identity has been stolen, unless your name is GOD you are not getting any personal information from me. My bank already has my personal information, thus there is no reason for them to email me asking for my personal information. Banks clearly state in the Terms & Conditions that they will "Never" send electronic mail requesting information from the recipient at any time, thus giving your information to an electronic email with your bank name listed in the header is only asking for trouble.

Identity thieves think of everything when it comes to stealing identities, including sending emails in respected names. FDIC was targeted by thieves, thus the sender sent mails to recipients of the bank requesting that they provide personal information now to avoid closure of their accounts. Microsoft was also targeted by thieves when mails were sent to various boxes requesting the receiver to download patches to protect their computers. Once the receiver downloaded, the attachment a dangerous Virus quickly took control of their computer, leaving the computer bleeding and leaking with empty spaces that would direct anyone to the information stored on the computer.

EBay is a target for thieves. Few thieves purchase items on EBay claiming to send the owner a check that amounts to more than the purchase price and that the owner should send the remaining amount back to the purchaser by electronic form, or else through "Western Union." The checks were found to be copycats and were attempts to steal. Thus, the Internet is not a safe environment; therefore, I will provide helpful tips to help you prevent identity theft.

Steps to protecting your identity:

Never open emails that you do not trust.

Never give out personal information abroad the internet, unless you know the company is trusted and has encryptions to secure the site. Still, you may want to reconsider and order directly via postal mail from the company.

Do a background check on any site you are thinking of giving your information to.

If possible, send Money Orders to pay bills or else pay for products online and offline.

Never give our personal information over the phone lines.

Do not post personal information on forums, bulletin boards or discussion boards online.

Conceal your personal information at all times, including at home.

When using ATM or other machines to make deposits, withdrawals or purchases make sure no one sees, you type in your PIN number.

Change your Pin numbers and passwords randomly.

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: , , , , ,

Monday, May 5, 2008

Internet Mail Identity Theft


Internet mail is one of the main sources that perpetrators of identity theft utilize to gain access to personal information. The perpetrator may send threatening mails, or mails that seem appealing. Spam or Phishing emails are linked to identity thieves and arrive in millions of mailboxes worldwide. Not one of us is singled out to become the next victim. Rather, identity thieves focus on getting identities to gain, instead of worrying about whom they are stealing the identity from.

Few thieves will target a specific company or person, especially if they are aware of the worth of the accounts. Thus, these thieves are acting on greed and intend to get rich by stealing someone else's identity. The dispatcher of such mails are challenging the receiver by deception hoping the receiver will give out personal information, such as banking routing numbers, bank numbers, PIN and passwords, Social Security Numbers and other precious information that the thief can utilize to gain control over your identity.

Added emails that you may want to bear in mind are Spam mails that often assert that you have won x amount of cash, please act now to receive your prize. Logic should tell you that if you have not joined a contest or gave your information over the phone lines or internet, then chances are you have not won a prize. Recently, I received various mails claiming that I have won $32,000 and is requested to pay the tax on the winning, and to please respond now to receive your prize. DELETE. Other mails followed claiming that I could receive scholars or grants to attend such and such college, to earn my degree act now by providing my personal information. NOT!

After my identity has been stolen, unless your name is GOD you are not getting any personal information from me. My bank already has my personal information, thus there is no reason for them to email me asking for my personal information. Banks clearly state in the Terms & Conditions that they will "Never" send electronic mail requesting information from the recipient at any time, thus giving your information to an electronic email with your bank name listed in the header is only asking for trouble.

Identity thieves think of everything when it comes to stealing identities, including sending emails in respected names. FDIC was targeted by thieves, thus the sender sent mails to recipients of the bank requesting that they provide personal information now to avoid closure of their accounts. Microsoft was also targeted by thieves when mails were sent to various boxes requesting the receiver to download patches to protect their computers. Once the receiver downloaded, the attachment a dangerous Virus quickly took control of their computer, leaving the computer bleeding and leaking with empty spaces that would direct anyone to the information stored on the computer.

EBay is a target for thieves. Few thieves purchase items on EBay claiming to send the owner a check that amounts to more than the purchase price and that the owner should send the remaining amount back to the purchaser by electronic form, or else through "Western Union." The checks were found to be copycats and were attempts to steal. Thus, the Internet is not a safe environment; therefore, I will provide helpful tips to help you prevent identity theft.

Steps to protecting your identity:

Never open emails that you do not trust.

Never give out personal information abroad the internet, unless you know the company is trusted and has encryptions to secure the site. Still, you may want to reconsider and order directly via postal mail from the company.

Do a background check on any site you are thinking of giving your information to.

If possible, send Money Orders to pay bills or else pay for products online and offline.

Never give our personal information over the phone lines.

Do not post personal information on forums, bulletin boards or discussion boards online.

Conceal your personal information at all times, including at home.

When using ATM or other machines to make deposits, withdrawals or purchases make sure no one sees, you type in your PIN number.

Change your Pin numbers and passwords randomly.

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: , , , , ,

Thursday, May 1, 2008

Electronic Mail Identity Theft

In this article, I will provide examples of fraudulent mails that will help you to protect your self against identity theft. Personally, I delete all mails in my box, unless it is directly sent to me for jobs, since I am a freelance writer. Any other mails are disregarded and deleted immediately without being opened.

Example of an electronic fraudulent mail sent from a bank online: This is merely a sample, redirected, but the information is similar enough that you can learn from it.

Dear customer:

We are sending you this email to inform you that after the bank has reviewed you account, we suspect that someone has gained access to your identity. Thus, the letter may continue claiming that your privacy and security is their first choice to protect you.

The letter may continue stating, for security precautions we have 'limited your account,' until further investigation is completed. Following the message, a short statement will claim that you must click the link below to be redirected to the banking site where you must login to access information for protecting your self against identity theft.

The salutation will state sincerely, your banking 'team.' Apologizes will follow and a statement claiming that the consumer should not reply to the email, since no response is available, thus clicking the link above and logging into the account is encouraged. This is an example of a Phishing Email, which include links to other sites. Few Phishing Emails may not have links. Stay alert if you are reading these emails, since the sender often has grammar errors, such as run-on sentences, or misspelled words.

Spam or Phishing mails are links to identity thieves often. The sender is attempting to trick the receiver into giving out personal information, such as banking routing numbers, bank numbers, PIN and passwords, Social Security Numbers and other valuable information that the perpetrator can use to steal your identity. Thus, the sender is cunning, since the email will often read as follow "yourbankonline" and so on. Thus, the email will appear to come from your bank. Most banks state clearly in their terms and conditions that the bank "will never send" emails requesting 'confidential account or personal information," especially sending links in the body of the mail.

If you believe that you responded to a Phishing Mail or Spam Mail, be sure to contact your account providers immediately, change your passwords and PIN numbers, and monitor your accounts frequently. Do not feel stupid, since we all learn more about identity theft each day, and we are the victims of such thieves, not the perpetrators. You have no reason to feel ashamed, guilty, or stupid. Some of the most educated people in the world has fell into the hands of identity thieves.

Other types of emails that you may want to consider are Spam mails that claim you have won x amount of dollars, please respond now. Other types of trick mail may not be sent with the purpose of stealing your identity. However, the mails open the door to identity theft, and since the company often tries to sell products, thus once they get hold of your information they will sell, rent, lease or give the information to other individuals and/or companies.

Mails, such as you won x amount of dollars, please respond now often come from foreign regions, thus they must be reported as Spam mails immediately. Never respond to electronic mails, unless you know exactly who sent the mail, and if you receive a mail from your credit card providers or bank providers, delete the mail, call your account holders immediately, and ask if any mail was sent to your box. Of course, you will hear the person tell you that mail is never sent online asking for your information, thus, you can alert the bank that someone is attempting to steal your identity.

It is important to report all Spam and Phishing mails by clicking "REPORT SPAM MAIL" at the top of your Email Window in Internet Explorer, AOL, or other service provider. Few people send the mails back to the sender without opening the email. Thus, it is a wise trick that frustrates the sender, which he may stop sending emails to your address after tiring of reading his/her own mail.

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: , , , ,