Online Identity Theft Protection



             


Friday, May 15, 2009

Identity Theft: The G.I. Blues

Tom Nelson retired from the military almost twenty years ago. In that time, Nelson has spent many years living and working overseas. ?If my VA ID is fraudulently used by someone in the States, one: it could take me months to find out the theft has occurred and two: if it did happen God knows how long it would require to fix it from overseas?, Nelson told the Seattle Post Intelligencer.

On May 22 Nelson and 26.5 million U.S. veterans awoke to the news their personal information including name, address and social security number had been stolen from the home of a Department of Veteran Affairs? employee.

Why the employee took this highly sensitive information home is anyone?s guess and according to the FBI the computer disc containing this information was subsequently recovered. What infuriated veterans however wasn?t the actual theft but that the theft went unreported for two weeks.

The news is shocking yet many veterans groups are not surprised. They point to Congress? Computer Security Report Card which year after year has given the VA a failing grade. Government auditors also warned of possible security breaches at the agency. Through all of this the VA took no action.

VA Secretary Jim Nicholson?s recent proposal of free credit monitoring for veterans up to one year was shot down by the Bush Administration. According to the Washington Post the decision is based on the opinion of the FBI which stated it had a "high degree of confidence" that thieves had not accessed the files containing the names, Social Security numbers and birth dates of millions of veterans and active-duty military personnel. Hopefully they?re right but for many veterans its now a time of wait and see.

Veterans can however request a credit freeze. Yes it stops the victim from easily opening a new account but a credit freeze is the most effective weapon against identity theft. Checking your account every other day isn?t a bad idea either. For further information and assistance veterans can call 1-800-333-4636 (1-800-FED-INFO).

Peggy Foster, a veteran and VA services asst at the University of Colorado-Boulder, told the Colorado Daily,? It happened to me before and everything was stolen. Now I?m very cautious about giving my information out.?

?The government bombards us with so much in the military. It?s important when you?re a veteran to pay more attention.?

With the glut of information in our 24 /7 world, Ms Foster?s advice applies not only to military personnel but the rest of us as well.

Daryl Campbell?s website http://fightidtheft.winthemarket.com provides free tips,resources, featured articles from experts and up to the minute news concerning identity theft and fraud.

Labels: , , , , ,

Saturday, May 9, 2009

Identity Theft: Phishing In Dangerous Water

Have you received one yet? You know. The email directing you to visit a familiar website where for some odd reason you?re being asked to update your personal information? The website asks you to verify your passwords, credit card numbers, social security number, or even your bank account. You recognize the company name as one that you?ve done business with in the past, so you click on the ?take me there? link and proceed to provide all the information they?ve requested. No problem right? Except you find out much later that the website is a fraud. It was created for one reason: to steal your personal information. Welcome to the world of phishing.

Phishing (pronounced as ?fishing?) means to send an email to a recipient falsely claiming to have an established, legitimate business. By fooling the recipient into giving their private information, the phisher has in effect stolen their identity.

It?s not easy to spot an email phishing for information. At first glance, the email may look like it is from a legitimate company. The "From" field of the e-mail may have the .com address of the company mentioned in the e-mail. The clickable link even appears to take you to the company's website, but in fact, it is a fake website built to replicate the legitimate site.

Many of these people are professional criminals that have spent considerable time in creating emails that look authentic. Users need to review all emails requesting personal information carefully. When reviewing your email remember that the "From Field" can be easily changed by the sender. While it may look like it?s coming from a company you do business with, looks can be deceiving. Keep in mind that phishers will go all out in trying to make their emails look as legitimate as possible. They will even copy logos or images from the official site to use in their emails. They also like to include a clickable link which the recipient can follow to conveniently ?update? their information.

How do you check to see if the link is authentic? Point at the link with your mouse, and then look in the bottom left hand screen of your computer. The actual website address to which you are being directed will show up for you to view. This is a fast and easy way to check if you are being directed to a legitimate site.

Also never and I mean NEVER click the links within the text of the e-mail. Delete the e-mail immediately and empty the trash box in all of your e-mail accounts as well. If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. That way you can be confident that you are being directed to the true and legitimate website.

Phishing is a major weapon of choice for online identity thieves. Don?t get hooked.


Daryl Campbell?s website http://fightidtheft.winthemarket.com provides free tips,resources, featured articles from experts and up to the minute news concerning identity theft and fraud.

Labels: , , , , ,

Tuesday, April 14, 2009

Identity Theft: It Won't Happen To Me

"I got bad credit, I'm not worried"

"It happened to a friend of a friend"

"I've got other priorities now"

"All it takes is guarding your Social Security number"

"I can trust the people around me"

These quotes are all too common regarding identity theft. The problem is the Federal Trade Commission, various law enforcement agencies and identity theft experts have stated there are no 100% guarantees and the numbers for identity theft keep getting worse

"I got bad credit so I'm not worried"

Just recently KFLY TV in Lafayette Louisiana reported that 2 men were arrested for stealing the identity of 2500 people. Identity thieves don't run credit checks before they steal your identity.All they need to do damage is a little bit of your personal information.

"It happened to a friend of a friend"

This one should really alert people. The reason ? Everybody now knows somebody that's been victimized. That alone tells you what an epidemic identity theft has become. Last year 10 million people had their identities stolen. Many experts think that number will double this year. They also fear the 10 million figure is too low. Why? Many victims don't report the crime.

"I've got other priorities now"

Once your identity is stolen there is only one priority: Getting it back. On average it can take 175 hours and out of pocket expenses totaling 15,000 dollars according to the FTC.

"All it takes is guarding your Social Security number"

In February of this year Bank of America announced that 1.2 million federal employee credit card accounts may have been exposed to identity theft. Last year, Visa and MasterCard announced that 40 million cardholders maybe at risk when the database of their third party processor was broken into. Many of these people no doubt guarded their Social Security number faithfully but thru no fault of their own they're at risk.

"I can trust the people around me"

This one hits home and may hurts the worst. 50% of all identity thieves are known by the victim. Family members, friends and neighbors do more damage than total strangers.

There are other reasons people give. Yes it may never happen to you but identity theft is now a full blown epidemic that affects everyone.

Labels: , , , ,

Phishing Scams, A Growing Identity Theft Menace


There is no doubt that identity theft is a growing problem and we should all try to educate ourselves to avoid being a victim of this often devastating crime. It seems that criminals are using increasingly ingenious methods to gain access to our private and valuable personal information and computer users must be aware of criminal information gathering techniques known as phishing.

You may have heard about phishing scams in the news recently because so many have fallen prey to this clever methodology employed by tech savvy criminals. We are all busy in today's fast paced world and it's hard to keep up with every new threat and development so the purpose of this article is to describe what phishing is, and how you can avoid being a victim.

Phishing attacks employ strategies of social engineering and technical subterfuge in the attempt to obtain an individual's personal identity data and financial account information. Social-engineering schemes use fraudulent e-mails which attempt to direct consumers to counterfeit websites, often perfectly replicating legitimate business sites to trick recipients into releasing financial data such as credit card numbers, account passwords, user names and social security numbers. Using recognizable company names of banks, online retailers and credit card companies, phishers are often able to secure this private data. Technical subterfuge schemes usually plant spyware and crimeware onto user computers to access personal data directly, most often utlizing Trojan keylogger spyware.

What can we do to avoid such clever deceptions? First of all just knowing that the threat exists is very important and many individuals report that they had never heard of phishing before becoming a victim. In addition there are several practical precautions we can all take to minimize our exposure to risk.

1. Be wary of any email containing urgent requests for financial information suggesting your immediate response is required, statements designed to upset and excite the respondent are often included to elicit a quick reply. These emails often demand user names and passwords as well as SSN's. Legitimate businesses never ask for confidential data via email and none of this information should ever be sent by email as security is severely compromised.

2. If you question the authenticity of an email don't use the links embedded in the email to access the company webpage, instead type the URL of the company in your browser to insure you are looking at the legitimate website. You can also phone the company to insure an email request is authentic and companies today are aware of phishing threats and will generally appreciate being informed of a potential problem.

3. Financial information should only be communicated through a secure website or by telephone and never by an email request. Secure websites always have https:// preceding the web address rather than just http:// in the browser address window.

4. Check your online accounts on a regular basis even if you have no transactions, dormant and little used accounts are common targets for online predators. Carefully review your credit card statements for unauthorized transactions and make sure you shred them if not retained for your records.

5. Make sure your browser is updated regularly with the latest security patches and you should also have an anti-spyware program installed and running at all times.

Take these necessary precautions to avoid your exposure to the identity theft problem known as phishing.

Jim Hutton researches and writes on the subject of identity theft and you can view the entire Identity Theft Article Library at:

Identity Theft Prevention

Labels: , , , ,

Thursday, April 2, 2009

Identity Theft Awareness - Getting to Know This crime


Identity theft is on the rise. The starting point in the fight against identity theft is prevention. Major corporations are just starting to incorporate identity theft awareness into their overall security awareness programs to educate their employees, clients and vendors on the minimum security measures that must be and are expected to be taken. Like I always say, it is your information and only you can initiate the efforts and take the steps to protect them. Whether you are an individual concerned with the security and privacy of your own personal information or that of your family, or, a company concerned with the personal information of your clients and employees, you must have identity theft awareness and take the steps to educate yourself first, and then others who also handle your information. This could include your kids, your accountant, attorney, vendor, and a bunch of others.

Contrary to all beliefs, the information security and protection business is not an old profession. Information privacy is even in its infancy in my opinion. Take a look around; social security numbers are floating around every where from the doctor's office to the internet like they're piece of worthless junk, while the same social security numbers are heavily relied on to identify us. Businesses ask for our social security numbers, names, phone numbers, addresses, zip codes (interestingly enough, zip codes are used to validate our identity and ownership of the credit card we use at the gas pump), and other piece of information in public and expect us to respond back with the information while surrounded by other people.

Do we really believe that identity theft can be fought while we continue to treat and handle our personal and most valuable information in such manners? One of the information security principles is that, all information is not born equally. As a society, we need to determine what information is critical to us, and apply more stringent security measures to protect them.

If we rely on social security numbers as a main source of identity validation, then we must treat it differently than our home phone numbers. I have further described this philosophy in my identity protection system, KAOS?.

In a lot of the identity theft cases, the responsibility is shifted to the consumers for the time being. Besides a few laws that make identity theft a crime, or limit the credit card liability to $50 if discovered and reported timely, consumers are left in the dark. For one thing, they don't know what piece of their personal information is really important and how to protect them; second, if they get hit with identity theft, they are on their own and at the mercy of the financial institutions to solve their problem, the same institutions that are not held responsible for luring consumers into buying their products or falsely handing money to thieves who claimed to be you. People are lured into getting a bunch of credit cards or other credit accounts, forced to reveal their personal information in public, or enticed to apply for multiple mortgages or Home Equity Line of Credits (or HELOC) and left alone when hit with identity theft because businesses who lured the consumers into sharing their personal information with them in the first place, did not tell them that there is an increased and proportional risk with the number of times they share their information with others, or won't take responsibility when the crime occurs.

It all starts with identity theft awareness. Be aware of what's at stake, what needs to be protected, why and how. Take responsibility in case no one else does. Educate your family and friends about the risks of identity theft. Inquire and monitor the security practices of those whom you share your information with. Businesses are forced to share their privacy policies with you. Read them carefully and don't do business with those who do not make you comfortable with the way they intend to protect and share the information you entrust them with. Please visit www.identity-theft-awareness.com for free identity theft solutions.

Henry Bagdasarian is a certified information security, privacy and audit expert with many years of experience with major international companies. Nominated for Security Executive of The Year Award (2006). Created the identity protection and theft prevention KAOS system available free of charge on his identity theft web site, www.identity-theft-awareness.com.

Labels: , , , ,

Sunday, November 2, 2008

Identity Theft: The G.I. Blues

Tom Nelson retired from the military almost twenty years ago. In that time, Nelson has spent many years living and working overseas. ?If my VA ID is fraudulently used by someone in the States, one: it could take me months to find out the theft has occurred and two: if it did happen God knows how long it would require to fix it from overseas?, Nelson told the Seattle Post Intelligencer.

On May 22 Nelson and 26.5 million U.S. veterans awoke to the news their personal information including name, address and social security number had been stolen from the home of a Department of Veteran Affairs? employee.

Why the employee took this highly sensitive information home is anyone?s guess and according to the FBI the computer disc containing this information was subsequently recovered. What infuriated veterans however wasn?t the actual theft but that the theft went unreported for two weeks.

The news is shocking yet many veterans groups are not surprised. They point to Congress? Computer Security Report Card which year after year has given the VA a failing grade. Government auditors also warned of possible security breaches at the agency. Through all of this the VA took no action.

VA Secretary Jim Nicholson?s recent proposal of free credit monitoring for veterans up to one year was shot down by the Bush Administration. According to the Washington Post the decision is based on the opinion of the FBI which stated it had a "high degree of confidence" that thieves had not accessed the files containing the names, Social Security numbers and birth dates of millions of veterans and active-duty military personnel. Hopefully they?re right but for many veterans its now a time of wait and see.

Veterans can however request a credit freeze. Yes it stops the victim from easily opening a new account but a credit freeze is the most effective weapon against identity theft. Checking your account every other day isn?t a bad idea either. For further information and assistance veterans can call 1-800-333-4636 (1-800-FED-INFO).

Peggy Foster, a veteran and VA services asst at the University of Colorado-Boulder, told the Colorado Daily,? It happened to me before and everything was stolen. Now I?m very cautious about giving my information out.?

?The government bombards us with so much in the military. It?s important when you?re a veteran to pay more attention.?

With the glut of information in our 24 /7 world, Ms Foster?s advice applies not only to military personnel but the rest of us as well.
Daryl Campbell?s website http://fightidtheft.winthemarket.com provides free tips,resources, featured articles from experts and up to the minute news concerning identity theft and fraud

Labels: , , ,

Thursday, October 30, 2008

Identity Theft: Phishing In Dangerous Water

Have you received one yet? You know. The email directing you to visit a familiar website where for some odd reason you?re being asked to update your personal information? The website asks you to verify your passwords, credit card numbers, social security number, or even your bank account. You recognize the company name as one that you?ve done business with in the past, so you click on the ?take me there? link and proceed to provide all the information they?ve requested. No problem right? Except you find out much later that the website is a fraud. It was created for one reason: to steal your personal information. Welcome to the world of phishing.

Phishing (pronounced as ?fishing?) means to send an email to a recipient falsely claiming to have an established, legitimate business. By fooling the recipient into giving their private information, the phisher has in effect stolen their identity.

It?s not easy to spot an email phishing for information. At first glance, the email may look like it is from a legitimate company. The "From" field of the e-mail may have the .com address of the company mentioned in the e-mail. The clickable link even appears to take you to the company's website, but in fact, it is a fake website built to replicate the legitimate site.

Many of these people are professional criminals that have spent considerable time in creating emails that look authentic. Users need to review all emails requesting personal information carefully. When reviewing your email remember that the "From Field" can be easily changed by the sender. While it may look like it?s coming from a company you do business with, looks can be deceiving. Keep in mind that phishers will go all out in trying to make their emails look as legitimate as possible. They will even copy logos or images from the official site to use in their emails. They also like to include a clickable link which the recipient can follow to conveniently ?update? their information.

How do you check to see if the link is authentic? Point at the link with your mouse, and then look in the bottom left hand screen of your computer. The actual website address to which you are being directed will show up for you to view. This is a fast and easy way to check if you are being directed to a legitimate site.

Also never and I mean NEVER click the links within the text of the e-mail. Delete the e-mail immediately and empty the trash box in all of your e-mail accounts as well. If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. That way you can be confident that you are being directed to the true and legitimate website.

Phishing is a major weapon of choice for online identity thieves. Don?t get hooked.


Daryl Campbell?s website http://fightidtheft.winthemarket.com provides free tips,resources, featured articles from experts and up to the minute news concerning identity theft and fraud.

Labels: , , ,

Monday, October 13, 2008

Identity Theft: It Won't Happen To Me

"I got bad credit, I'm not worried"

"It happened to a friend of a friend"

"I've got other priorities now"

"All it takes is guarding your Social Security number"

"I can trust the people around me"

These quotes are all too common regarding identity theft. The problem is the Federal Trade Commission, various law enforcement agencies and identity theft experts have stated there are no 100% guarantees and the numbers for identity theft keep getting worse

"I got bad credit so I'm not worried"

Just recently KFLY TV in Lafayette Louisiana reported that 2 men were arrested for stealing the identity of 2500 people. Identity thieves don't run credit checks before they steal your identity.All they need to do damage is a little bit of your personal information.

"It happened to a friend of a friend"

This one should really alert people. The reason ? Everybody now knows somebody that's been victimized. That alone tells you what an epidemic identity theft has become. Last year 10 million people had their identities stolen. Many experts think that number will double this year. They also fear the 10 million figure is too low. Why? Many victims don't report the crime.

"I've got other priorities now"

Once your identity is stolen there is only one priority: Getting it back. On average it can take 175 hours and out of pocket expenses totaling 15,000 dollars according to the FTC.

"All it takes is guarding your Social Security number"

In February of this year Bank of America announced that 1.2 million federal employee credit card accounts may have been exposed to identity theft. Last year, Visa and MasterCard announced that 40 million cardholders maybe at risk when the database of their third party processor was broken into. Many of these people no doubt guarded their Social Security number faithfully but thru no fault of their own they're at risk.

"I can trust the people around me"

This one hits home and may hurts the worst. 50% of all identity thieves are known by the victim. Family members, friends and neighbors do more damage than total strangers.

There are other reasons people give. Yes it may never happen to you but identity theft is now a full blown epidemic that affects everyone.


Labels: , , , ,

Thursday, May 1, 2008

Electronic Mail Identity Theft

In this article, I will provide examples of fraudulent mails that will help you to protect your self against identity theft. Personally, I delete all mails in my box, unless it is directly sent to me for jobs, since I am a freelance writer. Any other mails are disregarded and deleted immediately without being opened.

Example of an electronic fraudulent mail sent from a bank online: This is merely a sample, redirected, but the information is similar enough that you can learn from it.

Dear customer:

We are sending you this email to inform you that after the bank has reviewed you account, we suspect that someone has gained access to your identity. Thus, the letter may continue claiming that your privacy and security is their first choice to protect you.

The letter may continue stating, for security precautions we have 'limited your account,' until further investigation is completed. Following the message, a short statement will claim that you must click the link below to be redirected to the banking site where you must login to access information for protecting your self against identity theft.

The salutation will state sincerely, your banking 'team.' Apologizes will follow and a statement claiming that the consumer should not reply to the email, since no response is available, thus clicking the link above and logging into the account is encouraged. This is an example of a Phishing Email, which include links to other sites. Few Phishing Emails may not have links. Stay alert if you are reading these emails, since the sender often has grammar errors, such as run-on sentences, or misspelled words.

Spam or Phishing mails are links to identity thieves often. The sender is attempting to trick the receiver into giving out personal information, such as banking routing numbers, bank numbers, PIN and passwords, Social Security Numbers and other valuable information that the perpetrator can use to steal your identity. Thus, the sender is cunning, since the email will often read as follow "yourbankonline" and so on. Thus, the email will appear to come from your bank. Most banks state clearly in their terms and conditions that the bank "will never send" emails requesting 'confidential account or personal information," especially sending links in the body of the mail.

If you believe that you responded to a Phishing Mail or Spam Mail, be sure to contact your account providers immediately, change your passwords and PIN numbers, and monitor your accounts frequently. Do not feel stupid, since we all learn more about identity theft each day, and we are the victims of such thieves, not the perpetrators. You have no reason to feel ashamed, guilty, or stupid. Some of the most educated people in the world has fell into the hands of identity thieves.

Other types of emails that you may want to consider are Spam mails that claim you have won x amount of dollars, please respond now. Other types of trick mail may not be sent with the purpose of stealing your identity. However, the mails open the door to identity theft, and since the company often tries to sell products, thus once they get hold of your information they will sell, rent, lease or give the information to other individuals and/or companies.

Mails, such as you won x amount of dollars, please respond now often come from foreign regions, thus they must be reported as Spam mails immediately. Never respond to electronic mails, unless you know exactly who sent the mail, and if you receive a mail from your credit card providers or bank providers, delete the mail, call your account holders immediately, and ask if any mail was sent to your box. Of course, you will hear the person tell you that mail is never sent online asking for your information, thus, you can alert the bank that someone is attempting to steal your identity.

It is important to report all Spam and Phishing mails by clicking "REPORT SPAM MAIL" at the top of your Email Window in Internet Explorer, AOL, or other service provider. Few people send the mails back to the sender without opening the email. Thus, it is a wise trick that frustrates the sender, which he may stop sending emails to your address after tiring of reading his/her own mail.

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: , , , ,

Saturday, March 29, 2008

How To Protect Yourself From Identity Theft and PC Hackers

Identity theft is rampant these days, and the best way to avoid being a victim is to protect your self in any and all ways possible. You may be aware of some information here, but not all, so please read on, print this article, then implement everything and check mark off when completed. You'll feel safer and more in control. There are two lists here for you, online and offline protection.

Offline protection

Shred with a criss-cross shredder, everything that has your date of birth, social security number, signature, bank acct #, credit card #, tax ID#, balance transfer checks (unless of course you are planning on using them), credit card applications, etc. I don't go crazy here with mail that just has my name and address on it because that's public info, easy to get and it would be a part time job to do it! Be careful with some credit card companies who have sales/loan/special interest acct information on pages behind your normal account info pages. Often these pages have you full account number on them. Be sure to shred that part of it.

All it takes to run your credit report is your name, address, social security number and date of birth. Do not give your date of birth to anyone you don't have to. Never give your mother's maiden name to anyone except your back and credit card company. If they insist on one, and it's not a large institution, use a fake one; just pick something you'll remember.

Do not carry your social security card with you. Preferably, keep it in a safe at home or safe place no one would look. Don't give the number to just anyone. Don't carry all your credit cards in your wallet at the same time. Keep only the necessary ones in it. Unless you called the company directly yourself, do not give people over the phone, who claim to be from a certain company, any info without getting some proof first.

Online Protection

Use Mozilla Firefox as your Internet browser 98% of the time rather than Internet Explorer. It's safer. Occasionally, some websites are programmed specifically just for IE, so you don't have much choice.

Install anti-virus, anti-spyware, anti-keylogger software, a firewall and Spoof Stick on your pc. Many ISP's will give you the first 2 listed free. You should use at least 2 anti-spy ware programs. I use 3 and rotate my scans. I also use 2 anti-virus programs, one paid for anti-keylogger and one that's included in my anti-spyware. You can get Spoof Stick free, by downloading it from the Internet, but unless you remember to use it, it's worthless.

Here's what Spoof Stick will do; when you go online and click, type or paste a URL (web site address) in your browser window, Spoof Stick will show you what web site you are really on, on the top right of the window. There are hackers that make sites that look like the real thing, to try to get your information or infect you with viruses and Trojan horses. They may send you an email with a link in it saying they need to verify information regarding an account you have. This is called spoofing or phishing. You may actually have an account where they say you do, but it's probably not a real email from the company. Don't click on the links in it. If you think it's real, type in the company URL you would normally use into your browser. Verify with spoof stick you are on their site, in case they got hacked, and if everything looks ok, log in and see if they really need something from you. Get in the habit of always looking at Spoof Stick to verify the web site you are really on.

What's a key logger you ask? Well, they hack your computer, and can track your keyboard strokes, trying to get passwords to your accounts, so they can steal your money and or your identity. Always use the secure random keystroke (SRK) option if there is one. This is a separate keypad you use in a separate window to click on the letters and numbers of your passwords. Key-loggers cannot track it.

Passwords

Don't use the same passwords for everything! Depending on how many online accts or private membership sites you have, you may use duplicates for a few, if there's nothing really sensitive about the information in them. Always use separate ones for banks, credit cards or online acct like Paypal, e-gold etc. Use combinations of letter and numbers, not words that are easily figured out. Don't use your kids or pets name, your anniversary, birthday or anything other people know. Do not keep the actual passwords written out or typed on your pc. If you have too many to remember them all, as I do, write down a coded version of it and a coded version of the acct name and don't title the page!

I know it's difficult and time consuming to do all these things, but well worth it to avoid having your pc hacked and your identity stolen. If you do, read my article on what to do and what not to do.

Sandra Wellman is the owner of www.freefinanceinfo.org, where you'll find over 50 articles & books on credit repair, how to get out of debt, identity theft protection, refinancing, reverse mortgages, & student and auto loans

Labels: , , ,

Thursday, March 13, 2008

Identity Theft - Resources for Victims

Identity theft could happen to anyone. These are resources that will help you once you have become the victim of identity theft.

Identity theft could happen to anyone. Someone gets hold of important information, such as your name, credit card information and social security number and uses this to make online purchases or apply for additional credit cards. The source of the information could be a "phishing" e-mail you replied to, stolen mail or one of many other ways.

At first you are probably going to be stunned when you receive that call from a credit rating company or collection agency, but you have to get over your shock and act quickly.

Step number one should be to contact your local police department and report the identity theft. At this point you should ask whether the police department has an information package or website with information on how to deal with identity theft.

If that is not the case, you can use some of the following resources to help you in the arduous process of clearing your good name and credit:

http://www.consumer.gov/idtheft/

This FTP website offers substantial resources, including a downloadable booklet in PDF format.

http://www.usdoj.gov/criminal/fraud/idtheft.html

Resources by the Department of Justice

http://www.idtheftcenter.org/index.shtml

Identity Theft Resource Center (includes P?ginas en Espa?ol)

http://www.ssa.gov/pubs/idtheft.htm

Social Security Administration website that allows you to report misues of your social security number

http://www.privacyrights.org/identity.htm

Privacy Right Clearinghouse website with numerous links to other resources.

None of this will make the process easier or less painfulPsychology Articles, but at least now you have some tools to work with.

Pamela Bruce lives in Austin, TX. She is the owner of Love Beads Unlimited and sells the sterling silver and Swarovski crystal bead jewelry she designs and creates both in her eBay store (http://stores.ebay.com/LOVE-BEADS-UNLIMITED) and on her website at http://www.lovebeadsunlimited.com, where you can also download the free e-book "A Consumer's Guide to Buying Bead Jewelry Online".

Labels: , , , , ,

Wednesday, December 5, 2007

Identity Theft - Is The Internet A Major Factor?

 Identity theft also known as ID theft, identity fraud and ID fraud describes a type of fraud where a criminal adopts someone elses identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries.

In the UK identity theft is increasing at the rate of 500ach year and, according to Which Magazine, 25f the population have either suffered from identity theft or know someone who has.

In the USA, a report issued by the Better Business Bureau revealed that, in 2004, over 9 million Americans became victims of identity theft with the total sum defrauded being $52.6 billion.

With figures like this, its no surprise that there is a certain amount of concern regarding computer and internet security. After all, the internet is basically a mechanism for exchanging information and the possibility that some of the information exchanged may be more than intended is never far from many internet users minds.

Its easy to imagine criminal masterminds worldwide using the internet to hack into computers in order to gain access to information with which to advance their devilishly cunning schemes. However, as revealed in the report, the facts of the matter are a little more down to earth and the internet, far from making you more at risk to identity theft, can help to significantly cut your losses if you do fall victim this form of fraud.

According to the Better Business Bureaus research the main methods by which criminals gain access to information used for identity theft fraud are as below:

Lost or stolen wallet, chequebook or credit card. 28.8
Accessed as part of a transaction. 12.9

Accessed by friend, acquaintance or relative. 11.4
Don't know, refused, no answer. 11.1
Information accessed by corrupt employee. 8.7
Stolen paper mail or fraudulent change of address. 8.0
Obtained some other way. 7.4
Computer spyware. 5.2
Information stolen from garbage. 2.6
Computer viruses and/or hackers. 2.2
Emails sent by criminals posing as legitimate business. 1.7
* 12.9ue to transactions 10.4ffline transactions, 2.5nline transactions.

In total, when the instances where information was accessed during transactions are subdivided into online and offline transactions, only 11.6f the information used to carry out identity theft fraud was obtained from computers.

Of this more than half was obtained by the use of spyware, viruses or hacking the risk of which can be greatly reduced by installing the appropriate protection software and ensuring that this is kept up to date.

Not only did the survey reveal that the internet was not a major source of illegally obtained personal information, but it was also found that those fraud victims who checked their financial records using the internet, ATM machines or other electronic methods suffered financial losses which were, on average, 8 times lower than those of victims who used traditional paper statements to monitor their accounts. This very significant reduction was attributed to the rapid discovery of the fraud due to real time monitoring.

Of course, thats not to say that you shouldnt exercise caution when using the internet or take care to protect the personal information which you may have stored on your PC. However, as long as you install suitable virus, firewall and spyware protection, and keep this continually updated the internet can should be more of a help than a hindrance when it comes to avoiding identity fraud.

Hamish Hayward - Don't become a victim of ID theft. Get the facts. http://www.id-theft-info.com

Labels: , , , , ,