<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Identity Theft Secrets</title><description>Tips, Reviews, &amp; Sources to aid Consumers in Protecting and Preventing their Credit and Personal Information from Identity Theft and Fraud.</description><managingEditor>noreply@blogger.com (Unknown)</managingEditor><pubDate>Fri, 13 Feb 2026 01:48:07 -0800</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">352</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://idtheftsecrets.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:keywords>identitytheft,identity,theft,id,theft,privacy,security,credit,scam,fraud,ssn,breach,opt,out,mp3,audio,podcast,blog,rss,freedbacking,safety,googlealert,finance,business,popular</itunes:keywords><itunes:summary>Quick Tips, Reviews, &amp; Resources to aid consumers in protecting credit and personal information from identity theft fraud. "Free" Podcast audio published daily with our exclusive "Tip of the Day".</itunes:summary><itunes:subtitle>Quick Tips, Reviews, &amp; Resources to aid consumers in protecting credit and personal information from identity theft fraud. "Free" Podcast audio published daily with our exclusive "Tip of the Day".</itunes:subtitle><itunes:category text="Education"><itunes:category text="Training"/></itunes:category><itunes:category text="Business"><itunes:category text="Business News"/></itunes:category><itunes:category text="Health"><itunes:category text="Self-Help"/></itunes:category><itunes:category text="News &amp; Politics"/><itunes:category text="Comedy"/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>4 Yr Old &amp; Kids Get $4 Million in Tax Credits to Buy Homes</title><link>http://idtheftsecrets.blogspot.com/2009/10/4-yr-old-kids-get-4-million-in-tax.html</link><category>fraud</category><category>identity theft</category><category>minors</category><category>pip</category><category>scam</category><category>ssn</category><category>tin</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 23 Oct 2009 00:01:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-385906427218706610</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;From the "can't believe its true" file: No one under the age of 18 &lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;can legally purchase a home.  However, a four year old baby as &lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;well as hundreds of other minors managed to provide&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;tax payer identification numbers (TIN) as part of the &lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;qualification process in receiving U.S. federal tax credits &lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;reserved specifically for first time home buyers.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: left;"&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://farm3.static.flickr.com/2691/4037207809_726216f2a2_m.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; cursor: pointer; width: 140px; height: 140px;" src="http://farm3.static.flickr.com/2691/4037207809_726216f2a2_m.jpg" alt="4-Yr-Old-and-Kids-Get-$4-Million-in-Tax-Credits-to-Buy-Homes" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;blockquote&gt;"Through July 25, 2009, &lt;a href="http://waysandmeans.house.gov/media/pdf/111/tigta.pdf"&gt;we&lt;/a&gt; identified more than 580&lt;br /&gt;taxpayers younger than 18 years of age who claimed&lt;br /&gt;almost &lt;a href="http://waysandmeans.house.gov/media/pdf/111/tigta.pdf"&gt;$4 million&lt;/a&gt; in First-Time Homebuyer Credits. The&lt;br /&gt;youngest taxpayers receiving the Credit were four years old.&lt;br /&gt;Contract law generally exempts children under the age of 18&lt;br /&gt;from being bound by the terms of a contract. Therefore, it is&lt;br /&gt;unlikely that these taxpayers would have entered into an&lt;br /&gt;arm’s-length transaction for the purchase of a home."&lt;/blockquote&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt;In other words, someone was using the unauthorized social&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt;security number of some unsuspecting victim for perpetrating&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt;identity theft fraud.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;So, while technically its not supposed to be possible for a 4 year&lt;br /&gt;old child to sign documents to purchase a home in America, we&lt;br /&gt;see again that it is quite entirely possible for identity theft to be&lt;br /&gt;committed using a tax payer identification number.&lt;br /&gt;&lt;br /&gt;Our &lt;a href="http://idtheftsecrets.blogspot.com/2009/10/4-yr-old-kids-get-4-million-in-tax.html"&gt;tip&lt;/a&gt; for today is to pull a credit report and especially a &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;public&lt;br /&gt;records profile (pip)&lt;/a&gt; on your children to insure no crafty identity&lt;br /&gt;theft fraudsters haven't already run a scam.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;PS: Please &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=385906427218706610"&gt;share&lt;/a&gt; this important &lt;a href="http://idtheftsecrets.blogspot.com/2009/10/4-yr-old-kids-get-4-million-in-tax.html"&gt;identity theft tip&lt;/a&gt; with loved one&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;or friend.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://farm3.static.flickr.com/2691/4037207809_726216f2a2_t.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">13</thr:total></item><item><title>$2.1 million Identity Theft Ring Hits Fed Chairman Bernanke</title><link>http://idtheftsecrets.blogspot.com/2009/09/21-million-identity-theft-ring-hits-fed.html</link><category>credit</category><category>fraud</category><category>identity theft</category><category>medical identity theft</category><category>pip</category><category>scam</category><category>ssn</category><author>noreply@blogger.com (Unknown)</author><pubDate>Tue, 15 Sep 2009 00:01:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-2524565173645029480</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt;Federal Reserve Chairman Ben Bernanke's wife was&lt;br /&gt;among the victims&lt;/span&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt; of an identity theft ring responsible&lt;br /&gt;for over $2 million in fraud perpetrated&lt;/span&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt; by an "inside"&lt;br /&gt;accomplice working for two D.C. area physicians.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://farm4.static.flickr.com/3507/3923458599_f4dcbeb00b.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 142px; height: 231px;" src="http://farm4.static.flickr.com/3507/3923458599_f4dcbeb00b.jpg" alt="$2.1 million Identity Theft Ring Hits Fed Chairman Bernanke by Id Theft Secrets Blog" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;In all, prosecutors say, the &lt;/span&gt;&lt;a style="font-weight: bold;" href="http://www.washingtonexaminer.com/local/crime/Doctors_-receptionist-guilty-in-_2_1M-ID-theft-ring-8215139-57815787.html"&gt;conspiracy&lt;/a&gt;&lt;span style="font-weight: bold;"&gt; ensnared&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;500 victims and accounts at least 10 financial&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;institutions.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic;"&gt;During her year as the doctors' receptionist, Leake met&lt;br /&gt;with Gray 20 times, she admitted. At each meeting she&lt;br /&gt;handed over patients' information gleaned by photocopying&lt;br /&gt;personal checks, and retrieving their birthdays and Social&lt;br /&gt;Security numbers from files. In return, Gray paid Leake&lt;br /&gt;between $200 and $500 for each victim's information.&lt;br /&gt;&lt;br /&gt;Gray then took that information and used it to create fake&lt;br /&gt;Maryland driver's licenses containing a victim's information&lt;br /&gt;with a picture of another member of the conspiracy, court&lt;br /&gt;documents said. The pictured co-conspirator then used the&lt;br /&gt;bogus license to drain cash from bank accounts, sometimes&lt;br /&gt;by cashing checks stolen from other victims by pickpockets.&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;Medical identity theft continues to be an effective way for&lt;br /&gt;credit fraudsters to steal your hard earned money.  It doesn't&lt;br /&gt;matter how rich and powerful you are, as in the case of Chairman&lt;br /&gt;Ben Bernanke and his wife.&lt;br /&gt;&lt;br /&gt;So, our &lt;a href="http://idtheftsecrets.blogspot.com/2009/09/21-million-identity-theft-ring-hits-fed.html#links"&gt;tip for today&lt;/a&gt; is to make sure you take the time to contact&lt;br /&gt;your banks &amp;amp; credit card companies to get enrolled in automatic&lt;br /&gt;credit monitoring for your accounts.  Also, to safeguard against&lt;br /&gt;medical identity theft which is not by design the purpose of credit&lt;br /&gt;reporting, get your public information profile &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;(PIP)&lt;/a&gt; reviewed for&lt;br /&gt;any past or future instances of fraud using your good name.&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://farm4.static.flickr.com/3507/3923458599_f4dcbeb00b_t.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Identity Theft Criminals Get 3 More Months Delay In Red Flags</title><link>http://idtheftsecrets.blogspot.com/2009/08/identity-theft-criminals-get-3-more.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 3 Aug 2009 00:01:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-7641002732393075395</guid><description>&lt;span style="font-style: italic;font-size:85%;" &gt;&lt;span style="font-weight: bold;"&gt;In a law originally slated to take effect 11/1/2008, the F.T.C. has again&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;delayed the beginning of enforcement for a third time.  The latest delay&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;gives identity theft criminals an additional 90 days to operate without&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;impunity by businesses who are required to implement the F.T.C. written&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;anti-fraud regulations mandated by the 2003 F.A.C.T.A. law.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Apparently, according to the &lt;a href="http://www.ftc.gov/opa/2009/07/redflag.shtm"&gt;F.T.C&lt;/a&gt;., there is still confusion&lt;br /&gt;over whichbusinesses are required to comply even though&lt;br /&gt;the law has been around now for over 6 years &amp;amp; itself was&lt;br /&gt;an amendment to the much longer standing Fair Credit&lt;br /&gt;Reporting Act (F.C.R.A.) which also historically defines&lt;br /&gt;what firms are included:&lt;br /&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;&lt;/span&gt;&lt;blockquote&gt;&lt;span style="font-style: italic;"&gt;The Fair and Accurate Credit Transactions Act (FACTA)&lt;br /&gt;requiring &lt;/span&gt;&lt;span style="font-style: italic;"&gt;“creditors” and “financial institutions” with&lt;br /&gt;covered accounts to &lt;/span&gt;&lt;span style="font-style: italic;"&gt;implement programs to identify,&lt;br /&gt;detect, and respond to the warning &lt;/span&gt;&lt;span style="font-style: italic;"&gt;signs, or “red flags,”&lt;br /&gt;that could indicate identity theft.&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;Examples of the type of firms which are required to comply&lt;br /&gt;are:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Finance companies&lt;/li&gt;&lt;li&gt;Automobile dealers that provide or arrange financing;&lt;/li&gt;&lt;li&gt;Mortgage brokers&lt;/li&gt;&lt;li&gt;Utility companies&lt;/li&gt;&lt;li&gt;Telecommunications companies&lt;/li&gt;&lt;li&gt;Non-profit and government entities that defer payment for goods or services&lt;/li&gt;&lt;li&gt;Businesses that provide services and bill later, including many lawyers, doctors, and other professionals.&lt;/li&gt;&lt;/ul&gt;While it may be considered ambiguous by these firms whether they&lt;br /&gt;should comply or not, to the credit of the F.T.C., a great wealth of&lt;br /&gt;resources - even including a &lt;a href="http://www.ftc.gov/bcp/edu/microsites/redflagsrule/more-about-red-flags.shtm"&gt;special website&lt;/a&gt; - was provided to bring&lt;br /&gt;clarity and guidance for implementation.&lt;br /&gt;&lt;br /&gt;Evidently, powerful lobbying organizations such as the&lt;br /&gt;&lt;a href="http://www.ftc.gov/os/closings/staff/090204amaredflagsrule.pdf"&gt;A.M.A. objected&lt;/a&gt; to the F.T.C.'s definition of them being&lt;br /&gt;included as "creditors" as early as September, 2008&lt;br /&gt;even though there has been a consistent pattern of&lt;br /&gt;&lt;a href="http://idtheftsecrets.blogspot.com/search?q=medical+identity+theft"&gt;medical identity theft data breaches&lt;/a&gt; the past 3 years.&lt;br /&gt;&lt;br /&gt;So, while the lobbyists and the regulators continue to do battle over&lt;br /&gt;implementing very clear legal steps to protect all of us consumers&lt;br /&gt;from continued identity theft, the criminals and financial fraudsters&lt;br /&gt;have been given another green light signal to perpetrate illegal&lt;br /&gt;activities all the while knowing there is not much real commitment&lt;br /&gt;by our government to wage an all out war against them.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;As a result, our &lt;a href="http://idtheftsecrets.blogspot.com/2009/08/identity-theft-criminals-get-3-more.html"&gt;tip for today&lt;/a&gt; is to take matters under your own&lt;br /&gt;control - especially with&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; medical identity theft as this one of the&lt;br /&gt;softest areas that identity thieves know they can&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; exploit as&lt;br /&gt;"creditors" continue to delay or outright refuse to comply with&lt;br /&gt;regulatory&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; efforts specifically designed to close the loop holes&lt;br /&gt;credit reporting and law enforcement&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; has been frustrated with&lt;br /&gt;for years.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Get your medical &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;identity theft&lt;/a&gt; &amp;amp; &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;personal information profile&lt;/a&gt;&lt;br /&gt;checked out today.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Finally, make sure to &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=7641002732393075395"&gt;tell a friend&lt;/a&gt; or family member of this&lt;br /&gt;important new &lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;development in identity theft fraud prevention.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">13</thr:total></item><item><title>$24K Cosmetic Surgery Powered by Identity Theft</title><link>http://idtheftsecrets.blogspot.com/2009/07/24k-cosmetic-surgery-powered-by.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Thu, 23 Jul 2009 00:01:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-8144650783265911745</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;From the "when will they ever learn file", as a follow up to&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;our &lt;/span&gt;&lt;a style="font-weight: bold; font-style: italic;" href="http://idtheftsecrets.blogspot.com/2006/11/identity-theft-for-cosmetic-surgery.html"&gt;related 2006 post&lt;/a&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; - a California woman used a novel&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;funding strategy for her plastic surgery desires.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;It seems, the Berkley &lt;a href="http://www.insidebayarea.com/oaklandtribune/localnews/ci_12886802?source=rss"&gt;identity theft&lt;/a&gt; used a Florida woman's&lt;br /&gt;American Express card to order the following plastic surgery&lt;br /&gt;costing $24,319:&lt;br /&gt;&lt;br /&gt;&lt;ul style="font-weight: bold;"&gt;&lt;li&gt;$12,999 for breast enhancement&lt;/li&gt;&lt;li&gt;$11,320 for liposuction&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;Additionally, though, having secured a beauty make over this&lt;br /&gt;same &lt;a href="http://www.insidebayarea.com/oaklandtribune/localnews/ci_12886802?source=rss"&gt;identity theft fraudster&lt;/a&gt; evidently went on a shopping spree&lt;br /&gt;resulting in an additional $6,570 in merchandise charged to that&lt;br /&gt;American Express card.&lt;br /&gt;&lt;br /&gt;Fortunately, in this case the identity theft criminal was sentenced&lt;br /&gt;Tuesday to &lt;a href="http://www.insidebayarea.com/oaklandtribune/localnews/ci_12886802?source=rss"&gt;32 months of prison time&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;But, for all those other identity theft victims who have not yet&lt;br /&gt;discovered fraudulent charges made in their good name, now's&lt;br /&gt;the time to take action.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://idtheftsecrets.blogspot.com/2009/07/24k-cosmetic-surgery-powered-by.html"&gt;Our tip for today&lt;/a&gt; is guard against your credit being accessed&lt;br /&gt;without your authorization.  Active credit monitoring can alert&lt;br /&gt;you via wireless or email alerts when suspicious activity first&lt;br /&gt;takes place given you the necessary time to limit or even&lt;br /&gt;prevent extensive damage to your credit.&lt;br /&gt;&lt;br /&gt;Its usually a free service offered by all the major credit card&lt;br /&gt;companies such as Visa, Amex, Discover, Mastercard - so&lt;br /&gt;make the call today to get your financial security and peace&lt;br /&gt;of mind.&lt;br /&gt;&lt;span style="font-size:100%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-weight: bold;font-size:85%;" &gt;&lt;span style="font-style: italic;"&gt;Plus, to find the often times &lt;/span&gt;&lt;a style="font-style: italic;" href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;hidden, past incidents&lt;/a&gt;&lt;span style="font-style: italic;"&gt; of non-&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;credit report damage such as liens or court judgements&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;resulting from criminal activity committed in your&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;name, get your personal information profile (pip).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You will be shocked to know the volume of information on file&lt;br /&gt;with your public information profile that presents over &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;400 ways&lt;/a&gt;&lt;br /&gt;an identity thief can easily ruin your good name. Any one of&lt;br /&gt;those 400 ways can cost you your job, force you to pay&lt;br /&gt;higher auto insurance, or even land you in jail.&lt;br /&gt;&lt;br /&gt;Finally, make sure to &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=8144650783265911745"&gt;tell your friends&lt;/a&gt; and associates about this&lt;br /&gt;latest new development in the war against identity theft fraud&lt;br /&gt;and how to prevent it from happening to you or your loved ones.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">8</thr:total></item><item><title>$1.4 million Identity Theft Fraud Ring Recruited Bank Employees</title><link>http://idtheftsecrets.blogspot.com/2009/06/14-million-identity-theft-fraud-ring.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 8 Jun 2009 00:01:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-6443939356549658806</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt;In a sign of the financial services industry turmoil has created&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt;fertile ground for identity theft by insiders, a major identity&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt;theft fraud ring was recently uncovered that stole over $1.4&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt;million with the aid of tellers in at least 3 major banks.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;According to the New York County District Attorney, the&lt;br /&gt;&lt;a href="http://manhattanda.org/whatsnew/press/2009-05-27.shtml"&gt;identity theft&lt;/a&gt; criminals used the stolen personal information&lt;br /&gt;to mostly create counterfeit checks in the thousands.&lt;br /&gt;&lt;br /&gt;By fraudulently cashing and depositing the&lt;br /&gt;counterfeit checks, the defendants stole over&lt;br /&gt;$1.4 million from one bank’s accounts and&lt;br /&gt;substantial additional sums from other banks.&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;"Victims of this scam included private individuals,&lt;br /&gt;corporations, religious institutions, hospitals, and&lt;br /&gt;schools, as well as city and state government agencies."&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;While every major retail bank in Manhattan was targeted,&lt;br /&gt;the following banks were disclosed in the recent indictment&lt;br /&gt;as part of an &lt;a href="http://manhattanda.org/whatsnew/press/2009-05-27.shtml"&gt;on-going investigation&lt;/a&gt;:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;JP Morgan Chase&lt;/li&gt;&lt;li&gt;TD/Commerce&lt;/li&gt;&lt;li&gt;Wachovia&lt;/li&gt;&lt;li&gt;HSBC&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;The fraud ring would not have been as  successful in their identity theft&lt;br /&gt;fraund operation without the aid of bank staff.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;"These employees, often tellers, had access both to the&lt;br /&gt;banks’ computer systems and to large numbers of valid&lt;br /&gt;checks processed during legitimate customer transactions.&lt;br /&gt;&lt;br /&gt;In return for cash payments, the recruited tellers&lt;br /&gt;photocopied valid customer checks and printed out&lt;br /&gt;copies of customer profiles, which contained the&lt;br /&gt;customers’ names, addresses, social security&lt;br /&gt;numbers, bank account numbers and account balances."&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;Serious personal information used in a very serious identity&lt;br /&gt;theft fraud crime - one which may very well still yet to be&lt;br /&gt;fully uncovered as the investigation continues possibly&lt;br /&gt;involving these additional financial institutions:&lt;br /&gt;&lt;br /&gt;Some of the other financial institutions affected by this&lt;br /&gt;group’s criminal activities are&lt;br /&gt;&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Bank of America&lt;/li&gt;&lt;li&gt;Citibank, Capitol &lt;/li&gt;&lt;li&gt;One Bank&lt;/li&gt;&lt;li&gt;Washington Mutual Bank&lt;/li&gt;&lt;li&gt;EAB Bank&lt;/li&gt;&lt;li&gt;Banco Popular&lt;/li&gt;&lt;li&gt;Amalgamated Bank&lt;/li&gt;&lt;li&gt;M &amp;amp; T Bank&lt;/li&gt;&lt;li&gt;Sovereign Bank&lt;/li&gt;&lt;li&gt;First National Bank&lt;/li&gt;&lt;li&gt;United Bank&lt;/li&gt;&lt;li&gt;Citizens Bank&lt;/li&gt;&lt;li&gt;Fleet Bank&lt;/li&gt;&lt;/ol&gt;&lt;br /&gt;With the scale and scope of this latest insider fueled identity theft&lt;br /&gt;fraud, this case has the opportunity to become of one of the the&lt;br /&gt;largest in 2009.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;So, our &lt;a href="http://idtheftsecrets.blogspot.com/2009/06/14-million-identity-theft-fraud-ring.html"&gt;tip for today&lt;/a&gt; is to take action by not waiting for the identity&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;theft criminals and the banks to notify you of your financial future&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;being ruined.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Check out your bank statements if you transact with any of the&lt;br /&gt;financial institutions listed above.  Also, for the on-going prevention&lt;br /&gt;of identity theft, it would be wise to institute automatic credit&lt;br /&gt;monitoring on all of your major banking and credit accounts.&lt;br /&gt;&lt;br /&gt;Finally, as your social security number (ssn) can be used in&lt;br /&gt;other major forms of fraud such as medical identity theft and&lt;br /&gt;arrest warrant scams both of which can put you in jail - get&lt;br /&gt;your &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;public information profile (pip)&lt;/a&gt; to review for these very&lt;br /&gt;serious forms of identity theft that no major credit bureau&lt;br /&gt;report was &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;ever designed to catch&lt;/a&gt;.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">4</thr:total></item><item><title>Verizon Claims 9 of 10 Corporate Security Breaches Avoidable</title><link>http://idtheftsecrets.blogspot.com/2009/05/verizon-claims-9-of-10-corporate.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 18 May 2009 12:34:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-5845944530893736220</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt;In one of the more exhaustive studies we've seen lately,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt;Verizon Business Security concluded "nearly nine out of 10&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt;breaches were considered avoidable if security basics had&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt;been followed."&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY9c-2T3nqIzq9spRyc3L0kZfAeE3A7N-8QBMLM4YnEICiR1quqqsXXB1Rrg3nvVInRrgNIAWkynZ6P4ibx-zEKgS4gUdk9_udJy0IyROPa2bF3KbtyXGut4N2eSOa5k7TYq30/s1600-h/Verizon.Biz.Security.2009.Study.png"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px; height: 320px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY9c-2T3nqIzq9spRyc3L0kZfAeE3A7N-8QBMLM4YnEICiR1quqqsXXB1Rrg3nvVInRrgNIAWkynZ6P4ibx-zEKgS4gUdk9_udJy0IyROPa2bF3KbtyXGut4N2eSOa5k7TYq30/s320/Verizon.Biz.Security.2009.Study.png" alt="Verizon Claims 9 of 10 Corporate Security Breaches Are Avoidable " id="BLOGGER_PHOTO_ID_5337263968625903378" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The &lt;a href="http://newscenter.verizon.com/press-releases/verizon/2009/verizon-business-2009-data.html"&gt;study&lt;/a&gt;, based on 285 million compromised records from&lt;br /&gt;90 confirmed breaches, suggested many of the data security&lt;br /&gt;breaches did not require extensive fixes to plug the leaks.&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-weight: bold; font-style: italic;"&gt;"...did not require difficult or expensive&lt;br /&gt;preventive controls.  The 2009 report&lt;br /&gt;concluded that mistakes and oversight&lt;br /&gt;failures hindered security efforts more&lt;br /&gt;than a lack of resources at the time of&lt;br /&gt;the breach."&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;Even more alarming, though, is the vast majority of those&lt;br /&gt;security breaches were not discovered by the target but&lt;br /&gt;rather by &lt;a href="http://newscenter.verizon.com/press-releases/verizon/2009/verizon-business-2009-data.html"&gt;other&lt;/a&gt; entities which had to bring it to the target's&lt;br /&gt;attention:&lt;br /&gt;&lt;blockquote style="font-weight: bold; font-style: italic;"&gt;&lt;br /&gt;"In 69 percent of cases, the breach was&lt;br /&gt;discovered by third parties."&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;So, the key takeaways are the problem is growing, it's mostly&lt;br /&gt;avoidable, and the organizations suffering the data security&lt;br /&gt;breaches don't typically know about the problem until notified&lt;br /&gt;by a 3rd party (meaning consumers).&lt;br /&gt;&lt;br /&gt;Our &lt;a href="http://idtheftsecrets.blogspot.com/2009/05/verizon-claims-9-of-10-corporate.html"&gt;tip for today&lt;/a&gt; is to &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;guard your financial future and assets&lt;/a&gt;&lt;br /&gt;against &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;identity theft&lt;/a&gt;.  Don't leave it up to organizations who&lt;br /&gt;are either clueless or distracted with corporate mergers and&lt;br /&gt;other internal issues to combat the highly focused identity theft&lt;br /&gt;crime syndicates that exploit organizational vulnerabilities which&lt;br /&gt;render your hard earned financial data available on the world&lt;br /&gt;market.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgY9c-2T3nqIzq9spRyc3L0kZfAeE3A7N-8QBMLM4YnEICiR1quqqsXXB1Rrg3nvVInRrgNIAWkynZ6P4ibx-zEKgS4gUdk9_udJy0IyROPa2bF3KbtyXGut4N2eSOa5k7TYq30/s72-c/Verizon.Biz.Security.2009.Study.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Latest Buzz on Id Theft Secrets</title><link>http://idtheftsecrets.blogspot.com/2009/03/latest-buzz-on-id-theft-secrets.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sat, 14 Mar 2009 00:01:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-6833464788980779340</guid><description>&lt;span style="font-weight: bold; font-style: italic;"&gt;For the Buzz from the latest Id Theft Secrets Blog&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;updates, get the free widget to place on your website&lt;br /&gt;or start page.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://fpdownload.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=9,0,0,0" type="application/x-shockwave-flash" id="InsertWidget_a4e39cd6-aac1-4a19-b25e-03a565941f91" align="middle" width="170" height="423"&gt;&lt;param name="movie" value="http://widgetserver.com/syndication/flash/wrapper/InsertWidget.swf"&gt;&lt;param name="quality" value="high"&gt;&lt;param name="wmode" value="transparent"&gt;&lt;param name="menu" value="false"&gt;&lt;param name="flashvars" value="r=2&amp;amp;appId=a4e39cd6-aac1-4a19-b25e-03a565941f91"&gt; &lt;embed src="http://widgetserver.com/syndication/flash/wrapper/InsertWidget.swf" name="InsertWidget_a4e39cd6-aac1-4a19-b25e-03a565941f91" quality="high" menu="false" pluginspage="http://www.macromedia.com/go/getflashplayer" type="application/x-shockwave-flash" wmode="transparent" flashvars="r=2&amp;amp;appId=a4e39cd6-aac1-4a19-b25e-03a565941f91" align="middle" width="170" height="423"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;Help stop identity thieves from operating from behind the&lt;br /&gt;dark veil of knowledge hidden from the general public.&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://photos1.blogger.com/blogger/367/1074/200/ID.THEFT.Bookcover.3D.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 200px; height: 189px;" src="http://photos1.blogger.com/blogger/367/1074/200/ID.THEFT.Bookcover.3D.jpg" alt="" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Provided since 2002 by a former identity theft victim who's&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;mission is to share the information and resources consumers&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;can arm themselves to fight back against identity theft and&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;credit fraud.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Don't have a website - no problem - here's a quick and easy fix.&lt;br /&gt;&lt;br /&gt;Simply &lt;a href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;&lt;span style="font-weight: bold;"&gt;subscribe to Id Theft Secrets&lt;/span&gt;&lt;/a&gt; for your free, anonymous&lt;br /&gt;tips that everyone is buzzing about for years on &lt;a href="http://www.google.com/search?hl=en&amp;amp;q=%22id+theft+secrets+blog%22&amp;amp;btnG=Search"&gt;Google&lt;/a&gt;, &lt;a href="http://search.yahoo.com/search;_ylt=A0oGkwLkNrxJHkoAjJtXNyoA?p=%22id+theft+secrets+blog%22&amp;amp;y=Search&amp;amp;fr=yfp-t-501"&gt;Yahoo&lt;/a&gt;,&lt;br /&gt;&lt;a href="http://search.aol.com/aol/search?s_it=topsearchbox.search&amp;amp;query=%22id+theft+secrets+blog%22"&gt;AOL&lt;/a&gt;, &lt;a href="http://search.msn.com/results.aspx?q=%22id+theft+secrets+blog%22&amp;amp;FORM=MSNH11"&gt;MSN&lt;/a&gt;, &lt;a href="http://www.ask.com/web?q=%22id+theft+secrets+blog%22&amp;amp;search=search&amp;amp;qsrc=0&amp;amp;o=0&amp;amp;l=dir"&gt;Ask&lt;/a&gt;, &lt;a href="http://delicious.com/search?p=id+theft+secrets+blog&amp;amp;u=&amp;amp;chk=&amp;amp;context=main&amp;amp;fr=del_icio_us&amp;amp;lc=0"&gt;Delicious&lt;/a&gt;, &lt;a href="http://www.flickr.com/photos/idtheftsecrets/"&gt;Flickr&lt;/a&gt;, &lt;a href="http://itunes.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=161017926"&gt;iTunes&lt;/a&gt; and many other &lt;a href="http://www.mybloglog.com/buzz/community/IDTheftSecretsBlog/"&gt;important&lt;/a&gt;&lt;br /&gt;&lt;a href="http://senatesite.com/blog/2006/03/freeze-begins.html"&gt;areas&lt;/a&gt; across the internet for grabbing your&lt;a href="http://www.plusmo.com/add?url=http://feeds.feedburner.com/IdTheftSecretsBlog"&gt; iPhone compatible&lt;/a&gt; mobile&lt;br /&gt;alerts.&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total><enclosure length="1111" type="application/x-shockwave-flash" url="http://widgetserver.com/syndication/flash/wrapper/InsertWidget.swf"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>For the Buzz from the latest Id Theft Secrets Blog updates, get the free widget to place on your website or start page. Help stop identity thieves from operating from behind the dark veil of knowledge hidden from the general public. Provided since 2002 by a former identity theft victim who's mission is to share the information and resources consumers can arm themselves to fight back against identity theft and credit fraud. Don't have a website - no problem - here's a quick and easy fix. Simply subscribe to Id Theft Secrets for your free, anonymous tips that everyone is buzzing about for years on Google, Yahoo, AOL, MSN, Ask, Delicious, Flickr, iTunes and many other important areas across the internet for grabbing your iPhone compatible mobile alerts.This article may be published in it's entirety on your site. Article courtesy of http://www.idtheftsecrets.blogspot.com/</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>For the Buzz from the latest Id Theft Secrets Blog updates, get the free widget to place on your website or start page. Help stop identity thieves from operating from behind the dark veil of knowledge hidden from the general public. Provided since 2002 by a former identity theft victim who's mission is to share the information and resources consumers can arm themselves to fight back against identity theft and credit fraud. Don't have a website - no problem - here's a quick and easy fix. Simply subscribe to Id Theft Secrets for your free, anonymous tips that everyone is buzzing about for years on Google, Yahoo, AOL, MSN, Ask, Delicious, Flickr, iTunes and many other important areas across the internet for grabbing your iPhone compatible mobile alerts.This article may be published in it's entirety on your site. Article courtesy of http://www.idtheftsecrets.blogspot.com/</itunes:summary><itunes:keywords>identitytheft,identity,theft,id,theft,privacy,security,credit,scam,fraud,ssn,breach,opt,out,mp3,audio,podcast,blog,rss,freedbacking,safety,googlealert,finance,business,popular</itunes:keywords></item><item><title>ID Theft Via Text Messaging</title><link>http://idtheftsecrets.blogspot.com/2009/03/id-theft-via-text-messaging.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 1 Mar 2009 00:06:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-3379650006815221848</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Ever resourceful in continuing to extend the reach of their&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;criminal activities, the newest threat now comes from text&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;messaging by identity thieves.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAoePR5GDR9uWfecV0A7zGp8JteDJ-bcxdqlJc8VFc0_uOhi72Z-3f323YFYYE7bnoaCQYYoFPoTDr4eWM0D03eGXJsmwD8MnDcV6-hpez6FBQFKlQy0oBwWBFH4UFbVduEp2A/s1600-h/Identity.Theft.Via.Text.Message.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 91px; height: 135px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAoePR5GDR9uWfecV0A7zGp8JteDJ-bcxdqlJc8VFc0_uOhi72Z-3f323YFYYE7bnoaCQYYoFPoTDr4eWM0D03eGXJsmwD8MnDcV6-hpez6FBQFKlQy0oBwWBFH4UFbVduEp2A/s320/Identity.Theft.Via.Text.Message.jpg" alt="Id Theft Via Text Messaging" id="BLOGGER_PHOTO_ID_5313164476016070850" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;This &lt;a href="http://idtheftsecrets.blogspot.com/2009/03/id-theft-via-text-messaging.html"&gt;alert&lt;/a&gt; to our &lt;a href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;subscribers&lt;/a&gt; is part of our continued scanning&lt;br /&gt;of the world's latest fraud developments and represents a major&lt;br /&gt;new identity theft scam technique to use both speed and confusion&lt;br /&gt;to compromise consumer safety.&lt;br /&gt;&lt;br /&gt;Here's what happened.&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;Identity theft criminals, in Colorado where first reported,&lt;br /&gt;send out fake text messages to the cell phones of unsuspecting&lt;br /&gt;potential victims.  The messages ask for information about the&lt;br /&gt;recipient's debit or credit cards.&lt;br /&gt;&lt;br /&gt;The &lt;a href="http://www.coloradoan.com/article/20090314/NEWS01/903140338/1002/CUSTOMERSERVICE02"&gt;text&lt;/a&gt; asks people to call a 1-877 number to find out why&lt;br /&gt;their card was suspended. To reactivate the card, the caller is&lt;br /&gt;told to enter in the card number, expiration date and PIN code.&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;By calling the listed phone number and providing the confidential&lt;br /&gt;information requested by the fraudulent criminal, the consumer&lt;br /&gt;essentially is handing over their bank account access privileges.&lt;br /&gt;&lt;br /&gt;Armed with that confidential access information, the identity theft&lt;br /&gt;fraudster can very quickly clean out the victim's debit account or&lt;br /&gt;run up a massive amount of fraudulent transactions on their credit&lt;br /&gt;card in less than a day.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Key note, unlike credit cards, debit cards are directly hot linked to&lt;br /&gt;your bank&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; checking or savings accounts which are much harder to&lt;br /&gt;recover lost funds from -&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; especially if you do not catch the criminal&lt;br /&gt;activity within the first week of&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; it happening.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;So, &lt;a href="http://idtheftsecrets.blogspot.com/2009/03/id-theft-via-text-messaging.html"&gt;our tip for today&lt;/a&gt; is to guard well your providing any&lt;br /&gt;confidential access information to an authorized party via&lt;br /&gt;text messaging.  Additionally, unless you have specifically&lt;br /&gt;enrolled in your bank or credit card company's fraud&lt;br /&gt;monitoring alerts service, do not respond to these fake&lt;br /&gt;attempts by identity theft criminals determined to ruin&lt;br /&gt;your financial future.&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;PS: &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=3379650006815221848"&gt;Tell a friend&lt;/a&gt; or associate you know of residing in the&lt;br /&gt;Denver, CO&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; area of this important new development in&lt;br /&gt;identity theft to contact&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; their local police department&lt;br /&gt;immediately.&lt;/span&gt;&lt;/span&gt;  &lt;span style="font-style: italic;font-size:85%;" &gt;&lt;span style="font-weight: bold;"&gt;Finally, make to check back frequently&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;for our free, anonymous tips to help you reduce your&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;potential for &lt;/span&gt;&lt;a style="font-weight: bold;" href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;identity theft&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAoePR5GDR9uWfecV0A7zGp8JteDJ-bcxdqlJc8VFc0_uOhi72Z-3f323YFYYE7bnoaCQYYoFPoTDr4eWM0D03eGXJsmwD8MnDcV6-hpez6FBQFKlQy0oBwWBFH4UFbVduEp2A/s72-c/Identity.Theft.Via.Text.Message.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Id  Theft Rising Out of Control</title><link>http://idtheftsecrets.blogspot.com/2009/02/id-theft-rising-out-of-control.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 15 Feb 2009 15:48:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-6900952224556251448</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Identity theft rose nearly 50% during the period of 2007 - 2008 and&lt;br /&gt;continues&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; to be one of the fastest growing forms of crime in America.&lt;br /&gt;With the&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; recent melt down and ensuing turmoil within the financial&lt;br /&gt;services&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; industry, 2009 looks to be an even more frightening prospect&lt;br /&gt;for U.S.&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; consumers to suffer data breaches.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;According to figures released by the IRTC, reported data breaches&lt;br /&gt;rose 47% during 2008. When combined with a &lt;a href="http://money.cnn.com/2009/02/09/news/newsmakers/identity_theft.reut/index.htm"&gt;study&lt;/a&gt; by the Javelin&lt;br /&gt;Research, an even more alarming picture of 2008 emerges according&lt;br /&gt;to &lt;a href="http://money.cnn.com/2009/02/09/news/newsmakers/identity_theft.reut/index.htm"&gt;CNN Money&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic;"&gt;The number of victims rose 22% to a record 9.9 million in 2008&lt;br /&gt;from 8.1 million a year earlier, with about one in 23 U.S. adults&lt;br /&gt;becoming victims, according to the fifth annual study by Javelin&lt;br /&gt;Strategy &amp;amp; Research, released Monday.&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;To put those numbers into focus in terms of how prevalent identity&lt;br /&gt;theft security breaches negatively impact U.S. consumers, a major&lt;br /&gt;data research firm, Gartner Research, was recently quoted by&lt;br /&gt;&lt;a href="http://www.pcmag.com/article2/0,2817,2340785,00.asp"&gt;P.C. Magagine&lt;/a&gt; of an even higher number - "15 million identities are&lt;br /&gt;stolen per year - or what translates into 2 per second."&lt;br /&gt;&lt;br /&gt;What ever figure you ultimately feel comfortable in believing is&lt;br /&gt;closer to reality, the simple fact that will still be remaining after&lt;br /&gt;all of the research and analyis is identity theft is a growing and&lt;br /&gt;serious threat to most Americans.&lt;br /&gt;&lt;br /&gt;A threat that is not going away or will suddenly diminish.&lt;br /&gt;&lt;br /&gt;Here's why:&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic;"&gt;&lt;a href="http://www.idtheftcenter.org/artman2/publish/lib_survey/ITRC_2008_Breach_List.shtml"&gt;ITRC&lt;/a&gt; estimates that &lt;span style="font-weight: bold;"&gt;only 2.4 percent&lt;/span&gt; of all the companies&lt;br /&gt;breached had encryption or other strong protection methods&lt;br /&gt;in use, while &lt;span style="font-weight: bold;"&gt;only 8.5 percent&lt;/span&gt; of reported breaches involved&lt;br /&gt;surmounting password protection.&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;So, why transact with a business that doesn't place enough&lt;br /&gt;value in you precious personal data to even utilize the most&lt;br /&gt;minimal level of basic encryption or password protection?&lt;br /&gt;&lt;br /&gt;The answer is and always has been, money.  Corporations&lt;br /&gt;will always be driven by revenue: either the acquisition of&lt;br /&gt;or defense of from loss.  Until the day comes where there's a&lt;br /&gt;hefty penalty applied to these firms for not protecting your&lt;br /&gt;data, you will continue to be a victim in waiting.&lt;br /&gt;&lt;br /&gt;Why wait further?  Take action immediately to gain back&lt;br /&gt;some of the basic protection you assume the so called guardians&lt;br /&gt;of your entrusted data would already been taking for your benefit.&lt;br /&gt;&lt;br /&gt;Our &lt;a href="http://idtheftsecrets.blogspot.com/2009/02/id-theft-rising-out-of-control.html"&gt;tip for today&lt;/a&gt;, is to start by taking back control of your data.&lt;br /&gt;Begin by shredding, using a cross cut shredder, any old financial&lt;br /&gt;statements lying about the house.  Next, eliminate the source of&lt;br /&gt;the paper by contacting your bank and credit card companies to&lt;br /&gt;request "paper less" statement delivery.&lt;br /&gt;&lt;br /&gt;Then, make sure to order up a free copy of your credit report that&lt;br /&gt;you are entitled to under the law.  Diligently scrutinize your credit&lt;br /&gt;profile for any accounts or suspicious transactions not authorized&lt;br /&gt;by you.  Also, make sure that you enroll in a credit monitoring service&lt;br /&gt;through your credit card and banking institutions to pre-emptatively&lt;br /&gt;catch would be identity thieves before they are able to cause major&lt;br /&gt;damage to your credit resulting from attempts to open up fraudulent&lt;br /&gt;accounts in your name.&lt;br /&gt;&lt;br /&gt;Finally, take this final step which is even more important than just&lt;br /&gt;credit reporting verification - conduct your own personal information&lt;br /&gt;profile &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;(PIP)&lt;/a&gt; investigation of your public records profile.  This very&lt;br /&gt;important and necessary step is vital to catch any instance of&lt;br /&gt;identity theft which can exist in the over &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;400 public databases that &lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;no &lt;/a&gt;&lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;credit reporting agency was ever designed to check.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;This final step can not only save you from the potential for identity&lt;br /&gt;theft and credit fraud, but also can &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;keep you from being falsely &lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;arrested or fired from your job due to the misdeeds of an &lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;identity theft criminal.&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">4</thr:total></item><item><title>5 Million CheckFree Consumers Warned Against Identity Theft Exposure</title><link>http://idtheftsecrets.blogspot.com/2009/01/5-million-checkfree-consumers-warned.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 11 Jan 2009 13:54:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-2104501772346631235</guid><description>With the new year's first major security breach, CheckFree issued&lt;br /&gt;a consumer disclosure recently warning more consumers were&lt;br /&gt;negatively impacted than originally thought.&lt;br /&gt;&lt;br /&gt;Computer hackers operating in the Ukraine effectively redirected&lt;br /&gt;&lt;a href="http://www.pcworld.com/businesscenter/article/156497/checkfree_warns_5_million_customers_after_hack.html"&gt;CheckFree's&lt;/a&gt; web traffic to illegal computer servers.&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;"...because the company lost control of its Web domains, it&lt;br /&gt;doesn't know exactly who was hit. And so it must warn a&lt;br /&gt;much larger number of customers."&lt;/blockquote&gt;&lt;br /&gt;While there are indications the exposure could have been much&lt;br /&gt;worse, consumers should be wary as CheckFree holds a significant&lt;br /&gt;reach within the banking community for &lt;a href="http://www.pcworld.com/businesscenter/article/156497/checkfree_warns_5_million_customers_after_hack.html"&gt;bill payment&lt;/a&gt; services:&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;"...wouldn't say what banks were affected by the hack, but&lt;br /&gt;the majority of these five million customers were CheckFree's&lt;br /&gt;own users, she said. In total, about &lt;a href="http://www.pcworld.com/businesscenter/article/156497/checkfree_warns_5_million_customers_after_hack.html"&gt;42&lt;/a&gt; million customers&lt;br /&gt;access CheckFree's bill payment site..."&lt;/blockquote&gt;&lt;br /&gt;So, our &lt;a href="http://idtheftsecrets.blogspot.com/2009/01/5-million-checkfree-consumers-warned.html"&gt;tip for today&lt;/a&gt; is to contact your bank immediately if you&lt;br /&gt;are a user of CheckFree's bill payment services.  Find out if your&lt;br /&gt;accounts exhibit any potentially fraudulent activity.&lt;br /&gt;&lt;br /&gt;Finally, as major identity theft security breaches such as this one&lt;br /&gt;tend to further develop over time, &lt;a href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;check back&lt;/a&gt; with us for updates&lt;br /&gt;as we continue to provide free, anonymous tips to prevent id theft.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>35 Million Data Records Exposed in 2008 to Identity Theft</title><link>http://idtheftsecrets.blogspot.com/2009/01/35-million-data-records-exposed-in-2008.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 4 Jan 2009 13:04:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-5422405041699304422</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Last year over 35,000,000 personal data records were exposed via&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;656 separate security breaches representing a 47% increase from&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;2007.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;According to a recently released study by the &lt;a href="http://www.idtheftcenter.org/artman2/publish/lib_survey/ITRC_2008_Breach_List.shtml"&gt;ITRC&lt;/a&gt;, the overwhelming&lt;br /&gt;majority of those exposed records also did not include encryption nor&lt;br /&gt;password protection to minimize unauthorized access:&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic;"&gt;"...only 2.4% of all breaches had encryption or other&lt;br /&gt;strong protection methods in use.&lt;br /&gt;&lt;br /&gt;Only 8.5% of reported breaches had password protection."&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;But, even more alarming of this very large number of Americans who&lt;br /&gt;were unnecessarily exposed to potential identity theft, the &lt;span style="color: rgb(204, 0, 0);"&gt;unreported&lt;/span&gt;&lt;br /&gt;number of records exposed could be much higher as not &lt;a href="http://www.pcworld.com/businesscenter/article/155337/federal_data_breach_law_no_time_soon.html"&gt;every state&lt;/a&gt;&lt;br /&gt;has laws requiring businesses requiring consumer disclosure.&lt;br /&gt;&lt;br /&gt;And of those states which do, the laws vary greatly which renders a&lt;br /&gt;great many Americans vulnerable to the often times hidden potential&lt;br /&gt;identity theft has already been perpetrated against their financial&lt;br /&gt;safety but goes unreported solely due to some company avoiding&lt;br /&gt;embarassment:&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic;"&gt;"Some 15.7 percent of all breaches were attributed to&lt;br /&gt;&lt;a href="http://tech.yahoo.com/news/pcworld/20090107/tc_pcworld/databreachesrosesharplyin2008saysstudy_1"&gt;insider theft&lt;/a&gt;, a figure that &lt;span style="font-weight: bold;"&gt;more than doubled&lt;/span&gt; between&lt;br /&gt;2007 and 2008, ITRC said."&lt;/blockquote&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold;"&gt;So, our &lt;/span&gt;&lt;a style="font-weight: bold;" href="http://idtheftsecrets.blogspot.com/2009/01/35-million-data-records-exposed-in-2008.html"&gt;tip for today&lt;/a&gt;&lt;span style="font-weight: bold;"&gt; is one New Year's resolution you can easily&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;achieve.  Get protected by following these simple steps:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;1)  Get a copy of your &lt;a href="http://www.annualcredtreport.com/"&gt;free credit report&lt;/a&gt; to check for any fraudulent&lt;br /&gt;credit accounts listed in your name.&lt;br /&gt;&lt;br /&gt;2)  Enroll in automatic credit monitoring available through your&lt;br /&gt;bank or credit institutions you currently have accounts with.&lt;br /&gt;&lt;br /&gt;3)  Get your &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;public information profile (PIP) &lt;/a&gt;checked out to really&lt;br /&gt;catch the often times hidden identity theft which can lurk in any of&lt;br /&gt;the over 400 data sources containing your name that are&lt;br /&gt;&lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;not covered by your credit report&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;*  Criminal identity theft here can get your &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;arrested&lt;/a&gt; or &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;lose your job&lt;/a&gt;&lt;br /&gt;without you even knowing why, when, or who accessed your file.&lt;br /&gt;&lt;br /&gt;Finally, make sure to let your &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=5422405041699304422"&gt;friends and family&lt;/a&gt; members know about&lt;br /&gt;these alarming growth trends in identity theft which can be minimized&lt;br /&gt;by taking advantage of these free, anonymous tips for identity theft.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Florida Security Breach Exposes 250,000 Consumer's Social Security Numbers</title><link>http://idtheftsecrets.blogspot.com/2008/12/florida-security-breach-exposes-250000.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sat, 6 Dec 2008 16:56:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-6160923505817146793</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;When a test server was made accessible to the internet for over two&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;weeks, Google's indexing service inadvertently made available online &lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;the highly sensitive personal data a quarter of a million residents of&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;the state of Florida.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;According to the &lt;a href="https://www.floridajobs.org/security/security.htm"&gt;Agency for Workforce Innovation website's&lt;/a&gt;&lt;br /&gt;new release of this past Thursday:&lt;br /&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;&lt;/span&gt;&lt;blockquote style="font-weight: bold;"&gt;&lt;span style="font-style: italic;"&gt;"The security breach occurred on an Agency&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;test server for 19 days in October 2008 and&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;resulted in the exposure of the names and&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;Social Security Numbers of approximately&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;250,000 customers who received services&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;through Florida’s One-Stop Career Centers&lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;between January 2002 and November 2007."&lt;/span&gt;&lt;/blockquote&gt;&lt;span style="font-style: italic;"&gt;&lt;/span&gt;&lt;br /&gt;Given the worldwide reach of &lt;a href="http://www.google.com/search?hl=en&amp;amp;q=+a&amp;amp;btnG=Search"&gt;Google's search engine&lt;/a&gt; and how&lt;br /&gt;easily would be identity thieves can &lt;a href="http://idtheftsecrets.blogspot.com/2006/07/largest-online-identity-theft-ring.html#links"&gt;trade -or- transform&lt;/a&gt; a&lt;br /&gt;consumer's social security number (ssn) into revenue, it is&lt;br /&gt;very scary to think about the ramifications of this latest&lt;br /&gt;identity theft security breach coming so close to the major&lt;br /&gt;holiday shopping season.&lt;br /&gt;&lt;br /&gt;A time when, due to the sheer volume of billions of transactions,&lt;br /&gt;fraud can &lt;a href="http://idtheftsecrets.blogspot.com/2006/11/identity-theft-prevention-tips-most.html"&gt;easily be obscured&lt;/a&gt; within the vast majority of legitimate&lt;br /&gt;commerce.&lt;br /&gt;&lt;br /&gt;But, for identity theft fraudsters, having unauthorized access to&lt;br /&gt;a consumer's full name and social security number can make it&lt;br /&gt;all to easy to secure &lt;span style="font-weight: bold;"&gt;"instant credit"&lt;/span&gt; from eager retail store clerks&lt;br /&gt;who get extra incentives during the holidays to &lt;a href="http://idtheftsecrets.blogspot.com/2005/10/prevent-identity-theft-by-freezing.html"&gt;open up new lines&lt;br /&gt;of credit to support more impulse shopping.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;So, &lt;a href="http://idtheftsecrets.blogspot.com/2008/12/florida-security-breach-exposes-250000.html"&gt;our tip for today&lt;/a&gt; is for anyone in Florida that may have &lt;span style="font-weight: bold;"&gt;utilized&lt;br /&gt;the&lt;/span&gt;&lt;span style="font-weight: bold;"&gt; Florida One-Stop Career Centers between Jan. 2002&lt;br /&gt;and Nov. 2007&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic; color: rgb(153, 0, 0);"&gt;Take immediate action by conducting the following steps:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;1)&lt;/span&gt;  Check if your name's on the list by using the official state&lt;br /&gt;of Florida&lt;a href="https://www.floridajobs.org/security/security.htm"&gt; website&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;2)&lt;/span&gt;  Secure a totally &lt;a href="http://www.annualcreditreport.com/"&gt;free copy of your credit profile&lt;/a&gt; report from the only&lt;br /&gt;source authorized by the (3) major credit bureaus and check for any&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;suspicious accounts&lt;/span&gt; listed under your name and social security number&lt;br /&gt;(ssn)&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;3) &lt;/span&gt; As credit reports will &lt;span style="font-weight: bold;"&gt;n-o-t &lt;/span&gt;show evidence of criminal identity&lt;br /&gt;theft committed against you in the form of &lt;a href="http://idtheftsecrets.blogspot.com/2006/10/medical-identity-theft-threats-life.html"&gt;medical identity fraud&lt;/a&gt;,&lt;br /&gt;&lt;a href="https://www.blogger.com/comment.g?blogID=12596461&amp;amp;postID=116157723619641635"&gt;property tax fraud&lt;/a&gt;, &amp;amp;&lt;a href="http://idtheftsecrets.blogspot.com/search?q=false+arrest"&gt; outstanding arrest warrants&lt;/a&gt; all of which &lt;span style="font-weight: bold;"&gt;&lt;br /&gt;require your social security number&lt;/span&gt;, you would be highly&lt;br /&gt;warned to also get an immediate scan of your &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;PIP&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Your &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;personal information profile&lt;/a&gt; &lt;span style="font-weight: bold;"&gt;(pip)&lt;/span&gt; is the &lt;span style="font-weight: bold;"&gt;only way&lt;/span&gt; that we&lt;br /&gt;know of to cost effectively and time efficiently scour the&lt;br /&gt;&lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;more than 400+ public databases&lt;/a&gt; which could contain your&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;full name, social security number, address&lt;/span&gt;, &amp;amp; even in&lt;br /&gt;some instances your &lt;span style="font-style: italic;"&gt;authorized signatures&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Finally, &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=6160923505817146793"&gt;be a good friend or family member&lt;/a&gt;, give the gift&lt;br /&gt;which keeps on giving beyond this holiday season.  Let those&lt;br /&gt;you care about take advantage of these&lt;span style="font-weight: bold;"&gt; free and&lt;br /&gt;&lt;/span&gt;&lt;a style="font-weight: bold;" href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;anonymous&lt;/a&gt;&lt;span style="font-weight: bold;"&gt; identity theft prevention tips available&lt;br /&gt;from&lt;a href="http://idtheftsecrets.blogspot.com/search?q=tips"&gt; Id Theft Secrets&lt;/a&gt;&lt;/span&gt;.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Missing Baylor Laptop Exposes Patients to Identity Theft</title><link>http://idtheftsecrets.blogspot.com/2008/11/missing-baylor-laptop-exposes-patients.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Tue, 11 Nov 2008 06:20:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-1662677116903507940</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;In Texas, a recently reported laptop theft has resulted in the issuance&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;of a consumer warning notifying an additional 100,000 patients who &lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;had limited information stored on the computer.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.bizjournals.com/dallas/stories/2008/11/03/daily15.html?ana=from_rss"&gt;According to the Dallas Business Journal article:&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic;"&gt;"A laptop stolen from an employee's car in Royse City&lt;br /&gt;has prompted Health Texas Provider Network, a subsidiary&lt;br /&gt;of Baylor Health Care System, to notify 7,400 patients that&lt;br /&gt;their personal information may be at risk. Social security&lt;br /&gt;numbers and a limited amount of patient information was&lt;br /&gt;stored on the laptop."&lt;/blockquote&gt;&lt;br /&gt;As an &lt;a href="http://www.bizjournals.com/dallas/stories/2008/11/03/daily15.html?ana=from_rss"&gt;added preventative step&lt;/a&gt;, the decision was made&lt;br /&gt;to also notify other patients with less sensitive personal&lt;br /&gt;information stored on the same computer:&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic;"&gt;"Although law does not require it to do so, the network&lt;br /&gt;said it is taking extra measures to notify an additional&lt;br /&gt;100,000 patients who had limited information stored&lt;br /&gt;on the computer, but not their social security numbers."&lt;/blockquote&gt;&lt;br /&gt;So, &lt;a href="http://idtheftsecrets.blogspot.com/2008/11/missing-baylor-laptop-exposes-patients.html"&gt;our tip for today&lt;/a&gt; is to &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=1662677116903507940"&gt;let anyone you know&lt;/a&gt; of associated&lt;br /&gt;with Baylor Health Care System to contact them immediately&lt;br /&gt;for more more information on the offer of free credit monitoring&lt;br /&gt;services.&lt;br /&gt;&lt;br /&gt;A &lt;span style="font-weight: bold;"&gt;toll free number &amp;amp; special website&lt;/span&gt; have been setup to support&lt;br /&gt;information seekers:&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;800.554.5281&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.bhcsnews.com/securityassistance"&gt;Baylor Healthcare System&lt;/a&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;span style="font-style: italic;font-size:85%;" &gt;&lt;span style="font-weight: bold;"&gt;PS: Be a good friend, family member or co-worker.  Help others to&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;be on guard against identity theft credit fraud by sharing these free,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;safe tips to aid in the &lt;a href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;prevention of identity theft&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">4</thr:total></item><item><title>Identity Theft from Inmates Running The Prison</title><link>http://idtheftsecrets.blogspot.com/2008/10/identity-theft-from-inmates-running.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sat, 11 Oct 2008 00:01:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-3615352201173247228</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Are the inmates running the prison when access to computers&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;by convicted criminals leads to the identity theft of innocent&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;people?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://farm4.static.flickr.com/3005/3021624371_25a10ca4a1.jpg?v=0"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 91px; height: 130px;" src="http://farm4.static.flickr.com/3005/3021624371_25a10ca4a1.jpg?v=0" alt="Identity Theft from Inmates Running the Prison" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;As a follow up to our &lt;a href="http://idtheftsecrets.blogspot.com/search?q=inmate"&gt;popular series on identity theft by&lt;br /&gt;prison inmates&lt;/a&gt;, we share a brief story of at least a happy&lt;br /&gt;ending to an otherwise dismal indictment of information&lt;br /&gt;access by the wrong hands.&lt;br /&gt;&lt;br /&gt;It appears a former Massachusetts prisoner managed to&lt;br /&gt;without legal authorization &lt;a href="http://blastmagazine.com/the-news/2008/11/former-massachusetts-prisoner-charged-with-identity-theft/"&gt;gain access to 1,000 of the&lt;br /&gt;prison's current and past employees&lt;/a&gt;:&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic;"&gt;"Janosko allegedly found a way to manipulate&lt;br /&gt;research computers so that he and other inmates&lt;br /&gt;could access files that contained the names, birth&lt;br /&gt;dates, phone numbers and Social Security numbers&lt;br /&gt;of more than 1,000 current and former prison&lt;br /&gt;employees, the DOJ reports."&lt;/blockquote&gt;&lt;br /&gt;While the convict was &lt;a href="http://blastmagazine.com/the-news/2008/11/former-massachusetts-prisoner-charged-with-identity-theft/"&gt;ultimately caught&lt;/a&gt; and is awaiting&lt;br /&gt;conviction for his crimes, it causes us to wonder how&lt;br /&gt;an inmate would even be allowed access in the first place&lt;br /&gt;to internet research services containing highly sensitive&lt;br /&gt;personal information such as:&lt;br /&gt;&lt;br /&gt;&lt;ul style="font-weight: bold;"&gt;&lt;li&gt;Dates of Birth&lt;/li&gt;&lt;li&gt;Social Security Numbers&lt;/li&gt;&lt;li&gt;Phone Numbers&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;So, our &lt;a href="http://idtheftsecrets.blogspot.com/2008/10/identity-theft-from-inmates-running.html"&gt;tip&lt;/a&gt; for today is to &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;guard well&lt;/a&gt; your personal information&lt;br /&gt;as you really never know where it will wind up deposited online&lt;br /&gt;where unfortunately a resourceful criminal can exploit the profit&lt;br /&gt;motive to the detriment of your financial future &amp;amp; safety of your&lt;br /&gt;family.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;PS: Be a good friend or family member by passing this &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=3615352201173247228"&gt;free tip&lt;/a&gt;&lt;/span&gt;&lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=3615352201173247228"&gt;&lt;br /&gt;&lt;/a&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;&lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=3615352201173247228"&gt;along&lt;/a&gt; to help in &lt;a href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;preventing identity theft credit fraud&lt;/a&gt; from&lt;br /&gt;happening&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; to someone you care about.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">5</thr:total></item><item><title>Woman Steals Daughter's Identity To Become High School Cheerleader</title><link>http://idtheftsecrets.blogspot.com/2008/09/woman-steals-daughters-identity-to.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sat, 13 Sep 2008 12:12:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-508790556201519311</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Over the years, we've shared with you a number of bizarre&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;examples of &lt;/span&gt;&lt;a style="font-weight: bold; font-style: italic;" href="http://idtheftsecrets.blogspot.com/2006/08/daughter-makes-her-mom-first-identity.html"&gt;identity theft&lt;/a&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;.  This latest case just in from the&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;I can't believe it really happened file adds a whole new twist.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://farm4.static.flickr.com/3250/2853341145_4d0c56e654.jpg?v=0"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 200px;" src="http://farm4.static.flickr.com/3250/2853341145_4d0c56e654.jpg?v=0" alt="Cheerleader Mom Identity Theft" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;It seems a 33 year old Wisconsin mother always really wanted&lt;br /&gt;to have become a high school cheerleader.  By stealing her&lt;br /&gt;teenager &lt;a href="http://www.allheadlinenews.com/articles/7012282134"&gt;daughter's identity&lt;/a&gt;, the mother's lifelong dream&lt;br /&gt;became true - almost.&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic; font-weight: bold;"&gt;"Wendy Brown enrolled in a high school saying&lt;br /&gt;she was 15-years-old. According to reports,&lt;br /&gt;Brown attended cheerleading practices, had&lt;br /&gt;her own locker, and went to a party at the&lt;br /&gt;coach's house.&lt;br /&gt;&lt;br /&gt;She was finally caught after the check&lt;br /&gt;she wrote for $134.50 to pay her cheerl&lt;br /&gt;eading uniform bounced causing people&lt;br /&gt;to look at her a little more closely&lt;br /&gt;and ask questions."&lt;/blockquote&gt;&lt;br /&gt;I guess the mom figured no one would&lt;br /&gt;notice her age difference?!!&lt;br /&gt;&lt;br /&gt;You may ask, what about the daughter &amp;amp;&lt;br /&gt;her teenage friends noticing?&lt;br /&gt;&lt;br /&gt;Well, the 15 year old daughter lives out of&lt;br /&gt;state with her grandmother and evidently&lt;br /&gt;had no idea mom was impersonating her.&lt;br /&gt;&lt;br /&gt;So, our &lt;a href="http://idtheftsecrets.blogspot.com/2008/09/woman-steals-daughters-identity-to.html"&gt;tip for today&lt;/a&gt; is to guard well your&lt;br /&gt;personal identity and to be on the watch&lt;br /&gt;for unfortunately scandalous relatives who&lt;br /&gt;like the Wisconsin mother, hold no limits&lt;br /&gt;to committing fraud in someone else's&lt;br /&gt;good name.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;span style="font-weight: bold;"&gt;PS: Make sure to be a good relative or friend&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;and &lt;/span&gt;&lt;a style="font-weight: bold;" href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=508790556201519311"&gt;share this latest identity theft&lt;/a&gt;&lt;span style="font-weight: bold;"&gt; prevention&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;tip.  Also, to receive automatic, spam free updates&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;of &lt;/span&gt;&lt;a style="font-weight: bold;" href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;future identity theft secrets&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;, check out our easy&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;subscriber options in the upper left hand of this&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;page.&lt;/span&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">6</thr:total></item><item><title>Feds Indict  11 in Biggest Ever Identity Theft Case</title><link>http://idtheftsecrets.blogspot.com/2008/08/feds-indict-11-in-biggest-ever-identity.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sat, 9 Aug 2008 02:44:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-6815672926632064218</guid><description>&lt;span style="font-style: italic; font-weight: bold;font-size:85%;" &gt;As a follow up to our original 2007 story on&lt;br /&gt;the Identity &lt;a href="http://idtheftsecrets.blogspot.com/2007/01/identity-theft-to-maxx.html"&gt;"Theft to the Maxx"&lt;/a&gt; large scale&lt;br /&gt;data breach effecting 40 million consumers,&lt;br /&gt;a federal court this past week charged a fraud&lt;br /&gt;gang responsible for data breaches involving&lt;br /&gt;nine major retailers.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://farm4.static.flickr.com/3232/2745707415_4bcb209e78_m.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 200px;" src="http://farm4.static.flickr.com/3232/2745707415_4bcb209e78_m.jpg" alt=" Feds Indict 11 in Biggest Ever Identity Theft Case" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;11 people, including even a confidential informant&lt;br /&gt;working for the Secret Service, were charged in&lt;br /&gt;connection with a case involving illegally tapping&lt;br /&gt;into the wireless payment processing systems&lt;br /&gt;of the following retail outlets:&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;TJX (TJ Max)&lt;/li&gt;&lt;li&gt;OfficeMax&lt;/li&gt;&lt;li&gt;Boston Market&lt;/li&gt;&lt;li&gt;Barnes &amp;amp; Noble&lt;/li&gt;&lt;li&gt;Sport's Authority&lt;/li&gt;&lt;li&gt;DSW&lt;/li&gt;&lt;li&gt;Forever 21&lt;/li&gt;&lt;li&gt;BJ's Wholesale Club&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;Besides tapping into the wireless networks of&lt;br /&gt;these major retailers, the thieves were successful&lt;br /&gt;in setting up programs that &lt;a href="http://www.insurancejournal.com/news/national/2008/08/07/92585.htm"&gt;captured card numbers&lt;/a&gt;,&lt;br /&gt;passwords and account information from a massive&lt;br /&gt;amount of unsuspecting consumers.&lt;br /&gt;&lt;br /&gt;While &lt;a href="http://finance.yahoo.com/q?s=TJX"&gt;TJX&lt;/a&gt; admitted to &lt;span style="font-weight: bold; font-style: italic;"&gt;45 million&lt;/span&gt; consumers were&lt;br /&gt;negatively impacted from the two year period&lt;br /&gt;the identity thieves had unauthorized access to&lt;br /&gt;their payment processing data, court documents&lt;br /&gt;revealed the real estimate was closer to 100&lt;br /&gt;million consumers confidential &lt;a href="http://www.insurancejournal.com/news/national/2008/08/07/92585.htm"&gt;data was compromised&lt;/a&gt;&lt;br /&gt;based on depositions by Visa and Mastercard.&lt;br /&gt;&lt;br /&gt;The ring leader, a Miami man who was also the&lt;br /&gt;confidential informant for the Secret Service,&lt;br /&gt;turned out to be a &lt;a href="http://www.insurancejournal.com/news/national/2008/08/07/92585.htm"&gt;double agent&lt;/a&gt; who had been&lt;br /&gt;providing criminals information about ongoing&lt;br /&gt;investigations and tipping off associates.&lt;br /&gt;&lt;br /&gt;With the massive amount of credit account&lt;br /&gt;access information stolen and provided to&lt;br /&gt;worldwide identity thieves, this case involving&lt;br /&gt;TJX has a big impact in our personal identity&lt;br /&gt;and financial safety.&lt;br /&gt;&lt;br /&gt;So, our &lt;a href="http://idtheftsecrets.blogspot.com/2008/08/feds-indict-11-in-biggest-ever-identity.html"&gt;tip for today&lt;/a&gt; is contact your Visa or&lt;br /&gt;Mastercard issuer and request a replacement&lt;br /&gt;account number as well as the capability to&lt;br /&gt;have "alias" number issuance for when you&lt;br /&gt;conduct business online.&lt;br /&gt;&lt;br /&gt;Additionally, make sure you select a credit&lt;br /&gt;monitoring service to alert you to any&lt;br /&gt;unauthorized transactions and/or over a&lt;br /&gt;certain threshold amount to keep the chances&lt;br /&gt;of identity theft credit fraud from damaging&lt;br /&gt;your financial future.&lt;br /&gt;&lt;br /&gt;Finally, be a good friend and &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=6815672926632064218"&gt;share this tip&lt;/a&gt;&lt;br /&gt;with them so they too can &lt;a href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;fight back against&lt;br /&gt;identity theft&lt;/a&gt;.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://farm4.static.flickr.com/3232/2745707415_4bcb209e78_t.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">9</thr:total></item><item><title>BoNY 4.5 Million Consumer's Data Loss</title><link>http://idtheftsecrets.blogspot.com/2008/05/bony-45-million-consumers-data-loss.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sat, 31 May 2008 11:31:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-7609412689961955405</guid><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://farm3.static.flickr.com/2374/2538779085_2ceacf2ba5_m.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 200px;" src="http://farm3.static.flickr.com/2374/2538779085_2ceacf2ba5_m.jpg" alt=" BoNY 4.5 Million Consumer's Data Loss" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;&lt;br /&gt;&lt;br /&gt;This just in from the "when will they ever learn" file.&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;The Bank of New York (BNY Mellon) waited 8 weeks&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;after the Connecticut legal requirement to inform the&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;public of this very serious data loss involving personal&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;information which was unencrypted.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;blockquote&gt;"On February 27, 2009, BNY Mellon was&lt;br /&gt;transferring a load of computer tapes&lt;br /&gt;containing information including names,&lt;br /&gt;addresses, dates of birth and Social&lt;br /&gt;Security numbers, when it lost a tape&lt;br /&gt;carrying data on about 4.5 million people.&lt;br /&gt;&lt;br /&gt;Under Connecticut state law, banks are&lt;br /&gt;required to immediately notify customers&lt;br /&gt;when such information is l&lt;a href="http://www.ct.gov/governorrell/cwp/view.asp?A=3293&amp;amp;Q=416106"&gt;ost&lt;/a&gt;, but BNY Mellon&lt;br /&gt;did not notify People’s of the true extent of the&lt;br /&gt;breach until mid-May, some eight weeks later."&lt;/blockquote&gt;&lt;br /&gt;This is the second major data loss incident this&lt;br /&gt;year for the Bank of New York who &lt;a href="http://www.bnymellon.com/about/index.html"&gt;is&lt;/a&gt; the world's&lt;br /&gt;largest custodian of assets.&lt;br /&gt;&lt;br /&gt;According to a &lt;a href="http://www.pittsburghlive.com:8000/x/pittsburghtrib/business/s_570347.html"&gt;statement&lt;/a&gt; released by the bank&lt;br /&gt;involving this second data security breach on&lt;br /&gt;April 29th:&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;"... a backup data-storage tape containing&lt;br /&gt;images of scanned checks and other payment&lt;br /&gt;documents was lost while being moved from&lt;br /&gt;Philadelphia to Pittsburgh, spokesmen for&lt;br /&gt;the bank said Friday. It involved data of&lt;br /&gt;47 institutional clients..."&lt;/blockquote&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Two time loser overall and two time loser&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;of unencrypted data.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Even worse, with BoNY apparently violating&lt;br /&gt;a Connecticut law by failing to report&lt;br /&gt;the data breach within the required&lt;br /&gt;timely manner, it has now brought the&lt;br /&gt;wrath of the states' governor who requested&lt;br /&gt;subpoenas to be issued related to the loss of&lt;br /&gt;bank customer data being transported.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Compounding the multiple events of data loss&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;of unencrypted, highly sensitive consumer data&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;is the suspicion that BoNY attempted to break&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;the law by not informing consumers in a timely&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;manner.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Is it perhaps because BoNY Mellon did not actually&lt;br /&gt;know just who's data was lost so they were unable&lt;br /&gt;to notify the correct individuals negatively impacted&lt;br /&gt;by these &lt;a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;articleId=9091318&amp;amp;source=NLT_PM&amp;amp;nlid=8"&gt;data losses&lt;/a&gt;?:&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;"We'd like to provide people with a more current&lt;br /&gt;characterization [of what happened], but we are&lt;br /&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt;not yet in a position to make that available,&lt;/span&gt;"&lt;br /&gt;said BNY Mellon spokesman Ron Sommer. "Our&lt;br /&gt;intention is to make it available as soon as we can."&lt;/blockquote&gt;&lt;br /&gt;Well it seems the governor also wants the facts&lt;br /&gt;straight for the record as well:&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;"... subpoenas seek details about the extent of&lt;br /&gt;the data breach, the timeline and conditions&lt;br /&gt;surrounding the tape loss, copies of any law&lt;br /&gt;enforcement or security reports filed&lt;br /&gt;following the loss, the names and addresses&lt;br /&gt;of all Connecticut customers whose names&lt;br /&gt;were included in any &lt;a href="http://www.ct.gov/governorrell/cwp/view.asp?A=3293&amp;amp;Q=416106"&gt;of&lt;/a&gt; the missing files and&lt;br /&gt;other pertinent facts."&lt;/blockquote&gt;&lt;br /&gt;Meanwhile, a class action lawsuit has been&lt;br /&gt;filed seeking 7 years of credit monitoring&lt;br /&gt;services for the 40 individuals represented.&lt;br /&gt;&lt;br /&gt;The Bank of New York (BNY Mellon Corp.)&lt;br /&gt;has, to their credit, &lt;span style="font-weight: bold;"&gt;offered 1 year of free&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;credit monitoring services&lt;/span&gt; to any one&lt;br /&gt;who has been negatively impacted.&lt;br /&gt;&lt;br /&gt;So, our &lt;a href="http://idtheftsecrets.blogspot.com/2008/05/bony-45-million-consumers-data-loss.html"&gt;tip for today&lt;/a&gt; is directed towards&lt;br /&gt;any of the 4,500,000 individuals who may&lt;br /&gt;have been needlessly exposed to the potential&lt;br /&gt;for identity theft and credit fraud.&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.bnymellon.com/contact/index.cfm"&gt;Contact the Bank of New York&lt;/a&gt; immediately&lt;br /&gt;to seek more information on safeguarding&lt;br /&gt;your accounts as well as to get details of&lt;br /&gt;their 1 year of  &lt;a href="http://www.bnymellon.com/pressreleases/2008/pr053008.html"&gt;free credit monitoring offer&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;(212) 495-1784 &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;   &lt;span style="font-style: italic;"&gt;-or-&lt;/span&gt; &lt;p style="font-weight: bold; text-align: left;" class="contactus"&gt;&lt;nobr&gt;(412) 234-5000&lt;/nobr&gt;&lt;/p&gt;&lt;br /&gt;Finally, make sure to &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=7609412689961955405"&gt;tell a friend or associate&lt;/a&gt;&lt;br /&gt;of this important development involving the&lt;br /&gt;opportunity for large scale &lt;a href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;identity theft&lt;/a&gt; so&lt;br /&gt;they may also seek immediate preventative&lt;br /&gt;action.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;PS:&lt;/span&gt; With such a large scale, repeated data loss&lt;br /&gt;involving the industry leader in assets data,&lt;br /&gt;credit monitoring alone will not protect you&lt;br /&gt;from identity theft - &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;here's why&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://farm3.static.flickr.com/2374/2538779085_2ceacf2ba5_t.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">11</thr:total></item><item><title>Identity Theft Hits Lifelock CEO From His Own Ads</title><link>http://idtheftsecrets.blogspot.com/2008/05/identity-theft-hits-lifelock-ceo-from.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 26 May 2008 19:22:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-3375007466097533855</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;In response to dares posed by the CEO of Lifelock, an&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Arizona firm which has run ads featuring his Social&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Security Number (SSN), an instance of identity theft&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;fraud was successfully perpetrated against &lt;a href="http://news.yahoo.com/s/ap/20080522/ap_on_hi_te/identity_fraud_flap"&gt;Todd Davis&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic;"&gt;"Davis acknowledged in an interview with The Associated&lt;br /&gt;Press that his stunt has led to at least 87 instances in which&lt;br /&gt;people have tried to steal his identity, and one succeeded:&lt;br /&gt;a guy in Texas who duped an online payday loan operation&lt;br /&gt;last year into giving him $500 using Davis' Social Security&lt;br /&gt;number.&lt;br /&gt;&lt;br /&gt;Davis learned about the fraud in Texas when the payday-&lt;br /&gt;loan outfit called to collect on the loan, he said. He didn't&lt;br /&gt;get an alert beforehand because the company didn't go&lt;br /&gt;through one of the three major credit bureaus before&lt;br /&gt;approving the transaction."&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;The &lt;a href="http://news.yahoo.com/s/ap/20080522/ap_on_hi_te/identity_fraud_flap"&gt;article&lt;/a&gt; further illustrated the danger in deliberately&lt;br /&gt;provoking identity thieves to use his widely available&lt;br /&gt;Social Security Number (SSN) as a publicity stunt in&lt;br /&gt;promoting his company's fraud prevention services&lt;br /&gt;in newspapers, on billboards, radio, &amp;amp; even MTV:&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic;"&gt;"Davis said it's possible driver's licenses have been issued&lt;br /&gt;to other people in his name because of the widespread&lt;br /&gt;availability of his personal information — and because&lt;br /&gt;of what he described as the &lt;span style="font-weight: bold;"&gt;flimsy mechanisms in&lt;br /&gt;place to &lt;/span&gt;&lt;span style="font-weight: bold;"&gt;report that kind of fraud&lt;/span&gt;."&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;Look - anyone who's been involved with studying identity&lt;br /&gt;theft from more than just a cursory perspective would&lt;br /&gt;readily understand that identity theft fraud comes in&lt;br /&gt;many forms and there are several very serious types&lt;br /&gt;of identity theft that &lt;span style="font-style: italic; font-weight: bold;"&gt;no credit bureau's profile&lt;br /&gt;report&lt;/span&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt; was ever set up to catch - let alone alert&lt;br /&gt;you to&lt;/span&gt;:&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Medical ID Theft&lt;/span&gt; - where someone uses your name and SSN&lt;br /&gt;to &lt;a href="http://idtheftsecrets.blogspot.com/2005/07/check-your-medical-records-for-id.html"&gt;obtain medical care&lt;/a&gt; often times in a busy hospital emergency&lt;br /&gt;room.  Besides the &lt;a href="http://idtheftsecrets.blogspot.com/2005/11/2-in-3-americans-concerned-over.html"&gt;medical insurance&lt;/a&gt; problems this can create&lt;br /&gt;for you, even worse your &lt;a href="http://idtheftsecrets.blogspot.com/2006/10/medical-identity-theft-threats-life.html"&gt;life can be put in peril&lt;/a&gt; as the identity&lt;br /&gt;&lt;a href="http://idtheftsecrets.blogspot.com/2006/10/medical-identity-theft-causes-man-to.html"&gt;theft fraudster&lt;/a&gt; will cause your blood type, medicine interactions,&lt;br /&gt;and allergies to be listed incorrectly on your medical records.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;SSN Fraud&lt;/span&gt; - where someone uses your social security number&lt;br /&gt;to illegally work within the U.S. which as a result you run the&lt;br /&gt;potential to have the Internal Revenue Service (IRS) send&lt;br /&gt;you a delinquent &lt;a href="http://idtheftsecrets.blogspot.com/2006/05/identity-thief-collects-tax-refund.html"&gt;tax payment&lt;/a&gt; demand due to supplemental&lt;br /&gt;income not reported on your annual tax filings.  With penalties&lt;br /&gt;and interest, you could easily be looking at a 15% - 20%&lt;br /&gt;incremental tax bill.  Ask the lady in &lt;a href="http://idtheftsecrets.blogspot.com/2006/01/how-to-avoid-million-dollar-tax-bill.html"&gt;California who was served&lt;br /&gt;a demand to pay a $1,000,000 back taxes bill.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Criminal Arrest Identity Theft&lt;/span&gt; - where a criminal uses your name&lt;br /&gt;and SSN upon their &lt;a href="http://idtheftsecrets.blogspot.com/2005/08/identity-theft-prevention-your-driving.html"&gt;arrest to avoid any prior offenses from showing&lt;/a&gt;&lt;br /&gt;up.  The result of this fraud perpetrated against your good name,&lt;br /&gt;though, is you now have just entered the vast criminal information&lt;br /&gt;network.  Any unpaid parking tickets or failure to appear in court&lt;br /&gt;notices listed under your name will lead to a potential &lt;a href="http://idtheftsecrets.blogspot.com/2007/11/identity-theft-can-put-you-in-jail.html"&gt;arrest warrant&lt;/a&gt;&lt;br /&gt;that can easily render you &lt;a href="http://idtheftsecrets.blogspot.com/2006/08/truck-driver-loses-his-license-due-to.html"&gt;time in jail and job loss&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;One of our long time editors, took the proactive step to check his&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;public information profile and was alarmed to find out a &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;convicted&lt;/a&gt;&lt;/span&gt;&lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;&lt;br /&gt;&lt;/a&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;&lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;felon in Ohio shared the same first and last name&lt;/a&gt; (different middle&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;initial).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;He could have &lt;a href="http://idtheftsecrets.blogspot.com/2007/11/identity-theft-can-put-you-in-jail.html"&gt;easily been mistaken for the criminal&lt;/a&gt; who had been&lt;br /&gt;convicted of assault and battery, but had skipped his bail hearing&lt;br /&gt;and was eventually apprehended.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;So, our &lt;a href="http://idtheftsecrets.blogspot.com/2008/05/identity-theft-hits-lifelock-ceo-from.html"&gt;tip for today&lt;/a&gt; is twofold.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Unlike the CEO of Lifelock, &lt;span style="font-weight: bold;"&gt;remove your social security number&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;from your wallet or purse&lt;/span&gt; to eliminate the potential for an identity&lt;br /&gt;thief to gain easy access.&lt;br /&gt;&lt;br /&gt;Secondly, get your &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;public information profile (pip)&lt;/a&gt; and review it&lt;br /&gt;for any instances of whether an identity theft &lt;a href="http://idtheftsecrets.blogspot.com/2005/11/identity-theft-prevention-with-public.html"&gt;fraudster&lt;/a&gt; has&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;already committed acts against your good reputation&lt;br /&gt;and&lt;/span&gt;&lt;span style="font-weight: bold;"&gt; social security number with medical or criminal&lt;br /&gt;identity&lt;/span&gt;&lt;span style="font-weight: bold;"&gt; theft.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;These simple, effective steps will immeasurably &lt;a href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;lower your&lt;br /&gt;potential for identity theft.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;PS: Make sure to &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=3375007466097533855"&gt;tell a friend&lt;/a&gt; about this important development&lt;br /&gt;in the war against &lt;a href="http://idtheftsecrets.blogspot.com/2008/05/identity-theft-hits-lifelock-ceo-from.html"&gt;identity theft scams&lt;/a&gt; and credit fraud.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">8</thr:total></item><item><title>LendingTree Sues over Data Breach</title><link>http://idtheftsecrets.blogspot.com/2008/05/lendingtree-sues-over-data-breach.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Tue, 6 May 2008 18:48:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-891105437328086509</guid><description>&lt;span style="font-weight: bold; font-style: italic;font-size:85%;" &gt;Two former Vice Presidents of LendingTree are alleged to&lt;br /&gt;have stolen customer passwords which subsequently allowed&lt;br /&gt;up to 5 home loan lenders to gain unauthorized access to&lt;br /&gt;sensitive consumer information which could be used for&lt;br /&gt;identity theft.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;According to the &lt;a href="http://www.latimes.com/business/la-fi-lendingtree24apr24,1,4088698.story"&gt;LA Times&lt;/a&gt; article concerning Monday's&lt;br /&gt;lawsuit filing by LendingTree:&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;&lt;span style="font-style: italic;"&gt;Named as defendants in the lawsuit are &lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;Newport Lending Corp., related company &lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;Southern California Marketing, Sage Credit Co., &lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;Chapman Capital Inc. and Home Loan Consultants.&lt;/span&gt; &lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;&lt;/span&gt;&lt;blockquote&gt;&lt;span style="font-style: italic;"&gt;LendingTree accuses the firms of computer fraud &lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;and of using consumer records -- including Social &lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;Security numbers and income and employment &lt;/span&gt;&lt;br /&gt;&lt;span style="font-style: italic;"&gt;information -- to offer loans to its customers.&lt;/span&gt;&lt;/blockquote&gt;&lt;span style="font-style: italic;"&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;As a result, LendingTree was forced to send out&lt;br /&gt;letters recently to its customers alerting&lt;br /&gt;them to the potential for identity theft.&lt;br /&gt;&lt;br /&gt;Those effected submitted loan-qualification data&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;between October 2006 and early this year.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;While it was not disclosed exactly how many consumers&lt;br /&gt;would receive the warning letters from LendingTree,&lt;br /&gt;the number could reach into the millions as the firm&lt;br /&gt;has processed over &lt;span style="font-weight: bold;"&gt;23 million loan applications&lt;/span&gt;&lt;br /&gt;since 1998 according to the &lt;a href="http://www.latimes.com/business/la-fi-lendingtree24apr24,1,4088698.story"&gt;LA Times&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Even LendingTree, on their company &lt;a href="http://www.lendingtree.com/stmrc/privacy.asp?inline=true#c"&gt;website&lt;/a&gt;, warns&lt;br /&gt;consumers of the inevitable unsecure nature of data&lt;br /&gt;and the need to take proactive steps to protect it:&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic;"&gt;"...although we take steps to secure your information,&lt;br /&gt;we do not promise, and you should not expect, that&lt;br /&gt;your personal information, searches, or other&lt;br /&gt;communications will always remain secure. Users&lt;br /&gt;should also take care with how they handle and&lt;br /&gt;disclose their personal information."&lt;/blockquote&gt;&lt;br /&gt;So, our &lt;a href="http://idtheftsecrets.blogspot.com/2008/05/lendingtree-sues-over-data-breach.html"&gt;tip for today&lt;/a&gt; is for any consumers who have&lt;br /&gt;utilized LendingTree's on-line loan application process&lt;br /&gt;during the period of October, 2006 through March of&lt;br /&gt;this year.  &lt;a href="http://www.lendingtree.com/stm3/aboutlt/contactus.asp"&gt;Contact LendingTree&lt;/a&gt; immediately if you&lt;br /&gt;suspect your personal data has been part of the group&lt;br /&gt;which was compromised during this time period.&lt;br /&gt;&lt;br /&gt;LendingTree can be reached toll free at&lt;br /&gt;&lt;br /&gt;          &lt;span style="font-weight: bold;"&gt;1-800-555-TREE&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;          &lt;a href="http://www.lendingtree.com/stm3/contactus/contactus-email.asp"&gt;Contact Us Form&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;          &lt;a href="http://www.lendingtree.com/stm3/aboutlt/contactus.asp"&gt;Company Chat Agent&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Finally, please let a &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=891105437328086509"&gt;friend&lt;/a&gt; or &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=891105437328086509"&gt;associate&lt;/a&gt; know of this&lt;br /&gt;important development in the war against &lt;a href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;identity&lt;br /&gt;theft&lt;/a&gt; and unauthorized access to sensitive personal&lt;br /&gt;information.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">5</thr:total></item><item><title>Identity Theft Justice Extremes</title><link>http://idtheftsecrets.blogspot.com/2008/04/identity-theft-justice-extremes.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 13 Apr 2008 15:20:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-3766392133490397947</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;In a bizarre twist to two cases of identity&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;theft, one perpetrator faces a life sentence&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;while another has their previous conviction&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;over turned by the courts.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Maryland's highest court overturned&lt;br /&gt;&lt;a href="http://www.topix.net/content/trb/2008/04/identity-theft-conviction-overturned"&gt;yesterday&lt;/a&gt; a Howard County man's conviction&lt;br /&gt;on identity theft charges, ruling that the&lt;br /&gt;state law is ambiguous and can't be used&lt;br /&gt;to prosecute someone who takes the identity&lt;br /&gt;of a fictitious person.&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic;"&gt;"Two of the seven judges dissented, arguing&lt;br /&gt;that legislators could not have intended the&lt;br /&gt;"illogical result" of allowing a perpetrator to&lt;br /&gt;escape prosecution by using a &lt;a href="http://www.baltimoresun.com/news/local/bal-md.identity11apr11,0,2159359.story?track=rss"&gt;fake&lt;/a&gt; identity."&lt;/blockquote&gt;&lt;br /&gt;Crazy isn't that judges would allow a convicted&lt;br /&gt;identity theft criminal to go free while in the&lt;br /&gt;next case you will see the opposite end of the&lt;br /&gt;spectrum represented within the same state&lt;br /&gt;of Maryland.&lt;br /&gt;&lt;br /&gt;Meanwhile, in Anne Arundel County, a woman&lt;br /&gt;is facing the prospect of a life behind bars after&lt;br /&gt;pleading guilty of aggravated &lt;a href="http://wjz.com/local/identity.theft.2.698265.html"&gt;identity theft&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;It seems, according to the case investigators,&lt;br /&gt;the identity thief used her victim's lost wallet&lt;br /&gt;and identity to get narcotic pain medication&lt;br /&gt;from 85 hospitals and health care providers&lt;br /&gt;throughout 11 different states across America.&lt;br /&gt;&lt;br /&gt;Two different cases, same state, with polar&lt;br /&gt;extremes to the justice ultimately rendered&lt;br /&gt;for identity theft victims.&lt;br /&gt;&lt;br /&gt;So, &lt;a href="http://idtheftsecrets.blogspot.com/2008/04/identity-theft-justice-extremes.html"&gt;our tip for today&lt;/a&gt; is to not count on the&lt;br /&gt;justice system to always work in your favor&lt;br /&gt;should you become an identity theft victim.&lt;br /&gt;&lt;br /&gt;Take proactive care of your own financial&lt;br /&gt;freedom by guarding against identity theft&lt;br /&gt;from ever happening to you.&lt;br /&gt;&lt;br /&gt;Seek out, especially for medical identity theft,&lt;br /&gt;a solution to catch the often times &lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;hard to catch&lt;/a&gt;&lt;br /&gt;criminal activity against your good reputation.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;Remember&lt;/a&gt;, its up to you to take the first steps&lt;br /&gt;to insure your chances of becoming an identity&lt;br /&gt;theft victim do not need to rely upon the courts&lt;br /&gt;to remedy you after its too late.&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">4</thr:total></item><item><title>Identity Theft Ranking of Corporate America</title><link>http://idtheftsecrets.blogspot.com/2008/03/identity-theft-ranking-of-corporate.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Tue, 11 Mar 2008 13:45:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-6872090306578095240</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Consumers really have no reliable way to determine&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;the relative safety of their business and banking&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;relationships against identity theft.  With the lack&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;of widely available public information available,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;the average citizen faces a diminished ability to&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;discern which institutions are actively competing&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;to protect you from identity theft.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: rgb(153, 0, 0); font-weight: bold;"&gt;That is until just now.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;According to a recent story published by the&lt;br /&gt;&lt;a href="http://bits.blogs.nytimes.com/2008/02/27/ranking-corporate-america-on-identity-theft/index.html?ex=1362027600&amp;amp;en=80dad2c3bf4a2a58&amp;amp;ei=5088&amp;amp;partner=rssnyt&amp;amp;emc=rss"&gt;New York Times&lt;/a&gt; based on an original paper&lt;br /&gt;published by consumer advocate &lt;a href="http://repositories.cdlib.org/bclt/lts/44/"&gt;Chris Hoofnagle&lt;/a&gt;,&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;"... some institutions have a far greater&lt;br /&gt;incidence&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; of identity theft than others."&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://farm3.static.flickr.com/2204/2326912559_d23e749d46.jpg?v=0"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 320px;" src="http://farm3.static.flickr.com/2204/2326912559_d23e749d46.jpg?v=0" alt="Identity Theft Ranking of Corporate America" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;You might recall, as we had previously reported,&lt;br /&gt;that until &lt;a href="http://idtheftsecrets.blogspot.com/2006/01/choicepoint-identity-theft-to-cost.html"&gt;2005&lt;/a&gt; there really was no nationally&lt;br /&gt;binding law which required companies to disclose&lt;br /&gt;identity theft or major security breach incidents&lt;br /&gt;to the general public.&lt;br /&gt;&lt;br /&gt;For years, private banks and businesses could&lt;br /&gt;keep the magnitude and frequency of fraudulent&lt;br /&gt;account activity hidden from the public at large.&lt;br /&gt;&lt;br /&gt;Big banks and other businesses would rather&lt;br /&gt;keep you uninformed of those losses suffered&lt;br /&gt;by millions of account holders nationwide.&lt;br /&gt;Instead of funding more proactive ways to&lt;br /&gt;combat fraud and identity theft, the general&lt;br /&gt;trend was to pour more money into advertising&lt;br /&gt;and brand promotion as means to simply over&lt;br /&gt;power any negative perceptions associated with&lt;br /&gt;incidents that became too large for segments of&lt;br /&gt;the population and the mass media to ignore.&lt;br /&gt;&lt;br /&gt;However, in 2005 everything changed with the&lt;br /&gt;landmark legislation requiring companies to&lt;br /&gt;publicly disclose within 30 days incidents of&lt;br /&gt;security breaches negatively impacting&lt;br /&gt;consumer information.&lt;br /&gt;&lt;br /&gt;Since that time, over 125 million Americans&lt;br /&gt;have been the innocent victims of unauthorized&lt;br /&gt;exposure of their sensitive consumer information&lt;br /&gt;such as social security numbers, credit information,&lt;br /&gt;etc.&lt;br /&gt;&lt;br /&gt;Now let's roll the calendar forward to current day&lt;br /&gt;2008.&lt;br /&gt;&lt;br /&gt;While some industry trade research has indicated&lt;br /&gt;identity theft to be &lt;a href="http://www.consumeraffairs.com/news04/2007/02/ftc_top10_folo.html"&gt;on the decline&lt;/a&gt;, the official&lt;br /&gt;government watchdog's statistics paint a different&lt;br /&gt;picture:&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic;"&gt;The Federal Trade Commission reported last&lt;br /&gt;month that calls about identity theft to&lt;br /&gt;its consumer complaint hotline constituted&lt;br /&gt;36 percent of all calls last year — little changed&lt;br /&gt;from 37 percent in 2005 according to the &lt;a href="http://www.nytimes.com/2007/03/21/business/21identity.html?_r=1&amp;amp;oref=slogin"&gt;New&lt;br /&gt;York Times.&lt;/a&gt;&lt;/blockquote&gt;&lt;br /&gt;The banking industry tends to believe there&lt;br /&gt;has already been enough disclosure, &lt;a href="http://www.nytimes.com/2007/03/21/business/21identity.html?_r=1&amp;amp;oref=slogin"&gt;however:&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic;"&gt;Doug Johnson, a senior policy adviser at&lt;br /&gt;the American Bankers Association, an&lt;br /&gt;industry trade group, said that revealing&lt;br /&gt;internal bank data on identity theft would&lt;br /&gt;not do much to help fight the problem.&lt;br /&gt;&lt;br /&gt;He said that it might actually distract&lt;br /&gt;financial institutions, &lt;span style="font-weight: bold;"&gt;which now privately&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;share information among themselves&lt;/span&gt; and&lt;br /&gt;collaborate to fashion antifraud techniques.&lt;/blockquote&gt;&lt;br /&gt;So, &lt;a href="http://idtheftsecrets.blogspot.com/2008/03/identity-theft-ranking-of-corporate.html"&gt;our tip for today&lt;/a&gt; is for you to be the&lt;br /&gt;judge of where to conduct financial related&lt;br /&gt;business based on &lt;span style="font-weight: bold;"&gt;safety to account holders&lt;/span&gt;.&lt;br /&gt;Take a look at the chart as well as the original&lt;br /&gt;&lt;a href="http://repositories.cdlib.org/bclt/lts/44/"&gt;full report&lt;/a&gt; by Mr. Hoofnagle and decide on your&lt;br /&gt;own.&lt;br /&gt;&lt;br /&gt;We simply, in this case, provide the access to&lt;br /&gt;you being a more informed consumer in fighting&lt;br /&gt;back against identity theft and consumer fraud.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;PS: Make sure to &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=6872090306578095240"&gt;tell a friend&lt;/a&gt; or associate about&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;this &lt;a href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;identity theft prevention tip&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">7</thr:total></item><item><title>Credit Bureau Alleges Lifelock Identity Theft Service is Fraud</title><link>http://idtheftsecrets.blogspot.com/2008/02/credit-bureau-alleges-lifelock-identity.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Thu, 28 Feb 2008 21:38:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-486564158256676014</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Credit-reporting agency Experian has filed a lawsuit &lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;against identity theft services company Lifelock, &lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;charging it with "misleading advertising and fraud.&lt;/span&gt;&lt;/span&gt;"&lt;br /&gt;&lt;br /&gt;Additionally, Lifelock, allegedly placed fraud alerts&lt;br /&gt;illegally on credit files maintained by Experian.&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://farm4.static.flickr.com/3065/2299137997_9552c004f5.jpg?v=0"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 200px;" src="http://farm4.static.flickr.com/3065/2299137997_9552c004f5.jpg?v=0" alt=" Credit Bureau Alleges Lifelock Identity Theft Service is Fraud" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://experian.global-pressoffice.com/documents/showdoc.cfm?doc=3037"&gt;Experian’s lawsuit claims&lt;/a&gt; that LifeLock is engaging&lt;br /&gt;in deceptive and fraudulent behavior by adding&lt;br /&gt;hundreds of thousands of fraud alerts every 90&lt;br /&gt;days to Experian’s consumer credit database in&lt;br /&gt;a manner that was not intended by Congress when&lt;br /&gt;it implemented the federal Fair Credit Reporting&lt;br /&gt;Act (FCRA).&lt;br /&gt;&lt;br /&gt;The complaint alleges that &lt;span style="font-weight: bold;"&gt;corporations are &lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;specifically prohibited from adding fraud&lt;br /&gt;alerts&lt;/span&gt; to consumer credit files and that LifeLock’s&lt;br /&gt;service uses consumers’ free yearly allocation of credit&lt;br /&gt;reports &lt;span style="font-weight: bold;"&gt;without adequate disclosure&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;The heart of the Experian complaint and the media&lt;br /&gt;counter attack from Lifelock is about money.  While&lt;br /&gt;Experian certainly has made some valid points in their&lt;br /&gt;complaint, let's face it Lifelock's revenue stream comes&lt;br /&gt;at the expense of the credit bureaus.&lt;br /&gt;&lt;br /&gt;With over 700,000 members paying $10 monthly, according&lt;br /&gt;to Lifelock, that's over &lt;span style="font-weight: bold;"&gt;$80 million in annual revenue.&lt;/span&gt;  Now,&lt;br /&gt;combine that with the $25 million in &lt;a href="http://www.lifelock.com/about-us/press-room/2008-press-releases/lifelock-receives-$25-million-in-series-c-funding"&gt;venture funding Lifelock&lt;/a&gt;&lt;br /&gt;announced last month and - well you get the picture - especially&lt;br /&gt;if you work at Experian.  By the way, Experian markets their own&lt;br /&gt;&lt;a href="http://www.consumerinfo.com/"&gt;credit monitoring service&lt;/a&gt; as a means for consumers to protect&lt;br /&gt;against identity theft.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-style: italic;font-size:85%;" &gt;&lt;span style="font-weight: bold;"&gt;How is the consumer's best interest being served in all of this&lt;br /&gt;public&lt;/span&gt;&lt;span style="font-weight: bold;"&gt; squabbling over which company is wrong or right?&lt;br /&gt;What should&lt;/span&gt;&lt;span style="font-weight: bold;"&gt; the average citizen do?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Well, let's take a closer look at Experian's complaint.&lt;br /&gt;&lt;br /&gt;The &lt;a href="http://en.wikipedia.org/wiki/FCRA"&gt;Fair Credit Reporting Act (FCRA)&lt;/a&gt; is a federal law&lt;br /&gt;which provides several rights to protect consumers and&lt;br /&gt;their credit information. While, we're not lawyers here,&lt;br /&gt;Experian raises an interesting point against Lifelock's&lt;br /&gt;business model if in fact they are illegally placing fraud&lt;br /&gt;alert requests.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Furthermore, if the average citizen knew they could request a&lt;br /&gt;fraud alert&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; themselves, thereby cutting out the middle man&lt;br /&gt;(Lifelock), why would&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; there even be grounds for Experian's&lt;br /&gt;lawsuit.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;While not taking sides, we can definitely inform our readers that&lt;br /&gt;from a review of the Experian complaint, Lifelock appears to be&lt;br /&gt;deriving revenue by &lt;a href="http://www.lifelock.com/lifelock-for-people/what-we-do/how-does-lifelock-protect-my-identity"&gt;taking advantage&lt;/a&gt; of the following services&lt;br /&gt;which are &lt;span style="font-weight: bold;"&gt;free and/or can be&lt;/span&gt;&lt;span style="font-weight: bold;"&gt; directly ordered by any&lt;br /&gt;consumer&lt;/span&gt; armed with the proper contact information:&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.lifelock.com/lifelock-for-people/what-we-do/how-does-lifelock-protect-my-identity"&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;&lt;/a&gt;&lt;blockquote style="font-style: italic;"&gt;&lt;a href="http://www.lifelock.com/lifelock-for-people/what-we-do/how-does-lifelock-protect-my-identity"&gt;&lt;span style="font-weight: bold;"&gt;Junk Mail Restricted&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;On the next business day after our request:&lt;br /&gt;You will be sent an email from us stating that&lt;br /&gt;we have processed the request to remove&lt;br /&gt;your name from Junk Mail lists. Not only is&lt;br /&gt;junk mail annoying, statistics show it’s also&lt;br /&gt;one of the most common ways thieves hijack&lt;br /&gt;your identity.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.lifelock.com/lifelock-for-people/what-we-do/how-does-lifelock-protect-my-identity"&gt;&lt;span style="font-weight: bold;"&gt;Pre-approved credit offers blocked&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;You will be sent an email from us saying that&lt;br /&gt;we've asked for you to be removed from&lt;br /&gt;pre-approved credit offer lists. Like junk mail,&lt;br /&gt;by blocking irritating offers, we also block one&lt;br /&gt;of the avenues thieves use to steal your identity.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.lifelock.com/lifelock-for-people/what-we-do/how-does-lifelock-protect-my-identity"&gt;&lt;span style="font-weight: bold;"&gt;Credit bureaus contacted&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Within 24 hours of our request:&lt;br /&gt;You will receive an email from us stating that&lt;br /&gt;fraud alerts have been requested on your behalf.&lt;br /&gt;When fraud alerts are established with the major&lt;br /&gt;credit bureaus, creditors are required to verify&lt;br /&gt;your identity before opening any new lines of&lt;br /&gt;credit, issuing new cards or increasing your credit limit.&lt;br /&gt;&lt;br /&gt;LifeLock orders credit reports  You will receive an&lt;br /&gt;email from us stating that your credit reports have&lt;br /&gt;been ordered on your behalf from the major credit&lt;br /&gt;bureaus. Your reports will be sent directly to you.&lt;br /&gt;&lt;br /&gt;&lt;a style="font-weight: bold;" href="http://www.lifelock.com/lifelock-for-people/how-we-do-it/what-is-a-fraud-alert"&gt;What is a Fraud Alert?&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Usually within an hour of your enrollment as&lt;br /&gt;a member of LifeLock, we request alerts be&lt;br /&gt;set on all of your credit reports at Equifax,&lt;br /&gt;Experian and TransUnion. Within a week&lt;br /&gt;or two after enrolling, these major credit&lt;br /&gt;bureaus will send you credit reports showing&lt;br /&gt;your alerts are in place.&lt;/blockquote&gt;&lt;br /&gt;So, &lt;a href="http://idtheftsecrets.blogspot.com/2008/02/credit-bureau-alleges-lifelock-identity.html"&gt;our tip for today&lt;/a&gt; is two fold.  Before considering&lt;br /&gt;services from Lifelock, take &lt;span style="font-weight: bold;"&gt;a close look&lt;/span&gt; at what&lt;br /&gt;you actually can get by directly engaging the&lt;br /&gt;sources:&lt;br /&gt;&lt;br /&gt;&lt;a href="http://idtheftsecrets.blogspot.com/2005/08/id-theft-prevention-using-opt-out-with.html"&gt;&lt;span style="font-weight: bold;"&gt;Junk Mail Restricted&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.dmachoice.org/consumerassistance.php"&gt;DMA’s Mail Preference Service&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://idtheftsecrets.blogspot.com/2005/09/reduce-identity-theft-using-your.html"&gt;Pre-Approved Credit Offers Restricted&lt;/a&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="http://www.optoutprescreen.com/"&gt;www.optoutprescreen.com&lt;/a&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;1-888-5-OPTOUT (1-888-567-8688)&lt;br /&gt;&lt;/span&gt;&lt;a href="https://www.experian.com/consumer/cac/InvalidateSession.do?code=SECURITYALERT"&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Fraud Alerts Placed with Credit Bureaus&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://idtheftsecrets.blogspot.com/2005/05/how-can-i-get-my-free-credit-report.html"&gt;&lt;span style="font-weight: bold;"&gt;Free Credit Reports&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="https://www.annualcreditreport.com/"&gt;AnnualCreditReport.com&lt;/a&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;1-877-322-8228&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Finally, as part of our second tip, make sure&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;to check out the rest of our &lt;a href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;website&lt;/a&gt; to find&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;the many other no or low cost options you&lt;/span&gt;&lt;br /&gt;can leverage against would be identity thieves.&lt;br /&gt;&lt;br /&gt;Remember, only a &lt;span style="font-weight: bold;"&gt;portion of all identity theft&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;cases are the result of someone getting&lt;br /&gt;access&lt;/span&gt;&lt;span style="font-weight: bold;"&gt; to your credit information&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.mypublicinfo.com/default.aspx?aid=063999"&gt;Medical, criminal, &amp;amp; public information is more&lt;br /&gt;accessible and vastly harder to detect abuses&lt;br /&gt;against than a credit file.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;So, make sure to also &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=486564158256676014"&gt;tell a friend&lt;/a&gt; about this&lt;br /&gt;important new development in identity theft&lt;br /&gt;prevention tips.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">11</thr:total></item><item><title>Identity Thief Top 10 List Suspect Caught</title><link>http://idtheftsecrets.blogspot.com/2008/02/identity-thief-top-10-list-suspect.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 24 Feb 2008 13:33:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-2953446029989193280</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;In Phoenix, AZ, a 24 year old woman was apprehended&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;for multiple counts of identity theft across three different&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;cities.  &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;It seems, &lt;a href="http://www.abc15.com/news/local/story.aspx?content_id=45d18c80-45e3-44b1-a2e3-0dd2a84a3004"&gt;this woman&lt;/a&gt; committed her first act of&lt;br /&gt;identity theft when she stole a purse from a woman's&lt;br /&gt;car when she was dropping her child off at daycare.&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://farm4.static.flickr.com/3181/2289704202_aa344b3f03.jpg?v=0"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 200px;" src="http://farm4.static.flickr.com/3181/2289704202_aa344b3f03.jpg?v=0" alt="Identity Thief Top 10 List Suspect Caught" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;According to a recent survey by &lt;a href="http://www.javelinstrategy.com/"&gt;Javelin Strategy&lt;/a&gt;,&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;33% of all identity theft cases which occurred&lt;br /&gt;in 2007&lt;/span&gt;&lt;span style="font-weight: bold;"&gt; were the result of a lost or stolen wallet,&lt;br /&gt;checkbook, &amp;amp;&lt;/span&gt;&lt;span style="font-weight: bold;"&gt; credit cards&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;So, &lt;a href="http://idtheftsecrets.blogspot.com/2008/02/identity-thief-top-10-list-suspect.html"&gt;our tip for today&lt;/a&gt;, is to be on the guard against those&lt;br /&gt;identity thieves who spot opportunities to steal your&lt;br /&gt;valuable personal data when you are distracted.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;&lt;/span&gt;&lt;blockquote&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;Don't ever leave your purse, cellphone, etc. in&lt;br /&gt;your car&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; without you being there as it only&lt;br /&gt;takes minutes for a&lt;/span&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt; desperate criminal to&lt;br /&gt;make you their next victim.&lt;/span&gt;&lt;/blockquote&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;&lt;/span&gt;&lt;br /&gt;But, identity theft will impact you with hundreds of hours&lt;br /&gt;to clear your good name from the thousands of dollars of&lt;br /&gt;financial damage an identity thief typically will cause.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;Finally, be a good friend and &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=2953446029989193280"&gt;tell your associates and relatives&lt;/a&gt;&lt;br /&gt;about &lt;a href="http://feeds.feedburner.com/IdTheftSecretsBlog"&gt;today's tip&lt;/a&gt; and just how &lt;span style="font-weight: bold;"&gt;quickly they can guard their&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;financial well being from dishonest identity thieves&lt;/span&gt;.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">4</thr:total></item><item><title>Identity Theft Greatest 2008 Threat From P2P File Sharing</title><link>http://idtheftsecrets.blogspot.com/2008/02/identity-theft-greatest-2008-threat.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 11 Feb 2008 11:36:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-3717601896787344332</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;While 2007 saw a record number of consumers negatively impacted,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;2008 promises to continue with an abnormally high amount of data&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;breaches as identity thieves continue to adjust their tactics to match&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;evolving information security practices.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;According to statistics published by the &lt;span style="font-weight: bold;"&gt;Identity Theft Resource&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Center&lt;/span&gt;, &lt;span class="Article_Date"&gt;&lt;span class="txt"&gt;&lt;span class="textTotal"&gt;&lt;a href="http://www.idtheftcenter.org/artman2/publish/lib_survey/Press_Release_-_2007_Breach_List.shtml"&gt;125,142,405 consumers&lt;/a&gt; were unnecessarily exposed to&lt;br /&gt;identity theft in 2007.  Folks, that's nearly 1/2 of the entire U.S.&lt;br /&gt;population.&lt;br /&gt;&lt;br /&gt;While we have reviewed a financial services industry research firm's&lt;br /&gt;claim that 2008 is forecasted to be a year of decline in terms of the&lt;br /&gt;number of aggregate data breaches involving consumer identity&lt;br /&gt;theft exposure, we believe there is considerable room for improvement.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Here's why.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;According to the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Identity Theft Assistance Center &amp;amp; the SANS&lt;br /&gt;Institute, popular P2P file sharing applications pose one of the&lt;br /&gt;single most vulnerable internet security holes to be exploited&lt;br /&gt;this year by identity thieves.&lt;br /&gt;&lt;br /&gt;From a recent &lt;a href="http://www.net-security.org/secworld.php?id=5808"&gt;Help Net Security&lt;/a&gt; article on the topic, the&lt;br /&gt;Associated Press reported that “more than 1 billion&lt;br /&gt;searches  are conducted &lt;span style="font-weight: bold;"&gt;daily&lt;/span&gt; over peer-to-peer systems.&lt;br /&gt;&lt;br /&gt;A good number involved bank names, the word &lt;span style="font-weight: bold;"&gt;“password”&lt;/span&gt;&lt;br /&gt;and other terms that appear to be attempts by would-be&lt;br /&gt;thieves to dig up other people’s sensitive documents.”&lt;br /&gt;&lt;br /&gt;Think this is just a warning only, think again as the&lt;br /&gt;&lt;a href="http://www.net-security.org/secworld.php?id=5808"&gt;Help Net Security&lt;/a&gt; article pointed out how just 3 of the&lt;br /&gt;top consumer data security breaches from 2007 were&lt;br /&gt;attributed to file sharing applications:&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;&lt;/span&gt;&lt;blockquote style="font-style: italic;"&gt;&lt;span style="font-weight: bold;"&gt;November, 2007&lt;/span&gt; - Thirty-five year old Seattle man&lt;br /&gt;pleads guilty to using P2P file sharing programs to access&lt;br /&gt;the computers of victims and steal their personal information&lt;br /&gt;from tax returns, credit reports, bank statements and&lt;br /&gt;student financial aid applications.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt; September, 2007&lt;/span&gt; - Over 5,000 social security numbers&lt;br /&gt;and other personal information on customers of&lt;br /&gt;Citigroup’s ABN Amro Mortgage Group were&lt;br /&gt;exposed over a P2P file sharing network. A&lt;br /&gt;former business analyst joined a file sharing&lt;br /&gt;network where people share music and video.&lt;br /&gt;Work-related information that she had downloaded&lt;br /&gt;onto her personal computer was inadvertently shared.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt; June, 2007&lt;/span&gt; – Over 17,000 social security numbers of&lt;br /&gt;current and former Pfizer employees were exposed&lt;br /&gt;by a laptop owned by Pfizer and used by an employee.&lt;br /&gt;The employee’s spouse used a P2P file sharing program&lt;br /&gt;and inadvertently shared documents containing the&lt;br /&gt;personal information.&lt;/blockquote&gt;&lt;br /&gt;So, &lt;a href="http://idtheftsecrets.blogspot.com/2008/02/identity-theft-greatest-2008-threat.html"&gt;our tip for today&lt;/a&gt; is directed to parents who let&lt;br /&gt;their children utilize popular &lt;a href="http://idtheftsecrets.blogspot.com/search?q=limewire"&gt;P2P file sharing&lt;/a&gt; applications&lt;br /&gt;such as &lt;a href="http://idtheftsecrets.blogspot.com/2007/09/identity.html"&gt;Limewire&lt;/a&gt;, etc.&lt;br /&gt;&lt;br /&gt;You have two choices to protect yourself from inadvertent&lt;br /&gt;identity theft exposure.  First, you can &lt;span style="font-weight: bold;"&gt;simply delete the&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;P2P file sharing software from your hard drive and&lt;br /&gt;make&lt;/span&gt;&lt;span style="font-weight: bold;"&gt; sure your child does not have administrator&lt;br /&gt;level rights&lt;/span&gt;&lt;span style="font-weight: bold;"&gt; to reinstall it at some later date.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Or, secondly, you can &lt;span style="font-weight: bold;"&gt;backup any sensitive files to a&lt;br /&gt;thumb&lt;/span&gt;&lt;span style="font-weight: bold;"&gt; drive and then subsequently delete those&lt;br /&gt;files off your&lt;/span&gt;&lt;span style="font-weight: bold;"&gt; hard drive altogether.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Failure to do either of these two can result in your sensitive&lt;br /&gt;personal information from being needlessly exposed to&lt;br /&gt;identity thieves who could even by half way around the&lt;br /&gt;world operating in some foreign country well beyond the&lt;br /&gt;reach of our local law enforcement authorities.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">9</thr:total></item><item><title>Stolen Laptop Identity Theft Leads to Free Debix Protection</title><link>http://idtheftsecrets.blogspot.com/2008/01/stolen-laptop-identity-theft-leads-to.html</link><author>noreply@blogger.com (Unknown)</author><pubDate>Sat, 12 Jan 2008 11:12:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-12596461.post-7810664392160446460</guid><description>&lt;span style="font-size:85%;"&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;In Nashville, the local government is providing no cost&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;identity theft protection to 337,000 registered voters&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;as a result of a December 24th theft of two laptops&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic;"&gt;from the Davidson County Election Commission.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;According to the Nashville Business Journal &lt;a href="http://www.bizjournals.com/nashville/stories/2008/01/07/daily29.html"&gt;story&lt;/a&gt;,&lt;br /&gt;the local government officials are doing the honorable&lt;br /&gt;thing by providing a year's worth of free identity theft&lt;br /&gt;protection:&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="font-style: italic;"&gt;"My goal is to not only protect the voters&lt;br /&gt;whose Social Security numbers have been&lt;br /&gt;put at risk, but also to protect the integrity&lt;br /&gt;of the election process," Dean says.&lt;/blockquote&gt;&lt;br /&gt;So, our &lt;a href="http://idtheftsecrets.blogspot.com/2008/01/stolen-laptop-identity-theft-leads-to.html"&gt;tip for today&lt;/a&gt; is for any registered voters&lt;br /&gt;in the greater Nashville area, contact &lt;a href="http://www.debix.com/nashville"&gt;Debix&lt;/a&gt;&lt;br /&gt;Identity Protection Network for your &lt;span style="font-weight: bold;"&gt;free&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;year's worth of identity theft services&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Debix can be contacted via phone at&lt;br /&gt;&lt;br /&gt;        &lt;div style="text-align: left;"&gt;&lt;span style="font-weight: bold;"&gt;                 (888) 332-4963&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Make sure to &lt;a href="http://www.blogger.com/email-post.g?blogID=12596461&amp;amp;postID=7810664392160446460"&gt;tell a friend&lt;/a&gt; or associate about&lt;br /&gt;this important identity theft prevention free&lt;br /&gt;offer.&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;This article may be published in it's entirety on your site.

Article courtesy of http://www.idtheftsecrets.blogspot.com/&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>