Last year over 8 million people in the United States had their identities stolen. Just how many were pitchers for the Florida Marlins? Better yet, how many had a “hands on” role in catching their identity thief? This has been an interesting week in identity theft news.
A federal identity theft law meant to protect individuals from the devastating consequences of identity theft by toughening consequences for criminals using another person’s identity in connection with another crime is getting another look by the Supreme Court.
Identity Theft is the fastest growing crime worldwide and recently the UK identified Impersonation of the Dead or IOD as the fastest growing form of identity theft. It is estimated that over 100,000 cases of IOD fraud have occurred and that identity theft costs UK citizens over 1.5 billion pounds per year. What is being done about it and does it happen in the United States?
Web Application Security
Whether you’re building a custom web application, or using one of the off-the-shelf/open source web applications for things like photos, monitoring, or any other PHP, ASP, Perl, AJAX or other language web app, on thing you MUST thing about is the security associated with it.
In this interview with Paul Herbka from South Seas Corporation (development and training company based out of Colorado), we go in depth in a discussion of web applications, security, and why it’s important for any individual or business to seriously consider what their policy is for the security associated with any web-based applications they may delpoy online.
Mr Herbka also goes into reviewing some great security platforms for protection of any web-based application.
You can listen to the interview, and/or read the transcript below, for free.
(Paul even offers you a discount if you mention this interview when you call him.)
Download the interview about what Email Security is in MP3 Format”
While something must be done about the ridiculousness of our current flimsy paper social security cards (I’m not even sure most people know where their cards are), it’s also scary to some people to think of a “national Identity card.” (For some biblical scholars, a national Identity Card would be a confirmation of things forecasted in the book of Revelations in the bible.)
There’s no question that the social security administration’s system is, at best, outdated, and that it poses a large threat to the future welfare of our great country.
But the solution must be bigger than requiring better Identity cards.
Read below to see the legislation put forward by Mark Steven Kirk, a representative from Illinois.
What happens when your social security number is stolen and used to obtain employment? Can you get a new one? What happens to the money paid into the Social Security Administration? And why doesn’t the government report to you duplicate payments? Read more to learn about social security and identity theft.
Veteran’s are at high risk for identity theft, and have more to lose. It is important for veteran’s to carefully monitor their credit report, social security benefits and veterans benefit information to determine if their identity is being used in any manner, from illegally obtaining credit or medical care to attending a college.
Lora and Jamey Costner of Newport, Tennessee, have joined the ranks of identity theft victims after two illegal immigrants, Douglas Valdez and Elizabeth Velasco Bautista, allegedly used the Costner’s Social Security numbers to obtain employment at the Koch Foods plant in nearby Morristown.
Here’s a question that Identity Theft Secrets received recently.
“I’m looking for a general template letter to send to different people and agencies to report being a victim of identity theft. Someone stole my Social Security # and name from a lost wallet and has been working in various areas/states using my information, reporting that I’m there. The Social Security Administration does nothing and the IRS is keeping refunds due saying that the income (I never received) was not reported to the IRS. Need help to get a generic letter to send to credit reporting agencies, IRS, police dept, etc. This was reported in the past but NO ONE even acknowledged receipt. Maybe a handwritten note was not taken seriously. This is for my son who does not have a computer and I offered to try to help, but I am not that knowledgeable with computers so said I would look for assistance. Thank You.”