Translate

Friday, April 26, 2013

Identity Theft Recovery Tips and Resources

A quick guide to identity theft recovery

There are few processes more painful than identity theft recovery. When you discover that you're an identity theft victim, it turns your entire world upside down. Who did this? How did they get your information? What else will they do with it, and what do they have access to?
Your world is upside down. Your most private information is now public. And worst of all, most victims of identity theft have absolutely no idea what to do next. Fortunately, you're not one of them. The fact that you're reading this article shows that you're already on the road to identity theft recovery.

Simple steps towards identity theft recovery

If you're a victim of identity theft, here's what you need to do.
1. Report it. You have to report identity theft to everyone you can think of, even if their institutions aren't affected yet. Suggestions of who you need to call include your bank, your creditors, your local police, and your local government.
2. Analyze it. Assess the damage. Before you report identity theft you need to know what's gone and where it went. You should know exactly which cards, accounts, and information seem to have vanished.
3. Request investigations. Once you've analyzed the damage, contact each institution or agency directly. For example, if your credit card number is part of the identity theft disaster, call the credit card company not only to report identity theft, but to ask them to launch an investigation into that theft.
Often agencies have some form of insurance or policies in place that can help mitigate the damage if you report the theft quickly enough. Many identity theft victims have also helped catch thieves by immediately reporting their problems in appropriate detail.
4. Request replacements as appropriate. For instance, if your credit card has vanished and you know it's the only piece of information the thieves have hold of, you probably don't need to go through the trouble of acquiring a new SSN. On the other hand, if it's your SSN that's missing you not only need to call the government immediately, you probably need to replace every piece of identification you own.
Governments and credit agencies help a victim of identity theft address these issues, so make sure you report the theft as soon as possible and ask for advice.
Identity theft is a painful and frustrating thing, and if you're an identity theft victim, you probably feel angry, helpless, and maybe even embarrassed. But if you take the appropriate steps, you can strike back against the thieves -- or at least take steps to minimize the damage and make the road to identity theft recovery that much easier.

Protect Yourself -- Prevent Identity Theft by Understanding Crimeware

Understanding crimeware is your first step to prevent identity theft

To stay safe and prevent identity theft, there are certain terms you must understand. Crimeware is one of those terms. Learn what crimeware is, how it can affect you, and how to prevent identity theft.

What is crimeware?

Crimeware is a type of malware cybercriminals use to steal the identity of unsuspecting Internet users. This type of computer crime is much more malicious than basic identity theft.
Thieves gain access to your credit card information, passwords, and bank accounts numbers. Once they have this information, they build more complex attacks that include silent back-door withdrawals to drain your accounts. Or, they make fake debit cards to access your account.
What makes crimeware different from other computer crimes is that the criminals have automated their techniques. When it comes to this type of computer crime, these thieves aren't playing around but have developed an efficient system to attack victims or entire networks.

How does this affect me?

Cybercriminals can steal your information in many different ways including installing keystroke loggers on your system. Once they have this in place, they steal your passwords and wait for you to log into your account to drain it of all money.
They can also control your Internet surfing activities by redirecting your searchers to counterfeit sites and steal your personal information there.

What can I do?

You can be susceptible to crimeware in one of two ways. You can either open infected attachments sent to you by cyber criminals or you can become infected by a computer worm sent through an organization.
To avoid crimeware, visit only trusted and reputable sites. Never open email or attachments sent by unknown senders. Never click on hyperlinks sent to you through email.
In addition to the above methods of preventing crimeware, install an up-to-date anti-virus software on your computer. Check with your anti-virus provider to be sure you have protection from not only Internet-base viruses but also client-based viruses.
As cyber criminals become advanced keeping your identity safe becomes more difficult. But not impossible. Follow these suggestions and prevent identity theft today.

COMPUTER CRIME

Why Impose Criminal Sanctions? 

The determination to impose criminal sanctions for any activity even one previously subject to civil liability is never one that should be made lightly, particularly given what some regard as the over-criminalization of American law.1 However, the Criminalization of intellectual property violations and computer misuse are grounded in both traditional and modern justifications for imposing criminal liability: preventing fraud, enforcing commercial honesty, punishing theft of property, and enhancing market reliability.2 

Intellectual property now plays an increasingly important role in the economic well-being and security of the United States.3 In response to this recognition, Congress has significantly broadened the scope of existing criminal laws that protect intellectual property rights 4 and has passed several laws.5 Such laws are necessary to deter {Continued}

1 See Goldstone and Toren, “The Criminalization of Trademark Counterfeiting,” 31 Conn. L. Rev. 1, 8 (Fall 1998) (hereinafter “Trademark Counterfeiting”). See also, Mann, Punitive Civil Sanctions: The Middle Ground Between Civil and Criminal Law, 101 Yale L.J. 1795, 1802 (1992) (“This, I advocate the shrinking of the criminal law  in order to fit it into its proper role in the law of sanctions, next to an expanding arena of punitive civil sanctions”). 

2 See Goldstone and Toren, N. 1 supra, 31 Conn. L. Rev. at 9. 

3 For example, according to the legislative history of the Anti-counterfeiting Consumer Protection Act of 1996, Pub. L. No. 104-153, 110 Stat. 1386: American companies spend millions of dollars to research, develop, test, and market their products. Developing high-quality goods requires substantial investment before profits can be recouped. The theft of the value of intellectual property is devastating, regardless of whether the product is a shoe, a software program, or a motion picture.” S. Rep. No. 104-177, 104th Cong., 1st Sess., at 8, (Nov. 28, 1995). 

4 Congress enacted the first criminal law protecting intellectual property in 1909.  See Act of March 4, 1909, Ch. 28, 35 Stat. 1082. The law covered only copyright violations and only at a minimal level. Since then, Congress has gradually and consistently expanded the role of federal law enforcement in this area, by imposing  felony penalties for unlawfully reproducing or distributing motion pictures or sound recordings in 1982, see Pub. L. No. 97-180, 96 Stat. 92 (May 24, 1982), by broadening the protection to all types of copyrighted works in 1992, see  Pub. L. No. 102-561, 106 Stat. 4233 (Oct. 28, 1992), by making a copyright violation a “specified unlawful activity” for money laundering in 1994, see Pub. L. No. 103-325, 108 Stat. 2111 (Sept. 23, 1994), by including copyright violations as predicate offenses under RICO in 1996, see Pub. L. No. 104-253, 110 Stat. 1386 (Oct. 9, 1996), and in 1997, by passing the No Electronic Theft Act (NET) Act, which criminalizes copyright infringement even in certain circumstances where the infringer does not act for commercial purpose or private financial gain. See 18 U.S.C. § 2319(b)(1). 

5 In addition to criminalizing trademark infringement in 1984, see Pub. L. No. 98473, 98 Stat. 2178 (1984), Congress in 1996 criminalized the theft of trade secrets by passing the Economic Espionage Act of 1996. Pub. L. No. 104-294, 110. Stat. 3488 (1996). 

{Continued} copyright pirates, trademark counterfeiters or trade secret thieves who might otherwise regard civil penalties as the cost of doing business. In addition, criminalization of violation of intellectual property rights embodies important values expressed by the criminal law: deterring fraud, protecting property, and facilitating commercial interaction.6 These values, which reflect concerns with morality, punishment and efficiency are analogous to those expressed by the criminalization of forgery.7 Criminal law is essential to further these goals, by asserting certain sanctions on behalf of those ill-positioned to do so themselves.8  Of the three identifiable classes of victims of copyright piracy or trafficking in counterfeit goods and services-purchasers or end users of the pirated or counterfeit goods or services, foreseeable third parties in society at large, and legitimate owners of the copyrighted goods or authentic marks only the third group might ever find civil sanctions under the Copyright Act or Lanham Act a possible remedy, must less a realistic one.9 Finally, under a modern law and economics analysis of criminal law, the essential role, for example, of trademarks and service marks in facilitating commerce makes counterfeiting an excellent candidate for criminal protection.10 

More specifically, copyright piracy and trafficking in counterfeit goods is tantamount to fraud in that the purchase of the counterfeit product is often not getting what they expected. Prohibitions against fraud have long been codified by federal as well as state law, either as a separate crime or as part of a comprehensive theft statute. In comparison to many traditional forms of fraud such as check kiting, copyright pirates or trademark counterfeiters can perpetrate their fraud on a much larger scale. Counterfeit goods can be widely disseminated without requiring the presence or active involvement of the defrauder. With the digitalization of consumer products and the Internet, counterfeit goods may be quickly and cheaply disseminated throughout the world.11 

6 See Goldstone and Toren, N. 1 supra, 31 Conn. L. Rev. at 11. 

7 Id. See also, McCarthy on Trademarks and Unfair Competition § 3:8, 3-15 (4th ed. 2003): Trademark infringement between competitors is infringement in the same sense as if someone goes to your bank and passes himself off as you, using copied identification. That person cashes a check, drawing funds from your account because the bank teller has been confused by the similarity of the identification.” 

8   Goldstone and Toren, N. 1 supra, 31 Conn. L. Rev. at 11.

9   Goldstone and Toren, N. 1 supra, 31 Conn. L. Rev. at 11. 

10  Goldstone and Toren, N. 1 supra, 31 Conn. L. Rev. at 17-20. 

11  Goldstone and Toren, N. 1 supra, 31 Conn. L. Rev. at 13. 

Further, because of the ease with which pirated digital copyrighted works and misappropriated trade secrets can be reproduced and distributed, once the proverbial “cat is out of the bag” with respect to that material, there is very little that the victim can do to prevent further harm. While the criminal prosecution of that particular defendant for that particular crime does not make that particular victim whole, it may serve to deter future criminal violations of intellectual property rights. 

In addition, end users may be widely dispersed and thus their losses are dispersed. Many consumers of mass market products may be deceived, with one suffering only a minor monetary loss. Moreover, they are often not in direct contact with the copyright pirate or counterfeiter. Since end users may not know who deceived them, or even that they were deceived, and in many cases has suffered only minimal damage, an individual end user may have insufficient information or incentive to bring a civil action against the copyright pirate or counterfeiter. Thus, a copyright pirate or counterfeiter who has defrauded thousands of end users and profited greatly, but caused minimal damage to each individual, may avoid paying any damages. A criminal prosecution can be crucial for providing any measure of justice under such circumstances and for deterring potential violators.12  Intellectual property is increasingly treated like other forms of property. Consequently, its theft might be similarly criminalized. Indeed, a company's intangible assets such as its trade secrets may be worth far more than its tangible assets and the damage caused by the theft of a company's trade secrets may be far greater than the theft of any of its tangible assets. Since the harms caused to victims of intellectual property violations are as real as those caused by the theft of tangible property, the need for criminal sanctions is the same.13 

While the victim of conventional theft can sometimes deter crime through self-help security measures such as by hiring additional security guards or attaching anti-theft tags to the merchandise, it is very difficult to do so in the case of intellectual property violations.14 Government prosecution can play a uniquely critical role in deterring such crime and providing meaningful protections, such as investigation, to victims of intellectual property violations.15 

12 Goldstone and Toren, N. 1 supra, 31 Conn. L. Rev. at 11. 
13 Goldstone and Toren, N. 1 supra, 31 Conn. L. Rev. at 16. 
14 Goldstone and Toren, N. 1 supra, 31 Conn. L. Rev. at 17. 
15 Goldstone and Toren, N. 1 supra, 31 Conn. L. Rev. at 17.

The use of computers to commit crimes began as far back as the 1960s, but because of the limited numbers of computers and the lack of inter-connectivity, computers were generally a tool used by criminals to commit a traditional offense such as fraud. Use of computers in this manner was similar to other technological advances that benefited society but could also be used for criminal purposes, such as automobiles that could be used to escape from a bank robbery or telephones that could be used by scam artists to contact potential victims. In response to such technological advancements, the federal government and states amended their existing substantive criminal law or enacted new laws  to  cover  such  activity.1  While  the  changes  in  technology prior to computers did provide individuals with opportunities to commit new crimes or made it easier to commit traditional crimes, the threats posed to society by the use of technology remained acceptable and could generally be managed by local or state law enforcement. 

However, with the proliferation of the personal computer and the worldwide interconnection of such computers through the Internet, modern computer crime presents risks to society and unique challenges to law enforcement than in the past. The criminal threats posed by the Internet is based on a vastly more complex technology than the automobile, for example, computers allow criminals to commit more crimes in less time than ever before, giving law enforcement less time to react to any potential criminal threat. In addition, because of the anonymity provided by the Internet, a criminal can engage in criminal activity with very little risk of apprehension. 

Moreover, the worldwide reach of the Internet allows a cyber-criminal to cause harm to thousands, if not millions, of victims that may not,

1 For example, the Supreme Court in United States v. Turley, 352 U.S. 407, 413-414, 77 S. Ct. 397, 1 L.Ed.2d 430 (1957), explained the necessity of a federal criminal statute prohibiting the theft of motor vehicles: By 1919, the law of most States against local theft had developed so as to include not only common-law larceny but embezzlement, false pretenses, larceny by trick, and other types of wrongful taking. The advent of the automobile, however, created a new problem with which the States found it difficult to deal. The automobile was uniquely suited to felonious taking whether by larceny, embezzlement or false pretenses. It was a valuable, salable article which itself supplied the means for speedy escape. ‘The automobile [became] the perfect chattel for modern  large - scale  theft.’  This  challenge  could  be  best  met through use of the Federal Government's jurisdiction over interstate commerce. The need for federal action increased with the number, distribution and speed of the motor vehicles until, by 1919, it became a necessity. The result was the National Motor Vehicle Theft Act.” 

even be located in the same geographic area. In the case of computer crime, national borders lose all significance. To make matters worse, such acts may not even be a crime in the originating jurisdiction. For example, the individual who created and distributed the “Love Bug” virus that caused an estimated $15 billion in damages worldwide, could not be prosecuted in the Philippines where he lived because such conduct was not a crime in that country at that time.2 

In response to how computers can be used to facilitate traditional crimes and to the rise of cyber-crimes for which there is no analogous traditional crime, Congress has pursued a dual approach. First, Congress has updated existing laws to ensure that such statutes could be used to prosecute those types of crimes committed with the aid of a computer, although, not all of these attempts have been successful.3 Second, in 1984 Congress enacted the first statute that was expressly  designed to cover computer crime in which there is no analogous traditional crime.4 Since then, Congress has repeatedly amended and revised this statute to be a more effective weapon in fighting computer crime.5 In general, the existing version of the Computer Fraud and Abuse Act, like its predecessors, seeks to protect the confidentiality, integrity and availability of data and systems.6 The Act contains seven major provisions that create liability for crimes against “protected computers”—those used in interstate or foreign commerce or communications, and any computer connected to the Internet.7 

2 The virus infected tens of thousands of computers worldwide including computers  at the Pentagon, the Central Intelligence Agency, Congress, and private companies such as Microsoft, and Dow Jones & Co. 

3 See, e.g., Ashcroft v. The Free Speech Coalition, 535 U.S. 234, 122 S.Ct. 1389, 152 L.Ed.2d 403 (2002) (portions of the Child Pornography Prevention Act which criminalizes the production, distribution, and reception of computer generated, sexual images of children were unconstitutionally over-broad because they proscribed  speech which was neither child pornography nor obscene and thus abridged the freedom to engage in a substantial amount of lawful speech.). 

4 Ashcroft, 535 U.S. 234, at 236.
5 Ashcroft, 535 U.S. 234, at 239.
6 Ashcroft,  535 U.S. 234, at 341.
7 See generally, 18 U.S.C. § 1030. 
Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)