Solutions for Identity Theft, Credit/Debit Card Theft, and Personal Information Theft
Part I: Overview
Mike Angelo -- 29 June 2005 (C) -- Page 1
Unfortunately, Paula Zahn's identity theft show followed the popular but somewhat misleading identity theft story line. That show overlooked what can be done to shut identity theft down cold -- and what needs to be done to shut down identity theft.
The bottom line is that on the computer technology and Internet side, if you want to protect yourself against identity theft you must not allow your Internet browser or your e-mail to accept cookies or to allow scripts to run. You must not allow HTML e-mail. Do not use Microsoft Outlook. Even better, switch from the MS Windows operating system to the GNU-Linux operating system. More about all this further on in this article and more about switching to Linux in the sidebar to the right.
To a large extent we are condemned by the language we use and the words in our vocabulary. On the other side, we benefit by our American language and having the right words in our vocabulary. However, identity theft often is the wrong term -- use of that term condemns us to being victimized by what people call identity theft.
Identify Theft IS Not Identity Theft, Per Se
The hackers and crackers that are engaging in identity theft often are not really stealing anyone's identity. What they are stealing is your money. What often mistakenly is called identity theft is nothing more or less than money theft -- stealing. And mostly what you need to protect yourself against is money theft -- and you need to protect yourself against the tools and methods so-called identity thieves use to steal your money.
So as a society, let's lose the misuse of the cute, yuppie, and distracting term identity theft. It's stealing. So let's call it what it is, stealing -- and for the most part it is stealing money and property -- your money and your property.
For the most part, so-called identity theft is not someone going around impersonating you, although in a sense they do this to steal your money and your property. They are using your personal information, including credit card and banking information, to steal your money.
Normally the so-called identity thieves are not using your name and other personal information to get a job, apply to college, and so forth. For want of a better term, let's call this sort of thing deceptive impersonation.
At a more criminal level the so-called identity thieves use your name and other personal information to apply for credit cards, mortgages, and other such debt instruments in your name with the intent of never paying the money back. For want of a better term, let's call this sort of thing fraudulent impersonation.
In fraudulent impersonation the personal information thieves are not stealing from you. Rather, they are stealing directly from the lenders and vendors that let them buy on credit and so forth -- but they are using your name and the personal information they have obtained about you to do the stealing.
Mostly as far as we know, the personal information thieves are using your personal information, such as credit card info or bank account info, for the very limited, but costly, purpose of stealing your money. Perhaps a better term for this sort of so-called identity theft would be credit theft.
In credit theft, they are stealing from you by charging items to your accounts. Here it is up to you to prove to the lender or bank that you did not make the charge against your credit card, debit card, or whatever. (Credit/debit theft might be more accurate but let's try to keep things somewhat simple.)
Thus in credit theft, evildoers initially are stealing from you -- until you prove you did not make the charge to your card. Then at that point the victim is the lender or banker from whom the credit/debit thief has stolen money.
Intuitively that makes sense, Generally criminals are lazy. They will pick the unlocked car over the locked car to steal. They will pick the unlocked house or vacant house over the locked or occupied house to rob. In like fashion, they will pick an existing credit card account to raid (credit theft) rather than go through the work of setting up a new credit card account in your name (fraudulent impersonation).
That's not to say they will not set up a new credit card or whatever in your name (fraudulent impersonation). Just as it is not to say thieves will never steal a locked car or rob a locked house.
Initially what these so-called identity thieves are stealing is your personal information. That in itself is a big problem. The bigger problem is what they do with it. Focus on the point that the initial theft is information theft, not identity theft. And focus on that what you need to protect is your personal information.
The U.S. Federal Trade Commission's (FTC) definition of identity theft seems to be comparable to our more focused definitions of fraudulent impersonation and credit theft.
Focusing-in, there are primarily four things being stolen:
The 26 May, Paula Zahn, CNN show did a very good job of explaining all this. If you did not see the show, please read the transcript of that show for the details.
Stealing credit card numbers and bank account numbers helps thieves to steal your money the quickest and easiest way (credit theft). As an active IRC-er for years, this writer has witnessed countless occurrences where someone in an IRC (Internet Relay Chat) channel is talking about something he or she wants, types some utterance to the effect "I need a card number", goes away for a few minutes or less, and comes back announcing something to the effect "got one".
The 26 May, Paula Zahn, CNN show did a very good job of explaining how these people use IRC and other Internet chat services to obtain credit card and bank account information so quickly and so easily. But that show did not explain adequately how to protect your credit card and bank account information -- that you have on your computer.
It did warn about phishing (pronounced fishing), but it did not go into items such as cookies, scripts, HTML e-mail, and so forth. Therefore, we will show you how to protect yourself against information theft via cookies, scripts, HTML e-mail, and so forth.
KDE, KMail, and Konqueror Articles
KMail -- One of the Best E-Mail Clients (Editor's Choice)
Impact of the Mandrake-Conectiva Acquisition on the Linux Landscape
Is Netscape Losing the Browser Wars?