Post in our forum for parents, teens - You! - at ConnectSafely.org.

Friday, July 15, 2005

What ID thieves actually do

USATODAY spent five months piecing together the process of how ID thieves exploit people's personal info online and off - how they recruit online "mules" to help them actually put those stolen identities, account numbers, etc. to use. "Mules serve two main functions," USATODAY reports: "They help keep goods flowing through a tightly run distribution system [by receiving gadgets and other products purchased with stolen credit card numbers and resending them overseas], and they insulate their employers from police detection." The article, which starts with the story of a one-time mule in California with the pseudonym of Karl, adds that last year "reshipping rings set up nearly 44,000 post office boxes and residential addresses in the USA as package-handling points, up from 5,000 in 2003. And they show no signs of slowing down." Here's a San Jose Mercury News column on recent congressional efforts to deal with ID theft and "Don't Let Data Theft Happen to You" in the New York Times. Further info and resources: the Washington Post on AOL's new data-protection services for subscribers; "Be a fierce guardian of your personal data" and the story of one who is; the FTC's Identity Theft Clearinghouse; and OnlineCreditReport.com. Be sure to enlist your online kids' help in protecting information on the family computer, including together making sure that nothing but media files are being shared if there are file-sharers at your house (see "File-sharing realities for families").

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home