Tuesday, November 23, 2010

Faster, Safer Internet with Free Norton DNS

Faster, Safer Internet with Free Norton DNS

Thursday, November 11, 2010

PRESIDENT’S IDENTITY THEFT TASK FORCE SUMMARY OF INTERIM RECOMMENDATIONS PREVENTION

Improving Government Handling of Sensitive Personal Data


Recommendation 1: The Task Force recommends that the Office of Management and Budget
(OMB) issue to all federal agencies the attached Task Force guidance that covers (a) the factors that should govern whether and how to give notice to affected individuals in the event of a government agency data breach that poses a risk of identity theft, and (b) the factors that should be considered in deciding whether to offer services such as free credit monitoring.

Recommendation 2: To ensure that government agencies improve their data security programs, the Task Force recommends that OMB and the Department of Homeland Security (DHS), through the inter-agency effort already underway to identify ways to strengthen the ability of all agencies to identify and defend against threats, correct vulnerabilities, and manage risks: (a) outline best practices in the areas of automated tools, training, processes, and standards that would enable agencies to improve their security and privacy programs, and (b) develop a list of the top 10 or 20 “mistakes” to avoid in order to protect government information.

Recommendation 3: To limit the unnecessary use in the public sector of Social Security numbers(SSNs),the most valuable consumer information for identity thieves, the Task Force recommends the following:

• The Office of Personnel Management (OPM),in conjunction with other agencies,
should accelerate its review of the use of SSNs in its collection of human resource
data from agencies and on OPM-issued papers and electronic forms, and take steps
to eliminate, restrict, or conceal their use (including the assignment of employee
identification numbers, where practicable).
• OPM should develop and issue policy guidance to the federal human capital
management community on the appropriate and inappropriate use of an employee’s
SSN in employee records, including the proper way to restrict, conceal, or mask SSNs
in employee records and human resource management information systems.
• OMB should require all federal agencies to review their use of SSNs to determine
where such use can be eliminated, restricted, or concealed in agency business
processes, systems, and paper and electronic forms
.

Recommendation 4: To allow agencies to respond quickly to data breaches, including by sharing information about potentially affected individuals with other agencies and entities that can assist in the response, the Task Force recommends that all federal agencies, to the extent consistent with applicable law, publish a new “routine use” for their systems of records under the Privacy Act,


VICTIM ASSISTANCE
Restitution for Identity Theft Victims

One reason that identity theft can be so destructive to its victims is the sheer amount of time and energy often required to re-mediate the consequences of the offense. This may be time spent clearing credit reports with credit-reporting agencies, disputing charges with individual creditors, or monitoring credit reports for additional impacts of the theft. The FTC estimated in 2003, based on the results of its Identity Theft Survey Report, that the average identity theft victim spends 30 hours resolving the problems created by identity theft. Those individuals who were victimized most seriously (from both the false opening of new accounts in their names and the unauthorized use of their validly-issued credit cards) spent an average of 60 hours resolving the problems.

Overall, according to the survey, approximately 297 million hours were expended in one year by consumers attempting to resolve identity theft-related problems.

While restitution is available for direct pecuniary costs of identity theft offenses, the federal restitution statutes, 18 U.S.C. § § 3663(b) and 3663A(b), do not provide for compensation for this time spent by consumers rectifying accounts and avoiding more harm. Moreover, courts have interpreted the restitution statutes in such a way that would likely preclude the recovery of such amounts from criminal defendants, absent explicit statutory authorization.

In order to better remediate the harm caused by identity theft, the Department of Justice has drafted amendments to the restitution statutes, reproduced in Attachment C, that would allow a victim to obtain restitution from a criminal defendant for the time reasonably spent trying to rectify the consequences of the offense. Under these proposed amendments, the district court judge would determine the amount of time reasonably spent and the value of the victim’s time. The Department of Justice can propose that Congress adopt these amendments immediately.


LAW ENFORCEMENT
Development of a Universal Police Report

Victims of identity theft often need police reports documenting the misuse of their
information in order to recover fully from the effects of the crime. For example, identity theft victims can use a detailed police report as an “identity theft report” under the Fair and Accurate Credit Transactions Act to request that fraudulent information on their credit report be blocked, or to obtain a seven-year fraud alert on their credit file. Further, identity theft victims also must have a police report to obtain documents relating to fraudulent applications and transactions, and creditors may require a police report before establishing the victim’s bona fides in challenging a fraudulent account or purchase. Filing a police report also makes it more likely that law enforcement will pursue an investigation of the identity theft.

Some victims report, however, that they are unable to get a police report. FTC complaint data show that during the last three years, about 25% of victims of new-account fraud who sought police reports were not able to obtain them, in part because of overtaxed local police departments and the time involved in preparing what often can be a highly detailed document.

Simplifying the process of writing and receiving a police report would both relieve the burden on local law enforcement and allow victims to more easily repair the damage to their credit from the crime. A universal law enforcement report that the victim could complete online and take to the local police department would help achieve this goal. Additionally, the data from such standardized reports would be in a format that is used by the FTC’s Identity Theft Data Clearinghouse, increasing the ability of law enforcement to effectively spot significant patterns of criminal activity.

At present, the FTC has an online complaint form that is used to enter data into its Identity Theft Data Clearinghouse, which is in turn made available to law enforcement nationwide through Consumer Sentinel. The FTC is also prepared to develop a revised online complaint form at www.ftc.gov/idtheft that victims can complete, print, and take to a local law enforcement agency for verification and incorporation into the police department’s report system. The victim will then have a valid, detailed police report; the police department will have a record of the crime; and the victim’s complaint information will have been entered into the FTC’s Identity Theft Data Clearinghouse. The Public Sector Liaison Committee of the International Association of Chiefs of Police supports and has been involved in this effort.


~~Excerpts from The Identity Theft Task Force

Monday, October 25, 2010

Stolen Identity File & The Public Information Act

In 1999, the Texas Legislature charged Sheriff’s Offices in Texas with the responsibility to establish a unique criminal file referred to as “The Stolen Identity File.” Once the file has been established the Sheriff’s Office will report the information to a statewide file managed by the Department of Public Safety. If you have any questions concerning this process, please contact your local Sheriff’s Office or the Error Resolution Unit in the Crime Records Service within the Department of Public Safety at (512) 424-7256.


Texas Government Code, Chapter 552, gives you the right to access government records; and an officer for public information and the officer's agent may not ask why you want them. All government information is presumed to be available to the public. Certain exceptions may apply to the disclosure of the information. Governmental bodies shall promptly release requested information that is not confidential by law, either constitutional, statutory, or by judicial decision, or information for which an exception to disclosure has been sought.


Visit the Texas Department of Public Safety at http://www.txdps.state.tx.us/index.htm/

~ Courtesy, Service, Protection

Friday, October 22, 2010

Hacker Mentality: Report Civil Rights Violations

Hacker Mentality: Report Civil Rights Violations

Contact FBI Headquarters

FBI Headquarters
935 Pennsylvania Avenue, NW
Washington, D.C. 20535-0001
(202) 324-3000

http://www.fbi.gov/stats-services/victim_assistance/resources

Cybersecurity: Our Shared Responsibility

Here are a few steps that you can take to not only participate in National Cybersecurity Awareness Month, but also enhance cybersecurity 365 days a year:

There are many things businesses, schools, and home users can do to practice cybersecurity during National Cybersecurity Awareness Month and beyond.

•Make sure that you have anti-virus software and firewalls installed, properly configured, and up-to-date. New threats are discovered every day, and keeping your software updated is one of the easier ways to protect yourself from an attack. Set your computer to automatically update for you.
Update your operating system and critical program software. Software updates offer the latest protection against malicious activities. Turn on automatic updating if that feature is available.
•Back up key files. If you have important files stored on your computer, copy them onto a removable disc and store it in a safe place.
•Join the National Cybersecurity Awareness Campaign: Stop. Think. Connect
Endorse - Demonstrate your commitment to cybersecurity.

•Show your organization's commitment to cybersecurity and National Cybersecurity Awareness Month by signing the online endorsement form at www.staysafeonline.org.
•Create a section for cybersecurity on your organization's Web site. Download banners at www.staysafeonline.org and post them on your organization's home page.
•Add a signature block to your e-mail
Educate - Find out what more you can do to secure cyberspace and how you can share this with others."
•Participate in the National Cyber Security Alliance Cyber Security Awareness Volunteer Education (C-SAVE) Program and help educate elementary, middle, and high-school students about Internet safety and security. For more information or to download the C-Save curriculum, visit www.staysafeonline.org/content/c-save.
•Review cybersecurity tips with your family.
•Print and post these cybersecurity tips near your computer and network printers.
•Use regular communications in your business—newsletters, e-mail alerts, Web sites, etc.—to increase awareness on issues like updating software processes, protecting personal identifiable information, and securing your wireless network.
•Educate family, friends, peers at www.StaySafeOnline.org
•Learn the fundamentals of cybersecurity, starting with the IT Security Essential Body of Knowledge. Report Suspicious Cyber Activity to the United States Computer Emergency Readiness Team (US-CERT) by visiting https://forms.us-cert.gov/report/or by calling 1-888-282-0870.You may also visit http://www.staysafeonline.org/content/report-and-handle-problems for more information.

Get involved in Internet safety initiatives within your community and volunteer through the National Cyber Security Alliance (NCSA) Cyber Security Awareness Volunteer Education Project (C-SAVE).
Support cyber education and training in schools and collaborative efforts such as the federal Scholarship for Service program.

For more information on Awareness Month and for additional material, please visit www.us-cert.gov and www.staysafeonline.org/ncsam


~DHS

Saturday, October 2, 2010

Blackberry hacking www.IDTheftSecurity.com





YES, THIS HAPPENS. FORENSICS FOUND THE TRUTH OF 15 OF MY OWN BLACKBERRYS - MONTGOMERY COUNTY, WHERE ARE YOU??

Cell Phone Hacking and Stalking www.IDTheftSecurity.com

http://www.youtube.com/user/MLMSuperSonic

Friday, October 1, 2010

Net Trace Inc., Cyber Crime Investigation


Internet and Intranet Email Tracing

We help victims of child stalking,cybercrime and threatening Emails.

* Major breakthrough in Email Tracing!
* Inter-Office tracing available. * Licensed Private Investigator.
* We can help with your background investigation.
* We do in-depth Genealogy Traces

We work hard with law enforcement and Email service providers to knock down the brick wall!

Net Trace Inc. offers a multi-layer attack against perpertrators of cybercrimes against our clients.

*Our Lead Investigator, Jerry Miller, has over 20 years experience as a member of the L.A.P.D. criminal investigations department and for over 15 years has helped individuals and companies as a private investigator. Our clients can draw from his experience when dealing with police and other government agencies. No longer will you be alone when you're dealing with local, national, and international law enforcement agencies.

*Our technical staff has the ability to counter-attack any perpetrators that have attacked our client(s). Along with our staff's ability to provide pin-point accuracy as to the whereabouts of the perpetrators, our techs know how to prepare information to be provided to the necessary law enforcement agencies and Internet service companies.

*Net Trace Inc. also employs techs that specialize in hardware and software that can provide the necessary final pieces to a successful investigation. Surveillance equipment that is state-of-the-art is available when necessary for Internet and non-Internet cases.

*We also have genealogy tracing experts that can trace individual and family backgrounds with speed and ease.

Domestic Investigations:
Net Trace Inc. has the capability of national computer Email tracing.

Net Trace Inc. can identify locations and persons throughout the USA. The information and Identification of the sender will be given to
the customer for dissemination and action.

Additionally, Net Trace Inc. has investigators who can perform in-depth follow up investigations of information relating to corporations and individuals.

When you combine our experience, knowledge and proven track record it's easy to see why we can say, "You're no longer alone" in your fight against cybercrimes and harassing Emails.

Contact Net Trace Inc.
Phone: USA (303) 870-4342
mail@nettraceinc.com
Type: "Net Trace Help" in the SUBJECT area.


This is a great website. You can submit questions directly from the site. I personally understand how difficult, not to mention the physical and mental strain it takes on an individual, your family.

BUT you must fight, as this seems to be taboo - which I like to call sheer ignorance. It's YOUR life, take it back.

If you feel you are being stalked by any means--email, GPS, spyware..please do not be afraid to seek help. Hire PROFESSIONALS that can help you NOW as this is their mission.

Together we CAN and WILL make a difference.

Be safe and God Bless!

Thursday, September 30, 2010

Spokeo - I Can Find All Your Information At The Click of The Mouse

There are hundreds of “People Finder” and “White Pages” sites online that provide your personal information to anybody with a web browser. These sites often give away your: Name, Address, Phone numbers, Previous addresses, Age and date of birth, Names of relatives and roommates, Google “Streetview” photos of your house, Your approximate credit score, Satellite and aerial photos of your house, and more!

People often ask “how do I remove my name from Spokeo” or “how do I delete my photo and address from a whitepages site?” We think that you should be able to control the information that appears on these sites–and you should be able to delete information if you want to. Our goal is to help you take control of your online privacy by allowing to remove or update information that appears in these “whitepages” sites. We do not provide data to “white pages” sites; instead, we remove it. (If you are curious, Spokeo, a popular “white pages” site, explains their data sources in their blog here and here)

There are two methods to remove your name from whitepages sites like Spokeo, Rapleaf, Pipl, and others.

Method One: Manual
Step One


Find all the sites you care about. For example, you might be concerned about sites like Spokeo, Pipl, Intelius, Rapleaf, and others. You will need to find each site that lists your personal information, which could be hundreds of sites.

Step Two
Find the opt-out procedure used by each site. Each site’s privacy policy is different. For example, Spokeo’s opt-out form is here and it can be completed online. ZabaSearch’s opt-out policy is here, and it requires verification by mail. Intelius’s opt-out policy is here, and it requires faxing a copy of your driver’s license.

Step Three
Verify that each site correctly processed your opt-out request. Some sites might have multiple copies of your current address as well as mis-spellings, typos, and other errors. You may need to repeat the process several times to get complete coverage.

Method Two: Automatic
Step One


Sign up for the MyPrivacy service from ReputationDefender.

Step Two
MyPrivacy will automatically scour the Internet looking for references to your personal information.

Step Three
Through a simple point-and-click interface within MyPrivacy, you can remove information from many of these sites at once. We will continuously monitor online and automatically alert you if your information appears in a new people search database.

MyPrivacy is a powerful tool that removes your information from many sites all at once. It also empowers you to choose what catalog mailings you want to receive at your house; with the new “Control Your Mail” feature, you can request that hundreds of companies stop sending you direct mail. I personally used MyPrivacy to remove my name from Spokeo. I also used MyPrivacy to remove my address, phone, and photos from several other databases.

As we’ve said before, ReputationDefender would never provide data to these sites. Our mission is to help consumers control their personal information online.

If you need complete online privacy, we have special customized services that go beyond MyPrivacy. Contact us by phone or email for information.

If you are a law enforcement officer or judicial officer, we also have free MyPrivacy programs for you; contact us for information.
Spider Simulator Tool © SEO Chat™

URL
Valid URL

Enter Captcha To Continue
To prevent spamming, please enter in the numbers and letters in the box below

Report Problem with Tool.