Identity Theft Matrix, Identity Theft, ID Theft, ID Theft Victim, Identity Theft Insurance, Identity Theft What To Do, Identity Theft Help, Identity Theft Protection, Identity Theft Prevention

Saturday, May 31, 2008

Ex-con seeks to launch devices fighting ID theft

By ANGELA SHAH / The Dallas Morning News
ashah@dallasnews.com

Like other entrepreneurs, Ray Beasley begins his day with an 8 a.m. coffee stop at Starbucks. Sipping a Cafe Americano, he flips open his Sony Vaio laptop, fires off e-mails and works his cellphone.

Ray Beasley talks to Adamson High School students on Career Day about his drive to develop a device to prevent identity theft despite a past that includes prison. " style="cursor: pointer; width: 160px; height: 36px;" onclick="return clickedImage(this);" alt="REX C. CURRY/Special Contributor" src="/sharedcontent/dws/img/v3/05-11-2008.NB_11bsystem.G402D73K3.1.jpg">

But unlike them, Mr. Beasley's résumé doesn't include an MBA or experience in corporate America. He's an ex-con who developed his business idea while serving time in Texas prisons, and his "brain trust" is made up of fellow inmates convicted for the crime he's now trying to prevent – identity theft.

"My first thought was: You've got to be kidding me," says Donald Hicks, a University of Texas at Dallas economics professor, when Mr. Beasley showed up two years ago, unannounced, at his campus office. "This guy is built like a linebacker, and he's just out of prison?"


But Dr. Hicks listened as Mr. Beasley reeled off his tale of hours spent in prison rec yards and day rooms interviewing cons, learning their scams and silently drawing up plans for a computer program he believes could thwart identity theft using countertop machines in stores and restaurants.

"The spirit and the drive he displayed ... on a human level, I admire that tremendously," says Dr. Hicks. "I couldn't just blow him off."

The 45-year-old Mr. Beasley grew up on Ramsey Street in Cedar Hill, a southern Dallas County town where parents turned children loose on bicycles and neighbors knew and looked out for each other. The Beasleys – Mom, Dad and four children – were devout Jehovah's Witnesses who quoted scripture with ease.

Dad Raymond Beasley Sr. had founded his own construction business while in his early 30s. The younger Mr. Beasley often joined his father at jobs in Highland Park, where Beasley Foundation Contractors poured concrete for Bernard Fulton, founder of the prestigious Greenhill School, and real estate doyenne Allie Beth Allman. The boy saw –and liked – how the other half lived.

The drug life

In fall 1981, Mr. Beasley started classes at the University of Houston. But when his father's construction business fell on hard times a year later, he dropped out and went looking for a way to make money, quickly.

It took one phone call to set up a meeting for him to buy 7 kilograms of cocaine – the first time the 19-year-old had ever seen the drug.

"It was quicker and easier to get kilos of cocaine than a loan from a bank," Mr. Beasley says now.

This was a heady time for the young man who'd been spit on proselytizing door-to-door as a Jehovah's Witness. He bought expensive suits, drove flashy cars and dated even flashier women.

Then, in February 1990, Mr. Beasley and a business associate from East Texas went to meet "Angela" and her California connection at the Bennigan's on Northwest Highway to buy cocaine. "California," he recalls, turned out to be an undercover officer, and the two were arrested.

While out on bail on the drug charges, Mr. Beasley briefly joined a gang with a specialty in stealing identities and check kiting. "It was like robbing a bank with an ink pen," he says.

Hard time

In September 1991, Mr. Beasley saw the harder side of crime. He began his 99-year term at the red-brick, razor-wired Coffield unit in Tennessee Colony, about 70 miles southeast of Dallas.

Beneath the 40-foot-tall stained-glass window in the prison's cavernous chapel, he and other inmates would pretend to listen to tapes of religious music. Instead, an inmate known as "Dorsett" would school Mr. Beasley in Identity Theft 101.

All you need are obituaries in the newspaper, Dorsett told him. They'd give you a birth date and place of birth as well as the mother's maiden name – most of the ingredients needed to pose as someone else.

Identities in hand, "Reginald" explained that personal checks could then be made from scratch with stock paper from an office supply store and some software.

In 1994, Mr. Beasley picked up his abandoned college studies, enrolling in data processing classes, where he learned how to draw schematic diagrams.

Fellow inmates tutored him in subjects such as COBOL programming and MS-DOS. He got a transfer to the Ramsey One unit near Houston in 2001 to continue his studies.

If the prisoners at Coffield gave the inmate his undergraduate education in identity theft, Ramsey One was graduate school. Ramsey housed professionals: engineers, bankers and computer programmers.

"We didn't talk scams; we talked systems capabilities," Mr. Beasley says.

This is where he met Michael Miller, a fellow inmate who had been a computer programmer. They were an odd pair – the fiftysomething bespectacled Mr. Miller and Mr. Beasley, who weighed nearly 300 pounds by then. Mr. Miller offered technical advice, and Mr. Beasley could resurrect his drug dealer's countenance when necessary, shielding Mr. Miller from prison violence.

"I was very skeptical," says Mr. Miller, now released and living in the Dallas area. "In that environment, you always assume everybody but yourself is a scam artist."

For three years, Mr. Beasley retraced the steps to Mr. Miller's dorm, six rooms down. Pointing to a particular formula in Mr. Beasley's hand-drawn schematic, Mr. Miller would ask: How would this stop someone from opening up an account in my name?

Over the 15 years he was in prison, Mr. Beasley talked with about 900 inmates, he believes. This think tank of cons shared their methods with him and poked holes in solutions he would propose within his computer program.

In March 2006, Mr. Beasley was paroled after 15 years in prison. By then, both his parents were dead and he was estranged from his brothers and sisters. He moved in with an aunt in Wichita Falls and got a job washing dishes at a local El Chico.

But in Dallas, Carolyn Jones, an old high school teacher, became his agent, trying to drum up support for his fledgling company, B System.

"He had a lot more potential than he ever really lived up to," she says.

And then, that July, he paid his surprise visit to Don Hicks at UTD.

It was Dr. Hicks who put him in touch with Tom Hill, an Electronic Data Systems Inc. fellow and a rainmaker in the tech world. Like Dr. Hicks, Mr. Hill found himself attracted to the ex-con's passion.

Mr. Hill paid the tuition for an entrepreneurship class at Southern Methodist University, telling Mr. Beasley that having an idea wasn't enough.Mr. Hill also introduced him to Doug Harris, who runs UTD's cybersecurity institute. Dr. Harris said UTD would build a beta machine to test Mr. Beasley's theories if he could raise the money: $600,000.

"If I can get that machine built, I can get everything I want," Mr. Beasley says now.

Believers and backers

Since that meeting last June with Dr. Harris, Mr. Beasley has rounded up investors in B System: a family of churchgoers in Sunnyvale, a group of Dallas firefighters, old friends who want this story to have a happy ending.

One morning, Gigi White, now a Lancaster City Council member, walked into Starbucks and reintroduced herself to a speechless Mr. Beasley. He hadn't seen her since they were in their 20s on the Dallas club scene.

But she'd heard about his time in prison, his release and his quest to make B System real. As she left, the councilwoman pressed a $300 check into Mr. Beasley's hand.

"You've always been a smart man," she told him. "Now you're doing it smarter."

In the last year, Mr. Beasley has raised about $85,000, most of which he has spent on food, rent, Internet service and an attorney to help him patent his idea.

His investors say they believe in Mr. Beasley's dream.

"I gave Enron a chance," says Ray Allen, a retiree who, along with his wife, Martha, invested $5,000 in B System. "Why not him?"

Still, the big money has eluded Mr. Beasley, and the clock is ticking.

"If this doesn't happen in a hurry, someone else will do it," Dr. Harris says.

Mr. Beasley refuses to take time away and get a regular job.

Working 9-to-5 wouldn't get him the money fast enough, he says. "My story hasn't been typical so far, so why should I act typically?"

Mr. Beasley finds it frustrating to know that if he returned – even briefly – to his old life, getting the money would be easy.

Instead, he hopes for a savior. "God gave Joseph the power to interpret dreams, and the pharaoh listened," he said, quoting from a Bible story in Genesis. "I just haven't found the right pharaoh."


Wednesday, May 28, 2008

Springfield woman gets four years in ID theft case

By SBJ Staff
5/9/2008 9:58:59 AM

A Springfield woman was sentenced last month to four years in prison following a joint investigation by Missouri Attorney General Jay Nixon, Greene County Prosecuting Attorney Darrell Moore and the Springfield Police Department.

According to a news release from Nixon’s office, Circuit Judge Thomas E. Mountjoy sentenced Norma Black, of Springfield, on one count of felony identity theft in Greene County Circuit Court. The release said Black stole an acquaintance’s identity to make $3,000 worth of withdrawals from the victim’s bank account, including ATM withdrawals and charges to online poker sites.

Black was indicted by a Greene County grand jury in September 2006 after identity theft charges were filed by Moore against her and co-defendant Jason Waln, who was sentenced in March to five years in prison for his role in the case.

The victim, whose name was not disclosed, reported to Nixon’s office that someone had accessed her bank account to make ATM withdrawals, purchase items at a Springfield discount store and for use on several online gambling sites. The victim discovered her debit card missing from her purse after she spent the night at Black’s home. Nixon’s office was appointed to assist in the multi-faceted investigation, which linked the defendants to the use of the debit card.

“We are always ready to work with local prosecutors to share our expertise in identity theft cases, and it is satisfying to have another one of those cases seen through to its conclusion,” Nixon said in the release. “It is also a good time to reinforce to Missouri consumers how important it is to safeguard their sensitive personal information, whether it is online or in their purses or wallets.”

Click here to take Nixon’s 10-question ID Theft Quiz to test your knowledge about protecting personal information.

Copyright 2008 SBJ. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

source

Monday, May 26, 2008

When security intrudes on our lives

When security intrudes on our lives

Voice-print systems offer safety in an insecure world, but how much privacy should we sacrifice?

Gerry Bellett, Vancouver Sun

Published: Tuesday, April 15, 2008

One recent Monday morning, Vancouver immigration lawyer Richard Kurland phoned Aeroplan to change his seats on a flight he plans to make May 15 and found he was being asked to submit to being "voice-printed."

Was this just another example of companies adding more layers of security to protect themselves and their customers from the ravages of identity theft or something more sinister?

Kurland is betting on the more sinister.

Vancouver immigration lawyer Richard Kurland says safeguards are needed to regulate who can have access to our biological data, such as voice prints and iris scans.

"It was quite a shock to find Aeroplan using an Orwellian system such as this," said Kurland, who recently travelled to Toronto to lecture on access to information.

When he had called Aeroplan's automated answering system, a recorded voice told him that a new security feature had been added.

"We have introduced a voice print security feature and in the future I'll use this voice print to verify your identity," he was told by an automated voice.

Kurland's reaction was to hit the zero button on his phone and keep pressing until an operator came on who changed his seat without the necessity of being voice-printed.

He wants to know why this feature has been added to Aeroplan's service and worries that voice prints of customers will be part of an "international matrix that will allow foreign governments to retrieve and store a voice print voluntarily supplied by a Canadian citizen."

But Aeroplan's Michele Meier said that would not happen.

"We have a stringent privacy rule that prevents us giving that information to anyone. This is just an in-house system to make it easier for customers to get service," Meier said.

She described the system as voice recognition technology that was introduced last year.

"As far as I know this is the first time anyone has complained about it," she said. "Our members seem to appreciate it."

Aeroplan has four million members, the majority living in Canada, with half a million customers living in other countries.

Anyone who didn't want to use the voice-print system could deal with Aeroplan using e-mail or direct phone lines, Meier said.

But Kurland wasn't reassured by Aeroplan's explanation.

"They might not be giving the information over as such, but government agencies might have the right to have access to it," he said.

"At the end of the day there will be no controls over my voice print once I've given it. So Canadians who voluntarily offer the voice print have just said goodbye to their personal information. It's the technological equivalent of being fingerprinted," he said.

Meier said the voice prints would not be accessible to outside agencies.

"It's an internal system and nobody outside has access to it," she said.

For Kurland, the request for voice imprints is just one more demand being made by companies and governments pushing people to prove their identity by submitting to such things as iris scans and fingerprinting.

If the Canadian government got access to voice prints it would have to share them with other countries, he said, due to international conventions covering the sharing of information for security purposes.

Friday, May 23, 2008

IRS investigates Bonita case as identity theft

By JOHN OSBORNE (Contact)
11:52 a.m., Thursday, May 8, 2008

Economic stimulus rebate checks notwithstanding, dealing with the Internal Revenue Service is rarely a pleasant experience.

Especially if they’re going after you for back taxes on income you never earned.

According to the Lee County Sheriff’s Office, a Bonita Springs man on Tuesday received a letter from the IRS telling him he owed nearly $5,000 from working at a grocery store in Virginia in 2006. Problem is, the man never worked at a grocery store in Virginia.

Apparently, however, his Social Security number was attached to the 1040 associated with the job.

The IRS is investigating the matter as possible identity theft.

source

Monday, May 19, 2008

How You Can Avoid Becoming A Victim Of Identity Theft Through E-Bay & Paypal

See this excellent article from Tina Barraclough who's one of the senior experts at Ezine articles

"I decided to write this article after I become a victim of identity theft on November 7, 2006. Before this happened to me , I used to be one of those people that think things like this could and would never happen to me, I do not feel this way anymore. I found out the hard way that if you do not take all the necessary step to protect yourself from identity theft, that sometime in your life you could become a victim.

First off, let me tell you what happened to me. On the morning of November 7, 2006 I got on my computer to check my emails and do all my usual activity related to my home businesses that I am involved in.

When I opened up my email program I noticed the first 50 or so emails were from eBay saying "You have won such and such" item. I am thinking to myself that these emails must be fake emails as I had not bought anything from E-Bay recently. So I thought the next time I go onto eBay I will check and see if these emails were in my messages in my eBay account.

Just then my friend called me to ask me if I could go on E-bay and look for something for her as her computer was down (That was my blessing as it would turn out) I go into my E-bay account and as I am looking for this item for her I notice I had a new feedback score, and I knew I should not have a new score as I did not purchase anything new recently.

I click on my feedback to see where this came from, and to my surprise I received feedback from one of the sellers that sold an item that was in those emails I had gotten from E-bay. At this point in time I am starting to freak out here because I am now realizing that the emails I received from E-bay were not fake emails apparently. I tell my friend I will call her back."



Click here for more of Tina's article on How You Can Avoid Becoming A Victim Of Identity Theft Through E-Bay & Paypal

Friday, May 16, 2008

Tips To Ward Off Hackers And Identity Theft

Here's another interesting article how to ward off Hackers and Identity Theft by Nazima Golamaully

Hackers and identity theft is a very real cause for concern today and not something that you would normally associate with science fiction where all sorts of plots are always being hatched in order to rob people of their identities.

With the dawn of the Internet, today there is a real threat concerning hackers and identity theft which means that you must be on top of the situation at all times and be educated with regard to knowing how to prevent someone hacking your personal details and robbing you off your identity.

Advanced Techniques Of Stealing Your Identity

Today, hackers and identity theft are a very real threat and the advanced techniques being used make robbing you of your identity as simple as stealing candy from a child. Essentially, a hacker will find out your name, credit card number, Social Security number or other piece of vital information and then use it to perform illegal acts.

Please see the rest of Nazima Golamaully articel in Ezine Articles.

Wednesday, May 14, 2008

Consumer identity-theft protection services: What works?

And who actually puts a Social Security number on the side of a truck?
By Dan Tynan




May 6, 2008 (PC World) You can't open a newspaper or a browser without reading about some data spill that has put consumers' personal information at risk. Over the past three years, more than 220 million private records have been lost or stolen, according to the San Diego-based Privacy Rights Clearinghouse. In 2007, 8 million to 15 million Americans had their identities stolen. The odds that it will happen to you are about one in five, according to surveys conducted by the Chubb Group.

Identity theft is a national epidemic, but some firms also see it as a marketing opportunity. In fact, some credit bureaus and banks that facilitated the spread of easy credit--and in the process unwittingly made identity theft a more profitable crime--now sell services to help you avoid having your identity pilfered.

For $10 to $20 a month, a company such as LifeLock or TransUnion will monitor your credit reports, alert you if anyone opens an account in your name, and help you recover fraudulent charges. But you can do many of the things these services offer to do, at no cost except for the effort (see "DIY identity-theft protection: A 12-step program" for details).

To assess the paid services, we signed up with six leading firms. Even services that worked as advertised weren't comprehensive. Only two -- Suze Orman's Identity Theft Kit and Identity Guard -- offered protection for anything beyond financial fraud. Using any of the services is better than doing nothing, but you may still have to work to safeguard your identity.

Monitoring your credit
Annual credit reports are free, but Javelin Strategy and Research president James Van Dyke says that credit monitoring has become a billion-dollar business for credit bureaus.

The keys to your financial identity jangle in the pockets of the Big Three credit bureaus: Equifax, Experian, and TransUnion. When you apply for a credit card, sign up for a wireless plan, or apply for a job, the company you're trying to do business with is likely to request a copy of your credit report. If anyone steals your identity, that person's bad behavior goes on your report, hurting your chances for a loan, a phone, or a job.

Federal law entitles you to a free annual report from each of the Big Three. You also qualify for a free copy if you've recently been denied credit or if you're an identity-theft victim. The bureaus make no money by supplying free credit reports, but they make a lot of money -- more than $1 billion annually, according to Javelin Strategy and Research president James Van Dyke--by selling credit-monitoring services.

For $5 to $20 per month, a credit-monitoring service will alert you whenever your report changes. If a thief opens new accounts in your name, you'll usually find out within a few days. Most monitoring services offer online credit reports, online credit scores (showing your chances of obtaining credit), and tools for managing and improving your credit rating.

But a credit-monitoring service won't tell you if someone steals your credit card and runs up huge bills; for that you must check your monthly billing statements. Furthermore, if you receive an alert about a dubious inquiry, you'll have to identify it as bogus and contact the credit bureaus on your own.

Our real-world tests of two major credit-monitoring services yielded mixed results. First we signed up for TrueCredit's three-in-one monitoring service, which promises to deliver e-mail alerts from all three bureaus for $15 a month. The first two times our tester tried to open a new credit account, TrueCredit failed to issue an alert. A third test a month later was more successful.

Tuesday, May 13, 2008

2 charged with identity theft

By Brent Jones
May 7, 2008

A federal grand jury indicted two Baltimore men and a city woman yesterday on charges of stealing mail and using the victims' Social Security numbers and other identification information to cash checks, prosecutors said.

Joseph Lawrence, 43, Maurice Racks, 53 and Tara Wagner, 37, are accused of assuming the identities of at least 31 people from April through October of last year and face charges of conspiracy to commit mail fraud and aggravated identity theft, according to the U.S. attorney's office.

The indictment alleges that the defendants created false identification documents in the names of the victims by combining their own personal information with the victims' information. The defendants then used the false identification documents to cash checks, according to the indictment. Prosecutors say some of the victims lived on Dudley Avenue in Baltimore and on Foxcreek Court in Owings Mills. Lawrence and Wagner could face a maximum of 25 years in prison if convicted; Racks could face a maximum of 10 years.

Monday, May 12, 2008

Sheriff says identity theft ring broken up, suspect shot

By Kevin Cole and Nancy Gaarder
05/08/2008

Authorities say they broke up an identity theft ring Wednesday, but only after a violent struggle in a downtown Omaha hotel hallway in which a suspect was shot in the chest and a sheriff's deputy was hit over the head with a vase.

Jason Galle, 32, of Omaha was taken to Creighton University Medical Center in critical condition from the gunshot wound. Douglas County Sheriff's Deputy Mike Smith suffered about a 4-inch gash in the back of his head and also was taken to Creighton.

Smith was treated and released. Douglas County Sheriff Tim Dunning said Galle is expected to recover.

The incident unfolded as if from a movie script. According to Dunning:

Deputies Smith and Brenda Wheeler went to the Courtyard by Marriott, 10th and Dodge Streets, about 10 a.m. Wednesday after employees become suspicious of a couple who had checked in using what appeared to be a stolen credit card.

Smith, who has been with the Sheriff's Office 10 years, and Wheeler, a 16-year-veteran, headed to Room 416, where the couple were staying. As the two deputies left the elevator and headed down the hallway, they saw Galle and a 23-year-old pregnant woman coming out of the room.

Galle was carrying a rolled-up pair of blue jeans under his arm, and the woman was holding a black satchel.

Galle tried to hurry past the deputies and into the elevator, when Smith tried to stop him. As Galle pushed the deputy back, the jeans fell from his arm, and a .22-caliber pistol tumbled out.

The two men began to struggle while Wheeler took control of the woman, fearing that she, too, could be carrying a gun.

Smith then got one of Galle's wrists handcuffed, but Galle grabbed a heavy glass vase and smashed Smith across the back of the head.

Dunning said that by that time, the deputy was "fighting for his life'' and unholstered his Smith & Wesson 9 mm revolver.

Smith fired once, striking Galle in the chest.

Galle fell to the floor and curled up, bleeding so much that early reports indicated that he had been shot twice, once in the chest and once in the leg.

Smith was bleeding from the back of the head.

Deputies learned that Galle and the woman were headed to a room on the eighth floor where two other men were staying.

Additional deputies arrived at the hotel. Authorities headed to the eighth floor, where they found two men in a room with a copy machine and other instruments used for making false identification, Dunning said.

"I'm really having a good feeling that this will lead to the closing of an identity theft ring,'' he said.

Douglas County Attorney Don Kleine said his office would review reports from the Sheriff's Office when the investigation is completed and decide what charges are appropriate.

The incident had its genesis in a Sunday morning church service at St. Wenceslaus Catholic Church, near 153rd and Pacific Streets.

A woman left her purse in her car while she attended Mass. Someone broke into the car and stole the purse, which contained cash, identification and credit cards.

Because the church is outside Omaha's city limits, the Douglas County Sheriff's Office, not the Omaha Police Department, responded to the call and handled the investigation.

Wednesday, Galle and the woman arrived at the hotel and checked in using one of the credit cards. Hotel employees became suspicious of the two, so they called the name listed on the card. A person answered the phone and confirmed that the people staying at the hotel were not authorized to use the card.

That's when hotel employees called authorities. Marriott officials have declined to comment.

Sunday, May 11, 2008

Take steps to guard against identity theft

Published: Thursday, May 8, 2008


Not too many years ago, Petaluma residents didn’t worry about their mail being stolen or their cars being rifled by thieves during the night.

But times have certainly changed, and a couple of recent incidents highlight the importance of taking precautions to avoid becoming a victim of identity theft.

Last month, residents of rural Oak Lane and Jessie Lane reported a series of in-cidents in which someone en-tered their parked, unlocked cars during the night. One of the victims reported his credit card was stolen from the glove box of his car. Others felt that the intruders were looking for financial information that they could use for fraudulent purposes.

“We didn’t have to lock our doors back in the ’80s,” said one of the victims, “but it’s different now.”

In another incident, two Vallejo residents were arrest-ed at a Petaluma motel on April 30 for allegedly stealing mail from up to 100 people in mailboxes in several Bay Area cities, and then committing forgery by altering checks.

The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft is serious and takes many forms. Some victims spend hundreds of dollars and many hours repairing damage to their good name and credit record.

According to the FTC, thieves use a variety of methods to get hold of your information, including:

Dumpster diving. They rummage through trash looking for bills or other paper with your personal information on it.

Skimming. They steal credit and debit card numbers by using a special storage device when processing your card.

Phishing. They pretend to be financial institutions or companies and send spam or pop-up messages to get you to reveal your personal information.

Changing your address. They divert your billing statements to another location by completing a change-of-address form.

Old-fashioned stealing. They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit offers; and new checks or tax information. They steal personnel records, or bribe employees who have access.

Pretexting. They use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources.

While there is no fool-proof way to avoid ID theft, there are steps you can take to minimize your chance of becoming a victim, and steps to take to minimize the damage should a theft occur. The FTC recommends following the “deter, detect, defend” strategy:

Deter identity thieves by safeguarding your private sensitive financial information.

Detect suspicious activity by routinely monitoring your financial accounts and billing statements.

Defend against identity theft as soon as you suspect a problem.

Saturday, May 10, 2008

Hall Monitor: Councillor claims Facebook identity theft

An alarmed Toronto city councillor has alerted police after discovering someone has been impersonating him on the social-networking site Facebook.


Howard Moscoe (Eglinton-Lawrence) said he learned of the "identity theft" when a fellow councillor mentioned that he was his "friend." Unfamiliar with the term as Facebook lingo for being part of each other's online social cirlces, Mr. Moscoe asked for an explanation. He told his colleague he didn't even have a Facebook page.


Curious, Mr. Moscoe said he then called his daughter who had his granddaughter check out his profil. She reported back on the contents and his collection of "friends" – which besides other city councillors includes Ontario Premier Dalton McGuinty.

In a letter he has addressed to Facebook administrators, he asks for their intervention to take down the page.

"It has just come to my attention that someone has registered with your service using my name, photograph and information without my knowledge, permission or consent," a copy of the email letter Mr. Moscoe distributed to reporters states. "The information that has been posted to the site contains statements, purportedly made by me, which can be considered defamatory to other persons."

Mr. Moscoe told reporters that some of the comments, which he did not make, concerned blustery city councillor Rob Ford (Etobicoke North). Mr. Moscoe called to apologize and to inform him that he had nothing to do with the remarks but said he didn't think Mr. Ford was anymore up on the Facebook concept than he was.

"I have advised our local police force of this identity theft and am now contacting you to request that you immediately suspend the user account," he furher wrote to Facebook administrators. "Thank you for your assistance with this unpleasant misappropriation."

Friday, May 9, 2008

Roboform Keeps Passwords and More Protected

Lisa wrote an interesting article on Roboform and how to keep Passwords and More Protected. Please see excerpt below:

"With technology comes convenience, but also threats to security. Each time a consumer accesses their bank or shops online their keystrokes may be recorded, hackers may obtain their financial information and personal information may be released. There is a software to protect Internet users, while they are doing any number of tasks from registering for travel to playing games online.


Today's technology offers consumers so many conveniences; on-line banking, internet shopping, on-line bill paying, research at our fingertips, e-mail, instant messaging, photo image storing and creation and so much more.
In addition to many important day to day financial and communication tasks, the internet offers many other opportunities for entertainment, free samples, and survey's, game and contests. But with all of the convenience of working and playing on-line, in addition to the security risks, most users still feel burdened by the amount of time it takes to fill in forms over and over. As we access any number of internet sites, we are required time and again to complete forms, create accounts, sign in and utilize passwords."

Click here for more of Lisa Carey's article on Roboform Keeps Passwords and More Protection