Identity Theft Matrix, Identity Theft, ID Theft, ID Theft Victim, Identity Theft Insurance, Identity Theft What To Do, Identity Theft Help, Identity Theft Protection, Identity Theft Prevention

Saturday, May 31, 2008

Ex-con seeks to launch devices fighting ID theft

By ANGELA SHAH / The Dallas Morning News
ashah@dallasnews.com

Like other entrepreneurs, Ray Beasley begins his day with an 8 a.m. coffee stop at Starbucks. Sipping a Cafe Americano, he flips open his Sony Vaio laptop, fires off e-mails and works his cellphone.

Ray Beasley talks to Adamson High School students on Career Day about his drive to develop a device to prevent identity theft despite a past that includes prison. " style="cursor: pointer; width: 160px; height: 36px;" onclick="return clickedImage(this);" alt="REX C. CURRY/Special Contributor" src="/sharedcontent/dws/img/v3/05-11-2008.NB_11bsystem.G402D73K3.1.jpg">

But unlike them, Mr. Beasley's résumé doesn't include an MBA or experience in corporate America. He's an ex-con who developed his business idea while serving time in Texas prisons, and his "brain trust" is made up of fellow inmates convicted for the crime he's now trying to prevent – identity theft.

"My first thought was: You've got to be kidding me," says Donald Hicks, a University of Texas at Dallas economics professor, when Mr. Beasley showed up two years ago, unannounced, at his campus office. "This guy is built like a linebacker, and he's just out of prison?"


But Dr. Hicks listened as Mr. Beasley reeled off his tale of hours spent in prison rec yards and day rooms interviewing cons, learning their scams and silently drawing up plans for a computer program he believes could thwart identity theft using countertop machines in stores and restaurants.

"The spirit and the drive he displayed ... on a human level, I admire that tremendously," says Dr. Hicks. "I couldn't just blow him off."

The 45-year-old Mr. Beasley grew up on Ramsey Street in Cedar Hill, a southern Dallas County town where parents turned children loose on bicycles and neighbors knew and looked out for each other. The Beasleys – Mom, Dad and four children – were devout Jehovah's Witnesses who quoted scripture with ease.

Dad Raymond Beasley Sr. had founded his own construction business while in his early 30s. The younger Mr. Beasley often joined his father at jobs in Highland Park, where Beasley Foundation Contractors poured concrete for Bernard Fulton, founder of the prestigious Greenhill School, and real estate doyenne Allie Beth Allman. The boy saw –and liked – how the other half lived.

The drug life

In fall 1981, Mr. Beasley started classes at the University of Houston. But when his father's construction business fell on hard times a year later, he dropped out and went looking for a way to make money, quickly.

It took one phone call to set up a meeting for him to buy 7 kilograms of cocaine – the first time the 19-year-old had ever seen the drug.

"It was quicker and easier to get kilos of cocaine than a loan from a bank," Mr. Beasley says now.

This was a heady time for the young man who'd been spit on proselytizing door-to-door as a Jehovah's Witness. He bought expensive suits, drove flashy cars and dated even flashier women.

Then, in February 1990, Mr. Beasley and a business associate from East Texas went to meet "Angela" and her California connection at the Bennigan's on Northwest Highway to buy cocaine. "California," he recalls, turned out to be an undercover officer, and the two were arrested.

While out on bail on the drug charges, Mr. Beasley briefly joined a gang with a specialty in stealing identities and check kiting. "It was like robbing a bank with an ink pen," he says.

Hard time

In September 1991, Mr. Beasley saw the harder side of crime. He began his 99-year term at the red-brick, razor-wired Coffield unit in Tennessee Colony, about 70 miles southeast of Dallas.

Beneath the 40-foot-tall stained-glass window in the prison's cavernous chapel, he and other inmates would pretend to listen to tapes of religious music. Instead, an inmate known as "Dorsett" would school Mr. Beasley in Identity Theft 101.

All you need are obituaries in the newspaper, Dorsett told him. They'd give you a birth date and place of birth as well as the mother's maiden name – most of the ingredients needed to pose as someone else.

Identities in hand, "Reginald" explained that personal checks could then be made from scratch with stock paper from an office supply store and some software.

In 1994, Mr. Beasley picked up his abandoned college studies, enrolling in data processing classes, where he learned how to draw schematic diagrams.

Fellow inmates tutored him in subjects such as COBOL programming and MS-DOS. He got a transfer to the Ramsey One unit near Houston in 2001 to continue his studies.

If the prisoners at Coffield gave the inmate his undergraduate education in identity theft, Ramsey One was graduate school. Ramsey housed professionals: engineers, bankers and computer programmers.

"We didn't talk scams; we talked systems capabilities," Mr. Beasley says.

This is where he met Michael Miller, a fellow inmate who had been a computer programmer. They were an odd pair – the fiftysomething bespectacled Mr. Miller and Mr. Beasley, who weighed nearly 300 pounds by then. Mr. Miller offered technical advice, and Mr. Beasley could resurrect his drug dealer's countenance when necessary, shielding Mr. Miller from prison violence.

"I was very skeptical," says Mr. Miller, now released and living in the Dallas area. "In that environment, you always assume everybody but yourself is a scam artist."

For three years, Mr. Beasley retraced the steps to Mr. Miller's dorm, six rooms down. Pointing to a particular formula in Mr. Beasley's hand-drawn schematic, Mr. Miller would ask: How would this stop someone from opening up an account in my name?

Over the 15 years he was in prison, Mr. Beasley talked with about 900 inmates, he believes. This think tank of cons shared their methods with him and poked holes in solutions he would propose within his computer program.

In March 2006, Mr. Beasley was paroled after 15 years in prison. By then, both his parents were dead and he was estranged from his brothers and sisters. He moved in with an aunt in Wichita Falls and got a job washing dishes at a local El Chico.

But in Dallas, Carolyn Jones, an old high school teacher, became his agent, trying to drum up support for his fledgling company, B System.

"He had a lot more potential than he ever really lived up to," she says.

And then, that July, he paid his surprise visit to Don Hicks at UTD.

It was Dr. Hicks who put him in touch with Tom Hill, an Electronic Data Systems Inc. fellow and a rainmaker in the tech world. Like Dr. Hicks, Mr. Hill found himself attracted to the ex-con's passion.

Mr. Hill paid the tuition for an entrepreneurship class at Southern Methodist University, telling Mr. Beasley that having an idea wasn't enough.Mr. Hill also introduced him to Doug Harris, who runs UTD's cybersecurity institute. Dr. Harris said UTD would build a beta machine to test Mr. Beasley's theories if he could raise the money: $600,000.

"If I can get that machine built, I can get everything I want," Mr. Beasley says now.

Believers and backers

Since that meeting last June with Dr. Harris, Mr. Beasley has rounded up investors in B System: a family of churchgoers in Sunnyvale, a group of Dallas firefighters, old friends who want this story to have a happy ending.

One morning, Gigi White, now a Lancaster City Council member, walked into Starbucks and reintroduced herself to a speechless Mr. Beasley. He hadn't seen her since they were in their 20s on the Dallas club scene.

But she'd heard about his time in prison, his release and his quest to make B System real. As she left, the councilwoman pressed a $300 check into Mr. Beasley's hand.

"You've always been a smart man," she told him. "Now you're doing it smarter."

In the last year, Mr. Beasley has raised about $85,000, most of which he has spent on food, rent, Internet service and an attorney to help him patent his idea.

His investors say they believe in Mr. Beasley's dream.

"I gave Enron a chance," says Ray Allen, a retiree who, along with his wife, Martha, invested $5,000 in B System. "Why not him?"

Still, the big money has eluded Mr. Beasley, and the clock is ticking.

"If this doesn't happen in a hurry, someone else will do it," Dr. Harris says.

Mr. Beasley refuses to take time away and get a regular job.

Working 9-to-5 wouldn't get him the money fast enough, he says. "My story hasn't been typical so far, so why should I act typically?"

Mr. Beasley finds it frustrating to know that if he returned – even briefly – to his old life, getting the money would be easy.

Instead, he hopes for a savior. "God gave Joseph the power to interpret dreams, and the pharaoh listened," he said, quoting from a Bible story in Genesis. "I just haven't found the right pharaoh."


Wednesday, May 28, 2008

Springfield woman gets four years in ID theft case

By SBJ Staff
5/9/2008 9:58:59 AM

A Springfield woman was sentenced last month to four years in prison following a joint investigation by Missouri Attorney General Jay Nixon, Greene County Prosecuting Attorney Darrell Moore and the Springfield Police Department.

According to a news release from Nixon’s office, Circuit Judge Thomas E. Mountjoy sentenced Norma Black, of Springfield, on one count of felony identity theft in Greene County Circuit Court. The release said Black stole an acquaintance’s identity to make $3,000 worth of withdrawals from the victim’s bank account, including ATM withdrawals and charges to online poker sites.

Black was indicted by a Greene County grand jury in September 2006 after identity theft charges were filed by Moore against her and co-defendant Jason Waln, who was sentenced in March to five years in prison for his role in the case.

The victim, whose name was not disclosed, reported to Nixon’s office that someone had accessed her bank account to make ATM withdrawals, purchase items at a Springfield discount store and for use on several online gambling sites. The victim discovered her debit card missing from her purse after she spent the night at Black’s home. Nixon’s office was appointed to assist in the multi-faceted investigation, which linked the defendants to the use of the debit card.

“We are always ready to work with local prosecutors to share our expertise in identity theft cases, and it is satisfying to have another one of those cases seen through to its conclusion,” Nixon said in the release. “It is also a good time to reinforce to Missouri consumers how important it is to safeguard their sensitive personal information, whether it is online or in their purses or wallets.”

Click here to take Nixon’s 10-question ID Theft Quiz to test your knowledge about protecting personal information.

Copyright 2008 SBJ. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

source

Monday, May 26, 2008

When security intrudes on our lives

When security intrudes on our lives

Voice-print systems offer safety in an insecure world, but how much privacy should we sacrifice?

Gerry Bellett, Vancouver Sun

Published: Tuesday, April 15, 2008

One recent Monday morning, Vancouver immigration lawyer Richard Kurland phoned Aeroplan to change his seats on a flight he plans to make May 15 and found he was being asked to submit to being "voice-printed."

Was this just another example of companies adding more layers of security to protect themselves and their customers from the ravages of identity theft or something more sinister?

Kurland is betting on the more sinister.

Vancouver immigration lawyer Richard Kurland says safeguards are needed to regulate who can have access to our biological data, such as voice prints and iris scans.

"It was quite a shock to find Aeroplan using an Orwellian system such as this," said Kurland, who recently travelled to Toronto to lecture on access to information.

When he had called Aeroplan's automated answering system, a recorded voice told him that a new security feature had been added.

"We have introduced a voice print security feature and in the future I'll use this voice print to verify your identity," he was told by an automated voice.

Kurland's reaction was to hit the zero button on his phone and keep pressing until an operator came on who changed his seat without the necessity of being voice-printed.

He wants to know why this feature has been added to Aeroplan's service and worries that voice prints of customers will be part of an "international matrix that will allow foreign governments to retrieve and store a voice print voluntarily supplied by a Canadian citizen."

But Aeroplan's Michele Meier said that would not happen.

"We have a stringent privacy rule that prevents us giving that information to anyone. This is just an in-house system to make it easier for customers to get service," Meier said.

She described the system as voice recognition technology that was introduced last year.

"As far as I know this is the first time anyone has complained about it," she said. "Our members seem to appreciate it."

Aeroplan has four million members, the majority living in Canada, with half a million customers living in other countries.

Anyone who didn't want to use the voice-print system could deal with Aeroplan using e-mail or direct phone lines, Meier said.

But Kurland wasn't reassured by Aeroplan's explanation.

"They might not be giving the information over as such, but government agencies might have the right to have access to it," he said.

"At the end of the day there will be no controls over my voice print once I've given it. So Canadians who voluntarily offer the voice print have just said goodbye to their personal information. It's the technological equivalent of being fingerprinted," he said.

Meier said the voice prints would not be accessible to outside agencies.

"It's an internal system and nobody outside has access to it," she said.

For Kurland, the request for voice imprints is just one more demand being made by companies and governments pushing people to prove their identity by submitting to such things as iris scans and fingerprinting.

If the Canadian government got access to voice prints it would have to share them with other countries, he said, due to international conventions covering the sharing of information for security purposes.

Friday, May 23, 2008

IRS investigates Bonita case as identity theft

By JOHN OSBORNE (Contact)
11:52 a.m., Thursday, May 8, 2008

Economic stimulus rebate checks notwithstanding, dealing with the Internal Revenue Service is rarely a pleasant experience.

Especially if they’re going after you for back taxes on income you never earned.

According to the Lee County Sheriff’s Office, a Bonita Springs man on Tuesday received a letter from the IRS telling him he owed nearly $5,000 from working at a grocery store in Virginia in 2006. Problem is, the man never worked at a grocery store in Virginia.

Apparently, however, his Social Security number was attached to the 1040 associated with the job.

The IRS is investigating the matter as possible identity theft.

source

Monday, May 19, 2008

How You Can Avoid Becoming A Victim Of Identity Theft Through E-Bay & Paypal

See this excellent article from Tina Barraclough who's one of the senior experts at Ezine articles

"I decided to write this article after I become a victim of identity theft on November 7, 2006. Before this happened to me , I used to be one of those people that think things like this could and would never happen to me, I do not feel this way anymore. I found out the hard way that if you do not take all the necessary step to protect yourself from identity theft, that sometime in your life you could become a victim.

First off, let me tell you what happened to me. On the morning of November 7, 2006 I got on my computer to check my emails and do all my usual activity related to my home businesses that I am involved in.

When I opened up my email program I noticed the first 50 or so emails were from eBay saying "You have won such and such" item. I am thinking to myself that these emails must be fake emails as I had not bought anything from E-Bay recently. So I thought the next time I go onto eBay I will check and see if these emails were in my messages in my eBay account.

Just then my friend called me to ask me if I could go on E-bay and look for something for her as her computer was down (That was my blessing as it would turn out) I go into my E-bay account and as I am looking for this item for her I notice I had a new feedback score, and I knew I should not have a new score as I did not purchase anything new recently.

I click on my feedback to see where this came from, and to my surprise I received feedback from one of the sellers that sold an item that was in those emails I had gotten from E-bay. At this point in time I am starting to freak out here because I am now realizing that the emails I received from E-bay were not fake emails apparently. I tell my friend I will call her back."



Click here for more of Tina's article on How You Can Avoid Becoming A Victim Of Identity Theft Through E-Bay & Paypal

Friday, May 16, 2008

Tips To Ward Off Hackers And Identity Theft

Here's another interesting article how to ward off Hackers and Identity Theft by Nazima Golamaully

Hackers and identity theft is a very real cause for concern today and not something that you would normally associate with science fiction where all sorts of plots are always being hatched in order to rob people of their identities.

With the dawn of the Internet, today there is a real threat concerning hackers and identity theft which means that you must be on top of the situation at all times and be educated with regard to knowing how to prevent someone hacking your personal details and robbing you off your identity.

Advanced Techniques Of Stealing Your Identity

Today, hackers and identity theft are a very real threat and the advanced techniques being used make robbing you of your identity as simple as stealing candy from a child. Essentially, a hacker will find out your name, credit card number, Social Security number or other piece of vital information and then use it to perform illegal acts.

Please see the rest of Nazima Golamaully articel in Ezine Articles.

Wednesday, May 14, 2008

Consumer identity-theft protection services: What works?

And who actually puts a Social Security number on the side of a truck?
By Dan Tynan




May 6, 2008 (PC World) You can't open a newspaper or a browser without reading about some data spill that has put consumers' personal information at risk. Over the past three years, more than 220 million private records have been lost or stolen, according to the San Diego-based Privacy Rights Clearinghouse. In 2007, 8 million to 15 million Americans had their identities stolen. The odds that it will happen to you are about one in five, according to surveys conducted by the Chubb Group.

Identity theft is a national epidemic, but some firms also see it as a marketing opportunity. In fact, some credit bureaus and banks that facilitated the spread of easy credit--and in the process unwittingly made identity theft a more profitable crime--now sell services to help you avoid having your identity pilfered.

For $10 to $20 a month, a company such as LifeLock or TransUnion will monitor your credit reports, alert you if anyone opens an account in your name, and help you recover fraudulent charges. But you can do many of the things these services offer to do, at no cost except for the effort (see "DIY identity-theft protection: A 12-step program" for details).

To assess the paid services, we signed up with six leading firms. Even services that worked as advertised weren't comprehensive. Only two -- Suze Orman's Identity Theft Kit and Identity Guard -- offered protection for anything beyond financial fraud. Using any of the services is better than doing nothing, but you may still have to work to safeguard your identity.

Monitoring your credit
Annual credit reports are free, but Javelin Strategy and Research president James Van Dyke says that credit monitoring has become a billion-dollar business for credit bureaus.

The keys to your financial identity jangle in the pockets of the Big Three credit bureaus: Equifax, Experian, and TransUnion. When you apply for a credit card, sign up for a wireless plan, or apply for a job, the company you're trying to do business with is likely to request a copy of your credit report. If anyone steals your identity, that person's bad behavior goes on your report, hurting your chances for a loan, a phone, or a job.

Federal law entitles you to a free annual report from each of the Big Three. You also qualify for a free copy if you've recently been denied credit or if you're an identity-theft victim. The bureaus make no money by supplying free credit reports, but they make a lot of money -- more than $1 billion annually, according to Javelin Strategy and Research president James Van Dyke--by selling credit-monitoring services.

For $5 to $20 per month, a credit-monitoring service will alert you whenever your report changes. If a thief opens new accounts in your name, you'll usually find out within a few days. Most monitoring services offer online credit reports, online credit scores (showing your chances of obtaining credit), and tools for managing and improving your credit rating.

But a credit-monitoring service won't tell you if someone steals your credit card and runs up huge bills; for that you must check your monthly billing statements. Furthermore, if you receive an alert about a dubious inquiry, you'll have to identify it as bogus and contact the credit bureaus on your own.

Our real-world tests of two major credit-monitoring services yielded mixed results. First we signed up for TrueCredit's three-in-one monitoring service, which promises to deliver e-mail alerts from all three bureaus for $15 a month. The first two times our tester tried to open a new credit account, TrueCredit failed to issue an alert. A third test a month later was more successful.