ebook img

Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves PDF

298 Pages·2015·1.38 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves

SWIPED SWIPED How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves ADAM LEVIN with Beau Friedlander Copyright © 2015 by Adam Levin. Published in the United States by PublicAffairs™, a Member of the Perseus Books Group All rights reserved. Printed in the United States of America. No part of this book may be reproduced in any manner whatsoever without written permission except in the case of brief quotations embodied in critical articles and reviews. For information, address PublicAffairs, 250 West 57th Street, 15th Floor, New York, NY 10107. PublicAffairs books are available at special discounts for bulk purchases in the U.S. by corporations, institutions, and other organizations. For more information, please contact the Special Markets Department at the Perseus Books Group, 2300 Chestnut Street, Suite 200, Philadelphia, PA 19103, call (800) 810-4145, ext. 5000, or e-mail [email protected]. Book design by Milenda Nan Ok Lee Library of Congress Control Number: 2015912904 ISBN 978-1-61039-587-8 (HC) ISBN 978-1-61039-588-5 (EB) First Edition 10 9 8 7 6 5 4 3 2 1 To Heather and Jayger Wilde Contents PART 1 An Overview of the Problem 1 What’s in a Name (and a Number)? 2 A Short History of Identity (and Fraud): (And You Thought It Was Just About Credit Cards) 3 Swiping Happens PART 2 The Basics of What You Can Do 4 Understanding the Problem Is the Solution 5 The Three Ms PART 3 The Many Types of Identity Theft 6 Spies in Your Home: How the Internet of Things May Violate Your Privacy, Threaten Your Security, and Ruin Your Credit 7 A Taxing Situation 8 It’s a Hard-Knock Life: Child Identity Theft 9 May the Farce Be with You: Social Media Dos and Don’ts 10 From Dangerous to Deadly: On Healthcare Scams and Medical Identity Theft 11 Wanted Dead or Alive: (But It’s Easier If You’re Dead) 12 Culture Eats Strategy: Business Considerations 13 The Three Ms for Companies: You Must Build It Because They Will Come 14 The Highest Law PART 4 Resources and Terms APPENDIX 1 Fraud Stories APPENDIX 2 A Glossary of Scams APPENDIX 3 Identity Theft and the Deceased: Prevention and Victim Tips APPENDIX 4 Request a Credit Report for the Deceased APPENDIX 5 Deceased Affidavit of Fact Acknowledgments Index PART 1 An Overview of the Problem 1 What’s in a Name (and a Number)? “I was just doing it to tease her, basically.” It was a harmless tweet. A girl named Brooklyn from Prosper, Texas, sent a picture to her friend Alanna in reply to one of many tweets about a cute boy Alanna had seen while shopping at a big-box store in nearby Frisco. Then something fundamentally unknowable happened: the mysterious Internet phenomenon of going viral. Viruses reproduce by sending their DNA into a host cell, leaving the infected host, now itself a virus, to find another host cell for further reproduction. On the Internet, that process of cellular invasions and osmosis happens to users rather than cells, and it happens very fast. The DNA can be anything—a hilarious video or an unexpected quip harnessed to a snapshot. On November 2, 2014, the DNA was Brooklyn Reiff’s week-old picture of a teenage boy named Alex Lee, tweeted as a playful fillip to her friend’s obsession. How did Brooklyn’s sneaky shot of Alex Lee invade an entire population, replicating her friend Alanna Page’s crush in one user after another? You might call it theft. In fact, there were a lot of little robberies—and they added up. The first one happened when Brooklyn went beyond the act of stealing a glimpse of the checkout boy, and snapped his picture. The young man in question didn’t pose for the picture. He had no idea that a picture had been taken. Certainly, no modeling release was signed. He was just there, doing his job. Lesson Number One: In the world of Big Data, with mobile, Internet- connected cameras in every pocket, we are always just a few clicks away from being everywhere. The young man whose picture went viral got a real-life taste of that fact when his total lack of privacy became apparent; he became an Internet sensation by doing nothing but bagging products at the checkout counter. More than 500 million photographs are uploaded to major websites every day. More than 2 billion pictures are taken on mobile devices every day. Factor in webcams and other surveillance devices, and the chances that your image isn’t somewhere on the Internet are right up there with becoming the next Dalai Lama. Alex Lee experienced one of these countless daily intrusions that happen in our social media–obsessed society. He won the jackpot in the “privacy is on life support” sweepstakes. It didn’t matter that he was tending to his own business. His existence created the potential for a transaction—one that required neither his consent nor his participation. The snapping of his picture underscored a simple reality: If you’re out in the world, the world can look at you. And if the world has a smartphone, it can snap, store, share, and reshare you, all in just a few taps, each one a little theft of your face, your identity, your self. In this particular instance, someone grabbed Brooklyn’s snapshot from her Twitter account and put it on another social networking site, Tumblr. Brooklyn had no idea. Meanwhile, the picture started replicating on Twitter accounts. While the complexity of the picture’s distribution was at least potentially knowable, it was in no way controllable. The million “little thefts” that made Alex Lee famous are metaphorical. No court of law would rule that Brooklyn’s actions, or any of the actions of other people who retweeted her photo, rise to the level of theft. But, well, you get the picture—as did millions of people around the world. Needless to say, Alex Lee had no idea any of this was happening. He hadn’t done anything wrong or unusual. There were no regrettable posts, no questionable sites visited, no malware behind it all. His phone wasn’t even powered on when the month-long distribution of his image reached critical mass the following Sunday sometime during the Cowboys-Packers game. It was right after that game that Brooklyn first noticed something was afoot on Twitter. She started getting mentioned in posts even though she didn’t have very many followers. Her surreptitious shot of Alanna’s crush with the waterfall of Justin Bieber hair was getting love from people she didn’t know. Among those taking a shine to the checkout boy was a teenager in the UK who had liberated the picture of Alex from a Tumblr user, who had pinched it from Brooklyn’s original reply tweet to her friend Alanna. The British girl’s tweet was simple: “YOOOOOOOOOO.”

Description:
Identity fraud happens to everyone. So what do you do when it’s your turn?Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam filters, and those are good ideas as far as they go. But with the breache
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.