Recovering From Identity Theft
()
About this ebook
The headline was dreadful from a consumer's perspective. Data from all Target stores had been criminally hacked, and essential information on forty million credit and debit cards was stolen in November and December of 2013. There are reports of angry consumers calling Target's customer service and demanding help. The merchant is the wrong place to call, just as it was pointless to call T. J. Maxx when the data contained on sixty million of their customer's cards were illegally obtained by criminal hackers.
This easy-to-understand book is the fourth in the Identity Theft series. It is intended for the general, non-specialist reader, provides a set of overall strategies and specific actions you should take if you are the victim of identity theft.
There are three appendices. The first appendix contains contact information for the Federal Trade Commission, the three major credit reporting agencies, many US banks, many consumer protection organizations, and a few of the more established companies that specialize in identity theft protection and recovery. The second appendix contains a checklist for protecting yourself from identity theft. Appendix three also contains a checklist; this one is used to aid you in recovering from identity theft if you are a victim.
Ron Leach's lectures on identity theft have been attended by more than 3,500 people. Many more have heard him on closed-circuit television. This experience, and his long experience as a professor of computer science make him uniquely qualified to write this book, the fourth in AfterMath’s Identity Theft Series.
Ronald J. Leach
About the Author I recently retired from being a professor of computer science at Howard University for over 25 years, with 9 of those years as a department chair. (I was a math professor for 16 years before that.) While I was department chair, we sent more students to work at Microsoft in the 2004-5 academic year than any other college or university in the United States. We also established a graduate certificate program in computer security, which became the largest certificate program at the university. I had major responsibility for working with technical personnel to keep our department’s hundreds of computers functional and virus-free, while providing email service to several hundred users. We had to withstand constant hacker attacks and we learned how to reduce the vulnerability of our computer systems. As a scholar/researcher, I studied complex computer systems and their behavior when attacked or faced with heavy, unexpected loads. I wrote five books on computing, from particular programming languages, to the internal structure of sophisticated operating systems, to the development and efficient creation of highly complex applications. My long-term experience with computers (I had my first computer programming course in 1964) has helped me understand the nature of many of the computer attacks by potential identity thieves and, I hope, be able to explain them and how to defend against them, to a general audience of non-specialists. More than 5,000 people have attended my lectures on identity theft; many others have seen them on closed-circuit television. I have written more than twenty books, and more than 120 technical articles, most of which are in technical areas. My interests in data storage and access meshed well with my genealogical interests when I wrote the Genealogy Technology column of the Maryland Genealogical Society Journal for several years. I was the editor or co-editor of that society’s journal for many years.
Read more from Ronald J. Leach
Data Recovery Rating: 0 out of 5 stars0 ratingsConfessions of a Cruise Lecturer Rating: 0 out of 5 stars0 ratingsSoftware Reuse: Methods, Models, Costs, Second Edition Rating: 0 out of 5 stars0 ratingsDigitizing Microfilm and Microfiche Rating: 0 out of 5 stars0 ratingsThe 101 Most Important UNIX and Linux Commands Rating: 0 out of 5 stars0 ratingsBaltimore Blue and Freddie Gray Rating: 0 out of 5 stars0 ratingsWhy 2K? Rating: 0 out of 5 stars0 ratingsThe Bible as a Manual for Identity Theft Rating: 0 out of 5 stars0 ratingsTwelve and a Half Steps to Avoid Identity Theft Rating: 0 out of 5 stars0 ratingsUser Guide to Microfilm and Microfiche Rating: 0 out of 5 stars0 ratingsEat Kids at School Rating: 0 out of 5 stars0 ratingsWhere Have All The Templars Gone? Rating: 0 out of 5 stars0 ratings
Related to Recovering From Identity Theft
Related ebooks
What Is....Business Identity Theft! Rating: 0 out of 5 stars0 ratingsHow to Survive Identity Theft: Regain Your Money, Credit, and Reputation Rating: 0 out of 5 stars0 ratingsYour Amazing Itty Bitty® Personal Data Protection Book Rating: 0 out of 5 stars0 ratingsScammed: Learn from the Biggest Consumer and Money Frauds How Not to Be a Victim Rating: 0 out of 5 stars0 ratingsPersonal Information & Identification Security Made Easy Rating: 0 out of 5 stars0 ratingsCybersecurity Implications of Election 2016 Rating: 0 out of 5 stars0 ratingsIdentity Theft and Fraud: Evaluating and Managing Risk Rating: 0 out of 5 stars0 ratingsOur Data, Ourselves: A Personal Guide to Digital Privacy Rating: 0 out of 5 stars0 ratingsDCF A Complete Guide Rating: 0 out of 5 stars0 ratingsMemoirs of a Fraudster: Confessions Rating: 0 out of 5 stars0 ratingsThe Art of the Hustle Rating: 5 out of 5 stars5/5My Data My Privacy My Choice: A Step-by-step Guide to Secure your Personal Data and Reclaim your Online Privacy! Rating: 0 out of 5 stars0 ratingsIdentity Theft For Dummies Rating: 2 out of 5 stars2/5Start A Tutoring Business Towards Passive Income: Financial Freedom, #22 Rating: 0 out of 5 stars0 ratingsConfessions of an Identity Thief Rating: 0 out of 5 stars0 ratings101 Excel 2013 Tips, Tricks and Timesavers Rating: 0 out of 5 stars0 ratingsEffective Consumer Complaining: Win - Don't Whine Rating: 4 out of 5 stars4/5The hackers' destiny - Attack to the system Rating: 0 out of 5 stars0 ratingsDesigning Luxury Brands: The Science of Pleasing Customers’ Senses Rating: 0 out of 5 stars0 ratingsHow to Land the Best $100,000 Job in America: Your Guide to High-Paying Careers in Commercial Real Estate Management Rating: 0 out of 5 stars0 ratingsHiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis Rating: 0 out of 5 stars0 ratingsChatGBT-4 Millionaire Business Ideas: The Power of GPT-4: The Ultimate Guide to Building AI-Driven Millionaire Businesses Rating: 0 out of 5 stars0 ratingsUnderstanding Cash on Cash Return: MFI Series1, #130 Rating: 0 out of 5 stars0 ratingsIdeaWise: How to Transform Your Ideas into Tomorrow's Innovations Rating: 0 out of 5 stars0 ratingsSpiderweb Capitalism: How Global Elites Exploit Frontier Markets Rating: 0 out of 5 stars0 ratingsThe End of an Era: How Silicon Valley Bank's Failure is Changing Finance Forever Rating: 0 out of 5 stars0 ratingsFacebook For Dummies Rating: 3 out of 5 stars3/5Duplicity and Duress: Snap Factories in the Making Rating: 0 out of 5 stars0 ratingsSoftware Product Management: Finding the Right Balance for YourProduct Inc. Rating: 0 out of 5 stars0 ratingsJust Another Book About Social Media Marketing Strategy - Skip It At Your Own Risk Rating: 0 out of 5 stars0 ratings
Personal Finance For You
Rich Dad Poor Dad Rating: 5 out of 5 stars5/5Rich Dad Poor Dad: What the Rich Teach Their Kids About Money That the Poor and Middle Class Do Not! Rating: 5 out of 5 stars5/5The Psychology of Money: Timeless lessons on wealth, greed, and happiness Rating: 5 out of 5 stars5/5Summary of The 48 Laws of Power by Robert Greene Rating: 4 out of 5 stars4/5Investing For Dummies Rating: 4 out of 5 stars4/5Good to Great: Why Some Companies Make the Leap...And Others Don't Rating: 4 out of 5 stars4/5Legal Loopholes: Credit Repair Tactics Exposed Rating: 4 out of 5 stars4/5The Intelligent Investor, Rev. Ed: The Definitive Book on Value Investing Rating: 4 out of 5 stars4/5Money Hacks: 275+ Ways to Decrease Spending, Increase Savings, and Make Your Money Work for You! Rating: 4 out of 5 stars4/5Personal Finance For Dummies Rating: 4 out of 5 stars4/5Summary of R. Nelson Nash's Becoming Your Own Banker Rating: 0 out of 5 stars0 ratingsRich Dad's Cashflow Quadrant Rating: 4 out of 5 stars4/5Financial Feminist: Overcome the Patriarchy's Bullsh*t to Master Your Money and Build a Life You Love Rating: 5 out of 5 stars5/5Money. Wealth. Life Insurance. Rating: 5 out of 5 stars5/5The Total Money Makeover: Classic Edition: A Proven Plan for Financial Fitness Rating: 4 out of 5 stars4/5The Black Girl's Guide to Financial Freedom: Build Wealth, Retire Early, and Live the Life of Your Dreams Rating: 5 out of 5 stars5/5Same as Ever: Timeless Lessons on Risk, Opportunity and Living a Good Life Rating: 4 out of 5 stars4/5A Happy Pocket Full of Money, Expanded Study Edition: Infinite Wealth and Abundance in the Here and Now Rating: 5 out of 5 stars5/5Estate Planning For Dummies Rating: 5 out of 5 stars5/5Principles: Life and Work Rating: 4 out of 5 stars4/5The Millionaire Next Door Rating: 4 out of 5 stars4/5The Little Book of Common Sense Investing: The Only Way to Guarantee Your Fair Share of Stock Market Returns Rating: 4 out of 5 stars4/5Set for Life: An All-Out Approach to Early Financial Freedom Rating: 4 out of 5 stars4/5Get the Hell Out of Debt: The Proven 3-Phase Method That Will Radically Shift Your Relationship to Money Rating: 5 out of 5 stars5/5Summary of I Will Teach You To Be Rich: by Ramit Sethi | Includes Analysis Rating: 4 out of 5 stars4/5
Reviews for Recovering From Identity Theft
0 ratings0 reviews
Book preview
Recovering From Identity Theft - Ronald J. Leach
Recovering From Identity Theft
Ronald J. Leach
About the Author
Preface
Some Data on Identity Theft
Introduction to Recovering From Identity Theft
A Generic Plan For Victims Of Identity Theft
Recovering From Identity Theft As Part Of An Actual Physical Theft
Recovering From Identity Theft As Part Of A Cyber Attack
Recovering From Identity Theft: Were You A Victim Of An Identity Breach?
Recovering From Identity Theft Caused By An Impersonation
Medical Identity Theft – a special kind of impersonation
Some Companies Specialize In Identity Theft Repair
Conclusion
Appendix 1: Sources for Further Information
Appendix 2: Checklist for Protecting Yourself From Identity Theft
Appendix 3: Recovering From Identity Theft
Acknowledgements
Copyright © 2013 by Ronald J. Leach
Cover design by AfterMath
Book design by Ronald J. Leach
All rights reserved.
No part of this book may be reproduced in any form or by any electronic or mechanical means including information storage and retrieval systems, without permission in writing from the author. The only exception is by a reviewer, who may quote short excerpts in a review.
About the Author
I recently retired from being a professor of computer science at Howard University for over 25 years, with 9 as a department chair. (I was a math professor for 16 years before that.) While I was department chair, we sent more students to work at Microsoft in the 2004-5 academic year than any other college or university in the United States. We also established a graduate certificate program in computer security, which became the largest certificate program at the university. I had major responsibility for working with technical personnel to keep our department’s hundreds of computers functional and virus-free, while providing email service to several hundred users. We had to withstand constant hacker attacks and we learned how to reduce the vulnerability of our computer systems.
As a scholar/researcher, I studied complex computer systems and their behavior when attacked or faced with heavy, unexpected loads. I wrote five books on computing, from particular programming languages, to the internal structure of sophisticated operating systems, to the development and efficient creation of highly complex applications. My long-term experience with computers (I had my first computer programming course in 1964) has helped me understand the nature of many of the computer attacks by potential identity thieves and, I hope, be able to explain them and how to defend against them, to a general audience of non-specialists.
Books by Ronald J. Leach
Using C in Software Design
Using C in Software Design, Second Edition
Advanced Topics in UNIX
Advanced Topics in UNIX, Second Edition
The 101 Most Important UNIX and Linux Commands
Software Reuse: Methods, Models, Costs
Software Reuse: Methods, Models, Costs, Second Edition
Fastest Paths to a Job in the Computer Industry
Object-Oriented Design and Programming in C++
Introduction to Software Engineering
Data Recovery
Identity Theft in the Cyber Age
Twelve and a Half Steps to Avoid Identity Theft
The Bible as a Manual for Identity Theft
Recovering from Identity Theft
Relative Genealogy
Genealogy for the Information Age
Why 2K?
Eat Kids At School
Secrets of Pricing Your eBook
Preface
In this book we discuss recovering from one of the most common crimes in the United States – identity theft. It is possibly the most common crime, because identity theft is often a part of other crimes. The title of the book reflects the current reality of identity theft in this Internet-driven world