Protecting yourself from Identity Theft

As reported by Ashley Roe from Access Control & Security Systems, identity theft, even by means of Pickpoketing, is ever rampant in today’s society.

With “shoulder surfing” and “dumpster diving” among today's preferred methods of stealing identity, the age-old crime of pickpocketing is still rampant, and can claim an identity with a quick slip of the hand Pickpocketing, one of the world's oldest crimes, dates back to the Shakespearean age when it was considered punishable by death, according to Wikipedia. Defined as a form of larceny that involves stealing valuables from a person's pocket, pickpocketing is considered by many a skilled trade, perfected by magicians and criminals alike. Throughout centuries, the reason for the crime's popularity has been the same. “The appeal is its relative safety,” says Tom Harris, who writes for HowStuffWorks.com. “A skilled pickpocket can make off with just as much money as an armed robber, without much danger of confrontation or risk of being identified in a line-up.”

Cash used to be the main motivating factor for pickpockets. In recent years, pickpockets have become more interested in the documents tucked away behind the money — social security, credit and debit cards, the keys to stealing a person's identity. Harris explains that most pickpockets get away because the crime is so discreet; victims never realize what is happening until it is too late.

To minimize the risk of identity theft resulting from a pickpocket incident, the Federal Trade Commission has issued a set of steps for victims to follow (Source: www.ftc.gov):
  1. Financial Accounts: Close credit card and bank accounts immediately. Upon opening new accounts, place passwords on them. Avoid using a mother's maiden name, a birth date, the last four digits of a Social Security number, a phone number or a series of consecutive numbers when creating passwords.
  2. Social Security number: Call the toll-free fraud number of any of the three nationwide consumer credit-reporting companies (Experian, Equifax, Transunion) and place an initial fraud alert on credit reports. A fraud alert can help stop someone from opening new credit accounts in a victim's name.
  3. Driver's License/Government-Issue ID: Contact the agency that issued the license or other identification document. Follow its procedures to cancel the document and to get a replacement. Ask the agency to flag the file so that no one else can obtain a license or other identification document in that name.
  4. Monitor for Signs that Information is Being Misused: Order copies of credit reports and review them for inquiries from unfamiliar companies and accounts. Check that information such as the Social Security number; addresses, name, initials and employers are correct. Continue to check the reports periodically, especially for the first year after the theft occurs to make sure new activity has not been logged.
  5. Report Fraudulent Activity Immediately: For steps to reporting unauthorized activity related to identity theft, visit:

Click Here for the original story.

- The Hackett Security Team


Hackett Security To Attend ISC West In Las Vegas!

Hackett Security will be attending this years ISC West Expo March 28-30 at the Sands Expo Convention Center in Las Vegas, Nevada. This is a premium event for our industry and we can't wait to see what new products and technologies might be unveiled that we will be able to provide out customers with. After the event we will post a recap or two of anything that might excite us or interest you in the world of security. We hope to see you there!

Here is what ISC says of the event :

ISC West is where end-users of security, systems integrators, dealers, and installers cover all their security needs. Join us for all the right companies, all the right products, and all the right solutions. And it all happens at the right time of the buying cycle. Rated as the best industry event,* it’s the largest and most comprehensive:

• Access Control
• Alarms & Monitoring
• Biometrics

• Fire Control
• Remote Monitoring

• Systems Integration
• Wireless Applications
• and more…

Click here for a link to ISC's website to find out more.