SlideShare ist ein Scribd-Unternehmen logo
1 von 8
IDENTITY THEFT- HOW ITS LINKED TO
           COMPUTERS
     An informational power point by Kailey French
WHAT IS IDENTITY THEFT?

DEFINITION : The crime of obtaining the personal or financial
information of another person for the sole purpose of
assuming that person's name or identity in order to make
transactions or purchases.
Whose affected
O 1 in 8 people have been affected in the last 5
   years by identity theft.
O About 10 million people every year are
   affected
O That’s 19 new victims every minute
The trends Not Slowing!
Between 2001 and 2002 the reported incidence
of identity theft rose 20 percent, and between
2002 and 2003 it increased a whopping 80
percent.
How its linked to the computer
• You may not know it, but your computer collects all
  kinds of information about you and stores it in files
  hidden deep on your hard drive.

• Files like browser history and other temporary Internet
  files can be used to reconstruct your online habits.

• These files store information like logins and passwords,
  names addresses, and even credit card numbers.
HOW THEY GET THIS
INFORMATION
  This information can be consumed 2 different ways threw the
                           computer.
Either it can be grabbed when it is being sent over an unsecured
transmission,
                                 or
Software can be installed on your computer (like spyware) threw a
virus that will collect everything needed to steal your identity and
it automatically send it back to the person through e-mail, or some
kind of account.


  Other ways of obtaining this information could be by phishing
  where you create a key log that requires the person to re-enter
  there password and or username, then the information is sent
             back to creator of the key log’s email.
Anyone can steal
someone's identity, so
never trust anyone with
personal information such
as security cards, credit
cards, and other things that
could be used to steal your
identity.                      What can be
With stolen identity you can
                                done with
do almost
anything, purchase items
                                 your info
online or off a shopping
channel, cars
houses, paraphernalia from
stores, and in extreme
cases even houses or cars.
The best way to protect yourself online or at home.
Never keep your Social Security Number in your purse or wallet

Check bank account balances weekly

Request credit reports from the major credit card companies annually

Never leave personal information in your vehicle

Place passwords on credit cards, bank and phone accounts, as well as on computers. Keep the
password in a safe spot do Not save it in a file on your computer, it can be retrieved by
someone trying to steal you identity.

Keep all your personal information in locked files, and review how you carry, send, and store
personal files safely

Shred all your trash that contains personal information, such as your name, address, and
phone number. Install and regularly update firewalls and anti-viruses on your computer to
protect it from hackers and Internet viruses

Unless you have instigated the communication, do not give out any personal information
online, over the phone, or through the mail

Never use unsecured mailboxes, but deposit all of your outgoing mail in locked boxes, at the
post office, or in local collection boxes.

check your mailbox regularly for incoming mail and removing it promptly.
WORK CITED
•   http://identitytheft.lifetips.com/faq/133477/0/how-many-people-are-victims-of-identity-theft-
    each-year/index.html


•   http://articles.winferno.com/computer-fraud/internet-identity-theft/


•   http://lifelockprotection.wordpress.com/top-10-best-ways-to-protect-yourself-from-identity-
    theft/
•   http://www.google.com/search?tbm=isch&hl=en&source=hp&biw=1280&bih=929&q=shad
    ow+of+computer&gbv=2&oq=shadow+of+computer&aq=f&aqi=&aql=&gs_l=img.3...502.44
    14.0.4502.18.11.0.0.0.0.0.0..0.0...0.0.Iod9511K4Ug#hl=en&safe=strict&gbv=2&tbm=isch&
    sa=1&q=shopping+bags&oq=shopping+bags&aq=f&aqi=&aql=&gs_l=img.3...138620.1419
    09.0.142115.15.13.1.0.0.0.177.616.3j3.6.0...0.0.ljUguWaW8Og&bav=on.2,or.r_gc.r_pw.,cf
    .osb&fp=2eabc3fc941d8678&biw=1280&bih=929

http://www.google.com/search?tbm=isch&hl=en&source=hp&biw=1280&bih=929&q=shadow+of
+computer&gbv=2&oq=shadow+of+computer&aq=f&aqi=&aql=&gs_l=img.3...502.4414.0.4502.
18.11.0.0.0.0.0.0..0.0...0.0.Iod9511K4Ug

Weitere ähnliche Inhalte

KĂĽrzlich hochgeladen

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...Pooja Nehwal
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 

KĂĽrzlich hochgeladen (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 đź’ž Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 đź’ž Full Nigh...
 
CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1CĂłdigo Creativo y Arte de Software | Unidad 1
CĂłdigo Creativo y Arte de Software | Unidad 1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 

Empfohlen

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data ScienceChristy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slidesAlireza Esmikhani
 

Empfohlen (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Identity theft how its linked to computers

  • 1. IDENTITY THEFT- HOW ITS LINKED TO COMPUTERS An informational power point by Kailey French
  • 2. WHAT IS IDENTITY THEFT? DEFINITION : The crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity in order to make transactions or purchases.
  • 3. Whose affected O 1 in 8 people have been affected in the last 5 years by identity theft. O About 10 million people every year are affected O That’s 19 new victims every minute The trends Not Slowing! Between 2001 and 2002 the reported incidence of identity theft rose 20 percent, and between 2002 and 2003 it increased a whopping 80 percent.
  • 4. How its linked to the computer • You may not know it, but your computer collects all kinds of information about you and stores it in files hidden deep on your hard drive. • Files like browser history and other temporary Internet files can be used to reconstruct your online habits. • These files store information like logins and passwords, names addresses, and even credit card numbers.
  • 5. HOW THEY GET THIS INFORMATION This information can be consumed 2 different ways threw the computer. Either it can be grabbed when it is being sent over an unsecured transmission, or Software can be installed on your computer (like spyware) threw a virus that will collect everything needed to steal your identity and it automatically send it back to the person through e-mail, or some kind of account. Other ways of obtaining this information could be by phishing where you create a key log that requires the person to re-enter there password and or username, then the information is sent back to creator of the key log’s email.
  • 6. Anyone can steal someone's identity, so never trust anyone with personal information such as security cards, credit cards, and other things that could be used to steal your identity. What can be With stolen identity you can done with do almost anything, purchase items your info online or off a shopping channel, cars houses, paraphernalia from stores, and in extreme cases even houses or cars.
  • 7. The best way to protect yourself online or at home. Never keep your Social Security Number in your purse or wallet Check bank account balances weekly Request credit reports from the major credit card companies annually Never leave personal information in your vehicle Place passwords on credit cards, bank and phone accounts, as well as on computers. Keep the password in a safe spot do Not save it in a file on your computer, it can be retrieved by someone trying to steal you identity. Keep all your personal information in locked files, and review how you carry, send, and store personal files safely Shred all your trash that contains personal information, such as your name, address, and phone number. Install and regularly update firewalls and anti-viruses on your computer to protect it from hackers and Internet viruses Unless you have instigated the communication, do not give out any personal information online, over the phone, or through the mail Never use unsecured mailboxes, but deposit all of your outgoing mail in locked boxes, at the post office, or in local collection boxes. check your mailbox regularly for incoming mail and removing it promptly.
  • 8. WORK CITED • http://identitytheft.lifetips.com/faq/133477/0/how-many-people-are-victims-of-identity-theft- each-year/index.html • http://articles.winferno.com/computer-fraud/internet-identity-theft/ • http://lifelockprotection.wordpress.com/top-10-best-ways-to-protect-yourself-from-identity- theft/ • http://www.google.com/search?tbm=isch&hl=en&source=hp&biw=1280&bih=929&q=shad ow+of+computer&gbv=2&oq=shadow+of+computer&aq=f&aqi=&aql=&gs_l=img.3...502.44 14.0.4502.18.11.0.0.0.0.0.0..0.0...0.0.Iod9511K4Ug#hl=en&safe=strict&gbv=2&tbm=isch& sa=1&q=shopping+bags&oq=shopping+bags&aq=f&aqi=&aql=&gs_l=img.3...138620.1419 09.0.142115.15.13.1.0.0.0.177.616.3j3.6.0...0.0.ljUguWaW8Og&bav=on.2,or.r_gc.r_pw.,cf .osb&fp=2eabc3fc941d8678&biw=1280&bih=929 http://www.google.com/search?tbm=isch&hl=en&source=hp&biw=1280&bih=929&q=shadow+of +computer&gbv=2&oq=shadow+of+computer&aq=f&aqi=&aql=&gs_l=img.3...502.4414.0.4502. 18.11.0.0.0.0.0.0..0.0...0.0.Iod9511K4Ug