Transcripts For CSPAN2 Interview With Adam Levin 20151214 :

CSPAN2 Interview With Adam Levin December 14, 2015

Also it provides free scores in preinformation as to how to get you from wherever you are to wherever you want to get to. So you pay less money for access to money than you pay when you started. We are one of the longest surviving. Com. We started in 1994, we swapped a hard drive to get the domain so that is how long we have been around. We have had a wonderful opportunity to communicate with consumers, helped millions of people over the years and we hope to continue to do so. You are also the founder of a website called Identity Theft 911. Yes idt 911 is the new name because we are scaring people with old navy. Its an organization that works with companies for the benefit of their customers and employees come out we have everything from Identity Theft at education, identity management, breach response, preparedness, Identity Resolution for those who have become victims. Where the First Company ever founded based on a core competence of helping people get through the trauma of being victims of Identity Theft. Okay so your book is called swipe. If someone goes to credit. Com how much do you and your Company Learn about them . We learn a great deal. But they give us their information willingly. We have Free Products and services for them. It is designed to help them better their position in the credit world. So it is sort of a collaborative effort on credit. Com and as consumers we are security conscious. We do not share information. That is all about education, information, helping consumers. We consumers. We have one of the largest content library, thousands of articles that are there because our goal is to answer question and to anticipate the kinds of questions that will be asked. From your book you have written since 2005, more than, more than 1 billion sensitive records with personally identifiable information has been leaked. Yes. That is really the problem. We are in a new dime now. The paradigm is that hacks and breaches have become the third certainty of light behind death and accidents. Because way over 1,000,000,000 files have been accessed with personal identifying information, heres one inevitability and reality. Each of us is going to become a victim of Identity Theft in our lifetime. Unfortunately possibly multiple times. So the question is, how do you adjust yourself to this new world. As much as you would we would like to say can be prevented, fortunately cannot. You can do everything right but if youre on the wrong database at the wrong time youre going to be a victim. If the information includes your Social Security number they have an option on your life and it is no longer as to if but when they are going to exercise it. Is a Social Security number the golden key . It is. The fact is we need to get off this addiction to Social Security numbers. We are starting to. Do you know for those of us i got that magic card in the mail that Medicare Card that is your medicare number is your Social Security number plus a letter. Theres a new law that over time they will change that so even seniors are horribly exposed. We have done things a certain way and need to change that and you also have to say is there any other reason . If you die we need your Social Security number. Call my lawyer, he has my Social Security numbers and, you dont need to have it and there are so many instances where people ask for your Social Security number. In Financial Transactions the Social Security number, hopefully we will start moving off of that but when you sign up your kids for the league or go to a variety of different programs, royalty program, we need is your Social Security number, no they dont, dont give it to them. A child and Social Security number is christine. Totally. A great story, one of the people i know who is an expert, chief privacy officer from one of the biggest organizations and world her daughter became a victim of child identity fact nine years before she was born because someone invented another, used it, Social Security and ministrations not knowing that assigned number to her and she became a victim. The recent children and Social Security numbers are important as they are pristine, they are not used for anything, no one should be using the Social Security number for credit or anything like that until they are age 18, so people steel this information, use and no there are 15 or more years because children dont check this Social Security numbers, parents wont check it children that Social Security numbers and the only time they even think about is if they want to get a college loan or a car, their first credit card, that doesnt really happen. Parents use childrens Social Security numbers on their tax returns as dependents but there has been a breach of the transcript section of the Internal Revenue service so more and more of that information is out there. It is a real problem, child Identity Theft. Host who are the scanners and identities thieves we should be most worried about . There are four types of hackers and they are the problem, those pack because there statesponsored, hacking for intelligence reasons, those that sponsor because they want to make the money, those that hack because they can do it and they want to prove they can do it and those that hack because theyre trying to prove the point. There what we kolkhoz hackers. Ashley madison was a cause hacker for 37 Million People had their information exposed because someone was the angry. The sony hack was a combination of someone doing it for money but really because they were statesponsored hackers representing north korea and they were angry at sony for putting on a movie they felt made fun of the premier of north koreas do you have those, people who want to make money so they hack people who work in organizations that are angry at the organization and want to make a point. You have people who are subject to being bribery victims who are being exported the might give up information. The office of Personnel Management which is the Humanresources Department of the United States government was hacked presumably by china but after the chinese authorities had done what they want to do with that information, as they could sell a dance suddenly people are exposed. The problem with that hack, 5 million fingerprints were exposed. The most intimate details of investigative reports for background checks for security clearances were exposed as a result of that hack and those intimate details could lead the person who has that information in their position to blackmail intelligence operatives to try to bribe intelligence operatives and these are the different ways that you can be exposed because of that, social networking, people get on social networking, they have to tell everybody everything and they dont realize some of the people they think are their friends are not their friends. People are approached by someone in a romantic way but suddenly they ask too much, they want to get too close too fast and then start asking for many, start asking for personal information and you could be exposing yourself that way as well. Host dont give your Social Security number even though many places as fort it require it. Besides the social media aspect what are we missing as far as protecting ourselves . Guest minimize your risk of exposure, dont care your Social Security card, those of you who are children, dont carry your inventory of credit, debit cards, dont give information to people you dont know and be careful about giving information to people using you know. If someone calls on the phone and says there from the irs hang up, they dont do that or say they are from your bank, if they ask you anything more than we noticed some suspicious activity in your account, just confirmed the transactions. If they ask you to authenticate yourself, hang up. Protect the devices that you use, youre smart phone is more than a communication device, it is a data storage device and make sure you put the right software and protections on their, same with your laptop, with your ipad. You should also be using long passwords and dont share your password across your entire universe of websites because all you need is to have one hat on one website and diffuse the same password they are going to be in to every one of your sites, and monitor, go to any willcreditreport. Com and get a copy of your free Credit Report and see if anything doesnt look like, is a credit thought, and get free overview or scores updated monthly, check your bank and creditcard accounts and databases and if that is too much of a pain, up for what is transactional monitoring, if your bank and creditcard company, any time there is activity in your account, they take it as being suspicious but you may catch it because you know where you are and where you havent been. You can get more sophisticated forms of monitoring including monitoring done me not meet alert which is someone is attempting to open an account in your name right now. Is the you . Yes or no . That could prevent fraud. Consider no one but you cant get into your credit account without a passport or pin number and last is the damage. A lot of people say doityourself, you could and then you have no life but there are many institutions out there that have programs available to protect you free as i perk of your relationship with the institution, your insurance company, many credit unions, smaller banks, the age our department where you work. Call and ask do you have the program, am i in it . Its not what do i need to do to get in it . Well will it cost and make the determination if it is worth it but because Identity Theft has become so sophisticated and it takes people so long to find out they are a victim that by the time they do find out theres so much in the suit they need a professional to help them through it. Host there has been a lot of talk about back door into our smart phones and encryptions. Does that increase security . The city decrease security . When there are back doors in encrypted systems you are weakening the system. They say just make sure the government has the back door. Look at the track record of the government protecting the data we have given them, from the white house, the state department, the postal service, the department of defense, the department of education, the office of Personnel Management, a statebystate bistate you see all these breaches time and time again, encryption should be absolute. We dont have enough, the reason we are in the mess we are in today is because we didnt encrypt and the only shot we have at protecting ourselves is we have to encourage, we have to protect that encryption, the government has different ways it can get the information it wants, there are many different systems out there that arent encrypted, it can use if it has to and if it goes about it is the right way which is going about it through the judicial system, but we cant look for ways to weaken that which we are trying to strengthen and we have to assume also based on sophistication and creativity and persistence of hackers whatever you create, a system you think is totally secure they may well find a way around it anyway, they have their own system, they are going to do what they are going to do, we have to get better at detecting the bad guys. Host awhile back there was a commercial on the air of a gentleman saying here is my Social Security number, go ahead. Come and get me. He was trying to say i have a Wonderful Company behind me and they can help me if i have a problem but what you dont want to do is precipitate the problem. The real issue is in the world we live in you can do everything right, you can secure yourself the best possible way you can, you can do everything everybody told you to do but it you are on the wrong data base and the wrong person gains access and your information is on there, you have a problem, the truth is yes, there are companies out there that can help you and the wonderful place to learn more information, Consumer Federation of america has developed a site, idtheftinvoke. Org and a number of providers have taken the best practice pledge, they have a series of questions and answers and they tell us the right thing the company can be doing and what you need to be thinking of if you choose a company to help you and you should minimize, you should monitor, you should have a program to manage the damage, monitoring programs out there have different damage control programs attached to them, read up on some, study them, understand them, make the right decisions. Host what do you think of retina scans and fingerprints to get into your phones . That is all good. But again, mastercard came out with a new thing they are developing which is to an online transaction, take a selfy and you are supposed to blink because it is supposed to show proof of life so it is not a static picture but i was with the security expert that said someone can cut out one of the eyes and wink. We have to continue to move toward biometrics, very important part, the way you press the key on your smart phone, your heart beat, your blood flow, that will be part of the biometric Security System in place, but you not only need the biometrics the defector authentication. To authenticate yourself for the site, the site to be authentic itself and you end it needs to communicate with you and make sure they got the right person, the right device and as time goes on we will have more of them. Heres the book, swiped, adam

© 2025 Vimarsana