Friday, August 27, 2010

Welcome Address Sample For Program

INFORMATION OF INTEREST - Identity Theft

The compu

Hands up, this is an identity theft!

By Ariel Torres

Published in The Nation - Technology (27 August 2010) Synthesis

an excellent and interesting article on the use of "social networking"

........ He says Daniel Monastersky, cybercrime lawyer and founder of IdentidadRobada (www.identidadrobada.com) that identity theft is growing in Argentina, and is one of the two virtual crimes of most concern to the UN .

Clearly, identity is not what it used to be.

evil Metempsicosis

No, of course not. In an interconnected world in which we exist in the form of digital data, avatars, clever alias and e-mail addresses of others to usurp the virtual body is a usual trick in the pocket of the mob. They hold a self that does not belong, will begin a string of outrages that will invariably a real culmination abominable.

"Extortion, threats, abuse and harassment are the most by a false or assumed identity," says Daniel in chat me directly. It comes to my mind the case of Megan Meier, the teenager who committed suicide after being cruelly insulted and humiliated by the mother of a fellow high school who was posing as the child. "And it affects your reputation online," continues Monastersky. Today care more about what people say about you and what you say on your resume online form. Therefore, if someone starts making crazy statements or offensive in your name, perhaps you are removing an employment opportunity. "

I propose, therefore, make a practical guide with a few keys easy to implement in order to avoid usurping our online identity. Also, what to do if we discover that someone is using our data misleading.

"There are two main types of identity theft," she said Daniel, the physical and digital. The first is when they use our documents, usually to obtain goods or services. In our country there is the paradox that to be the day and not owe anything to anyone is counterproductive, because the criminals are looking good credit profiles for these scams. " Another paradox

Argentina, which, despite efforts de Monastersky, el robo de identidad digital sigue sin estar tipificado como delito. De poco parece importar que el robo de identidad y la pedofilia -muchas veces asociados, como lo demuestran un número de casos- son los dos delitos que más preocupaban a la ONU ( www.unodc.org/documents/data-and-analysis/tocta/10.Cybercrime.pdf ). En la Argentina sigue siendo uno de los muchos temas ausentes de la agenda política, que parece fechada a mediados del siglo pasado. Se me dirá, con cierta indignación, que hay problemas más urgentes en la Argentina. ¡Ya lo creo! Y todos están también en veremos. Y, por otro lado, ¿es la pedofilia un asunto menor?

Ya he hablado de esto sobradamente en otras ocasiones. Let's practice.

How to Avoid Internet Identity Theft

1. No share on social networks (and online in general) that kind of information previously known only to family and friends. It is a matter of common sense: if someone uploads a photo to the Internet, but shackle your security settings, you lose control over it. "A friend who does have access to your photos you can upload to a blog or replicate them in your profile that might not be so protected," says Monastersky. The most embarrassing was Mark Zuckerberg, Facebook's founder, to whom stole their own photos. This, after having proclaimed to the four winds that the privacy of your network enough. "

2. Although it is not simple, try to make our contacts do not share our photos without permission. seems silly, no wave, records it as a bitter one, and in fact I said Monastersky, polls show that people are becoming more relaxed about sharing personal data on the net all right with the wave and so on, but the truth is that in the real world would require magic to usurp an identity, in Internet only takes a few pictures and a handful of data. The issue has nothing to do with waves, photons or quanta of psychological energy. It is my picture, my body image, my identity.

3. Clear: we should not publish personal details and filiatorios. The boys have some problems with this. Well, what a novelty. They also have trouble learning to cross the street, using cutlery and brushing teeth. It's about teaching. The social pressure we will make life very complicated, but children must learn not to give address, phone number, name of school attended by, among other things.

Incredible as it sounds, not a few adults also provide this information on the Web Bad idea. Avoid it. His friends and colleagues already have scheduled, you need not remind address, phone and how much it cost his new car. Conversely, among 1700 million strangers on the internet there will be, statistically, a few thugs. Facebook is not living in your home. Not even a ballroom. It is a great avenue to 500 million transients. Tell me you would give your home a total stranger on the street, and start to believe it is OK propagate personal data in social networks.

4. Geolocation is another useful tool that is used in ignorance, I says Daniel. Publish all the time where we are, even automatically, is foolishly dangerous practice. Facebook and Twitter offer this feature. Foursquare is based on it. Care.

But there is something else again the photos.

5. If you take a photo with a phone that has GPS must disable the feature that records the image within the coordinates where it came. "One of the strengths of Facebook is, for example, that removes the EXIF \u200b\u200bdata of photos went up, but it is virtually alone in doing this," notes Monastersky. EXIF stores, among other things, the geolocation.

6. "Outside of social networks by completing online forms must be careful to do it on sites you trust and where basic safety measures are met: it must be verifiable digital certificate and the address should begin with https (not http) "I Monastersky said. The paragraph is pristine.

7. According to Daniel, paradoxically, one of the best allies of the identity thief is the ego of others. If we expose our life on the Net in great detail, although in another context that we tildaría of honest and transparent in the virtual world paints a target on his back. The worst thing is that in general this is done to feel some self-projection of the divas.

But the truth is that you will not get the media to say where he went on holiday in Twitter or post dozens of photos with their children on Facebook. In addition, media people have much more experience protecting privacy, creating a public that's it, just another character.

8. Related to this is another thing that Daniel said: "Most of the profiles of famous Argentine on Twitter are false, this practice has grown 300 percent, according to a study we did in IdentidadRobada. So start following famous without any criteria without the slightest indication of whether real or not, is to expose ourselves to a number of risks, primarily through phishing to usurp our profile on Twitter. "

What to do if your identity was stolen

If they steal your username or Twitter account, in this case there is plenty to do. They have a protocol for reporting such cases. I called Pepe Eliaschev, who knew two things: what was his real username and had made arrangements to Twitter to regain his full name, "but never answered," he said. Pepe is now using the microblogging network username @ peliaschev. Unfortunately, as he tells me, has been ministers who argued fiercely with a fake profile, which brings us back to the beginning: the danger of these frauds, their low penetration into the consciousness of politicians and the near impossibility of verifying who is who in a world of masks.

Indeed, in many cases the fake profile is a form of social criticism. Several politicians, divas and divas are parodied Twitter daily in this way and, in my opinion, to silence would be an attack on free expression. It is, moreover, very obvious that they are caricatures and not counterfeit.

is true, on the other hand, celebrities are also masters of their identities, so to legislate on this issue is very complicated.

in Facebook is the ability to report fake profiles (profiles www.facebook.com/help/?search=denunciar+ + false). It is not clear, however, tells me Monastersky, many complaints must be submitted for the network do something about it.

If someone takes over a Web address, things are on the one hand, simpler. On the other hand, no. "The legal nature of the domain name is not clear because it is a precarious tenure, must be renewed every year, Monastersky reasons. In practice, always better than the mark as the domain. In other words, you must first register the mark, because a domain can not rely on a brand that does not exist or can not register. " However, the proceedings before the Nic.ar, Monastersky tells me it is quite expedient, if it can be shown, for example, who uses our name or is named does not live in our home.

unless a person is very popular, it is unlikely that someone using his name to create a blog or a fan site. Steve Jobs, Apple co-founder, had a fake blog for years. But I would say he enjoyed it because it was an excellent site made by a journalist. Many artists have websites unofficial tip them more good than harm. In general, if the name of a person falsely media is used on a site, think in some sort of revenge. The number of suspects is negligible.

The big problem with this kind of crime is their transnational nature and that, in Argentina, there is still no legislation. Monastersky presented a project (www1.hcdn.gov.ar/proyxml/expediente.asp? Fundamentals = yes & numexp = 4643-D-2010), but, as he tells me, "virtually I paid attention, with few exceptions.

0 comments:

Post a Comment