It’s downright depressing. Just when you’re having the most fun and getting the best values from life online, shopping and using your hard earned credit, the crooks show up and trying to spoil the party by stealing your identity! We all know the drill when our accounts or records are compromised: change your passwords, reissue your IDs, check your credit reports. But who knows what really happens behind the scenes when identity theft occurs? I do and if you’d like to know more, read on!
The term identity theft covers a variety of crimes from fraudulently using credit cards, to getting free medical care, to having your bank account drained. The most common form of ID theft is someone using your credit card number to buy stuff or to impersonate you to obtain services for free. Among the most popular services are Uber rides and premium access to adult porn sites.
The scale of personal information theft is mind boggling. Here are some examples:
- The Internal Revenue Service reported back in February of 2016 that the data breach uncovered the previous year was much larger than the over 100,000 American taxpayers first reported. That in fact some 700,000+ taxpayers had their personal information hacked. They claim the Russians were to blame, but really, who cares. The bottom line is that identities were stolen that will be used to file fraudulent tax returns and get undeserved refunds charged to unsuspecting Americans for years to come.
- In November of 2016, AdultFriendFinder, an X-rated website, was hacked. Approximately 412 million users had personal information stolen. Stolen data included e-mail addresses, passwords, IP addresses and more.
- In September of this year, Yahoo announced that a minimum of 500 million accounts were hacked over a year ago. E-mail addresses, passwords, full user names, dates of birth, telephone numbers, security questions and answers were stolen. It’s hard to top that, but in December the company announced another earlier breach in which one billion, yes, with a B, Yahoo accounts had their personal information stolen.
And the beat goes on! Pay taxes? Use the internet? Chances are your identity has been compromised and is for sale right now on the Dark Net.
But how does this Dark Net work? In a nutshell, way back when the military created the internet
it was unindexed. That is, that there wasn’t a search engine like Google or even Netscape to find stuff. You had to know where anything was to find it. This worked fine for the military at the time but as the internet grew from government sites to message boards and chat rooms to todays behemoth, many old data bases and sites were never indexed. These leftovers form the basics of the dark or unindexed net. And it’s big. The indexed web we use is about 10% of the overall internet. The remaining 90% is dark or unindexed. A popular browser used to get around the dark web is TOR. TOR is a free communication software for the unindexed or Dark Web. The name comes from “The Onion Router (TOR)” because it moves information without leaving traces, encrypting data that is nested like the layers of an onion. In addition to encryption, it uses about 8,000 computer relays to hide a user’s location making it more difficult to track. TOR has a legitimate use in protecting privacy especially that of political dissidents plotting in repressive regimes. Oh, yes and that of crooks too!