2128:
pretending to be your bank, phone company, etc asking you to provide personal info. DONT RESPOND BACK! Companies dont ask customers to give out their personal info by email. Also like I say that thieves look into your trash and hack your computers to get personal info. Thats why if you are throwing away things that contain personal info make sure you shred those things first. Also if you have a computer at home make sure your computer has a firewall anti spyware and an antivirus on and up to date to make sure that it gets very difficult for anyone to steal your personal info. Now also if you are for example going online to your banks website when your press enter make sure it starts with https:// and make sure that there is a little lock on the bottom of the screen and when you click on it make sure that it says 128bit. This means that the page is secured. Also thieves are using the telephone to get your personal info so watch out! Dont give out any personal info unless you initiated the contact. Plus
Monitor your bank accounts everyday for any fraudlent activity. When you get your statements also look for any charges that you did not make because even a charge to your credit or checking account is a sign of identity theft. Get a free copy of your credit reports every year from equifax experian and transunion. Also you might want to subscribe to an identity theft protection service. Eliminate paper bills because they can get lost or stolen by thieves and view your bills online instead. Take action immediately if your bills don't arrive on time! A missing bill can mean that someone changed your billing address to do bad things. Now when someone asks you for personal info such as your ssn ask why they need it? How are they going to safe guard it? Because you dont want that number to fall into the wrong hands. You also might want to remove your phone number from the directory because in the telephone directory it shows your names address and phone number so call your phone company and ask them to take your name off the directory and from the 411. (There is a small fee for that service). Now lets talk about what info are we carrying around never carry around your SSN and the reason why is because if your purse or wallet is lost or stolen you are giving a chance for a thief to commit id theft so that also means don't carry any debit cards or credit cards you don't use or any personal info that you are carrying around for no reason and leave it at home an a safe and secure place that means not in the living room, kitchen, or in any area where someone can access it because identity theft also happens like that for example if you are not home someone can get into your home and rob your info that also means that even people that visit you such as friends or relatives can steel your info if you leave that in an area where another person can reach it. Now Im going to talk to you about protecting your info from cashiers when giving your check, credit, or debit card while paying look it the cashier to make sure he doesn't do something that can surprise you later on. Also we got to watch out for skimming skimming is when you go to an ATM and you slide your card I think that they have a little camara or I really don't know how they get your card info but when you slide it it records your card information so definitely their is no way we can completely prevent id theft but we can take these steps to reduce our risk. I took my time to put this info here in wikipedia because Im sure that It's really going to help alot of us from being victims of id theft. Good Luck to all of you!!
1272:
birth or naturalisation certificate. Obviously documents that change identity, such as a marriage certificate or deed poll, also come into play. Added complications are transliteration and or translation of names between scripts and languages, and the issue of cultures where it is possible for a person to have several legitimate names derived from accepted custom and practice. A problem with foundation identities is that if the holder dies in another jurisdiction information about this event may not be available to cancel the identity elsewhere (similarly if the subject has changed jurisditions). - Physical characteristics, biometrics, no need to say more. - Activity in the community, now being called 'social footprint' in some circles. This establishes that the identity is active, ideally since the claimed birth! The theory is that it is difficult to create a false social footprint with any depth. This footprint may be documented by allocated identifiers such as address, User Id, membership number, student number, - a potentially infinite list - that can be linked to a foundation identity and in some cases to a biometric. Its the summ of all these parts that actually gives a 'real' identity.
850:(Note: Capitol One is trying to make money off of me, even though I said I had my Identity stollen, I have proof they sent me a credit card, in hopes that I would enable it.. The Banks don't care who gets the credit cards, they just want someone to pay) BTW, Also keep in mind some of the people here are the ones thieving, you can expect they will be here to confuse people.. So if you read anything that looks like a objection that Identity can't be stollen, it's someone just trying to distract people from the problem and likely trying to avoid solving the problem, which is easy to solve.. Take a look at Paypal, they've already fixed the problem. It's that the methods of identifying people in existence are old and outdated and need to be updated, fixed.. Instead we are just layering bureaucracy on this archaic crap
1408:
started to use it, and now it has become common parlance. We can't change the word. The danger is that people thinking theft may not consider fraud interventions in reducing the opportunity to commit identification fraud. I removed references to credit-rating services in recognizing that orginal research breaks the
Knowledge rules. Bruce Schneier writes a lot about the dangers in the centralization of information. Security may be good, but it is never perfect. When there is a security breach it is huge, sometimes tens of thousands of sets of personal identifiers. I too would like to see the "how to sections" removed from the Knowledge site. People can get this from the FTC or any number of other sources.
1609:
impact" section states "Confusion over exactly what constitutes identity theft has led to claims that statistics may be exaggerated.", and the first sentence in the article describes it as a "catch all phrase". Perhaps the statement in the first paragraph about credit card fraud could be removed and instead include a more detailed discussion about this ambiguity and the different definitions of the term (particularly point out that there is a distinction between the popular definition and the legal definition?). I'm not sure what the govt's motives for inflating the numbers would be, in the US it is very hard to get authorities to press ID theft charges--
1172:
are different between countries. It's that they assume, unwittingly, that
Knowledge is a US thing. Most of the websites they use are in fact specific to the US, as are most of the things they read and conversations they have in the course of a day. I like to criticize these people for being narrow-minded (and likewise people who assume all computers run Windows or all people drive to work), but then I remind myself that focussing on a person's immediate context is a fundamental part of how the human brain works. You should treat these US-centric writings like typos. It's not stupidity; it's just a mistake.
186:
165:
196:
31:
1193:
leads. Take into account this is where some portion of the population of New
Orleans fled to post Katrina, I'm sorry I ever came here, from Los Alamos, New Mexico. Call me racist, but there is 90% chance the person who stole my identity was black. And given NO,LA history, the miscreant likely came from there. But there are a lot of people here from overseas, lots of Nigerians, and we all are familiar with Nigerian scam letters.. They are here, using our system to make money off our ignorance, black or white..
923:
with you. but probably unrelated to this is that i find the line "Identity theft is not possible without serious breaches of privacy. If corporate or government organisations do not protect consumer privacy, client confidentiality and political privacy the execution of identity theft becomes much easier for criminals." in the introduction to be a little, i don't know, not-encyclopedic, in that it voices an opinion on what governments should do, or a belief that that is the only solution to the problem.
85:
64:
95:
1218:
of the much broader issue of all "identification-based crime". I carefully choose the term “identification-based”, because the actual crime drawing attention more often than not is a criminal activity that happens to involve the misappropriated use of someone else's personal identification particulars. The crimes range from dead-beat dads avoiding their financial obligations, to stock market manipulation, money laudering and terrorism - to mention a few.
398:
your personal information and then uses that information to impersonate you. Identity Theft is not simply theft of identity information for a service, it is an act of another person masquerading as if they were you; they take on the identity that should be uniquely your own. Nobody else should be able to possess it. The question is how do you prove you are uniquely you? Even twins have identical DNA, so there is no single method that is 100% foolproof. -
1442:
misleading. In considering how to identify and address the root causes off all crime that incluces a forged means of identification, there is insufficient research to determine which is the higher risk exposure - personal guardianship or agency guardianship . The problem with concealment crime is that it is very difficult to measure, where with credit-dependent crime we know within a few months and the statistics are centrally gathered.
2368:
1034:
holding too much personal information in an insecure manner. Witness the recent theft of personal data from HSBC in India. Examples related to this are where commercial organisations require copies of passports and the like, and the insatiable desire of most companies to collect irrelevant personal information. Ways to protect yourself - don't provide the information to these companies. This obvious point should be included.
1349:
really have references to websites, telephone numbers and the like that assume only people from the country in question are reading the article. Also "If you've been a victim of
Identity Theft" - no, it's the financial institutions that are the victims. We need to re-phrase this. Incidentally, in a funny sort of way it pleases me no end that financial institutions are the victims, because they are the ultimate cause of it.
22:
291:
270:
1419:) 22:39, 31 July 2011 (UTC)== How to write the term Identity Theft == I was wondering whether the term 'Identity Theft' should appear with both I of Identity and T of Theft as capitals or in small letters. On Knowledge pages it is a combinatin of both. Some times it appears as small and on other times as capitals. I believe we need to be consistent. Can someone please clarify how we shall use it.
1648:
de facto authority on ID theft through its annual reports on the crime. As a result, under ID theft you now have "credit card fraud" as a component. And that is broken down into "existing accounts" (account takeover)and "new accounts". The definitive nature of identity theft has always been a problem. But it now seems like that horse is out of the proverbial barn.() 29 May 2009
1695:- I have recently been developing a number of information/education sites, hence the reason why I was here linking to the various sites. I apologise if my actions seemed 'spammy' that wasn't my intention, my intention was to add genuinely new and different sources of information to a number of topics. In future I will discuss the addition of any links.
360:
forms of static ID's is why it can occur. All you need is a random set of those ID's, and you can open any selection of services in someone else's name.. And the police department (in
America) will not pursue cases that don't have "suspects". Obviously the government is attacking the problem from the wrong end. Fix the ID system..
1629:). That second sentence should be removed. The rest of the introduction functions just as well without it. (And in my opinion, the government doesn't inflate the numbers as much as the media does. They take gov't stats and exaggerate them to make ID theft more threatening and newsworthy...just my opinion, remember.)
731:
at the DOJ link at the bottom of the page to see the reference. I opted to use that definition to avoid the confusion that was arising from everyone using their own personal interpretation of the term. If you have a source which would suggest otherwise, I would be happy to look at that too. Let me know what you think, --
632:). It's probably only the founder of Javelin mentioned in the section, who I suspect wrote this section anyway. The point being made is reasonable - how can you steal someone's identity as such - but as to objections to the term, that phrase could safely be removed while leaving most of the section in place.
1797:
this." and it has no entry for "identity fraud". It doesn't deserve its own article (unlike
Wireless ~); a section in this one is more than adequate, and sentences 2, 5 & 6 can be moved there. The issue of whether credit card fraud is generally considered identity theft is more important. Created:
2250:
Well, the quote misrepresents the findings of the GAO study, for starters. The GAO report concluded that "Determining the link between data breaches and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained," I would add
1758:
redirects to this page. Fraud and thieft are different concepts that would be worth to separate. A definition: Identity fraud is a synonym of unlawful identity change. It indicates unlawful activities that use the identity of another person or of a non-existing person as a target or principal tool. A
1348:
Well let's amend the policy then. After all, at
Knowledge we can "be bold", can't we? I don't have a problem with the sections mentioned and would suggest they stay. However, after bleating on about this article being too US-centric, I now see someone has made parts of it too UK-centric. We shouldn't
1192:
My ID was stollen by someone who had access to my mailbox because the apartment officials failed to change mailroom locks between tenants.. The Police department in my Area (west
Houston) is rife with ID theft cases, and are lazy to pursue anything because the convicts are skillful at eliminating any
1059:
I'm new to this but a
Knowledge editor (or whatever they're called--the volunteers toward the top of the pecking order) suggested the site could use some help in law enforcement areas. I note that the entry on identity theft (which is my area of specialization--has been for the last 7 years) doesn't
882:
Surely identity theft is the process of stealing the data required to impersonate someone to then commit a crime, such as credit card fraud? You can't commmit the fraud without my personal data hence you need to steal it (I won't give it to you). Since my identity in society is embodied by that data,
2295:
a breach. This confabulation, IMO, results in unwarranted conclusions. • A consumer is far more likely to be able to connect an incident of ID theft to their stolen wallet than to a breach that remained undetected or unreported. A consumer cannot connect an incident of ID theft to a breach that is
2165:
Better yet would be to make it so that every institution publishes a promotional service code, and that that can be used to register the specialized ID, so that the link between the ID and the use is stronger. The more loosely you associate ID's, the easier ID theft is.. It's like a chain, would you
1885:
Ok. If I understand, the result, the result was a speedy close, since the request for AfD was not considered as valid. Hopefully the "message" article for deletion will disappear soon (Note: and real discussion on the subject or keeping / modifying this article, may be done on the discussion page of
1675:
The editor above placed links to a number of totally unrelated subject to various pages on this weebly.com, a very spammy way to go about it. I've reverted all the links as spam. If any of the regulars here think that this link is non-spammy and contributes to the page, great, but for now they are
1647:
This is an interesting debate and one that is ongoing in a number of circles. The thought used to be that using another person's credit card to charge goods and services without their permission was called account takeover and not identity theft. But the Federal Trade Commission started becoming the
961:
However, this idea is a fallacy. Nothing (usually) gets stolen from the consumer. Instead, it is the banks, that have been "swindled". It is their loss, as they have given their money away, and they don't know whom to. As for credit agencies, if they will incorrectly report "consumer's" status (as a
1796:
The OED (online; checked today) makes no distinction. It has an entry draft for "identity theft": "the dishonest acquisition of personal information in order to perpetrate fraud, typically by obtaining credit, loans, etc., in someone else's name; fraud perpetrated in this way; (also) an instance of
1608:
I think there's some ambiguity about what constitutes Identity theft. I'd agree that making unauthorized charges to someone else's credit card s better described as credit card fraud rather than identity theft, however actually opening a new credit account would probably qualify. The "spread and
1561:
My personal feeling is that ID Theft is what used to be just called fraud, but the information age and the rise of information brokers and large government databases have tended to throw the consequences of the fraud onto the person being impersonated. I'd like to see some addition to address this,
1387:
Whoa. I was about to add a comment about how the section "Techniques for obtaining and exploiting personal information for identity theft" is practically giving people ideas for how to commit identity theft, but here it's revealed that "how-to" sections for avoiding identity theft have been deleted
1256:
Particularly noteworthy as well is Mr. Newman’s distinction in describing prevention strategies between “personal guardianship” and “agency guardianship”. If the Knowledge site is to describe what consumers need to do to protect their personal information, perhaps it should also discuss the "agency
1221:
The actual offence for using someone’s personal identification particulars for an illegal purpose in America may be found in the U.S. Code, Title 18, Part I, Chapter 43, False Personation. The Canadian equilant is Personation, Sec. 403 of the Criminal Code of Canada. In all likelihood the Europeans
1217:
We struggle because the term “identity theft” is truly a misnomer. It is an ill-conceived, albeit popular, phrase that has become entrenched in North American - much to the chagrin of Europeans. Rhetoric on the plethora of North American web sites and in the media tends to focus on a single segment
1213:
Nickj69, Amplmado Acturus, RKlawton. Bryan – Your struggle in associating criminal activity with the term "identity theft" is not unsual. You are not alone. Most thinking deeply about the issue and criminal fraud investigators with even a modicum of experience struggle with the term alongside you.
1022:
Since I was on a roll, I decided to do a rewrite. I've tried to source more information and I have removed everything that was argumentative, speculative or unverified. I've also done some copy-editing and added some more country specific information. It would be good if someone could proof it for
730:
Bryan, the definition I used was actually taken from the US Department of Justice page entitled "What are Identity theft and Identity Fraud?". It includes references to a US "Identity Theft Act" which "created a new offense of identity theft", so it is a specific crime in the US. Please have a look
359:
All you need is a database, , you put in a password, you generate a specialized ID for a service, you give the service the specialized ID, if the ID gets used for anything else, you can track the ID's use and apprehend the person. That's all you need to end this problem. The utilization of multiple
2160:
In fact, you could divulge everything, even information about your facebook, and such to the public. The key to this "working" is that you have a login and password and you keep the login and password private, and who here finds that difficult? Everytime you need to get a credit card or other such
1624:
This is true - credit card fraud is not generally considered identity theft. As the previous post states, it's only IDT if a person's personal information is used to open an account fraudulently - or if a person's personal info is used to access an already open account (see account takeover under
1537:
I'd be interested to see discussion here of how it is that "bank fraud" was transmuted into "identity theft", with the underlying assumption that if a bank halfway across the country hands a criminal money based on a social security number and a birthdate, that it's somehow the fault of the person
1518:
I work for the America's Most Wanted Safety Center, a new branch of America's Most Wanted getting away from the capturing of criminals, and branching out to all aspects of safety. I feel a link to our post about identity theft would be appropriate and mutually beneficial, being that America's Most
1441:
None-the-less the term has become the stuff of pop culture. It is here to stay. We can't negate the importance of consumers becoming more aware about abuses of their personal information and the exploitation of their credit-worthiness. On the other hand, problem-solvers recognize that the term is
1407:
I think the challenge we face is writing a feature on something that doesn't exist - "identity theft". As best as I can determine the term came to life when privacy rights advocates expressed concern on behalf of consumers about credit-dependent crime. The Federal Trade Commission picked up on it,
1271:
The 2002 UK Cabinet paper is a very good start. However, the concept of identity and it elements from the point of view of stealing it need a bit more thought, which seems to be occurring in some jurisdictions. These elements are: - Foundation - the documented existence of an identity, such as a
1229:
This U.K. paper lists three basic elements to a human "identity": biometrics, biographical information and legal attribution . This distinction becomes important to problem solvers - in particular those in law and regulatory enforcement intent on identifying the root causes of crimes. At the least
1171:
I really don't think it's a matter of geography ignorance. It's Knowledge ignorance. The English language Knowledge is rife with statements that are correct only in the context of the USA, but it's not because the authors don't realize there are other English-speaking countries or even that laws
700:
As for theft vs fraud: I believe when the term was coined, it really was meant to evoke a criminal taking an identify from a victim such that the victim no longer had it. It's the idea that you can't use your own name anymore because the reputation associated with that name is now that of a whole
694:
to have numerous problems. First, it isn't a definition. Then, it ignores the literal meaning of the term: it's about stealing identity, not stealing information. Stealing the information is just the means (one of them) of doing it. I have fixed it. Also, this is all very vague to someone who
1275:
Fraudulent identities can take three forms: · False identity, the identity is fictitious. · Stolen identity, there is such a person who becomes a victim and may suffer tangible and intangible losses from the use of their stolen identity. However, the legitimate owner of the identity may be dead.
1248:
None-the-less I don’t think the term can be altered in North America, at least not in the short run. Perhaps Knowledge is a perfect venue to leave the caption in tact, because at least that's what most North American's would search under, and then to clarify what using the term represents in law.
1244:
How credit card and debit card fraud got into the “identity-theft” mix is beyond me. Credit and debit cards aren’t classified as identification documents. They are defined in the U.S. Code as access devices . Credit cards have their own offence sections in Canadian law as well. I don't know about
922:
alright, i'm somewhat new to wikipedia, but i do have a few comments here. first, often times the victims of the identity theft do give give their password or whatever, either knowingly or through some other way such as not encrypting the transaction over the internet. so i can't agree completely
397:
Simplistic. What happens if you lose your password, or forget it, or somebody else guesses or steals it? What if somebody manages to intercept your personal data between you and the database and change it so that they can use it? It is called Identity Theft for a good reason, somebody else steals
1159:
using another arguably illegal reason to victimize individuals who display their personal information in good faith, such as landlord-related fraud, where the Patriot Act is used to create suspicion on prospective tenants, and then using their personal information to commit fraud. this is a very
1129:
I've noticed that this article has been edited numerous times by anonymous IP editors, and reverted pretty much every time. While not clearly falling under the 3RR, it does seem like a good candidate for semi-protection, so that people who want to add their links will at least have a few days to
797:
I'd like to put some of the criticism of the term back in, ideally along with information on how it came into wide use. The major issue is not just that identities can't be stolen, but the term changes the perceived victim of crime. What could be seen as a crime against, e.g. bank, now becomes a
706:
Unfortunately, the term is widely used now to mean something as simple as using someone else's credit card number. That hardly justifies the wording "identity theft." Is it identity theft if someone uses my laundry room key? If he drives my car? But I left existing paragraphs that talk about
2127:
As we all know Id theft is the most common crime that is happening in the United States. Thieves can steal your personal info in many ways. For example hacking into your computer, sending phishing emails, digging into your trash etc. A phishing email is an email that is sent by a third party
1823:
Well, this is something unclear about the decision of deleting this post. I will not talk about the content (the value of keeping this page) for which I disagree, but about the process this propose for deletion was done. The discussion seems already taken, and I didn't have the time to comment.
1433:
Would it make more sense: a) to put the term in italics - which would be very repetitive, or b) simply capitalize the term and to state that it is a proper name given to a particular genre of identification-based crime? We capitalize given names, surnames, city names etc? What do English majors
1233:
Using the term “theft” may equally present its unqiue set of problems. It implies the unauthorized deprivation of use of one's property - or something to that effect. It will take a better legal mind than mine to debate that personal identification particulars are property under the definitions
3554:
As others have pointed out in the past, this article seems to be written from an almost pure US perspective. I must admit that looking for sources covering ID theft outside of the US has turned up with little to no results, but perhaps the article should be reworded/re-titled to more correctly
2282:
paper has some major errors; As noted, it is unpublished. IMO, this is for good reason. • Aside from a slew of basic grammatical errors, it fails to consider that • a great many breaches go unreported, or that • breach notification laws lead to the discovery of breaches. • It confabulates the
2018:
This article needs to be recycled, and I do not mind personally that some content is removed. However if it is done, in particular from an anonymous user, it could be good to have an explanation, so as to really know if this is not vandalism. Please, if you do it, do not be afraid (from me) to
1734:
I made a quick edit to the bulleted list of how data is obtained since there was one entry that did not fit the format, read rather strangely, and didn't get the point across. I hope that my addition improves this. I also added a line regarding the California and Wisconsin Offices of Privacy
1240:
As best as I can determine, the terminology emerged somewhere in the mid 1990s in reaction to consumer complaints lodged with the Federal Trade Commission about the use of their personal identification particulars to obtain cash and/or merchandize. This crime is dependent upon linking personal
1033:
Not a bad rewrite; it certainly needed it in parts. However, I notice that some useful content has been removed, particularly in relation to the reasons behind identity theft, and how to protect against it. I think we should retain reference to one of the major reasons - too many organisations
1592:
Second sentence of article "The most common form of identity theft is credit card fraud.". No. Credit card fraud is FRAUD, straight and simple. It's NOT identity theft. This is the type of statement used by governments to over-inflate the occurrence of identity theft. I suggest we remove this
1252:
Graeme R. Newman attempts to address this challenge in his “Identity Theft” guide for The Center on Problem-oriented Policing . He distinguished financial crimes from concealment crimes, perhaps in a struggle to squeeze the broader base of identification-based crimes into the “identity-theft”
1160:
common practice among slumlords, who violate Civil Rights and use the right to request background checks to defend their legal policies, which are later used to commit crimes; the laws themselves create this conflict and is a type of identity theft created and enforced by Federal law
1084:
I'd suggest point readers to sources of information on how to protect one-self from identity theft. Evidently this kind of information has already been removed from Knowledge, as discussed in a section below, so simply directing people to other sources seems like a good alternative.
758:
It is incorrect to say "there is no such thing as "identity theft'". The term "identity theft" exists as a term in the public policy debate. You can say it's a misnomer or the term is not literally accurate because you can't steal an identity, but nonetheless, the term does exist.
642:
I think this article tries to distinguish the many actual crimes and torts that is actually being committed and tying them to the use of impersonation to achieve those other crimes. We can't help it if ABC, NBC, and CBS cannot write stories accurately, they are going for ratings.
955:
This idea is welcomed by the financial institutions, as it helps them to transfer their losses to the consumers (as it is "something" of consumer's that has been stolen). This idea is also welcomed by the governments. Certainly by the UK government, as it adds to their pro-ID card
564:
does any one know the actual consequences, like fines or jail time, foe offenders? i'm doing a school thing and i would appreciate it if any one had any info over the subject to contact me at (jcarlisle@stu.shilder.k12.ok.us) please, any relevant information is welcome! thanks, jo
652:
I have to agree. It may not be a legally correct term (although I believe in the USA it is a recognised crime) but it is a phrase in common usage. Too much of the article is taken up with this discussion - could we perhaps collapse it into the section called "alternative terms"Â ?
1557:
I edited this section because I thought it did not reflect how hard protecting personal data can be. The original wording sounded a little like "she shouldn't have worn that short skirt" to me, but I am an ID theft victim myself so if I'm too biased please feel free to fix it.
1066:
I'd suggest that it should include something generic, but not try and take the place of websites or government organisations doing the job. Feel free to jump in an add something but take time to read what's been written here so you understand what's gone before. Happy editing.
1445:
Therefore, should our efforts in Knowledge on this topic expressly limit the use of the term to describe a topic that exploits the credit-worthiness of consumers to commit fraud? Consumers, privacy rights advocates and the press are locked onto the term. It cannot be changed.
1060:
have anything on what to do if you discover you're a victim. Should it, or is that beyond the scope of what Knowledge does? I could put something together, or I could post the handout my department gives to victims who report the crimes. 23:41, 21 November 2006 (PDST)
2150:
It occurs because institutions require different signs of identity and any of those can be replicated. The solution is to give each institution a special identity that is signed (with strong encryption) and is logged at a trusted ID holder, preferably the US government.
1714:
I added a short paragraph about identity theft protection services in the U.S. These services have received a lot of attention and I believe some information about them is appropriate and would be welcomed by readers. Let me know if you think otherwise, though...
712:
Incidentally, I don't believe there is a legal definition because it isn't a crime per se anywhere. Taking confidential information is often a crime; defrauding people is a crime. Laws have been written to combat identity theft, but they aim at more specific
2139:
590:
If you still need help, email me: dhs14@cornell.edu. If charged as a felony in California, sentence can be 16 months, 2 years or 3 years for the first count in a conviction, and somewhat less than that for each additional count a person is convicted
1241:
identification particulars and social security number with a credit history in good standing maintained by credit-rating services. My personal choice of terms would be to refer to this particular phenomenon as a “credit-dependent” financial crime.
1234:
afforded it in common-law penal codes. Perhaps this is why the drafters of the Identity Theft Assumption and Deterrence Act proposed amendments to Title 18, Part I, Chapter 27, s.1028 of the U.S. Code, which concerns “Fraud and False Statements.”
1437:
I would not want to be a police officer or some other person in authority testifying in a court of law that I arrested a suspect for "identity theft". That could get a little uncomfortable in cross examination with astute legal representation.
1140:
It's vandalized no more than some of the popular articles school children find attractive. I think temporarily blocking offending IP addresses should prove sufficient warning. These same IP addresses tend to SPAM more than this one article.
2270:
1969:
Sorry, I do not understand why the section 'Cultural references' was removed with the message 'obscurity trim'. For me it does not look obscure at all, and besides I find the content useful (anchor 'Identity theft' to ciméma and literrature).
35:
816:
Also Mitchell and Webb explained it nicely in a radio sketch. I think you might even be able to justify having a separate article on the term "Identity Theft", as separate from the activity, except that Knowledge has no neat way to do that.
812:
and following Anderson's reference, What Price Privacy? (and why identity theft is about neither identity nor theft). by Adam Shostack and Paul Syverson. In Economics of Information Security, Chapter 11, Kluwer Academic Publishers, 2004.
2327:
is the same. However, this article does not need to list all the times fiction has depicted identity theft; I don't see anything particularly notable or helpful to the reader informing them that Family Guy joked about identity theft.
3232:
I would like to put some more information about the "Identity theft" wikipedia page. Indeed, I think it can be interesting to write about the types of data theft, what kind of data can be stolen, how its data can be used and so on.
1998:
Should be nixed, IMO. With 2% of the public having their ID stolen, this would be an unmanageably huge list. If the info is interesting, it should be worked in elsewhere. I feel the info has no value, so even that isn't needed.
576:
Also - on a discussion page, when you put a comment in, click on the 'signature' button at the top of the edit box (third from left, looks like 'running writing'). This will put your name and a timestamp on your entry like this :
532:
If you live in the UK none of the above are required, you can simply wait for the government to lose your sensitive data and for it to fall into the hands of identity fraudsters. This is far from limited to the UK exclusively
2044:
Identity Theft Resource Center and other sources, others for non-financial reasons - for instance, to receive praise or attention for the victim's achievements. This is sometimes referred to as identity theft in the media.
1156:
I wonder if those contributors who haven't yet realised that there is an entire world outside the borders of the USA could perhaps get a lesson in Geography. Here's a classic example from the first part of the article -
1309:
Would it not be right to remove the tag from the header of this article that states the article does not have a worldwide view. The article now has content from, and discussions on, many regions including USA, Asia and
2157:
All the institution that receives the unique and qualified ID would need to know is that this ID verifiably is referenced in the government databases and leads to picture, address, and other such information of the ID
1225:
I found a particularly enlightening paper prepared for U.K. Cabinet Office , "Identity Fraud: A Study" . The article asserts that the term "identity” triggers discussion at the philosophical and psychological levels.
1257:
guardianship" commitments required by governments and corporations, which house large volumes of personal information. The Privacy Rights Clearing House listing of reported exposures of data in America is staggering.
1735:
protection, as these seem to be very good resources for the residents of those states. I added the links as references since they are state-specific, but they could be links too if others think they'd be valuable.
1260:
My first instinct was to edit the Knowledge site on “identity theft”. I have noted and honour the concern about the number of edits already undertaken. Thought perhaps it best to consult all before moving forward.
1854:
I am very confused. What has exactly happened with this AfD. It seem to indicate keep? Can an administrator look at this if this is not some form of vandalism or abuse (about the way the process was done)? Thanks.
2234:
why is there a debate on the probability of being a victim here? this is introducing bias immediately and shouldn't be done. after the government accountability office study, the remaining needs to be moved out
1656:
I think a link to the foollowing site is potentially worth doing as it is an assistance to anyone who is worried about Identity Theft and would like to know how to protect themselves in their day to day lives.
1478:
This article is one of the worst examples in Knowledge of US-centrism. Most of the article is really from a US perspective and the whole thing should be renamed Identity theft (USA). Then a new article called
1950:: Although "Wireless identity theft" deserves a summary paragraph in the "Identity theft" article, there are several distinct kinds of identity theft that should not all be merged into one bloated article.
1538:
mimicked rather than the gullible banker. This seems an exceptionally striking example of the re-engineering of public perceptions to turn the problems of the wealthy into the responsibility of the poor.
2113:
was impersonated for over twenty years by an individual born with the same name. There is no evidence that the impersonator gained financially from the impersonation, but he did receive significant local
508:
This article is extremely biased towards the USA. It should be renamed Identity theft in the USA, or substantially re-written to make it "country neutral". I'll make a start with the latter in due course.
1297:
Jump in! All of your observations seem to be on the money and you have verifiable references. Try and keep it concise, cite your sources and be ready for some (positive!) feedback from other editors. --
889:
If no one objects strenuously I will attempt to rewrite the intro and we can see what people think. We can retain the "accuracy of the term" section to debate the correct technical/legal terminology.
515:
I've altered the article to bring in some stuff about the UK, and clarify points relating mainly to the USA, but it could do with perspectives from other countries. Hopefully someone will contribute.
2394:; a discussion will now take place over on Commons about whether to remove the file. This gives you an opportunity to contest the deletion, although please review Commons guidelines before doing so.
2296:
undetected or unreported. • Its main conclusion is unwarranted because it is reached through a 'Comparison of reported identity theft rates by states with and without law' that does not consider:
962:
result of the so called "identity theft"), they should be considered at fault, and pay any and all (including consequential) damages that a consumer may have suffered as a result of their fault. --
3598:
1964:
2358:
2049:
Maybe this was some useful content (under == Types ==) but I have difficulty to determine if this originates from Identity Theft Resource Center. Please put it back if it make sense to you.
337:
608:
Well what a wonderful assurance that is. Honestly, is there any reason to keep this section? Is anyone actually offended by the term identity theft? If not, I think it should be taken out.
302:, a collaborative effort to improve the coverage of Crime and Criminal Biography articles on Knowledge. If you would like to participate, please visit the project page, where you can join
3478:
3298:
3153:
3033:
2925:
2785:
2657:
2499:
762:
Also, the term is used by more than just the media. It has been used by legislators, regulators and law enforcement to identify a crime. What ID theft consists of can be debated, however.
1909:
1276:· Borrowed identity, the lender doing so voluntarily (eg a relative) or involuntarily (eg a coerced person). The identity owner may not report its misuse and may protect the borrower.
2175:
3424:
2763:
2208:
I have added some information from the new CIFAS report about the mount of ID theft that occured in the UK in 2009. My grammer is not 100% great so someone might wish to check it.
1208:
3588:
663:
Since there were no objections, I've done this. Removed the section and moved some of the text into the 'alternative terms' section. Will continue with more copy editing later. --
3496:
3492:
3316:
3312:
3171:
3167:
3051:
3047:
2943:
2939:
2803:
2799:
2675:
2671:
2517:
2513:
3603:
2312:
874:
Identity theft (or identity fraud) is a technically incorrect term used by the media to describe a crime, tort or other harmful act by deliberately impersonating an individual
382:
Ronald Reagan campaigned and won saying the GOVERNMENT was the problem, not the solution. Neat idea you have, but for individuals and private industry, not the government. --
2431:
1198:
855:
371:
3648:
2189:
seems to become the term to describe identity theft to act as another person in the web (forums, social web). It seems to be worth to add the term in the article (?).
431:
3250:
2194:
1503:
1416:
2323:...is full of trivial references to "identity theft". Now, I can see the notability of Michelle Brown's story: true story, high profile, made into a film. Also,
2303:
that national firms that improve security because of such laws generally do so in general, e.g. at their main offices, not just those in states with such laws. --
2171:
1598:
480:
2219:
1959:
303:
1942:
2161:
service, you only need to login, obtain a specialized ID, annotate what the ID is for, and then get the unique qualified ID, and give it to the institution..
1740:
1368:
1319:
1280:
1265:
538:
looks glaringly less than objective. It's been referenced though, I haven't looked at the reference.. is it necessary to keep that little rant in the article?
1047:
Whole-heartedly agree. But, I wasn't able to find a decent ref to cover it. Perhaps you could add something with a reference to the news item you mention? --
963:
539:
3246:
1988:
553:
461:
3428:
1447:
1277:
1262:
2615:
1464:
924:
298:
275:
2300:
that national firms that notify customers because of such laws generally notify all the affected customers, not just those in states with such laws or
1289:
252:
3404:
2477:
2013:
1484:
1420:
763:
442:
3425:
https://archive.is/20120708/http://blog.protectmyid.co.uk/index.php/the-most-likely-victims-of-identity-fraud-men-in-their-late-30s-and-early-40s/
2764:
https://web.archive.org/20111105045936/http://www.mass.gov/?pageID=ocatopic&L=3&L0=Home&L1=Consumer&L2=Identity+Theft&sid=Eoca
492:...and revealing the activities undertaken by the thief under the name of the victim would have serious consequences like loss of job or marriage.
3643:
2414:
2374:
2110:
1709:
1524:
354:
327:
375:
1696:
1661:
1124:
2767:
2352:
3564:
1552:
3139:
3019:
542:
147:
592:
522:
2625:
2153:
It should be as simple as logging into a site like google, obtaining a unique ID, giving the institution (needing the proof) the unique ID
1381:
1202:
3549:
2061:
2031:
1716:
1450:
1353:
1134:
966:
786:
606:
Some people object to the term "identity theft" as identity is not something that can be stolen: victims don't cease being who they are.
391:
3628:
1467:
1428:
1286:
1094:
886:
Technically (or more accurately 'legally') you may not have stolen anything but that would depend upon local laws and interpretation.
750:
242:
2148:
The problem with Identity theft if you read my main comment at the very top is that it doesn't even have to happen in the first place.
1685:
1185:
936:
3583:
3544:
3364:
3219:
3099:
1724:
1483:
could be created which would give a world view on the subject. As it stands this article is of limited use to anyone outside the US.
1011:
927:
735:
721:
407:
3474:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
3294:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
3149:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
3029:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
2275:
The article implied that identity fraud is rarely the result of data breaches; I've modified it to remove this invalid implication.
1618:
1581:
2334:
2264:
1459:
Weren't there some old Citibank commercials regarding identity theft? I think there were some funny ones with weird voice-overs...
1423:
1388:
while the information for where people find information to commit identity theft is left in. How does this double standard work? --
1145:
636:
2891:
1051:
1038:
3638:
3593:
1933:: due to the amount of detail in both topics, it would be counterproductive to the parent article (this one) to merge the two. --
1547:
902:
I broadly concur, but equally identity theft is not a crime in most cases - it's what is done with the identity that matters. --
667:
1365:
Knowledge articles should not include instructions or advice (legal, medical, or otherwise), suggestions, or contain "how-to"s.
915:
906:
841:
3633:
3129:
2080:
1895:
1864:
1791:
798:
crime against the person being impersonated, and therefore apparently less the bank's responsibility to prevent and deal with.
2989:
2849:
2721:
1837:
1810:
1359:
I have deleted the two sections telling people how to protect their identity and what to do if it is stolen. As said before,
3613:
2253:
Only data breaches resulting in successful investigations can uncover such a link, and such successes are the rare exception.
2223:
1301:
1194:
1119:
851:
367:
137:
2563:
1772:
1638:
2244:
1749:
1402:
832:
Good idea. Victims tend to panic and think "it's all on them" to clean up the results, letting the banks off the hook. --
435:
427:
3454:
1562:
if I can find a good reference. Also, there is not much mention in here of the role of fake or illegally obtained IDs .
1507:
647:
2068:
2019:
changes things, but in the case you do it (even as an anonymous account), can you please provide an explanation? Thanks.
1532:
1499:
1412:
1389:
1104:
1086:
218:
2635:
771:
3623:
2318:
2167:
1602:
1594:
1539:
1487:
994:
986:
687:
occurs when someone wrongfully acquires or uses another person's personal data, typically for their own financial gain.
622:
552:
the jackal actually steals at least three identities. his "true" identity is not discovered, even upon his death. --
476:
3429:
http://blog.protectmyid.co.uk/index.php/the-most-likely-victims-of-identity-fraud-men-in-their-late-30s-and-early-40s/
657:
450:
3618:
3369:
3259:
3104:
2994:
2854:
2726:
2616:
https://web.archive.org/20080911044319/http://www.ftc.gov/bcp/edu/microsites/idtheft/downloads/clearinghouse_2006.pdf
2568:
2215:
1371:
3394:
3386:
3276:
3121:
3011:
1704:
1669:
2427:
2203:
1397:
1342:
3405:
https://web.archive.org/web/20130617002156/http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aKbjO.Ew4S2E
2619:
2478:
https://web.archive.org/20080516094455/http://www.ftc.gov/bcp/edu/microsites/idtheft/downloads/synovate_report.pdf
2198:
1165:
896:
3578:
3254:
2440:
859:
746:
BTW- happy to keep the second paragraph as a clarifying example because it still fits the original definition. --
3495:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
3315:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
3170:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
3050:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
2942:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
2802:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
2674:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
2516:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
3284:
2481:
2229:
1744:
1527:
209:
170:
1130:
become familiar with the Knowledge Community standards first, to know that spam links are inappropriate, etc.
1071:
1027:
911:
Okay, I've posted a rewrite of the introduction. If anyone would like to add anything or comment feel free. --
464:
3608:
3464:
950:
The incorrect premise of "identity theft", is in the idea that "something" has been stolen from the consumer.
600:
484:
2008:
1230:
the appropriate term may be "identification" - as in "identification documents" and not identity documents.
584:
112:, an attempt at providing a comprehensive, standardised, pan-jurisdictional and up-to-date resource for the
3539:
3408:
3359:
3214:
3094:
2768:
http://www.mass.gov/?pageID=ocatopic&L=3&L0=Home&L1=Consumer&L2=Identity+Theft&sid=Eoca
807:
44:
3444:
2605:
2413:
To take part in any discussion, or to review a more detailed deletion rationale please visit the relevant
595:
3434:
3414:
3140:
https://web.archive.org/web/20141218162516/http://www.taxpayeradvocate.irs.gov/Individuals/Identity-Theft
3020:
https://web.archive.org/web/20101105002332/http://www.ojp.usdoj.gov/nij/topics/crime/id-theft/welcome.htm
2423:
1973:
Having say that, there may be some very legitimate reasons (not enough notability?) to remove this part.
1651:
1634:
1577:
1473:
826:
792:
415:
3514:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
3334:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
3189:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
3069:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
2961:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
2821:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
2693:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
2535:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
1779:
1760:
3560:
3385:. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit
3275:. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit
3120:. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit
3010:. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit
2626:
https://web.archive.org/20080911044311/http://www.ftc.gov/os/2007/11/SynovateFinalReportIDTheft2006.pdf
1329:
Between advice on how to avoid and how to response to ID theft, this article is in danger of violating
1587:
864:
108:
69:
2629:
2122:
1109:
Reverted banned users edits. Please add back high quality edits under your own user name. Thanks, --
1151:
573:. Go to the section marked "What's The Department Of Justice Doing About Identity Theft And Fraud?"
3023:
217:
on Knowledge. If you would like to participate, please visit the project page, where you can join
3530:
3350:
3205:
3143:
3085:
1920:
1393:
1338:
1090:
3499:
before doing mass systematic removals. This message is updated dynamically through the template
3319:
before doing mass systematic removals. This message is updated dynamically through the template
3174:
before doing mass systematic removals. This message is updated dynamically through the template
3054:
before doing mass systematic removals. This message is updated dynamically through the template
2946:
before doing mass systematic removals. This message is updated dynamically through the template
2806:
before doing mass systematic removals. This message is updated dynamically through the template
2678:
before doing mass systematic removals. This message is updated dynamically through the template
2520:
before doing mass systematic removals. This message is updated dynamically through the template
2271:
We have pretty much no idea what fraction of ID theft is the result of company security breaches
3515:
3382:
3335:
3272:
3190:
3070:
2962:
2892:
http://web.archive.org/web/20160125082131/http://www.privacyrights.org/ar/ChronDataBreaches.htm
2822:
2694:
2536:
2348:
1993:
1955:
1681:
1630:
1543:
1315:
990:
782:
403:
3458:
1976:
Note: I have never contributed in this section, and therefore I believe I am neutral on this.
1828:. What is happening? Can someone look at this and check if there is some abuse here? Thanks --
945:
The article gives the "mainstream view" of the subject, while ignoring an abvious alternative!
3556:
3502:
3322:
3177:
3133:
3057:
2981:
2949:
2841:
2809:
2713:
2681:
2555:
2523:
2240:
1938:
1513:
1017:
50:
3130:
https://archive.is/20130416062351/http://www.worldprivacyforum.org/medicalidentitytheft.html
869:
Although it is informative I have to say I disagree with some major points of the article.
3522:
3342:
3197:
3077:
2969:
2916:
2829:
2701:
2543:
2330:
2211:
1565:
1495:
1324:
982:
472:
423:
363:
701:
different person -- one who doesn't pay his bills, no less. I mention that in my rewrite.
8:
2180:
1729:
767:
559:
446:
21:
3398:
2895:
1798:
695:
doesn't already know the phenomenon, so I added a clear example as the second paragraph.
3481:, "External links modified" talk page sections are no longer generated or monitored by
3455:
https://archive.is/20120913/http://www.naag.org/states-offer-data-breach-protection.php
3301:, "External links modified" talk page sections are no longer generated or monitored by
3224:
3156:, "External links modified" talk page sections are no longer generated or monitored by
3036:, "External links modified" talk page sections are no longer generated or monitored by
2928:, "External links modified" talk page sections are no longer generated or monitored by
2788:, "External links modified" talk page sections are no longer generated or monitored by
2660:, "External links modified" talk page sections are no longer generated or monitored by
2502:, "External links modified" talk page sections are no longer generated or monitored by
2190:
1334:
1117:
502:
441:
I have added an external link that references footnote 4 as well as footnotes 2 and 3.
3521:
If you found an error with any archives or the URLs themselves, you can fix them with
3341:
If you found an error with any archives or the URLs themselves, you can fix them with
3196:
If you found an error with any archives or the URLs themselves, you can fix them with
3076:
If you found an error with any archives or the URLs themselves, you can fix them with
2968:
If you found an error with any archives or the URLs themselves, you can fix them with
2828:
If you found an error with any archives or the URLs themselves, you can fix them with
2700:
If you found an error with any archives or the URLs themselves, you can fix them with
2542:
If you found an error with any archives or the URLs themselves, you can fix them with
1782:
makes a distinction). Fraud appears to be more related to usage of a false identity.--
1519:
Wanted has already educated millions of Americans about it on television. The link is
2873:
2745:
2636:
https://web.archive.org/20051230021614/http://www.acpr.gov.au:80/research_idcrime.asp
2587:
2459:
2378:
2344:
1951:
1700:
1692:
1677:
1665:
1626:
1311:
822:
778:
399:
3288:
1377:
Keep on it. I see no reason to make an exception to policy just for this article.
570:
195:
185:
164:
2977:
2837:
2709:
2551:
2236:
2076:
2057:
2027:
1984:
1934:
1891:
1860:
1833:
1787:
1768:
1360:
1330:
1182:
1007:
1002:
This comment/thread is five years olde--is the Article better now? -- Just asking,
837:
718:
644:
387:
3468:
3395:
https://archive.is/20120921/http://www.privacyrights.org/fs/fs17g-CrimIdTheft.htm
3117:
3007:
2881:
2867:
2753:
2739:
2595:
2581:
2467:
2453:
2308:
2260:
1806:
1736:
1614:
1573:
455:
201:
2279:
1923:
article tag: "It has been suggested that this article or section be merged into
3448:
3378:
3268:
3113:
3003:
2863:
2735:
2577:
2449:
2399:
2004:
1825:
1755:
1720:
3487:. No special action is required regarding these talk page notices, other than
3438:
3418:
3307:. No special action is required regarding these talk page notices, other than
3162:. No special action is required regarding these talk page notices, other than
3042:. No special action is required regarding these talk page notices, other than
2934:. No special action is required regarding these talk page notices, other than
2794:. No special action is required regarding these talk page notices, other than
2666:. No special action is required regarding these talk page notices, other than
2639:
2620:
http://www.ftc.gov/bcp/edu/microsites/idtheft/downloads/clearinghouse_2006.pdf
2508:. No special action is required regarding these talk page notices, other than
3572:
2406:
2402:
then you may need to upload it to Knowledge (Commons does not allow fair use)
1378:
1350:
1162:
1142:
1131:
1110:
1035:
933:
803:
633:
628:
You make a fair point. Who are these people that object - the "some people" (
569:
Jo, the only reference I could find that specifically mentions penalties is :
516:
509:
498:
469:
Yes but by calling it identity theft, it conveniently gains the acronym IT.
3285:
https://archive.is/20120801/http://www.ftc.gov/os/statutes/itada/itadact.htm
3236:
What do you think about it ? We can discuss about this subject if you want.
2420:
This is Bot placed notification, another user has nominated/tagged the image
2341:
547:
2482:
http://www.ftc.gov/bcp/edu/microsites/idtheft/downloads/synovate_report.pdf
1367:
These two sections onlky purpose is to give people advice and instruction.
1298:
1068:
1048:
1024:
912:
893:
818:
747:
732:
664:
654:
629:
581:
3465:
https://archive.is/20120921/http://www.privacyrights.org/cases/victim9.htm
3488:
3308:
3163:
3043:
2935:
2795:
2667:
2509:
2072:
2053:
2023:
1980:
1887:
1856:
1829:
1783:
1764:
1003:
903:
833:
383:
3409:
https://www.bloomberg.com/apps/news?pid=newsarchive&sid=aKbjO.Ew4S2E
2878:
after the link to keep me from modifying it. Alternatively, you can add
2750:
after the link to keep me from modifying it. Alternatively, you can add
2592:
after the link to keep me from modifying it. Alternatively, you can add
2464:
after the link to keep me from modifying it. Alternatively, you can add
808:
http://books.google.co.uk/books?id=ILaY4jBWXfcC&pg=PA32&lpg=PA32
619:
3445:
https://archive.is/20120731/http://www.ftc.gov/opa/2003/09/idtheft.shtm
2606:
https://web.archive.org/20060131210801/http://www.consumer.gov/idtheft/
2304:
2256:
2041:
1802:
1610:
1569:
100:
3435:
https://archive.is/20120801/http://www.ftc.gov/os/1998/05/identhef.htm
3415:
https://archive.is/20120801/http://www.ftc.gov/os/1998/05/identhef.htm
1799:
http://en.wikipedia.org/Wikipedia:Articles_for_deletion/Identity_fraud
932:
You may be new to wikipedia, but your instincts are right on target.
2000:
1780:
http://www.business.mcmaster.ca/IDTDefinition/defining/idfraudTCF.htm
1761:
http://www.business.mcmaster.ca/IDTDefinition/defining/idfraudTCF.htm
975:== calm down people its just a term you all know what it means. =='''
84:
63:
2609:
2155:.. They only need to validate it against the government's database.
94:
1658:
1520:
1177:
Incidentally, I have found many UK-centric statements in Knowledge.
214:
2886:
to keep me off the page altogether. I made the following changes:
2758:
to keep me off the page altogether. I made the following changes:
2600:
to keep me off the page altogether. I made the following changes:
2472:
to keep me off the page altogether. I made the following changes:
2367:
2144:
is the one who will be revered as a saviour from ID theft to many
2630:
http://www.ftc.gov/os/2007/11/SynovateFinalReportIDTheft2006.pdf
2166:
rather have one point of failure or multiple points of failure?
2098:
497:
Yeah, marriage sounds like a pretty serious consequence... ;) -
3599:
Knowledge level-5 vital articles in Society and social sciences
3144:
http://www.taxpayeradvocate.irs.gov/Individuals/Identity-Theft
3024:
http://www.ojp.usdoj.gov/nij/topics/crime/id-theft/welcome.htm
2359:
File:Poster - To Be or Not to Be 01.jpg Nominated for Deletion
2036:
Here is some content that had replaced the previous content:
1824:
Besides, nothing was done in the discussion page of the page
2901:
When you have finished reviewing my changes, please set the
2773:
When you have finished reviewing my changes, please set the
2645:
When you have finished reviewing my changes, please set the
2487:
When you have finished reviewing my changes, please set the
2067:
Investigating a little bit more the other 'contribution' by
616:
3459:
http://www.naag.org/states-offer-data-breach-protection.php
1965:
Section 'Cultural references' removed (with obscurity trim)
3389:
for additional information. I made the following changes:
3279:
for additional information. I made the following changes:
3134:
http://www.worldprivacyforum.org/medicalidentitytheft.html
3124:
for additional information. I made the following changes:
3014:
for additional information. I made the following changes:
2342:
http://en.wikipedia.org/Identity_theft#Cultural_references
1763:
If there is not objection, I will make the change soon. --
1463:
Can't say I've seen them - were they on Channel 4 or ITV?
1492:
I like it when they put the chickens in the donkey coup
1209:
Incorrectly Labeled World Phenomenon Generating Confusion
290:
269:
113:
2862:
I have just added archive links to one external link on
2734:
I have just added archive links to one external link on
2448:
I have just added archive links to one external link on
2251:
that where one exists, such a link is rarely detected.
213:, a collaborative effort to improve the coverage of the
3589:
Knowledge vital articles in Society and social sciences
2576:
I have just added archive links to 4 external links on
1237:“Embezzlement and Theft” are addressed in Chapter 31.
613:
3604:
C-Class vital articles in Society and social sciences
3399:
http://www.privacyrights.org/fs/fs17g-CrimIdTheft.htm
2896:
http://www.privacyrights.org/ar/ChronDataBreaches.htm
2415:
image page (File:Poster - To Be or Not to Be 01.jpg)
2340:
Do you mean the section titled Cultural references:
191:
90:
3491:using the archive tool instructions below. Editors
3311:using the archive tool instructions below. Editors
3166:using the archive tool instructions below. Editors
3046:using the archive tool instructions below. Editors
2938:using the archive tool instructions below. Editors
2798:using the archive tool instructions below. Editors
2670:using the archive tool instructions below. Editors
2512:using the archive tool instructions below. Editors
2405:If the image isn't freely licensed and there is no
1778:Well, not so easy to sepate the fraud and Theft. (
802:I can think of two critics of the term right now:
312:Knowledge:WikiProject Crime and Criminal Biography
3649:WikiProject Crime and Criminal Biography articles
394:Besides, DOXers think of this to skirt the trap.
315:Template:WikiProject Crime and Criminal Biography
3570:
3289:http://www.ftc.gov/os/statutes/itada/itadact.htm
777:I agree and I have reworded the first paragraph.
571:http://www.usdoj.gov/criminal/fraud/idtheft.html
3477:This message was posted before February 2018.
3469:http://www.privacyrights.org/cases/victim9.htm
3297:This message was posted before February 2018.
3152:This message was posted before February 2018.
3032:This message was posted before February 2018.
2924:This message was posted before February 2018.
2784:This message was posted before February 2018.
2656:This message was posted before February 2018.
2498:This message was posted before February 2018.
527:Probably some smartass vandal, but the phrase
2280:http://www.heinz.cmu.edu/research/241full.pdf
2291:breach with the percentage of ID theft that
3449:http://www.ftc.gov/opa/2003/09/idtheft.shtm
2640:http://www.acpr.gov.au/research_idcrime.asp
2071:, it seems that it was indeed vandalism. --
420:hello. Ref. 4 is not reachable. regards.
3439:http://www.ftc.gov/os/1998/05/identhef.htm
3419:http://www.ftc.gov/os/1998/05/identhef.htm
3267:I have just modified one external link on
3002:I have just modified one external link on
3377:I have just modified 8 external links on
3112:I have just modified 2 external links on
2014:Blanking some section without explanation
879:I don't believe the term is incorrect.
299:WikiProject Crime and Criminal Biography
2375:File:Poster - To Be or Not to Be 01.jpg
2140:The first politician to pick up on the
1710:Added to Individual identity protection
1361:Knowledge is not an instruction manual.
355:It would be pretty easy to fix ID theft
19:
3644:High-importance Crime-related articles
3571:
2099:Identity Theft Resource Center website
1331:Knowledge is not an instruction manual
1125:Should this article be semi-protected?
806:, in Security Engineering, p 32. See
2913:to let others know (documentation at
2377:, has been nominated for deletion at
1553:Edited Individual identity protection
883:you have indeed stolen my identity.
2109:Former Major League Baseball player
1910:Proposal to merge this article with
523:Techniques for obtaining information
296:This article is within the scope of
207:This article is within the scope of
106:This article is within the scope of
15:
3550:Article written from US perspective
2409:then it cannot be uploaded or used.
2069:Special:Contributions/194.83.255.50
460:Didn't we used to call this fraud?
116:and the subjects encompassed by it.
49:It is of interest to the following
13:
2185:to be understood as a suggestion:
1429:To Capitalize or not to capitalize
1333:. A lot of this may need to go.
14:
3660:
3629:High-importance Internet articles
3381:. Please take a moment to review
3271:. Please take a moment to review
3116:. Please take a moment to review
3006:. Please take a moment to review
2866:. Please take a moment to review
2738:. Please take a moment to review
2580:. Please take a moment to review
2452:. Please take a moment to review
1245:England or Continental Europe.
3584:Knowledge level-5 vital articles
2610:http://www.consumer.gov/idtheft/
2366:
1659:http://identity-theft.weebly.com
1521:http://www.amw.com/safety/?p=144
289:
268:
194:
184:
163:
93:
83:
62:
29:
20:
2373:An image used in this article,
1023:me and correct any mistakes. --
332:This article has been rated as
247:This article has been rated as
142:This article has been rated as
3639:C-Class Crime-related articles
3594:C-Class level-5 vital articles
3255:09:35, 27 September 2017 (UTC)
2103:
2092:
2081:16:36, 29 September 2009 (UTC)
2062:16:28, 29 September 2009 (UTC)
2032:16:19, 29 September 2009 (UTC)
2009:20:34, 27 September 2009 (UTC)
1363:From that section we are told
995:13:30, 15 September 2009 (UTC)
227:Knowledge:WikiProject Internet
1:
3634:WikiProject Internet articles
3565:11:51, 19 February 2020 (UTC)
3365:11:58, 11 November 2017 (UTC)
3220:01:17, 3 September 2017 (UTC)
2353:04:28, 21 November 2010 (UTC)
2123:Preventions of Identity theft
1989:14:58, 9 September 2009 (UTC)
1725:20:52, 16 December 2008 (UTC)
1639:05:58, 22 February 2008 (UTC)
1548:18:53, 21 November 2007 (UTC)
1508:20:08, 29 December 2008 (UTC)
1382:20:56, 15 February 2007 (UTC)
1372:15:12, 14 February 2007 (UTC)
1354:22:40, 17 December 2006 (UTC)
1343:14:59, 24 November 2006 (UTC)
1302:09:25, 22 November 2006 (UTC)
1072:09:16, 22 November 2006 (UTC)
751:09:38, 22 November 2006 (UTC)
736:09:38, 22 November 2006 (UTC)
596:07:13, 22 November 2006 (UTC)
436:19:56, 21 February 2010 (UTC)
306:and see a list of open tasks.
230:Template:WikiProject Internet
221:and see a list of open tasks.
3614:High-importance law articles
3555:reflect its bias to the US.
3545:02:29, 7 December 2017 (UTC)
2850:07:52, 7 February 2016 (UTC)
2564:01:56, 17 October 2015 (UTC)
2383:Deletion requests March 2012
2335:17:47, 9 November 2010 (UTC)
2245:18:01, 8 February 2010 (UTC)
2224:16:02, 3 February 2010 (UTC)
2176:17:50, 28 October 2012 (UTC)
1896:08:54, 23 October 2009 (UTC)
1865:08:31, 23 October 2009 (UTC)
1838:08:25, 23 October 2009 (UTC)
1811:23:22, 22 October 2009 (UTC)
1750:Identity fraud to be created
1619:13:24, 26 January 2008 (UTC)
1603:11:08, 26 January 2008 (UTC)
1582:14:37, 18 January 2008 (UTC)
1403:Instructional Manual Comment
1320:16:54, 28 January 2009 (UTC)
1290:03:39, 29 January 2007 (UTC)
1266:00:12, 1 November 2006 (UTC)
1203:21:32, 16 October 2012 (UTC)
1186:18:08, 28 October 2006 (UTC)
1166:16:21, 26 October 2006 (UTC)
860:21:18, 16 October 2012 (UTC)
842:20:14, 4 December 2008 (UTC)
827:18:32, 4 December 2008 (UTC)
722:18:46, 28 October 2006 (UTC)
543:14:54, 4 December 2007 (UTC)
465:07:51, 8 December 2006 (UTC)
376:21:08, 16 October 2012 (UTC)
309:Crime and Criminal Biography
276:Crime and Criminal Biography
7:
2722:22:04, 4 January 2016 (UTC)
2381:in the following category:
2199:17:18, 8 January 2010 (UTC)
1745:15:43, 8 January 2009 (UTC)
1691:Thanks for the opportunity
1533:How was this term promoted?
1146:01:24, 14 August 2006 (UTC)
1135:22:32, 13 August 2006 (UTC)
1105:Reverted banned users edits
1012:16:25, 8 January 2015 (UTC)
937:22:11, 27 August 2006 (UTC)
928:20:50, 27 August 2006 (UTC)
392:16:12, 5 January 2015 (UTC)
10:
3665:
3508:(last update: 5 June 2024)
3374:Hello fellow Wikipedians,
3328:(last update: 5 June 2024)
3264:Hello fellow Wikipedians,
3183:(last update: 5 June 2024)
3109:Hello fellow Wikipedians,
3063:(last update: 5 June 2024)
2999:Hello fellow Wikipedians,
2990:21:27, 18 March 2016 (UTC)
2955:(last update: 5 June 2024)
2884:|deny=InternetArchiveBot}}
2859:Hello fellow Wikipedians,
2815:(last update: 5 June 2024)
2756:|deny=InternetArchiveBot}}
2731:Hello fellow Wikipedians,
2687:(last update: 5 June 2024)
2598:|deny=InternetArchiveBot}}
2573:Hello fellow Wikipedians,
2529:(last update: 5 June 2024)
2470:|deny=InternetArchiveBot}}
2445:Hello fellow Wikipedians,
2432:16:22, 19 March 2012 (UTC)
2319:Popular culture section...
1488:16:21, 19 April 2007 (UTC)
1451:14:33, 11 March 2007 (UTC)
1281:14:38, 11 March 2007 (UTC)
967:00:07, 13 April 2007 (UTC)
872:Take the first sentence -
707:these misuses of the term.
505:) 06:58, 7 Mar 2005 (UTC)
451:14:28, 14 April 2010 (UTC)
408:11:21, 13 March 2021 (UTC)
338:project's importance scale
253:project's importance scale
148:project's importance scale
3624:C-Class Internet articles
3100:00:00, 9 April 2017 (UTC)
1792:18:26, 5 March 2009 (UTC)
1773:00:13, 5 March 2009 (UTC)
1705:09:41, 27 June 2008 (UTC)
1686:17:02, 26 June 2008 (UTC)
1670:16:54, 26 June 2008 (UTC)
1528:14:10, 22 June 2007 (UTC)
1468:16:27, 3 April 2007 (UTC)
1424:11:07, 7 March 2007 (UTC)
1120:20:27, 11 July 2006 (UTC)
1039:18:54, 30 June 2006 (UTC)
1028:13:37, 30 June 2006 (UTC)
916:07:23, 27 June 2006 (UTC)
907:12:23, 24 June 2006 (UTC)
897:10:24, 24 June 2006 (UTC)
787:20:51, 9 April 2008 (UTC)
772:15:06, 9 April 2008 (UTC)
677:I found the lead sentence
668:09:28, 28 June 2006 (UTC)
658:07:27, 27 June 2006 (UTC)
637:15:05, 5 April 2006 (UTC)
623:00:57, 5 April 2006 (UTC)
585:07:32, 27 June 2006 (UTC)
519:23:29, 22 Apr 2005 (UTC)
331:
284:
246:
179:
141:
122:Knowledge:WikiProject Law
78:
57:
3619:WikiProject Law articles
2313:20:19, 18 May 2010 (UTC)
2265:20:19, 18 May 2010 (UTC)
2204:Identity Theft In The UK
1960:19:43, 19 May 2009 (UTC)
1943:15:09, 19 May 2009 (UTC)
1398:02:23, 10 May 2010 (UTC)
1222:have a similar offence.
1095:02:23, 10 May 2010 (UTC)
1052:11:12, 1 July 2006 (UTC)
648:20:36, 12 May 2006 (UTC)
556:5 July 2005 03:19 (UTC)
512:19:15, 9 Mar 2005 (UTC)
485:21:49, 23 May 2010 (UTC)
125:Template:WikiProject Law
3370:External links modified
3260:External links modified
3105:External links modified
2995:External links modified
2855:External links modified
2727:External links modified
2569:External links modified
2441:External links modified
2283:percentage of ID theft
1921:Wireless identity theft
1913:Wireless identity theft
1759:reference to be added:
3579:C-Class vital articles
2424:CommonsNotificationBot
2230:Introductory Paragraph
318:Crime-related articles
1919:As referenced by the
601:Objection to the term
36:level-5 vital article
3609:C-Class law articles
3489:regular verification
3309:regular verification
3164:regular verification
3044:regular verification
2936:regular verification
2870:. If necessary, add
2796:regular verification
2781:to let others know.
2742:. If necessary, add
2668:regular verification
2653:to let others know.
2584:. If necessary, add
2510:regular verification
2495:to let others know.
2456:. If necessary, add
1676:on my spam-radar. -
1523:please consider it.
210:WikiProject Internet
3479:After February 2018
3299:After February 2018
3154:After February 2018
3034:After February 2018
2926:After February 2018
2905:parameter below to
2786:After February 2018
2777:parameter below to
2658:After February 2018
2649:parameter below to
2500:After February 2018
2491:parameter below to
2325:Catch Me If You Can
1652:Adding another link
1474:Rename this article
416:outdated references
3533:InternetArchiveBot
3484:InternetArchiveBot
3353:InternetArchiveBot
3304:InternetArchiveBot
3208:InternetArchiveBot
3159:InternetArchiveBot
3088:InternetArchiveBot
3039:InternetArchiveBot
2931:InternetArchiveBot
2791:InternetArchiveBot
2663:InternetArchiveBot
2505:InternetArchiveBot
2407:fair use rationale
45:content assessment
3509:
3329:
3184:
3064:
2988:
2956:
2848:
2816:
2720:
2688:
2562:
2530:
2438:
2437:
2387:What should I do?
2379:Wikimedia Commons
2214:comment added by
2040:According to the
1886:this article). --
1631:Stickfigureparade
1627:credit card fraud
1588:Credit card fraud
1584:
1568:comment added by
1498:comment added by
985:comment added by
865:Incorrect premise
548:day of the jackal
475:comment added by
426:comment added by
366:comment added by
352:
351:
348:
347:
344:
343:
263:
262:
259:
258:
233:Internet articles
158:
157:
154:
153:
3656:
3557:TheUnnamedNewbie
3543:
3534:
3507:
3506:
3485:
3363:
3354:
3327:
3326:
3305:
3218:
3209:
3182:
3181:
3160:
3098:
3089:
3062:
3061:
3040:
2984:
2983:Talk to my owner
2979:
2954:
2953:
2932:
2920:
2885:
2877:
2844:
2843:Talk to my owner
2839:
2814:
2813:
2792:
2757:
2749:
2716:
2715:Talk to my owner
2711:
2686:
2685:
2664:
2599:
2591:
2558:
2557:Talk to my owner
2553:
2528:
2527:
2506:
2471:
2463:
2398:If the image is
2370:
2363:
2362:
2226:
2115:
2107:
2101:
2096:
1563:
1510:
1453:alternation_jrl
1283:alternation_jrl
1152:World Phenomenon
1115:
997:
611:
487:
438:
378:
320:
319:
316:
313:
310:
293:
286:
285:
280:
272:
265:
264:
235:
234:
231:
228:
225:
204:
199:
198:
188:
181:
180:
175:
167:
160:
159:
130:
129:
126:
123:
120:
103:
98:
97:
87:
80:
79:
74:
66:
59:
58:
42:
33:
32:
25:
24:
16:
3664:
3663:
3659:
3658:
3657:
3655:
3654:
3653:
3569:
3568:
3552:
3537:
3532:
3500:
3493:have permission
3483:
3387:this simple FaQ
3372:
3357:
3352:
3320:
3313:have permission
3303:
3277:this simple FaQ
3262:
3227:
3212:
3207:
3175:
3168:have permission
3158:
3122:this simple FaQ
3107:
3092:
3087:
3055:
3048:have permission
3038:
3012:this simple FaQ
2997:
2987:
2982:
2947:
2940:have permission
2930:
2914:
2879:
2871:
2857:
2847:
2842:
2807:
2800:have permission
2790:
2751:
2743:
2729:
2719:
2714:
2679:
2672:have permission
2662:
2593:
2585:
2571:
2561:
2556:
2521:
2514:have permission
2504:
2465:
2457:
2443:
2361:
2331:Onore Baka Sama
2321:
2273:
2232:
2209:
2206:
2183:
2146:
2125:
2120:
2119:
2118:
2108:
2104:
2097:
2093:
2016:
1996:
1979:Best regards --
1967:
1917:
1752:
1732:
1712:
1654:
1590:
1555:
1535:
1516:
1493:
1476:
1431:
1405:
1369:141.211.175.235
1327:
1211:
1195:108.201.173.189
1183:Bryan Henderson
1154:
1127:
1111:
1107:
1020:
980:
867:
852:108.201.173.189
795:
719:Bryan Henderson
609:
603:
562:
550:
525:
470:
458:
421:
418:
368:108.201.173.189
361:
357:
334:High-importance
317:
314:
311:
308:
307:
279:High‑importance
278:
249:High-importance
232:
229:
226:
223:
222:
202:Internet portal
200:
193:
174:High‑importance
173:
144:High-importance
127:
124:
121:
118:
117:
109:WikiProject Law
99:
92:
73:High‑importance
72:
43:on Knowledge's
40:
30:
12:
11:
5:
3662:
3652:
3651:
3646:
3641:
3636:
3631:
3626:
3621:
3616:
3611:
3606:
3601:
3596:
3591:
3586:
3581:
3551:
3548:
3527:
3526:
3519:
3472:
3471:
3463:Added archive
3461:
3453:Added archive
3451:
3443:Added archive
3441:
3433:Added archive
3431:
3423:Added archive
3421:
3413:Added archive
3411:
3403:Added archive
3401:
3393:Added archive
3379:Identity theft
3371:
3368:
3347:
3346:
3339:
3292:
3291:
3283:Added archive
3269:Identity theft
3261:
3258:
3226:
3223:
3202:
3201:
3194:
3147:
3146:
3138:Added archive
3136:
3128:Added archive
3114:Identity theft
3106:
3103:
3082:
3081:
3074:
3027:
3026:
3018:Added archive
3004:Identity theft
2996:
2993:
2980:
2974:
2973:
2966:
2899:
2898:
2890:Added archive
2864:Identity theft
2856:
2853:
2840:
2834:
2833:
2826:
2771:
2770:
2762:Added archive
2736:Identity theft
2728:
2725:
2712:
2706:
2705:
2698:
2643:
2642:
2634:Added archive
2632:
2624:Added archive
2622:
2614:Added archive
2612:
2604:Added archive
2578:Identity theft
2570:
2567:
2554:
2548:
2547:
2540:
2485:
2484:
2476:Added archive
2450:Identity theft
2442:
2439:
2436:
2435:
2411:
2410:
2403:
2389:
2388:
2371:
2360:
2357:
2356:
2355:
2333:
2320:
2317:
2316:
2315:
2301:
2285:connected with
2272:
2269:
2268:
2267:
2231:
2228:
2205:
2202:
2182:
2179:
2145:
2138:
2136:
2124:
2121:
2117:
2116:
2102:
2090:
2089:
2085:
2084:
2083:
2047:
2038:
2015:
2012:
1995:
1994:Famous Victims
1992:
1966:
1963:
1925:Identity theft
1916:
1908:
1907:
1906:
1905:
1904:
1903:
1902:
1901:
1900:
1899:
1898:
1874:
1873:
1872:
1871:
1870:
1869:
1868:
1867:
1845:
1844:
1843:
1842:
1841:
1840:
1826:Identity fraud
1816:
1815:
1814:
1813:
1756:identity fraud
1751:
1748:
1731:
1728:
1711:
1708:
1689:
1688:
1653:
1650:
1645:
1644:
1622:
1621:
1589:
1586:
1554:
1551:
1534:
1531:
1515:
1512:
1481:Identity theft
1475:
1472:
1471:
1470:
1456:
1430:
1427:
1404:
1401:
1385:
1384:
1357:
1356:
1326:
1323:
1307:
1306:
1305:
1304:
1270:
1253:terminology.
1210:
1207:
1206:
1205:
1189:
1188:
1179:
1178:
1174:
1173:
1153:
1150:
1149:
1148:
1126:
1123:
1106:
1103:
1102:
1101:
1100:
1099:
1098:
1097:
1077:
1076:
1075:
1074:
1057:
1056:
1055:
1054:
1042:
1041:
1019:
1016:
1015:
1014:
970:
969:
964:Arek Wnukowski
958:
957:
952:
951:
947:
946:
942:
941:
940:
939:
920:
919:
918:
866:
863:
847:
845:
844:
801:
794:
791:
790:
789:
756:
755:
754:
753:
741:
740:
739:
738:
725:
724:
715:
714:
709:
708:
703:
702:
697:
696:
691:
690:
689:
688:
685:Identity theft
679:
678:
673:
671:
670:
640:
639:
602:
599:
588:
587:
574:
561:
558:
549:
546:
540:124.177.178.52
536:
535:
524:
521:
495:
494:
457:
454:
428:92.202.108.228
417:
414:
413:
412:
411:
410:
356:
353:
350:
349:
346:
345:
342:
341:
330:
324:
323:
321:
304:the discussion
294:
282:
281:
273:
261:
260:
257:
256:
245:
239:
238:
236:
219:the discussion
206:
205:
189:
177:
176:
168:
156:
155:
152:
151:
140:
134:
133:
131:
105:
104:
88:
76:
75:
67:
55:
54:
48:
26:
9:
6:
4:
3:
2:
3661:
3650:
3647:
3645:
3642:
3640:
3637:
3635:
3632:
3630:
3627:
3625:
3622:
3620:
3617:
3615:
3612:
3610:
3607:
3605:
3602:
3600:
3597:
3595:
3592:
3590:
3587:
3585:
3582:
3580:
3577:
3576:
3574:
3567:
3566:
3562:
3558:
3547:
3546:
3541:
3536:
3535:
3524:
3520:
3517:
3513:
3512:
3511:
3504:
3498:
3494:
3490:
3486:
3480:
3475:
3470:
3466:
3462:
3460:
3456:
3452:
3450:
3446:
3442:
3440:
3436:
3432:
3430:
3426:
3422:
3420:
3416:
3412:
3410:
3406:
3402:
3400:
3396:
3392:
3391:
3390:
3388:
3384:
3380:
3375:
3367:
3366:
3361:
3356:
3355:
3344:
3340:
3337:
3333:
3332:
3331:
3324:
3318:
3314:
3310:
3306:
3300:
3295:
3290:
3286:
3282:
3281:
3280:
3278:
3274:
3270:
3265:
3257:
3256:
3252:
3248:
3247:IAEP.CamilleR
3243:
3240:
3237:
3234:
3230:
3222:
3221:
3216:
3211:
3210:
3199:
3195:
3192:
3188:
3187:
3186:
3179:
3173:
3169:
3165:
3161:
3155:
3150:
3145:
3141:
3137:
3135:
3131:
3127:
3126:
3125:
3123:
3119:
3115:
3110:
3102:
3101:
3096:
3091:
3090:
3079:
3075:
3072:
3068:
3067:
3066:
3059:
3053:
3049:
3045:
3041:
3035:
3030:
3025:
3021:
3017:
3016:
3015:
3013:
3009:
3005:
3000:
2992:
2991:
2985:
2978:
2971:
2967:
2964:
2960:
2959:
2958:
2951:
2945:
2941:
2937:
2933:
2927:
2922:
2918:
2912:
2908:
2904:
2897:
2893:
2889:
2888:
2887:
2883:
2875:
2869:
2865:
2860:
2852:
2851:
2845:
2838:
2831:
2827:
2824:
2820:
2819:
2818:
2811:
2805:
2801:
2797:
2793:
2787:
2782:
2780:
2776:
2769:
2765:
2761:
2760:
2759:
2755:
2747:
2741:
2737:
2732:
2724:
2723:
2717:
2710:
2703:
2699:
2696:
2692:
2691:
2690:
2683:
2677:
2673:
2669:
2665:
2659:
2654:
2652:
2648:
2641:
2637:
2633:
2631:
2627:
2623:
2621:
2617:
2613:
2611:
2607:
2603:
2602:
2601:
2597:
2589:
2583:
2579:
2574:
2566:
2565:
2559:
2552:
2545:
2541:
2538:
2534:
2533:
2532:
2525:
2519:
2515:
2511:
2507:
2501:
2496:
2494:
2490:
2483:
2479:
2475:
2474:
2473:
2469:
2461:
2455:
2451:
2446:
2434:
2433:
2429:
2425:
2421:
2417:
2416:
2408:
2404:
2401:
2397:
2396:
2395:
2393:
2386:
2385:
2384:
2380:
2376:
2372:
2369:
2365:
2364:
2354:
2350:
2346:
2343:
2339:
2338:
2337:
2336:
2332:
2329:
2326:
2314:
2310:
2306:
2302:
2299:
2298:
2297:
2294:
2293:resulted from
2290:
2286:
2281:
2276:
2266:
2262:
2258:
2254:
2249:
2248:
2247:
2246:
2242:
2238:
2227:
2225:
2221:
2217:
2213:
2201:
2200:
2196:
2195:focus_mankind
2192:
2191:focus_mankind
2188:
2178:
2177:
2173:
2169:
2163:
2162:
2156:
2152:
2143:
2137:
2134:
2131:
2130:
2112:
2111:Reno Stephens
2106:
2100:
2095:
2091:
2088:
2082:
2078:
2074:
2070:
2066:
2065:
2064:
2063:
2059:
2055:
2050:
2046:
2043:
2037:
2034:
2033:
2029:
2025:
2020:
2011:
2010:
2006:
2002:
1991:
1990:
1986:
1982:
1977:
1974:
1971:
1962:
1961:
1957:
1953:
1949:
1945:
1944:
1940:
1936:
1932:
1928:
1927:. (Discuss)"
1926:
1922:
1915:
1914:
1897:
1893:
1889:
1884:
1883:
1882:
1881:
1880:
1879:
1878:
1877:
1876:
1875:
1866:
1862:
1858:
1853:
1852:
1851:
1850:
1849:
1848:
1847:
1846:
1839:
1835:
1831:
1827:
1822:
1821:
1820:
1819:
1818:
1817:
1812:
1808:
1804:
1800:
1795:
1794:
1793:
1789:
1785:
1781:
1777:
1776:
1775:
1774:
1770:
1766:
1762:
1757:
1747:
1746:
1742:
1738:
1727:
1726:
1722:
1718:
1707:
1706:
1702:
1698:
1694:
1687:
1683:
1679:
1674:
1673:
1672:
1671:
1667:
1663:
1660:
1649:
1643:
1642:
1641:
1640:
1636:
1632:
1628:
1620:
1616:
1612:
1607:
1606:
1605:
1604:
1600:
1596:
1585:
1583:
1579:
1575:
1571:
1567:
1559:
1550:
1549:
1545:
1541:
1530:
1529:
1526:
1522:
1514:Adding a link
1511:
1509:
1505:
1501:
1500:99.130.66.109
1497:
1490:
1489:
1486:
1482:
1469:
1466:
1462:
1461:
1460:
1457:
1454:
1452:
1449:
1443:
1439:
1435:
1426:
1425:
1422:
1418:
1414:
1413:76.244.68.147
1409:
1400:
1399:
1395:
1391:
1390:97.90.125.162
1383:
1380:
1376:
1375:
1374:
1373:
1370:
1366:
1362:
1355:
1352:
1347:
1346:
1345:
1344:
1340:
1336:
1335:Robert A.West
1332:
1322:
1321:
1317:
1313:
1303:
1300:
1296:
1295:
1294:
1293:
1292:
1291:
1288:
1284:
1282:
1279:
1273:
1268:
1267:
1264:
1258:
1254:
1250:
1246:
1242:
1238:
1235:
1231:
1227:
1223:
1219:
1215:
1204:
1200:
1196:
1191:
1190:
1187:
1184:
1181:
1180:
1176:
1175:
1170:
1169:
1168:
1167:
1164:
1161:
1147:
1144:
1139:
1138:
1137:
1136:
1133:
1122:
1121:
1118:
1116:
1114:
1096:
1092:
1088:
1087:97.90.125.162
1083:
1082:
1081:
1080:
1079:
1078:
1073:
1070:
1065:
1064:
1063:
1062:
1061:
1053:
1050:
1046:
1045:
1044:
1043:
1040:
1037:
1032:
1031:
1030:
1029:
1026:
1018:Major Rewrite
1013:
1009:
1005:
1001:
1000:
999:
998:
996:
992:
988:
984:
977:
976:
968:
965:
960:
959:
954:
953:
949:
948:
944:
943:
938:
935:
931:
930:
929:
926:
921:
917:
914:
910:
909:
908:
905:
901:
900:
899:
898:
895:
890:
887:
884:
880:
877:
875:
870:
862:
861:
857:
853:
848:
843:
839:
835:
831:
830:
829:
828:
824:
820:
814:
810:
809:
805:
804:Ross Anderson
799:
788:
784:
780:
776:
775:
774:
773:
769:
765:
760:
752:
749:
745:
744:
743:
742:
737:
734:
729:
728:
727:
726:
723:
720:
717:
716:
711:
710:
705:
704:
699:
698:
693:
692:
686:
683:
682:
681:
680:
676:
675:
674:
669:
666:
662:
661:
660:
659:
656:
650:
649:
646:
638:
635:
631:
627:
626:
625:
624:
621:
618:
615:
607:
598:
597:
594:
586:
583:
575:
572:
568:
567:
566:
557:
555:
554:71.112.39.160
545:
544:
541:
534:
530:
529:
528:
520:
518:
513:
511:
506:
504:
500:
493:
490:
489:
488:
486:
482:
478:
474:
467:
466:
463:
462:83.245.26.153
453:
452:
448:
444:
439:
437:
433:
429:
425:
409:
405:
401:
396:
395:
393:
389:
385:
381:
380:
379:
377:
373:
369:
365:
339:
335:
329:
326:
325:
322:
305:
301:
300:
295:
292:
288:
287:
283:
277:
274:
271:
267:
266:
254:
250:
244:
241:
240:
237:
220:
216:
212:
211:
203:
197:
192:
190:
187:
183:
182:
178:
172:
169:
166:
162:
161:
149:
145:
139:
136:
135:
132:
115:
111:
110:
102:
96:
91:
89:
86:
82:
81:
77:
71:
68:
65:
61:
60:
56:
52:
46:
38:
37:
27:
23:
18:
17:
3553:
3531:
3528:
3503:source check
3482:
3476:
3473:
3376:
3373:
3351:
3348:
3323:source check
3302:
3296:
3293:
3266:
3263:
3244:
3241:
3238:
3235:
3231:
3228:
3206:
3203:
3178:source check
3157:
3151:
3148:
3111:
3108:
3086:
3083:
3058:source check
3037:
3031:
3028:
3001:
2998:
2975:
2950:source check
2929:
2923:
2910:
2906:
2902:
2900:
2861:
2858:
2835:
2810:source check
2789:
2783:
2778:
2774:
2772:
2733:
2730:
2707:
2682:source check
2661:
2655:
2650:
2646:
2644:
2575:
2572:
2549:
2524:source check
2503:
2497:
2492:
2488:
2486:
2447:
2444:
2419:
2418:
2412:
2391:
2390:
2382:
2345:Ottawahitech
2324:
2322:
2292:
2288:
2284:
2277:
2274:
2252:
2233:
2207:
2186:
2184:
2168:99.45.96.255
2164:
2159:
2154:
2149:
2147:
2141:
2135:
2133:Luis Moreno
2132:
2129:
2126:
2105:
2094:
2086:
2051:
2048:
2039:
2035:
2021:
2017:
1997:
1978:
1975:
1972:
1968:
1952:Greensburger
1947:
1946:
1930:
1929:
1924:
1918:
1912:
1911:
1753:
1733:
1713:
1693:TexasAndroid
1690:
1678:TexasAndroid
1655:
1646:
1623:
1595:86.27.59.185
1591:
1560:
1556:
1540:70.15.116.59
1536:
1517:
1491:
1480:
1477:
1458:
1455:
1448:24.226.90.12
1444:
1440:
1436:
1432:
1410:
1406:
1386:
1364:
1358:
1328:
1325:How-to Alert
1308:
1285:
1278:24.226.90.12
1274:
1269:
1263:24.226.90.12
1259:
1255:
1251:
1247:
1243:
1239:
1236:
1232:
1228:
1224:
1220:
1216:
1212:
1158:
1155:
1128:
1112:
1108:
1058:
1021:
987:209.7.46.121
979:
974:
973:
971:
892:Thoughts? --
891:
888:
885:
881:
878:
873:
871:
868:
849:
846:
815:
811:
800:
796:
761:
757:
684:
672:
651:
641:
630:weasel words
605:
604:
589:
563:
551:
537:
531:
526:
514:
507:
496:
491:
477:69.203.84.63
468:
459:
440:
419:
400:Cameron Dewe
362:— Preceding
358:
333:
297:
248:
208:
143:
128:law articles
107:
51:WikiProjects
34:
3239:Thank you,
2917:Sourcecheck
2392:Don't panic
2237:Yourmanstan
2216:86.26.23.81
2210:—Preceding
2187:Nicknapping
2181:nicknapping
1935:HarryZilber
1754:Right now,
1730:more links?
1564:—Preceding
1494:—Preceding
1465:86.31.72.30
981:—Preceding
978:Italic text
925:beyondkaoru
645:John wesley
560:Help needed
471:—Preceding
422:—Preceding
114:legal field
3573:Categories
3540:Report bug
3360:Report bug
3225:Data theft
3215:Report bug
3095:Report bug
2114:attention.
2087:References
2042:non-profit
1737:Jlygrnmigt
1593:sentence.
1485:86.31.78.1
956:arguments.
713:behaviors.
503:Talk at me
101:Law portal
3523:this tool
3516:this tool
3343:this tool
3336:this tool
3198:this tool
3191:this tool
3078:this tool
3071:this tool
2970:this tool
2963:this tool
2830:this tool
2823:this tool
2702:this tool
2695:this tool
2550:Cheers. —
2544:this tool
2537:this tool
1421:AmirHayat
764:Vaheterdu
443:Vaheterdu
39:is rated
3529:Cheers.—
3349:Cheers.—
3242:Camille
3229:Hello !
3204:Cheers.—
3084:Cheers.—
2976:Cheers.—
2874:cbignore
2836:Cheers.—
2746:cbignore
2708:Cheers.—
2588:cbignore
2460:cbignore
2400:non-free
2289:reported
2212:unsigned
2142:SOLUTION
1578:contribs
1566:unsigned
1525:Jrosenfe
1496:unsigned
1434:think?
1379:Rklawton
1351:Arcturus
1163:Arcturus
1143:Rklawton
1132:Dansiman
1113:FloNight
1036:Arcturus
983:unsigned
934:Rklawton
793:Proposal
634:Arcturus
610:Aplomado
517:Arcturus
510:Arcturus
499:furrykef
473:unsigned
424:unsigned
364:unsigned
224:Internet
215:Internet
171:Internet
3383:my edit
3273:my edit
3118:my edit
3008:my edit
2986::Online
2903:checked
2868:my edit
2846::Online
2775:checked
2740:my edit
2718::Online
2647:checked
2582:my edit
2560::Online
2489:checked
2454:my edit
2158:holder.
1697:Scaifea
1662:Scaifea
1310:Europe?
1299:Nickj69
1069:Nickj69
1049:Nickj69
1025:Nickj69
913:Nickj69
894:Nickj69
819:sorsoup
748:Nickj69
733:Nickj69
665:Nickj69
655:Nickj69
582:Nickj69
533:though.
456:comment
336:on the
251:on the
146:on the
41:C-class
2911:failed
2882:nobots
2754:nobots
2596:nobots
2468:nobots
2073:Nabeth
2054:Nabeth
2024:Nabeth
1981:Nabeth
1948:Oppose
1931:Oppose
1888:Nabeth
1857:Nabeth
1830:Nabeth
1784:Nabeth
1765:Nabeth
1004:AstroU
904:zzuuzz
834:CliffC
384:AstroU
47:scale.
2305:Elvey
2257:Elvey
1803:Elvey
1611:Afpre
1570:Afpre
779:Steve
593:Dhs14
579:: -->
578:: -->
28:This
3561:talk
3251:talk
2907:true
2779:true
2651:true
2493:true
2428:talk
2349:talk
2309:talk
2278:The
2261:talk
2241:talk
2220:talk
2172:talk
2077:talk
2058:talk
2028:talk
2005:talk
2001:Psrq
1985:talk
1956:talk
1939:talk
1892:talk
1861:talk
1834:talk
1807:talk
1788:talk
1769:talk
1741:talk
1721:talk
1717:Wpbl
1701:talk
1682:talk
1666:talk
1635:talk
1615:talk
1599:talk
1574:talk
1544:talk
1504:talk
1417:talk
1394:talk
1339:Talk
1316:talk
1312:Mike
1199:talk
1091:talk
1008:talk
991:talk
856:talk
838:talk
823:talk
783:talk
768:talk
481:talk
447:talk
432:talk
404:talk
388:talk
372:talk
328:High
243:High
138:High
3497:RfC
3467:to
3457:to
3447:to
3437:to
3427:to
3417:to
3407:to
3397:to
3317:RfC
3287:to
3172:RfC
3142:to
3132:to
3052:RfC
3022:to
2944:RfC
2921:).
2909:or
2894:to
2804:RfC
2766:to
2676:RfC
2638:to
2628:to
2618:to
2608:to
2518:RfC
2480:to
1287:Nfe
876:.
591:of.
577:-->
119:Law
70:Law
3575::
3563:)
3510:.
3505:}}
3501:{{
3330:.
3325:}}
3321:{{
3253:)
3245:--
3185:.
3180:}}
3176:{{
3065:.
3060:}}
3056:{{
2957:.
2952:}}
2948:{{
2919:}}
2915:{{
2880:{{
2876:}}
2872:{{
2817:.
2812:}}
2808:{{
2752:{{
2748:}}
2744:{{
2689:.
2684:}}
2680:{{
2594:{{
2590:}}
2586:{{
2531:.
2526:}}
2522:{{
2466:{{
2462:}}
2458:{{
2430:)
2422:--
2351:)
2311:)
2287:a
2263:)
2255:--
2243:)
2222:)
2197:)
2174:)
2079:)
2060:)
2052:--
2030:)
2022:--
2007:)
1999:--
1987:)
1958:)
1941:)
1894:)
1863:)
1855:--
1836:)
1809:)
1801:--
1790:)
1771:)
1743:)
1723:)
1715:--
1703:)
1684:)
1668:)
1637:)
1617:)
1601:)
1580:)
1576:•
1546:)
1506:)
1411:--
1396:)
1341:)
1318:)
1201:)
1093:)
1085:--
1067:--
1010:)
993:)
858:)
840:)
825:)
785:)
770:)
653:--
612:-
580:--
483:)
449:)
434:)
406:)
390:)
374:)
3559:(
3542:)
3538:(
3525:.
3518:.
3362:)
3358:(
3345:.
3338:.
3249:(
3217:)
3213:(
3200:.
3193:.
3097:)
3093:(
3080:.
3073:.
2972:.
2965:.
2832:.
2825:.
2704:.
2697:.
2546:.
2539:.
2426:(
2347:(
2328:—
2307:(
2259:(
2239:(
2218:(
2193:(
2170:(
2075:(
2056:(
2026:(
2003:(
1983:(
1954:(
1937:(
1890:(
1859:(
1832:(
1805:(
1786:(
1767:(
1739:(
1719:(
1699:(
1680:(
1664:(
1633:(
1613:(
1597:(
1572:(
1542:(
1502:(
1415:(
1392:(
1337:(
1314:(
1197:(
1089:(
1006:(
989:(
972:'
854:(
836:(
821:(
781:(
766:(
620:C
617:T
614:U
501:(
479:(
445:(
430:(
402:(
386:(
370:(
340:.
255:.
150:.
53::
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.