The wall of AWESOME!

Excellent job - never a bored moment which made things very interesting and entertaining.

Class attendee
Interagency OPSEC Support Staff

Very well organized and knowledgeable of all material. Enthusiastic! Great job. Humorous and effective.

Class attendee
Interagency OPSEC Support Staff

Jeremy speaks with students at the University of Advancing Technology, Tempe AZ
[Corkboard source]

Goodbye Identity Theft

At it's root, ID theft is an information risk management problem where, due to a flaw in someone's information practices, a thief gets your data and uses it for their own benefit. Without the knowledge of how this happens and what tools you can use to block it, you're left defenseless against the thief who steals your ID or the ones who run companies that pretend to offer you "protection" that don't actually.

It would be my great honor if you allowed me to speak to your audience and teach them how to cut through the rhetoric and really protect themselves without having to pay anyone monthly "protection" fees.

Learn More First

All the same informaion you'll learn in my talk is also available here on my website. Feel free to look around and learn about protecting your ID. Then, if you believe the information I have to offer will be of benefit to other people you know. please feel free to share this site or consider inviting me to speak:

Talk Outline

Subject to change without notification of course.
  1. The two classifications of identity theft
  2. About non-credit identity theft
  3. Protecting against non-credit identity theft
  4. About credit based identity theft
  5. Protecting against credit identity theft
  6. A special note on credit card fraud and RFID and identity theft

Ready to go?

If you'd like to discuss the seminar for use with company security days, private events, conferences, etc., please click here. Please feel free to use any of the below resources in connection with a scheduled talk.

Supporting Materials

"Great class! I particularly appreciated the emphasis on the need to take personal responsibility for individual actions on the internet, and the recommendations on how to do so."
Attendee
National OPSEC Conference
IDENTITY THEFT
How to Steal Identities - Why It's So Easy
Credit Freeze
Data Defense
Credit Monitoring
Id Theft Insurance
The Identity Theft Victim's Mini-Guide to Recovery
PRIVACY
The Geek Privacy Principle
Nothing to Hide
Data Abuse
RFID - Radio Frequency IDentification
Privacy Alias/Persona
Data Defense
INTERNET SAFETY
Online Addiction
The Consequences of Posting Online
Photo Safety
Tricks and Scams
Account Hijacking
Trusting Companies
PASSWORDS
Bad Passwords
Password Tips and Tricks
Password Protection
Password Mugging
Computer Security
E-mail Safety
Kids and Computers
Shopping Online
Retailers
All About Warranties

Data Defense

One of the most important, but least understood, threats against us today is the creeping data-abuse by companies seeking to compile complete profiles on every American in order to enable "targeted marketing".

Until laws are in place to control their use of your data, learn the tips and tricks to make it harder for them while improving your identity-theft defense at the same time.

[Click for full description]

How to Stop Credit-Based ID Theft with a Credit Freeze

A credit freeze locks your credit report preventing any thieves from being able to open new accounts in your name. Your credit cards and current accounts work like they always have.

[Click for full description]

Federal Credit Card Liability Limit

Because of a federal law protecting you from unauthorized charges, you're better off in most cases using credit cards rather than debit cards for purchases (especially online purchases).

[Click for full description]

RFID - Radio Frequency IDentification

One of the most risky technology when it comes to your privacy is Radio Frequency Identification Tags (RFID). These radio chips broadcast your identity sometimes hundreds of feet and can be found in passports, farecards, credit cards, and even some clothing.

[Click for full description]