Personal Information & Identification Security Made Easy
By Tim Adams
()
About this ebook
Do you know how many people and companies want your private and personal information?
Do you want to learn who is actively extracting, collecting, and storing your private information and why it’s valuable?
Have you ever heard of Information Theft Social Engineering?
Are you aware of the personal cost from being a victim of Identification Impersonation or Identification Theft (ID Theft)?
If you don’t have the answers to these questions you are at a high risk to be a victim of personal and private information loss and Identity theft!
This book was written to be a simple and easy to use guide to help people obtain a very high level of information security awareness, necessary in today’s world. Readers will learn the most effective ways on how to safeguard private and personal information at home, in public and at the workplace. If your goal is to secure your private information this book is a MUST HAVE resource and reference guide. I clearly explain:
•Why people and companies want your private and personal information
•The methods and means being used to extract and acquire information
•Who has your private and personal information and where it is being stored
•How people’s private information is being used and how they profit from it
I outline the specific threats to our personal information security that we experience in our daily lives, and provide the strategies and solutions for people to protect yourself, family, friends and your co-workers. This is accomplished by protecting our:
•Personal and family confidential documents
•Internet and Online usage activity
•Social Media networks and personal information exposure
•Computers, iPads/Tablets, Smartphones or other Internet connectable devices
•Information storage Hard Drives or any other memory storage devices
•Workplace company’s business operations secret information
•Disposed of private & personal information assets
•Communication with unknown people on the telephone, e-mail/text/IM or personal contact
Having spent over a decade as a very successful “Professional Information Theft Specialist”, my job was to extract and acquire people’s personal information from companies all over the world. I also spent years studying company personal information extraction, criminal information theft tactics and the identification theft industry.
I expose the most popular and effective ways to gather people’s personal information. Outside of the physical theft of your personal information assets, the most dangerous threats we all face come from people who are practicing Information Theft Social Engineering, which is the art of tricking and fooling people over the telephone, email/text/IM, and in person. Simply put, Information Theft Social Engineering is lying to others to get them to provide or to get access to valuable private, personal, or corporate information. I will disclose the most popular methods and means Information Theft Social Engineers use today to steal, extract or acquire personal and corporate information. The strategies outlined in this book offer the most effective ways for people to use to avoid becoming a victim of information loss and identification theft (ID Theft). This includes the decisions we personally make regarding:
•Who we share our personal or others information with
•What kinds of private and personal information we give out
•How we distribute our private and personal information
•The storage of our personal information safely
•The disposal of private information assets securely
It is our personal responsibility to protect information from extraction and theft, as we the people are “The Human Element”, the most important part of Information Security.
After reading this book you will have achieved the highest level of information security awareness possible and the knowledge and ability to fully protect your private and per
Tim Adams
Tim Adams was a hobbyist auto mechanic before founding TransitPeople, a nonprofit that conducted field trips for Los Angeles children aboard public transit. He now lives and rides the subway in Madrid, Spain.Brothers of the Milky Way can be downloaded in .pdf, .mobi and .epub formats at https://bluetowerpress.com.
Read more from Tim Adams
The Colors of Malent: Book One Rating: 0 out of 5 stars0 ratingsBrothers of the Milky Way Rating: 0 out of 5 stars0 ratingsA Quick One Before Bed Rating: 0 out of 5 stars0 ratings
Related to Personal Information & Identification Security Made Easy
Related ebooks
Crash Course Data Security Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratingsUnderstanding Identity Theft: Protect Your Identity From Theft Rating: 3 out of 5 stars3/5Mobile Security: How to secure, privatize and recover your devices Rating: 5 out of 5 stars5/5Identity Theft and Fraud: Evaluating and Managing Risk Rating: 0 out of 5 stars0 ratingsThe Identity Theft Protection Guide: *Safeguard Your Family *Protect Your Privacy *Recover a Stolen Identity Rating: 0 out of 5 stars0 ratingsIdentity Lockdown: Your Step By Step Guide to Identity Theft Protection Rating: 0 out of 5 stars0 ratingsGuarding Against Online Identity Theft Rating: 0 out of 5 stars0 ratingsHow to Survive Identity Theft: Regain Your Money, Credit, and Reputation Rating: 0 out of 5 stars0 ratingsDeep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5Cyber Security Awareness for Lawyers Rating: 0 out of 5 stars0 ratingsCybersecurity for Small Businesses and Nonprofits Rating: 0 out of 5 stars0 ratingsLearn All About Cyber Safety Rating: 0 out of 5 stars0 ratingsBusiness Espionage: Risks, Threats, and Countermeasures Rating: 0 out of 5 stars0 ratingsYour Right To Privacy: Minimize Your Digital Footprint Rating: 0 out of 5 stars0 ratingsCyber Curiosity: A Beginner's Guide to Cybersecurity Rating: 0 out of 5 stars0 ratingsCyber Security From Beginner To Expert Cyber Security Made Easy For Absolute Beginners Rating: 0 out of 5 stars0 ratingsYou: For Sale: Protecting Your Personal Data and Privacy Online Rating: 0 out of 5 stars0 ratingsCybersecurity: The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks Rating: 0 out of 5 stars0 ratingsID Theft Scams and Solutions (A guide on how to protect your identity) Rating: 0 out of 5 stars0 ratingsHampering the Human Hacker and the Threat of Social Engineering Rating: 0 out of 5 stars0 ratingsInvestigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace Rating: 0 out of 5 stars0 ratingsHack Proof Yourself!: The essential guide for securing your digital world Rating: 0 out of 5 stars0 ratingsTackling Fraud Rating: 4 out of 5 stars4/5Digital Earth: Cyber threats, privacy and ethics in an age of paranoia Rating: 0 out of 5 stars0 ratingsSecurity in the Digital World Rating: 0 out of 5 stars0 ratingsSecrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century Rating: 0 out of 5 stars0 ratingsThe Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy Rating: 5 out of 5 stars5/5Knockout Punch for the Identity Thief -7 Secrets to Online Security for Stay at Home Moms On the Go Rating: 5 out of 5 stars5/5Confessions of an Identity Thief Rating: 0 out of 5 stars0 ratings
Teaching Methods & Materials For You
The Three Bears Rating: 5 out of 5 stars5/5Becoming Cliterate: Why Orgasm Equality Matters--And How to Get It Rating: 4 out of 5 stars4/5From 150 to 179 on the LSAT Rating: 4 out of 5 stars4/5How to Take Smart Notes. One Simple Technique to Boost Writing, Learning and Thinking Rating: 4 out of 5 stars4/5A study guide for Frank Herbert's "Dune" Rating: 3 out of 5 stars3/5Speed Reading: How to Read a Book a Day - Simple Tricks to Explode Your Reading Speed and Comprehension Rating: 4 out of 5 stars4/5Speed Reading: Learn to Read a 200+ Page Book in 1 Hour: Mind Hack, #1 Rating: 5 out of 5 stars5/5Fluent in 3 Months: How Anyone at Any Age Can Learn to Speak Any Language from Anywhere in the World Rating: 3 out of 5 stars3/5How To Be Hilarious and Quick-Witted in Everyday Conversation Rating: 5 out of 5 stars5/5Easy Spanish Stories For Beginners: 5 Spanish Short Stories For Beginners (With Audio) Rating: 3 out of 5 stars3/5Financial Feminist: Overcome the Patriarchy's Bullsh*t to Master Your Money and Build a Life You Love Rating: 5 out of 5 stars5/5Weapons of Mass Instruction: A Schoolteacher's Journey Through the Dark World of Compulsory Schooling Rating: 4 out of 5 stars4/5A Study Guide for S.E. Hinton's The Outsiders Rating: 0 out of 5 stars0 ratingsJack Reacher Reading Order: The Complete Lee Child’s Reading List Of Jack Reacher Series Rating: 4 out of 5 stars4/5Conversational Spanish Dialogues: Over 100 Spanish Conversations and Short Stories Rating: 4 out of 5 stars4/5Grit: The Power of Passion and Perseverance Rating: 4 out of 5 stars4/5Principles: Life and Work Rating: 4 out of 5 stars4/5The 5 Love Languages of Children: The Secret to Loving Children Effectively Rating: 4 out of 5 stars4/5The Chicago Guide to Grammar, Usage, and Punctuation Rating: 5 out of 5 stars5/5The Call of the Wild and Free: Reclaiming the Wonder in Your Child's Education, A New Way to Homeschool Rating: 4 out of 5 stars4/5Personal Finance for Beginners - A Simple Guide to Take Control of Your Financial Situation Rating: 5 out of 5 stars5/5Summary of The Dawn of Everything by David Graeber and David Wengrow Rating: 4 out of 5 stars4/5A Failure of Nerve: Leadership in the Age of the Quick Fix (10th Anniversary, Revised Edition) Rating: 4 out of 5 stars4/5Lies My Teacher Told Me: Everything Your American History Textbook Got Wrong Rating: 4 out of 5 stars4/5Everything You Need to Know About Personal Finance in 1000 Words Rating: 5 out of 5 stars5/5Who Gets In and Why: A Year Inside College Admissions Rating: 4 out of 5 stars4/5
Related categories
Reviews for Personal Information & Identification Security Made Easy
0 ratings0 reviews
Book preview
Personal Information & Identification Security Made Easy - Tim Adams
Personal Information & Identification Security Made Easy
By Tim Adams
© Copyright 2017
Gate Security KK
All Rights Reserved
https://gatesecurity.info/
All rights reserved. No portion of this book may be reproduced in any form without permission from the publisher, except as permitted by U.S. copyright law.
For permissions, contact
mailto:info@gatesecurity.info
eBook formatting by: Chris Ellis
Dedication
This book is dedicated to my wife Yumiko, who has continuously encouraged and supported me through the research and the writing of this book.
Why I wrote this book
Many people have asked me why I decide to tell the truth about being a professional information thief, and even what does that means in today’s world. After working for over a decade legally extracting, acquiring and trading in people’s private information. I watched a massive billion-dollar industry develop around the extraction, the use of, and the profit being made from people’s private and personal information. I felt compelled to tell the truth about my experiences and about what I have done. I started Gate Security, which is a Business Communication and Information Security Company designed to teach people, companies and organizations what they can do to protect themselves and their private and personal information. Social Media networks, big business and the advertising and marketing industry has been totally silent on how much information they have been able to collect and store, and how this information is used to map and build a complete image and personal profile of our daily activities and lives.
This book serves as a credible information security reference guide for the public, privacy advocates and companies who are serious about building what I call The Human Firewall
to protect themselves from becoming a victim of information theft. The people or The Human Element
of information security is often the most over looked factor in information security. I address the most serious threats to our private and personal information today and I include information security solutions for people to practice in their everyday lives. This includes how to protect from theft, cyber hackers, Information Theft Social Engineers or others who are attempting to extract, acquire or steal private and personal information. It’s our personal responsibility to protect our private and personal information at all times, at home, in public and at the workplace. Never, in the history of mankind has our private information been so valuable and sought after by governments, businesses, advertisers, and criminals. This book goes a long way educating people on how to protect their private and personal information and secure their personal identification.
Tim Adams – Author
TABLE OF CONTENTS
1: INTRODUCTION
2: HOW I BECAME A PROFESSIONAL INFORMATION THIEF
2.1 WORKING AS A PROFESSIONAL INFORMATION THEFT SPECIALIST
Information Theft Social Engineering Training
The Evolution of the Information Extraction and Theft Industry
The Fine Line of Unethical Information Extraction
Conclusion
3: PERSONAL INFORMATION SECURITY AWARENESS
3.1 HISTORY OF INFORMATION AND IDENTIFICATION THEFT
General Private and Personal Information Theft
Personal Identification History
Identification Theft and the Telephone
The Development of Credit Cards
Personal Information Theft and Dumpster Diving
The Internet and Online
Conclusion
3.2 PERSONAL INFORMATION EXTRACTION AND IDENTIFICATION THEFT TODAY
Personal Daily Activities Information Extraction
Individual Personal Information Profiles
Identification Impersonation (Identity Theft)
Conclusion
3.3 WHO WANTS OUR PERSONAL AND PRIVATE INFORMATION?
Information Data Brokers
Advertisers and Marketing Companies
The Government
Corporate Espionage Information Theft Agents
Your Employer
Opportunistic Thieves
Identification Theft Criminals
Cyber Criminals
Conclusion
3.4 THE METHODS AND MEANS OF INFORMATION EXTRACTION AND THEFT
Information Theft Social Engineering
Physical Theft of Personal Information Assets
Cyber Hackers
Local Business Loyalty and Point Cards
Purchasing and Trading of Personal Information
Conclusion
4: OUR PERSONAL INFORMATION IS VALUABLE
4.1 WHAT PERSONAL INFORMATION IS THE MOST VALUABLE?
Your Social Security Number
Your Children’s Social Security Number
Your Date of Birth
Your Full Name (Including Aliases)
Your Actual Account Numbers
Your Online Usernames and Passwords
Your Personal Medical Records
Your Driver’s License Number
Your Passport Number
Your Banking PIN Numbers
Your Mother’s Maiden Name
Where You Were Born
Expiration Date or Confirmation Code of Your Cards
Your Physical Address (Including Previous Ones)
Your Email Address
Your Telephone Number (Home and Mobile)
Where You Hold Financial Accounts
Your Hobbies, Club Memberships, or Employer
Your Vehicle Registration
Conclusion
4.2 ONLINE PERSONAL INFORMATION EXTRACTION THREATS
Google Search Engine and Online Services
Global Positioning System (GPS) Location Services
Social Media Networks
Cambridge University and Microsoft Research Facebook Users Study
Facebook’s Personal Information Profile Parameters
Creating a Marketing and Advertisers Dream Come True
What Personal Information is Being Collected by Facebook?
Social Media Paid Access Subscriptions
Applications (Apps)
Online Information Extraction and the Required Terms of Service (TOS)
Conclusion
4.3 WHO HAS OUR PERSONAL INFORMATION AND HOW SAFE IS IT?
Who is Storing and Keeping Our Personal Information Data?
How Secure is Our Collected Personal Information?
Major Companies Personal Information Losses
Conclusion
4.4 THE NEGATIVE EFFECTS OF PERSONAL INFORMATION LOSS OR THEFT
Financial Identity Theft
Criminal Identity Theft
Medical Identity Theft
Identification Cloning (ID Cloning)
Commercial Identity Theft
Conclusion
5: WHERE WE ARE AT RISK OF INFORMATION AND IDENTIFICATION THEFT
5.0 INFORMATION SECURITY RISKS AT HOME
5.1 SAFEGUARDING PERSONAL INFORMATION AT HOME
Personal Responsibility of Our Information Security
Physical Theft
Face-to-Face Personal Approaches
Waste Management and Information Storage (Hard Drive) Disposal
Solution
5.2 UNKNOWN PERSONAL CONTACT IDENTIFICATION VERIFICATION
Personal Information Theft Attack Warning Signs
Identification Verification Methods
Identification Verification Questionnaire
Identification Verification Research
Solution
5.3 TELEPHONE INFORMATION THEFT SOCIAL ENGINEERING SCAMS
The Auto Accident Scam
The Jail Scam
The Internal Revenue Service (IRS) Scam
IRS Robo Call Scam
You’re a Winner
Scams
Solution
5.4 SAFEGUARDING YOUR PERSONAL INFORMATION ONLINE
Do an Assessment of Your Online Activities
Social Media Privacy
Application (App) Security
Lock Down Your Hardware
Private Browsing and Virtual Private Network (VPN)
Password Security
Strong Password Examples
Password Managers
Use Two-Factor Authentication
Lie When Setting Up Password Security Questions
Shopping Sites Security
Use an Extra Email Address
Personal Health and Tracking Devices
Solution
5.5 HOME WI-FI NETWORK SECURITY
Home Wi-Fi Network
Wi-Fi Network Security Measures
Change the Router Username and Password
Change the Network Name
Activate Encryption
Stack Up on Firewalls
Turn Off Guest Networks
Update Router Firmware
Turn WPS Off
Disable Wi-Fi When Not Home
Wi-Fi Location
Solution
5.6 INCOMING MESSAGE PERSONAL INFORMATION EXTRACTION TRICKS
Email, Text or Instant Messenger (IM)
Phishing
Phishing Message Example:
Malware
Malware Message Example:
Solution
5.7 ONLINE INFORMATION THEFT SOCIAL ENGINEERING SCAMS
Money Laundering Scams
Solution
The Friend
Scams
Solution
A Guaranteed Bank Loan or Credit Card Scam
Solution
Job Scam
Solution
Vacation Scam
Solution
Owed Money Scam
Solution
The Refund Compensation Scam
Solution
The Lottery and Related Other’s Scams
Solution
6: INFORMATION SECURITY RISKS IN PUBLIC AREAS
6.1 SAFEGUARDING PERSONAL INFORMATION IN PUBLIC
Personal Information Assets Inventory
Public Area Security Awareness
Solution
6.2 PICKPOCKETS AND THIEVES
Scenario 1: The Elevator or Train Entrance Ticket Line
Solution
Scenario 2: The Park or Public Spaces Distraction
Solution
Scenario 3: The Bus, Train Stop or Shopping Areas
Solution
Scenario 4: The Busy Street
Solution
Scenario 5: The Cafe Table Cover
Solution
Scenario 6: The Photo Opportunity
Solution
Car and Vehicles
Solution
6.3 AUTOMATIC TELLER MACHINES (ATMS) THREATS
Card Capture Devices
The Card Skimmer
The Lebanese Loop
The PIN-Pad Overlay
Helpful Strangers
The Dropped Money Trick
Shoulder Surfing
Solution
6.4 CREDIT CARD SAFEGUARDING
Non-Bank-Owned ATMs
Flea Markets or Outdoor Shopping Bazaars
Small Shops/Cafes in Foreign Countries
Wi-Fi Hotspots and Public Computers
Purchases on Smartphones or Other Internet Connected Devices
Solution
6.5 PERSONAL TRAVELING SECURITY
Take Only the Items Needed
Pack Luggage or Bags Securely
Make a Copy of All Important Documents
Keep Your Valuables Out of Sight
Traveling Financial Security Measures
Avoid Crowds and Commotion
Solution
6.6 HOTEL SAFETY TIPS
Check in Security
Solution
Secure Your Room
Solution
Someone Always in The Room
Solution
The Front Desk Scam
Solution
The Take-Out Fake-Out
Solution
6.7 PUBLIC INTERNET AND FREE WI-FI HOTSPOTS
Free or Public Internet Direct Connections
Wi-Fi Hotspot Personal Information Security Threat
Trading Personal Information for Free Wi-Fi
Public Wi-Fi Security and Virtual Private Network (VPN)
Solution
6.8 SAFEGUARDING PERSONAL INFORMATION IN PUBLIC AREAS
Pay For Things With Cash
Lie on Loyalty Cards
Don’t Give Your Real Zip Code When Using a Credit Card
Fill Out Forms Securely
Solution
7: INFORMATION SECURITY RISKS AT THE WORKPLACE
7.1 SAFEGUARDING PERSONAL AND CORPORATE PRIVATE INFORMATION
Company Business Operations & Employee Information Security Responsibility
7.2 COMPANY BUSINESS OPERATIONS INFORMATION SECURITY THREATS
Information Data Brokers
The Data Research and Recruitment Process Outsourcing (RPO) Call Centers
Corporate Espionage Information Extraction Activities
Conclusion
7.3 EXECUTIVE HUMAN RESOURCE SEARCH RECRUITING FIRMS
New Human Resource Recruiter Training
Human Resource Recruiter Personal Information Trading
Personal Information Security Threats Meeting with Recruiters
Conclusion
7.4 TELEPHONE INFORMATION THEFT SOCIAL ENGINEERING TACTICS
The Lost Information Scenario
The High-Pressure Scenario
The Spilled Drink Scenario
Name Planting and Laddering Technique
The Authority Figure
The Missing Friend Technique
The Reporter or Journalist Technique
The New Friend Technique
Solution
7.5 TELEPHONE INFORMATION THEFT SOCIAL ENGINEERING EXAMPLES
Example 1: The Marketing and Sales Staff
Example 2: The Accounting Manager
Example 3: The College Administration Attack
Example 4: The IT Help Desk Attack
Solution
7.6 AT THE WORKPLACE INFORMATION THEFT SOCIAL ENGINEERING EXAMPLES
Example 1: Human Resource Recruiter (Dumpster Diving)
Example 2: Human Resource Recruiter (On-Site Information Extraction)
Example 3: The Company Business Operations Attack (Security Test)
Example 4: Procter & Gamble vs. Unilever Case
Solution
7.7 THE INTERNET AND ONLINE THREATS AT THE WORKPLACE
Workplace Online Communication Threats
Example 1: Malware Infected Attachment
Example 2: The Spoofed Friend Message
Example 3: The Business Opportunity
Analysis
Example 4: Google and Facebook Phishing Attack
Example 5: Political Campaign E-Mail Phishing Scam
Solution
7.8 ADDITIONAL INFORMATION SECURITY THREATS AT THE WORKPLACE
Face-to-Face & Personal Approaches
Workplace Assets and Information Extraction
Waste Management Security and Dumpster Diving
Solution
8: THE FUTURE OF PERSONAL INFORMATION EXTRACTION AND THEFT
8.1 THE FUTURE OF PERSONAL INFORMATION EXTRACTION
Information Data Brokers
Closed Caption Television (CCTV)
Face and Speech Recognition Tools
Personal Tracking and Global Positioning Location Services (GPS)
Internet and Online
Conclusion
8.2 THE NEWEST INFORMATION TECHNOLOGY DEVELOPMENTS
Internet of Things (IoT)
Audio Beacons
Low Earth Orbit (LEO) Communications
Human Microchip Implants
Conclusion
9: RESPONDING TO PERSONAL INFORMATION SECURITY THREATS
9.1 HAVE I BEEN A VICTIM OF PERSONAL IDENTIFICATION THEFT?
Warning signs of Identity Theft
Steps That Need to be Taken if You Have Been a Victim
9.2 POLICE & LAW ENFORCEMENT AGENCIES
Credit Reporting Agencies
Conclusion
10: FINAL CONCLUSION
THE 10 MOST IMPORTANT STEPS WE CAN TAKE TO PROTECT OURSELVES
WORKS CITED
1: Introduction
My goal in publishing this book is to create the simplest and easiest to understand, communication and personal information security awareness, and safeguarding reference possible. I am doing this to help people of all ages learn how to protect themselves, their family, friends and co-workers, private and personal information to avoid becoming a victim of private and personal information theft at home, in public and at the workplace.
Today, our private, personal and work place information is at a greater risk to being extracted, acquired or stolen than ever before. This is for the simple fact that people’s personal and private information, and company business operations information has become more valuable than any time in history. Our personal information is being collected, compiled and stored by many sources from all areas of our private lives and the information is used to build an individual personal profile on us. If our personal information falls into the wrong hands, we can become a victim of Identification impersonation or Identity theft and this can lead to an assortment of serious problems.
This is NOT an information technology security book that concentrates on computer hacking, anti-virus, database or software security. This book focuses on the weakest link to our personal information security today. We the people! I want to educate readers on the specific actions that people or The Human Element
of information security, can take in their everyday lives to safeguard private and personal information assets.
Outside of the actual theft of our personal information assets, or the cyber hacking of a person’s private and personal information through a computer or other Internet connected devices. A dangerous threat, and a very popular method of personal information extraction today, is the use of various forms of Information Theft Social Engineering to extract the targeted information being sought after. Having worked as a professional information theft specialist for a decade. I was very successful at extracting and stealing people’s personal information from all over the world. I did this by using various forms of lies, which I define as Information Theft Social Engineering
to trick, fool or con people to provide me the desired targeted information I was seeking at the time. This was accomplished primarily on the telephone, through an email/text/IM, and via face-to-face meetings with people.
Information Theft Social Engineering is not illegal, but it certainly could be considered as being unethical. As lying to people using false premises to gather the targeted information being sought after is not the most honest practice. I will take you behind the scenes and expose the Information Theft Social Engineers methods and means used by the professional information theft specialist today to extract and acquire company business operations information and people’s private personal information today.
Information theft has become one of the fastest growing crimes in the world. After reading this book, I hope you have a clear understanding of the personal information security threats that we are facing today in our daily lives. Our personal information security generally comes down to one thing, and that is the decisions we personally make to safeguard and protect private information from being extracted, acquired and stolen. We the people are The Human Element
of information security and we are the most important component to our own personal information security today.
2: How I Became a Professional Information Thief
This chapter will address the path that led me to become a very successful professional information thief. The starting of my own Human Resource staffing business based on the utilization of various forms of information theft and finally the creation of Gate Security, a business communication and information security company that I started with the sole intention of helping company’s, organizations and people learn how to protect themselves from becoming a victim of information and identification theft.
2.1 Working as a Professional Information Theft Specialist
My road to becoming a professional information theft specialist occurred like this. I was an accomplished chef and managed a kitchen in a popular and successful restaurant when I finished college. With a Business Administration, Marketing degree in hand, it was time to start a new chapter in my life and enter the business world. I had a friend who worked as an Executive Human Resource Recruiting Consultant. He seemed to be doing well and he convinced me to give the Recruiting industry a try. I was told that the job was to find a person from one company and persuade them to join another company. If the person accepts the position, then you are paid a commission that is based on how much salary this person will earn for a year. Sounds interesting I thought. What I did not know at the time was how you went about doing this.
I interviewed for the job and it was explained to me, the Recruiting Consultants key to success was how good your information extraction skills were, and how hard you worked. This seemed fair to me, as I had never had an issue with putting in a good day’s work, so I accepted the position of Recruiting Consultant at The Executive Human Resource Recruiting agency.
Information Theft Social Engineering Training
The training for the new Recruiting Consultants consisted of spending countless hours studying and listening to the Senior Recruiting Consultants performing various kinds of Information Theft Social Engineering on company employees to extract company business operation and personal contact information. The favored methods of personal information extraction occurred on the telephone. But, it was also done through an email/text/IM and during face-to-face meetings with potential candidates or by going on site to a company and collecting as much of the company’s business operations private and personal employee information as possible. I learned from the most successful Senior Recruiting Consultants at the company. I adopted their best Information Theft Social Engineering strategies, methods and means that were being used to gather information.
We were constantly informed by the company that our ability to extract or obtain company personal employee contact information was the basis for being financially successful. In my quest to live up to the company standards and acquire new clients and learn more about possible candidates, I became a 24-hour personal information extraction machine. Essentially, I would extract as much company business operations and employee contact information as possible at all times from anyone I was in contact with and everywhere I went.
I worked at a major Executive Human Resource Recruiting agency for