{"id":635,"date":"2016-08-08T09:09:05","date_gmt":"2016-08-08T15:09:05","guid":{"rendered":"http:\/\/www.interestingauthors.com\/blog\/?p=635"},"modified":"2017-09-12T05:45:04","modified_gmt":"2017-09-12T11:45:04","slug":"idiot-phones-pt-2","status":"publish","type":"post","link":"https:\/\/interestingauthors.com\/blog\/technology\/idiot-phones-pt-2\/","title":{"rendered":"Idiot Phones &#8211; Pt 2."},"content":{"rendered":"<p>It&#8217;s in the news again. Idiot phones are once again causing people to become victims of identity theft. They aren&#8217;t smart phones, they are phones for idiots.<\/p>\n<p>The current and growing scam is walking into a cellular retailer no where near the victims location, impersonating them and &#8220;upgrading&#8221; phones to the latest idiot phone on the market. The <a href=\"https:\/\/www.ftc.gov\/news-events\/blogs\/techftc\/2016\/06\/your-mobile-phone-account-could-be-hijacked-identity-thief\">FTC calls this account hijacking<\/a>. A 2013 Forbes article stated <a href=\"http:\/\/www.forbes.com\/sites\/janetnovack\/2013\/09\/24\/id-theft-ring-scammed-thousands-of-cell-phones-from-verizon-att-apple\/#575f06065c7a\">over 5000 phones were seized from one identity theft ring<\/a>. This problem is growing.<\/p>\n<p style=\"text-align: justify;\">One thing contributing to this problem is the abuse of Social Security Numbers for identity. Nearly every vendor management system out there asks companies submitting candidates to provide the last 4 digits of their SSN as a &#8220;unique identifier.&#8221; While this may skirt the letter of the law regarding the use of SSN, it does not skirt the spirit of the law. Adding insult to injury the last 4 of your SSN and your cell phone number are traveling around the Internet in unencrypted email. If you have applied for a job via email through one of these systems, you are at risk, even if you don&#8217;t have an idiot phone.<\/p>\n<p style=\"text-align: justify;\">While skimming through the articles floating around about phone account hijacking a common thread emerged. The cellular stores were only requiring a photo ID and the last 4 of SSN to identify someone. This doesn&#8217;t have to be an ID good enough to fool a cop which can run the information on it, just an ID good enough to get someone into a bar. They walk out with one or more $600+ idiot phones charged to your account. The articles also point out they aren&#8217;t dumb enough to use or resell these phones inside of America where cellular providers could track them. These phones are shipped overseas where they can most likely be sold for close to full street price.<\/p>\n<p style=\"text-align: justify;\">You will see much advice on <em>you<\/em> taking steps to prevent this such as adding pins to accounts, etc. What is missing is a national outcry for the government to crack down on SSN abuse. I&#8217;m old enough to remember when SSN abuse was so wide spread banks used to offer the option of having both your driver&#8217;s license number and SSN printed on your checks. Why? Because most retailers took checks and didn&#8217;t have check cashing cards.\u00a0 Every time someone wrote a check the clerk had to record all of this information on the check. Retailers have moved to credit cards which have their own issues but the job application process is still using SSN exposing every job seeker in the country to identity theft.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s in the news again. Idiot phones are once again causing people to become victims of identity theft. They aren&#8217;t smart phones, they are phones [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[103,16],"tags":[625,624],"class_list":["post-635","post","type-post","status-publish","format-standard","hentry","category-experience","category-technology","tag-ftc","tag-phone-account-hijacking"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Idiot Phones - Pt 2. &#8211; Interesting Authors Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/interestingauthors.com\/blog\/technology\/idiot-phones-pt-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Idiot Phones - Pt 2. &#8211; Interesting Authors Blog\" \/>\n<meta property=\"og:description\" content=\"It&#8217;s in the news again. Idiot phones are once again causing people to become victims of identity theft. They aren&#8217;t smart phones, they are phones [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/interestingauthors.com\/blog\/technology\/idiot-phones-pt-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Interesting Authors Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/interestingauthors\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-08T15:09:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-09-12T11:45:04+00:00\" \/>\n<meta name=\"author\" content=\"Roland Hughes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@i_authors\" \/>\n<meta name=\"twitter:site\" content=\"@i_authors\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roland Hughes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/technology\\\/idiot-phones-pt-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/technology\\\/idiot-phones-pt-2\\\/\"},\"author\":{\"name\":\"Roland Hughes\",\"@id\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/#\\\/schema\\\/person\\\/201fb4544222c3251b52ed4a386184ee\"},\"headline\":\"Idiot Phones &#8211; Pt 2.\",\"datePublished\":\"2016-08-08T15:09:05+00:00\",\"dateModified\":\"2017-09-12T11:45:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/technology\\\/idiot-phones-pt-2\\\/\"},\"wordCount\":445,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/#organization\"},\"keywords\":[\"FTC\",\"phone account hijacking\"],\"articleSection\":[\"Experience\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/technology\\\/idiot-phones-pt-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/technology\\\/idiot-phones-pt-2\\\/\",\"url\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/technology\\\/idiot-phones-pt-2\\\/\",\"name\":\"Idiot Phones - Pt 2. &#8211; Interesting Authors Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/#website\"},\"datePublished\":\"2016-08-08T15:09:05+00:00\",\"dateModified\":\"2017-09-12T11:45:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/technology\\\/idiot-phones-pt-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/technology\\\/idiot-phones-pt-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/technology\\\/idiot-phones-pt-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Idiot Phones &#8211; Pt 2.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/\",\"name\":\"Interesting Authors Blog\",\"description\":\"Thoughts and words from some interesting authors\",\"publisher\":{\"@id\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/#organization\",\"name\":\"Interesting Authors\",\"url\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i2.wp.com\\\/interestingauthors.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/iaLogo.jpg?fit=180%2C180&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i2.wp.com\\\/interestingauthors.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/iaLogo.jpg?fit=180%2C180&ssl=1\",\"width\":180,\"height\":180,\"caption\":\"Interesting Authors\"},\"image\":{\"@id\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/interestingauthors\\\/\",\"https:\\\/\\\/x.com\\\/i_authors\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/#\\\/schema\\\/person\\\/201fb4544222c3251b52ed4a386184ee\",\"name\":\"Roland Hughes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae9adac14079d84b909e635d7af986fe4568053af4fd9ff8d4109298c392493e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae9adac14079d84b909e635d7af986fe4568053af4fd9ff8d4109298c392493e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ae9adac14079d84b909e635d7af986fe4568053af4fd9ff8d4109298c392493e?s=96&d=mm&r=g\",\"caption\":\"Roland Hughes\"},\"description\":\"Roland Hughes is the president of Logikal Solutions, a business applications consulting firm specializing in OpenVMS platforms and Qt on Linux. Hughes serves as a lead consultant with over two decades of experience using computers and operating systems. With a degree in Computer Information Systems, the author's experience is focused on systems across a variety of diverse industries including heavy equipment manufacturing, pharmaceuticals, stock exchanges, tax accounting, and hardware value-added resellers, to name a few. Working throughout these industries has strengthened the author's unique skill set and given him a broad perspective on the role and value of technology in industry.\",\"sameAs\":[\"http:\\\/\\\/interestingauthors.com\"],\"url\":\"https:\\\/\\\/interestingauthors.com\\\/blog\\\/author\\\/rolandlogikalsolutions-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Idiot Phones - Pt 2. &#8211; Interesting Authors Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/interestingauthors.com\/blog\/technology\/idiot-phones-pt-2\/","og_locale":"en_US","og_type":"article","og_title":"Idiot Phones - Pt 2. &#8211; Interesting Authors Blog","og_description":"It&#8217;s in the news again. Idiot phones are once again causing people to become victims of identity theft. They aren&#8217;t smart phones, they are phones [&hellip;]","og_url":"https:\/\/interestingauthors.com\/blog\/technology\/idiot-phones-pt-2\/","og_site_name":"Interesting Authors Blog","article_publisher":"https:\/\/www.facebook.com\/interestingauthors\/","article_published_time":"2016-08-08T15:09:05+00:00","article_modified_time":"2017-09-12T11:45:04+00:00","author":"Roland Hughes","twitter_card":"summary_large_image","twitter_creator":"@i_authors","twitter_site":"@i_authors","twitter_misc":{"Written by":"Roland Hughes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/interestingauthors.com\/blog\/technology\/idiot-phones-pt-2\/#article","isPartOf":{"@id":"https:\/\/interestingauthors.com\/blog\/technology\/idiot-phones-pt-2\/"},"author":{"name":"Roland Hughes","@id":"https:\/\/interestingauthors.com\/blog\/#\/schema\/person\/201fb4544222c3251b52ed4a386184ee"},"headline":"Idiot Phones &#8211; Pt 2.","datePublished":"2016-08-08T15:09:05+00:00","dateModified":"2017-09-12T11:45:04+00:00","mainEntityOfPage":{"@id":"https:\/\/interestingauthors.com\/blog\/technology\/idiot-phones-pt-2\/"},"wordCount":445,"commentCount":0,"publisher":{"@id":"https:\/\/interestingauthors.com\/blog\/#organization"},"keywords":["FTC","phone account hijacking"],"articleSection":["Experience","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/interestingauthors.com\/blog\/technology\/idiot-phones-pt-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/interestingauthors.com\/blog\/technology\/idiot-phones-pt-2\/","url":"https:\/\/interestingauthors.com\/blog\/technology\/idiot-phones-pt-2\/","name":"Idiot Phones - Pt 2. &#8211; Interesting Authors Blog","isPartOf":{"@id":"https:\/\/interestingauthors.com\/blog\/#website"},"datePublished":"2016-08-08T15:09:05+00:00","dateModified":"2017-09-12T11:45:04+00:00","breadcrumb":{"@id":"https:\/\/interestingauthors.com\/blog\/technology\/idiot-phones-pt-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/interestingauthors.com\/blog\/technology\/idiot-phones-pt-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/interestingauthors.com\/blog\/technology\/idiot-phones-pt-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/interestingauthors.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Idiot Phones &#8211; Pt 2."}]},{"@type":"WebSite","@id":"https:\/\/interestingauthors.com\/blog\/#website","url":"https:\/\/interestingauthors.com\/blog\/","name":"Interesting Authors Blog","description":"Thoughts and words from some interesting authors","publisher":{"@id":"https:\/\/interestingauthors.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/interestingauthors.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/interestingauthors.com\/blog\/#organization","name":"Interesting Authors","url":"https:\/\/interestingauthors.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/interestingauthors.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i2.wp.com\/interestingauthors.com\/blog\/wp-content\/uploads\/2019\/10\/iaLogo.jpg?fit=180%2C180&ssl=1","contentUrl":"https:\/\/i2.wp.com\/interestingauthors.com\/blog\/wp-content\/uploads\/2019\/10\/iaLogo.jpg?fit=180%2C180&ssl=1","width":180,"height":180,"caption":"Interesting Authors"},"image":{"@id":"https:\/\/interestingauthors.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/interestingauthors\/","https:\/\/x.com\/i_authors"]},{"@type":"Person","@id":"https:\/\/interestingauthors.com\/blog\/#\/schema\/person\/201fb4544222c3251b52ed4a386184ee","name":"Roland Hughes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ae9adac14079d84b909e635d7af986fe4568053af4fd9ff8d4109298c392493e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ae9adac14079d84b909e635d7af986fe4568053af4fd9ff8d4109298c392493e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae9adac14079d84b909e635d7af986fe4568053af4fd9ff8d4109298c392493e?s=96&d=mm&r=g","caption":"Roland Hughes"},"description":"Roland Hughes is the president of Logikal Solutions, a business applications consulting firm specializing in OpenVMS platforms and Qt on Linux. Hughes serves as a lead consultant with over two decades of experience using computers and operating systems. With a degree in Computer Information Systems, the author's experience is focused on systems across a variety of diverse industries including heavy equipment manufacturing, pharmaceuticals, stock exchanges, tax accounting, and hardware value-added resellers, to name a few. Working throughout these industries has strengthened the author's unique skill set and given him a broad perspective on the role and value of technology in industry.","sameAs":["http:\/\/interestingauthors.com"],"url":"https:\/\/interestingauthors.com\/blog\/author\/rolandlogikalsolutions-com\/"}]}},"_links":{"self":[{"href":"https:\/\/interestingauthors.com\/blog\/wp-json\/wp\/v2\/posts\/635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/interestingauthors.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/interestingauthors.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/interestingauthors.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/interestingauthors.com\/blog\/wp-json\/wp\/v2\/comments?post=635"}],"version-history":[{"count":0,"href":"https:\/\/interestingauthors.com\/blog\/wp-json\/wp\/v2\/posts\/635\/revisions"}],"wp:attachment":[{"href":"https:\/\/interestingauthors.com\/blog\/wp-json\/wp\/v2\/media?parent=635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/interestingauthors.com\/blog\/wp-json\/wp\/v2\/categories?post=635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/interestingauthors.com\/blog\/wp-json\/wp\/v2\/tags?post=635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}