Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Identities Stolen in Seconds
NY Times ^ | October 24, 2004 | TIMOTHY L. O'BRIEN

Posted on 10/23/2004 10:48:21 PM PDT by neverdem

PAUSING in the foyer of a comfortable suburban home two days before Halloween in 2002, Kevin Barrows, a special agent with the F.B.I., could not bring himself to open the front door. He and a team of agents had just spent several hours searching every room in the house, in New Rochelle, N.Y., but they were leaving empty-handed. Months of investigating had led Mr. Barrows to believe that someone was orchestrating a huge fraud from the house, yet he had not found a single scrap of evidence.

Still, something bothered him about the furniture in one of the bedrooms. It seemed oddly oversized. So he headed back upstairs for a second look, and his attention focused on an expansive canopy over the bed. When he pushed at the draping, he found that it was weighed down with files. They contained reams of confidential financial information about hundreds of individuals whose identities had been pilfered in an intricate scheme that illicitly netted more than $50 million.

Two years later, the New Rochelle home has emerged as a linchpin in what federal law enforcement authorities describe as the biggest case of identity theft ever uncovered in the United States. The scheme was essentially masterminded by just two people: Linus Baptiste, who lived in the house and had contacts with a sprawling ring of Nigerian street criminals, and Philip A. Cummings, his former brother-in-law, who worked as a help-desk clerk at a Long Island software company. At least 30,000 people nationwide were victimized, according to law enforcement authorities and court documents.

"In a lot of ways it could have been the perfect crime," Mr. Barrows, who now works as a private investigator, recalled in a recent interview. "The execution was seamless, and if they had been smart enough not to use a phone line that traced back to that house we probably never would have found them."

The Baptiste case and others like it are at the forefront of one of the fastest-growing white-collar crimes in the country. Identity theft involves the most intimate, the most stealthy and perhaps the most intrusive of frauds - the wholesale lifting of someone's financial persona to secure bank loans, credit cards and mortgages in that person's name. Even when the crimes are discovered early, it can take months, sometimes years, for innocent people to restore tattered credit histories. While most consumers usually do not have to pay for illicit purchases on their credit cards, they may be held liable in thefts involving other types of loans.

"Ultimately, victims don't have to pay debts incurred by another person, but that's not the point," said Bridget J. Thomas, a homemaker in Prairieville, La., who spent months repairing her credit history in 2002 after a thief appropriated her identity to snare about $65,000 in loans. "It's the sleepless nights, and the time, and the stress you have to go through to clean up your record that really hurts victims."

ANALYSTS say several factors have combined to make identity theft a particularly intractable crime: the growth of the Internet and digital finance, decades of expanding consumer credit worldwide, the hodgepodge nature of local and federal law enforcement, and the changing but often still inadequate regulations governing the credit industry.

Everyone is fair game. Thieves recently snatched the identity of a three-week-old infant in Bothell, Wash. And authorities say that the dead have been favorite targets of identity thieves for years. Nor is identity theft limited to people. A growing number of thieves now assume the false guise of entire companies, adopting a business's employer identification number to secure commercial loans, corporate leases or expensive office products, according to analysts, security specialists and law enforcement officials.

Schemes known as "phishing'' use e-mail messages to lure unwitting consumers to Web sites masquerading as home pages of trusted banks and credit card issuers, corporate security specialists say. Online visitors are then induced to reveal passwords as well as bank account, Social Security and credit card numbers.

The F.B.I. says that many identity thefts and cyberschemes that play out in the United States are hatched in Russia, Romania and West Africa and that the agency is trying to work with law enforcement officials in those places to stem the problem. A leading bank regulator, the Federal Deposit Insurance Corporation, warned in June that increased corporate outsourcing of call-center tasks and other jobs overseas had heightened the risk of identity theft.

Authorities have only recently grasped the full scope of the problem. It began to gain more attention a decade ago, prompting Congress in 1998 to make identity theft a federal crime and the Federal Trade Commission to set up a special victim assistance center a year later. Until a couple of years ago, analysts and federal authorities estimated the annual number of identity thefts to be in the hundreds of thousands. But in September 2003, the F.T.C. offered an eye-opening assessment of how widespread and damaging such crime might be.

In a report prepared by its consumer protection bureau, the F.T.C. said 27.3 million Americans had their identities stolen from April 1998 to April 2003 - with more than a third of them, or 9.9 million, victimized in the last 12 months of that period alone. The crimes ranged from the theft of a credit card number to more elaborate identity thefts used to secure loans. During those 12 months, the report said, businesses and financial institutions suffered about $48 billion in losses because of identity theft, and victimized consumers paid more than $5 billion in out-of-pocket expenses to regain their financial identities.

"The number of victims we were estimating in 2000 were 400,000 to 500,000 annually and by 2003 we were saying 750,000," said Linda Foley, executive director of the Identity Theft Resource Center, a nonprofit consumer advocacy group based in San Diego. "The business community said 'Oh, you are wrong; those numbers are wrong.' Well, we were wrong. The numbers were much higher."

Experts say identity theft has evolved from isolated examples, like Ms. Thomas's, to ever broader and more financially damaging cases, like the one investigated by Mr. Barrows, that involve the speedy theft and aggregation of hundreds or even thousands of identities. Many of the most vicious cases, say analysts, involve corporate insiders who hijack sensitive personal information from corporate databases in order to begin picking people's pockets.

"We're in the information database age, and insider theft has turned toward the theft of information, and specifically personal information, because with an assumed identity criminals can purchase goods and services at will using someone else's credit," said Judith Collins, an associate professor of criminal justice at Michigan State University and an expert on identity theft. "Increasingly, we're seeing cases where identities are stolen in the U.S. and then used elsewhere overseas."

Last year, Dr. Collins completed a study of more than 1,000 identity theft cases from 1999 to 2002, the results of which she plans to publish soon. She said the report would indicate that about 5 percent of the crimes examined were linked to known or suspected terrorists.

Law enforcement officials say they believe that members of the Irish Republican Army and terrorists involved in the foiled plot to bomb Los Angeles International Airport relied heavily on identity theft schemes to finance their operations. Operation Web Snare, a Justice Department investigation of cybercrimes that was begun last summer, found possible links between identity theft and terrorism financing, according to a government report on the investigation.

Dr. Collins said her study would highlight other important aspects of identity theft. For example, the study will show that corporate insiders set in motion about half of the identity theft cases examined. The F.T.C. has reached similar conclusions.

"Insiders are often targeted or corrupted by organized crime groups to provide information," said Joanna Crane, manager of the F.T.C.'s identity theft program. "You might see groups plant someone at a temp agency or janitorial agencies so they can steal files when they are contracted out to work for someone else."

Or, as the partnership of Mr. Baptiste and Mr. Cummings showed, cultivating a corrupt insider may be simply a family affair.

Mr. Burrows, the F.B.I. agent, said he had his first inkling of the scheme in early 2002, after the F.B.I. office in Detroit passed along a fraud case to his New York supervisors that the Detroit agents believed was unsolvable. A former lawyer and Wall Street analyst, Mr. Barrows had successfully investigated securities fraud, and his supervisors tapped him to investigate the matter. At the time, the authorities knew that about 15,000 people had been victimized, largely because someone had used corporate codes and passwords to access their credit histories from reporting agencies like Experian, Equifax and TransUnion.

"It didn't take a rocket scientist to discover that the weak link was somebody who had stolen confidential subscriber codes and passwords," Mr. Barrows said. "But the question of 'who' was much more difficult to answer."

Mr. Barrows joined forces with an assistant United States attorney in Manhattan. The pair began to focus on who would be in a position to get the codes. Several companies across the country, all of which were unaware of the problem, had had their codes stolen. The companies were diverse - including banks, auto dealerships and a hospital - but each used a software product made by a Long Island company, Teledata Communications of Hauppaugue. The software allowed companies to use personal computers to request and download credit histories from reporting agencies.

Mr. Barrows focused on Teledata employees as likely perpetrators. He looked almost exclusively at the company's help-desk representatives, knowing that those employees interacted with customers who provided confidential personal information like Social Security numbers. Mr. Barrows and an Equifax employee also began cross-referencing Teledata's telephone records with Equifax records to find instances when small auto dealerships ordered unusually large batches of credit histories. He said that phase of the investigation lasted four months and involved painstaking research akin to "looking for a needle in a haystack."

Luckily, Mr. Barrows and his Equifax colleague found their needle: a telephone number linked to Mr. Baptiste's home in New Rochelle.

AFTER Mr. Barrows discovered the credit files in the bedroom, he found a ledger detailing amounts paid and owed to Mr. Baptiste. Mr. Barrows also discovered a laptop computer hidden in the bedroom. It contained a document bearing the name of Mr. Baptiste's former brother-in-law, Mr. Cummings, who worked on Teledata's help desk.

According to court records and law enforcement officials, Mr. Baptiste approached Mr. Cummings in 2000 and offered to bribe him to download as many credit histories as possible, using appropriated corporate passwords and the Teledata software; at least 20 Nigerians in the Bronx and Brooklyn who were linked to Mr. Baptiste paid the pair $60 for each credit report acquired.

The Nigerians used the information to get credit cards in victims' names, the officials say. With the cards in hand, they went on shopping sprees at retail outlets like Home Depot, reselling their merchandise for cash to fencers for about half the purchase price charged to the cards. The identity thieves also used the pilfered information to deplete victims' bank accounts, change addresses on the accounts and take out loans.

All told, the Baptiste-Cummings ring stole identities from at least 30,000 people from 2000 to 2002, ringing up tens of millions of dollars in profits, according to law enforcement officials and court papers. While court papers describe Mr. Baptiste and Mr. Cummings as architects of the scheme, the United States attorney's office declined to comment on how the ring actually divided its loot.

Mr. Baptiste, Mr. Cummings and at least five other people were arrested shortly after Mr. Barrows searched the New Rochelle home. Mr. Baptiste and Mr. Cummings have pleaded guilty to fraud charges filed in federal court in Manhattan and await sentencing early next year. Their lawyers declined to comment on the charges, but Mr. Cummings, who appeared in federal court last month with an oxygen tube in his nose, is seeking a reduced sentence because he says his health is fragile. The United States attorney's office in Manhattan would not comment on whether other arrests were imminent.

"What everyone was horrified about in this case was how much damage could be done by one guy being in the right place at the right time," said Marcus Asner, one of the assistant United States attorneys prosecuting the Baptiste case.

William Nass, Teledata's president, said his company had screened Mr. Cummings carefully before hiring him and that his previous work record had included seven years at a major bank. Mr. Nass noted that Mr. Cummings worked for Teledata for just nine months beginning in June 1999 and that most of the crimes occurred after he left the company. While Teledata has since upgraded its products and procedures to defend against similar problems, Mr. Nass said that any company is vulnerable to crafty insiders.

Mr. Barrows agreed. "The hardest thing to battle is the insider because no matter what you do to try and prevent it, a corrupt insider will derail that," he said. He added that his case against Mr. Cummings and Mr. Baptiste "could really have gone unsolved except for fortuitous circumstances."

The fact that luck played such an important role in catching Mr. Cummings and Mr. Baptiste bothers critics of corporate and law enforcement efforts to battle identity theft. While they laud ambitious investigations and prosecutions like the Baptiste case, they note that such cases are rare.

"One of the key major problems is that prosecutors do not want to take on identity theft cases because they're so hard to prosecute," said Dr. Collins at Michigan State. "We're burdened with an elephant of a law enforcement bureaucracy nationwide that makes it difficult to prevent or even mitigate identity theft."

President Bush recently signed into law tougher punishments for identity theft, but some law enforcement officials say that hurdles remain. They say that smaller cases are sometimes ignored or delayed until they can be bundled into high-profile, high-impact prosecutions. "It's the simple reality of us trying to build that small case into something larger before I commit resources to it," said Dan Larkin, head of the F.B.I.'s Internet Crime Complaint Center. "For me to try to build that case I'm going to need to ratchet it up a little bit."

Mr. Larkin said that the F.B.I. has been pushing for the last few years for greater cooperation among the bureau and state and local law enforcement agencies, and that the F.B.I. now had an "excellent ability to plug into" local identity theft investigations when invited.

For many victims, securing a police report can be an onerous, sometimes endless process. Local police departments often do not issue reports for residents if the identity theft occurred elsewhere, and most states do not require the police to do so. Yet credit issuers and reporting agencies typically demand a police report before they take a victim's claims seriously, often leaving consumers at a loss when they try to repair sullied credit histories.

Last year, President Bush signed a law that expands consumer credit protections and also offers provisions making it simpler for consumers to resolve identity theft problems and protect their accounts. The new law, which does not take effect until Dec. 1, also aims to make it easier for consumers to get police reports when their identities have been stolen.

A survey released last year by Gartner Inc., a research firm specializing in information and technology issues, criticized banks, financial service firms and other pillars of the credit industry as not putting into effect more rigorous computer screening procedures to protect customer accounts. It also said that ineffective screening ultimately forced identity theft victims to bear most of the crime's social and economic costs.

"We've created a victim population that is self-blaming," said Ms. Foley of the Identity Theft Resource Center. "Most of these problems start with companies that are too loose with consumer and employee information."

Some victims, after enduring the slow torture of mending their credit histories, say they know exactly whom to blame. "My anger at my perpetrator quickly transferred to the credit-granting community itself," said Ms. Thomas, describing how her emotions shifted after her creditors largely ignored her efforts to overcome identity theft. "They don't care what this does to victims because they don't have to care."

BANKS and others in the credit industry disagree, saying that they see the war on identity theft as a top priority. Nessa Feddis, senior federal counsel at the American Bankers Association, says fraudulent credit card charges, have been declining as a percentage of overall charges. Ms. Feddis, who was able to resolve her own past identity theft problems by placing a call to the Secret Service, says banks are "doing a good job of educating their customers" about identity theft and "providing ways to assist them."

A spokesman for the Consumer Data Industry Association, the trade group representing credit reporting agencies, said consumers could put fraud alerts on their credit histories if they wanted to keep prying eyes at bay. Representatives of Visa and MasterCard, the two largest credit card associations in the country, say that they are guarding customer account numbers more carefully, for example, by deleting the numbers in mail and other documents delivered to customers' homes.

Sergio Pinon, the head of security and risk services at MasterCard, said that MasterCard was deploying computer systems that analyze the spending patterns of individual card users and pluck out anomalies in case a fraud is under way. Like Ms. Feddis, Mr. Pinon said that he was the victim of an identity thief, but that he stopped the fraud because his bank had quickly spotted an intrusion into his credit card account.

Both MasterCard and Visa also monitor Web sites that broker stolen credit card numbers and other personal information. "One of the things we've discovered is that your identity is worth about $10" on the Internet, said Linda Locke, a MasterCard spokeswoman.

With identities so cheap, experts say that criminals who want to mask themselves inside the envelope of someone else's financial world will continue to have ample opportunities to express themselves.

"The only limitation to identity theft is the creativity of the thief, and that's scary because there's really no limit on creativity, is there?" Ms. Foley said. "The tour guides on this crazy ride are the thieves, not us and not law enforcement, and as long as that continues it's going to be a problem."


TOPICS: Business/Economy; Crime/Corruption; Culture/Society; Foreign Affairs; Front Page News; Government; News/Current Events; Politics/Elections; US: California; US: Colorado; US: District of Columbia; US: Florida; US: Illinois; US: Indiana; US: Nevada; US: New Jersey; US: New York; US: Oregon; US: Texas; US: Washington; War on Terror
KEYWORDS: banking; banks; frauds; identitytheft; idtheft; privacy; racketeering; racketeers; rico; swindling

1 posted on 10/23/2004 10:48:22 PM PDT by neverdem
[ Post Reply | Private Reply | View Replies]

To: neverdem

bump


2 posted on 10/23/2004 10:50:56 PM PDT by sunshine state
[ Post Reply | Private Reply | To 1 | View Replies]

To: neverdem

Caveat emptor!

3 posted on 10/23/2004 10:53:52 PM PDT by neverdem (Xin loi min oi)
[ Post Reply | Private Reply | To 1 | View Replies]

To: neverdem

Caveat omnis!


4 posted on 10/23/2004 11:23:37 PM PDT by dr_lew
[ Post Reply | Private Reply | To 3 | View Replies]

To: neverdem

are we allowed to post such HUGE articles from the NY TIMES???


5 posted on 10/23/2004 11:24:33 PM PDT by GeronL (FREE KERRY'S SCARY bumper sticker .......... http://www.kerrysscary.com/bumper_sticker.php)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GeronL
are we allowed to post such HUGE articles from the NY TIMES???

Yes Sir, the NY Times were not part of the WaPo & LA Times settlement.

6 posted on 10/23/2004 11:37:45 PM PDT by neverdem (Xin loi min oi)
[ Post Reply | Private Reply | To 5 | View Replies]

To: neverdem

Okeeee dokeee


7 posted on 10/23/2004 11:46:18 PM PDT by GeronL (FREE KERRY'S SCARY bumper sticker .......... http://www.kerrysscary.com/bumper_sticker.php)
[ Post Reply | Private Reply | To 6 | View Replies]

To: neverdem
Terrorists gathered credit info from card readers while working as waiters in a restaurant. Not very hard to do. What is in a database is there until it is purged. Do you think Choicepoint is destroying data? No, it is selling it.
8 posted on 10/24/2004 1:46:23 AM PDT by endthematrix (Bad news is good news for the Kerry campaign!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: neverdem
Now we'll hear from all those who are going to blame the victims.

"If you can't keep your records safe, don't use the internet." "If they fall for these scams, they deserve what they get."

It alway appears on these threads.

9 posted on 10/24/2004 4:57:53 AM PDT by raybbr
[ Post Reply | Private Reply | To 1 | View Replies]

To: neverdem

The one benifit of being poor – a scammer would pay more for my information than could ever be recouped.


10 posted on 10/24/2004 5:06:25 AM PDT by R. Scott (Humanity i love you because when you're hard up you pawn your Intelligence to buy a drink.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: neverdem

I used to work as a temporary employee at a title agency in Uniondale. I saw the credit reports of very very wealthy people. It's unbelievable what people can steal. I'm sure that's why that company stopped using temp workers.


11 posted on 10/24/2004 5:09:42 AM PDT by cyborg (http://mentalmumblings.blogspot.com/)
[ Post Reply | Private Reply | To 3 | View Replies]

To: neverdem; Howlin; Liz; ALOHA RONNIE; RonDog; Mudboy Slim
"The number of victims we were estimating in 2000 were 400,000 to 500,000 annually and by 2003 we were saying 750,000," said Linda Foley, executive director of the Identity Theft Resource Center, a nonprofit consumer advocacy group based in San Diego. "The business community said 'Oh, you are wrong; those numbers are wrong.' Well, we were wrong. The numbers were much higher."

Maybe this is where Jesse Jackson gets the 'one million disenfranchised' number...

12 posted on 10/24/2004 5:12:54 AM PDT by Libloather (NONE of Effin' Kerry's policies pass the Global Smell Test...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: neverdem

Kevin Barrows

Kevin Barrows is Vice President, Deputy General Counsel at Stroz Friedberg, LLC and is responsible for supervising computer forensic, electronic discovery, anti-piracy, and computer crime and abuse assignments. Mr. Barrows also conducts traditional corporate fraud investigations and due diligence efforts.

From 1997 to 2003, Mr. Barrows was a Special Agent with the FBI, New York Division, assigned to investigate white collar crime. During his six years as an FBI Agent, Mr. Barrows directed major investigations involving financial institution fraud, identity theft and international money laundering, which required intensive document analysis and in-depth interviews of persons with relevant knowledge to uncover complex illegal schemes. Mr. Barrows also investigated numerous securities fraud cases involving insider trading, broker bribery, market manipulation and Internet-based touting. Mr. Barrows was the lead case agent coordinating a multi-jurisdictional, multi-agency case that culminated in the arrest of 120 individuals, including members of an organized crime family, on stock fraud, racketeering and money laundering charges. For his role in this case, Mr. Barrows received the Department of Justice’s Director’s Award for Outstanding Contributions in Law Enforcement. He was also the lead case agent in the investigation and criminal prosecution of a group of individuals who stole 30,000 identities through the unauthorized computer-based accessing of personal credit information. He has testified on many occasions in trials and before grand juries in Federal court.

Mr. Barrows has lectured at the FBI Academy in Quantico, Virginia and at FBI headquarters in New York on interviewing and other investigatory techniques, including the analysis of complex financial transactions and records.

Prior to joining the FBI, Mr. Barrows was an associate at the New Jersey law firm of Dwyer, Connell & Lisbona, where he participated in all aspects of litigation in products liability and insurance cases. Mr. Barrows worked as an analyst at Salomon Brothers before attending law school at Seton Hall University School of Law.


13 posted on 10/24/2004 5:24:10 AM PDT by B4Ranch (´´Firearms are second only to the Constitution in importance; They are our teeth for Liberty)
[ Post Reply | Private Reply | To 1 | View Replies]

To: neverdem

Thank you for posting this excellent article; it's given me some ideas for dealing with a recurring ID theft problem.


14 posted on 10/24/2004 5:39:12 AM PDT by Alia
[ Post Reply | Private Reply | To 1 | View Replies]

To: neverdem
BANKS and others in the credit industry disagree, saying that they see the war on identity theft as a top priority.

Friends of mine who are police officers have complained about how difficult it is to get Credit Card companies to show an interest in prosecuting Credit Card fraud. As they understand it, the banks that back the Credit Cards are insured, and seem little interested in going through with a court case when they can just file for reimbursement.

15 posted on 10/24/2004 6:37:51 AM PDT by lepton ("It is useless to attempt to reason a man out of a thing he was never reasoned into"--Jonathan Swift)
[ Post Reply | Private Reply | To 1 | View Replies]

To: neverdem
... knowing that those employees interacted with customers who provided confidential personal information like Social Security numbers.

There's part of the problem. Social Security numbers are not "confidential." (We tell students never to use their SSN as a password—the number is too easy to get.) The SSN was never intended for routine identification, but is now used that way.

I can just imagine the mess when everyone is required to carry a federal identification card.
16 posted on 10/24/2004 6:40:20 AM PDT by Logophile
[ Post Reply | Private Reply | To 1 | View Replies]

To: wardaddy; Joe Brower; Cannoneer No. 4; Criminal Number 18F; Dan from Michigan; Eaker; King Prout; ..

From time to time, I’ll post or ping on noteworthy articles about politics, foreign and military affairs. FReepmail me if you want on or off my list.

This is more about crime, technology and government, but since almost 1500 FReepers looked at this overnight, I thought you might appreciate it.


17 posted on 10/24/2004 7:07:40 AM PDT by neverdem (Xin loi min oi)
[ Post Reply | Private Reply | To 1 | View Replies]

To: neverdem
Thank you for this post, neverdem. "I don't get out much," but personally know two people who have been ID theft victims.
18 posted on 10/24/2004 7:55:29 AM PDT by hummingbird ("If it wasn't for the insomnia, I could have gotten some sleep!")
[ Post Reply | Private Reply | To 1 | View Replies]

To: raybbr
Now we'll hear from all those who are going to blame the victims. "If you can't keep your records safe, don't use the internet." "If they fall for these scams, they deserve what they get."

That's the attitude of those suggesting a National ID card too. (One of the ID supporters did claim that a level of security equal to that of credit cards would be fine.)

19 posted on 10/24/2004 7:58:42 AM PDT by Doctor Stochastic (Vegetabilisch = chaotisch is der Charakter der Modernen. - Friedrich Schlegel)
[ Post Reply | Private Reply | To 9 | View Replies]

To: neverdem

Heh. A perfect fit for an article I'm writing. Thanks, ND.


20 posted on 10/24/2004 8:21:09 AM PDT by Criminal Number 18F
[ Post Reply | Private Reply | To 17 | View Replies]

To: neverdem

Very good article. I guess I'm glad I'm broke.


21 posted on 10/24/2004 10:28:34 AM PDT by TheSpottedOwl ("In the Kingdom of the Deluded, the Most Outrageous Liar is King".)
[ Post Reply | Private Reply | To 1 | View Replies]

To: neverdem

Thanks for the post/ping. Interesting.


22 posted on 10/25/2004 5:39:27 AM PDT by PGalt
[ Post Reply | Private Reply | To 1 | View Replies]

To: TheSpottedOwl

Me too! Phew I'm in the clear :o)


23 posted on 10/25/2004 5:40:06 AM PDT by cyborg (http://mentalmumblings.blogspot.com/)
[ Post Reply | Private Reply | To 21 | View Replies]

To: neverdem
BTTT
24 posted on 10/25/2004 5:23:56 PM PDT by vox_freedom (Vote W, and then vote again!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Criminal Number 18F
Here's the URL and new title. At least, I believe they gave the article a new title. The first paragraph looks the same.

Identity Theft Is Epidemic. Can It Be Stopped?

http://www.nytimes.com/2004/10/24/business/yourmoney/24theft.html?oref=login

25 posted on 10/25/2004 6:53:24 PM PDT by neverdem (Xin loi min oi)
[ Post Reply | Private Reply | To 20 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson