{"id":919,"date":"2010-10-27T05:52:13","date_gmt":"2010-10-27T09:52:13","guid":{"rendered":"http:\/\/joeclarksblog.wordpress.com\/?p=919"},"modified":"2010-10-27T05:52:13","modified_gmt":"2010-10-27T09:52:13","slug":"21st-century-thievery-%e2%80%93-part-one","status":"publish","type":"post","link":"https:\/\/joeclarksblog.com\/?p=919","title":{"rendered":"21st Century Thievery \u2013 Part One"},"content":{"rendered":"<p>Thieves have been a part of life since Biblical times and there appears to be little we can do about it.\u00a0 When a friend or relative becomes the victim of crime, we help them the best we can, give thanks it did not happen to us, and try get on with our lives.\u00a0 Keep in mind there are proactive measures you can take to minimize the possibilities of being a victim.<\/p>\n<p>Unfortunately, for some victims of crime, it is difficult to get back to normal lives.\u00a0 This is especially so if the crime was heinous or of a severe financial nature.\u00a0 This is even more so when the victim of a financial crime is unaware the theft even took place.<\/p>\n<p>In today\u2019s society, criminals have discovered how to steal identities of innocent victims.\u00a0 Thieves have always been a problem, but in the past, victims were immediately aware of the crime.\u00a0 In other words, for a thief to carry out their illicit plans, they had to get up close and personal with their mark.\u00a0<\/p>\n<p>Today, the story has changed; the injured party may not know of the crime for months.\u00a0 Modern day robbers discovered how to use computers as a way to steal from their victims.\u00a0 They can now ply their trade without the threat of confrontation.\u00a0 Thievery by use of the information highway has become a multi-million dollar problem for people in the United States as well as in other countries.<\/p>\n<p>Thieves discovered that as with most tools, the computer allows them to be more efficient at doing what they do.\u00a0 This new type of offense known as identity theft, poses little risk to the robber as he or she carries out the crime.<\/p>\n<p>Identity theft is a 21<sup>st<\/sup> century crime.\u00a0 With widespread use of the Internet and high speed connections, stealing from the unwary has never been easier.\u00a0 Likewise, for those in the know, protecting yourself from computer and identity theft is almost as easy.\u00a0<\/p>\n<p>There is an old joke about two hikers surprised in the woods by a bear.\u00a0 One hiker takes off running and the other sits down to change quickly into his Nike running shoes.\u00a0 The first says to his partner he cannot possibly outrun the bear.\u00a0 To which the second hiker responds, \u201cI don\u2019t have to outrun the bear.\u00a0 All I have to do is outrun you.\u201d<\/p>\n<p>In cyberspace, the principle is the same.\u00a0 The harder you make it for a criminal to access your information, the more likely he or she is going to go after someone else.\u00a0\u00a0 All you have to do is \u201coutrun\u201d the others.\u00a0<\/p>\n<p>The trick is to know what you have to do to make yourself a more difficult target for the thieves.<\/p>\n<p style=\"text-align:center;\">-30-<\/p>\n<p><em>\u00a9 2010 J. Clark<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thieves have been a part of life since Biblical times and there appears to be little we can do about it.\u00a0 When a friend or relative becomes the victim of crime, we help them the best we can, give thanks &hellip; <a href=\"https:\/\/joeclarksblog.com\/?p=919\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[8],"tags":[73,965,966,1033,1078,1402,1913,2406,2584,2919,3361,3721,3953,4171],"class_list":["post-919","post","type-post","status-publish","format-standard","hentry","category-life-in-general","tag-21st-century-thievery","tag-computer-theft","tag-computers","tag-criminals","tag-cyberspace","tag-financial-crime","tag-identity-theft","tag-modern-day-robbers","tag-normal-lives","tag-protecting-yourself","tag-steal-identities","tag-the-internet","tag-thieves","tag-victims-of-crime"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/joeclarksblog.com\/index.php?rest_route=\/wp\/v2\/posts\/919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/joeclarksblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/joeclarksblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/joeclarksblog.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/joeclarksblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=919"}],"version-history":[{"count":0,"href":"https:\/\/joeclarksblog.com\/index.php?rest_route=\/wp\/v2\/posts\/919\/revisions"}],"wp:attachment":[{"href":"https:\/\/joeclarksblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/joeclarksblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/joeclarksblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}