I was a victim of ID theft this last week. Luckily, my credit card company (and their AI) were vigilant and phoned me on the weekend, and I was able to cancel the account before too much <financial> damage was done.

I am now still faced with the fact that this compromise throws all my personal system security in doubt. According to the 10 Immutable Laws of Computer Security:

Law #1: If a bad guy can persuade you to run his program on your computer, it's not your computer anymore

“It's an unfortunate fact of computer science: when a computer program runs, it will do what it's programmed to do, even if it's programmed to be harmful. When you choose to run a program, you are making a decision to turn over control of your computer to it. Once a program is running, it can do anything, up to the limits of what you yourself can do on the computer. It could monitor your keystrokes and send them to a website. It could open every document on the computer, and change the word "will" to "won't" in all of them. It could send rude emails to all your friends. It could install a virus. It could create a "back door" that lets someone remotely control your computer. It could dial up an ISP in Katmandu. Or it could just reformat your hard drive."

spogscreen: if you are reading this on any site other than, please come on over to the original post.  

So, now all my personal systems are untrusted. This means a weekend of rebuilding my home network and the PCs from original media to ensure integrity, restoring required backups of music and pictures (thanks WHS!) and working through the following checklist:

  • Contacting my financial institutions to ensure no accounts have been taken over or been created in my name without my knowledge. I get an average of 2 unsolicited “pre-approved” credit cards per week in the mail for example. If my bad guys have physical access to my recycling can – they can grab these and open accounts. I wouldn’t know for weeks. 

  • Change my Automated Teller Machine (ATM) card, account, and Personal Identification Number (PIN).

  • Contacting all creditors that the bad guys defrauded. For example, checking every online bill-payee – such as my long-distance telephone company.

  • Pre-emptive filling out the ID Theft Affidavit at to dispute new unauthorized accounts.

  • Contacting the fraud departments of the  three major credit bureaus at and place a Fraud Alert on my files. 

  • File a report with my local Police Department, so I have a copy in case any creditors require proof of the crime.

  • File a complaint FTC: Online at$.startup?Z_ORG_CODE=PU03

  • Contact my postal inspection service in case my bad guys has submitted a change-of-address form with the post office to redirect my mail, after sending in one of those “pre-approved” CCs:

  • Notifying the Social Security Administration at or and IRS at

Comments (1)

Skip to main content