back to index

RPF0482-Equifax_Breach


Whisper Transcript | Transcript Only Page

00:00:00.000 | Hey Cricket customers, Max with Ads is included with your Cricket $60 unlimited plan at no additional cost.
00:00:06.000 | "Sikes!"
00:00:07.000 | Max is the streaming platform where you can watch Scoob, Meg 2 The Trench, The Nightmare on Elm Street Collection, and so much more.
00:00:13.000 | "Remember me."
00:00:14.000 | Just log in with your Cricket username and password to experience Max on all your favorite devices.
00:00:19.000 | "We never seen this before."
00:00:20.000 | Max, the one to watch for a good scream with Cricket.
00:00:23.000 | "Yeah!"
00:00:24.000 | Phone plan, streams, and standard definition. Programming subject to change. Fees, terms, and restrictions apply.
00:00:28.000 | See cricketwireless.com for details.
00:00:30.000 | Today on Radical Personal Finance, I am preempting the normal Friday Q&A show in order to talk about the recent awful Equifax data breach.
00:00:41.000 | [Intro music]
00:00:57.000 | Welcome to Radical Personal Finance, the show dedicated to providing you with the knowledge, skills, insight, and encouragement you need to live a rich and meaningful life now while building a plan for financial freedom in 10 years or less.
00:01:08.000 | Today we need to talk about risk management, part of that avoid catastrophe component of the Radical Personal Finance, personal finance rubric.
00:01:16.000 | Equifax has released your public data to hackers and we need to talk about what you can or should do about it.
00:01:24.000 | [Intro music]
00:01:30.000 | This week, actually last week, going on just over a week ago, Equifax came out and released the information that they had been hacked and a very serious hack.
00:01:39.000 | They talked about the fact that almost 150 million people have had their personal data stolen from Equifax servers depending on the account, about 200,000 people's specific credit card numbers, and the data that has been released is extremely damaging.
00:01:56.000 | The data that's been released is very damaging because it includes not only your social security number but your name, your date of birth, your social security number, your address, your driver's license, etc.
00:02:10.000 | This is probably the most damaging hack – sorry, the most damaging public data release of really almost any data.
00:02:21.000 | That's saying something. It's not necessarily the biggest. As of the moment, Equifax claims that the personal records of 143 million users in the United States, Canada, and I believe England primarily have been released.
00:02:35.000 | So 143 million, that's not the biggest data breach. There was a few years ago a Yahoo data breach of about 500 million people's personal information and another one – I can't remember the exact number – a couple hundred million.
00:02:48.000 | Really damaging a couple years ago, the United States Office of Personnel Management released the records of over 200,000 US service personnel who had had security classification clearances with the US government.
00:03:02.000 | They released all of that information through two hackers. But this particular hack is staggering with regards to its scale, the 143 million, and the depth of the information that has been released.
00:03:17.000 | Now specific information is still hard to find. Equifax waited about five weeks between the time that they discovered the hack and the time that they issued the press release on it.
00:03:30.000 | So there is a significant amount of time that's elapsed there. That has been a cause for scandal among those who pay attention to these areas.
00:03:40.000 | There have been other causes for scandal as well. For example, three Equifax employees sold just under $2 million worth of stock after finding out about the – or excuse me, after the hack was disclosed.
00:03:53.000 | Now of course, Equifax states that they weren't aware of the hack. They weren't aware of the breach. That is for any of us who have ever worked in a company and know how fast bad news travels in any company, in just the informal grapevine.
00:04:10.000 | That is very hard for any of us to believe. But who knows? If it was insider training, they were acting on nonpublic information. I'm sure they'll be pursued.
00:04:19.000 | There was certainly a major outrage over that. The response by Equifax has so far been awful, absolutely awful.
00:04:29.000 | There's just been – it seems as though they've done almost nothing. Well, let me rephrase.
00:04:34.000 | I watched the apology video by the CEO of Equifax that they posted on their website called Equifax Security 2017.
00:04:44.000 | I guess the only good thing I could say is that the CEO in that process looked sincere as he read from his teleprompter and he looked sincere.
00:04:53.000 | I know nothing about this particular CEO. Times like this are when CEOs earn their money. They face a very difficult job where they're on the head – tip of the spear.
00:05:06.000 | They need to take responsibility for the actions of thousands and thousands of employees in their company.
00:05:10.000 | But at least you could say that his apology video seemed sincere. But basically almost every other aspect of their response has been amateurish at best.
00:05:20.000 | The website that they published in order for people to go and use to check to see if they were impacted, of course, rather euphemistically named Equifax Security 2017 – excuse me.
00:05:32.000 | Equifax Security 2017 seems to have been just a complete – a completely bungled approach.
00:05:40.000 | The technical people who analyze such things talk about the fact when it was published, it was just a basic WordPress site that didn't have the TLS certificates properly configured.
00:05:50.000 | It wasn't registered in the domain registration to Equifax. They published information as far as usernames that were just a nightmare.
00:05:59.000 | Just this morning, I saw an article that the Equifax breach – sorry, the Equifax website in Argentina had access credentials that were lined up for an employee site that were in the – username was admin and the password was admin.
00:06:14.000 | Just complete lack of decent standards. It's not only Equifax that faces this problem. Many large companies face this problem.
00:06:23.000 | So I want to be careful not to be too hard, but they certainly deserve to be kicked around a little bit at this point in time.
00:06:31.000 | Just the way they've handled things. I am so sick and tired of the way these companies handle these data breaches.
00:06:38.000 | I've been involved and my accounts have been involved in a number of them over the past few years.
00:06:43.000 | And basically the standard rigmarole is a company trots out and says, "Oh, we're so sorry about this data breach."
00:06:49.000 | And then they offer you a free year of credit monitoring nonsense and that's what Equifax did, which is just absolutely absurd.
00:06:56.000 | They come out and say, "Oh, we're going to offer you a free year of credit monitoring," when the reality is you can get free credit monitoring from just about anywhere.
00:07:03.000 | Almost anyone would give you a year of free credit monitoring as an introductory service.
00:07:07.000 | And what's most ironic is I think there are good indications to say that the Equifax – some of the Equifax data that was released seems to be the credit card numbers of people who were enrolled in Equifax's security monitoring, which is just one of the most ironic things possible.
00:07:27.000 | Now, I'm painting with broad strokes. All of the statements that I have made thus far have been reported in reliable and semi-reliable news channels.
00:07:35.000 | But it's so early in the actual data that it's very possible that some of these things will turn out to be wrong.
00:07:43.000 | I have increasingly convinced that you can trust almost no reporting from anybody, no matter how well-intentioned, on any subject for months.
00:07:53.000 | At the very least, years better.
00:07:55.000 | So we need to take all this with a grain of salt.
00:07:58.000 | I have a story that has just broken in the last week, and again, I'm behind because of being out with dealing with Hurricane Irma.
00:08:06.000 | I'm behind in reporting it to you.
00:08:08.000 | So this has been a huge story, and it is a nightmare.
00:08:10.000 | It's a nightmare scenario.
00:08:12.000 | It's a nightmare scenario that you are affected by.
00:08:16.000 | Now, you say, "Joshua, why do you speak so confidently that I'm affected by it?
00:08:19.000 | How do I know if I'm one of the 143 million people?"
00:08:21.000 | Well, that's a good question.
00:08:23.000 | What you are supposed to do, according to Equifax, is to go to a website called EquifaxSecurity2017.com.
00:08:31.000 | This is the website that Equifax has established to be their go-to website where people are supposed to go through and see about what the solutions are.
00:08:42.000 | It's called the Cybersecurity Incident and Important Consumer Information.
00:08:45.000 | You can go and see. It's a simple blog site that's been set up, and you can see some of the things that have been established by Equifax.
00:08:55.000 | Again, that's where their little apology video is and all of their instructions.
00:08:58.000 | They have some information because as they published this, there was a severe reaction from the marketplace, as there should be, about even some of the things that Equifax was doing.
00:09:08.000 | When Equifax originally – and consumers being able to go and sign up for that free year of credit protection monitoring, blah, blah, blah, that Equifax is offering –
00:09:20.000 | there was language in that contract that indicated that if you joined the service, that you were waiving your rights to sue Equifax for damages as a result of the claim.
00:09:32.000 | You were waiving your rights to sue them as part of a class action lawsuit as a result of the claim.
00:09:39.000 | You would, in theory, have the right to sue them individually but not as a result of the class action lawsuit.
00:09:44.000 | Well, who knows whether it was a mistake that it was in there or whether they just got caught trying to be greedy and get people to sign up for terms of service and stuff that nobody ever reads in the fine print.
00:09:53.000 | But at least they backpedaled on that.
00:09:55.000 | They wound up saying, "No, this doesn't actually mean what it says," and they backpedaled still more.
00:09:59.000 | And they said, "Well, we're actually –" said, "Well, we're –" That's what happens when you lose your train of thought when trying to record a podcast and your children come and interrupt me.
00:10:16.000 | The trials of a home broadcast studio.
00:10:18.000 | That's what happens.
00:10:19.000 | They got found out and they said, "No, we're not actually saying you have to waive your rights."
00:10:23.000 | And finally, the language was evidently completely stricken from the contract information.
00:10:29.000 | But back to the why do I say you're affected.
00:10:32.000 | This website in theory is supposed to see if you have been impacted.
00:10:36.000 | There's a little button on the website that you can look to say potential impact and you can go and you can look to see if your personal information is potentially impacted.
00:10:44.000 | You can check potential impact by putting in your last name and the last six digits of your social security number into website.
00:10:51.000 | Now, this is a very questionable thing.
00:10:54.000 | Again, the website was not well done and you're giving away your last name and the six digits of your social security number to a website where the security certificates at least initially were not adequately protected.
00:11:06.000 | And then it tells you either, yes, you have been impacted or no, you haven't been impacted.
00:11:10.000 | But I have come to disbelieve the results even of that test based upon hearing and learning the results where people have been able to put out information where they put in random names.
00:11:23.000 | Somebody put in Trump as the last name and 1, 2, 3, 4, 5, 6 to be the last six digits of the social security number and it spat out that, yes, you have been affected.
00:11:32.000 | So I now disbelieve and find the information that has been put out by this particular website incredulous.
00:11:41.000 | I am incredulous of it.
00:11:43.000 | I find it incredible or uncredible.
00:11:46.000 | And so I think it's best that you assume that your information is affected whether or not the Equifax website says that it has been.
00:11:57.000 | Even if the number that they claim is accurate and I am doubtful, I'd be happy to be proven wrong, but I'm doubtful that's the number.
00:12:04.000 | I don't know how they – and they haven't released details on how they came up with these numbers and what – they haven't released details on what specific data has been disclosed.
00:12:14.000 | They have been very non-forthcoming with information.
00:12:18.000 | There have been a couple of things that they're starting to release.
00:12:22.000 | But so far, I think there's good reason to doubt just about anything that they say probably because they don't know, not necessarily ascribing malicious intent or indicating that they're trying to intentionally lie.
00:12:39.000 | I don't have any evidence of that.
00:12:41.000 | So I wouldn't want to allege something like that.
00:12:43.000 | But it's likely that everybody there is just scrambling, got caught with their pants down and has no idea what to do and how to improve the situation.
00:12:51.000 | So they're doing the best they can, but they're just probably utterly overwhelmed.
00:12:55.000 | In a situation like this, I'm no data security expert.
00:12:58.000 | I don't even know how you would accurately verify the exact numbers of things that were affected.
00:13:04.000 | It takes a while to find a hack and then how do you know that you've actually found all of the files and the servers that were accessed?
00:13:11.000 | And then you do a count on the records of those servers.
00:13:14.000 | So I'm sure they're doing their best to try to give accurate information, but I don't see any reason why you or I should take comfort in or believe that it is fully accurate information.
00:13:26.000 | The investigations will continue on and time will tell.
00:13:31.000 | So I hope this gives you enough information to at least get a sense of it, a sense of what's going on.
00:13:37.000 | I'm giving very broad overviews.
00:13:40.000 | You can follow the news yourself and search out some of these details.
00:13:43.000 | I've published a few articles on my Twitter feed, twitter.com/JoshuaSheets, if you are interested in looking at some of those articles.
00:13:50.000 | So what do you do?
00:13:52.000 | Well, I'll tell you that in just a moment, but I'll just share my personal frustration.
00:13:57.000 | I find the whole thing frustrating because – and I'm sure many of you do, so perhaps you'll just indulge me to speak for you.
00:14:03.000 | I find the whole thing deeply frustrating because I find the whole system of information, the way the information is sold, deeply frustrating.
00:14:13.000 | Now, I want to be careful because there are certain good things that we can trace that have come out of the modern credit reporting and information reporting systems.
00:14:25.000 | Probably the biggest thing is that due to the availability of credit reporting agencies and the work that they do, it's brought about a modern economy in which people that have no personal acquaintance, people which have no personal relationship can do business effectively together.
00:14:41.000 | By having somebody's profile, having their financial history, it allows a company, a credit card company that doesn't know you personally to lend money.
00:14:53.000 | And our entire economy runs on this.
00:14:57.000 | If these reporting agencies were to go away, our – it's not an exaggeration to say our economy would collapse.
00:15:06.000 | We live in a debt-fueled economy wherein almost everything is done based upon this number, based upon your credit score, your FICO score, based upon the information that's in these credit reports.
00:15:18.000 | We buy houses with money we don't have that comes from a mortgage company that investigates our credit report to assure the lender that we are a reliable payer.
00:15:29.000 | We buy cars with money we don't have for the same reason.
00:15:32.000 | We go out to eat and buy presents for our friends with money that we don't have that we use credit cards on.
00:15:38.000 | And at different times in the economic cycles, these numbers and these borrowed amounts increase and decrease.
00:15:45.000 | But all of this fuels our economy.
00:15:47.000 | Our economy is hugely fueled by debt.
00:15:49.000 | Our government runs itself with money it doesn't have by thinking that somehow it's going to be able to extract higher amounts of taxation from our children and grandchildren.
00:15:59.000 | It's all a giant – to be charitable, it's all a giant Ponzi scheme and nobody has any idea how it will work out in the long run.
00:16:08.000 | Individual people will have to face the consequences of actions.
00:16:13.000 | Speaking broadly, we live in a brave new world in which nobody knows how this will eventually end.
00:16:18.000 | Some people will argue that, yes, there are significant problems, but there may be possible escape routes.
00:16:24.000 | And other people will argue and say, well, there are no escape routes and we're doomed for significant problems.
00:16:31.000 | But almost nobody will publicly argue with a straight face that everything is fine and we're doing a great job.
00:16:37.000 | Well, the credit reporting agencies are at the center of this.
00:16:40.000 | And so if there were to be significant changes by the credit reporting agencies, there would be a massive immediate effect on our broader economy.
00:16:47.000 | So that is the good that credit reporting agencies do.
00:16:51.000 | I feel deeply frustrated with them because I don't want to be involved.
00:16:55.000 | I don't want to be involved anymore.
00:16:57.000 | And I've often struggled with how much to be concerned about the information that is gathered.
00:17:04.000 | I've often struggled with where is that line between appropriate caution and prudence and that line between caution and prudence and inappropriate paranoia.
00:17:16.000 | It's very easy to move to an inappropriate level of paranoia.
00:17:21.000 | And I've often questioned that.
00:17:23.000 | But the reality is we live in a brave new world.
00:17:25.000 | We live in a world where the information that is available about you and me, the information that is being aggregated by almost every company we do business with is available.
00:17:41.000 | Whether through so-called ethical and honest means or unethical and dishonest means, who knows?
00:17:48.000 | That information is available to anyone else in the world.
00:17:51.000 | That is fundamentally new.
00:17:54.000 | Solomon said there's nothing new under the sun.
00:17:57.000 | Well, I think there's probably ways to apply that.
00:18:00.000 | But I think this is something that's new under the sun.
00:18:04.000 | Never before in the history of the world has there ever been a way in which someone on the other side of the world could find out every single detail about your life or my life through a computer screen at a cost, a financial cost of almost zero.
00:18:24.000 | And really the only cost is the time.
00:18:26.000 | Now, to your and my shame, we publish most of the information freely available for other people to find.
00:18:37.000 | Here would be a simple example.
00:18:39.000 | You and I pull out our iPhone and snap a little picture of the dish that we've just pulled out of the oven.
00:18:47.000 | We made an apple pie and our lattice work on the top of that apple pie was particularly impressive.
00:18:52.000 | So we pull out our camera and we snap a little picture and we crop it square and we adjust the color a little bit and then we click publish right to our Instagram account.
00:19:00.000 | Well, that picture has metadata that's associated with it.
00:19:05.000 | And if you are proficient with the appropriate programs, you can grab that picture right off of Facebook, right off of Instagram.
00:19:13.000 | Actually, most of the time we tag ourselves in it so it properly appears right on the Instagram map or we check in at Shea Sheets or wherever, Shea, your house.
00:19:23.000 | And we check ourselves right in where we are.
00:19:26.000 | So it's right there publicly available.
00:19:28.000 | Anyway, you just grab the metadata from there and the XF data from that picture will disclose the exact GPS coordinates of where that picture was taken.
00:19:36.000 | And then we publish that information.
00:19:38.000 | Well, it doesn't take somebody brilliant to go and just grab that right off of the picture.
00:19:42.000 | Now, you can cleanse that data from your picture and you should.
00:19:46.000 | You should never post a picture online that you have not wiped the metadata from.
00:19:50.000 | There are apps that are freely available on your phone.
00:19:53.000 | There are apps that are freely available for your computer.
00:19:56.000 | And so you should never publish a picture online that doesn't have that metadata wiped from it.
00:20:02.000 | But of course you do.
00:20:04.000 | And of course I do because that's what we all do.
00:20:07.000 | We don't think twice about it.
00:20:09.000 | And it really in many ways doesn't matter whether you do or don't do because it's even worse.
00:20:14.000 | You might carefully scrub all the metadata from any picture that you post online.
00:20:19.000 | And yet your buddy comes over, snaps a picture with their iPhone, and they publish and they tag you.
00:20:25.000 | And now that picture is online.
00:20:28.000 | And that's just the simple obvious example.
00:20:31.000 | It goes deeper and deeper and deeper.
00:20:33.000 | I just was looking at Kim Jong-un fired off another nuclear missile this last week.
00:20:38.000 | There's an analyst that published right on Twitter right where he was standing,
00:20:42.000 | even though the North Korean government took great pains to try to conceal the location.
00:20:46.000 | But they grabbed a couple pieces of data from – one piece of data from a picture,
00:20:51.000 | and they showed how this was probably a caution sign that was on a tunnel.
00:20:56.000 | And then they grabbed the profile of the road that it was on and analyzed that profile to get a position.
00:21:05.000 | And then they used – this particular North Korea analyst then used a YouTube video that was shot by a Japanese or Chinese tourist
00:21:13.000 | who was touring North Korea and had been published to YouTube to establish the appropriate distances
00:21:19.000 | and focused in – and published this publicly on Twitter – focused in and demonstrated right where Kim Jong-un was standing for that missile launch,
00:21:29.000 | even though the North Korean government had tried to conceal the information.
00:21:33.000 | So in many ways, you're kind of doomed no matter how hard you try.
00:21:37.000 | But that's just an example of the information that's out there.
00:21:40.000 | Now, you pull this together with credit information,
00:21:43.000 | and the credit information contains almost everything that you do with your life.
00:21:49.000 | Your credit file contains the whole and complete picture of your life.
00:21:53.000 | It contains your address, your current address.
00:21:55.000 | It contains the address of every address that you've lived throughout your adult lifetime.
00:22:00.000 | You may be fortunate enough that one or two of your childhood addresses is not there, but all the rest of them are right there.
00:22:06.000 | It contains the information of every single person – sorry, every financial account that you've had or that you have.
00:22:13.000 | All of that financial account and information contains all of the data from every one of your spending transactions.
00:22:20.000 | Think what picture I could put together with that information.
00:22:25.000 | And there are lots of people who can gain access to it.
00:22:28.000 | And we're not even necessarily talking about state actors here.
00:22:31.000 | When you start compiling that information, the financial information, with the information that a state actor or a very high-level, very competent non-state actor has,
00:22:44.000 | the National Security Agency from the United States records every single one of your phone calls.
00:22:49.000 | They log every single one of your text messages.
00:22:52.000 | All your phone calls and your text messages are scanned for keywords like "jihad" and "bomb" and "terrorist."
00:22:58.000 | Hey, good for you. I just set off the NSA on you by saying those words.
00:23:02.000 | All of that information is carefully archived in mass data centers.
00:23:06.000 | All of your emails are carefully archived and scraped.
00:23:10.000 | Of course, Google is scraping them to sell you stuff, but then those emails are still stored and available for other people to go through.
00:23:17.000 | And there sure doesn't seem to be any change on the horizon.
00:23:22.000 | After all, the new Apple iPhone X will carefully map the contours of your face and store that face print.
00:23:30.000 | Never mind the fact that Facebook already has a perfect face print on you that is superior to almost anything that state-level actors have.
00:23:41.000 | The Facebook algorithms are so good that if your buddy publishes a picture from the random social gathering and your face is in the background,
00:23:51.000 | Facebook knows you were in that picture and they'll tag you and say, "Hey, would you like to tag your friend?"
00:23:56.000 | And of course, we help it all out by publishing these photos in high definition, high resolution with all of the appropriate metadata so that Facebook can scrape all the metadata as well.
00:24:08.000 | Anyway, it's an endless loop when you get into it.
00:24:11.000 | This last year, I've read, I don't know, a half dozen, six or ten books on privacy and security and some of these things to try to get an accurate understanding of the world that we live in.
00:24:23.000 | But there seems to be no general outrage, no general perspective.
00:24:28.000 | We all seem to have taken it as a matter of course that we're just going to give away our privacy and it's not a big deal.
00:24:34.000 | Well, that may be fine.
00:24:36.000 | We all say the number one objection is, "Well, I don't have anything to hide."
00:24:40.000 | The problem comes in and forgive me, this has turned into a little bit of a screed.
00:24:45.000 | I'll get to the solutions in a moment.
00:24:47.000 | But the problem comes in when your personal opinions or your personal life or your personal political ideology or your personal religious ideology is out of step, is non-mainstream.
00:25:03.000 | You're on the wrong side of history.
00:25:07.000 | I find some of the news of the past couple of months very disturbing as far as the direction that some of the large companies that we do business with are taking with regard to the penalties for speech that is politically unpopular.
00:25:26.000 | I will stop there lest this become an inappropriate screed and cease to be informational and focused on the Equifax data breach.
00:25:36.000 | But these things are deeply concerning.
00:25:40.000 | So I think you should bet that you have been affected by the Equifax data breach.
00:25:48.000 | And if in fact you have not, you will tomorrow be affected by the Experian data breach that's coming and by the TransUnion data breach that's coming and by the Social Security Administration data breach that's coming and by the Census Bureau data breach that's coming.
00:26:06.000 | Because these things are not isolated incidents.
00:26:09.000 | If you haven't paid attention to this area, it's just because it hasn't affected you.
00:26:14.000 | You haven't been personally and just kind of ignored it.
00:26:16.000 | But this is nothing new.
00:26:18.000 | The target data breach that happened a couple of years ago is huge, was huge, huge.
00:26:23.000 | And it's just the tip of the iceberg.
00:26:26.000 | So you have to operate under the assumption that all of the information is going to become public.
00:26:33.000 | And I believe you must.
00:26:35.000 | If you're going to be prudent and responsible, you must take action to protect yourself.
00:26:40.000 | And that's what I was saying.
00:26:42.000 | This is new.
00:26:43.000 | This is fundamentally new.
00:26:44.000 | In the old days, it wasn't a huge deal.
00:26:47.000 | In the old days, it was no big deal that your mortgage was listed in the address of record.
00:26:53.000 | Your address was listed under your name in your local courthouse as part of the appropriate land filing documents.
00:26:59.000 | And so if somebody was looking for you, there were private investigators that were looking for you, then that private investigator could figure out, well, what county does Joshua live in?
00:27:09.000 | And let me go down to the courthouse and search things out.
00:27:11.000 | But in order for somebody to find you, they had to expend time and money to do so.
00:27:16.000 | That made the risk relatively small because in order for somebody to expend time and money to track you down, they probably had to have some decent reason.
00:27:28.000 | Maybe you owed them money or they were really interested in you for some reason.
00:27:33.000 | But what about today, somebody who tracks you down because you said something that they disagreed with online?
00:27:39.000 | You posted something in a Facebook post.
00:27:42.000 | See, most people don't do it because most people are rational and thoughtful and they just unfriend you and move on.
00:27:47.000 | But there's a small portion of the population that doesn't stop with that.
00:27:56.000 | And so you should be concerned with that.
00:28:00.000 | You should be concerned with that, especially if you have an elevated risk profile because you are financially successful, you are a religious or political ideologue.
00:28:17.000 | If you have any opinion that's out of the mainstream, no matter how well hidden that opinion is, if you do something that all of a sudden other people like and they think they're helping you and you publish something online,
00:28:28.000 | some cute little gif that you made and then all of a sudden you've got CNN knocking on your door saying, "Hey, you published this gif," and now all of a sudden your life is exposed.
00:28:39.000 | Next thing you know, you've got the 4chan trolls doxing you, to use the language in the vernacular of today.
00:28:46.000 | Just ask any journalist who's held a politically strong opinion.
00:28:50.000 | Just ask anybody who's in the public eye and all of a sudden you realize this risk is historically new.
00:28:57.000 | This has not existed before.
00:29:00.000 | Now, most of us are not in the public eye, so most of us don't face all of those risks, but your finances are a tempting and attractive target, and they always have been.
00:29:10.000 | But the ways of targeting you have changed.
00:29:14.000 | Yes, if you hired a house cleaner, that house cleaner could have had access to your information and could have possibly stolen something valuable from your house.
00:29:25.000 | But today it's a lot better because if the housekeeper can just simply find out the proper numbers, the housekeeper can very quietly put themselves in a situation where they have the opportunity to take your money without you ever knowing it.
00:29:39.000 | These are historically new problems, and our current approaches to defense are woefully, woefully inadequate.
00:29:53.000 | Some of the experts on security that I follow and read maintain that there is no personal solution that can be accomplished and that it has to be a regulatory governmental solution.
00:30:05.000 | Well, as somebody who has no confidence in governmental regulatory solutions having any positive effect and just simply making things worse, I kind of doubt that.
00:30:14.000 | I have to acknowledge that maybe they're right. Time will tell. Time will tell us, see. But I can't point to anything that has gotten all that much better because of increased government regulatory oversight.
00:30:26.000 | And even if it did get better, I have no confidence whatsoever that it would actually affect things that are because the way that laws are written, at least in the United States and just about every other country, is the companies who are involved are the ones who write the laws.
00:30:39.000 | They pass them along to their politicians. The politicians put them in under the politicians' name, and things get better for the companies.
00:30:47.000 | So what is your relationship with Equifax? This is what I find so obnoxious.
00:30:53.000 | When a company like Equifax comes out and says, "We're going to talk about protecting our customers' information. We want to protect that."
00:31:00.000 | Well, here's the problem. You are not a customer of Equifax. You are the product of Equifax. You're the product that they sell to their customers.
00:31:11.000 | And just speaking in the simplest terms of the Equifax business model, they sell your information to a credit card company or to a lender who wants to lend you money.
00:31:22.000 | So the customer of Equifax is the credit card company. The customer is the lender. That's why most often in Equifax's information on their website, for example, you can see in their information they refer to you as the consumer because you're not their customer.
00:31:37.000 | You're the product.
00:31:38.000 | And it's the same thing with, for example, social media. You're not a customer of Facebook. You are the product of Facebook. You are what Facebook sells.
00:31:48.000 | If I as a marketer want to reach you, I buy you and your information from Facebook. You are not the customer of Google. You are the product that Google sells.
00:32:00.000 | They sell you and your data and your information.
00:32:04.000 | And forgive me, I've gotten – as you could tell, I feel a little bit passionate about the subject. But I've again veered into the ditch of impassioned screeching rather than giving useful information.
00:32:19.000 | So what do you do? Let's talk useful and let me get back on track.
00:32:23.000 | Number one, your immediate action, as I have said on Radical Personal Finance since the very beginning of the show, is you must freeze your credit reports.
00:32:35.000 | You must freeze your credit reports.
00:32:39.000 | You must freeze them for you, for your spouse, and for your children.
00:32:43.000 | The only action step that actually protects you from identity theft is for you to freeze your credit reports.
00:32:55.000 | You should do that with Equifax, Experian, TransUnion, and the new kid on the block. Not necessarily new, but the fourth one that I'm now pursuing myself is Inovus.
00:33:08.000 | You must freeze your credit report.
00:33:11.000 | If you have not frozen your credit report, if that's not the case, you do not have another step that I'm aware of.
00:33:20.000 | You do not have anything else that will actually protect your identity from being used.
00:33:26.000 | And even the frozen credit report doesn't stop all fraud. For example, it doesn't stop IRS fraud.
00:33:33.000 | It doesn't matter if you have LifeLock. It doesn't matter if you have Zander Insurance. It doesn't matter if you have Equifax credit monitoring or Experian credit monitoring or blah, blah, blah.
00:33:43.000 | All those things do is tell you that someone has stolen your identity and you get to go and check it out.
00:33:49.000 | The only thing you can do to protect yourself is to establish a credit freeze. That's it.
00:33:58.000 | Now, this is nothing new. I've been saying this ever since I started. It's one of the ones that frustrate me as far as advertisers.
00:34:06.000 | I think there's value in having LifeLock. I think there's value in having Zander Insurance or whomever.
00:34:12.000 | But the problem is those don't do anything to stop the theft in advance. A credit freeze is the only thing that stops the theft.
00:34:19.000 | And guess what? The credit agencies hate. They hate credit freezes. Why?
00:34:30.000 | Well, because it means that with a credit freeze, they can no longer sell your information to their customers.
00:34:35.000 | They can no longer sell your credit file to the companies who are seeking to pre-screen you for credit offers.
00:34:44.000 | If the idea of a credit freeze is new to you, I want you to understand very carefully what it is.
00:34:49.000 | And I'll tell you that there are basically two people who it's not right for.
00:34:53.000 | But if you don't fall into one of these two categories, you should have your credit frozen all the time.
00:34:59.000 | A credit freeze means that somebody who inquires of a credit reporting agency to gain access to your record, to find out what's in it,
00:35:11.000 | to find out do you pay your debts on time or do you not, how many debts do you have?
00:35:15.000 | They cannot have access to that information unless the credit file is opened.
00:35:22.000 | And the only way to open it is for you to manually open it using the appropriate information,
00:35:30.000 | the private PIN code that you have been issued when you froze your credit.
00:35:35.000 | A credit freeze locks your credit file and it does so very effectively.
00:35:42.000 | A credit freeze locks your credit file so that nobody can access it.
00:35:46.000 | That means that if somebody is in Sears trying to apply for a Sears Store credit card or a Target credit card
00:35:52.000 | and they're using your number, your name, your address, your social security number, your date of birth,
00:35:58.000 | it doesn't matter if they have all that information right, they still, when Target runs the credit application to pull your credit file,
00:36:07.000 | they're not going to have access to the file and they'll be denied.
00:36:12.000 | That's what a credit freeze does.
00:36:14.000 | I have my credit frozen for years.
00:36:17.000 | I've frozen it, unfrozen it.
00:36:19.000 | If I ever needed access to the credit, I can easily unfreeze it.
00:36:22.000 | This is a simple thing to do and the credit companies hate it.
00:36:26.000 | Interestingly, Equifax has faced significant pressure because they wanted to have people sign up for their trusted ID program.
00:36:33.000 | They wanted to have people sign up for their trusted ID premier, their Equifax security monitoring system,
00:36:39.000 | give you a free introductory year, bill you with a credit card, which will probably be released to the data thieves,
00:36:44.000 | bill you with a credit card, and then you'll continue to have access to it in the long run.
00:36:49.000 | But that way they can still sell your information.
00:36:51.000 | Well, of course, consumer advocates for years have been talking about credit freezes.
00:36:55.000 | Equifax had an opportunity for people to do that.
00:36:57.000 | Their systems became overloaded.
00:36:59.000 | Those of you who've tried to do it electronically have probably experienced some problems.
00:37:02.000 | You can do it via the mail.
00:37:04.000 | I'll publish directions on how to do it if you're having trouble with the electronic systems.
00:37:08.000 | But they were charging money for it.
00:37:10.000 | And that's a number of how much it costs.
00:37:13.000 | Change is based upon the state.
00:37:15.000 | In the state of Florida, I pay the maximum, which is $10.
00:37:17.000 | Every time I want to freeze or unfreeze, it costs me $10 with each of the credit agencies.
00:37:24.000 | Well, finally, after huge pressure, Equifax has finally said, "Well, we're actually not going to make the charge.
00:37:30.000 | We're going to allow you to do it with Equifax for free."
00:37:33.000 | Well, fine.
00:37:34.000 | Good for them.
00:37:35.000 | They hate it, but good for them.
00:37:38.000 | So you need to freeze your credit.
00:37:41.000 | Every one of you listening, you need to freeze your credit.
00:37:45.000 | Here is the only exceptions that I can think of for who shouldn't freeze their credit.
00:37:50.000 | If you are regularly, routinely, frequently making applications for credit and you have no intention of changing that behavior, a credit freeze will be unwieldy for you.
00:38:05.000 | An example would be if you are a travel hacker and you seek to establish lots of free travel for yourself by routinely applying for new credit cards with various airline mile bonuses and various hotel point bonuses, things like that.
00:38:21.000 | And you're the kind of person who you'll apply for a half a dozen cards every few months.
00:38:25.000 | You will find the idea of a credit freeze unwieldy.
00:38:29.000 | It's just going to be too much hassle to deal with.
00:38:32.000 | Or let's say that you are somebody who is digging your way out of credit card debt.
00:38:36.000 | You have many credit cards and you're trying to surf those balances.
00:38:41.000 | Once you get into the world of deep credit card debt, you need to do everything you can to keep your rates low and to keep your costs low.
00:38:49.000 | And if you have a good borrowing history, oftentimes you can surf your balances from card to card to card.
00:38:54.000 | And companies will screen you for new applications.
00:38:58.000 | You usually get new 0% APR with 0% balance transfer fees offers while you're bouncing from card to card.
00:39:04.000 | And then they'll send you off for some of your existing cards if you surf a balance off of it and you have a $0 and they run your credit file and find out that you have a low balance.
00:39:15.000 | They'll offer you another 0% offer.
00:39:18.000 | And some of the companies are very aggressive about it.
00:39:20.000 | So if you're in that process, you can't have your credit file frozen because you need to surf those balances until you get them gone.
00:39:26.000 | But if those situations don't apply for you, if you're not frequently, routinely, regularly applying for new lines of credit, there's no reason for you not to have your credit file frozen.
00:39:36.000 | If you have your credit file frozen and you want to go and apply for, say, a mortgage, it's simple to do.
00:39:42.000 | You can actually unthaw your credit for a significant period of time.
00:39:46.000 | Let's say you're applying for a mortgage.
00:39:48.000 | You can unthaw your credit for a period of, say, three months.
00:39:53.000 | That'll get you through the closing time, the mortgage application process, et cetera, and then it'll automatically close down after that.
00:39:59.000 | Or you can manually trigger the freeze and the thaw at any point.
00:40:03.000 | So freeze your credit.
00:40:06.000 | I will publish in the show notes two credit guides.
00:40:10.000 | One is Clark Howard who publishes great information on it.
00:40:14.000 | And then the second is a few pages from previous Radical Personal Finance guests – well, Justin Carroll was previously the guest – from the excellent book called The Complete Privacy and Security Desk Reference by Justin Carroll and Michael Bazell.
00:40:29.000 | And both of them have – they published an excerpt from that book on how to actually establish a credit freeze.
00:40:36.000 | And then their information was good and excellent.
00:40:38.000 | They published that as a PDF. I've linked that on my Twitter profile, and I will link that in the show notes for today's show.
00:40:45.000 | But I hope I've been clear enough.
00:40:48.000 | You need to freeze your credit.
00:40:50.000 | That's one thing you need to do, number one.
00:40:52.000 | I encourage you to place a fraud alert on your account.
00:40:57.000 | Place a fraud alert on your account.
00:41:00.000 | A fraud alert will additionally bring scrutiny and carefulness to this scenario.
00:41:09.000 | By having a fraud alert on your account, it will establish other hoops.
00:41:14.000 | Again, this wouldn't be appropriate if you don't have issues, but the fraud alert will be helpful.
00:41:18.000 | And if you are impacted, if you can prove that you're impacted especially, I would encourage you to take very careful care of making sure that you keep the details on this.
00:41:29.000 | And if possible, one of the things – I will release an episode of Justin Carroll and Michael Bezel's podcast that I listened to on this subject.
00:41:39.000 | They did a good job and they talked about encouraging people to file a police report.
00:41:42.000 | I've seen some feedback that some people haven't been able to do that.
00:41:45.000 | Some people are trying to do that.
00:41:46.000 | I think it's a good idea.
00:41:47.000 | File a police report.
00:41:48.000 | If you're the victim of fraud – and guess what?
00:41:50.000 | You are now the victim of fraud.
00:41:52.000 | That opens up other opportunities for you.
00:41:54.000 | Number one, you don't have to pay for the credit freezes and unfreezes, et cetera.
00:41:57.000 | That will be useful to you in other areas of planning as well.
00:42:00.000 | But place a fraud alert.
00:42:01.000 | Consider filing a police report on your credit accounts.
00:42:05.000 | Next, you should immediately – if you don't do this every year on a regular schedule, you should immediately download all of your credit files from AnnualCreditReport.com.
00:42:15.000 | That's the official site that allows you once a year without cost to download all of your credit files.
00:42:20.000 | Download and review them carefully to make sure that nothing has changed.
00:42:24.000 | Make sure that everything is just how it is.
00:42:28.000 | And that will also help you to have it in case somebody starts opening credit files in your name.
00:42:33.000 | That's valuable and important.
00:42:35.000 | Download your credit reports.
00:42:37.000 | Make sure you save those in a safe and secure location.
00:42:40.000 | Obviously, those should be saved in an encrypted file on your computer, password protected and fully encrypted.
00:42:47.000 | This is a historically new time in our modern world.
00:42:52.000 | And what it means is you have to develop historically new skills such as being running – knowing what it's like to run an encrypted computer, knowing how to save files in an encrypted format.
00:43:04.000 | These are new skills that we all have to develop.
00:43:07.000 | Next, I think you should consider changing all of your credit card numbers.
00:43:12.000 | I personally intend to do this.
00:43:15.000 | I personally intend to have all of my card numbers changed and new cards issued due to this breach.
00:43:21.000 | Equifax confirms their numbers.
00:43:23.000 | They confirm that 200,000 people have had their credit card numbers disclosed.
00:43:29.000 | Now it seems like it's probably some of those people who had signed up – used those credit cards to sign up for accounts online, like credit monitoring.
00:43:40.000 | But I can't find good confirmation of that.
00:43:43.000 | So the point is that there have been credit card numbers that have been disclosed.
00:43:48.000 | Obviously, there's a big difference between 200,000 credit card numbers disclosed and 143 million credit card numbers disclosed.
00:43:57.000 | But it doesn't cost you anything to have your credit cards reset with new numbers and it's fairly simple to do.
00:44:05.000 | It's a hassle because if you have things that are billed primarily to your credit cards, that means that you will need to – you will need to change the credit card numbers that are being used.
00:44:17.000 | I think this is a really good time for you to establish a new cutout with your credit information and to use something like Privacy.com as your payment information.
00:44:29.000 | Privacy.com will be tied to your checking account, so it won't affect your credit card.
00:44:32.000 | But you can also do that for using a pseudo pay number or a blur credit card.
00:44:38.000 | These are the three services that I think are currently the best.
00:44:41.000 | Some of your banks will offer you virtual credit card numbers for online transactions.
00:44:46.000 | I think it's a good idea and a new skill set that we need to apply consistently is to always use a new different credit card number for any kind of transaction that's being done.
00:44:55.000 | The risk is too high and the value – and the tools are becoming simpler and easier.
00:45:00.000 | So at the very least, consider getting new credit card numbers.
00:45:04.000 | I don't think that's a mandatory piece of advice, but I think it's a good idea.
00:45:09.000 | I do think you must carefully watch your accounts.
00:45:14.000 | If you are not in the habit of watching every transaction through your accounts, you must carefully watch them.
00:45:20.000 | And you need to make sure that you never use a debit card online, that you're always using a credit card online.
00:45:30.000 | Now, if you are committed to not owning a credit card, which by the way would be one way of getting out of the Equifax system,
00:45:37.000 | where I'm a little hypocritical and railing against Equifax but then continuing to have a credit card because, well, I can't get them to delete my file, which angers me.
00:45:46.000 | But I'm still using their services, so I need to be careful and not be too strong in my comments against them.
00:45:53.000 | But if you are not using a credit card, you can at least use something – excuse me.
00:45:58.000 | If you are not using a credit card, you can at least use something like a privacy.com debit card, which will allow you to have some protection from using your direct debit card number online.
00:46:09.000 | Or if you only use debit cards, make sure that you have segregated accounts and you have an account that you use the debit card for, and that's different from your main banking account.
00:46:18.000 | It's not a matter of the ultimate fraud protection. That's a question.
00:46:22.000 | Generally, banks are generous. Generally, there's good fraud protection on both debit cards and credit cards.
00:46:28.000 | The functional problem if your debit card number is stolen is all the money is wiped out of your checking account right when your mortgage payment was being sent off.
00:46:37.000 | At least if the money is wiped on your credit card, you get the statement, you call the credit card company, you start the dispute process.
00:46:43.000 | You're not out the money that you needed to make your mortgage payment to keep it current.
00:46:47.000 | But if your bank is slow to accept your dispute process, if the bank doesn't immediately refund the money that was taken from your checking account because you used a debit card online,
00:46:56.000 | now all of a sudden your mortgage payment might bounce, and that's a significant problem.
00:47:01.000 | So pay careful attention to your transactions. Pay careful attention and scrutinize your transactions carefully.
00:47:09.000 | It would be a good idea for you to systematically update your online account login information.
00:47:15.000 | Each of your account logins for any online account should be a unique username that's not used anywhere else.
00:47:23.000 | If possible, a unique email address that's not used anywhere else. This is easy with various services.
00:47:32.000 | The most common, simplest solution today would be the service called Blur at abine.com.
00:47:41.000 | It allows you to create a new masked email address for any online – for any application desired.
00:47:48.000 | And so each of your credit card companies or any online account should have a new and unique email address and unique and strong passwords across all of your accounts with two-factor authentication established.
00:48:00.000 | I don't know if this particular piece of advice will have any impact because of the theft from Equifax.
00:48:10.000 | I don't see any reason why this particular advice would be connected to the Equifax, but it's important while giving advice that you recognize that these things are important because the next breach is not going to be from Equifax.
00:48:21.000 | The next breach is going to be from your email provider or it's going to be from Apple and all of the logins that are saved on your Apple Safari passwords, et cetera.
00:48:32.000 | The Equifax breach is just the tip of the iceberg. It's the big, giant tip of the iceberg, but it's still just the tip of the iceberg.
00:48:41.000 | There are about a bazillion more breaches coming because that's the world that we live in today.
00:48:46.000 | And so you need to develop new defense mechanisms, and there's no insurance you can buy for this.
00:48:52.000 | You got to do it yourself.
00:48:54.000 | Two more pieces of advice and I'm done for today.
00:48:56.000 | Number one – next, you should consider filing your taxes as quickly as you can.
00:49:03.000 | Once you get the information, get your taxes filed as quickly as you can because with the theft of your credit information, that can have an impact with financial transactions.
00:49:13.000 | But you should be able to lock most of that down.
00:49:16.000 | You should be able to lock most of that down with regard to your accounts.
00:49:22.000 | If your credit is frozen, somebody shouldn't be able to take information out in your name.
00:49:28.000 | And number two, you should have good protection for fraudulent transactions in your bank accounts and your credit cards.
00:49:36.000 | But one thing that's not affected by that is your filings with the IRS, and tax fraud is a huge deal.
00:49:43.000 | Now, in the last few years, the IRS has been making a few changes.
00:49:46.000 | But still, if taxes are often filed on people with – where people steal your social security number, file taxes in your name.
00:49:56.000 | File a return that gets them money.
00:49:58.000 | That's the way that the fraud works is they file a return in your name.
00:50:01.000 | They file a return that creates a refund, usually using something – some income numbers and some expense numbers that will qualify them for the earned income credit,
00:50:10.000 | which is a refundable tax credit where you get more money back from the US government than you put in.
00:50:16.000 | That's what the big one is, the earned income tax credit.
00:50:18.000 | And that's what makes tax fraud profitable.
00:50:21.000 | And they can send it back and depending on the filing mechanism, they could get a debit card or a card with a loan from the person they were filing it with.
00:50:28.000 | The IRS will frequently send out the check.
00:50:30.000 | They'll frequently wire the money out.
00:50:32.000 | And a few years ago, I mean there was a crazy, crazy numbers of tax fraud of money that was piled into inmates,
00:50:40.000 | currently convicted inmates who are currently in prison and the money that they were getting from the IRS through their tax fraud.
00:50:47.000 | Now, the IRS has been changing a few things.
00:50:49.000 | For example, when you e-file information, they require you to use your previous year's AGI and they're trying to fight this.
00:50:55.000 | And I believe if memory is correct that the rates have come down a little bit.
00:50:59.000 | But this is a huge danger and you don't want to be embroiled in this mess if you can help it.
00:51:04.000 | I've worked with a few people who are embroiled with disputes with the IRS over fraudulent returns that have been filed and it's a nightmare.
00:51:11.000 | You think it's a nightmare to keep your tax records clean now?
00:51:14.000 | Well, just start having fraudulent returns filed in your name, addresses messed up, all the stuff messed up.
00:51:20.000 | It's a nightmare.
00:51:21.000 | So file your taxes as quickly as you can so that you can get in there first before somebody can use that for information.
00:51:28.000 | I have seen other consumer experts recommend that and it makes sense to me based upon the knowledge of this issue in this industry.
00:51:36.000 | And finally, we come to phishing attacks.
00:51:37.000 | Phishing attacks are probably the biggest risk that we face.
00:51:42.000 | With this information, with this data that's been released, somebody can put together a phishing attack.
00:51:51.000 | They can create an email that will look very, very important to you, very, very tailored, custom tailored to you.
00:52:00.000 | And they'll send it to you saying, "You need to change something.
00:52:02.000 | You need to adjust something.
00:52:03.000 | You need to fix something."
00:52:05.000 | They'll send that email to you and the email will contain a link and you'll click on it and then problems will ensue.
00:52:12.000 | Now, don't think that this can't happen to you.
00:52:15.000 | I've heard of in studying this subject for the last couple of years, I have heard of successful phishing attacks happening to computer security experts,
00:52:25.000 | people who are laser focused, even people who work in the con-circurity world creating phishing attacks towards other people who get fooled from time to time.
00:52:37.000 | You've got to be careful.
00:52:39.000 | Don't click on links.
00:52:40.000 | Don't believe anything that's sent to you.
00:52:42.000 | Don't believe emails that are sent to you by anybody.
00:52:45.000 | Just assume it's all wrong.
00:52:46.000 | If your people need to get a hold of you, they will in another means.
00:52:49.000 | Equifax will mail you.
00:52:51.000 | The IRS will send you mail and then you can research something and deal with it.
00:52:55.000 | But don't click on links and don't fall prey to a phishing attack.
00:52:59.000 | An email masquerading as an official email that comes into your inbox.
00:53:03.000 | Now, we don't know how this information will be used.
00:53:07.000 | Once information is out on the open market, it's turned into data packages which are then sold and resold and can be resold a gazillion times.
00:53:15.000 | And so there may be people that use the data in simple ways and they just try to apply for a credit card.
00:53:21.000 | Well, that may be simple.
00:53:22.000 | That may be easy to avoid.
00:53:28.000 | But if you're a high-profile target, there's no guarantee that this data can't be turned against you.
00:53:35.000 | One of the most fearful books that I have read in the last few years was a Tom Clancy novel called "True Faith and Allegiance."
00:53:43.000 | It was published after his death by one of the authors who writes under the Tom Clancy brand now.
00:53:49.000 | It was published last year, this year.
00:53:51.000 | No, last year, 2016.
00:53:52.000 | It's 2017 now.
00:53:54.000 | And it's called "True Faith and Allegiance."
00:53:56.000 | And the basic premise of the book is that based upon what's called the open-source intelligence, the freely available information that's freely available about you, a foreign hacker, a foreign entrepreneur used information from a data file that he was able to get access to and started selling that information to, in the plot of the book, terrorists who were interested in applying that information for their own purposes.
00:54:25.000 | And they used that information for political ends.
00:54:28.000 | Now, I have not – that's not a spoiler – there was no spoiler alert needed.
00:54:32.000 | I haven't ruined the book for you.
00:54:34.000 | If you enjoy thrillers or if this is a subject of interest to you, read Tom Clancy.
00:54:38.000 | Read the Tom Clancy book called "True Faith and Allegiance."
00:54:41.000 | It's part of the Jack Ryan series.
00:54:43.000 | And it will chill you because there's nothing in that book that you or I can't do.
00:54:51.000 | If somebody is out to target you, they could probably do this without a data breach.
00:54:58.000 | But if you're a high-profile person and now this data file is publicly available for purchase by the people who stole it on the dark web, now all of that information is possibly in the hands of a malicious person.
00:55:14.000 | Thankfully, almost all of us – very few of us have anything to worry about with regard to that.
00:55:21.000 | But you should take it seriously and then think about what skills do you need to learn to protect yourself going forward.
00:55:29.000 | My friends, we are in new territory with this subject.
00:55:34.000 | I do not know where that firm line is between how much is enough and how much is too much.
00:55:40.000 | I really do not and I don't know any way to answer the question.
00:55:44.000 | I have no idea how to know.
00:55:47.000 | You know, you just say, "Well, that's enough. I've taken enough steps. What's enough?"
00:55:51.000 | I don't know. I really don't.
00:55:55.000 | Time will tell.
00:55:56.000 | I mean, I'm seeing things, reports of wire transfers and fraudulent transactions even this soon after the breach.
00:56:03.000 | I'm hesitant to believe things until more investigations are done.
00:56:08.000 | It's too new.
00:56:09.000 | I don't know what you should or shouldn't do.
00:56:12.000 | I know you should freeze your credit.
00:56:13.000 | That's simple and easy.
00:56:14.000 | That's no brainer.
00:56:15.000 | You should do these things.
00:56:16.000 | You should watch your accounts.
00:56:17.000 | Well, that's simple and obvious.
00:56:18.000 | We all know that.
00:56:20.000 | Very few of us do it, but we all know that.
00:56:22.000 | Beyond that, what should you do?
00:56:24.000 | I have no idea.
00:56:26.000 | I will continue to research the subject as I have in the last couple of years.
00:56:30.000 | I'll try as I am able to figure out how to answer them.
00:56:34.000 | If you have specific questions, call into a Q&A show and ask about techniques, and I'll tell you what I've learned.
00:56:40.000 | I fear that too much of today's show was a little bit of a screed, and again, I apologize.
00:56:46.000 | But it's a subject that is legitimately new.
00:56:51.000 | These are risks that are legitimately new.
00:56:55.000 | All you need to do is just recognize.
00:56:58.000 | I expect in the coming years more and more of us will start to bear the brunt of the changing circumstances.
00:57:05.000 | All you need to do is just look at the stories of some of the reporters who were targeted during the recent U.S. presidential election.
00:57:17.000 | Look at some of the accounts of what people face when they do something that's politically unpopular.
00:57:23.000 | I go back again to you shoot a lion on your safari in Africa and your life is destroyed.
00:57:29.000 | Just hold an opinion that's unpopular.
00:57:32.000 | I expect to be on the Southern Poverty Law Center hate group list at some point in the future.
00:57:37.000 | Well, try booking things once you get on the Southern Poverty Law Center hate group list.
00:57:42.000 | Try booking things once an organization that's built starts to list you as an opponent for having an unpopular or unpalatable idea.
00:57:53.000 | This is a new era, and the Equifax breach should be a wakeful moment for you.
00:57:59.000 | It should wake you up. Waking up, to borrow Sam Harris's line.
00:58:03.000 | I'll be back with you soon, and I wish you all a great day.
00:58:10.000 | This show is part of the Radical Life Media network of podcasts and resources.
00:58:15.000 | Find out more at Radical Life Media dot com.
00:58:20.000 | Struggling with your electric bill? Get an energy assist from SDG&E and save.
00:58:25.000 | You may qualify for an 18% discount.
00:58:29.000 | Visit SDG.com/FERA to find out more.