In Business Since 2001 We accept Paypal
Home Article Directory
More from Bill Platt
"Bill Platt for Book Authors" Youtube Channel
Training for Book Authors
Sites Owned by Bill Platt

 
D9 Hosting


Is Anyone Doing Anything About Identity Theft?

Copyright (c) 2007-2019

What Is Identity Theft?
The crime of Identity Theft occurs when one person's name, social security number, ID card, account number or any other form of identification is used by or transferred to another person for unlawful purposes. The seriousness of this crime cannot be overstated.

Every 1 1/3 minutes Identity Theft claims a new victim.
How bad is it?

Between nine and ten million consumers become victims of Identity Theft each year. This is one of the fastest growing federal crimes in the United States.

How Does Identity Theft Happen?
Most victims don't know how thieves got their personal information in the first place. The first thing experts recommend is that we should stop giving out our Social Security number any time we are asked for it. Always question anyone asking for this type of sensitive information with the reply: WHY?

Identity Thieves not always strangers
Although a large number of Identity theft victims believe the identity theft occurred when their purse or wallet was stolen or lost, there are a number of other ways that it occurs.

It has been proven that numerous victims of identity theft were preyed upon by someone they knew. Believe it or not many victims discover that relatives, ex spouses, ex lovers, roommates, landlords and even hired help can become thieves. Anyone that has access to your home can get hold of private information unless you take steps to guard against this.

Identity Theft can go undetected for years
Identity Thieves have been known to milk your accounts for years by changing your address on choice accounts and receiving your mail themselves. In this way you won't ever receive any bill with fraudulent charges on it. By paying the minimum required monthly payment, they avoid any unwanted attention to the account. In this way they can run up enormous bills before discarding the use of the account.

For many years prior to the present pandemic of Identity Theft, favorites of Identity thieves, and other criminals were the identities of deceased persons and children. This still goes on today especially since children receive Social Security numbers at such an early age.

Private Mail is a favorite target. It is stolen from mailboxes, businesses, drop-boxes, and from garbage cans and wastebaskets.

Since thieves often re-sell stolen personal information, they are now targeting large groups of people. These thefts take place anywhere that records of a number of people are kept, netting the thieves larger sums of money for one operation.

Cyber crime a huge arena of Identity Theft
Computers, including the ones you have at home, can be infected with spyware viruses such as Trojan horses, Backdoor Santas, and Advertising spyware. These are just a few of the viruses that can transmit your information and browsing habits back to those who launched them, including thieves.

Spam is unwanted, unsolicited electronic junk mail. It is usually of a commercial nature, which invites you to provide financial, personal, or credit card information. It also invites you to visit another web site. During your visit to the sites the viruses, which gather your information, are installed on your computer, and transmit your information back to its source.

What the Government says about growing Identity Theft
Lets take a look at what the government says about it, what the government and other agencies are doing about it and where to find information to protect yourself from it.

On December 4, 2003, President Bush signed into law The Fair and Accurate Credit Transactions Act of 2003

* Giving every consumer the right to his or her credit report free of charge every year.

* Helping prevent identity theft before it occurs by requiring merchants to leave all but the last five digits of a credit card number off store receipts

* Creating a national system of fraud detection to make identity thieves more likely to be caught.

There are several other benefits to this Act, which you can read about at:
http://www.whitehouse.gov/news/releases/2003/12/20031204-3.html

President Bush Signs Identity Theft Act
In July of 2004 President Bush signed the Identity Theft Enhancement Act. At the signing the President remarked:

"Like other forms of stealing, identity theft leaves the victim poor and feeling terribly violated . . . An identity thief can steal the victim's financial reputation . . . and can quickly damage a person's lifelong efforts to build and maintain a good credit rating. Repairing the damage can take months or years."

F.B.I. Testifies on Efforts to Curtail Identity Theft
On September 22, 2004 Steven M Martinez the Deputy Assistant Director of the F.B.I., testified before the House Government Reform Committee's Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census.

The subject of this Congressional Testimony was the FBI's efforts to combat Identity Theft, as well as other overlapping cyber crime problems. According to Mr. Martinez,

" Some studies show that more than 10 million Americans were victimized by Identity Theft in the space of one year with estimated loses exceeding 50 million dollars."
http://www.fbi.gov/congress/congress04/martinez092204.htm

Federal Trade Commission is one of agencies in forefront of fight against Identity Theft
The FTC is designed to enforce a variety of federal antitrust and consumer protection laws, encourage free trade, and educate the public about threats such as Identity Theft.
http://onguardonline.gov/index.html

Federal Trade Commission Report
According to the Federal Trade Commission, identity theft has topped their annual report of consumer complaints for six years in a row, costing citizens and businesses approximately $52 billion annually.

* The latest projection figures show a whopping $5 Billion in consumer losses and another $48 billion in losses to business, totaling an estimated $53 billion in losses annually, to come.
FTC Releases Survey of Identity Theft in U.S.
(Sept. 19, 2006 - The President's Identity Theft Task Force):

* 27.3 Million Victims in Past 5 Years
* Billions in Losses for Businesses and Consumers


FTC Press Release: (February 7, 2007)

FTC Issues Annual List of Top Consumer Complaints. Eight Most significant categories of identity theft reported by victims:


1. Credit card Fraud................(25%)
2. Phone or Utility Fraud............(16%)
3. Bank Fraud....................(16%)
4. Employment Fraud...............(14%)
5. Government Documents/Benefits Fraud......(10%)
6. Loan Fraud..................(5%)
7. Other Identity Theft methods..............(24%)
8. Attempted Identity Theft..............(6%)

http://www.consumer.gov/sentinel/pubs/Top10Fraud2006.pdf
http://www.ftc.gov/opa/2007/02/topcomplaints.htm

US Agencies involved in fight against Identity Theft:

* Federal Bureau of Investigation
* Federal Deposit Insurance Corporation
* Federal Trade Commission
* Department of Commerce
* Homeland Security
* Identity Theft Task Force (headed by the Attorney Gen.) Established May 10,2006
* Department of Justice
* Office of Justice Programs
* Securities and Exchange Commission
* US Postal Inspection Service
* US Secret Service: Electronic Crimes Task Force
* US Treasury Dept.
* US-Cert (US computer emergency readiness team)

Cyber Crimes
Spamming Identity Thieves Invite Law Enforcement Initiatives


The FBI Cyber Division, the Federal Trade Commission, and the Senate Committee on Commerce, Science, and Transportation, have been joined by law enforcement agencies through out the US, to developed initiatives against spammers.

Some Anti-Spam Initiatives

1. The FBI's Slam-Spam initiative
2. Operation WEB-SNARE
3. Operations E-Con and Cyber Sweep
4. The Can Spam Act of 2003
5. The Phishing Initiative

The FBI's Slam-Spam initiative.

As a result of this initiative, more than 20 Cyber Task Forces are actively pursuing over 30 criminals.

Operation WEB-SNARE:
In WEB-SNARE, more than 150 investigations were successfully advanced, in which 150 subjects were charged, and 170 search and/or seizure warrants were executed.

Operations E-Con and Cyber Sweep:
The IC3 (Internet Crime Complaint Center) coordinated the development and execution of Operations in which more than 200 investigations among various law enforcement agencies, resulted in arrests and/or charges against more than 250 suspected individuals for engaging in a variety of cyber crimes including Identity Theft.

The Can Spam Act of 2003
To regulate interstate commerce by imposing limitations and penalties on the transmission of unsolicited commercial electronic mail via the Internet. This Act may be cited as the ''Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003''.

ABC News (March 9, 2007)
The FTC notes that it has filed more than 20 lawsuits alleging that spammers violated CAN-SPAM; an additional 30 suits have been filed by the Department of Justice, state attorneys general, and various Internet service providers.

The Phishing Initiative
Phishing
[View Webopedia Definition] (fish´ing) (n.)
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user's information.
March 2006, the Global Phishing Enforcement Initiative (GPEI),

This project is being jointly developed with approximately 40 SMEs (small to medium-sized enterprises) from 25 separate industry organizations that have agreed to join law enforcement in this project. The project is being developed jointly between the FBI, U.S. Postal Inspection Service, United States Secret Service, and the FTC.

Available Law Statutes:
In addition to the CAN SPAM ACT of 2003, such schemes might be prosecuted through Title 18, USC 1028 (Fraud and related activity in connection with Identity documents), Title 18, USC 1029 (Fraud and related activity in connection with Access Devices), Title 18, USC 1030 (Fraud and related activity in connection with computers), Title 18 USC 2319 (Criminal Infringement of a copyright), Title 18 USC 1343 (Fraud by Wire), Title 18 USC 1341 (Mail Fraud), and Title18 USC 1028A (Identity theft penalty enhancements).

Protect Yourself Against Identity Theft

Conclusion:

I have attempted to present the following facts concerning Identity Theft:

* What Identity Theft is.
* How wide spread it is.
* How many people are affected annually.
* How it happens.
* What the government says about it.
* What the government is doing about it.

Although some areas of Identity theft are showing signs of decrease (Internet Spamming), it looks like Identity Theft is going to be with us for some time. The best thing that we can do is to come to our own defense through knowledge.

Know what to do to protect yourself, then take steps to put your knowledge to work.
I have included a number of web sites where you can find plenty of information on how to reduce your chances of Identity Theft.

FTC (Federal Trade Commission)
Fighting Back Against Identity Theft


http://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt01.htm
http://www.ftc.gov/ --Includes video on subject.
http://www.ftc.gov/bcp/edu/microsites/idtheft/law-enforcement/law-enforcement-resources.html
Http://www.ftc.gov/idtheft
Call toll free: 1-877-FTC-HELP (1-877-382-4357); TTY: 1-866-653-4261.

US Department of Justice
Request a free copy of the "Stop Identity Theft Now" Educational video by calling 888-228-0315
http://www.ftc.gov/bcp/edu/microsites/idtheft/law-enforcement/law-enforcement-resources.html

FDIC (Federal Deposit Insurance Corp)
http://www.fdic.gov/consumers/consumer/fighttheft/index.html
www.consumer.gov/idtheft
or by calling 1-877-IDTHEFT.

Consumer Information from the Government
http://www.consumer.gov/

National Credit Union Administration
http://www.ncua.gov/Publications/brochures/IdentityTheft/

Better Business Bureau On Line
http://www.bbbonline.org/idtheft/
http://www.bbbonline.org/idtheft/consumers.asp

http://www.privacymatters.com/Portals/PrivacyMatters/Page/Article.aspx?dp_banner_id=70
FEDERAL BUREAU OF INVESTIGATION
NATIONAL COMPUTER CRIME SQUAD

http://www.emergency.com/fbi-nccs.htm

US Department of Education
http://www.ed.gov/about/offices/list/oig/misused/reduce.html

US Postal Inspection Service
http://www.usps.com/postalinspectors/idthft_ncpw.htm

Identity Theft Resource Center (ITRC)
http://www.idtheftcenter.org/index.shtml

Privacy Rights Clearing House
http://www.privacyrights.org/fs/fs17-it.htm


About The Author: Shop Amazon - Top Gift Ideas
The Author Jerry Tarrer is 63 years of age. He was born in a small coal-mining town in Logan county, West Virginia. At the end of World War II his father returned from the war where he had served in the Pacific and moved the entire family to Chicago Illinois. He was educated in the inner city completing high school and 2 years of college. After joining an apprentice-printing program, Jerry became a Master Printer and worked in his field for 37 years. Jerry is the father of 5 adult children and 13 grandchildren. The author is now trying his hand at his own web business at http://www.securityspy4u.com and http://www.livesafenow.com

VOTE ON THIS ARTICLE
Needs Work >> 0 - 1 - 2 - 3 - 4 - 5 << Excellent Article

Tell our authors what you think about their article.



Top-Level Category: Society Articles

10 Most Recent Articles Written by Jerry Tarrer

All About Self Defense Pepper Sprays
Written by: Jerry Tarrer | Distributed: 2007-04-27 | Word Count: 926 | Page Views: 3954 | Votes: 16 | Rating: 2.13
Pepper spray is now endorsed and used by nearly every law enforcement agency throughout the U.S.A. and other countries around the world. More effective than Mace and Tear Gas, it seldom causes permanent injury when properly used in self-defense or as a neutralizing agent and has only temporary effects. Pepper spray gives today's law enforcement officers a means to control subjects without resorting to a physical confrontation or to deadly force.

Using Security Cameras
Written by: Jerry Tarrer | Distributed: 2007-04-23 | Word Count: 736 | Page Views: 6335 | Votes: 11 | Rating: 3.82
Crime continues to rise not just in a physical sense but also in the world of white-collar business. Security cameras have become a worthy ally to many in the detection and prevention of crime. A simple observation of the city will tell you security cameras are everywhere these days. Once used in their infancy as a traffic-monitoring device, remote security cameras are becoming the weapons of choice in the war against terrorism and crime around the world.

Paintball Guns For Beginners
Written by: Jerry Tarrer | Distributed: 2007-04-20 | Word Count: 554 | Page Views: 4805 | Votes: 11 | Rating: 1.45
The first uses of paintball guns can be traced back to approximately 1981 when James C. Hal invented them. At that time paintball guns were used primarily by foresters and farmers to mark trees and livestock. In 1985 Robert G. Shepherd came up with the design specifically used for playing paintball games.

Home Alone Child Safety
Written by: Jerry Tarrer | Distributed: 2007-03-21 | Word Count: 1038 | Page Views: 3616 | Votes: 7 | Rating: 3.43
Your child's safety depends to a large part on good communication between you and your children. This is especially true of two-income families, and single parent families where the children are left alone for extended periods of time and have to care for themselves.

Hidden – Secret Weapons For Self-Defense - Attitude As A Means Of Self Defense
Written by: Jerry Tarrer | Distributed: 2007-03-09 | Word Count: 1747 | Page Views: 5304 | Votes: 12 | Rating: 1.00
The possible origin of secret-hidden weapons from Feudal Japan.

How to Counter - Spy Phone Invasions of Privacy
Written by: Jerry Tarrer | Distributed: 2007-02-23 | Word Count: 973 | Page Views: 5470 | Votes: 14 | Rating: 2.07
The rise of electronic bugging, terms used in phone spying, how to protect yourself from electronic bugging.

Why VHS is Disappearing
Written by: Jerry Tarrer | Distributed: 2007-02-22 | Word Count: 692 | Page Views: 4166 | Votes: 8 | Rating: 2.13
VHS is being replaced by newer technology. The film Studios are no longer releasing movies on VHS film, DVD's are much easier and cheaper to make, more durable, last years longer, and are much cheaper to mail. Basic DVD players can be purchased for $50.00 and under, making them less expensive than the VHS players. VHS collectors should fast-forward towards reformatting their piles of favorite movies soon before they become white elephants with a short shelf-life.

All of Author's Articles on this site:

Most Recent "Society" Articles

When Commitment Seems A Bit Too Much Trouble
Written by: Lance Metzger | Distributed: 2013-11-05 | Word Count: 986 | Page Views: 4772 | Votes: 10 | Rating: 0.70
The nuclear family (man and wife, plus 2.2 kids) is a fantasy that some people want to chase, and while there is nothing wrong with that, it is not the right relationship dynamic for some people.

The Online Dating Double Standard: How Fear Can Prevent Dating Success
Written by: Lance Metzger | Distributed: 2013-10-23 | Word Count: 958 | Page Views: 5594 | Votes: 11 | Rating: 1.82
Many people go online in search of their elusive soul mate, only to find all of the wrong people on the other end of the meeting. Many women think that they are alone in this outcome, but it happens to guys too.

Online Dating Is A Difficult Process That Offers Some Rewards
Written by: Lance Metzger | Distributed: 2013-10-17 | Word Count: 834 | Page Views: 4940 | Votes: 13 | Rating: 1.77
Online dating can be rewarding to those who have the patience and the knowledge of what to expect during the process. This article explains the common process experienced by most internet dating website users.

How Dating Has Changed In The 21st Century
Written by: Lance Metzger | Distributed: 2013-10-15 | Word Count: 974 | Page Views: 11907 | Votes: 15 | Rating: 1.67
With an article title like this, one might assume that I am ready to tell you some extraordinary news about a new dating environment. Sure, the Internet has introduced one more way for people to meet, but does that actually change the dating scene?

Jesus, Son of God and Son of Man
Written by: Arthur Trafford | Distributed: 2011-12-12 | Word Count: 991 | Page Views: 456
In 1st John 5:5 we are told that “Jesus is the Son of God”. What motivated Jesus to refer to Himself as “Son of man”?

3 Tips For Building Relationships That Last
Written by: Clarence Lee | Distributed: 2011-07-21 | Word Count: 754 | Page Views: 3226 | Votes: 4 | Rating: 1.50
You know, to hear people talk about the difficulties of the dating process, you would think it is impossible for two people to come together in a mutually beneficial relationship... But the problems of any relationship can be narrowed down to three very important and relevant words...

The Drama of the Dating Game
Written by: Clarence Lee | Distributed: 2011-07-20 | Word Count: 620 | Page Views: 3370 | Votes: 2 | Rating: 0.00
Dating is tough. You spend time getting to know someone and deciding whether the two of you are compatible. Then you work your way up to the big question, "Will you go out with me?" Then you sweat the answer... Will he/she say yes?

3 Courses of Action For an Unhappy Relationship
Written by: Tony G. Mann | Distributed: 2010-04-20 | Word Count: 354 | Page Views: 3440 | Votes: 1 | Rating: 0.00
The reality is that if you are actively dating, you're going to probably end up in an unhappy relationship eventually. For some people, they may have to go through several bad relationships before finding the right one. If you are facing an unhappy relationship, then there are three courses of action you can take:

Relationship Questions: What Men Want and What Women Need
Written by: Bob Grant | Distributed: 2010-03-15 | Word Count: 737 | Page Views: 7379 | Votes: 13 | Rating: 2.92
What men want is to be trusted and what women want is to trust them. A fundamental, physical difference in the sexes lies at the heart of these core relationship questions. By simply doing what they say they will do, men have the power to create stronger, better relationships.

Cheap Tattoos Cheapen The Tattooing Experience
Written by: Bree Levine | Distributed: 2010-03-04 | Word Count: 603 | Page Views: 3085 | Votes: 3 | Rating: 0.00
Many of my girlfriends have "girl nights" around getting tattoos, as if it were as casual as getting a haircut or a manicure. The casual attitude toward tattoos bothers me for two reasons; there is the age old argument that tattoos are permanent and not a decision to make lightly. The other argument I have against tattoos is that getting a tattoo on a whim significantly cheapens the tattoos that others have for cultural reasons or to commemorate a major life event.

Most Viewed "Society" Articles

Creative Flower Card Messages Worthy Of Harry Potter Author J.K. Rowling
Written by: Wesley Berry, AAF | Distributed: 2008-01-30 | Word Count: 512 | Page Views: 49326 | Votes: 18 | Rating: 1.56
As much as we might like to be, we're not all talented writers like the best-selling author of the Harry Potter books series, J.K. Rowling. Those of us who aren't skilled writers (and probably some who are!) sometimes struggle with finding the right words to say.

Las Vegas Weddings: Pros and Cons of Getting Married in Las Vegas
Written by: Sharmila Pundit | Distributed: 2006-09-01 | Word Count: 487 | Page Views: 29626 | Votes: 9 | Rating: 2.22
For some people a Vegas wedding is an original and romantic thing to do and for some it is a sleazy way to tie the knot. Is getting married in Las Vegas a good idea? Read all about it and decide for yourself.

How to Play Santa Claus for Children--A Short Guide
Written by: Victoria McCraw | Distributed: 2006-11-14 | Word Count: 419 | Page Views: 24086 | Votes: 131 | Rating: 2.37
Playing Santa Claus for children, whether as a semi professional shopping mall Santa, a charity Santa who works to cheer up less fortunate children, or even as the resident Santa at social and family gatherings, is a heartwarming and important job. Nothing can quite compare with the smile on a child's face when he or she discovers that Santa is in the room.

Petit Larceny: Not Always Petty
Written by: Warren Redlich | Distributed: 2008-10-02 | Word Count: 749 | Page Views: 22897 | Votes: 31 | Rating: 3.48
Petit Larceny, sometimes referred to as Petty Larceny, is defined in New York State as a theft of property valued at less than $1000. In contrast, Grand Larceny is a theft of property at least $1000 in value.

Single? Here's the Ultimate Date Idea
Written by: Jason OConnor | Distributed: 2006-05-19 | Word Count: 1194 | Page Views: 21682 | Votes: 7 | Rating: 2.14
If you're a regular guy, the kind who loves sports and hates the opera for instance, then here's an awesome date idea I bet you've never really considered before: taking a woman to a Broadway production, even if you don't live in New York City. You can find professional Broadway productions in most major North American cities.

How to Contact Your Ex When They Continue to Ignore You
Written by: James Kern | Distributed: 2009-07-28 | Word Count: 752 | Page Views: 15850 | Votes: 29 | Rating: 2.14
She just wont return your calls, or give you the time of day and listen. You're smitten. You want nothing more than to talk with this woman and tell her how you're feeling, but you keep getting bumped to voicemail. Your texts vanish into a void and are never returned. Your emails go unread. What's a guy to do?

Attract Beautiful, Sexy Women With Bad Boy Attitude But A Nice Guy Style
Written by: Ken Oboh | Distributed: 2006-06-06 | Word Count: 589 | Page Views: 14780 | Votes: 74 | Rating: 1.62
The bad boy naturally attracts and seduces women...but you can just as easily succeed with women as a nice guy by applying the same secret techniques.

Feet, Personality Theory, Dating and Relationships
Written by: Mr L.Rx | Distributed: 2007-08-29 | Word Count: 2583 | Page Views: 13620 | Votes: 49 | Rating: 3.24
In this article Mr. L. Rx describes an 80-90 percent correlation between personality type and the angle between ones feet, and tells how it can be applied to dating and relating.

How Dating Has Changed In The 21st Century
Written by: Lance Metzger | Distributed: 2013-10-15 | Word Count: 974 | Page Views: 11907 | Votes: 15 | Rating: 1.67
With an article title like this, one might assume that I am ready to tell you some extraordinary news about a new dating environment. Sure, the Internet has introduced one more way for people to meet, but does that actually change the dating scene?

The Top Half Dozen Gas-Saving Myths In Automobile Driving Today
Written by: Benji O. Anosike | Distributed: 2008-02-25 | Word Count: 3092 | Page Views: 8022 | Votes: 22 | Rating: 3.36
In this article, we shall expose some of the major myths about automotive fuel economy, and we will dispel those myths at the same time. Read on as this is interesting stuff.

Highest Ranked "Society" Articles

Would You Like To Know How To Pick Up Women In Bars And Clubs?
Written by: Mr L.Rx | Distributed: 2007-03-23 | Word Count: 885 | Page Views: 5940 | Votes: 33 | Rating: 3.58
The first technique is explained in this first article of a three part series describing techniques that you can use to pick up women in bars and clubs.

ABCs Desperate Housewives and the Suddenly Famous Pink Blanket
Written by: Scott Corbett | Distributed: 2006-05-25 | Word Count: 580 | Page Views: 4376 | Votes: 8 | Rating: 3.50
Ever since Cary Grant rattled the men's t-shirt industry by famously appearing without one and causing a decline in retail sales of undershirts, television and movie stars have been changing the tastes of the American consumer.

Petit Larceny: Not Always Petty
Written by: Warren Redlich | Distributed: 2008-10-02 | Word Count: 749 | Page Views: 22897 | Votes: 31 | Rating: 3.48
Petit Larceny, sometimes referred to as Petty Larceny, is defined in New York State as a theft of property valued at less than $1000. In contrast, Grand Larceny is a theft of property at least $1000 in value.

The Top Half Dozen Gas-Saving Myths In Automobile Driving Today
Written by: Benji O. Anosike | Distributed: 2008-02-25 | Word Count: 3092 | Page Views: 8022 | Votes: 22 | Rating: 3.36
In this article, we shall expose some of the major myths about automotive fuel economy, and we will dispel those myths at the same time. Read on as this is interesting stuff.

Embracing the Recession
Written by: Heather Villa, CMA, MBA, MSM | Distributed: 2008-11-25 | Word Count: 682 | Page Views: 2936 | Votes: 6 | Rating: 3.33
We live in uncertain economic times. Every time we turn on the news we hear of another company that is going under or another company that is laying off thousands of its workforce or another company that has had to respond to a lack of shareholder confidence with kneejerk reactions. People just don't want to watch the news anymore!

Feet, Personality Theory, Dating and Relationships
Written by: Mr L.Rx | Distributed: 2007-08-29 | Word Count: 2583 | Page Views: 13620 | Votes: 49 | Rating: 3.24
In this article Mr. L. Rx describes an 80-90 percent correlation between personality type and the angle between ones feet, and tells how it can be applied to dating and relating.

Dating Your Girlfriend's Best Friend
Written by: Kathy Stafford | Distributed: 2007-09-28 | Word Count: 685 | Page Views: 7709 | Votes: 18 | Rating: 3.22
Explore your options if you're considering dating a friend of your girlfriend's. Offers tips on how to proceed in this delicate situation and what traps to avoid.

The Argument Women Can't Win
Written by: Bob Grant | Distributed: 2006-09-12 | Word Count: 501 | Page Views: 5775 | Votes: 11 | Rating: 3.18
When it comes to fighting and disagreeing with a man in a relationship, women frequently make a critical mistake which ends up causing them to feel hurt and lonely. Here is the scenario that typically happens.

Baby Boomers - A Healthcare Crisis Nears
Written by: Heath Atchison | Distributed: 2006-07-25 | Word Count: 1120 | Page Views: 5750 | Votes: 11 | Rating: 3.09
Baby boomers are quickly approaching retirement age, and as they do, there are a number of concerns that need to be addressed, particularly in the area of healthcare. Unfortunately, there appears to be no easy answers to the healthcare problems that baby boomers, and the population in general, will face in the very near future.

Loneliness
Written by: Joyce C. Lock | Distributed: 2007-02-02 | Word Count: 357 | Page Views: 4372 | Votes: 7 | Rating: 3.00
Loneliness is all around us.











Download an eBook today
 
Directory Navigation
Locate By Category:

ALL Categories
Arts & Crafts
Arts & Entertainment
Automotive
Business - Offline
Business - Online
Career
Computers
Education
Family
Finance
Food & Drink
Health & Wellness
Home & Garden
Humor
Internet
Nature & Pets
Real Estate
Religion
Self Improvement
Shopping
Society
Sports & Recreation
Technology
Travel & Leisure
Uncategorized
World Events
Writing & Speaking

Change Number of Results:
50 - 100 - 200 - 500
Article Reprint Rights
Creative Commons License

This work is
licensed under a
Creative Commons
License


You are not required to show the creative commons license notice when you reprint this work.
Article Statistics
Word Count: 1819

Total Views: 3533

Article Rating: 1.20 of 5
Votes Cast: 5

More Articles By Author:



Last Distribution Date:
2007-03-15 18:24:00

Internal ID: #4556





All Articles are Copyright © 2001-2019 of the Defined Authors.

All other material and images on this site are:
Copyright © 2001-2019, ThePhantomWriters.com