US Census Guide: How to Get the Most Out of Census.gov

If you ever visited Census.gov before it was updated you’d have found the process of sifting through the plentiful information about America’s economy, places, and people incredibly time-consuming and difficult. Thankfully, the website has been updated, which has made it slightly easier to navigate. However, with so much information available, it’s still easy to miss key features or you may struggle to pinpoint the data you’re looking for.

Therefore, to help get you started and to make sure you’re getting the most out of Census.gov, we’ve put together this handy guide which will show you how to navigate the site and get the results you’re looking for.

Using the Navigation Bar

At the top of the site, you’ll see a navigation bar which contains the links, “Topics,” “Geography,” “Library,” “Data,” “Surveys/Programs,” “Newsrooms,” and “About Us.” So, let’s take a look at each of these to see what you’ll find in each section.

Using the Topics Feature on Census.gov

When you click on the “Topics” tab at the top of the homepage, this presents you with a drop-down bar with a number of further options. These contain the economic and demographic content within certain areas of interest, including population, education, income and poverty, and health.

Clicking on one of these will provide you with a further breakdown of the statistics that are available for this area. For example, if you click on ‘Health,’ this presents you with several more options, including Disability, Expenses and Investments, Fertility, Health Care Industries, Health Insurance, HIV/AIDS, Small Area Health Insurance Estimates (SAHIE), and Social Assistance Industries. As you click into each of these categories you’ll be taken to a new page that’s dedicated entirely to this area. At the top of the page, you’ll see an overview of what the statistics include along with any new releases that are available.

When you’ve found your chosen area and have clicked on it, you can go into much more detail using the additional tabs and sections within each sub-category. For example, on the Disability page, you’ll find information about the data that’s collected, how it’s collected, and what publications have been released. For further information on the specific area, there are also links to related sites or you can contact the team for more information.

Alternatively, if you just want an overview of one of the main categories (e.g. Health) and don’t want to go into a specific sub-category, you can enter the main page by clicking on “[CATEGORY NAME] main” in the white box that’s on the left-hand side of the drop-down within each section. This provides you with a general overview of the data that’s been collected, any news stories, recent publications, new surveys/programs, working papers, and so on.

Using the Geography Feature on Census.gov

Clicking on the “Geography” tab opens up some more possibilities for your data search. Here you’ll find access to an overview of the geography section of the website, “Geography Main.” Or you can refine your search by clicking on the various features available.

This includes cool interactive maps that display things like populations; education tools like blogs that can help you create brochures; metropolitan and micropolitan information; and further details on the Geographic Support System Initiative (GSS-I).

Using the Library Feature on Census.gov

For photos, videos, and audio tools, you’ll need to click on the “Library” tab. Here you’ll find access to all the available publications, infographics, and audio/visual tools available.

For example, if you click into the infographics section you’ll be able to see the latest ones that have been published. Codes for each of these are available so you can embed these into your own website to provide a cool graphic for your visitors.

All of the multimedia available within this section is sorted by their date of release.

Using the Data Feature on Census.gov

Under the “Data” tab you’ll find some great tools that help you find the data you’re looking for. (We’ll delve into the QuickFacts section of the site in more detail below.)

Within this section, you will find more sub-categories that allow you to explore different areas of the site. Helpful tools (like the QuickFacts feature) are located under the tab “Data Tools & Apps,” but you’ll also find a section that’s dedicated to developers.

The developers’ section of Census.gov has been designed to help provide greater access to the stats and data the website’s got available. Therefore, within this section developers can use the application programming interface (API) to reach new users and create custom apps by incorporating the stats found on the website into their own designs. For example, a developer may use the stats to show what commuting patterns there are in a particular American city, or they may show how many homeowners there are within a certain neighborhood.

However, if you’re not a developer, you can gain instant access to some of the apps that are already available. Contained in the “Mobile Apps” section you’ll find a number of free apps that help you process the information that’s available on the site. Or, if you fancy putting your knowledge to the test, you might like to download the Census PoP Quiz!

Furthermore, in the “Software” sub-category you’ll also find some free software that allows you to process, map, extract, display, and/or create tables from the survey and census data.

There’s also a “Product Catalogs” section where you’ll find information that’s been separated into key subject categories (e.g. Business and Industry, Geography, and Housing). Within these sections, you’ll find publications in print, CDs, DVDs, certification services, and reference files and maps.

Finally, for information on combining data and where you can get more training or attend workshops, you’ll need to be in the “Training & Workshops” section.

You can also access to the visual tools through this Data section, too.

Using the Surveys/Programs Feature on Census.gov

To gain instant access to the surveys and programs that have been run throughout the U.S., click on the tab for “Surveys/Programs”. Through the drop-down menu, you can access all of the surveys available, which include the 2010 and 2020 Census, the American Housing Survey (AHS), the Economic Census, and so on.

Clicking on the relevant one will take you straight to the relevant survey while also providing you with more information on the survey. For example, in the 2020 Census section, you’ll find details on things like research and testing, the latest news, and a monthly status report.

If you’re not sure what survey or program you want, you can click on the tab that shows “All Surveys & Programs.” Displayed in alphabetical order, there are over one hundred different ones available for you to choose from.

And, finally, if you ever want some more details on a survey you’ve been asked to take part in you can learn more about this in the “Are you in a Survey?” section.

Using the Newsroom and About Us Sections on Census.gov

The final two tabs on the website are pretty self-explanatory. Within the newsroom section, you’ll find the latest releases and blog/social media posts. You can also get facts for your features, stats for your stories, and press kits here. And if you want to know more about Census.gov, how it operates, who’s behind it, and what their research involves, head to “About Us.”

Getting the Most Out of Census.gov QuickFacts

The QuickFacts tool provided by Census.gov is incredibly useful if you want to refine the data on offer. To access the tool you can either click through from the homepage or go to the “Data” tab before clicking on “Data Tools & Apps” and “QuickFacts.”

Once the QuickFacts screen has loaded up you’ll see a search box where you can enter the state, county, city, town, or zip code – and a drop-down box that allows you to select a fact.

The facts include various factors within several sections:

  • Population
  • Age and Sex
  • Race and Hispanic Origin
  • Population Characteristics
  • Housing
  • Family and Living Arrangements
  • Education
  • Health
  • Economy
  • Transportation
  • Income & Poverty
  • Business
  • Geography

To access the data, simply enter the area you want to look in. The search bar at the top does also give you the option to choose the factor you want to filter by. For example, you may want to look at Oklahoma to see how many people are living in each household. To do this, you’ll type in “Oklahoma” in the search bar before selecting “persons per household” under the “Family and Living Arrangements” section. However, unfortunately, the tool doesn’t filter out all of the other information when you do this, so you’ll still see all the other data among the data you’ve asked for.

Therefore, to get the information you’re looking for your best off entering the area in the search bar, letting the graph load and selecting the section that’s relevant to you from the drop-down menu that’s located at the top of the table. This automatically shows “All Topics” but if you click on it, it’ll display the sections detailed in the bullet points listed above. So, for the previous example we’ve given, we’d select “Family and Living Arrangements” before narrowing down our search to see how many people were living in each household.

You’ll also notice that when your table’s generated, it will show the “United States” and your chosen area, e.g. Oklahoma. This allows you to compare the stats for both, or, if you want to focus solely on the area you’ve chosen, you can click the X above ‘United States’ to get rid of this.

Once you’ve created this table you can then add other areas to it to start comparing. All you need to do is type in the new area in the search box. For example, we might compare the number of people in a household in Oklahoma with the figures for Tennessee. After we’ve typed “Tennessee” into the search bar this will be added to the table next to Oklahoma so we can compare the two. And if you want to get rid of one of your search results, all you need to do is hit the X above the area name.

Because QuickFacts continues to add new areas to the table when you type them in the search bar, you will need to clear your existing table if you want to start a fresh comparison. To do this, just click on the “Clear” icon on the toolbar.

Using the Other Features of QuickFacts

You’ll also notice that, on this toolbar, there are a number of other icons, and these are designed to create interactive features for your searches. For example, after you’ve selected the area you’re looking at, you can click on “Map” to load a full map of the United States. It will highlight the area you’ve selected in red while also showing you all the other states. By hovering over the states you can see the total populations within each. Or, if you select a particular fact from the drop-down menu, it’ll display the total number of people within each area according to the fact you’ve selected.

The chart icon also provides you with another way of comparing your newfound stats with other states in the U.S. To use, just click on the icon after you’ve input the area and fact you want to search by.

And now comes the clever part! The “Dashboard” icon draws all three of the above features into one manageable place, so you can see the table, map, and chart at once. This offers a much more visual experience that you can continue to change and refine according to the topics you’re selecting.

If you do get confused as to what topic you’ve chosen, this is always displayed above the feature you’re using.

Finally, when you’ve found the data you want, you can start to use it by clicking on the “More” button at the end of the QuickFacts toolbar. Here you can choose to print your results, import them into a CSV file (for use with Excel spreadsheets, for example), email them to someone, get an embedded link for your website, or share them on Facebook and/or Twitter.

Although the QuickFacts feature can be a little frustrating to use to start with, by playing around with it for a few minutes you should grasp the concept of it. And once you do, the information that’s available and the features you can use are incredibly useful.

Other Useful Features on Census.gov

U.S. and World Population Clock

To see how rapidly the world’s or America’s population is expanding, the interactive Population Clock is well worth a visit. With a clock counting the population as it grows and some other timers for births, deaths, and migrations, this is a great visual tool.

Here you’ll also find out how the population is changing, being able to see how frequently a new baby’s being born, how often there’s a death, and how the population is growing by region. You can also view the population density by age and sex, viewing how it’s changed over the years.

Additionally, you can find out how large the population of America was on a certain date by entering it into the calendar. This is also available to download and share.

American FactFinder

This tool on Census.gov lets you explore popular facts about your community, while also showing you the data that’s being frequently requested about this area. To find out more all you need to do is put your state, county, city, town, or zip code in the search bar and click “Go.”

Once you’ve done this it’ll take you to a page which shows you the total population and popular tables for this area. On the left-hand side, you’ll also see a number of categories, including age, education, and housing. Clicking on one of these will bring up the relevant data for this category while, again, showing you the popular tables for this section.

However, if you want to refine your search you may find the “Guided Search” option, which is available on the main page of the American FactFinder, helpful. Here you choose from a number of options, including what information you’re looking for, the topics you’re interested in, the location you want, and whether you want to refine your data to a race or ethnic group.

Once you’ve done this you’ll be presented with a list of tables and documents that are relevant to your requirements. This is a much easier way to refine your search!

There’s also an “Advanced Search” option that allows you to search by topics, geographies, race and ethnic groups, industry codes, and EEO occupation codes. You can also search by topic or table name or the area you’re interested in.

Frequently Asked Questions

Within this section, you’ll see what questions people are asking, with popular FAQs displayed on the main page. You can refine the results by topics or find what you’re looking for straight away, just type your question in the search box.

There’s some great information available that will help shed light on your research, the data available, and what goes into the surveys. You can also dip into the glossary for help with any unknown terms.

Conclusion

As you can see there’s plenty on offer at Census.gov, whether you’re looking for the latest mobile apps or you need to produce a table of facts for a new assignment. And, although the plethora of information can seem quite intimidating at first, the above explanation of how to access all of the key areas should hopefully help you find what you’re looking for!

INFOGRAPHIC: The Lies We Tell on Resumes

resume lies

EMBED THIS INFOGRAPHIC ON YOUR SITE

Want to share this image on your site? Just copy and paste the embed code below:

Did Jimmy Kimmel Steal our Map?

We’ve been huge fans of Jimmy Kimmel since the days of “The Man Show” and “Win Ben Stein’s Money”.  So we were a bit shocked when we saw the 3 minute bit Jimmy ran:

 

Notice that map? That’s our map:

map2

 

Hey Jimmy – What Happened to our Logo?

This isn’t the first time Jimmy has been accused of stealing jokes. Last month, Jimmy allegedly stole a whole bunch of jokes from Tina Fey and Amy Poehler at the Oscars. Judah Friedlander also accused Kimmel of stealing a joke.

So I guess we’re not surprised – just saddened. Jimmy literally took the extra effort and completely got rid of our logo or any mention of us.

Since this isn’t the first, second, or even third time, we made a little rap sheet for Jimmy.

Check it out:

 

unnamed

 

We’re not like Jimmy either – that beautiful, royalty free image was taken by Romina Espinosa. Romina, whoever and wherever you are, we’d love to hear the story behind that picture!

Finally – Jimmy and team: Our lawyer says we have a pretty good case. We’re still thinking about it. But we’ll let bygones be bygones if you and Guillermo  sing I’m Sorry, So Sorry  to the backgroundchecks.org team. No need to ask us – just go ahead, do it, and upload to your YouTube channel.

 

 

 

Genealogy: The Complete Resource Guide

2

Introduction

The maxim “know thyself” was well known among the ancient Greeks and to this day people still recite those wise words – especially when searching online for “how-to-genealogy.” Casually known as one’s family history or tree, genealogy is the study of family lineages and defined by the Society of Genealogists as the “…establishment of a Pedigree by extracting evidence, from valid sources, of how one generation is connected to the next.” In addition to helping individuals figure out their roots, genealogy can also offer a more-detailed view of their family’s role in the grand scheme of history.

While many people are motivated by the possibility of discovering that their relatives may have been wealthy or famous, it can be illuminating to learn about one’s own heritage and rewarding to pass that knowledge down to future generations. Genealogical information can bring families closer together, offer a new perspective, and guide future decisions. Best of all, it allows one to… know thyself.

The Practical Importance of Genealogy

Genealogy offers a wealth of information and sometimes its findings have a significant impact on people’s lives. Throughout history, kinship and descent often demonstrated legitimate claims to power and wealth. Although not many people these days have an official claim to an iron throne, there are still several reasons why outlining a family tree can lead to big life changes.

Medical History

It’s no secret that many health conditions and ailments are hereditary, meaning that they were transmitted at birth from one’s parents. For those who have been or could have been passed down a hereditary medical condition, preventative measures can lead to much-improved health. This is where genealogy can be a literal life saver. Studying family health history can identify the necessary steps to avoid harm. For example, someone with a family history of skin cancer can take preventative measures like staying out of the sun and loading up on the sunblock. Additionally, doctors use family medical history to determine the type and frequency of screening tests, make recommendations for lifestyle changes, assess risk, and identify other related conditions. In order to create and track a family health history, individuals can use My Family Health Portrait, a tool provided by the U.S. Surgeon General.

Legal Reasons

Being able to prove that you’re related to someone can also have significant ramifications in regards to taxation, land ownership, estate administration, and forms of inheritance. Additionally, when conducting family history research, there are many genealogy-related terms that may pop up on legal documents. For example, a “dower” is the share of a husband’s real estate to which the widow is entitled upon his death and a “relict” is the widow of a deceased individual. Navigating the legal landscape can be difficult without the help of a professional, but there are resources out there that can aid the amateur genealogist. One is the FamilySearch Genealogical Dictionary of Legal Terms and another is the paperback book Genealogy and the Law.

Proof of Lineage

There are various reasons for why family ties are severed over time, but fortunately, there are numerous resources available to individuals looking to retrace family connections. This may apply to the adopted who are looking to find their birth parents or mothers looking to find their children given up for adoption. Alternately, genealogical resources can be used to determine the biological father of a child.  

History of Genealogy

As mentioned earlier, throughout most of history, kinship and descent were often the impetus for maintaining genealogical records. Their primary role was to demonstrate legitimate claims to power and wealth, while heraldry was also used to track the ancestry of royalty through armorial bearings. In the United States, several organizations emerged in the 1800s that began to gather genealogical records, including the New England Historic Genealogical Society and the Genealogical Society of Utah, which later became the Family History Department of the Church of Jesus Christ of Latter-day Saints – and they eventually launched FamilySearch. Today, especially after the spread of the Internet, interest in genealogy has expanded largely due to access to resources, which range from websites to societies.

Getting Started

While all this talk of legal terms and genealogical societies may seem intimidating, one of the most efficient ways to research family history is to simply talk to relatives. Don’t be afraid to put pen to paper and start sketching out a family tree, because grandparents can offer a wealth of information. The key is to start at the present and work backwards. Relatives can offer invaluable leads that will fill in the blanks and save time. To keep track of collected material, you can employ a pedigree chart, such as this free one offered by Progeny. Or you can print out a family group sheet. Once you’ve collected all the information available and have your leads, you can begin the hunt for official records.

Types of Records

There are dozens of different types of records that can be obtained to shine a light on one’s ancestry, though the process can often be time-consuming. In order to properly organize a search, it’s important to figure out what type of information you’re looking for and where to access the related records. Relevant records may include—but are not limited to—the following:

  • Medical
  • Criminal
  • Birth and death
  • Immigration
  • Census
  • Marriage and divorce
  • Wills
  • Obituaries
  • Religious, such as Baptism or Bar/Bat Mitzvah
  • Military
  • Social security
  • Tax
  • Cemetery and tombstones
  • Voter registration

Reliability of Sources

When dealing with decades-old paperwork and online searches, it can be difficult to determine which sources are accurate. Fortunately, there are steps that can be taken to help ensure information is authentic.

  • To start, begin research with your family (as mentioned above). Chances are much higher that your relatives have collected documents, photos, and memorabilia that pertains to your family tree.
  • Next, search for original sources. These are defined as the first recording of a document or event and can include facsimile microforms, photographs, unaltered digital reproductions, and the like.
  • Finally, derivative sources can also offer information but do not include original recordings. Derivative sources can include transcripts and indexes, as well as compiled records like local histories, books, and websites—all of which are compiled by a third party.

Tools for Your Search

There are many different sources for obtaining genealogical records and it’s important to cast a wide net in order to get the best results. Here are some ways for you to start your search.  

Local Library

Some libraries have entire departments or buildings dedicated to genealogical records. With the aid of a short list of names or a family tree outline, reference cards can get you the leads you need. Reference cards are often organized in a few different ways: by surname, geographical region, historical event, historical society, or local departments like the police or political office. Assuming your last name isn’t one of the most common, searching the surname will hopefully give you a handful of solid clues, possibly directing you to books, newspapers on microfilm, etc. Even a simple obituary can help fill in the blanks by sharing birth date and location, when or where a person moved, who they married, maiden name and marriage date, and the names of children and their locations.

Capture

Ships’ logs may also be available. Most ships back in the 1600s and 1700s kept ship logs that with information about who was on the ship, where they went, and sometimes even what trade they were in and who they were traveling with. Local census records might help you find potential relatives, but won’t likely offer too much information. Some might provide townships or addresses, while others will simply list first and last names. Additionally, many libraries keep yearbooks tracing back to the 1970s, and some much further back than that. If you have a library with a thorough section, you might even find school records and photos from the 1800s.

Online Resources

The Olive Tree

The Olive Tree has links to many resources, including aforementioned ships’ passenger lists and census records. If you know that a family came over from a specific country, you can find a book of emigrants that lists anyone who left a country and it will often tell you the date and where they went. Some countries also have logs of immigrants that include when they arrived and where they came from.

National Archives and Records Administration

A great resource for U.S. residents is the National Archives and Records Administration, which is a federally-funded collection of public records. It is easy to use, though most searches point you to external links that source from various places on the Internet.

Ancestry.com

Ancestry.com is one of the most well-known names in genealogy. It is a subscription-based service with a three-tiered quality option. It also offers an additional DNA Analysis service for a charge. Once you’re a member of Ancestry, you can link up with other subscribers in your family and share information with each other. The more you network, the more you can find.

Capture

MyHeritage.com

MyHeritage.com is very similar to Ancestry.com and it offers an intuitive design that lets you build your family tree while suggesting possible matches along the way. However, it is also a paid service and it does not offer monthly payment plans. All plans are billed annually and a free trial is unavailable, so make sure you’re ready to make the commitment. The site also analyzes the data in your family tree and can show countries of origin on a map with clickable links to profiles. MyHeritage also offers a DNA collection kits and crunches data to show you things like which months were the most popular to be born in your family or the average life expectancy.

Capture

Genealogy.com

Genealogy.com maintains a forum for people to connect, as well as searchable read-only versions of old articles. The family-tree maker service seems to have a few bugs but has clickable links to help guide you through connections others have made. Though it is not at its prime, the website does offer a great deal of information.

FamilySearch.org

One of the best free resources available is FamilySearch.org, still maintained by the Church of Latter-day Saints. It has a fully functional search that can very quickly pull up census records, ship logs, etc. By simply searching for a known relative, one might be able to pull up their family relationships as well as a photo of the census they are listed on.

Digital Public Library of America

The Digital Public Library of America is another great online resource. This website offers all sorts of wonderful materials that have been digitized and placed online. A brief overview of this resource is included in this video

If you’re not finding the records you were hoping for on other sites then you might want to consider World Vital Records. It is a subscription-based aggregation of 4.2 billion names that’s also a sub-company of MyHeritage.

Surname Index

Another potential resource is the Surname Index, a resource for anyone who might want to know the history of their surname. It is free and a not-for-profit operation, but it is not the most extensive resource. Because it began with its roots in Ireland, most of the entries stem from Irish surnames.

Find A Grave

Though it may sound morbid, a graveyard can also be a great resource for information. Generally speaking, families are buried nearby each other, some of whom are even listed on the same headstone. Photos and recorded details of grave sites across the country are compiled in the Find A Grave index. Each entry has a photo of the headstone along with any information on it.

Capture

Capture

Of course, Google can be a very useful tool for research. To learn more about how to use it, check out this video:

Genealogical Societies

Local historical and genealogical societies bring people together to collect and reconstruct their histories. Societies are generally formed out of necessity by a group of people who have a certain trait in common, be that a historical event or country of origin. Sometimes societies require an application and dues to join, other times they are rather informal, but most are not-for-profit or charity-based. A well-known society is Daughters of the American Revolution, which has collected and pieced together an impressive amount of historical information. Additionally, the National Genealogical Society, Federation of Genealogical Societies, and American Society of Genealogists are three of the major players and would all be great places to start. The larger and more prominent societies tend to offer things like conferences, educational courses, publications, and even special access to online genealogical databases.

Professional Genealogists

When you’ve exhausted your options, or perhaps just your patience, you might consider hiring a professional to help you continue your search. It may sound expensive, but most professional services use individual agreements between the historian and the person hiring them to agree on the terms of their search and the price. If you want to see what you can get for $500, there’s an option for that. Otherwise, sparing no expense to find out about a specific lineage has an option too.

Generally speaking, a genealogist will begin by interviewing family members and scouring historical records. Because they’ve done this for many years they understand how circumstantial evidence for kinship can be found and verified. They can easily turn to and cite sources so they can easily go back if necessary. It would be impossible for any one person to be an expert at the entire field of genealogy so many professionals focus on a specific lineage or region. If you know that your family has lived in one area for quite a while then it would be prudent to hire someone who is local to and specializes in that area. Keep in mind, however, that there is no standard of certification or licensing required for one to claim to be a genealogist. Check out these organizations for leads:

Heritage Consulting

Heritage Consulting specializes in genealogy story creation. Instead of hiring a genealogist specifically they work as a team to exact the details of your past and give you a comprehensive report. The price is per hour and the number of hours needed varies wildly between families.

American Ancestors

American Ancestors began as a project by the New England Historic Genealogical Society. They offer collaborative reports or create lineage mappings. However, at $105 per hour, services aren’t cheap.

Association of Professional Genealogists

The Association of Professional Genealogists is probably the best place to look for a genealogist. It is, essentially, a comprehensive list of genealogists with a biography on each, including the work they’ve done, professional certifications, and even testimonials from clients.

Capture

DNA Testing

Most of the major subscription-based genealogy sites offer DNA testing that could potentially help people decode their pasts, but they come with mixed reviews. When testing DNA, a vial of your saliva is used to isolate your DNA and map out over 700,000 genetic markers. There are a few different types of ways to test DNA; autosomal or X-DNA, Y-DNA, and mtDNA. Each tracks a different part of the DNA and can lead to different discoveries. Check out the following DNA-testing services:

Quick Links

Search Resources

Societies

Find a Professional

DNA Services

Videos

Which States have the Worst DUI Problems?

Although drunk driving fatalities in the United States have been reduced by nearly 50% since the early 1980s, thanks to harsher penalties for DUI’s and the work of awareness groups like MADD, alcohol-impaired driving remains a serious problem on America’s roadways.

In 2018, 29% of total motor vehicle fatalities were a result of alcohol impairment, wherein an operator of a vehicle involved in the crash had a blood alcohol concentration of .08 or greater. The good news is that this is the lowest percentage of alcohol-related fatalities since the NHTSA began reporting alcohol data in 1982. However, the rate is much higher in some states compared to others.

To give you a full picture of the current drunk driving situation in the U.S., we used the latest FBI arrest figures, National Highway Traffic Safety Administration statistics on fatal motor vehicle crashes, and U.S. Census data to rank all 50 states based on the severity of their DUI problem. 

We calculated our DUI severity score using each state’s DUI arrest rate per 100,000 population and the DUI fatality rate per 100,000 population. View the results in the heat map, below
best and worst states for drunk driving

Drunk Driving Statistics: Analysis 

  • The north-central region comprising Wyoming, Montana, and the Dakotas is by far the worst area for drunk driving in the United States, with the four states taking the top 4 positions in our ranking. Wyoming, North Dakota, and South Dakota have the top three DUI arrest rates, while Montana and Wyoming have the two highest DUI death rates.

  • The south is the deadliest region for drunk driving: 7 of the 12 states with the highest DUI death rates belong to the region (South Carolina, Mississippi, Alabama, Texas, Louisiana, Arkansas, North Carolina). 

  • States in the northeast and midwest have the least severe problem with drunk driving: of the 15 states with the lowest DUI severity scores, 11 (if you count Maryland as a northeastern state) belong to one of the two regions.

  • Massachusetts is the state with the drunk driving problem of overall least concern, boasting both the 3rd lowest DUI arrest rate and the 3rd lowest DUI death rate.

  • Montana has the highest share of alcohol-related traffic deaths, at 43%. Followed by Texas at 40%.

  • West Virginia and Kentucky have the lowest share of alcohol-related traffic deaths, with 19%. Yet, Kentucky’s DUI arrest rate of 423.13 per 100K is significantly higher than West Virginia’s.

  • 17 states witnessed a net increase in DUI fatalities, while 33 witnessed net decreases.

  • The state with the greatest percentage increase in DUI fatalities was New Hampshire, posting a considerable 77.80% increase in DUI fatalities over the previous year.  

  • Rhode Island saw the most significant decrease in DUI fatalities, with a 41.2% drop.

States with the Worst DUI Problems

RankStateDUI ArrestsDUI Arrest Rate (per 100K)DUI FatalitiesRate of Total Traffic DeathsDUI Fatalities Increase/Decrease over Prior YearDUI Death Rate (per 100K)DUI Severity Score
1Wyoming3,432676.103430%-26.10%5.8912.65
2South Dakota5,891721.934535%25%5.1012.32
3Montana3,794381.247943%38.60%7.4411.25
4North Dakota5,136678.352927%-38.30%3.8210.60
5Mississippi5,370462.2116325%6.50%5.4610.08
6New Mexico6,464459.6710828%-4.40%5.159.75
7North Carolina27,915518.8242129%5%4.059.24
8South Carolina15,188344.4829128%-4.60%5.729.17
9Alaska3,148429.032936%31.80%3.938.22
10Wisconsin24,368425.2619934%5.30%3.427.68
11Texas69,643259.58143940%-2.80%4.937.52
12Maine5,811434.174230%-14.30%3.147.48
13Colorado20,353410.9618830%6.80%3.307.41
14New Hampshire5,053383.604833%77.80%3.547.37
15Oregon13,707369.4615330%4.80%3.657.35
16Kentucky14,812423.1313719%-23.50%3.077.30
17Alabama6,391208.1224626%-7.20%5.037.11
18Georgia23,449347.7937525%5.30%3.567.04
19Idaho5,689365.865825%-9.40%3.316.96
20Arizona19,200291.5228528%5.90%3.976.89
21Arkansas5,761218.2113426%-8.20%4.456.63
22Tennessee19,108300.2824323%-3.20%3.596.59
23Vermont2,576418.371523%-11.80%2.406.58
24Nevada10,984364.518726%-1.10%2.876.51
25Washington27,632430.1916630%-5.70%2.206.50
26Kansas4,554347.948822%-15.40%3.026.50
27Nebraska4,630305.386629%-4.30%3.426.47
28Iowa10,082375.238527%-5.60%2.696.45
29Indiana11,890295.3722726%-13.40%3.396.35
30Hawaii4,288373.483530%-16.70%2.466.20
31West Virginia3,141298.545719%-18.60%3.166.14
32Missouri11,874219.6124026%-2.80%3.926.11
33Pennsylvania43,798346.7933428%4%2.616.08
34Louisiana5,650142.8821628%1.40%4.646.06
35Oklahoma8,660225.0714522%-9.90%3.685.93
36California127,250322.71106930%-6.80%2.685.91
37Minnesota20,186362.3510528%25%1.875.49
38Connecticut7,484216.4411539%-3.40%3.225.38
39Virginia20,885253.4524029%-2%2.825.35
40Florida32,127150.9881426%-3.20%3.825.33
41Michigan26,130265.0726727%-12.50%2.675.32
42Maryland18,150308.7112224%-33%2.025.11
43Utah7,119266.536123%13%1.934.60
44New York25,094262.1830733%6.60%1.574.19
45Rhode Island2,423229.172034%-41.20%1.894.18
46Ohio13,723152.2829428%-10.60%2.524.04
47New Jersey17,230219.6412522%3.30%1.403.60
48Illinois2,82598.5930930%-13.40%2.433.41
49Delaware42744.292825%-9.70%2.903.34
50Massachusetts8,280140.7112033%-3.20%1.743.15

Summary

Overall, when looking at the decrease in drunk driving fatalities and arrests in the United States over time, the situation is promising. As we mentioned in the intro, 2018 witnessed the lowest percentage of alcohol-related motor vehicle fatalities since data began to be compiled on the subject, and 2018 saw a 3.6% drop over the prior year. Promisingly, two of the worst states for drunk driving, North Dakota and Wyoming, had two of the most significant decreases in alcohol-related motor vehicle fatalities (ND = -38.30%, Wyoming = 26.10%).

We still have a long way to go: thousands lose their lives each year in alcohol-related fatalities, which in turn profoundly affects the lives of families across the country, but when it comes to drinking and driving in the U.S., the outlook is a positive one. 

Methodology

In order to rank the states by the severity of their DUI problem, the DUI severity score was calculated using DUI arrest rates per 100K and DUI fatalities per 100K. Rates per 100K were calculated using the latest 2018 FBI Arrest statistics for DUI arrests, and National Highway Traffic Safety Administration statistics for DUI fatalities. Due to the fact that the FBI arrest data was incomplete and not covering a state’s entire population in some cases, the population figure posted by the FBI was used to calculate the DUI arrest rate per 100 for all 50 states. To calculate the DUI fatality rate per 100K, the latest census population data was used. Note: 2018 Iowa arrest data was not available so data from the 2017 FBI report was used in its place. 

These are the Most Sexually Diseased States in the U.S.

Updated: October 5, 2017

Since we first looked at the data, the CDC has published new findings, with new data from 2016 available. It’s only gotten worse, but state rankings have changed. Read on.

stdHeatMap_

With the popularity of hookup apps like Tinder and Grindr, finding casual sex partners has never been easier, but the increasing convenience of enjoying one-nighters has come with a cost: STD rates are surging in the U.S. like never before. Check out the full details and study below.

In alarming news for sexually active singles, CDC reports found that STD rates rose again in 2016, reaching an all-time high by topping 2015 figures, which previously stood as the worst year for STDs in the U.S. The problem is so bad that many experts are labeling the surge in STD rates a national epidemic.

In order to keep you informed about which areas pose the greatest risk, we compiled a nationwide ranking of states by the frequency of STD infection. This report was created by taking local county and state health data, social media surveys, and CDC data on the rate of incidents per 100k residents for the two most common STDs, gonorrhea and chlamydia, and calculating a weighted average between the two. The results may surprise you.

Compared to our earlier 2016 rankings, perhaps the biggest story from the 2016 CDC data is the increase in reported gonorrhea cases. The top ten worst states all experienced a rise in the rate of gonorrhea per 100k residents. In Alaska (#1), Mississippi (#2) and Georgia (#4), the rate rose by more than 40 per 100k, enough for Alaska to maintain its status as the worst state in U.S. for STDs, and for the latter two states to move up several positions in the rankings. The across-the-board increase in gonorrhea infection is startling, and many experts attribute it to the rising prevalence of antibiotic-resistant strains of the disease.

Chlamydia rates also rose in most states, and remains the most common STD in the nation, which is often attributed to the fact that most people infected do not experience symptoms.

Some states were hit hard in 2016: Delaware’s (#9) rate of chlamydia infection increased by over 60 per 100k, enough to bring it into the top ten. Mississippi’s infection rate jumped by a whopping 91.9 per 100k, pushing it up to #2 overall.

Other states fared better, including North Carolina (#7), Louisiana (#2) and New Mexico (#5) which all experienced a decrease in chlamydia infections per 100k.

The state moving up the highest in the rankings is Maryland, jumping up six spots from #24 to #18, owing to significantly elevated rates of both gonorrhea and chlamydia. Next is Delaware, climbing five spots from #14 to #9. There is a four-way tie between Georgia (#4), Indiana (#23), Virginia (#25) and North Dakota (#26) for third greatest increase as they all moved up three places in the rankings.

Hawaii experienced the greatest drop in the rankings, falling eight spots from #20 to #28 due to a decrease in the chlamydia rate per 100k residents. Three states — Texas (#16), Tennessee (#22), and Michigan (#27) — fell four spots each, while three others–North Carolina (#6), Colorado  (#30), Vermont (#50) — went down three spots.

Significantly, thirty states either maintained their previous position or only moved one place in the overall rankings.

The Most Sexually Diseased States

RankingStateChlamydia rate per 100,000Gonorrhea rate per 100,000Weighted Disease ScoreFebruary 2016 RankingChange in Ranking
1Alaska771.6196.9484.310
2Mississippi672.1239.2455.742
3Louisiana679.3230.8455.12-1
4Georgia614.6201.2407.973
5New Mexico628.6168.6398.650
6North Carolina577.6196386.83-3
7South Carolina575.5187.8381.76-1
8Arkansas562192.5377.391
9Delaware567.2179.9373.6145
10Oklahoma548.4193.6371.08-2
11Alabama553.6173363.310-1
12Illinois561.4164.8363.111-1
13New York552.8146.5349.7130
14Ohio520.9176.4348.7151
15Missouri507188.7347.9172
16Texas520.4154.6337.512-4
17California506.2164.9335.616-1
18Maryland510.4158.5334.5246
19Arizona511.5151.3331.4190
20Nevada506.7151.5329.1222
21South Dakota504.5147.8326.2210
22Tennessee489.4154.2321.818-4
23Indiana466142.8304.4263
24Florida467.4138.9303.2251
25Virginia473.2132.2302.7283
26North Dakota456.5132.1294.3293
27Michigan462.9125.5294.223-4
28Hawaii482.1102.5292.320-8
29Wisconsin466112.6289.3312
30Colorado468.6109.5289.127-3
31Pennsylvania444.7114.1279.430-1
32Washington435.9114275.0331
33Nebraska432.3113.7273.032-1
34Kentucky413.2131.3272.3351
35Oregon432.5108270.3361
36Rhode Island467.367.8267.634-2
37Kansas417.6115.2266.4381
38Montana427.583.9255.737-1
39Minnesota413.293253.1390
40Iowa415.683.2249.4400
41New Jersey385.391.1238.2410
42Massachusetts394.573.3233.9431
43Connecticut387.476.1231.842-1
44Wyoming351.546.9199.2440
45Idaho356.338.4197.4450
46Utah315.770.1192.9460
47Maine312.633.9173.3481
48West Virginia261.449.8155.6491
49New Hampshire260.634.3147.5501
50Vermont269.920.1145.047-3

How to Survive Identity Theft and Fraud Online

125016_IdentityTheft_op1_092017

If you’ve never been a victim of identity theft, consider yourself lucky. Millions of people have had to fight their way out of serious financial trouble because of one wrong person getting hold of their personal information.

Identity theft is possibly the worst cybercrime of all, one that can easily destroy a lifetime’s worth of reputation, finances, and credit history, which can take years to recover from.

A 2017 study by Javelin Strategy & Research found that about 15.4 million consumers in the U.S are victims of identity theft in one form or another, with an estimated total of $16 billion stolen – and the numbers keep rising each year.

If you’ve fallen victim to identity theft, this resource is your survival guide on how to gain back control, steps to recover from fraud and identity theft, as well as many useful tips and helpful information to protect yourself from being a victim of cybercrime in the future.

Identity Theft: The Facts

  • Statistics from the Bureau of Justice Statistics states that about 7% of people over the age of 16 were victims of identity theft. That may not seem like a lot, but when you take into account that there were 242 million people over 18 in the US in 2014, that would mean over 17 million people were taken advantage of.
  • The bureau also reports that 14%, or 2.5 million, suffered financial loss from identity theft.
  • Women are more likely to have their identity stolen than men, at 9.2 million women compared to 8.3 million men.
  • When dividing by race groups, Caucasians have a rate of 8%, African Americans are about 5% – as are Hispanics. Incomes of $75,000 or more annually were targeted most, at theft rate of 11%.
  • 52% of victims reported they were able to resolve the issues in a day or less, but 9% spent more than a month working on fixing the damage done. 29% of victims that spent more than 6 months resolving problems due to identity theft reported severe emotional distress.
  • Surprisingly, children are 51x more likely to have their identity stolen than adults would be. They are vulnerable to someone who might try to manipulate them because they don’t realize the risk. The vast majority of child identities stolen are used to open credit accounts and to substantiate loans, often by family members or relatives. Parents usually warn children about sexual predators and being modest on social media, but what they don’t usually think about is people who might pray on their naivety online and get them to give up pertinent information that would compromise their identity security.

Statistics Around The World

  • According to NASDAQ, “Data breaches totaled 1,540 worldwide in 2014 – up 46 percent from the year before – and led to the compromise of more than one billion data records.”
  • 55% of breach incidents are from a malicious outsider who was intentionally trying to get in and steal information. 25% came from accidental loss and 15% came from a malicious insider.
  • The most hacked area was North America, accounting for 76% of the known breaches around the world. 72% occurred in the United States alone. The United Kingdom accounts for 8% of the breaches, Canada carries 4%, Australia accounts for 2%, and Israel and China both carry 1% of the burden.
  • As for credit card fraud, the United States only carries about 24% of the credit cards in the world, yet 47% of credit card fraud. Countries that have adopted the EMV or “chip” card have shown significantly lower occurrences of fraud. The United States’ slow adoption of the technology is suspected to be the reason their rate of fraud is much higher.

Identity Theft

Different Types of Identity Theft

Before delving deeper into understanding identity theft, let us first look into some of the common terminology used in reference to these crimes:

Phishing 

Misleading emails that manipulate people to enter confidential information. This could be someone pretending to be a bank representative, a health service or medical assistant, or even a credit card company.

Perhaps the most notorious incidence of phishing in recent memory was the 2016 hacking of Hillary Clinton’s presidential campaign chairman John Podesta’s e-mail account by Russian hackers. The email in question asked for Podesta’s account password, and was in fact spotted by an aide and marked as suspicious, however in the aide’s memo he made an unfortunate typo, writing that the email was “legitimate” rather than “illegitimate”. This costly error resulted in Russians gaining access to tens of thousands of emails which were the then handed over to the organization Wikileaks, who released the emails in calculated intervals over the course of the campaign, causing a public uproar and potentially costing Clinton the election.

Smishing

The same concept as phishing, but done through SMS or text messaging. This type of scam has grown more and more prevalent in recent years as criminals directly target people’s’ principal means of accessing the internet and email. A person may receive a text message requesting private information like a bank PIN number or email account password.  

Another common scam is a text tailored to resemble a personal message with a request to view the presumed sender’s social media account. Clicking the link will result in the user being directed to a hazardous URL where his or her information may be compromised. The results of smishing can be just as devastating as any other identity theft, as in this 2016 scam when three Santander customers lost a combined £36,200 ($46,772) within a month, money that the bank declined to refund.   

Wardriving

When someone hacks into a wireless network and installs spyware. This allows them to see what IP addresses are being used and what each device is doing, including personal information, usernames, passwords, and much more.

Surprisingly,  wardriving itself is not illegal in the United States, depending on the techniques used for one to gain access to a network. There is an active debate within the internet community over the ethics of the practice.

Keylogging

Software installed either by a hacker or virus that logs every keystroke done on a computer. This key logging software reports each keystroke to the person who planted the software and can easily be deconstructed to provide them your usernames, passwords, social security information, and any other personal data they find interesting. Keylogger malware is not very complex, yet it does not have to be in order to be effective.

In 2016, cyber criminals using the keylogger program Olympic Vision were able to hack into the computers of employees of companies spanning 18 different countries in Asia, the United States and the Middle East. With a technique similar to a phishing scam, the criminals sent emails posing as business partners requesting pertinent information, yet with the malware attached. Once the malicious software was installed, it used keystroke analysis obtain all types of confidential information and login passwords.

Skimming 

Devices designed to be placed over ATM and gas pump card slots that still allow the card to work, but also store the credit card information. When the person who placed it retrieves the device, the information of every credit card used during the time it was installed is then accessible by the thief. The thief then uses that information to create duplicate cards and make purchases.

The continued rise of skimming, particularly at gas stations, has prompted companies to update their payment devices with EMV technology, which reads a small chip inside the card, rather than the card’s magnetic strip. However, skimmers are still ubiquitous; typically found installed at small, isolated fueling stations at pumps farthest from the cash register.

Shoulder Surfing

When a person looks over your shoulder at an ATM or other place you may be using a debit card and entering your pin number. They can get your card account number and then learn your pin number by watching you enter it. From there, they would be able to use your debit account anywhere they want.

There is little concrete data on the frequency of shoulder surfing or the most vulnerable situations where one is susceptible to the practice, however a 2017 case study conducted by Media Informatics Group of LMU Munich, Germany concluded, based on a survey given out in the United States, Germany and Egypt, that the overwhelming majority of shoulder surfing involves strangers reading text conversations on the smartphones of strangers for the sake of boredom and curiosity without malicious intent or dangerous consequences.

Companies

In the first half of 2016, there were a record-breaking 621 mass data breaches reported worldwide. These are hackers who are attacking large companies and corporations, attempting to break into their databases and pull out any stored financial or personal information on their customers and clients.

  • Target – In 2013, the US store was compromised and 40 million credit cards were stolen along with 70 million customer accounts’ information.
  • Anthem – in 2015, they reported a data breach that had been going on for weeks. Someone had broken into their IT department’s records, potentially exposing each client’s name, birthdate, social security number, income data, etc.
  • Home Depot – in 2014, they were attacked via a vendor through their computer’s network and 56 million credit card numbers and 53 million email addresses were stolen.

Major companies may have better security but can also be a more tempting target for potential hackers because of the wealth of information that could be retrieved if they were successful. Obviously, the attacks on Target, Anthem and Home Depot were a huge pay-off for the hackers and a catastrophic financial nightmare for the companies and, at minimum, a significant inconvenience for their customers.

How Identity Theft Happens

Emails

So how does personal information get out into dangerous territory? 23% of identity theft begins with phishing emails. Potential scammers send emails posing as a legitimate business that a person may or may not already be associated with (i.e.: a bank or credit card company) and manipulate the victim into giving them pertinent confidential information. This release of information ultimately leads to their financial accounts and/or identity being used without their permission. A phishing email is usually recognizable because the sender is asking you to verify your information through a non-secure online source. Also, generally speaking, a legitimate business would not contact you through email if there were any sort of breach of security on your account; they would either call a customer directly and/or just shut down their card.

Websites

Sometimes, scammers will set up legitimate-looking websites that are really just a ploy to acquire the user’s information. This could be in the form of a merchant website online where the user thinks they are buying an item that they never receive and, instead, have their information stolen. Other times, the scammer will make a page that looks and acts just like a well-known or reputable bank or credit institution but with a slightly different web address. The user trusts the site because it looks like a real one, enters their information, and never hears back from the site, only to find out that their information was stolen and misused.

Third parties

In addition, many people don’t realize that large corporations and popular businesses routinely sell their users’ information. These companies are required by law to put into their terms and conditions that they are able to sell your information but very few people actually look into that information when filling out forms online. By selling that information to third parties, it opens people up to spam emails, mail, phone calls, and a whole host of other problems. In recent years, major companies such as Google and Facebook have come under fire for these practices and it has becoming increasingly difficult to avoid your browsing history being exploited for market research and financial gain.

IRobot, the company behind the automated vacuum Roomba, has recently courted controversy when details leaked that it may begin to sell the data gathered by higher end Roomba models in the process of cleaning a home. Roombas use these data about the location of furniture and household appliances to more effectively tidy up a room. However, experts speculate that a Roomba would also be able to determine information about owners private lives based on lack of certain household items, or, for example, the presence of a baby chair in the living room, and sell it to advertisers who would be able to target people with alarmingly specific offers catered to their speculated needs.

Phone

In 2014, 54% of people reported that their fraudulently used information was initiated by a phone call. Most commonly, a scammer will pose as a representative from a financial institution and tell the victim that they have had suspicious activity on their account and that they need to have the victim verify information. It is only later that the victim realizes that they’ve been lied to and that they basically handed over their entire security to a stranger on the phone.

Physical collection

Another way your information can be compromised is by physical collection. If you’ve ever lost your purse or had your wallet stolen or even left a credit card behind at a restaurant, you are in danger. Additionally, personal information can be acquired by dumpster diving or digging through trash to find anything that was discarded without being shredded. Most banks and doctors’ offices have policies in place where they are required to shred personal information, but it may not occur to people that their trash from home might be gone through either by people they allow into their home or predators who could dig through your trash bin out by the road before it is collected. Any acquisition of a physical piece of identification puts someone at risk.

Information accrued from items thrown out in the trash–whether it be a gas bill or a grocery list–can allow a scammer to learn highly specific information about a homeowner’s personal life. The thief can then use the knowledge in a very convincing phishing or phone scam.

This type of scam seem far-fetched and highly unlikely, but it has been documented:

Through the years, I have been amazed at the things you can find in the trash. There is big business for identity thieves in personal garbage. More importantly, once you put your garbage out on the street for trash pickup, it usually becomes open to the public. This means that if I am so inclined, I can take that garbage and bring it home, which is exactly what I did. Each week I would snap on my rubber gloves and go through every item of trash: grocery store shopping lists, sticky notes with phone numbers, a private invitation for a little girl to a friend’s birthday party, and much more. As I continued to go through the managers’ trash, I was able to compile a list of their service providers: water bill, phone bill, gas and electric, cable, and so on. I could use this information not only to gain access into their lives but, if I wanted, to take over their lives.

Ultimately, I decided to use the billing information for the bank managers’ Internet service providers as an access point for my attack. Using the information I gained from the bills, I contacted the managers and explained that I was from that company. I told them that we were updating our services and that, for them to continue to have Internet service, they would be required to install updated software. I explained that the software would be arriving within the next week.

Because I was also able to reference their past billing information during the call, the victims never suspected a thing. Within a week, they each received a package in the mail that contained “upgrade software” and instructions. One by one, the managers installed the software.

Of course, the software they had just installed was actually malicious and designed specifically to allow me to access their computer via the Internet from anywhere in the world. Shortly after they installed the software, I was on their computers going through all their files. Within a few short days, I had usernames and passwords to corporate systems and even VPN access, which allowed me to connect directly to the financial institution’s internal network.

Prevention Plan Checklist

There are a few warning signs that personal information is or could be compromised. If a red flag is raised, a lot of damage can be avoided.

Debit/Credit Card

  • Make sure that no one seems too close or nosy when entering a pin number into an ATM or other debit machine.
  • Turning the card reader away from prying eyes or shielding a pin code when entering it should be done every time.
  • If anyone seems nosy, wait and let them go first and then finish after they leave.
  • Beware of people snooping through personal documents at home or work as this could lead to a compromise of security.

Web Safety

  • Notice that there is a difference between https:// and http://. The “s” will tell you if the site is a secure, or encrypted, site. This means that potential thieves cannot easily pilfer information you provide on this site.
  • In addition, a secure site will show a picture of a closed padlock next to the domain name.
  • Check to see if the link presented to you in an email or text message is legitimate. Any text can become a clickable link but what it links to is obscured. Most popular browsers allow the user to hover over the link and it will reveal the true link at the bottom of the page or next to the link. This way, the user can see the link they’re presented with before clicking and accidentally exposing themselves to danger.
  • Another precaution to take is to enter the link into com which, “analyzes a website through multiple blacklist engines and online reputation tools to facilitate the detection of fraudulent and malicious websites”.
  • For shortened URLs, like bit.ly/ addresses, use Sucuri, which will expand the short link and search the actual destination link to make sure it is safe.
  • Do not click on any attachments in emails from unknown senders as they could automatically download malware software onto your computer that can be nearly impossible to remove.
  • Use trusted browsers that have built-in phishing protection. Firefox, Google Chrome, Internet Explorer and Edge are all designed to alert you of phishing websites before they are entered.
  • Any site that utilizes pop-up advertisements and has obnoxious ads should raise a red flag. These sites are usually created to generate income for the owner and more filler than actual useful information. Sites like these are more likely to be used for phishing and tricking the user into downloading malware.

Phishing

  • If anyone calls and requests personal information, immediately be suspicious of their identity. If they are truly from a bank, they should be able to verify your information to you, not require that you verify it with them.
  • If you did not initiate the call, you can’t be sure that they are being honest about who they are. A good way to check that they are able to confirm multiple points of information about your account, including current balance or recent purchases.
  • Avoid any ploy that is emotionally charged or tries to create a sense of urgency, especially where scammers might try to make you feel scared or vulnerable. This is the easiest way for them to make someone give up personal information.
  • Be aware that any emails that come to your inbox from an unknown user with an emotional plea for help is likely a scam. No, there isn’t a prince in Nigeria that needs help unlocking his multi-million dollar inheritance and needs your bank account information so he can reward you with a financial gift for helping him. While cultural familiarity with the old “Nigerian Prince” scam may lead one to conclude that it’s no longer an effective means of identity theft, the FBI reports that millions continue to be taken each year in such scams, and they come in a number of guises, so beware.
  • Check the email address from seemingly reputable companies. Generally, you will find a noreply@amazon.com or similar return email address. If the domain name after the @ symbol is not the corporation’s name, raise that red flag and proceed with caution.
  • When using Gmail, utilize the “authentication icon for verified senders” which will show a key symbol next to verified users. This should automatically be enabled with each account.
  • Be concerned if the “To:” and “Cc:” fields are addressed to multiple users. This generally means that random email addresses were generated using a computer and they’re just hoping someone bites on their scam.
  • Notice misspellings or improper grammar usage. Any legitimate company will not use poor grammar and punctuation. If it sounds fishy, it probably is. Oddly enough, the obvious misspellings and typos in an email are occasionally part of the scam. By ensuring that clever people trash the email, they are isolating the most credulous targets for follow-up emails.
  • Always check the domain name of the site you are on. If you think you are on twitter.com but the domain name is T V V rather than TW, it is likely a scam site setup to mirror a real site.
  • If an email claims to be from law enforcement and states that you are legally required to provide information, immediately call your local authorities. Law enforcement does not use email to contact people. Ever.

Strengthen Your Data Security

  • Be aware of which network you are logging into. People are susceptible of scams in public places such as coffee shops that offer open wireless networks as hackers often create “evil twin” networks with names that are nearly identical to those of the establishment’s to lure unsuspecting people into logging in and then stealing their information.
  • As a rule, avoiding malware in any form is integral to security. Malware is identified as any software that is intended to damage or disable a computer. Apple computers are generally regarded as safer from malware because viruses are harder to create for their operating system along with them being less appealing because they are less used globally than windows computers.
  • However, they are not impervious to spyware, which is software used to retrieve a user’s personal information by covertly stealing data from a hard drive. Installing a network protection program such as Norton Anti-Virus can block infected downloads, warn you about known social media scams and flag suspicious content. Regular operating system updates also protect against the latest spyware.
  • Using encrypted sites was mentioned in passing before but it is of utmost importance and needs to be remembered. If a website begins with http:// it is NOT encrypted and any information entered on it is subject to being public information. Only sites that begin with https:// are encrypted.
  • Alternatively, if you would like to take a more proactive stance at protecting online predators from getting your IP address, you could utilize a VPN, or Virtual Private Network, service.

VPN services mask your IP address and give you a generalized IP address from anywhere in the world you choose. Hackers won’t be able to use your IP address to access your confidential information any time you are utilizing this tool. Even better, it can be used on any computer, laptop, tablet or smartphone via a downloadable desktop application or smartphone app.

  • Passwords should be changed every 4-6 months, especially those linked to financial and medical institutions.
    • Use a complex and unique password, utilizing capitalization, numerals, and symbols wherever possible.
    • Also, passwords should not be the same across the board for every login.
    • As complicated as it can be to remember each password, there are mobile apps for smartphones as well as desktop applications that keep track of passwords for you.
      • One highly recommended one is called LastPass, which is available for Android, iOS, and Windows Mobile for free. It not only stores your passwords in a safe place but also has a strong password generator. It is integrated into your phone’s browser and will automatically fill in login details for you. Users can choose to generate new, secure passwords and it will automatically add or update their list for them. This makes changing passwords easy to keep track of. It also syncs with your other devices seamlessly, allowing family password sharing.
      • Another app option is called Keeper and is available for free on iOS, Windows Phone and Android. Not only does it keep passwords but it also can secure personal information and share it with trusted contacts directly from the app. It, too, has a password generator and can auto-fill login information. It offers iCloud backup and syncing for a charge but gives you a free 30-day trial.
  • If trusting apps isn’t appealing or if you don’t own a smartphone, you could also keep a written list of usernames and passwords in a secure location.
  • As technology progresses, more secure technologies are becoming available. This includes, but is not limited to, voice recognition, iris-scanning, and fingerprint recognition.
    • The fingerprint is already being utilized in iPhones, the HTC One M9+, the Samsung Galaxy A8, and a handful of others.
  • Even better, apps that allow purchasing or could benefit from added security are using the fingerprint software built into these platforms.
    • Already, Amazon.com, eBay, the iTunes store and many others are encouraging users to utilize the fingerprint in place of a password not only for ease of use but increased security. It doesn’t hurt that it is much quicker to press your finger to the sensor than to type a username and password.
  • Security extends far beyond the digital realm, too. Making sure that personal documents are shredded rather than just discarded is something most people don’t think about but should. If you don’t have a shredder, there are companies like UPS or The Office Depot that will shred documents for a nominal fee.
  • Finally, make sure you review your credit report annually. Under the FACT Act, Federal law allows you a free credit report from each of the three major credit bureaus once a year. Make sure to run that report every year and review any flags for accuracy. Any incorrect information or reports can be disputed and an audit can be requested to review the information. Yes, it is time-consuming and often arduous but it is absolutely worth the effort. Each of the major credit bureaus — Equifax, Experian and TransUnion — offer a subscription service that allows you to check your score whenever you want but you can access your free reports by going to the Annual Credit Report website. This is a secure, federally-assembled website that asks you for your social security number so make sure you are on a secure computer and in a private place where no one might snoop over your shoulder while entering your information.

Recover Your Identity Checklist

Because it can be embarrassing to admit that you have been scammed, often times (and surprisingly) victims will let their pride get the best of them and will not submit a report – this what a lot of scammers hope for.

The Bureau of Justice reports that fewer than only 1 in 10 identity theft victims report the incident to the police.

  1. Acting quickly is integral to getting your identity back.
    1. The quicker you report it the sooner you can flag your accounts and avoid further damage.
  2. Have a physical copy of your accounts and credit/debit card information.
    1. Make sure it’s stored in a secure place. It’s important to have quick access to the account numbers so you can actively contact and report the lost or stolen cards.
  3. File a fraud alert immediately, even if misuse is only suspected.
    1. A fraud alert will bring up a notification when your credit is run and attempted uses will prompt verification of the user’s identity.
    2. This makes it more difficult for people to use your information, especially if they don’t have a copy of your driver’s license.
    3. You create the alert by calling one of the three major credit bureaus directly. It doesn’t matter which one is called because they are required to report the alert to the other two, saving you the trouble of calling each one directly.
    4. This alert will stay on your report for 90 days unless you call and remove it.
  4. If you are sure your identity is being misused, initiate a credit freeze with all of your compromised accounts.
    1. For this service, each credit bureau has to be contacted directly. A credit freeze is different from an alert because a credit freeze will make it so that banks and other companies that might open a line of credit will be denied access to your credit report, making it much more difficult for the perpetrator to open a line of credit.
    2. It is generally a free service but occasionally there is a nominal charge.
    3. When initiating your credit freeze, remember to request a copy of your credit report.
      1. Each bureau should give you details on how to obtain your report. Otherwise, you can obtain your credit reports online for free. Credit Karma is one of the most frequently used and trusted online credit report services in existence.
  5. File an identity theft report.
    1. This alerts federal and local authorities of the crime. This will give you the momentum you need to effectively fight any fraudulent charges and accounts.
    2. The first step is to file a report with the Federal Trade Commission. This division of the government is set up to help protect consumers and combat fraud, such as identity theft.
    3. Once the report is filed online, they provide something called an Identity Theft Affidavit, which is good to print and keep on file for your records.
  6. File a report with the local police.
    1. Calling in advance is often a good idea so they can let you know what items you should bring with you to not only verify your identity but also substantiate the theft claims. Remember to request a copy, again, for your records.
  7. Contact each of the credit bureaus directly.
    1. Each fraudulent item must have a dispute raised with the bureau it relates to. It is also wise to contact the lenders and collection agencies that are involved. As tedious and time consuming as this may be, cleaning up the mess gets harder and harder as time passes. The more effort you put into shutting down the thief immediately, will ensure there’s less mess to clean up later.
  8. Keep a written log of which credit bureau, lender or collection agency you contact along with who was spoken to, instructions they gave, and what time the calls were made.
    1. Keeping these sorts of notes not only help keep track of all the steps that each company gives to resolve the fraud but also gives the victim leverage if later there is a subsequent fraudulent charge made despite the account flags and credit freeze.
  9. Contact the businesses at which your identity was used falsely.
    1. If you noticed that your social security number was used to rent an apartment, contact the apartment complex. If your credit card information was used on Amazon.com, contact them and let them know about the fraud so that they can cancel any pending payments or shipments.
  10. Once the mess has been cleaned up and you’re ready to open up your accounts again, ask to begin an extended fraud alert.
    1. Contacting each credit bureau directly will activate this service and it allows you to have a heightened security status put on your identity as well as access to two credit reports a year, as opposed to the one allowed normally.

Find Help and Support

If you’re overwhelmed, it’s understandable. It’s almost impossible to stay ahead of the new ploys conceived every day. It might be a wise idea to consider investing in an Identity Theft Protection service. Their job is to watch your back by monitoring new accounts being opened in your name and suspicious activity on your credit accounts. It can be expensive but it’s worth it. Which company you choose depends on whether your identity has been stolen yet or not.

  • If you have already suffered identity theft, you may want to consider a company like ID Watchdog ($14.95 or $19.95/month), whose primary goal is to help you recover your identity, even if the offenses happened before you joined their service.
  • If protection, before identity theft happens, is the goal, a company like Identity Force might be a good option ($12.95/month with a 30-day free trial or $19.95/month).

Resources

Honestly, one of the best resources that I have found is a compiled list of 87 security experts’ Twitter accounts. They tweet daily about the latest trends, news, and security concerns to be aware of. The list can be found here. You can follow them individually or choose to follow all of them at the same time.

Another useful list comes from Heimdal security, which includes over 50 tips and tricks from various security experts.

Below you’ll find more good places to find statistics and more in-depth information on identity theft and keeping security a priority.

39

FreeBackgroundCheck.org Review, 2021

  • Price
  • Accuracy
  • Support
  • Interface/Features

Summary

FreeBackgroundCheck.org is a data-pooling search site that offers many types of specific searching with the goal of getting you information quickly and efficiently. The accuracy of the information, however, is questionable and I would advise any users to do a double check on the information provided just to be thorough.

2.5
User Rating 2.41 (27 votes)
Sending

Pros

  • There is an astonishing amount of results propagated by each search. The probability that you are going to find something on the person you are searching is very high.

Cons

  • Many of the results returned are duplicate and/or incomplete. You may have 5 profiles that refer to the same person with different information in them. They would all be partially correct but none would give a cohesive report.
  • Searching took a long time. Both the initial search and subsequent ones stalled or failed multiple times.
  • Shuffling through incomplete information and incorrect details can get very confusing and concerning, especially when in reference to confused criminal and sex offender records! This is particularly important when you are searching someone you don’t know; You might not know that the information you are receiving is incorrect and that could influence you to make decisions that would be unfounded.

Meh

  • You were able to search many different ways, directing you to specific results that you may be interested. This could be helpful if you are desiring a very specific bit of information.
  • I also found it to be a little disconcerting that my IP address for multiple email addresses was provided. I can’t come up with many good reason why this information should be presented so readily.

Who is FreeBackgroundCheck.org?

I recently had to start over in life after a divorce and, though I had a home, I needed a new roommate. I put a few ads out on Craigslist, Facebook, etc. and got a handful of hits right away. I was particularly intrigued in a gentleman who responded to me through Facebook; I was able to look at his profile and could tell that we had quite a few things in common. I decided, just to be safe, to do a background check on him to make sure I wasn’t letting a creep into my home where my children would be coming to visit.

After a little online searching, I found FreeBackgroundCheck.org and it seemed like a very straightforward site with lots of search options so I gave it a try. My first clue should have been that I could not find any information on the site as to who the company behind the site was, where they were located, or how they started. Most companies will have an “about us” section where they proudly tell you about themselves and how they came into the business. I could not find anything about the company at all, even by searching on popular search engines.  

FreeBackgroundCheck.org Pricing and Available Plans

When signing up, I was offered 3 levels of access: 1 month of unlimited searches for $19.95/month, 1 week unlimited for $4.95, and just a single report for $29.95. I had a few people I could search if this gentleman wasn’t going to work out but I knew I would be making a decision within a week so I chose the 1 week option.

Nowhere on the sign-up does it say that the payments will auto-renew but I assumed it would, as this is how most of these sites work. I looked at my account and it showed my 7 day purchase and now listed it with the term “Trial” next to it. So, I dug into the Terms & Conditions and saw that it was a recurring charge unless you canceled the subscription. So, essentially, every 7 days it would charge me another $4.95 if I did nothing. I am pretty good at remembering to follow through on things like that so I decided it would be ok.

How to Use FreeBackgroundCheck.org?

My initial search took quite a while. I was willing to wait, though, because it showed that it was searching in many areas.

When the search was complete, it returned 54 results! I’m not sure if this is a good thing or bad in my situation, though. I don’t know much about this person other than the information I can find on their Facebook profile that they used to contact me. Because I only had his name and birthdate, I looked through the list to find people that were about 29 or 30 years old. Quite a few entries were returned without a birth date but one entry said the man was 29, which would make him most likely to be the guy I was looking for.

I didn’t know any of his relatives or locations so none of that information was of much help to me but I could see how that might make a huge difference for others.

The report generated very little information. There were minimal details given beyond his name, date of birth, age and address.

It gave only one address for him and then listed 3 sex offenses. This immediately caught my attention and decided to look further into these. The link was clickable but only brought up his profile again; it did not give any information about the offenses themselves.

Below, there were two death records listed but upon looking deeper into them I realized that they were both for other people who had been much older.

5 email addresses were listed but 4 of them were associated with someone at a different address and the person had a different middle initial. The 5th result was, again, associated with a different address and I did not have faith that it was correct.

That is it, honestly… It didn’t give me any more information than that. So, I decided to look at other people that might be him. I asked the gentleman coyly where he was living currently so I could send him a lease agreement to review and he gave me his address. I used this information to make sure I had the right person and was surprised to find that it actually was the correct address but that it was tied to three separate profiles, one with the correct birth date, one older person and one person with no birth date listed.

I checked each profile out individually and the one with no birth date listed 90 (Yes, 90!) traffic violations, most of which were duplicates. It also listed the same 3 sex offenses and email addresses as the original profile. The older gentleman, who I would assume is my guy’s father, gave 5 addresses but listed the current address as the same which would suggest that my potential roommate was living at home with his parents at almost 30 years old. That doesn’t really bode well with me because I would assume he isn’t paying rent there and might not consistently pay me on time. The older gentleman’s profile also listed the same 3 sex offenses and 5 email addresses.

It was at this point that I decided to look into the sex offenses to see if it was even the correct person. Upon searching the state’s sex offender registry it turns out it isn’t even remotely close to the same person, having been born at a different time and living at a different address than any listed for either person. This is concerning because if someone was not diligently checking into the validity of the information provided they could easily accuse someone wrongly of a very serious crime and potentially really screw up a relationship.

I did find it nice that there was a menu on the left of the page that would let you search specifically for criminal records, arrests, court records, sex offender, and many more. If you were looking for specific information, this could be very helpful. All you have to do is click on how you want to search, put in the name and it brings up a bunch of results.

It also lets you search by phone number and address in case you didn’t have someone’s name and just that information. To test its accuracy, I searched my ex wife’s address and, though the house was in her name alone, it lists that house as owned by me and that I am married and the current occupant. That has not been my residence since we split 5 years ago.

How Good is FreeBackgroundCheck.org Data?

I had become very skeptical so I decided to check the validity of the rest of the information being provided by checking my own report. Four results were returned and all four were incorrect. They were someone in a different city with a different middle name and I was nowhere to be found.

I tried, instead, to search my maiden name and that finally returned some positive results. However, none of them were fully correct.

The most correct one listed an old address as the current and then listed two phone numbers that were landlines not connected with either address. It also listed 4 email addresses, 2 of which were incorrect and none of which were current and valid. This is only concerning because I currently have 6 active email addresses that I use on a regular basis for both business and personal effect and they are no secret online and on my small business’ website. The fact that they were not picked up shows a lack of information being reported.

How do I Cancel FreeBackgroundCheck.org?

I decided to immediately cancel my subscription. I didn’t feel like anything I found was trustworthy which made it pointless to search other candidates. It also made me feel like the company itself might give me trouble cancelling which was, sadly, the case. When I had looked up the Terms of Service previously I had noticed a link to cancel the subscription. I followed that link and was directed to a “Send Help Request” with a drop-down menu to choose “Account Cancellation” from. I added comments to let them know I wanted to cancel and then waited for an email in response.

The next day, I received an email apologizing for the lapse in reliable information, confirmed cancellation and assured me that I would not be charged further.

FreeBackgroundCheck.org Final Thoughts

Though FreeBackgroundCheck.org returns a wide variety of information, I did not find it to be accurate or reliable, which is very important to me. When it comes to background checks and sexual predator histories, it is important to be sure that the information you are being presented is linked with the correct person.

I was not able to get the information I desired from this search so I ended up having to sign up for a different search site that came much more highly recommended. At the end of the day, I only spent $4.95 so I wasn’t too upset about the financial loss. Lesson learned!

1 21 22 23 24 25 46