Saturday, June 23, 2007

much ado about "nothing"

I've just started reading "The Globalization of Nothing," by George Ritzer (ISBN: 0-7619-8807-6). His argument is that our culture is moving rapidly from "something" to "nothing" through the proliferation of mass-produced products and services that are centrally controlled, but available everywhere.

A case in point is obvious enough: the fast-food hamburger, which is produced identically in countless towns in multiple countries. The fast-food restaurant, Ritzer says, is a non-place (depersonalized, indigenous to nowhere) selling meat that comes from anywhere ("nothing"), served by employees who function as "non-people" and who can easily be replaced by others without missing a beat.

He cites the local tavern as an example of "something" -- a real place, with a bartender who knows the customers and has a distinct personality, and where the customers have real identities. These places thrive because of the personalization they offer and the reality that the bartender constructs.

"Nothing" is the term he uses for objects or places that are mass produced, not unique, not local, and generally not meaningful. "Something," then, is unique, meaningful, often local, and crafted.

None of these ideas are brand-new, of course, but try applying the concepts of "something" and "nothing" to the internet. To get started, let's look at another example from Ritzer's book: people who inhabit the costumes of Disney characters for their jobs and use scripts to portray their "personalities." If the employees quit, they're replaced by others who inhabit the costume. The enterprise thrives regardless of which person occupies the costume at any given time. Nothing else changes.

Now think of another "costume": for example, an avatar on Second Life. Like the people in the Disney costumes, you might not know what the person behind the avatar looks like outside the virtual world, but each avatar is inhabited by people expressing their creativity...and thus they are unique entities and they create "something," not "nothing."

My point -- and I do have one -- is that "real life" doesn't necessarily offer more meaning than some of the things you can enjoy in virtual life, nor vice-versa....but with some of the same players involved in both, we can -- and often have -- turned "something" into "nothing" again.

Friday, June 22, 2007

7 points about identity theft

Recently, I discovered that another person was using my social security number ... and if you've ever wondered what kind of personal hell that can unleash on your life, here's a brief summary of what's transpired thus far in my quest to reclaim my own identity.

1) Discovery: In my case, I received random emails from my bank about transactions that I never made. I thought they were "phishing" emails at first, but when I read the source code, I saw that there weren't any links embedded in them, and therefore nothing a phisher could use to collect info. The emails looked legit.....just not the transactions. I called my bank, and found out that someone else had opened a new account using my number.

2) Pursuit: You would think that the discovery would be enough to apprehend my intruder. Not!! While the emails I've gotten from my bank have enabled me to piece together the name and account number of my intruder....and googling his name gave me his locale...I've been completely unsuccessful thus far in getting my bank to apprehend him. Why? This leads me to point #3.

3) Proof: Despite the many years that I've had an account at this bank, the burden is on me to prove my own identity. The bank will ask you to sign a W-9 form and show proof of your social security number. But it doesn't stop there....that's just the beginning. Even when you provide the proof, they still want the other person to have ample time to do the same. In fact, they're probably being more fair to my identity thief than they are to me.

I've made several visits to a branch office and showed them the following as proof that I am "me:"

* my original Social Security card, complete with my teenaged signature
* over a decade of W-2 forms
* my driver's license
* my passport
* the annual mailings from Social Security that show how much money would be in my social security fund when I retire, if it wasn't already spent in Iraq...

4) Harrassment: After providing all this evidence, I received a letter from my bank saying that I had three weeks left to prove that my Social Security is mine as opposed to the guy who just opened an account. It demanded that I provide another signed W-9 form as well as a new form that I didn't hear about earlier: form 7028 from the Social Security administration. If I don't convince them that it's my number and not his, they will strip my social security number from my bank account. Hey, no big deal...

5) Phone labyrinths: If you have your identity stolen, you'll spend a lot of time making phone calls and trying to navigate through phone prompts to get you to the right person who can help you solve your problem, or at least make you feel better for five minutes. Other times you'll get a robot. And you'll experience just how much voice-recognition software has improved, or hasn't improved, in the past few years. For example, the robot at the "free annual credit report" number is doggedly persistent and will not connect you to a human, but this robot also has a listening-comprehension problem.

6) Sales opportunities: My bank has used every phone call to try to sell me their $12.99-per-month identity theft program (just $155 per year!). Apparently they might be more helpful to me if I paid them to contact me the next time someone uses my social security number to set up a new account.

7) A visit to Social Security: If you've never done this, you're in for a surprise. I thought I'd be standing on line with a few retirees ... instead, I was sharing a "One Flew Over the Cuckoo's Nest"-style institutional waiting room with over one hundred SSI recipients who were low on their meds. Try not to make this visit if you can avoid it.

My saga is not yet over. My bank tells me that my intruder has till the second week of July to prove that my number is actually his number. So far -- and not surprisingly -- he hasn't responded. When the deadline passes, they will "zero out" that number on his account. But will they pursue him?