NEW CONTENT 01-05-2025

Page index:
Woman learns her identity was stolen when she got a 1099-K - - NEW 03-13-25 - -
Is Your Social Security Number At Risk? - - NEW 01-05-25 - -
Quishing: The Sneaky Side of QR Codes - - NEW 11-10-24 - -
2.7 billion records leaked in massive US data breach - - NEW 09-08-24 - -
Turning Fiction Into Fact: The Truth Behind Home Title Theft - - NEW 08-03-24 - -
Keyless Car Theft Is On The Rise & How To Protect Yourself
How to Protect Yourself From Check (Theft) Fraud
Is Identity Theft Protection Worth It?
What To Do If You’re Billed For An SBA EIDL Or PPP Loan You Don’t Owe
Ten Telltale Signs That Someone Has Stolen Your Identity
How To Safely Wipe Your Phone When Repair Isn't An Option
Military Families Combat ID Theft Amid Life Transitions
You Can Protect Yourself From Identity Theft During Tax Season
Tips To Protect Yourself From Mail Theft This Holiday Season
Email Saying Your Personal Info Is For Sale On The Dark Web?
Is A Credit Freeze Or Fraud Alert Right For You?
Keep Your Personal Information Safe
How To Tell If Someone Is Using Your Identity
Identity Theft Can Happen To Anyone
Stolen identity? Get help at IdentityTheft.gov
7 Ways to Help Protect Your Identity
Your Guide To Protecting Your Privacy Online
Identify Theft

Visit our Active Scam Page for more information on how thieves trick you into giving them your personal information.



The U.S. Government's Federal Trade Commission has a pretty good web site to help you with all kinds things like Privacy, Identity, & Online Security Money & Credit, Homes & Mortgages; Health & Fitness, Jobs & Making Money, and Scam Alerts. Federal Trade Commission Consumer Information




Woman Learns Her Identity Was Stolen When She Got A 1099-K

Here's what to look out for

By: Alicia Smith for Fox News, Mar 04, 2025

(WXYZ) — An Oxford Township woman's life was upended when she received five tax forms in the mail, showing she'd received a bunch of money through a payment app – an app she'd never actually used. It was an identity theft dilemma, and with the tax filing deadline approaching, she didn't know what to do with all of the forms or if she'd have to pay taxes on the money the thieves had received.

When we heard about her problem, I started investigating, and it got a response from the payment app.

If you've sold items on online marketplaces or have a gig job where you're paid through an app, you may receive a 1099-K in the mail.

Monika Bailey of Oxford received five of them at the end of January, but there was a problem.

"I went and got the mail one day, was opening it. And I realized I received five 1099-K forms from a company called Block, Inc. I had never heard of Block, Inc. before. After doing some more research, I realized it was Cash App," Bailey said.

Bailey said the forms indicated someone had opened up not one, but five Cash App accounts using her name, Social Security number and her old address where she lived 10 months ago.

"So, how much income did these forms allege you had received last year?" I asked Monika Bailey.

"They totaled up to about $7,500 between the five of them. And then I'd be responsible for paying that money, the taxes on that money," she said.

"And you don't have a side gig or business where you use any peer-to-peer payment apps?" I asked.

"None," she said.

Monika, who is a pharmacy tech, first called Cash App. The guy I got a hold of told me that if I thought they were fraudulent, I should just throw them away. And I'm like, 'I can't just throw away these IRS forms,'" she said. "I said,' I'll get in trouble if I don't file these at tax time.'"

She's right. But because she did not have an account with Cash App, the company would not help her, even after weeks of trying to argue her case. She wanted the company to shut down the accounts.

So, I contacted Block, Inc. asking the parent company of Cash App to close all five of the Cash App accounts that were opened using her stolen personal information. Two days later, Monika received an email from Cash App support.

"Whatever magic you did within two days, this whole thing was taken care of," she said.

"And when you say taken care of, what did Cash App do?" I asked.

"They looked into it, and they said it was identity theft. They shut down all five accounts. They sent everything in to the IRS that would be straightened out for my taxes this year. And they also had me put a block on my social security number through Cash App so nobody could open another Cash App account in my social security number. So you did magic," Bailey said.

If you receive a form 1099-K due to fraudulent concerns, here are the steps to take, according to the FBI.
• Right away, monitor your credit reports with the major credit bureaus for any suspicious activity and freeze your account for added protection
• Then, file a police report with your local law enforcement agency
• File a complaint with the Internet Crime
Complaint Center.
• Report the identity theft to the Federal Trade Commission

You may need all of that documentation when you do the next step, which is to contact the issuer of the 1099-K form, which is in the upper left corner, and follow the IRS procedures to report the fraudulent form, which may require an identity theft affidavit.

A Cash App spokesperson sent me a statement that reads, If you believe you have fallen victim to fraud or a scam, you should contact Cash App Support through the app, website, or by phone (1-800-969-1940)."

"In my case, we reached out to you and you were more than great and helped through all this," Bailey said.

I want to thank Monika for sharing her story. Her case required her to file "identity theft affidavits" or form 14039 when she files a tax return. She also had to contact the IRS to get an identity protection PIN to protect her tax account.

Return to top of page.


Is Your Social Security Number At Risk? Signs Someone Might Be Stealing It.

Action steps to take if someone is using your Social Security number.

By Kurt Knutsson, CyberGuy Report Fox News Nov. 5, 2024

With most of your life attached to these nine numbers, your Social Security number (SSN) is incredibly important to keep safe. That's why it is crucial to pay attention to signs that your SSN may have been compromised. While preventing the misuse of your SSN is paramount, there are action steps you can take if it does fall into the wrong hands.

Top signs someone might be using your Social Security number:

Are you concerned that your Social Security number may have gotten into the wrong hands? Check below to see if you are experiencing any of these signs:

1) Changes to your credit report and score.

Americans are granted free credit reports every 12 months from the three major consumer reporting companies. Regularly culling through these reports can help you spot potential fraud, which might signal that your Social Security number has been compromised. Any hard inquiries you didn’t request on your credit report are a strong indicator that someone tried to open a credit card or another line of credit with your SSN.

2) Changes to your Social Security statement.

While most people know they should check their credit report and scores, you can see your Social Security statement by creating an account on the official Social Security Administration website. Because only one account can be created per SSN, it is safer if you claim it so that no one else can by piecing together your personal information (along with your SSN) to claim it fraudulently. Make sure it is connected to a secure email account that you check frequently. This account also provides up-to-date data on earnings and benefit distributions so you can see if anything is "off."

3) Strange or new mailings or calls from debt collectors and junk mailers.

While it might seem natural to toss a pile of "junk" mailers or ignore calls from random debt collectors or advertisers, it may be an indicator that someone has gotten a hold of your Social Security number and has begun opening accounts under your number. It’s important to make note of the patterns and follow up with these collectors should it become more and more apparent that your SSN might have been misused. Oftentimes, consumers start getting more credit offers when new credit cards are opened. Additionally, if you start receiving bills under someone else’s name at your address, it might be time to follow up with these notices.

4) New notices from the IRS or other governmental agencies.

If you start receiving notices about your Social Security number being used to file someone else’s taxes or inappropriately use your health insurance, it is definitely a sign that someone may have compromised your SSN. While receiving a notice from the IRS or Medicare can feel scary, it is imperative that you reach out to the corresponding agency to notify them of the fraudulent activity so that you can stop further damage.

Top ways to keep your Social Security number safe:

1) Sign up for a Social Security account.
Go to the official Social Security Administration website to create an account, if you haven’t already.

2) Hide/keep safe your Social Security number card.
Put your Social Security number card in a very safe place, such as a safe, bank safe or a filing cabinet that can be locked. Because it is used so frequently, those nine digits are worth memorizing. If your wallet is lost or stolen, and you keep your SSN card in there, it will be messier than losing just money or your ID. Don’t carry your Social Security card in your wallet or purse.

3) Go online:
Skip jotting down your Social Security number on in-person forms. When your SSN is jotted down on paper, it is hard to control how the information gets used or disposed of. If you can submit forms online, you can skip the risk of having your SSN getting into the wrong hands. If you mail in forms that denote your SSN, you risk having that piece of mail stolen or lost.

4) Opt out of inputting SSN:
Even though your SSN is requested on some forms, it is not always necessary. If a future employer is requesting your SSN, double-check why they need it. They would most likely need it to run a background check, which you should know about anyway. Additionally, some establishments allow you to provide the last four digits of your SSN until you are finalizing a screening process, etc.

5) Combat child identity theft:
Open accounts for your children's Social Security numbers because you want to claim them for them early and be able to monitor any movement related to their SSN.

6) Secure documents:
Some records that contain your Social Security number are important to keep on hand, such as income tax filings. If they are kept digitally, encrypt and or password-protect the document or folder, especially if it is uploaded to the cloud. Keep offline documents with SSNs in a safe or shred instead of throwing them away. Remember you (usually) only get one SSN in a lifetime, it is important to safeguard that data with your "life."

7) Remove your personal information from the internet:
Removing your personal information from the internet, given the increasing privacy concerns about artificial intelligence, is essential. Data removal services can help protect your Social Security number by systematically erasing your details from websites, thus reducing the risk of identity theft. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.

8) IRS identity protection PIN (IP PIN):
To further protect your tax returns from identity theft, the IRS offers an identity protection PIN (IP PIN). This is a six-digit number that prevents someone else from filing a tax return using your Social Security number or individual taxpayer identification number. The IP PIN is known only to you and the IRS, adding an extra layer of security to your tax filings.

How to get an IP PIN:

  • Online request: The fastest way to receive an IP PIN is to request one through your online account on the IRS website. If you don’t already have an account, you must register to validate your identity.
  • Alternative methods: If you can’t establish an online account, there are other methods, but they take longer. You can file an application or request in-person authentication.

    Using your IP PIN

  • Enter the six-digit IP PIN when prompted by your tax software or provide it to your trusted tax professional when filing your return.

  • An IP PIN must be used on all federal tax returns during the year, including prior year returns.

  • Do not reveal your IP PIN to anyone except your tax professional when you are ready to sign and submit your return.

    Important information

  • An IP PIN is valid for one calendar year, and a new one is generated each year.

  • If you lose your IP PIN, you can retrieve it online or have it reissued by calling the IRS.

    By using an IP PIN, you can significantly reduce the risk of tax-related identity theft and ensure that your tax returns are processed smoothly and securely.

    9) Recognizing and reporting a Social Security scam:
    If there is a problem with a person’s SSN or record, Social Security will typically mail a letter. You can learn more about recognizing Social Security-related scams, including how to report a scam quickly and easily online to Social Security’s Office of the Inspector General, by reading more at www.ssa.gov/scams .

    What to do if you think your Social Security number has been compromised?
    If you noticed any of the signs listed above that indicate that your Social Security number may have been compromised, below are action steps you can take:

    1st Reach out to the Social Security Administration immediately:
    Call them at 1-800-772-1213 to put an electronic block on your SSN.

    2nd Contact the three main credit bureaus to freeze your credit:
    This will prevent anyone, including hackers, from wreaking havoc on your credit. Make sure to report any errors on your credit reports with the credit agencies as well.

    3rd File a report
    with the local authorities as well as the Federal Trade Commission.

    4th Submit a Social Security fraud report
    online or call the SSA's Office of the Inspector General at 1-800-269-0271. They can help investigate any Social Security-related fraud.

    5th Use an identity theft protection service:
    Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft how to protect yourself from identity theft.

    Kurt’s key takeaways
    Because your Social Security number has such a significant impact on your life, it is important to pay attention to any signs that it has been compromised and misused. While it may feel overwhelming to see any of these signs that your SSN might be compromised, it’s important to know there are steps you can take to protect yourself moving forward. While paying regularly for fraud protection services may seem like an unnecessary expense when you’re not presently dealing with identity or credit issues, a fraud protection service subscription can help you focus on your present moment instead of worrying about what a criminal might do with your SSN. And if something does happen, you have people in your corner to help you through the process.

    Return to top of page.


    DFCU FINANCIAL

    Quishing: The Sneaky Side of QR Codes

    QR codes have become a staple in our digital diet, popping up everywhere from restaurant tables to concert tickets and even parking meters. They're convenient, sure, but with great convenience comes great opportunities for mischief—specifically, quishing.

    What is Quishing?
    Quishing, or QR code phishing, is a deceptive tactic where fraudsters use QR codes to mislead victims into visiting malicious websites, downloading malware, or divulging personal information. These corrupted QR codes might be found on flyers, stickers, posters, and even digital screens, pretending to offer legitimate links - but leading you straight into a trap.

    How Quishing Plays Out
    Imagine walking down the street, spotting a cute sticker with a QR Code. Curiosity gets the best of you and you scan the QR code, expecting to land on some fun Easter egg or deal. Instead, the moment you scan the code, malware begins to download onto your phone.

    Tips to Avoid Falling for Quishing
    To keep your digital self safe while using QR codes, consider these pointers:

  • 1. Pause Before You Scan: Just because you can scan, doesn’t mean you should. Take a moment to consider why and where you’re scanning from.

  • 2. Verify the Source: If a QR code is on a public poster or an unsolicited mail, it’s worth questioning. Real deals and trustworthy information rarely require you to scan a QR code from a flyer stuck to a lamppost.

  • 3. Use Secure QR Code Scanners: Some QR code scanning apps have built-in security features to check the safety of the links before opening them.

  • 4. Keep Personal Information Personal: If a scanned QR code leads you to a form asking for personal details, think twice. Legitimate companies won’t ask for sensitive information this way.

  • 5. Update Your Security Software: Ensure your phone’s software and any relevant apps are up to date to guard against malware.

    Wrapping It Up
    In the age of instant digital gratification, quishing is a reminder that not every shortcut is worth taking. While QR codes can lead to efficiency and ease, they can also open the door to digital threats if not approached with caution. So, next time you're about to scan a QR code, remember that a quick pause to verify can save you a lot of trouble down the line.

    Return to top of page.


    2.7 Billion Records Leaked In Massive US Data Breach

    If you live in US, this breach could include your data.
    By Kurt Knutsson, CyberGuy Report Fox News August 15, 2024

    A massive database containing over 2.7 billion records has reportedly ended up on a criminal forum. These records belong to individuals in the U.S. and were allegedly stolen from National Public Data (NPD). While the accuracy of the leaked data could not be verified, the hackers reportedly obtained sensitive information such as names, mailing addresses and Social Security numbers. The scale of this breach is so vast that if you live in the U.S., it's likely that some of your data is included.

    What you need to know:
    Bleeping Computer reported that the database was posted on the criminal forum Breachforums, where threat actors often post such leaks. What’s interesting is that the stolen database was up for free download. The user who posted it credited a hacker named "SXUL," saying, "There’s a new player in town." Usually, hackers sell leaked databases like this one for huge sums.

    The database has been stolen from NPD, which collects data from public sources to compile individual user profiles for people in the U.S. and other countries. NPD then sells this private data to all kinds of organizations, such as background check websites, investigators, app developers and data resellers. While the database has 2.7 billion records, it’s important to note that this doesn’t necessarily mean 2.7 billion people were impacted. Many of these records are repetitive, and some are incorrect. Still, the breach affects a significant number of people in the States. This isn’t the first time NPD data has ended up on criminal forums. Bleeping Computer noted that back in April, a hacker known as USDoD claimed to be selling 2.9 billion records with personal data from people in the U.S., U.K. and Canada, which was also stolen from NPD.

    NPD is facing consequences:
    NPD, owned by Jerico Pictures, is facing multiple lawsuits for not protecting people’s data. One lawsuit, filed by California resident Christopher Hofmann, says NPD was negligent and breached its fiduciary duties and a third-party contract. The plaintiff wants the court to order NPD to delete all the personal info it has collected and start encrypting data from now on. They’re also asking for more than just money, like having NPD set up data segmentation, run regular database scans, put in place a threat-management program and get a third party to check its cybersecurity every year for the next 10 years. We reached out to NPD for a comment but did not hear back before our deadline.

    It’s time to invest in identity theft protection:
    Hofmann learned about the data breach through his identity theft protection service, which detected his data in the leaked database. The service notified Hofmann, prompting him to take action and file a lawsuit. Data breaches happen every day, and most never make the headlines, but with an identity theft protection service, you’ll be notified if and when you are affected. See my tips and best picks on how to
    protect yourself from identity theft

    4 ways to protect yourself from data breaches:
    In addition to opting for an identity theft protection service, you can follow these tips to protect yourself from data breaches.

    1) Remove your personal information from the internet:
    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.

    2) Be wary of mailbox communications:
    Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.

    3) Be cautious of phishing attempts:
    Be vigilant about emails, phone calls or messages from unknown sources asking for personal information. Avoid clicking on suspicious links or providing sensitive details unless you can verify the legitimacy of the request.

    The best way to protect yourself from clicking malicious links that install malware is to have strong antivirus protection installed on all your devices. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    4) Monitor your accounts:
    Breaches of this magnitude will make it a necessity for you to start routinely reviewing your bank accounts, credit card statements and other financial accounts for any unauthorized activity. If you notice any suspicious transactions, report them immediately to your bank or credit card company.

    Kurt’s key takeaway:
    If the database leak is legit, this is a big security fail on NPD’s part. Since their whole business is based on collecting and selling data, they should have strong encryption and security in place, especially if this isn’t the first time hackers have targeted them. If they’re putting people at risk, they should be held responsible and cover any financial losses people face because of the leak.

    Return to top of page.


    Turning Fiction Into Fact: The Truth Behind Home Title Theft

    AMAC ENewsLetter

    Webmaster here: This is a very good article about Home Title Theft. It is a real threat. Bad people are assuming your identity and then stealing your Home. That is why I urge you to talk to your Home Owners Insurance agent about coverage. Or, if you wish to get additional coverage, shop around for a reputable Home Title Theft provider.
    I have chosen not to publish the sales pitch at the end of the article.

    Sponsored By: EquityProtect

    Over the last several years there has been growing research and publicity regarding home title, or deed, theft. While the crime itself is very real and very scary, the accuracy of the press has left consumers uncertain of the legitimacy and to what extent they are at risk. So, what is the truth? Are fraudsters across the nation trying to steal your home? Is it possible for someone to steal your home while you are still living in it? Is there any way to actually prevent this crime from occurring to you? In order to truly understand home title theft, one must first determine how it happens and, more importantly, who is at risk.

    What Is Home Title Theft?

    Home title theft is the process of changing the legal ownership of a property, without the legitimate owner’s consent or knowledge, with the intent of selling or refinancing the property for monetary gain. This is typically completed by submitting a grant deed to the county record’s office that reflects a falsified ownership change or sale. The grant deed is a legal document or mechanism that transfers real estate ownership from a seller to a buyer. Sadly, with the advancements in technology, it has become easier for criminals to falsify these documents. With only a few key strokes, thieves around the nation can have documents accepted in any recorder’s office, and with the growing enhancements in artificial intelligence (AI), this process is becoming streamlined.

    How Is This Possible?

    The United States County Recorder a vital organization that compiles millions of documents daily. A county recorder’s job entails keeping public records of actions and transactions that are required by local, state, regional, and national governments. As noted by the California Department of Real Estate, “the county recorder is not responsible for verifying the validity, authenticity or legitimacy of the document that is recorded. In other words, the recorder is not responsible for detecting a fraudulent document, and the recorder does not look beyond the document itself. If the document meets the essential records requirements, and the proper fees are submitted, the county recorder is obligated to and will record the document.” This fact, or flaw some might say, is how and why home title theft is able to occur.

    Furthermore, seller impersonation has risen drastically in recent years. In early 2024, The American Land and Title Association (ALTA) issued a warning that “sophisticated fraudsters are using the real property owner’s Social Security and driver’s license numbers in the transaction, as well as legitimate notary credentials, which may be applied without the notary’s knowledge.” The creativity the fraudsters are now using seems to be ever increasing and with the advancement of AI, where will it stop?

    Now That the Document is Recorded, What Happens Next?

    Once a criminal has control of a home’s title, unfortunately anything is possible. Throughout the nation there have been countless homeowners who have found their properties sold without their knowledge. Here are a few recent examples:
    • Connecticut- A property owner found a $1.5 million home built on what he thought was his undeveloped land.
    • Atlanta– A 77-year-old man was put in hand cuffs while he and his wife were removed from their home after a fraudulent second mortgage forced foreclosure.
    • Dallas- Man poses as pastor and steals home from three different churches through deed fraud.

    While these stories may seem few and far between, the truth is home title theft is happening every day and is on the rise with the recent advancements in technology. Possibly the most notable occurrence was the attempt to foreclose Elvis’ Graceland home in 2024 in which criminals claimed the Late Lisa Marie obtained a $3.8 million loan and failed to pay it back.

    Unfortunately, these horrifically noteworthy occurrences often do not receive their deserved press due to underreporting, not because of lack of care, but simply because of a lack of knowledge. There are thousands of owned lots of land that are never visited and are targets for scammers. The FBI released an article touching on this very topic. Many raw landowners only become aware of the fraud after failing to receive their tax bill for the property, sometimes missing the bill for several years before realizing the issue. This devastating crime can result in an even more devastating amount of money and time needed to correct the fraud filled with daunting legal fees.

    Who Is At Risk?

    The risk for home title theft can be viewed on a sliding scale. The properties with the most risk are raw land properties owned outright, followed by investment properties owned outright. The properties with the lowest risk are homes and raw land plots with a high balance mortgage in relation to the property value. Simply put, properties lacking equity are not at risk of this financial crime and frankly have no reason to be concerned. Statistically speaking, 55% of the population is at risk for home title theft. Properties with a lack of mortgage or substantial equity have an elevated risk associated with owner impersonation which can result in attempts to falsely sell or refinance the property. Properties at moderate risk are those with a loan between 20-50% of property value.

    What Can I Do?

    The are many so-called options for at risk property owners. Historically, the most common recommendation has been to subscribe to a notification service. The premise behind a notification system is exactly as it sounds: it offers the property owner knowledge of a change in title, but only after it has been recorded. The notification of change does not actually stop the financial crime from occurring; it simply notifies the rightful owner they need to take swift legal action. The homeowner continues to be at risk until they are able to regain their title through the legal system. Unfortunately, with a drawn-out legal processes and as criminals often have a sale or loan already in process, it is truly a race against the clock. While notification and monitoring systems may be beneficial for low-risk properties, these companies do absolutely nothing to prevent the financial crime of moderate to high-risk properties.

    Return to top of page.


    Keyless Car Theft Is On The Rise & This Is How To Protect Yourself.

    Wireless key fobs were supposed to make our lives easier, but they also provide new avenues for criminal exploitation.

    Webmaster here – I know it isn’t ID Theft, but it is the Theft of one of your major assets.

    * Using a relay device, car thieves can amplify the signal from your wireless key fob, even if it is inside your house, and use it to unlock your car.

    ** Storing your key fob in a Faraday bag or using a physical steering wheel lock can help guard you from car theft.

    *** As technology evolves, so do criminal methods. Staying current on information is another important way to protect yourself.

    They appear like ghosts in the night, standing outside your house, one holding up an antenna while the other crouches next to the car parked on the driveway. Within seconds, your car is gone, yet another victim amid a surge in auto theft enabled by the technology designed to make it easier to unlock and start vehicles.

    Auto technology has evolved and many newer cars use wireless key fobs and push-button starters instead of traditional metal keys. The fob sends a short-range signal, so when the driver approaches the car, it automatically unlocks the door. This saves you the hassle of digging out your keys when you've got your hands full with groceries.

    But that technology also makes things easier for thieves. The wireless fob will continue to emit a signal even if you're not using it. Thieves prowl neighborhoods at night looking for cars parked outside so they can carry out so-called relay attacks. Using portable equipment that can pick up the faint signal from a fob inside the house or parking lot, they relay it back to a transmitter that can clone the signal.

    Officials have urged carmakers to reduce the security vulnerabilities and warn owners about the risks.

    So what can you do to reduce the odds that your car will be gone in 60 seconds? "It’s relatively easy for drivers to protect themselves," said Steve Launchbury, principal engineer of automotive security at Thatcham Research, a U.K.-based automotive risk intelligence company. Here are some tips:

    USE A SIGNAL BLOCKER

    A simple but effective way to stop auto bandits from purloining your key fob signal is to use a Faraday bag or pouch. They're lined with a conductive metal mesh that blocks the transmission of electromagnetic signals.

    The pouches aren't expensive, and you can also get boxes that do the same thing. But experts advise testing to make sure they work. Just put the key fob inside and approach your car. If the doors don't automatically unlock, then the signal is being blocked.

    It's also important to remember to use it whenever you leave your vehicle, and don't forget to put all of your key fobs inside, including any spares.

    But ignore some advice making the rounds on the internet telling you to put your fob in the microwave or freezer. It doesn't have the same effect as a Faraday bag, and you risk damaging your key.

    GET AN OLD-FASHIONED LOCK

    Try an old-school solution by using a physical lock. Some police forces advise car owners to use them to make your vehicle look less tempting to steal. The reasoning is that a would-be thief might be deterred by the effort needed to cut through the lock and instead turn their attention to an easier target.

    Locks, in the shape of a disk or a long bar, clamp onto the steering wheel and make it difficult to steer. There are also versions that prevent the car from being put in gear. The downside is you'll need extra time to attach or remove it whenever you aren't driving.

    CHANGE UP YOUR SETTINGS

    For many cars, it's possible to deactivate the wireless setting so that you can't open the door remotely. For Fords, Hondas and Audis, use the touchscreen menus. If you own a Toyota, you can temporarily disable the signal by holding down the fob's lock button and at the same time pressing the unlock button twice. If you've done it correctly, the fob's indicator light should blink four times. Be aware that the next time you press any button, remote unlocking will be reactivated.

    The method will vary depending on make and model so consult your owner’s manual for the exact process. If it sounds complicated, there are YouTube videos that walk you through it. Don't forget that in most cases you’ll now have to manually press the fob's unlock button.

    Automakers have started adding motion sensors to key fobs. If the sensor doesn't detect recent movement because it's been, say, left on the kitchen counter after you come home, the fob goes into sleep mode and stops transmitting. If it lacks this capability, check with your dealer whether it's possible to upgrade it.

    If you buy a used car, some experts also advise getting the keys reprogrammed, just in case the previous owner kept one of the fobs.

    WATCH OUT FOR NEW METHODS

    Researchers have uncovered a new auto theft technique that doesn't target radio signals. The controller area network, or CAN, is "a feature of modern cars which allows different components and systems to communicate, (and) has recently been targeted and exploited by thieves," said Thatcham's Launchbury.

    The network allows sensors and control modules to talk to each other directly, instead of going through a central node. Thieves take advantage by accessing the network from the car’s exterior, usually by removing a headlight and connecting a device that can "inject" a signal, tricking the car into unlocking and starting.

    While automakers work on improving CAN security, "there are steps drivers can take today to add layers of security and deter criminals," such as using a physical lock, Launchbury said.

    Aftermarket electronic immobilizer systems "should render a criminal’s theft tool useless," and might even get you a discount on auto insurance, he said. Thatcham and other companies offer them but the downside is they can be quite pricey.

    Return to top of page.


    How to Protect Yourself From Check (Theft) Fraud

    By Bill Lindsey For the Epoch Times April 04, 2024

    Printed checks are convenient, but at the risk of thieves stealing them to drain bank accounts. Some preemptive caution is a wise move.

    Every year, enterprising thieves find new ways to separate people from their money. In many cases in the United States, this involves several methods of check fraud, which occurs when thieves use a personal or business check to steal money, services, or goods. The Boston Fed reports that the United States Federal Reserve System collected a total of 19 billion in 1993. By 2022, the number of checks collected had declined to approximately 3.4 billion.

    This smaller, yet still significant number leaves many opportunities for thieves, who steal mail from residential and United States Postal Service blue mailboxes. They sort through stolen mail, searching for personal and business checks, as well as bank account and routing numbers. The USPS reported 38,500 mail thefts in 2022, and 25,000 in the first half of 2023. Despite the use of checks becoming less common, due largely to the ease of online banking, the incidence of check-related crimes continues to increase. According to a report issued in 2023 by the Federal Reserve Bank of Boston, the number of checks collected on an annual basis over the past 30 years by the Federal Reserve declined by 82 percent. There were approximately 680,000 reports of check fraud in 2021, double the amount reported in 2020. A 2024 NASDAQ report indicated just over $21 billion in check fraud.

    The term “check fraud” covers a lot of territory, but the one factor all variations have in common is that an innocent person loses money or goods.

    One example is called paperhanging, in which a person writes a check from an account they opened, knowing there are insufficient funds on deposit to cover the amount. Other frauds include check washing, forgery, the use of counterfeit checks, and overpayment.

    In check washing, thieves remove the ink from the check, often by applying acetone, then write in a new date, amount, and payee information.

    Forgery involves intercepting and stealing new checks from mailboxes or collection boxes when they are being mailed to the account holders, then forging the signature to use them to drain bank accounts.

    According to RelyCo.com, a business check printer, more than 500 million checks are forged each year in the United States alone. Due to the sheer volume of incidents, only 25 percent of the cases are prosecuted.

    “Residential mailboxes are fertile grounds for scammers,” Zulfikar Ramzan, Chief Scientist and EVP of Product and Development at Aura, a digital safety platform that protects people against scams, told The Epoch Times. “Do not leave your mail unattended; send checks via a post office collection box when at work, or hand them directly to your carrier.”

    He advised, “Whenever possible, eliminate the use of paper checks altogether.”

    Writing Checks: Precautions to Take

    Mr. Ramzan offered a clever yet simple tip to help avoid falling victim to stolen checks, “Use indelible black gel ink pens. The Better Business Bureau (BBB) urges consumers to sign their checks with long-lasting (indelible) black gel ink. This ink is particularly tough to scrub off, making it nearly impossible for scammers to erase the original contents of the check.”

    Michael Scheumack, chief innovation officer at IdentityIQ, a private firm providing identity protection for consumers, suggested restricting the check. That way, it can only be deposited in the bank account of the intended recipient. “To do this, you should write ‘For deposit only’ on the back of the check where the signature goes.”

    Additionally, “You should never include additional personal details, such as your date of birth, driver’s license number, or Social Security number, on the check,” Mr. Scheumack said.

    Monitor your checking account. “Use your online banking features. Be on the lookout for any discrepancies in amounts paid out, or any overdraft notices, reconciling the records every 30 days,” Mr. Ramzan said.

    He further advised consumers, “Always shred sensitive documents such as unused or canceled checks, pre-approved credit notices, and bank statements before discarding them.” “Scammers can steal these out of the trash and ‘wash’ them,” he explained. “Make a point to examine your check supply regularly, and report any missing checks to your bank. And never write checks payable to ‘cash’ or ‘bearer’ since anyone can take that money.”

    As a final word of caution, Mr. Ramzan advised using a bank that provides checks with at least one of the following features:

    • A mixture of visible and invisible fibers that can be seen under close examination or by exposure to UV light.

    • A 3D, reflective holostripe made of metal that makes counterfeiting almost impossible.

    • High-resolution microprinting as a font around the border of the check, which is difficult for scammers to replicate.

    • Watermarks that are only visible at certain angles, and can’t easily be copied.

    • Chemical voids that produce the word VOID if photocopied or exposed to “washing” chemicals.

    While high-tech thieves can overcome many anti-counterfeiting measures, the idea is to make it as difficult as possible.

    Counterfeit Scams: When It’s Too Good to Be True

    The common factor in most “too good to be true” scams is how they use the lure of “easy money” to deceive victims. Thieves with access to advanced graphics programs and printing equipment can create very authentic-looking counterfeit checks. In one instance, scammers convince unwitting victims to cash or deposit the counterfeit checks. Then they ask the victim to refund some portion of the amount very quickly, or forward it to another person in the form of cash, a prepaid debit card, a personal check, a bank electronic wire transfer, or a person-to-person transaction like Zelle. When the victim becomes aware of the fraud, they can never reclaim the funds they sent.

    Here are some examples of scams:
    •    You were hired as a mystery shopper after responding to an online ad, and were sent a check as initial payment before doing any work, with instructions to deposit it and send a portion to another mystery shopper. This is a scam designed to steal the amount forwarded.

    Research any companies offering employment as a mystery shopper. Look up the company’s contact info yourself. Don’t use any information provided in the email, letter, or call. If the offer came via email, check the postmark against the city listed on the letterhead or email signatures and email addresses.

    •   You’ve been advised you won a lottery or other cash prize. As a “winner,” you are asked to deposit the check, then send funds to cover taxes and processing fees.

    These prize money scams rely on the victims sending the money before the bank discovers the check is fake. In addition to being defrauded of the money they sent to the scammer, the person depositing the counterfeit check can be held liable by the bank for the full amount.

    •    Someone purchases goods from you. You are overpaid by the buyer, and asked to send a check for the difference.

    “Do not accept overpayments,” said Mr. Ramzan. “Receiving a check in the mail for an item more than your asking price usually turns out to be some form of bank scam.”

    “Do not deposit these checks, or checks from unknown senders, or checks associated with out-of-town banks.” He also advised closely scrutinizing the check date, sender name, and financial institution for errors or dubious characteristics.

    Return to top of page.


    Older Articals:

    Social Media Is No Place For COVID-19 Vaccination Cards
    Identity Theft and Social Security
    Fast Growing Form Of Identity Theft
    7 FTC Consumer Alert Short Articles.
    How to Protect Your Home From Deed Theft
    Preventing and Responding to Identity Theft
    Upgrading Your Phone? 4 Things You Should Do First
    SIM-Swapping Scam
    Many Older Articals The Technophobe’s Guide To Cybersecurity
    Thieves Create False Identities Using Child's S. S. Number
    Keep Financial Information Safer on Your Phone
    Latest Hacker Target: Cell-Phone Accounts
    Fake Unemployment Claims On The Rise In Michigan
    Five Things You Must Do If Your ID Is Stolen
    Tax Return Identity Theft
    Protecting Dead Relatives Identity.
    Prevent I.D. Theft After A Loved One Dies.
    File a Complaint with the Federal Trade Commission
    Credit Bureau Contact Info
    Hackers Target Bank Accounts Through Your Phone.
    Good Advice to Help Stop Phishing.
    New Form of Identity Fraud Soars as Crooks Switch Tactics
    What’s left behind: Junkyard identity theft
    Don’t Always Share Everything With Facebook
    Crooks Have a New Way to Break into Cars
    Your Fingerprint Won’t Protect Your Accounts
    Cyber Thieves May Have Your Social Security Number
    Protect Your Password
    Ways To Protect Yourself After A Data Breach
    What To Do After A Personal Data Breach
    You Have Fallen For A Scam! Now What?
    Personal Information Safety Tips
    Simple tips to avoid identity theft
    Your Vehicle and Identity Theft - Partners in Crime
    Heartbleed Security Bug
    Wireless Router Data Safety Basics
    Damage Control Plan After Password Theft
    Travel Safety Tips For Electronic Devices
    New Car Robbery Tactic
    Beware of RFID technology!
    Phishing
    DIY Identity-Theft Protection

    Return to top of page.


    Is Identity Theft Protection Worth It?

    By Sarah Brady for Kiplinger Personal Finance March 2024
    Should you consider identity theft protection? Monitoring services can help you spot red flags quickly, but they won’t stop criminals from targeting you.

    “An ounce of prevention is worth a pound of cure.” When Benjamin Franklin penned this enduring phrase nearly three centuries ago, he was advising the public on how to avoid house fires. But his words are also useful when applied to a modern safety issue: identity theft.

    By some estimates, roughly one-third of U.S. residents have experienced some form of identity theft - a crime that includes everything from credit card theft to tax fraud to insurance fraud - and that figure is expected to rise. For some consumers, the instinct is to turn to a familiar brand such as Norton, Equifax or McAfee for protection. Each of them offers something different, and you can subscribe to one of their plans for yourself or your family for just a few dollars a month (or in some cases, for free).

    Do ID theft protection services really work?

    It depends on what you’re looking for. Identity theft plans typically include some combination of account monitoring, alerts and restoration support. In other words, they don’t stop criminals from targeting you — they just respond to identity theft once it has happened.

    “ID protection services largely entail cleanup rather than prevention,” says Mitch Mayne, a cybersecurity consultant and former incident responder for IBM Security X-Force. “While these services can offer some benefits to victims, they also create a false sense of security, which leads users to neglect basic cyber hygiene.”

    According to Aura, a company that provides identity theft protection plans, you don’t necessarily need ID protection services. “While monitoring and fraud alerts are valuable ways to protect your identity, they don’t do anything you can’t do on your own,” Aura’s website says.

    If you do decide to pay for ID protection, keep in mind that not all plans are created equal. The best plans come with tried-and-true, unfussy features such as VPNs, which hide your IP address and encrypt your data while you browse the internet, and password managers, which generate and store unique passwords for each of your accounts. A password manager may be the most valuable offering. “Sign-in credentials are frequently compromised and quickly sold on the dark web,” says Mayne, “so a password manager can provide some solid risk mitigation.”

    Many plans, however, are packed with flashy features that may not deliver, such as identity theft insurance, which typically covers the costs you incur during the recovery process but doesn’t cover your financial losses, and live restoration support, which gives you access to live customer service agents after you experience an identity theft incident or receive an alert that your information may have been compromised. “It can be incredibly difficult to get an insurance claim approved by an ID theft monitoring company,” Mayne warns, “and even with their help responding to an incident, it can take years to get your money back and restore your identity. For some people, the damage is never fully undone.”

    A multipronged approach

    These services are not a cure-all for the myriad threats your identity faces, but when combined with good habits (more on those below), some targeted services can help.

    For example, DeleteMe, which has plans starting at $8.71 a month, helps prevent damage by finding and removing your personally identifiable information (PII) from data-broker websites. “Most of us have our PII available for purchase from multiple data-broker sites, so this removal lowers your risk footprint overall,” says Mayne.

    For password management, 1Password is well-reviewed and highly recommended for its long list of security features, which include a mix of advanced encryption, biometrics (face and fingerprint identification) and ease of use. Plans start at $2.99 a month, and you can sign up for a free, 14-day trial.

    For more-comprehensive monitoring, prioritize services that offer restorative and preventative support. For example, both of the identity theft protection plans from IDShield come with guaranteed identity restoration, which gives you unlimited access to live customer support, but they also include password managers and VPNs. They offer some degree of credit-score and credit-report monitoring as well. ID Shield plans start at $14.95 a month.

    Consider the free alternatives

    Many people don’t realize they already have free services available to them through their relationships with financial institutions. If you have a Mastercard credit card or debit card, for example, you can visit mastercardus.idprotectiononline.com to sign up for free restoration and monitoring services, including alerts if your user credentials are compromised in a corporate data breach. (Keep in mind that you have liability protections for your bank and credit card accounts, too. For example, American Express, Discover, Mastercard and Visa credit cards all come with zero-liability protection, which means you won’t have to pay a single dollar lost due to a fraudulent charge made on your account.) You may also have a free identity theft protection plan through your employer, and some renters and homeowners’ insurance policies include protection for financial accounts, too.

    “Many identity theft protections already come with products you use - your antivirus software, for example,” says Mayne, “so it’s worth your time and money to understand what you already have available before buying another product that does the same thing.”

    You can also explore free services online. For example, to find out if your information has been “pwned,” or compromised in a data breach, and sign up for future data breach alerts, try using haveibeenpwned.com. As for securing your credit reports and preventing certain forms of credit card fraud, you can set up a credit freeze, which blocks anyone from opening up a new loan or credit card in your name, by contacting the three national credit bureaus (Experian, Equifax and TransUnion). You can also visit AnnualCreditReport.com to pull your credit reports for free once a week and review them for signs of fraud, such as hard inquiries for loans and credit cards you have not applied for.

    Perhaps the best news for people hoping to save money is that you are your own strongest defense against identity theft. “The best way to protect your identity is by consistently taking free, preventative actions,” says Mayne. That includes using unique and complex passwords for each of your accounts, enabling multifactor authentication for account sign-in, and installing software updates for your devices, apps and web browsers as soon as they’re available. Additionally, you should never click links or attachments that appear in unsolicited text messages and e-mails; they may lead to scam websites or install malware on your device.

    Return to top of page.


    What To Do If You’re Billed For An SBA EIDL Or PPP Loan You Don’t Owe

    By Rosario Méndez Attorney, FTC September 26, 2023

    Did you get a bill for a Small Business Administration Paycheck Protection Program (PPP) loan or COVID-19 Economic Injury Disaster Loan (EIDL) you never applied for? If the answer is yes, an identity thief probably used your personal information to get the loan. Here's how to report this problem and start the SBA review process to help you clear up any credit problems the identity theft may have caused.

    Step 1. Report the identity theft to the Federal Trade Commission at IdentityTheft.gov IdentityTheft.gov.

    • You’ll get an FTC Identity Theft report and a personal recovery plan.
    • Save a copy of your FTC Identity Theft Report. You’ll need to submit it to the SBA.
    • Follow the personal recovery plan to stop further misuse of your personal information and help repair the damage the identity theft caused.

    Step 2. Visit the SBA’s website at sba.gov/idtheft sba.gov/idtheft.

    • Follow the steps there to report the identity theft to the SBA. This step is required to start the SBA review process.

    Step 3. If the identity theft involved a PPP loan and you know the private lender that issued the loan, contact the lender, too.

    • Explain that an identity thief used your personal information to get the PPP loan without your knowledge or authorization. Tell them the loan is fraudulent.
    • Ask the lender to release you from the loan and to take all the steps needed to remove information about the loan from your credit files.
    • Ask the lender to send you a letter explaining the actions it’s taken.
    • Write down who you spoke with and when. You may need to contact the lender again.
    • Know that the lender may require a copy of your FTC Identity Theft Report and other documents. This sample letter can help you get things started.

    For questions about COVID-19 EIDL identity theft, contact SBA COVID-19 EIDL Customer Service at 833-853-5638 or by email at IDTRecords@sba.gov.

    For questions about PPP loan identity theft, contact the SBA by email at PPPIDTheftInquiries@sba.gov.

    Return to top of page.


    Ten Telltale Signs That Someone Has Stolen Your Identity

    From recognizing the red flags to getting ahead of trouble before it strikes By Kurt Knutsson, CyberGuy Report in Fox17 News

    How would you feel if someone else pretended to be you online? That’s essentially what identity theft is, and it can happen to any of us. You have something very important that makes you who you are – your digital identity. It’s like a puzzle made of pieces of your personal information, financial transactions and online interactions.

    Unfortunately, like anything of value, it isn't immune to theft. Bad people want to steal your identity and use it to commit fraud and rob you blind. Identity theft is a serious threat that can be hard to detect. However, you can look for some clues that someone is trying to steal your identity and take steps to protect yourself.

    Signs of identity theft and ways to prevent it

    1. Unfamiliar credit card charges

    Unexpected charges on your credit card statement are one of the earliest warning signs of identity theft. Even small, seemingly insignificant purchases can be a thief testing the waters before a full-blown shopping spree.

    What to do

    I recommend you regularly review your statements, and if you spot unrecognized transactions, contact your bank to dispute these charges and secure your account.

    2. Missing bills

    If you notice that your regular bills or correspondence aren't showing up, it might be because an identity thief has redirected your mail to another address. It's a cunning move to keep you in the dark about their illicit activities.

    What to do

    Regularly monitor your bills. If they stop arriving, contact your service providers to confirm their mailing addresses on file.

    3. Sudden surge of junk mail

    If you've been targeted, you might notice a significant increase in unsolicited credit card offers or pre-approved loans. This could indicate that someone has been checking your credit history without your knowledge.

    What to do

    You can reduce such junk mail by opting out of prescreened credit offers and consider instituting a credit freeze to prevent unauthorized credit accounts. When you place a security freeze, creditors cannot access your credit report. This will keep them from approving any new credit account in your name, whether it is fraudulent or legitimate. While this can be an effective deterrent, it comes with the hassle of negotiating access each and every time you apply for credit.

    How to freeze your credit report for free

    Contact each of the three major credit reporting agencies to submit your request online, by phone or by mail.

    Note: To let lenders and other companies access your credit files again to create new accounts, you will need to lift your credit freeze permanently or temporarily.

    4. Unexpected IRS notifications

    If the IRS flags multiple tax returns filed in your name or if you're declared as an employee in a place you've never worked, it's a telltale sign that someone is misusing your social security number.

    What to do

    Report these incidents to the IRS immediately, and follow their guidance, which may include completing an Identity Theft Affidavit.

    5. Unexplained changes in your credit score

    Regular credit checks are your friend. Notice an unexpected plummet in your credit score. It may indicate that an identity thief has been opening credit accounts or making large purchases in your name, and worse, they don’t pay the bills.

    What to do

    Regularly monitor your credit score. If it drops suddenly, contact the credit bureau to dispute inaccuracies and set up credit-monitoring services.

    6. Unrecognized accounts on your credit report

    An unexpected loan or credit account appearing on your credit report is a glaring sign of identity theft.

    What to do

    Such anomalies should be immediately investigated with the credit bureau and the respective financial institution and reported to the FTC.

    If you want a service that will walk you through every step of the reporting and recovery process, one of the best things you can do to protect yourself from this type of fraud is to subscribe to an identity theft service.

    Identity theft-protection companies can monitor personal information like your Home title, Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    One of the best parts of using some services is that they might include identity theft insurance of up to one million dollars to cover losses and legal fees and a white glove fraud-resolution team where a U.S.-based case manager helps you recover any losses.

    7. Denied medical claims

    If you're suddenly informed that you've reached your limit for a medical claim, it might mean that a fraudster has used your insurance details. Similarly, notices about unknown medical conditions or procedures could indicate that your medical identity has been compromised.

    What to do

    Notice something fishy? Alert your healthcare provider and insurance company. Scrutinize your explanation of benefits (EOB) and report any services you didn't receive.

    8. Calls from debt collectors

    Unexpected calls from debt collectors about unpaid bills for products or services you never bought can signal identity theft. An identity thief may have used your details to make purchases, leaving you with the bill.

    What to do

    Request validation of the debt, dispute it with the creditor, report the situation to the credit bureaus, and file a complaint with the FTC if you suspect you're a victim of such theft.

    9. Unexpected contact from financial institutions

    Be wary of unsolicited contact from financial institutions you have no relationship with. If a bank you've never used before sends you a notice, someone may have opened an account using your stolen identity.

    What to do

    Contact the institution to close the fraudulent account, notify your local law enforcement, and report to the Federal Commission (FTC) if you think this has happened to you.

    10. Irrelevant job offers

    Unsolicited job offers, especially ones that seem irrelevant to your field or too good to be true, may indicate that someone is using your personal information to search for jobs or build a false identity.

    What to do

    If you suspect that the job offer is fraudulent or part of a scam, report it to the relevant authorities. You can contact your local law enforcement agency or file a complaint with the Federal Trade Commission (FTC).

    I've been scammed! What to do next?

    Below are some next steps to take if you find you or your loved one is a victim of identity theft.

    • If you can regain control of your accounts, change your passwordsand inform each account provider.
    • Look through bank statements and checking account transactions to see where outlier activity started.
    • Use identity theft protection: Identity theft-protection companies can monitor personal information like your home title, Social Security Number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. One of the best parts of using some services is that they might include identity theft insurance of up to one million dollars to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses.
    • Report any breaches to state and local law enforcement and government agencies.
    • Get the professional advice of a lawyer before speaking to law enforcement, especially when you are dealing with criminal identity theft. Seek legal advice if being a victim of criminal identity leaves you unable to secure employment or housing.
    • Alert all three major credit bureaus, and possibly place a fraud alert on your credit report.
    • Run your own background check or request a copy of one if that is how you discovered that your information has been used by a criminal.

    If you are a victim of identity theft, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm.

    Kurt's key takeaways

    In our daily stroll through the digital park, we've encountered some menacing signs of identity theft. While it's important to be aware of the potential pitfalls, it's equally vital to remember that these online spaces are not all doom and gloom. After all, they're the same avenues that allow us to connect, share, and explore like never before.

    It's all about learning to walk these paths with our eyes wide open and with as much resilience to fend off all the bad stuff targeting our lives more and more online. The whole idea is not just about reacting to the signs of identity theft but anticipating and arming ourselves against it. It's about taking the steering wheel of our digital lives into our hands and driving with confidence, not apprehension.

    Return to top of page.


    How To Safely Wipe Your Phone When Repair Isn't An Option

    By Kurt Knutsson, CyberGuy Report July 10, 2023 for Fox News

    Don't sell, trade in or recycle non-functional phones without doing this first

    So, your trusty smartphone has seen better days, and you've come to the realization that it's time for a new one. Maybe it's dead, or perhaps it's beyond repair. Either way, you want to make sure all your personal data is securely wiped from your iPhone or Android device before bidding it farewell. We'll walk you through the steps to safely wipe your smartphone clean, ensuring your sensitive information stays protected, even if it's non-functioning. Let's dive in and give your old device a proper send-off.

    4 Steps To Take For A Non-Functional Phone

    1. Erase the phone remotely

    To erase your phone's data remotely, you'll have needed to previously set up either iPhone's ‘Find My’ app or Samsung's ‘Find My Mobile’. It works on all Galaxy phones and tablets running Android 8 or later. If you had either Find My or Find My Mobile set up, you should be able to log into the site to remotely lock and wipe your device.

    To erase your iPhone, using Find My:

    • Go to ‘icloud.com/find’ and sign in with your Apple ID
    • Click on ‘All Devices’ and select the ‘device’ you want to erase
    • Click on Erase iPhone to erase all data on your iPhone

    A confirmation email will be sent to your Apple ID email address.

    To erase your Samsung's data using SmartThingsFind:

      Go to the SmartThings Find website.
    • Select your ‘device’ on the left side of the screen and tap it
    • Select ‘Erase data’ on the right side of the screen

    By doing this, you’ll erase the device’s data, and no one will be able to access your personal information.

    Log in and select your device, then follow the steps to either ‘Erase iPhone’ or’ Erase Data’ on Android.

    To erase your Android data using Find My Device

    If you lose an Android phone, you can erase it remotely using ‘Find My Device’. If you've added a Google Account to your device, ‘Find My Device’ is automatically turned on.

    How to erase an Android device remotely:

      On a browser, go to android.com/find
    • Sign in to your Google Account If you have more than one device: At the top of the sidebar, select the device. If your device has more than one user profile: Sign in with a Google Account that's on the main or personal profile
    • If you have more than one device: At the top of the sidebar, select the device.
    • If your device has more than one user profile: Sign in with a Google Account that's on the main or personal profile
    • On the left, select ‘ERASE DEVICE’. It will then ask to confirm that it is really you by using your passkey.
    • It will then prompt you to confirm your decision again. Tap ‘ERASE DEVICE’. Note: This permanently deletes all data on your device but may not delete SD cards. After you erase it, Find My Device won't work on the device.

    2. Remove the SIM card

    your phone still has a physical SIM card, take it out of the phone before getting rid of the phone in any way. While there may still be data you saved directly to the phone, the SIM card will at least prevent anyone from using your phone number if they are, for some reason, able to get the phone running again. If you use an eSIM, contact your cellphone network carrier to have them disable it from your device.

    3. Contact your phone carrier

    Inform your phone carrier and let them know that your phone is no longer in use, and they should be able to make sure your phone number and account are no longer associated with that device. While they may not be able to remove any information from the phone directly, they may be able to help you dispose of the phone properly.

    4. Plug it into a computer

    Sometimes a phone may appear to be completely dead while there is actually just an issue with the screen. You would have no idea of that since you can't turn your phone on, so as a last resort, it doesn't hurt to try plugging it into a computer to see if you're able to retrieve any data.

    If you have an iPhone, try opening iTunes or the Photos app to see if your phone appears as an external device. If it does, and you're able to access any content on your phone, back up your data through your computer.

    For more information on how to do this, head to Cyberguy.com/MobileBackup.

    5. Disposing of your phone properly

    It's important to properly dispose of electronic devices, such as iPhones and Androids, as they can contain hazardous materials that can harm the environment. The batteries should not be thrown away with regular household trash.

    You can bring any smartphone into most electronics stores, like Best Buy, and have it recycled for free. You can also recycle devices online through sites like Apple (yes, they accept devices other than iPhones), Google or even Amazon, which has an amazing free recycling program. Amazon does also offer trade-ins for functioning devices that can be redeemed as Amazon gift cards. There are other sites like Decluttr that let you sell old devices.

    You can also check your local trash electronic recycling programs to see where you can recycle devices locally. The Environmental Protection Agency has a list of donation and recycling programs listed.

    Kurt's key takeaways

    When it's time to say goodbye to your old smartphone, you have to make sure your personal data is safe and sound. Follow these steps, and you'll keep your info protected, even if your phone is on the fritz or not working. First, use the right app to erase your phone remotely. Then, pop out that SIM card to keep your number secure. Don't forget to give your phone carrier a heads up too. And hey, let's not forget about the environment. Dispose of your phone responsibly by recycling or donating it through Apple, Google, or other organizations. With these tips, you can say goodbye to your old cell phone without any worries.

    Return to top of page.


    Military Families Combat ID Theft Amid Life Transitions

    By Terri Miller, FTC - July 25, 2022

    It’s summer, peak moving season for military servicemembers and their families. You’ve got enough on your plate without having to worry about identity theft. But the reality is scammers are getting more and more clever with their tactics to swindle members of the military community. In fact, five years of identity theft data reported to the FTC on IdentityTheft.gov shows that active duty servicemembers are 76% more likely to report that an identity thief misused an existing bank or credit card account. So, here’s the BLUF, the bottom-line up front: Protect your identity by protecting your personal information.

    Whether you’re moving, deploying, or simply enjoying your summer plans, protect yourself by following these rules of engagement:
    Track your bank account activity. Check to see if your bank offers alerts for every transaction or transactions over a certain amount. Many banks have mobile apps that let you report lost or stolen debit cards and unauthorized transactions immediately.
    Lock or freeze cards you’re not using. Identity thieves can’t misuse your debit and credit cards if they’re on hold. Mobile apps give you quick access to lock and unlock your cards as needed.
    Sign up for free credit and identity monitoring. The Free Electronic Credit Monitoring for
    Active-Duty Military Rule gives you access to free services like notifications whenever there’s activity on your credit reports. Add an active-duty alert to your credit report to require creditors to take extra steps to verify your identity before granting credit in your name.

    If you suspect identity theft, report it to the FTC at IdentityTheft.gov.

    Return to top of page.


    How You Can Protect Yourself From Identity Theft During Tax Season

    By Alicia Smith, FOX 17 Jan 26, 2023

    Tax season is officially underway, and it's a good time to not only get your papers, receipts and documents in order, but also be proactive in protecting your identity.

    Preventing identity theft should be a year-round effort. Ian Lyngklip is a consumer lawyer in Oak Park. He said his office gets calls every day from people who have problems with accounts that are not theirs showing up on their credit report.

    He recommends you set up a credit file on your computer where you can put all your credit-related information in one place. "The reason you need it is because people have a lot of accounts that they may not remember. You know, they open credit cards, they close them, they change them because they like the points or the benefits," Lyngklip said.

    He also suggests you review your credit reports for free through AnnualCreditReport.com to look for mistakes or irregularities. Also, you can freeze your credit to prevent new fraudulent accounts in your name. Just contact Equifax, Experian and TransUnion for a step-by-step guide.

    You can also use a password manager like 1Password , Keeper, or Dashlane.

    During tax season, if you're using online tax preparation products or hiring a tax professional, opt for multi-factor authentication to securely access an account. It's optional, and prompts you to enter a username, password, and a number texted to your cell phone.

    Tax-related identity theft happens when someone uses your personal information to file a tax return claiming a fraudulent refund.

    If you can't e-file because of a duplicate Social Security Number, among other red flags, you'll need to take action.

  • Respond immediately to any IRS notice in the mail, and call the number provided!
  • If necessary, Form 14039, the Identity Theft Affidavit, is a fillable form at IRS.gov that can be printed and attached to your return, then mailed in.

    Be vigilant about protecting your data and your identity.

    Remember, the IRS will never initiate contact with you by email, text, or social media to request personal or financial information.

    The IRS will never call, email, or text to request your Taxpayer Identity Protection PINs.

    If you suspect you've been a victim of tax-related identity theft, you still have to pay your taxes and file your return on time, even if it's a paper return you have to mail in. Consumers who have experienced identity theft an also report it to the Federal Trade Commission. You can request a personalized recovery plan from the FTC at. identitytheft.gov

    Return to top of page.


    Tips To Protect Yourself From Mail Theft This Holiday Season

    By: John Matarese, FOX 17, Dec 05, 2022

    Has any of your mail gone missing this year?

    An unfortunate nationwide trend could be to blame, impacting your holiday season gifts and checks. Reports across the country this year tell of thieves stealing mailbox keys, then grabbing checks out of blue mailboxes.

    It happened recently to Dorothy Glass, who had a check go missing over the summer.
    "We put some in the blue box one time, and it got taken," she said.

    David Maimon, a criminal justice professor at Georgia State University, says the problem is getting worse, not better.

    "Unfortunately, everything that is deposited in the blue box could end up in the criminals' hands" he said.

    His team monitors the number of checks being sold by criminals online, who "wash" the ink off them, then offer the blank checks to the highest bidder. It started with about 115 checks per week in October 2020. A year later, he said, he found 300 checks per week offered for sale.

    But now it's a crisis, with many more stolen checks up for sale to thieves.
    "Nowadays, we're talking about almost 3,000 checks every week," Maimon said.

    In most cases, he said, they were stolen from USPS mailboxes by thieves with a key.

    Ways to protect your mail

    Of course, there are many reasons for delayed or missing mail. The U.S. Postal Service has warned about staffing shortages at the post office leading to delivery delays that are expected to worsen during the busy holiday season. So it's more important than ever to stay on top of what you send and receive. You can do that with the free USPS service "Informed Delivery"

    Mark Lancaster no longer worries about what should be arriving or what might have gone missing. He recently signed up for the program.
    "You will start getting daily emails showing what is on the way that day," Lancaster said.

    He showed us a bill from Capitol One that corresponded to an image he had received in an email that morning.

    In addition, the Postal Service suggests you:
    • Never leave mail in a mailbox overnight.
    • Deposit mail in blue boxes right before the last pickup time posted.
    • Drop checks inside the post office, not in a blue street mailbox.

    David Maimon also recommends paying your bills online rather than with paper checks. Between skipping the blue mailbox and signing up for Informed Delivery, Lancaster sleeps better this holiday season.

    "You don't really have any surprises anymore," he said.

    That way, you don't waste your money.

    Return to top of page.


    Email Saying Your Personal Info Is For Sale On The Dark Web?

    People are telling us they've gotten emails warning that their sensitive personal information is being sold in the shadowy marketplaces of the dark web. Some emails list the stolen information, like all or part of the person's Social Security number, date of birth, and driver's license number. If you've gotten one of these emails, take steps to help protect yourself against financial loss from identity theft.

    Don't click a link or use a phone number in the message. It could be a “phishing” email, designed to trick you into disclosing sensitive information to scammers. If you think the message is legit - for example, if you have a credit monitoring service or a credit card with a company that monitors the dark web - contact the company using a website or phone number that you know is real.

    Change your passwords to secure your accounts. Start by changing the passwords on your email accounts. Email accounts often are the weak link in online security because password resets for other accounts go to your email. If your email account password has become known, then an identity thief can log into your account and intercept your password reset emails.
        Pro tip: When setting up new passwords, consider using a password manager. Free ones are built into most browsers and will automatically create passwords that are hard to guess. Be sure to use different passwords for each account and, if the account offers multifactor authentication, use it for added security.

    Check your credit reports. After securing your accounts, make sure nobody has opened new accounts using your information. Visit AnnualCreditReport.comto get an annual free credit report from each of the three nationwide credit bureaus, Equifax, Experian, and TransUnion. Through December 2023, you can get a free credit report every week from each of them at the website. If you find an account or transaction you don't recognize, visit IdentityTheft.gov IdentityTheft.govto report the identity theft and get a personal recovery plan.

    Consider freezing your credit. A credit freeze, also known as a security freeze, is free to place and remove and is the best way to protect against an identity thief opening new accounts in your name. Alternatively, place a free fraud alert on your credit to make it more difficult for an identity thief to get new credit in your name.

    Visit IdentityTheft.gov/databreachfor more steps to take, depending on what information was exposed. And, if you get one of these emails, please tell us at. ReportFraud.ftc.gov.

    Return to top of page.


    Is A Credit Freeze Or Fraud Alert Right For You?

    To help, protect against identity theft, consider placing a free credit freeze and a fraud alert
    By Seena Gressin - FTC Feb. 3, 2022

    Credit freezes and fraud alerts can help. Both are free and make it harder for identity thieves to open new accounts in your name. One may be right for you.

    Credit freezes
    A credit freeze is the best way you can protect against an identity thief opening new accounts in your name. When in place, it prevents potential creditors from accessing your
    credit report. Because creditors usually won't give you credit if they can't check your credit report, placing a freeze helps you block identity thieves who might be trying to open accounts in your name.

    A freeze also can be helpful if you've experienced identity theft or had your information exposed in a data breach. And don't let the "freeze" part worry you. A credit freeze won't affect your credit score or your ability to use your existing credit cards, apply for a job, rent an apartment, or buy insurance. If you need to apply for new credit, you can lift the freeze temporarily to let the creditor check your credit. Placing and lifting the freeze is free, but you must contact the national credit bureaus to lift it and put it back in place.

    Place a credit freeze by contacting each of the three national credit bureaus, Equifax, Experian, and TransUnion. (See the link below) A freeze lasts until you remove it.

    Fraud alerts
    A fraud alert doesn't limit access to your credit report, but tells businesses to check with you before opening a new account in your name. Usually, that means calling you first to make sure the person trying to open a new account is really you.

    Place a fraud alert by contacting any one of the three national credit bureaus. That one must notify the other two. A fraud alert lasts one year and you can renew it for free. If you’ve experienced identity theft, you can get an extended fraud alert that lasts for seven years.

    Learn more about credit freezes, fraud alerts, and active-duty alerts. And, if identity theft happens to you, visit IdentityTheft.gov to report it and get a personal recovery plan.

    Return to top of page.


    Keep Your Personal Information Safe

    By Jim Kreidler, FTC, December 27, 2021

    As 2021 winds down, lots of us are making resolutions for a fresh start in the New Year — maybe to exercise regularly, get our finances in order, or spend more time with friends. But your list isn’t complete until you add “update my security software” and “protect my personal information” to the mix. Scammers and hackers are always looking for new ways to steal your personal information online.

    Here are some steps you can take to help protect yourself and your information:

    1st - Keep your security software, internet browser, and operating system up to date. Updating your software regularly helps make sure you have critical patches and protections against security threats.

    2nd - Create and use strong passwords. Making a password longer - 12 characters or more - is one of the easiest ways to increase its strength. Consider using a passphrase of random words so that your password is more memorable, but avoid using common words or phrases. Check out this password checklist , and don’t use the same password for different accounts.

    3rd - Use multi-factor authentication. Some accounts offer extra security by requiring two or more credentials to log in. You may have to give both a password and a passcode you get from an authentication app to log into your account. Multi-factor authentication makes it harder for scammers to log in to your accounts even if they manage to steal your username and password.

    4th - Back up your data to protect it. Keep an extra copy of all your files with a secure cloud storage service, or save your files to an external storage device. That way, if something happens - say a virus, your device crashes, or you’re hacked - you still have your files.

    5th - Protect your home network. Your devices, accounts, and whole network are only as secure as your router, since it’s the connecting point between your devices and the internet. Check out how to make your router more secure.

    By taking a few steps, you’ll be able to enjoy the feeling of accomplishment that comes with checking something off your list! Also, remember to report fraud, scams, or bad business practices to the FTC at ReportFraud.ftc.gov.

    Return to top of page.


    How To Tell If Someone Is Using Your Identity

    By Alvaro Puig, FTC, February 2, 2022

    Have you seen:
    An unfamiliar account on your credit report?
    An unfamiliar transaction on your bank statement?
    Did the IRS say you already filed a tax return?

    Taking steps to protect your personal information can help you minimize the risks of identity theft. But what if a thief gets your information anyway? Here are some of the ways thieves might use your stolen information and signs you can look out for.

    An identity thief could use your information to get credit or service in your name.
    !    How to spot it: Get your free credit report at
    AnnualCreditReport.com. Review it for accounts you didn’t open or inquiries you don’t recognize. A new credit card, a personal loan, or a car loan will appear as a new account. A new cell phone plan or utility service — like water, gas, or electric — will show up as an inquiry.

    An identity thief could use your credit card or take money out of your bank account.
    !    How to spot it: Check your credit card or bank statement when you get it. Look for purchases or withdrawals you didn’t make.
    !    Bonus advice: Sign up to get text or email alerts from your credit card or bank whenever there’s a new transaction. This could help you spot unauthorized or fraudulent activity on your account.

    An identity thief could steal your tax refund or use your Social Security number to work.
    !    How to spot it: A notice from the IRS that there’s more than one tax return filed in your name could be a sign of tax identity theft. So could a notice that you have income from an employer you don’t work for.

    An identity thief could use your health insurance to get medical care.
    !    How to spot it: Review your medical bills and Explanation of Benefits statements for services you didn’t get. They could be a sign of medical identity theft.

    An identity thief could use your information to file a claim for unemployment benefits.
    !    How to spot it: A notice from your state unemployment office or employer about unemployment benefits that you didn’t apply for could be a sign of fraud.

    If you discover any signs that someone is misusing your personal information, find out what to do at IdentityTheft.gov.

    Return to top of page.


    Identity Theft Can Happen To Anyone

    By Jim Kreidler; February 1, 2022

    It’s the second day of Identity Theft Awareness Week and today we’re talking about steps that can help reduce your risk of identity theft.

    Many of us access our online accounts — credit cards, investments, insurance, or checking and savings accounts — nearly every day. In our digital world, bits of our personal information are everywhere. Identity thieves know this and look for ways — both high-tech, like lifting our passwords, or low-tech, like stealing our mail — to get their hands on our money and personal information.

    Since identity theft can happen to anyone, here are some ways to keep your money and personal information safe.

    # Protect documents that have personal information. Keep things with personal information — think financial records or Social Security and Medicare cards — in a safe place. Shred them before you throw them away. If you get statements with personal information in the mail, take your mail out of the mailbox as soon as you can.

    # Don’t share your Social Security number with someone who contacts YOU. While some organizations might need your Social Security number to identify you, they won’t call, email, or text you to ask for it. So if someone contacts you, asks you for your Social Security number, and says they’re from the IRS, your bank, or your employer — it’s a scam.

    # Protect your information online and on your phone. If you’re logging in to an online account, use a strong password [See: How Long Does It Take To Hack Passwords, on our
    Active Scam Page – Webmaster]. Add multi-factor authentication for accounts that offer it. Multi-factor authentication makes it harder for scammers to log in to your accounts if they do get your username and password.

    # Review your bills. Charges for things you didn’t buy, or an unexpected bill, could be a sign of identity theft.

    Remember to check out the free events and webinars each day of Identity Theft Awareness Week. And if you think someone has been using your personal information to open accounts, buy things, or file taxes, report it and get recovery help at IdentityTheft.gov.

    Return to top of page.


    Stolen identity? Get help at IdentityTheft.gov

    By Bridget Small FTC February 4, 2022

    When identity theft happens, it’s hard to know where to begin. That’s why the FTC created IdentityTheft.gov, a one-stop resource for people to report identity theft to law enforcement and to get step-by-step instructions on how to recover from any type of identity theft.

    The first step in avoiding identity theft, or stopping the damage, is placing a fraud alert on your credit report. This makes it harder for a thief to open new credit in your name, and lets you get free copies of your credit report from each of the three credit bureaus. Next, read through your reports and note any accounts or transactions that don’t belong. Then, go to IdentityTheft.gov.

    When you report at IdentityTheft.gov, you’ll answer questions and give details about what happened. Include information about any problems you spotted on your credit reports. IdentityTheft.gov will use that information to create your personalized:
    1. Identity Theft Report, which shows that someone stole your identity
    2. A recovery plan with step-by-step advice to help you fix problems.

    Your Identity Theft Report, recovery plan, and sample letters sample letters from IdentityTheft.gov will help you repair problems caused by identity theft. Your recovery plan may tell you to:
    a. Close new accounts opened in your name
    b. Remove charges made on your existing accounts
    c. Contact the three credit bureaus to correct your credit report
    d. Consider an extended fraud alert or credit freeze.
    e. Check your credit reports regularly. Through April 2022, you can check your reports every week for free at AnnualCreditReport.com.

    Return to top of page.


    7 Ways to Help Protect Your Identity

    From the Federal Trade Commission’s website FTC.gov

    Identity theft happens. It's an unfortunate fact of modern life. But there are certain steps you can take to help keep your personal information from falling into the wrong hands. Every day, you do things to protect what's most important to you. And you know what? You do them almost automatically. Routine things like looking both ways before you cross, brushing your teeth, and buckling your seat belt.

    Another routine to get into is keeping tabs on your identity and personal information. Here are seven easy ways you can do it:

    1. Read your credit card and bank statements carefully and often.

    2. Know your payment due dates.

    3. If a bill doesn't show up when you expect it, look into it.

    4. Read the statements from your health insurance plan.

    5. Make sure the claims paid match the care you got.

    6. Shred any documents with personal and financial information.

    7. Review each of your three credit reports at least once a year. It's easy, and it's free.

    And before you know it, protecting your personal information can be as routine as locking your doors at night.

    For more tips and tools on dealing with identity theft, visit ftc.gov/idtheft (Webmaster here – This is a great resource article!).

    Return to top of page.


    Your Guide To Protecting Your Privacy Online

    Maneesha Mithal, Division of Privacy and Identity Protection, FTC June 2, 2021

    The things we do throughout the course of our day give businesses access to information about our habits, tastes, and activities. Some might use it to deliver targeted ads to you, or to give you content based on your location, like stores nearby or the weather forecast. Others might sell or share that information.

    Whether you use a computer, tablet, or mobile phone to go online, there are things you can do to protect your privacy. Check out ftc.gov/yourprivacy, your guide to protecting your privacy online. Here’s what it covers:

    Online Tracking

    Learn how online tracking works and what you can do about it. Plus:
    * How to change your privacy settings on your browser, your internet-connected TV, and your phone
    * How to opt out of target ads
    * What to know about ad blockers
    * How to opt out of data broker sites that sell your personal information
    * What to know about privacy and mobile apps

    How To Secure Your Devices

    Find out how to secure your internet-connected devices, starting with your router — it’s the key to privacy at home and in your small business. Plus:
    * How to know when your voice assistant is listening and ways to protect your privacy * Important security features for smartwatches
    * Using internet-connected (IP) cameras safely
    * Why it’s important to remove your personal data before you sell your car
    * What to do if you’re selling a home and leaving behind a smart thermostat, refrigerator, or other device

    What To Know About Online Abuse and Harassment

    Did you know some apps let people track you through your phone without your permission? Learn about stalking apps, how to tell if there is one on your phone, and what to do if there is.

    If someone took or shared an intimate image of you without your consent, that’s considered non-consensual pornography. And that’s not OK. If that’s happened to you or someone you know, learn what steps you can take. ftc.gov/yourprivacy

    Return to top of page.


    Identify Theft

    By: Gerry Hafer; AMAC Foundation, March 26, 2021

    Webmaster – If you are looking for an alternative to the liberal AARP; try the conservative Association of Mature American Citizens; amac.us.

    What is Identity Theft?

    Let’s begin with a review of actually what identity theft is, using an official definition available from the U.S. Government Services and Information website, USA.gov. It goes like this: “Identity (ID) theft happens when someone steals your personal information to commit fraud. The identity thief may use your information to apply for credit, file taxes, or get medical services. These acts can damage your credit status, and cost you time and money to restore your good name.”

    According to the website IdentityTheft.gov, operated by the U.S. Federal Trade Commission, “Once identity thieves have your personal information, they can drain your bank account, run up charges on your credit cards, open new utility accounts, or get medical treatment on your health insurance. An identity thief can file a tax refund in your name and get your refund. In some extreme cases, a thief might even give your name to the police during an arrest.

    Preventing Identity Theft
    The USA.gov website offers a fairly comprehensive set of steps you can take to keep identity theft from occurring and impacting your life. We’ve re-printed them here for your convenience:
    • Secure your Social Security number (SSN). Don’t carry your Social Security card in your wallet. Only give out your SSN when necessary.
    • Don’t share personal information (birthdate, Social Security number, or bank account number) because someone asks for it.
    • Collect mail every day. Place a hold on your mail when you are away from home for several days.
    • Pay attention to your billing cycles. If bills or financial statements are late, contact the sender.
    • Use the security features on your mobile phone.
    • Update sharing and firewall settings when you’re on a public wi-fi network. Use a virtual private network (VPN), if you use public wi-fi.
    • Review your credit card and bank account statements. Compare receipts with account statements. Watch for unauthorized transactions.
    • Shred receipts, credit offers, account statements, and expired credit cards. This can prevent “dumpster divers” from getting your personal information.
    • Store personal information in a safe place.
    • Install firewalls and virus-detection software on your home computer.
    Create complex passwords that identity thieves cannot guess. Change your passwords if a company that you do business with has a breach of its databases
    • Review your credit reports once a year. Be certain that they don’t include accounts that you have not opened. You can order it for free from Annualcreditreport.com.
    • Freeze your credit files with Equifax, Experian , Innovis, TransUnion, and the National Consumer Telecommunications and Utilities Exchange for free. Credit freezes prevent someone from applying for and getting approval for a credit account or utility services in your name.

    How do you know if your identity has been stolen?
    Here are some clues that someone has stolen your information, courtesy of IdentityTheft.gov:
    + You see withdrawals from your bank account that you can’t explain.
    + You don’t get your bills or other mail.
    + Merchants refuse your checks.
    + Debt collectors call you about debts that aren’t yours.
    + You find unfamiliar accounts or charges on your credit report.
    + Medical providers bill you for services you didn’t use.
    + Your health plan rejects your legitimate medical claim because the records show you’ve reached your benefits limit.
    + A health plan won’t cover you because your medical records show a condition you don’t have.
    + The IRS notifies you that more than one tax return was filed in your name, or that you have income from an employer you don’t work for.
    + You get notice that your information was compromised by a data breach at a company where you do business or have an account.

    If your wallet, Social Security number, or other personal information is lost or stolen, IdentityTheft.gov provides some helpful direction on how to proceed to help protect yourself from identity theft. Click here to review them.

    Reporting Identity Theft
    Report identity (ID) theft to the Federal Trade Commission (FTC) online at IdentityTheft.gov or by phone at 1-877-438-4338. The Federal Trade Commission (FTC) and the FBI strongly suggest timely reporting of identity theft situations. In fact, reporting it to the FTC can provide you with a personal recovery plan designed to help you through the steps to close accounts opened in your name, eliminate fraudulent charges on your accounts, correct entries on your credit report, enacting credit freezes, block debt collectors from taking action on fraudulent charges, address criminal charges associated with the theft, and so on. In addition, the guidance can help you correct a variety of complications that arise from identity theft, like utility account charges, student loans, investment activities undertaken in your name, and even the correction of bankruptcy actions undertaken fraudulently in your name. To learn more about executing a recovery plan, visit the IdentityTheft.gov website.

    Return to top of page.


    Social Media Is No Place For COVID-19 Vaccination Cards

    By Seena Gressin, FTC February 5, 2021

    Some of you are celebrating your second COVID-19 vaccination with the giddy enthusiasm that’s usually reserved for weddings, new babies, and other life events. You’re posting a photo of your vaccination card on social media. Please — don’t do that! You could be inviting identity theft.

    Your vaccination card has information on it including your full name, date of birth, where you got your vaccine, and the dates you got it. When you post it to Facebook, Instagram, or to some other social media platform, you may be handing valuable information over to someone who could use it for identity theft.

    Think of it this way — identity theft works like a puzzle, made up of pieces of personal information. You don’t want to give identity thieves the pieces they need to finish the picture. One of those pieces is your date of birth. For example, just by knowing your date and place of birth, scammers sometimes can guess most of the digits of your Social Security number. Once identity thieves have the pieces they need, they can use the information to open new accounts in your name, claim your tax refund for themselves, and engage in other identity theft.

    Want to share the news about your vaccination? How about a photo of a nifty adhesive bandage on the injection site? (You can show off your tattoos and deltoids at the same time.) Or, post a photo of your white or orange vaccine sticker. The stickers are really cool.

    As for your social media networks, be sure that you’re not oversharing informationthat can serve as a key to your PIN number or answer a security question. And, while you’re checking, check your privacy settings too. If you want to limit access to a small group of family and friends, make sure the settings are configured to avoid sharing information with strangers.

    Visit How to Keep Your Personal Information Secure for more tips about protecting your information against identity thieves.

    Return to top of page.


    Identity Theft and Social Security

    By Tom Margenau, October 14, 2020, The Epoch Times

    Q: My purse was stolen, and now I worry that someone might be using my Social Security number. I called the Social Security office and was told to contact credit-reporting agencies and possibly the police. And they gave me some website to look up. It seems to me they should have done more. Can’t they just cancel my old number and give me a new one? Was I informed correctly?

    A: Yes, you probably were given correct information. When a Social Security card is stolen, so many people just naturally assume it is a problem for the Social Security Administration to resolve. But when you think it through, it really isn’t.

    And before I go on, let me give some advice. It’s too late for you. But it may help other readers. There is no need for you to be carrying your Social Security card in your wallet or purse. I haven’t carried my card around with me in more than 40 years. And I’ve never needed it. You generally might need to show your Social Security card to someone if you are applying for a job. Or maybe for some kind of government assistance. So, if you are doing that, then carry your card with you on that day. Otherwise, just keep it in a safe place at home.

    The same used to be true for Medicare cards. I never put mine in my wallet, unless I was going to the doctor. But now that Medicare cards no longer have our Social Security numbers on them, that is not such a big issue.

    Anyway, back to the story of what the Social Security Administration can do for you in cases of identity theft. As a general rule, the SSA gets involved in your life for three reasons. Their first job is to issue you a Social Security number. Their second job is to keep a lifetime record of all the earnings your employer reports under that SSN. Or, if you are self-employed, to keep track of the income you report on the Schedule SE (the Social Security part) of your annual tax return. The SSA’s third job is to pay you monthly retirement or disability benefits that are based on all those earnings that are posted to your Social Security account. Or if you die, they pay your widow(er) and/or children survivors benefits based on those same earnings.

    I don’t want to sound too flip or dismissive about this, but if someone steals your Social Security card, it’s really not the SSA’s problem. To put that another way, there isn’t that much they can do about it. About all they can do is help you monitor your Social Security earnings record. If you see earnings posted to that record that don’t belong to you, they can work with you to correct that record.

    But I doubt if that is your major concern right now. You are probably much more worried about someone misusing your Social Security number and other personal information to create credit problems. The first step you can take to getting this resolved is to go to IdentityTheft.gov to report the theft and to start a recovery plan. (I am sure this was the website the Social Security people referred you to.) This website is a one-stop resource managed by the Federal Trade Commission, the nation’s consumer protection agency. Or you can call them at 1-877-IDTHEFT.

    The identity thief also may use your SSN to get a job. That person’s employer would report earned income to the IRS using your Social Security number. This could get you in trouble with the IRS because it will make it appear that you didn’t report all of your income on your next tax return. If you think you may have tax issues because someone has stolen your identity, go to irs.gov/identity-theft-central.

    Also, you should file an online complaint with the Internet Crime Complaint Center, or the IC3. The IC3 gives victims of cybercrime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. IC3 sends every complaint to one or more law enforcement or regulatory agencies with jurisdiction. According to their website, the IC3 reflects a partnership between the Federal Bureau of Investigation, the National White Collar Crime Center, and the Bureau of Justice Assistance.

    Here’s another thought: You should also monitor your credit report periodically. You can get free credit reports online at annualcreditreport.com.

    And I’m sure you’ve done this already, but if you haven’t, you should report your stolen purse to your local police department.

    You wondered why the SSA didn’t just cancel your old number and give you a new one. That is something that can be done, but it really should be a worst-case scenario solution. In other words, if you have taken all the steps you can to resolve your problems with no luck, a new SSN can be issued to you.

    But you should keep in mind that a new number probably won’t solve all your problems. This is because other governmental agencies (such as the IRS and state motor vehicle agencies) and private businesses (such as banks and credit-reporting companies) will have records under your old number. Along with other personal information, credit-reporting companies use the number to identify your credit record. So, using a new number won’t guarantee you a fresh start.

    For some victims of identity theft, a new number actually creates problems. If the old credit information isn’t associated with your new number, the absence of any credit history under your new number may make it more difficult for you to get credit in the future.

    And finally, here is some more advice for all readers. Identity theft doesn’t just happen when someone grabs your purse or pickpockets your wallet. Nowadays, it happens more and more online, with scam artists posing as legitimate businesses. I get a dozen such emails every day, supposedly from my bank, my cable provider, or one of my credit card companies. They are usually bringing an alleged problem to my attention that requires me to send them account numbers or my SSN to resolve. But there is always some little hint, usually involving awkward language or syntax, that the message is fake.

    Just today, I got a message, supposedly from my email provider, telling me this: “The Classic version of Your Email is being replaced by a NEW version. It goes FAR in superiority. Click here before you lose your access.” I’m guessing that email, with such clumsy wording and misplaced capital letters, was written by some Ukrainian hacker using some bad Russian-to-English translation software!

    Return to top of page.


    Fast Growing Form Of Identity Theft Slips Through Traditional Protections

    Published in Bottom Line Personal newsletter 11-1-2020

    Says scam expert Steven J.J. Weisman, Esq., founder of the scam information website scamicide.com A scammer applies for credit using your Social Security number but different name and address so the fraud won't appear on credit reports and avoids a credit freeze. Watch for unfamiliar "aliases" on your credit reports. If your credit score drops 50 points or more despite no new problems or major activity, ask the credit bureaus for any "sub files" associated with your Social Security number but not your name. If they exist, follow procedures for reporting identity theft.

    Return to top of page.


    7 FTC Consumer Information Short Articles

    Equifax data breach: Pick free credit monitoring! - Just last week, the FTC and others reached a settlement with Equifax about its September 2017 data breach that exposed personal information of 147 million people. We’ve told you to go to ftc.gov/Equifax, where you can find out if your information was exposed and learn how to file a claim with the company in charge of the claims process. The public response to the settlement has been overwhelming, and we’re delighted that millions of people have visited ftc.gov/Equifax and gone on to the settlement website’s claims form.

    But there’s a downside to this unexpected number of claims. First, though, the good: all 147 million people can ask for and get free credit monitoring. There’s also the option for people who certify that they already have credit monitoring to claim up to $125 instead. But the pot of money that pays for that part of the settlement is $31 million. A large number of claims for cash instead of credit monitoring means only one thing: each person who takes the money option will wind up only getting a small amount of money. Nowhere near the $125 they could have gotten if there hadn’t been such an enormous number of claims filed.

    So, if you haven’t submitted your claim yet, think about opting for the free credit monitoring instead. Frankly, the free credit monitoring is worth a lot more – the market value would be hundreds of dollars a year. And this monitoring service is probably stronger and more helpful than any you may have already, because it monitors your credit report at all three nationwide credit reporting agencies, and it comes with up to $1 million in identity theft insurance and individualized identity restoration services.

    For those who have already submitted claims for this cash payment, look for an email from the settlement administrator. They’ll be asking you for the name of the credit monitoring service you already have. Or, if you want to change your mind, you’ll have a chance to switch to the free credit monitoring. The email from the settlement administrator will tell you what to do next, in either case. And the settlement administrator has said that the claims website will soon be updated with that information, too.

    Please also note that there is still money available under the settlement to reimburse people for what they paid out of their pocket to recover from the breach. Say you had to pay for your own credit freezes after the breach, or you hired someone to help you deal with identity theft. The settlement has a larger pool of money for just those people. If you’re one of them, use your documents to submit your claim.

    August 1, 2019. Read the original article.


    Online Security - The internet offers access to a world of products and services, entertainment and information. At the same time, it creates opportunities for scammers, hackers, and identity thieves. Learn how to protect your computer, your information, and your online files with Tips from the FTC.


    Check your child's credit history. A new federal law that went into effect in September makes it easier to do this and it can be important, because thieves are increasingly stealing children's Social Security numbers and using them to create phony identities under which they take out loans or credit cards. In 2017, the Federal Trade Commission received 14,000 complaints of identity theft targeting people age 19 and younger. The fraud can go unnoticed for years unless parents check their children's credit histories; which few parents do. For information on what to do under the new law, visit the special FTC web page, IdentityTheft.gov.
    From The Wall Street Journal.


    Netflix phishing scam: Don’t take the bait! Phishing is when someone uses fake emails or texts to get you to share valuable personal information – like account numbers, Social Security numbers, or your login IDs and passwords. Scammers use your information to steal your money, your identity, or both. They also use phishing emails to get access to your computer or network. If you click on a link, they can install ransomware or other programs that can lock you out of your data. Scammers often use familiar company names or pretend to be someone you know. Here’s a real world example featuring Netflix. Police in Ohio shared a screenshot of a phishing email designed to steal personal information. The email claims the user’s account is on hold because Netflix is “having some trouble with your current billing information” and invites the user to click on a link to update their payment method. Read the rest of the article at Don’t take the bait!


    Keep hackers out of your home by protecting all of your connected applinces. TVs, refrigerators, baby monitors and other objects now may be connected to the Internet for remote operation—and therefore may be vulnerable. Self-defense: Use multifactor authentication for each appliance, such as a password plus a security key or onetime code sent to your phone. Pay attention to all notices of security updates and download and install all of them. Install malware protection on every device. Change default user names and passwords on each device as soon as you set it up.
    From: Roundup of experts on Internet of Things


    Do not use Facebook to log on to other sites. Logging on to websites through Facebook is very convenient, but it can give hackers access not only to your Facebook account but also to any account that you reach through Facebook. That means a single hacking incident at Facebook can jeopardize your security at a huge number of sites; which is exactly what happened in the recent Facebook breach affecting at least 50 million users. Facebook says it has no evidence that the hackers got into accounts at other sites through Facebook, but this is uncertain; and the risk of having it happen outweighs the small convenience of using Facebook as a sign-on service.
    From: Roundup of experts on computer security.


    New Medicare cards coming.
    Starting in April 2018, Medicare will begin mailing new cards to everyone who gets Medicare benefits. Why? To help protect your identity, Medicare is removing Social Security numbers from Medicare cards. Instead, the new cards will have a unique Medicare Number. This will happen automatically. You don’t need to do anything or pay anyone to get your new card. Read the entire article at FTC Consumer information.

    Return to top of page.


    How to Protect Your Home From Deed Theft

    By Pat Mertz Esswein, Kiplinger’s Associate Editor June 27, 2019

    You don’t need to pay a company to protect you from criminals who put their names on your home title. You can protect yourself for free with these steps.

    In 2008, the FBI identified “house stealing” as the “latest scam on the block.” Since then, it has popped up periodically in cities such as Chicago, Dallas, Detroit, Los Angeles, New York City and Philadelphia. Is it a growing problem? That’s hard to know because the FBI doesn’t break it out separately in its crime statistics. The American Land Title Association doesn’t have data on the problem, either. “I suspect that companies that offer title-monitoring service use that [the claim] as a marketing strategy,” says Jeremy Yohe, vice president of communications at the association.

    The scheme works like this: Fraudsters pick out a house—often a second home, rental, vacation home or vacant house—to “steal.” Using personal information gleaned from the internet or elsewhere, they assume your identity or claim to represent you. Armed with forged signatures and fake IDs, they file paperwork with the county’s register of deeds to transfer ownership of your property to themselves or a third party. They then sell the home or borrow against it, stealing your equity. When they fail to make payments on a loan secured by your property, you could end up in foreclosure or be unable to sell, refinance or pass the home on to heirs.

    Home Title Lock is one of the services that says it will monitor your home’s deed 24/7 to prevent title fraud; it costs $15 a month ($150 annually, two years for $298). But you can protect yourself—for free—by periodically checking your property record on the website of your county’s register of deeds. Look for deeds that you or your attorney didn’t prepare or sign, or loans you didn’t take out, as well as liens of contractors, subcontractors, real estate brokers or attorneys whose services you didn’t hire, or court filings, says the Cook County (Chicago) recorder of deeds.

    Even better, many counties now provide a consumer notification service. Register for free, and you’ll quickly receive an e-mail or text any time a document is recorded on your property.

    The New York City department of finance advises homeowners to make sure the appropriate authorities have the correct mailing address for you or the person who should receive notices about your property. In your absence from your home, have mail forwarded or ask someone you trust to pick up mail or visit your home. Visit a vacant house periodically to ensure that no one has taken up residence illegally.

    You may get clues when title fraud occurs: You stop receiving your water bill or property tax assessment or bill, for example. Utility bills on a vacant property rise suddenly, or you find people living there. You stop receiving your tenants’ rent payments and learn that they’ve been making the payments to another person and location. You receive payment books or other information from a lender with whom you haven’t done business. Or you find yourself in default on a loan or notified of foreclosure proceedings.

    If you experience or find something amiss, notify the register of deeds and local law enforcement. In New York City, for example, homeowners who think they are victims of deed fraud are urged to act quickly to report fraud to the city’s sheriff, get a certified copy of the fraudulent document from the city register’s office, report the crime to the district attorney’s office in the borough where the property is located, and consult an attorney to help confirm ownership of the property. (Legal action known as “quieting the title” may be required to resolve any questions about your ownership of the property.)

    Return to top of page.


    Preventing and Responding to Identity Theft

    Department of Homeland Security

    Is identity theft just a problem for people who submit information online?

    You can be a victim of identity theft even if you never use a computer. Malicious people may be able to obtain personal information (such as credit card numbers, phone numbers, account numbers, and addresses) by stealing your wallet, overhearing a phone conversation, rummaging through your trash (a practice known as dumpster diving), or picking up a receipt at a restaurant that has your account number on it. If a thief has enough information, he or she may be able to impersonate you to purchase items, open new accounts, or apply for loans.

    The internet has made it easier for thieves to obtain personal and financial data. Most companies and other institutions store information about their clients in databases; if a thief can access that database, he or she can obtain information about many people at once rather than focus on one person at a time. The internet has also made it easier for thieves to sell or trade the information, making it more difficult for law enforcement to identify and apprehend the criminals.

    How are victims of online identity theft chosen?

    Identity theft is usually a crime of opportunity, so you may be victimized simply because your information is available. Thieves may target customers of certain companies for a variety of reasons; for example, a company database is easily accessible, the demographics of the customers are appealing, or there is a market for specific information. If your information is stored in a database that is compromised, you may become a victim of identity theft.

    Are there ways to avoid being a victim?

    Unfortunately, there is no way to guarantee that you will not be a victim of online identity theft. However, there are ways to minimize your risk:
    1. Do business with reputable companies – Before providing any personal or financial information, make sure that you are interacting with a reputable, established company. Some attackers may try to trick you by creating malicious web sites that appear to be legitimate, so you should verify the legitimacy before supplying any information. (See
    Avoiding Social Engineering and Phishing Attacks and Understanding Web Site Certificates for more information.)
    2. Take advantage of security features – Passwords and other security features add layers of protection if used appropriately. (See Choosing and Protecting Passwords and Supplementing Passwords for more information.)
    3. Check privacy policies – Take precautions when providing information, and make sure to check published privacy policies to see how a company will use or distribute your information. (See Protecting Your Privacy and How Anonymous Are You? for more information.) Many companies allow customers to request that their information not be shared with other companies; you should be able to locate the details in your account literature or by contacting the company directly.
    4. Be careful what information you publicize – Attackers may be able to piece together information from a variety of sources. Avoid posting personal data in public forums. (See Guidelines for Publishing Information Online for more information.)
    5. Use and maintain anti-virus software and a firewall – Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall. (See Understanding Anti-Virus Software and Understanding Firewalls for more information.) Make sure to keep your virus definitions up to date.
    6. Be aware of your account activity – Pay attention to your statements, and check your credit report yearly. You are entitled to a free copy of your credit report from each of the main credit reporting companies once every twelve months. (See AnnualCreditReport.com for more information.)

    How do you know if your identity has been stolen?

    Companies have different policies for notifying customers when they discover that someone has accessed a customer database. However, you should be aware of changes in your normal account activity. The following are examples of changes that could indicate that someone has accessed your information:

  • Unusual or unexplainable charges on your bills
  • Phone calls or bills for accounts, products, or services that you do not have
  • Failure to receive regular bills or mail
  • New, strange accounts appearing on your credit report
  • Unexpected denial of your credit card

    What can you do if you suspect or know that your identity has been stolen?

    Recovering from identity theft can be a long, stressful, and potentially costly process. Many credit card companies have adopted policies that try to minimize the amount of money you are liable for, but the implications can extend beyond your existing accounts. To minimize the extent of the damage, take action as soon as possible:
    Start by visiting IdentityTheft.gov – This is a trusted, one-stop resource to help you report and recover from identity theft. Information provided here includes checklists, sample letters, and links to other resources.
    Possible next steps in the process – You may need to contact credit reporting agencies or companies where you have accounts, file police or other official reports, and consider other information that may have been compromised.

    Other sites that offer information and guidance for recovering from identity theft are:
    Federal Trade Commission
    United States Department of Justice
    Social Security Administration.

    Return to top of page.


    Upgrading Your Phone? 4 Things You Should Do First

    By Alvaro Puig, FTC Nov. 2019

    If you’re thinking about upgrading to a new phone, make sure you remove your personal information before you trade it in. Why? Because your phone could have a lot of sensitive, personal information on it – like your passwords, account numbers, emails, text messages, photos, and videos. If that information ends up in the wrong hands, someone could use it to wreak havoc. They could open accounts in your name, spend your money, hack into your email, or take over your social media accounts. Here’s how to remove your personal information before you trade in your phone.

    Step 1. Back It Up
    If you're going to trade in your phone, the first thing you should do is back up your data.
    How to
    Back up your data on an iPhone and Back up your data on an Android phone

    Step 2. Remove SIM and SD Cards
    If your phone has a SIM card, it may store your personal information. Remove the SIM card. If you'll keep the same phone number, you may be able to transfer your SIM card to your new phone. But if you don't re-use the SIM card, destroy it. If your phone has an SD memory card for storage, remove it.
    How to remove an SD card from an Android phone

    Step 3. Erase Your Personal Information
    Remove information from your old phone by restoring or resetting it. After you restore, or reset your phone, confirm that you erased things like your contacts, text messages, photos, videos, and browsing history.
    How to Restore your iPhone to factory settings and Reset your Android phone to factory settings

    Step 4. Disconnect Your Phone From Accounts and Devices
    Before you turn in the phone, double check that it’s no longer connected to your online accounts or other devices.

  • If your phone was paired to another device, like a watch or a vehicle, make sure it’s un-paired.
  • Make sure that passwords for your accounts or Wi-Fi are no longer saved on the phone.
  • If you use 2-step verification or multi-factor authentication to log in to any accounts, remove your phone from the list of trusted devices.
  • If you’re not keeping your phone number, change the number on file with any accounts or services that may be using it to identify you.

    Just got a new phone? Find out how to protect it and your data. These tips work for not-so-new phones, too!

    Return to top of page.


    SIM-Swapping Is Another Technology Scam That Can Create Chaos With Personal Info

    KimKomando komando.com

    Here’s a new term to fear: SIM-swapping.
    In short, a cyber-criminal steals a certain amount of your personal data, including your phone number. He contacts a different carrier, pretending to be you, and claims to have lost “his” phone. He convinces the carrier to supply a new phone and SIM, disconnects the “old” line, then transfers “his” apps and information from the cloud.

    But it gets worse.
    In theory, you have two-factor authentication, which would help prevent a security breach. With SIM-swapping, the criminal controls your phone using a different device. So the 2FA text message that typically would alert you to the thief’s presence never reaches you. Suddenly your phone doesn’t work. While you’re trying to figure out what’s wrong with it — without being able to make calls — the hacker is digging through your apps and files, gorging himself on your private data, and likely even your bank account information. By the time you’ve caught up, your passwords have been changed, and you are stuck desperately trying to regain control of your own accounts. More than 3,000 people have lost access to critical accounts, thanks to SIM-swapping, with some reporting being blackmailed in addition to having their identities stolen. It’s one of the most difficult cybercrimes to prevent and fight against.

    Here are a few ways to stay safe:

    KEEP YOUR PERSONAL INFORMATION SAFE
    One thing makes SIM-swapping possible: the leaking of personal data. In many cases, this data is stolen through major breaches and sold on the Dark Web. Cybercriminals use fake IDs or cherry-pick public records. They may even bribe retail employees into providing the information they need. These kinds of leaks may be beyond your control.

    But phishing scams, in the form of emails and texts, are designed to trick unsuspecting users into exposing private data. Deflecting these attempts is your first line of defense. You should always investigate suspicious emails or unexpected correspondences to prevent identity theft.

    INVEST IN A SECURITY KEY

    Security keys are a new way to authenticate your identity online, and they’ve received acclaim from cybersecurity experts across the board. These small, USB-powered devices act as a physical key to your account and must be inserted into your computer when you log in.

    Two of the most popular brands on the market are Yubico and Google Titan, both of which provide keys that work with computers and mobile products. The phone-based products are Bluetooth compatible and give you the same benefits a USB key would for a desktop machine. Unfortunately, not every platform currently supports security keys.

    SET UP A TWO-FACTOR AUTHENTICATION APP

    As I mentioned, SIM-switching is designed to circumvent 2FA, but only if your 2FA relies on text messages on your phone. A 2FA application will help protect yourself because you can use this app without your phone, or by using Wi-Fi.

    One example: Gmail users can enjoy a free 2FA protection plan by signing up for Google’s in-house Authenticator app. This app essentially replaces the need for your phone number and generates a one-time code for you to enter each time you log in. This is one of the most direct ways to circumvent SIM-swapping. To use Authenticator, you’ll need to set up 2FA on your Gmail account. Once you’ve set up Authenticator, you’ll stop receiving text messages when you try to log in.

    Keep in mind, if you lose your phone, you’ll have difficulty getting back into your account; however, this is by far the most ironclad protection against SIM-swapping.

    CREATE A PIN

    A cybercriminal may trick your carrier into switching SIMs, but you can also work with your carrier to catch potential identity thieves. One of the most popular ways is setting up a passcode or PIN for your mobile account. Some carriers, such as T-Mobile, require a PIN to make any changes to your account by default. If you’re not sure whether your account has a PIN, call your carrier and explain you want to set up an authentication passcode or PIN to verify your identity.

    Once your carrier has set up a code, any would-be impostor will need to provide this number to gain access to your phone number. Make sure to write your PIN down and keep it in a safe place where nobody else can access it. We recommend not storing this digitally and choosing a number no one can guess.

    NOTIFY YOUR CARRIER

    If all these defenses fail and your SIM is compromised, you’ll have to act fast. Contact your carrier, either in person or by using a trustworthy phone. Notify the company that your SIM has been stolen and you need to switch off the new phone immediately. You also want to remotely log out of any accounts that have been accessed by said cybercriminal. This kind of invasion can cause ripple effects for months and years, but the faster you act, the less damage you’ll need to control.

    Return to top of page.


    The Technophobe’s Guide To Cybersecurity

    Alice Holbrook, NerdWallet

    Having your data exposed in a breach feels inevitable, so securing your information online is a must. But with terms like VPN, SSO and HTTPS being bandied about, it’s hard to know where to start. It’s true, there are many, many steps you could take to improve your security — some involving acronyms — but experts say a few basics will help a lot.

    “It can seem overwhelming, but it’s really not,” says Kelvin Coleman, executive director of the National Cyber Security Alliance. “Low-hanging fruit can be very, very effective in keeping you safe.”

    These simple habits will protect you against some of the most common threats to your personal and financial data, such as identity theft.

    Use secure passwords

    “Unfortunately, a significant number of people still use 123456 and password1,” as well as other easy-to-guess login credentials, Coleman says. If you reuse the same password, it’s easy for criminals who’ve hacked one of your accounts to access others. If you’re not interested in designing and remembering complicated passwords for all of your approximately 500 online accounts, Dukes recommends a password manager — consider 1Password or Last-Pass — that can suggest and store them for you.

    Erin Shepley, Cybersecurity Awareness Month Lead for the Department of Homeland Security, also suggests using multifactor authentication on your most important accounts, such as your email and bank logins. This process requires you to approve a sign-in on a separate device — such as your phone — making it easier to detect and foil unauthorized logins. If your account offers it, the option is typically available under security settings. (Google calls it “two-step verification.”) “If it takes more time for the malicious actor, they’ll move on to someone who doesn’t have that in place,” Shepley says.

    Be wary of public Wi-Fi

    You’ve heard it before, but “public wireless ‘hotspots’ are just that, public,” Dukes says. Information you transmit on them — including credit card data or logins — can be intercepted by a hacker on the same network. Networks without passwords, such as the ones you’ll find at some airports or hotels, are especially risky. Not only that, but criminals might spoof a legitimate access point. It’s always smart to confirm you have the correct network name before you use it, according to the DHS.

    If you really must do sensitive tasks — such as shopping or checking your bank balance — outside of your home network, using your own personal hotspot is safer than public Wi-Fi. And always make sure the URLs you’re using for these tasks begin with “https://,” Shepley says.

    Don’t fall for phishing scams

    It’s not new, but criminals still do it because it works: They contact you, claiming to be someone — maybe someone you know — who needs your financial data, Social Security number or other personal information. They can then use this data to access your accounts.

    “Phishing is still the threat vector of choice,” Shepley says. “They prey upon the human nature in people.”

    It’s not always easy to tell a legitimate message from a scam, but if you’re being asked for money, login credentials or other personal data, you should verify the message before responding. For example, if you receive an email purporting to be from your bank, the DHS recommends calling your bank for confirmation on a phone number you have Googled; don’t click any links within the suspicious email.

    Update your devices

    “Security software is quite effective against known malware,” says Curtis Dukes, executive vice president of the Center for Internet Security. That’s because engineers are constantly creating new versions in response to current threats. Your computer and mobile devices likely have security software built into their operating systems, and they should notify you of updates automatically. The pop-ups might feel intrusive, but they’re there to protect you.

    So you should resist the urge to delay updates. “I wish I could lobby to have that ‘or later’ button deleted,” Coleman says.

    Safety doesn’t have to be complicated. Once you have mastered these steps, you can absolutely take further action to lock down your online presence. You might even be inspired to set up a VPN, or virtual private network, a service that can create a secure connection on a public network.

    But the good news is that simple changes — like using unique passwords — can go far in keeping you safe online. “It won’t save you every time. But … it’s better to have it than not have it,” Coleman says.

    Return to top of page.


    Thieves Create False Identities Using Child's Social Security Number

    By Bev O'Shea, NerdWallet. Published April 27, 2018 by 13 on your side.com.

    Identity theft, or identity fraud, once meant crooks were churning out fake credit cards. But as that became easier to detect, a more insidious crime has evolved: the creation of completely new identities. Known as “synthetic identity theft,” it involves fraudsters using a combination of fake information, such as a fictitious name, and real data, like a child’s Social Security number, to create fraudulent accounts. It is a growing problem, says Eva Casey-Velasquez, president and CEO of the nonprofit Identity Theft Resource Center. But the scope of the problem is difficult to determine because the crime can go undetected for years, she says. However, the rate of children’s identity theft was more than 50 times that of adults, according to a 2011 report by Carnegie Mellon University’s CyLab, which studied the identities of over 40,000 children. And that report was published before a change in the way Social Security numbers are issued made identity thieves’ work a bit easier.

    How does synthetic identity theft work?
    First, thieves assemble an unused Social Security number — typically that of a minor — along with a fictitious name and birthdate, and an address controlled by the thief. With those pieces in hand, identity thieves apply for a credit card. While an initial application will be turned down because the “applicant” doesn’t have a credit profile, it creates a record of a “person” who doesn’t actually exist. The next step is to add that “person” to a legitimate account, or more likely several.

    One way to do that is by “piggybacking” — or becoming an authorized user — on a legitimate account, perhaps that of an accomplice or a patsy, who doesn’t understand what’s going on, Casey-Velasquez says. A second, more pernicious piggybacking involves paying a credit-boosting company for the persona to be temporarily added as an authorized user to someone else’s card — a card that has a long history and low utilization. It doesn’t include getting a physical card or a card number or having charging privileges.

    In time, there will be a credit history and score for this fictitious person, making it easier to qualify for credit. Casey-Velasquez said the identity often includes an occupation and income, and as long as it seems reasonable, it can go undetected by card issuers. Over a period that can span years, identity thieves may make small charges and pay them off, thus building a good credit score and receiving higher credit limits. Then, when they decide the limits are high enough, they do what is called a “bust-out”; suddenly charging the cards up to their limits, paying nothing and discarding the identity.

    How do thieves get minors’ Social Security numbers?
    Taking over a child’s Social Security number was made easier after the federal agency’s switch to randomization in 2011. Before then, the digits were tied to birthdate and geography, so it was more difficult to use a child’s Social Security number without it being discovered. Now a child’s number can more easily be used to establish a credit history. Minors are especially vulnerable because they are likely to have an unblemished credit history.

    Some thieves have even been able to make made-up, random numbers work. Casey-Velasquez said criminals have used Social Security numbers that haven’t even been issued yet — and when that number is eventually assigned to a newborn, parents find out that the number already has a credit history. In some cases, thieves get access to a child’s stolen Social Security number. And since address verification measures for credit applicants are often out of date, anyone with a printer can produce a fake utility bill for an abandoned property to “prove” the fictitious person lives there.

    What are the uses of synthetic identity?

    According to the Government Accountability Office, there are three main reasons people create these false identities:

    • Identity fraud for nefarious activities: stealing money or benefits. This is the one that costs businesses the most in terms of credit card fraud.
    • Identity fraud for residency or work: a false identity created to live or work in the U.S.
    • Identity fraud for credit repair: the perpetrator combines his or her real name with an unblemished Social Security number to create an alternate credit history.

    Who is most at risk?

    Randomized Social Security numbers put children born after 2011 at especially high risk for synthetic identity theft — and the theft of a child’s Social Security number can go undetected for years. Only later, when a victim tries to apply for credit using that number, is he or she likely to discover it has been misused. For example, a high school student applying for a student loan or a first job might find their Social Security number is already in use. Then, it’s their mess to clean up. Anyone with a pristine credit history can be a target. Data breaches mean a lot of Social Security numbers are out there and up for sale. It’s best to assume those digits aren’t private and to try to ensure they aren’t misused.

    How can you protect your child?

    • Freeze your child’s credit: If this is an option in your state, consider it. Most states now require that a record is created for the purpose of freezing a child’s credit. But that protects your child from only one kind of identity theft — credit identity theft. Synthetic identities have also been used to file fraudulent tax returns and to qualify for benefits and medical care, and freezing credit won’t help that.
    • Minimize exposure: Don’t provide your or your child’s Social Security number when requested on a form. In many cases, there’s no issue. If someone requires it, ask why, and how the information will be protected.
    • Monitor communications carefully: Investigate anything that seems unusual or suspicious. If you or your child gets a medical insurance Explanation of Benefits that doesn’t make sense, follow up.

    Return to top of page.


    How to Keep Financial Information Safer on Your Phone

    By Eva Velasquez IDTheftCenter.org as published in Bottom Line Personal July 1, 2017

    More and more of your financial life happens right on your smartphone—and not just buying stuff on Amazon and elsewhere. Banking and brokerage apps let you check accounts…move money…pay bills…manage investments. Payment apps let you pay with your phone at stores. And then there is the financial information that could be mined from your e-mails, texts, downloaded documents and contact list. Is it all secure?

    It probably isn’t. Eva Velasquez, who runs the Identity Theft Resource Center, a nonprofit that helps victims of identity theft, knows the mistakes that can compromise smartphone security and make a user’s financial information vulnerable. Bottom Line Personal asked Velasquez how our readers can improve the security of their smartphones, and she shared her best ideas…

    TAKE RESPONSIBILITY

    With all the convenience we enjoy by having our finances on our phones, we should—and indeed, we must—accept some responsibility for improving the security. As you add apps, you add layers of vulnerability. So you should also take advantage of some added layers of protection.

    I work with victims of identity theft, and I can tell you that people often don’t know how their information was compromised. It could have been a computer virus…a data breach at a company you did business with…or even someone who snooped directly on your phone transmissions. No computer—and your smartphone is a computer—will ever be impenetrable. But there are many things you can do to make yourself safer.

    Steps that smartphone users should take to protect themselves…

    • Create better passwords. The front-line protection for your digital life is your password or, more accurately, the collection of passwords that you use across the Internet. This is where better security must begin. Make your passwords stronger. You want a longer string of characters, with symbols, numerals and upper- and lower-case letters—not the usual passwords made from the name of a pet or your child’s birth date. And then you must vary your passwords—don’t use the same one for multiple sites. That way if a password is compromised, it’s less useful to hackers and thieves.

    Of course, if you’re good about varying your passwords, you will soon face a sizable challenge in remembering all of them. Keeping a list on your laptop or your phone or a yellow sticky on your computer monitor is not OK! I use a system that’s going to sound complicated as I explain it—but isn’t hard once you get the hang of it. Start with a phrase you’ll remember but that isn’t terribly common—“The dude abides,” for example, from the movie The Big Lebowski. Capitalize each word, and substitute a symbol such as the % sign for the spaces. This is your core password phrase—in this example, The%Dude%Abides. Then you can vary your core password according to a rule that you set, such as using the first two letters of the website as a prefix and the season and year as a suffix, so you can change it multiple times a year. By this system, your password for Chase Bank could be chThe%Dude%AbidesSP2017. No one’s going to break that password, and if you keep the rules of your system consistent, it’s really not hard at all to keep track of it.

    That said, a password manager—a phone app to store all your passwords safely—can be a good alternative. (See the article“You Can Escape Password Overload”) If you really can’t master my memory system or the technology of a password manager app, and you resort to pen and paper, keep your password list in a locked drawer, not in an easily accessible place such as your wallet or purse.

    • Avoid public Wi-Fi. There was a time when I would have told you to be careful and limit your activities when you use public Internet access in cafés, hotels, buses, planes and so on. But at this point, such networks are just too fraught with potential for your personal data and financial information to be stolen. My advice now: Don’t use public Wi-Fi without also using your own virtual private network (explained below). You should be particularly wary when public Wi-Fi doesn’t require a password, but even networks that require a hotel room number or other credential are likely to have very weak security. Accessing the Internet through your cell-phone service is a much safer option.

    • Avoid public charging stations. I’m talking about the charging stations, usually plastered with advertising, that are proliferating at airports and convention sites and that provide the USB or Apple Lightning connector to plug into your phone. That’s not just a charging cable—it also can be a two-way street for data. Security experts have demonstrated that public charging stations might be used to collect passwords and other information from users’ phones. If you plug your own charging cable into a wall-type power outlet, you’re almost certainly safe. Or buy a rechargeable external battery pack, and use that to charge your phone when you are on the go.

    • Use a virtual private network (VPN). Many people will first encounter a VPN on devices issued by their employers for their work, but this is an option for individual consumers now, too. A VPN is a way of creating a safer network that still operates over a public Wi-Fi connection. With encryption and some other technical tricks, the VPN makes it much harder for a snoop to intercept data as it moves across the Internet. To get a VPN on your phone, you must sign up for a service, pay a small monthly fee and download an app. A VPN is especially important if you use your smartphone on an airplane, where cell-phone service is unavailable and public Wi-Fi is the only option. You can find VPN services on Google Play for Android phones and in the App Store for Apple devices.

    • Update your software. Keep your phone’s operating system and individual apps up-to-date. One of the things that happens in software updates is that ¬security flaws get fixed!

    • Choose two-factor authentication. This is a way of authenticating your identity when you log into sensitive apps, such as for banking or brokerage accounts. It adds an extra step in which, typically, a code is texted to your phone or e-mailed and must be used in addition to your password as you log in. This adds an extra layer of security because a hacker would need to access both your password and your phone to obtain the code. Not every financial institution offers two-factor ¬authentication, but when it’s available, go for it.

    • Sign up for account activity notifications. A growing number of banks and other financial companies have systems to notify you by text, e-mail or a phone call about activity on your account. This helps you keep track of routine things, such as automated bill payments, and allows the bank to flag suspicious activity, such as a big online purchase or a withdrawal from an ATM in an unusual city. You have to sign up for some of these notifications. Then you also have to pay attention. The point of getting messages about routine transactions is that someday one of them might be something not routine, something unauthorized, perhaps the start of a fraud. And one more thing—make sure that you keep your contact information up-to-date at all the financial companies that might legitimately need to reach you.

    • Make yourself phishing-proof. You have no doubt heard of phishing scams—e-mails or texts that pretend to be from legitimate companies but that try to get you to follow dangerous links and reveal private information. And you can try to identify and selectively ignore them. But there’s an even better way to avoid ever being the victim of phishing. Even when a communication from a company doesn’t seem suspicious, my best advice is, don’t click—go to the source. You already know how to reach your bank or brokerage or insurance company. If you get an e-mail or text that purports to be a warning about a problem with your account or any other matter, contact the purported sender the way you normally would. That is, go to the app or website you always use for that financial institution, or call the phone number on your credit card or statement.

    Phishing scams are ever more sophisticated. I used to tell people they might spot one with visual clues such as a funky logo or bad spelling or grammar. But such tips aren’t that useful anymore and can provide a false sense of security. Many texts and e-mails do a good job of looking like real communications from companies you do business with.

    Return to top of page.


    Latest Hacker Target: Cell-Phone Accounts

    John Sileo, as published in Bottom Line Personal, November 15, 2017

    Hackers are hijacking cell-phone numbers as a way to take over financial and social-media accounts.

    How it works: A hacker calls your mobile-phone service provider, claims to be you, says that your phone was lost or broken and asks to have the phone number and account transferred to a different cell phone—one that the hacker controls. If the customer service representative doesn’t fall for the ruse, the hacker keeps calling back until he/she reaches a rep who does.

    To verify customers’ identities, many sites send a onetime security code to a phone number that the customer ¬provided—which now may be the number that the hacker controls. If accessing an account also requires a password, the hacker may claim to have forgotten this password and ask to have it reset, knowing that a new temporary code will be sent to the number he now controls. Using this method, he might be able to loot your financial accounts, take over your social-media accounts and/or send messages in your name to your contacts.

    What to do: Ask your cell-phone service provider whether it’s possible to add a special verbal “call-in” password or PIN to your account that will have to be provided by anyone trying to make changes to the account over the phone. Most providers now will do this upon request. Also avoid entering your cell-phone number on forms unless it’s mandatory—prying eyes at many companies could be collecting numbers. Supply a landline phone number instead.

    Ask your financial companies whether they offer “app-based” two-factor authentication, and sign up for it if they do. With this, the onetime code needed to access your account is sent to your phone not as a text message but through a password-protected app on your phone, creating an additional layer of security.

    If your phone screen says “no signal” or “emergency calls only” when you are somewhere where you usually have reception, and turning the phone off and back on does not fix the problem, immediately contact your cellular provider from a different phone to ask whether any changes have recently been made to your account.

    Return to top of page.


    Fake Unemployment Claims On The Rise In Michigan

    The city of Walker took 100 reports since November.
    Author:Sarah Sell Published: January 25, 2018

    Police agencies across Michigan say they are seeing a major increase in unemployment fraud complaints. It's an issue the WZZM 13 Watchdog team told you about two months ago, when a few of our employees had unemployment claims filed in their names. Since then, it's gotten worse. In Walker, there have been over 100 reports taken since November. Victoria Russman, Operations Supervisor at WZZM 13 was just hit this week. "It's a weird feeling. I'm feeling a bit violated. So, I’m thinking, now what do I have to do? I need to get on top of this."

    She now must file a fraud complaint with the UIA and either freeze or put a fraud alert on her credit.

    It can be a frustrating process.
    "I guess waiting on hold on the phone, I called the credit agencies and it was all automated, I never got to talk to a person," Russman said. You might find it easier to do everything online. The UIA has a page on its website
    to report fraud.

    The agency says it has seen an increase in fake claims, which it anticipated after the recent data breaches. "You're as careful as can be, so that's the frustrating thing," Russman said.

    West Michigan communities, like Walker have been hit hard. Police have taken just over 100 reports since November. Wyoming had 19, and Kent County has seen about one to six per week. Grand Rapids has taken 107 fraud complaints, but couldn't tell us how many were related to unemployment. Michigan UIA spokesperson Chris DeWitt says, “We are increasing our efforts to stop the criminals from getting any unemployment insurance benefits and then have them brought to justice for their crime.”

    "There's just so many ways I guess people can get info. It's out there and it’s scary", said Russman. Investigators say the criminals are from out of state and using the UIA because the agency typically tries to get people benefits as soon as possible. However, increased security measures have been put in place, and the agency is catching most of the fraud, before money is doled out. Some of the West Michigan police agencies we talked to said that this week has been a bit slower for complaints, so they are hoping the worst, is over.

    Webmaster:
    Just another reason to guard your personal info. If you get anything that isn’t quite right, text, letter, phone call, something on a statement, call your provider directly from the phone number you will find on last months statement or in your personal address file. NEVER NEVER EVER use the number on the suspected communication ! !

    Return to top of page.


    Five Things You Must Do If Your ID Is Stolen

    By David Bailey, WZZM TV 13

    Today I'd like to give you the top 5 things I did immediately after I knew I was a victim of identity theft.

    1. Pull everything!
    Pull your credit reports, financial statements and bank account information and highlight all items that are not correct. This will help to show you the depth of the assault on your credit.

    2. Contact the financial institution involved in the fraudulent transaction(s).
    They need to know immediately that what's been done was a criminal act. In my experience, they handled it professionally and took me seriously. I was very clear with them I did not complete this transaction and had nothing to do with it. I told them I would like them to investigate what happened so it didn't happen again to somebody else.

    3. Put a fraud alert or freeze on your credit reports.
    I did this with all three credit reporting agencies (Equifax, Experian and TransUnion). Initial fraud alerts are free and will be in place for at least 90 days. I doubled down and subscribed to constant monitoring from Equifax to make sure once anything changed on my credit report, I would be alerted immediately.

    Here are the links:
    TransUnion Freeze
    Experian Freeze
    Equifax Freeze

    4. File complaint with the federal government.
    One of the easiest and most official things to do is to file a report with the Federal Trade Commission. I provided them all the information and that allowed me to spit out a detailed report I could use to provide the financial institutions and the police a detailed explanation of what happened.

    Get started with the FTC ID Theft Report.

    5. File a police report.
    In my identity theft case, the investigating agency was going to be in the state of Alabama. But I live in Michigan. I called the policy agency in Alabama where the boat was purchased to alert them to the case and they wanted me to go to my local police department to file a police report. Once your local police department finishes the report, it's up to them to send it to the agency that can handle the investigation. Make sure that gets done or you can get your own copy of the police report to send it to the investigating agency.

    More tips:
    A. Check with the IRS or Social Security Administration to make sure somebody hasn't filed a tax return or claim in your name and social security number.
    B. Make sure you are getting your U.S. Mail. Contact the Post office if you feel you are missing information.
    C. Order credit monitoring for an extended time to make sure no new accounts are opened in your name.

    Return to top of page.


    Tax Return Identity Theft

    From WZZM TV 13

    Signs Your Tax Records Have Been Affected:

    1. Identity thieves often use stolen Social Security numbers to file fraudulent tax returns to obtain false refunds.
    2. Suspect the possibility of identity theft if you receive correspondence from the IRS stating any of the following:
    • More than one tax return was filed using your Social Security number.
    • You owe additional tax.
    • Your refund is being offset or reduced.
    • The IRS is taking collection action against you for a year you did not file a return.
    • IRS records show that you received wages from an unfamiliar employer.

    Action Steps If Your Records Have Been Compromised:

    • Immediately respond to any notices you receive from the IRS.
    • Complete the IRS Identity Theft Affidavit, Form 14039, located at IRS.gov
    • If you are a victim of identity theft or simply believe you may be at risk of identity theft, you should call the IRS Identity Protection Specialized Unit at 1-800-908-4490 so the IRS may take steps to secure your account.
    • Contact local law enforcement.

    Preventing Identity Theft:

    • Be skeptical!
    • Official IRS correspondence will arrive via traditional paper mail. However, be aware that some fraudsters have learned to develop clever forgeries of IRS and state-specific document formats, fonts and logos.
    • The IRS does not contact taxpayers via e-mail, text messages or social media. Forward scam e-mails to phishing@irs.gov.
    • Guard your Social Security number as if it were gold.
    • Never provide personal information via phone, e-mail, mail or the Internet unless you initiated the contact or you are certain regarding the third party with whom you are corresponding. IRS impersonation schemes are most prevalent during tax season. They can take the form of e-mail, phone calls, websites or even social media outlets.
    • Secure electronic and paper forms of financial information.
    • Destroy sensitive information that you discard. Identity thieves may even search through your trash.
    • Utilize anti-spam and anti-virus software. Regularly update security patches.
    • Regularly change Internet passwords.
    • Check your credit reports frequently. A convenient resource is. annualcreditreport.com

    Resources for identity theft victims:

  • Federal Trade Commission identitytheft.gov and ftccomplaintassistant.gov
  • The FTC published a comprehensive Guide for Assisting Identity Theft Victims
  • You may also file a complaint with the FTC.
  • Social Security Administration: ssa.gov.
  • Among other resources, the SSA website provides links for placing fraud alerts on each of your credit files maintained by Equifax, TransUnion and Experian.
  • Internet Crime Complaint Center (IC3): ic3.gov. IC3 is a partnership between the FBI and the National White Collar Crime Center. You may file a complaint via the IC3 website.

    Courtesy: Christopher Harper, Senior Manager | Hungerford Nichols

    Return to top of page.


    Protecting Dead Relatives Identity

    By Adam Levin, as published in Bottom Line Personal June 15, 2017

    Don’t assume that the risk of having your identity stolen lasts only as long as you are alive. More than two million dead Americans become victims of identity theft each year. To an identity thief, the recently deceased are ideal targets. Unlike the living, the dead never notice that they are being victimized and don’t take steps to stop these crimes.

    There is a system in place that is supposed to prevent this when Americans die, their Social Security numbers are added to the Social Security Administration’s “Death Master File.” Once that occurs, credit-reporting agencies note the deaths in their files and credit issuers should not issue new credit. But this process can take months, leaving plenty of time for identity thieves to strike. During these months, it falls to surviving spouses, heirs and executors to protect the identities of the deceased. It’s in their best interests to do so.

    Although these spouses, heirs and executors are not legally responsible for financial losses caused by postmortem identity theft; it’s the duped creditors who are left holding the bag. These crimes can cause them major headaches as they struggle to convince creditors and bill collectors that the debts are not the responsibility of the estate.

    And if the executor of the estate is not paying close attention, identity theft could even go unnoticed, meaning that fraudulent account withdrawals might not be corrected and/or fraudulent bills might be paid, reducing the size of the estate.

    Here’s what you should do…

    SAFEGUARD SENSITIVE INFORMATION

    If you are a surviving spouse or heir, take the following actions to reduce the odds that identity thieves will steal the deceased’s identity…

    Edit the obit. Do not mention the deceased’s home address, birthday or mother’s name in his/her obituary. Some identity thieves scour the obituaries for potential targets, and this information could be useful to them.

    Watch the wallet. There have been cases of hospital or emergency services personnel stealing credit cards from the wallets of the deceased. These thieves sometimes leave most of the contents of the wallet in place in order to decrease the odds that a loved one will realize anything is amiss. What to do: Cancel the deceased’s credit cards as soon as possible. Carefully check the final bill for charges that occurred after the deceased went to the hospital and/or passed away.

    Discard the deceased’s documents with care. Identity thieves have been known to pick through garbage cans outside the homes of the recently deceased. They’re hoping that heirs threw out sensitive paperwork while cleaning out the house. Documents that should be shredded with a paper shredder include tax returns…financial account statements…credit card statements…bank account statements…and anything with a Social Security number.

    Relocate the wake. If you hold a wake or reception in the deceased’s home, an identity thief (or burglar) could show up, claim to be an old friend of the deceased and then slip away from the crowd to steal sensitive information, credit cards and small valuables. Also, an employee working for the caterer, florist or cleaning company you hire for the event could be a crook bent on ID theft.

    Prevent over-sharing on social media. Some identity thieves search the social media accounts of the recently deceased to find the facts they need. If the deceased has Facebook and/or other such accounts, log into each of these and either delete the accounts (assuming that you can gain access or, if you prefer to leave the accounts open as a way to remember the deceased, at least confirm that the account settings restrict access to only a small circle of family members and friends.

    Also read through the posts, deleting any that mention ID-related information such as mother’s maiden name or birth date. If you do not log into the account because you don’t have the password and cannot find it near the deceased’s computer, report the death to the social-media site. This often leads to the account being shut down or “memorialized” in a way that could at least limit access, though this can vary depending on the site and the settings that the deceased selected.

    Have the deceased’s mail held at the post office or forwarded to the estate’s executor. Otherwise, mail containing account information and other sensitive data might sit in the deceased’s mailbox where an identity thief could grab it. Exceptions: This is not necessary if a spouse or some other trusted loved one still lives at the deceased’s address…and/or the deceased has a post office box or locking mailbox.

    SPREAD THE WORD

    Even if you take all the right steps to safeguard your deceased loved one’s sensitive information, he/she still could be victimized by an identity thief. There have been so many data breaches of retailers, financial institutions, government agencies and others in recent years that the information an identity thief needs might already be in circulation. What’s more, postmortem identity theft sometimes is committed not by a stranger, but by a family member who has access to the deceased’s sensitive information. Informing key agencies and institutions about the death can at least contain the damage that a postmortem identity thief can do. Obtain copies of the death certificate as soon as possible—death certificates typically are available through the funeral home or mortuary—and send them along with letters reporting the death to…

    Government agencies including the IRS, Social Security Administration, Department of Motor Vehicles and the tax authority in the deceased’s state. This should prevent identity thieves from having duplicate driver’s licenses, Social Security cards or other documents issued to them in the deceased’s name. Notifying the IRS and state tax authorities promptly should prevent an identity thief from filing a phony tax return in the deceased’s name and receiving a refund.

    The deceased’s creditors and other financial institutions. This includes investment companies and advisers, banks, credit unions, credit card issuers, lenders and insurance companies. If you are not certain which financial companies the deceased used, go through his recent mail, checking account registers, filing cabinets, recent tax returns and wallet in search of clues. Or identify these creditors and financial companies by obtaining a free copy of one of the deceased’s credit reports at AnnualCreditReport.com.

    To obtain this report, you will have to provide identifying information about the deceased, including his Social Security number. It generally is easier to obtain the credit report before the credit-¬reporting agencies are informed of the death. After they learn of it, extra steps might be required for the estate’s executor to obtain a copy.

    The three major credit-reporting agencies. Ask Equifax, Experian and TransUnion to place a “deceased alert” on your loved one’s file. This is like putting a security freeze on the file—it prevents the credit-reporting agency from releasing the file, which should, in turn, prevent new credit accounts from being opened in the deceased’s name. Send certified copies of the death certificate along with brief letters identifying the deceased by full name, Social Security number, last five years of addresses, date of birth and date of death to…

    Equifax, PO Box 740241, Atlanta, GA 30374

    Experian, PO Box 4500, Allen, TX 75013

    TransUnion, PO Box 2000, Chester, PA 19016.

    Helpful: If there are signs that identity theft is occurring despite your efforts—these signs might include money disappearing from the deceased’s accounts…or account mailings arriving from creditors that the deceased did not have—the estate’s executor should call the credit-reporting agencies and the deceased’s financial institutions as quickly as possible to confirm that they received the death certificate and placed a death alert on the file or account. The executor also should call the Social Security Administration and ask whether the deceased’s Social Security number has been added to the Death Master File. If it hasn’t, explain that identity theft is occurring and ask whether anything can be done to speed along the process.

    Return to top of page.


    Prevent I.D. Theft After A Loved One Dies.

    Send copies of the death certificate by certified mail to the three credit-reporting bureaus (Experian, TransUnion and Equifax), and request that a “deceased alert” be placed on the credit report. Mail copies to banks, insurers and other financial firms, along with a request to close the account or change it to joint ownership. Report the death to the Social Security Administration at 800-772-1213; the IRS at 800-829-1040; and your state’s Department of Motor Vehicles. In the obituary, don’t include the deceased birth date, last address, or most recent job. Check the deceased’s credit report at annualCreditReport.com for suspicious activity starting one month after the death and continue to do so for about one year.
    AARP Bulletin.

    Return to top of page.


    Hackers Target Bank Accounts Through Your Phone

    As published in October 15. 2016 BottomLine PERSONAL

    Cyber thieves might use your smart-phone to steal money from your bank account. In this scam, the thieves sneakily get you to download malware onto your phone, possibly by sending you a link to a free app for a card game or risqué content. The malware, known by names such as Acecard and GM Bot, has been around for years but has been adapted to specifically target banking apps on smart-phones. Using the malware, thieves record credentials, such as your user name and password, when you log into your bank account. With that information, they can initiate electronic transfers from your account to accounts they control.

    You can’t necessarily rely on typical bank security measures, such as the use of a verification code that the banks send you by text, because some forms of the malware can capture that code, too. And most smartphone owners don’t use anti-malware software on their phones. Federal law says you can get all of your money back if you notify your bank within 60 days after the fraudulent transaction appears on your bank statement. However, you also typically are required to show that you weren’t lax about safeguarding your information.

    Self-defense: Don’t click on a link in a text message if you don’t recognize the sender. Download apps only from reliable sources such as financial apps on your bank’s website or other apps at Play.Google.com or iTunes.Apple.com. Also, install security software, and make sure it automatically updates. Recomended: For smartphones and tablets with Android operating systems, Malwarebytes Anti-Malware (Malwarebytes. org)...for iPhones and iPads, Avast SecureLine (Avast.com). Both are free.

    Bottom Line Personal interviewed Steven J. Weisman, Esq., an attorney based in Waltham, Massachusetts, founder of the scam-information website Scamicide.com and author of The TruthAbourAvoidingScams.

    Return to top of page.


    Good Advice to Help Stop Phishing

    The following very well done info is from a company I do business with. I substituted ‘your provider’ for their name.

    What is phishing?
    Phishing is an attempt to obtain sensitive account information such as a username or password by posing as a legitimate company, mainly through email or unsolicited phone calls.

    How to spot a phishing email
    Here are some common giveaways:

    • Subject line is "Urgent" or "Immediate Action"
    • Sender name looks odd or unfamiliar
    • Dear Customer… The greeting is not personalized with your name
    • Please confirm your identity... Legitimate sites won't ask to verify identity
    • Misspellings and grammatical errors, including UK spellings
    • Attachments: Unless you requested a document from your provider to be sent via email
    • Links that look modified or unusual (yourprov1der.com or the link [hover your cursor over the link to see the address] may not contain your provider’s name)
    • Vague information

    We will never ask you for your SSN, PIN, card number or any personal information via email, text, phone/recorded audio, or through social media, though we may ask for your SSN and other personal information to verify your identity when you call us.

    Protect your information
    Here are a few things that you can do to help reject "phish" bait:

    Log into your account: As soon as your account is open, log in and create a new unique and secure password. Do not use the same password for multiple sites. See The Word on Passwords article for info on creating strong passwords.
    Change your password frequently: We recommend changing passwords every 90 days.
    Don't click on email links: Manually type in the website that you know is correct or use the one you have in your address book.
    Learn to identify suspicious details: Understand what to look for to uncover an email scam.
    Look for secure site indicators: Authentic login sites have certificates of security indicated by a locked keypad icon by most browsers or an "s" added to the URL.
    Review transaction history frequently for fraudulent charges.
    Enable email notifications to alert you when information has changed on your account
    • When in doubt, CALL your provider using the phone number in your address book.

    Return to top of page.


    New Form of Identity Fraud Soars as Crooks Switch Tactics

    MoneyTalkNews By Jim Gold on February 3, 2016

    Now that new chip-and-pin credit cards are keeping our transactions safe, criminals are turning to another way to commit fraud in your name. Just as new chip-and-pin credit cards help shield us from one kind of identity fraud, crooks are turning to another way to commit crimes — and it’s harder to spot.

    Criminals increasingly are opening credit card and other accounts in victims’ names, says a new identity fraud report by Javelin Strategy & Research, a firm that advises the financial industry. Rather than seeing suspicious charges show up on monthly statements - as would happen if criminals used your existing credit card number fraudulently - you might not spot new-account fraud unless you were checking your credit report, Javelin says. New-account fraud jumped 113 percent in 2015 and now represents 20 percent of all fraud losses.

    Al Pascual, Javelin’s research director and head of fraud and security, says in a press release: “This just shows that when the industry cracks down on one type of fraud, criminals quickly shift their attack.”

    Javelin and others offered tips to combat identity fraud:

      • Monitor your credit report: Cobble together regular free access and monitoring from sites like CreditKarma.com, WalletHub.com or CreditSesame.com. Learn more about how major credit reporting bureaus offer consumers the ability to upload documents to support their case when challenging inaccuracies.
      • Secure your mobile device: Smartphones and tablets have become high-profile targets for both cybercrooks and thieves. Apply software updates when they become available.
      • Exercise good password habits: Strong, unique, regularly updated passwords reduce their value to fraudsters if they’re stolen in a data breach or through malware.
      • Place a security freeze: If you do not plan on opening new accounts soon, a credit report freeze can prevent anyone else from opening an account in your name.
      • Sign up for account alerts: Banks, credit card issuers and brokerages can send emails or text messages about suspicious activity.
      • Take data breach notifications seriously: 1 in 5 data-breach victims suffered fraud in 2015.
      • Seek help fast: The sooner banks, credit card issuers, wireless carriers or other service providers are notified that fraud has occurred on an account, the sooner they can limit the damage.
      • Be alert for international transactions: Let your financial institution know when you are planning to cross borders.
      Return to top of page.


      What’s left behind: Junkyard identity theft

      Susan Shaw Published: November 2, 2015, by WOOD TV8

      Identity thieves could have a field day at a place most people would never considered a threat: a junkyard. Salvage yards have acres and acres of vehicles that aren’t fit for the road. Cars are either crushed or sold off piece-by-piece after a serious crash. But what’s left behind in those cars could be a treasure trove for identity thieves.

      “People use their car as a filing cabinet, and it looks like it when it comes in. It’s shocking what’s left in vehicles,” Stuart Rapaport of Grand Rapids Auto Salvage Yard said. “There’s papers all over the place quite often, but there’s all kinds of things that shouldn’t be in the car.”

      In some vehicles at the salvage yard, Target 8 found stacks of personal information, including what appeared to be house keys and a driver’s address. The story was the same across town at Grand Valley Auto Parts, where Target 8 found more stacks of personal information just lying on the front seat of a junked car. There was a statement from Chase Bank and a credit union statement that listed the account holder’s name, address, account numbers and phone number. Also in the car was a tax annuity statement with an account number, phone number and address.

      That particular vehicle was in a wreck in New York and found its way to Grand Rapids via an auction. Target 8 contacted the previous owner of the car to inform them papers with identifying information had been found lying unprotected in their old car. “I’m shocked,” the owner said. “I feel violated knowing that somebody else has that information on me, very much so.”

      Salvage yard workers say it isn’t at all unusual to find personal information in a junked car. If your vehicle has been in an accident, don’t let out of sight be out of mind. Salvage yards will usually empty a vehicle, but not always. You should get back to your car yourself and check that nothing identifying has been left behind. In some salvage yards, customers are supervised on the grounds. But at other pick-and-pull yards, anyone is free to rummage through everything on their own, which could be the biggest risk for identity theft.

      Webmaster’s note: This also goes for when you take your car into a service facility. Never ever never leave any documents in your car that has your Social Security Number, account numbers of any kind, medical bills, utility bills, charge card bills, and all other personal identification information in your car. Your car is not as secure as you think. It is surprisingly easy to break into. Keep all your personal info at home, preferably in a lock box.

      Return to top of page.


      Don’t Always Share Everything With Facebook

      By Kim Komando as published in the G.R. Press 9-6-15. Visit komando.com

      The point of Facebook is to share your life with other people. You probably have more than a few friends who fall into the over-sharing category. Before you snicker, you may be one too and not even know it. Here are personal tidbits Facebook asks you to share that you’re much better off keeping to yourself.

      Your Phone Number
      It’s a really bad idea to add your home or cell phone number to your Facebook page. Prank callers, stalkers, scammers and identity thieves would love to use this information against you. Not only that, but there’s a Facebook trick that works most of the time. Anyone can use your number to search and find your Facebook page.

      If you do give your phone number to Facebook, hide it in your profile. Go to Facebook and click on your name at the top of the page. When your profile page loads, click the “Update Info” button in the lower-right corner of your cover image. Go to “Contact and Basic Info” in the left column and next to your phone number click the “Edit” link. Click the “audience selector” icon, which will either be a globe or a silhouette of two people, and change it to “Only me.”

      Your Home Address
      Post a picture of your recent vacation or major new purchase and this puts you at risk. Think of all the things that might happen if some nefarious person knew your home address. Remove it from your Facebook profile. Follow the previous directions with your phone number to get into the “Contact and Basic Info” section of your profile information. Look for “Neighborhood,” and if there’s an address there, click the “Edit” link and wipe out the information. Then click “Save Changes.” One other place you might not think about your address being is under events. If you create an event, it often has your address so people know where to go. If that gets set to Public, anyone can see it. Either delete the event after it happens, or tell people attending to message you for the address. Be sure to check your history to get rid of any old events or posts that have your address in them.

      Anything Work-Related
      Try not to leave any information on your Facebook that reveals where you work. If someone from your workplace tries to search for employees on Facebook, they might find a post or photo that they don’t like. Similarly, if a hacker wanted to figure out whom to target if they wanted to break into your workplace’s computers, social media would be their first stop. Of course, they’re more likely to hit LinkedIn first.

      You can use Facebook’s timeline tools to do a scan of your past posts. Remove any information about your current job, especially if it’s of a complaining nature.

      Relationship Status
      Including your relationship status on your Facebook page just invites awkwardness. The number of “likes” that you might get from people after you change your status from “married” to “it’s complicated” will creep you out. Certain relationship statuses are also a draw for cyber stalkers. At one point, there was even a Facebook app that would notify you if friends you flagged changed their relationship status to “single.”

      Don’t forget the scammers out there who specialize in sweetheart scams. They use social media, email and dating sites to create a romantic connection with you and then swindle you out of money. You don’t want them to see that you’re single on Facebook and get ideas. It’s easier to just remove your relationship status entirely.

      Payment Information
      Facebook is free, but it still wants your credit card number. Adding your financial information lets you buy gift cards and other products through the website. Of course, one of the best ways to accidentally get your credit card charged for something could be to leave your Facebook profile open on your home computer. A family member or “joking” friend at your home could use it to spend money on something straight through Facebook.

      Open Facebook, click the upside-down triangle in the top right corner and choose “Settings.” In the left column, select “Payments,” and then on the right go the “Account Settings” tab. You can see if you have any saved payment information and remove it.

      Return to top of page.


      Crooks Have a New Way to Break into Cars

      By Michael Calkins; Bottom Line Personal July 1, 2015

      Thieves have discovered a new high-tech way to break into certain types of cars. The vehicles that are vulnerable constantly emit a low-power signal that automatically allows entry when the car’s remote key fob is within a few feet of the lock, even if the fob is in a person’s pocket or purse. The person who has the fob does not need to touch the fob—he/she just pulls the door handle open to gain entry. The thieves don’t steal the key fob—instead they use a portable radio-signal booster to trick the car into thinking that the fob, which might be, say, somewhere inside the owner’s house and as far as 100 feet away, is close enough to the car to release the lock. If the fob also allows the car to be started with the push of a button on the dash, as some do, the thief even can drive the car away without having a key.

      What to do: If your vehicle has this type of entry system, park in a locked garage when possible. If you park outside, do not leave valuables in view—even when the car is parked in your own driveway. (And remember – Thieves can also steal your identity from your driver’s license, car registration, and insurance certificate. If you have to leave your purse, wallet, etc., in the car; lock them in the trunk! – Brian See Your Vehicle and Identity Theft - Partners in Crime)

      If you want to be especially cautious, store your key fobs inside a metal container when they are not in use to block any incoming radio waves. Encasing the fobs in aluminum foil or storing them in a small decorative tin also works. Don’t leave them in a wooden drawer. Do not store your key fobs inside a freezer, refrigerator or microwave oven, as some people have recommended. While these appliances can block radio waves, key fobs can be ruined by condensation when repeatedly cooled and warmed…and they definitely will be ruined if someone accidentally turns on the microwave with the fobs inside.

      Source: Michael Calkins, manager of technical services at AAA, Heathrow, Florida. He has more than 35 years of experience in the automotive industry…is a certified Master Automobile Technician…and has an Associated Applied Science degree in auto mechanics. AAA.com

      Return to top of page.


      Your Fingerprint Won’t Protect Your Accounts

      Gary Miliefsky as published in Bottom Line Personal May 1, 2015

      Biometric security confirms your identity by scanning some characteristic of your body—such as your fingerprints, irises or the shape of your face—or by listening to your vocal patterns. Recent iPhones and iPads and some other devices already include fingerprint scanners, and a few investment companies have launched biometric-security programs, Vanguard offers voice verification, for example. Facial or iris scanners would use the cameras built into computers. There are problems; however...

      The bad guys can beat biometrics. Biometric technology is improving, but for now, the face, iris and fingerprint scanners sometimes can be fooled with photos. Voice scanners can be fooled with voice recordings.
      Biometric systems can be frustrating to use. A finicky biometric system might deny you access to your own account if, for instance, you have a cold that distorts your voice.
      Some biometrics require additional hardware. Most of today’s computers and Smartphones do not include fingerprint readers, for example.
      You can’t change your biometric data if it’s stolen. If an investment company uses biometric security, it must store your biometric data in its computers. If that computer is hacked, the crooks might get their hands on details about your fingerprints, face, eyes or voice that they could use to invade accounts.

      Return to top of page.


      Cyber Thieves May Have Your S. S. Number

      By John Sileo as Published in Bottom Line Personal April 1, 2015

      Social Security Numbers Are Key
      Unlike the hacking incidents at such companies as Target and The Home Depot, the Anthem breach could lead to long-lasting and even life-altering identity theft for many of the up to 80 million current and former customers potentially affected. That’s because the hackers who invaded Anthem’s computers stole data including names, employment and contact information, health insurance IDs, addresses, birth dates and Social Security numbers. Social Security number breaches are especially dangerous because they don’t just help crooks gain access to your accounts, the way a credit card breach does. Social Security breaches allow the crooks to pose as you in a myriad ways that could wreck your life. Victims might spend the rest of their lives fending off bill collectors about purchases they never made…fighting to remove inaccurate and potentially lethal information from their medical files…explaining to police that it was really someone else who was arrested and skipped bail…and praying that no one steals their tax refunds. That’s far worse than having your credit card information stolen—credit cards can be quickly canceled, passwords can be changed and any losses usually are covered by the issuer.

      If you become a victim of a corporate data breach, don’t be fooled into thinking that you’re safe just because…
      Months have passed and your credit reports remain fine. A 2012 survey by consulting company Javelin Strategy & Research found that 22.5% of people who receive a notice informing them that they were the victim of a data breach later become victims of identity theft, but it doesn’t always happen fast. Data thieves sometimes wait years to use stolen data. You have never been an Anthem customer. There have been other comparable data breaches, and more are sure to follow. Examples: Community Health Systems, a network of more than 200 hospitals across 29 states, had approximately 4.5 million patient records breached. Experian, which maintains confidential credit files, was breached, exposing an unknown number of files. Possible consequences for victims of the Anthem breach—and other similar breaches—and what to do about each…

      Phony Debts In Your Name
      An identity thief who has your Social Security number might open new credit accounts in your name or even borrow against the value of your home. You would not be held legally responsible for these debts ultimately, but it could take decades to clear up the mess. In the meantime, your damaged credit score could mean higher interest rates on loans…higher auto insurance rates…and even rejections from potential employers.

      What to do: Place a security freeze on your credit files. The usual advice is to put a fraud alert on your files, but that does not provide sufficient protection. Alerts generally expire in 90 days, and while lenders are supposed to take added precautions when an alert is in place, these precautions can fail. A freeze completely blocks your credit report from being accessed and credit from being issued until the freeze is lifted.

      Contact all three credit bureaus by phone or online to establish this freeze (Experian.com, Equifax.com and TransUnion.com). You will have to contact the bureaus again and provide a password whenever you wish to temporarily lift the freeze to apply for credit. Costs vary by state, but expect to pay $3 to $10 to each reporting agency each time the freeze is lifted. In some states, there also is a fee to establish or reestablish a freeze.

      Helpful: Ask lenders and credit card issuers which credit-reporting agency or agencies they use, and then lift the freeze only with those—generally only mortgage lenders check all three. In some states, you will be exempt from the fees cited above if you are 65 or older (62 or older in Louisiana and North Carolina) and/or can provide a police report showing that you are a victim of ID theft.

      If you are unwilling to place a security freeze on your credit—perhaps because you are in the process of applying for loans or jobs—at least sign up for an ID-theft-monitoring service. These services do not prevent ID theft, but they can notify you quickly of certain signs of trouble and help you navigate the often frustrating recovery process. Warning: The ID-theft-monitoring services provided to the victims of large-scale data breaches for free usually are badly lacking, possibly monitoring ¬credit reports with only one of the three major credit bureaus, for example. Instead, consider spending around $250 per person a year for a high-¬quality ID-theft-monitoring service. Choose one that monitors credit reports from all three credit-reporting agencies plus address-change requests, court records, driver’s license activity, payday loan applications and websites where stolen identities are bought and sold. Services that use the underlying monitoring technology of a company called CSID tend to be among the most robust. These include IDT911 and LifeLock.

      Phony Debts in Kids’ Names
      If your children are covered through your health insurance, they also could be at risk for identity theft if your insurer or one of your medical providers is breached. This wasn’t a risk with retailers such as Target and The Home Depot that do not normally have minors’ confidential information on file. ID theft can be especially troublesome for minors because it often isn’t noticed for years. One frustrating twist for parents—you generally cannot place a fraud alert or a security freeze on a young child’s credit file. If the child doesn’t yet have credit, he/she probably doesn’t yet have a credit file. If you try to set up a fraud alert or credit freeze for such a child, it could trigger the creation of a credit file, which in some ways makes it easier to steal the child’s identity.

      What to do: An ID-theft-monitoring service that includes family protection can monitor databases for signs that the child’s Social Security number is being used by identity thieves. Even the free monitoring product being offered by Anthem likely can do this, though a higher-quality service offered by a pay service probably could do it better.

      Phony Health Insurance Bills
      Someone could use your health insurance ID number to obtain health services in your name, leaving you to battle health-care providers and bill collectors about co-pays and other fees that you don’t owe. What’s more, your medical records could become corrupted with someone else’s information, leading to a potentially lethal misdiagnosis.

      What to do: Read every “Explanation of Benefits” statement you get from your insurer. If any don’t correspond to a medical visit you made or treatment you had, contact the provider and the insurer immediately to alert them to potential medical identity theft. If you have access to your medical records through a health-care provider’s online patient portal, check this every month or so.

      Stolen Tax Refunds
      An identity thief who has your Social Security number and date of birth could file a phony tax return in your name to claim a tax refund. Not only could this greatly complicate your own tax filing, it might mean that you can’t receive the refund you are due until the situation is cleared up, which could take years. If you filed taxes last year in Florida, Georgia or Washington, DC—the places with the highest rates of tax-refund identity theft—you can apply for an identity-protection personal identification number, or IP PIN, through the IRS website. On IRS.gov, enter “IP PIN” into the search box, then select “The Identity Protection PIN (IP PIN).” Once you receive your six-digit IP PIN, enter it on your tax return to confirm that the return actually is from you. IP PINs also are available to the approximately 1.7 million taxpayers who received a letter offering them this safeguard because the IRS identified what it considered suspicious activity in their accounts. IP PINs cannot be used on state tax returns, however. For more information on eligibility and rules, go to IRS.gov
      - Get An Identity Protection PIN

      Source: John Sileo, president and CEO of The Sileo Group, a Denver-based data-security think tank that has worked with the Department of Defense and Federal Reserve Bank of New York, among other clients. He is author of Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line (Wiley). Sileo.com

      Return to top of page.


      Protect Your Password

      When signing up for a website or online account, don’t answer security questions honestly, such as your mother’s maiden name or your birthplace. You will actually better protect your password, account, and personal identity if you use the wrong answers to the security questions. You will be amazed by the amount of your personal information that is available on the web to anyone. With a little research about you, a bad guy can answer most security questions. Be sure to use something that you can easily remember, or write it down on paper and keep it in a drawer. For instance; answer the question “What make was your first car?” with the nickname you named your car or the color. “What was your mother’s maiden name” you might answer with her middle name instead.

      Return to top of page.



      Ways To Protect Yourself After A Data Breach

      By Koco McAboy Published on WoodTV.com February 7, 2015

      The nation’s second largest health insurer, Anthem, is now scrambling to notify millions of customers who may be the victims of a massive data breach. Hackers broke into the health insurance database storing information for about 80 million people. The hackers did gain access to names, birthdates, email address, employment details, Social Security numbers, incomes and street addresses of people who are currently covered or have had coverage in the past.

      “Every one of us is vulnerable and every one of us has to be vigilant in protecting our identity from theft and protecting our credit ratings,” said Phil Catlett, the President and CEO of the Western Michigan Better Business Bureau. Catlett said there are a few things customers can do now to help avoid more issues in the future.

      “Probably the one thing you ought to do is put a fraud alert out there in a number of places, and if you put a freeze on your credit alert, anytime anybody is trying to get information by pretending to be you with your social security information, they won’t be able to get it,” said Catlett.

      Catlett said to put out a fraud alert or place a security freeze, you have to contact one of the three credit reporting bureaus, which are Equifax, Experian or TransUnion online (See credit bureau contact info.) or by certified mail. A customer would then tell the bureau that you would like to put out a fraud alert and place a security freeze. The customer must provide identifying information including a social security number. The freeze will remain on your credit report until you request to remove it. According to the Michigan.gov website, a security freeze is free to identity theft victims, but if you are not an identity theft victim, it will cost you $10 to place a freeze with the bureau.

      A security freeze will impact a customer who is trying to take out a loan or buy items like furniture or a car. “But if you are an Anthem customer, it might be worth that bit of difficulty to protect you from the other things that could be happening. There are already people attempting to commit fraud right now. They’re putting out huge emails saying they’re from Anthem and they’re giving you this free service to protect your credit and then they’re trying to loop you in. Don’t click on those links. If you want to find out what they are offering, go directly to Anthem’s website,” said Catlett.

      Anthem said they will send notices through mail to impacted customers and will be providing a free credit monitoring service. The specifics of the program have not yet been released.

      Return to top of page.



      What To Do After A Personal Data Breach

      If you suspect or are sure your personal information has been stolen here are some steps to take to minimize the damage :

    1. Change all of your passwords and user names. Yes it is a pain in the rear, but necessary. See our Active Scam Page for ‘The Word on Passwords’.
    2. Beware of phishing emails and regular mail. See our Active Scam Page for more info on ‘email scams’.
    3. Carefully scrutinize all of your financial statements and bills for errors and unauthorized transactions.
    4. Put a fraud alert on your credit report and get a copy of your credit report every year to check for unauthorized transactions. See credit bureau contact info.
    5. Put a security freeze on your credit report. A security freeze is free to identity theft victims, but if you are not an identity theft victim, it will cost you $10 to place a freeze with the bureau.
    6. If you can, get a police report. This will come in handy working with credit bureaus and financial institutions.

      Return to top of page.


      You Have Fallen For A Scam! Now What?

      By Lincoln Spector published in P.C.World Aug. 2014

      Cybercriminals tricked you into giving away some sensitive information. Now you need to know how to mitigate this situation. Don’t feel bad. We all make mistakes. But with these sorts of mistakes you have to act fast to avoid disaster.

      What you need to do depends on how you were tricked. Did you give them your email password? Your bank and/or credit card numbers? Your passwords for social media accounts? Did they remotely access your PC or phone; or trick you into installing software?

      If you have reason to believe that criminals can access your financial accounts, call your banks and credit card companies immediately! Explain the situation and follow their instructions.

      Next, change any passwords that may have fallen into criminal hands. This includes email, social media, and all other passwords. While you are at it change the passwords you are using for more than one account. Never ever never use the same password for multiple accounts! NEVER!

      If you can’t change the password – or even log into a site – That means the criminal got there first. Check the FAQs for information on how to recover a hi-jacked account. Conduct a web search for “Hijacked Account – (name of your hijacked account - Google, Facebook, etc.) and follow the instructions. By the way; If you set up your account with two step verification, chances are slim that that criminals will be able to access and hijack your accounts.

      Next call the police and ask to make a report. No the cops will not find the criminal and return what was stolen; but the banks, credit card companies, and other institutions may want to see a police report. It makes your claim of being victimized official. DO NOT call 911 unless the criminal is inside your home! Use the non-emergency number.

      Were you tricked into allowing someone to remotely control your computer? Or into downloading software? If so there is no telling what information they got or are getting. In that case, change your windows login password immediately! And scan your computer for malware using multiple antimalware tools. Go to www.pcworld.com for more info.

      Return to top of page.



      Personal Information Safety Tips

      Identity thieves LOVE the holidays! Everyone is so busy that they rarely remember to guard their personal information. Here are a few basic safe holiday shopping tips:

      CREDIT / DEBIT CARDS – Try not to have your card number saved by vendors. I know it is a pain, but if the bad guys hack your account they are still missing one piece of information. Use a low limit Credit Card or a Debit Card linked to a low balance separate bank account dedicated to online shopping so the bad guys can’t bankrupt you. Now set your accounts up to send you a text alert for all purchases. Be sure to check your Credit / Debit Card and bank accounts once a week or more often to look for unauthorized purchases. Save all your receipts and balance your accounts every month. The bad guys are at it 24 hours a day; every day, they never stop, they never sleep.

      BEWARE OF SHOULDER SURFERS – when using ATMs, gas pump card readers, and store checkouts; be sure to guard your information. Always assume that the bad guys are watching and trying to steal your info. Check the card reader for anything that could be wrong. Look for non matching colors, textures, or loose wires and panels that might indicate a card reader skimmer attached to the card reader. Also look around for people and cameras trying to see your pin #. Shield the pin pad with your body and free hand.

      MAKE SURE YOUR ELECTRONIC ITEMS ARE SECURE – see “Travel Safety Tips For Electronic Devices” on this page.

      WIRELESS INTERNET - be careful of wireless Internet use and make sure that the wireless network you are using is password protected. Be aware of the fact that hackers can hack into wireless Internet networks and can view what you are viewing, such as bank account information. When you join a store or mall’s WI-FI EVERYONE on the network can see you. All your information is at risk. This is how the celebrity nude picture scandal happened! The bad guys joined the network and hacked celebrity’s phones.
      Now that they have your account information, password, and credit card number; they can log in, buy something, change the ‘Ship to address’; and rob you blind. And you will not know about it till it is far far too late.

      SOCIAL MEDIA - review, update and confirm the personal and professional information that you have on any social network. Set ALL of the privacy settings to maximum security; i.e. ‘only friends’. Do not communicate to the world where you are and when, as criminals want to know when you are not home so they can rob you in peace. Post those pictures after you get back.

      ONLINE SHOPPING - do business with companies you know and trust. If you are unfamiliar with a website, research the company, its website and privacy policies. Use a credit (only) card instead of a debit/credit card or checking account, as your credit card is protected under the Fair Credit Billing Act. Using a credit (only) card also prevents thieves from draining your bank account as they have no access to it.

      HOLIDAY PACKAGES - many thieves are stealing packages delivered to your doorstep. The thief simply follows United Parcel Service, US Postal Service, or FedEx trucks, waits for a delivery and then grabs the package(s) before you can get home and bring them in. It is a good idea to have packages delivered to your work or a neighbor who is home during your work hours.

      AND ALL THE REST – be sure to scan down this page for many more basic tips on personal information safety.

      Return to top of page.



      Simple tips to avoid identity theft:

    7. Get your mail everyday as soon as possible.

    8. If you are going on vacation request the post office to hold your mail until the day after you return, or elect to pick it up in person.

    9. DO NOT advertise you are on vacation! Do not Tweat, facebook, etc. that you are gone. Wait until you are home to post all those pictures. Thieves love to know you are not home. You just make yourself a juice target for them.

    10. Pay attention to your billing cycles. If bills or financial statements are late, contact the sender. The bill may have been stolen from your mail box. The thieves can use the info in an average bill to get your personal financial info to steal you blind.

    11. Keep your receipts to reconcile your statements. Ask for carbons and incorrect charge slips as well. Promptly compare receipts with account statements looking for unauthorized transactions and overcharges. You would be surprised how easy it is for an unscrupulous clerk to rip you off. They really like out-of-towners because it will be awhile till you get home and figure it out.

    12. Don’t carry your Social Security card in your wallet or write it on your checks. Only give out your SSN when absolutely necessary. Use an alternative form of ID as often as possible.

    13. Protect your PIN. Never write a PIN on a credit/debit card or on a slip of paper kept in your wallet.

    14. Watch out for “shoulder surfers”. Use your free hand to shield the keypad when using pay phones and ATMs. Take a good look at the ATM for anything odd. Loose wires or tape near the keyboard or extra cameras for instance may mean scammers have compromised the ATM.

    15. Shred unwanted receipts, credit offers, account statements, expired cards, etc., to prevent dumpster divers getting your personal information. Ideally, these items should be shred in a cross-cut or micro-cut shredder. Shred anything with a barcode, any personal, or financial info. Shred, shred, shred for safety.

    16. Store personal information in a safe place at home and at work. Don’t leave it lying around.

    17. Don’t respond to unsolicited requests for personal information in the mail, over the phone or online. If you did not initiate the request it is a scam. If you think it might be legitimate request from your provider, use your personal list of provider information to contact them. Never trust unsolicited requests contact information unless you can verify it.

    18. Install firewalls, virus detection, and malware detection software on your home computer and phone/tablet. I use 2 different antivirus programs and 1 anti-malware program to keep my computer problem free every week. The programs are set to auto-update, but I always update them before I run them every week.

    19. Check your credit report once a year. Check it more frequently if you suspect someone has gotten access to your account information.

    20. Return to top of page.



      Your Vehicle and Identity Theft; Partners in Crime

      From – AZCentral.com – Mark Pribish

      It is estimated that one-third of all motor-vehicle thefts could potentially translate into identity theft because the contents of the vehicle reveal personal information about the owner. According to the FBI’s Uniform Crime Reports, there were 721,053 motor-vehicle thefts in the U.S. in 2012, equating to 1,975 vehicles per day. Your car, truck or SUV will almost always be an opportunity for ID theft. In order to finance a vehicle, register it, acquire license plates and insurance, you are required to share your personally identifiable information. State law requires that you possess your vehicle registration and proof of insurance when driving. Most of us simply keep this information in our cars.

      So what can happen when financing a vehicle? Specific to auto dealerships, there have been multiple news reports on how auto dealers lose vehicles to identity thieves acting as a new-car buyer while fraudulently using someone else’s personally identifiable information to create fake identification and credentials. Once the vehicles are purchased, the actual individuals whose information was stolen are stuck with the problem of resolving these fraudulent purchases. At the same time, there have been a number of news reports on how individual consumers have been victimized by auto-dealership employees who have stolen the personal information of customers. This has resulted in the opening of fraudulent credit cards and personal loans of individual car-buying customers.

      “The fact is your car is your identity,” said Joe Annoreno, CEO of Scottsdale based Vero, LLC, an automotive finance and insurance products company. Annoreno said “the contents of your car, such as a laptop, smartphone, tax information, driver’s license, insurance card, registration, garage door opener and personal mail/bills increase your risk of identity theft if your information is not locked up and secure.” Unbelievably, 31 percent of drivers fail to lock their vehicle doors, and 14 percent leave the keys in the ignition, according to the National Insurance Crime Bureau. But even if we do lock our vehicles, it doesn’t stop various third parties and burglars from accessing your personal info. When using car-wash services, valet services, auto-repair services, or any other automotive-related service where you give an unfamiliar person access to your vehicle, you should either take the contents from your vehicle or secure the contents to prevent any individual from stealing your personal information.

      Mark’s Most Important: Protect your vehicle documents as if they were cash and regularly check for unusual activities after purchasing a vehicle or after it’s been in the possession of others.

      Mark Pribish is vice president and ID-theft practice leader at Merchants Information Solutions Inc., a national ID-theft and background-screening provider based in Phoenix.

      Return to top of page.



      Heartbleed Security Bug

      How do you know if you have been a victim of the Heartbleed Security Bug? If you use a password manager like LastPass, Dashlane, or KeePass they have a program to check for you. If you don’t use a password manager you can try to find out on each individual web site you did business in the last 2 or 3 years. Here is a partial list of sites:
      • Amazon Web Services • Dropbox • Facebook • GitHub • GoDaddy • Google • LastPass • OKCupid • Soundcloud • Tumblr • Turbo Tax • Yahoo

      Your best bet is to change your password and username AFTER the site has closed the critical programming flaw in OpenSSL—an open source implementation of the SSL/TLS encryption protocol. Most proprietary SSL/TLS sites did not have this flaw, only open source OpenSSL had it. You may have also had other personal info stolen such as email, IM, and possibly credit info.

      By now most web sites should have fixed the flaw. As a precaution you should monitor all of your credit / debit cards and bank statements for unusual activity.

      Return to top of page.



      Wireless Router Data Safety Basics

      Change the Default Password – This is extremely important! Default passwords are easy to guess or obtain. Consult your owner’s manual or go online for the correct directions. You do not want just anybody to lurk on your Wi-Fi network. Don’t forget to choose a strong 12 or more character password. See The Word on Passwords.

      Use Only WPA2 Encryption – This is the latest, greatest, and strongest encryption available today. All modern day electronic devises can use it.

      Avoid Common SSID Names – Hackers can easily use a common name to back hack your router.

      Disable you WPS – This is designed to make it easy to add new devises and hackers love it.

      Set Up A Separate Guest Network – It is a good idea to set up a separate guest network with its own SSID name. This way you can have a medium secure password that can be changed often to foil hackers without having the hassle of changing all of your strongly protected equipment.

      Forget MAC Address Filtering – It can be very difficult to do unless you are a true pro.

      Disable Administrator Access From Wi-Fi – That means you can only access the router from a LAN cable attached to a computer. This is just another layer of security to make the hacker jump thru. Hopefully they will just give up because there are easier victims to hack.

      Return to top of page.



      Damage Control Plan After Password Theft

      After any of your passwords are stolen you need a plan to regain control of all of your accounts. It doesn’t matter which password was stolen, or how important that account was, that one password could be the key to losing control of all your accounts in a dominos style cascading breach.

      First change the passwords to all of your email accounts! Why start here? Because changing most on-line account passwords start with email confirmation. I know it is a pain, but you MUST use a unique 10 or 12 character password for each account. For help in creating a very strong password see “The Word on Passwords” at our Active Scam Page

      Now you can safely change all of your financial, medical, utility, social, and other account passwords. You can use a ‘Password Manager’ program, memorize them, or write them down on paper which you keep in a safe place. I have so many accounts I couldn’t remember them all. I memorize the ones I use often and write the others down. Do not forget to change the challenge / security questions too. And mix it up. DO NOT use the same questions for multiple accounts. Try to use less obvious questions that can’t be looked up on Facebook or Google. Have fun with it. Use a goofy question or answer.

      REMEMBER : The best offence is a strong defense. Beef up your passwords and challenge / security questions. Thieves like easily guessed passwords and answered questions. If it looks too hard they most likely will go away.

      Return to top of page.



      Travel Safety Tips For Electronic Devices

      When traveling beware of ALL public Wi-Fi! If it is free the bag guys will be on it too!

      1st – UPDATE all of your security & antivirus programs and operating systems on ALL of your devices INCLUDING your Smartphone. You do have security & antivirus programs on your Smartphone, right?

      2nd – NEVER use public computers for financial transactions. They probably contain spy wear and key loggers to steal your info.

      3rd – NEVER respond to update requests. You just did that and these requests on public Wi-Fi probably contain Trojan horses or send you to a thieves’ look-a-like site to steal your info. ALWAYS use the site you already have bookmarked.

      4th – DO NOT use the phone number on the flyer slipped under your hotel door to order from a restaurant. A new scam involves recreating a legitimate restaurant’s flyer with the thieves’ phone number. They steal your card number and you never get the food.

      5th – NEVER download an app from an unknown site. ALWAYS use a trusted vendor site. It is best not to download anything off public Wi-Fi. Use your own data plan.

      6th – SET a password or code on ALL of your devices. This makes it harder on thieves if the steal it. Better yet, get a tracking service so you can recover or wipe your device if stolen.

      7th – Contact your credit card issuer about security when traveling. Not all merchants are as honest as the ones you use at home/online.

      8th – DO NOT provide details about yourself on social networks that could be used to answer security questions to steal your money/credit/identity. The less personal info out there about you the better.

      9th – DO NOT click on links in social media messages on public Wi-Fi. It is probably a spoof message and the link is to the thieves’ site to load spy-wear to steal your identity.

      Return to top of page.


      ATTENTION WEST MICHIGAN:

      There have been several ATM skimmers in use in the Grand Rapids Metro area. Be VERY careful when using ATM machines. Always assume that the bad guys are watching and trying to steal your info. Check the ATM for anything that could be wrong. Look for non matching colors, textures, or loose wires and panels that might indicate a card reader skimmer attached to the ATM. Also look around for people and cameras trying to see your pin #. Shield the pin pad with your body and free hand.

      Return to top of page.


      10

      New Car Robbery Tactic - Cloning Your Key Fob

      Information keeps pouring in on my iATN professional mechanics forum from all over North America. After reading over 40 responses and a dozen other articles, here is what I have determined.

      The Questions:

    21. 1. Is it possible to clone your Key Fob code? A qualified YES.
    22. 2. Is it possible to jam your Key Fob code so the doors will not lock? Definitely YES.
    23. 3. Is it possible to open your car door with someone else’s remote? A qualified YES.
    24. 4. If the thief wants your stuff, will they get it? Definitely YES.
    25. 5. Can you take reasonable precautions to substantially reduce the possibility of theft? Absolutely YES.

    26. The Explanations:

    27. 1. Newer cars and better after-market Remote Keyless Entry systems are much harder to clone the code due to the use of an algorithm to generate a rolling (new) code every time you press a button on your key fob. Apparently cloning was an issue when Remote Keyless Entry was first coming out 15 or 20 some years ago, and may still be with bargain aftermarket R.K.E.s. It seems to be a bigger issue in Europe. So I deem it a possible, but not likely. Just remember that any security device a man can create, a woman can defeat.
    28. 2. Jamming your Key Fob code so the doors will not lock is a lot easier to do and doesn’t attract attention. Thieves like easy and no attention. Definitely YES.
    29. 3. Again this was an issue 15 or 20 some years ago, and may still be with bargain aftermarket R.K.E.s. One response said he set off the panic mode on the car next to him with the radio remote. So I deem it a possible, but not likely.
    30. 4. Gaining access to your car is frighteningly easy. Auto part stores, hardware stores, and other retail stores sell unlocking tools. Most first responders carry spring loaded center punches to shatter window class.
    31. If a thief wants you stuff, they will get it.
    32. 5. So I stand by my original advice.
      First - Hide your stuff. You hear it every holiday season. The police plead with everyone to hide their stuff. Lock it in your trunk or cover it up on the floor YEAR ROUND. INCLUDING the mounts and power cords!
      Second – Lock your car doors with the door button or key because they are mechanical and do not use radio signals like your key fob to communicate with the car.

    33. The harder you make it to get your stuff, the more chance that the thief will pass you up for an easier target. If your car is locked and all they see is a blanket on the floor, but the car next to you is unlocked; which car are they going to mess with?? Most thieves are thieves of opportunity. Don’t be an easy opportunity.

      PS: Do NOT program your GPS with your home address! Use your work address or a major intersection near your home.

      Return to top of page.



      Beware of RFID technology!

      Recently I have been reading and seeing stories on using RFID technology to skim your credit card information from your wallet simply be waving a card reader within a few feet of your wallet. Then they can clone any magnetic card strip with your info and charge things in person or use it online. Here is the latest story I saw - The Risk Inside Your Credit Card.

      Return to top of page.


      More Identity Theft Information

      A visitor emailed me this link to a page with more good information. It has many good links to other pages with some sound advice. Credit Card & Identity Theft Protection page

      Return to top of page.



      PHISHING

      So what exactly is phishing? It is someone who is trying to get your personal financial or identity records so they can steal your identity or rob you. There have been reports of crooks trying to steal your house by getting a mortgage on your house without your permission or knowledge. Then they take the money and disappear, defaulting on the loan and leaving you to prove you didn't do it. Usually the crooks opens credit accounts with your personal information and leave you to prove you didn't open those accounts. It can cost you Thousands of dollars and months of time to straighten these things out.

      How To Avoid Phishers

      Usually it starts with an e-mail or phone call supposedly from your bank, credit card, government, or other business you do business with. They claim there is a problem and need your social security number, or credit card number, or other personal information to verify it really is you so they can fix the problem. DO NOT GIVE THEM ANY INFORMATION! ! Hang up or close the e-mail. Then using your own phone and the customer service number from your own personal phone book, contact the customer service department directly. NEVER EVER click on a link provided in a suspicious e-mail! These crooks are very good at reproducing a legitimate business' web page to steal information from you. Always use the e-mail address or web site address that you already have in your personal address book.

      If you did not initiate the contact, there is a very good chance it is a crook phishing for your information.

      Sometimes a credit card company will call you and ask if you are on vacation in France, or did you just buy a new Corvette with your credit card? That is probably a legitimate call, but they already have your information and will not ask for it.

      When in doubt, hang up! Then call customer service yourself.

      Return to top of page.


      DIY IDENTITY-THEFT PROTECTION - A 12 STEP PROGRAM

      Author - Dan Tynan

      You can read the complete article in PC World June 2008


      YOU DO NOT have to spend $100 to $200 a year to defend yourself from Identity Theft at the level of protection that a paid for service offers. You can do almost everything those services do, for free. But the following steps will require time and effort.

      1. Get a free copy of your credit report at Annual Credit Report.com Do not be fooled by look alike sites that promise free reports if you subscribe to their credit-monitoring services. Better yet, order by phone at 877-322-8228.

      2. For DIY credit monitoring, order a free report every three (3) months from a different credit-reporting bureau (see below). Scan the report for unfamiliar information such as accounts you don't remember opening.

      3. Place a fraud alert on your credit report by calling one of the credit bureaus. You can find the contact information for all three bureaus by browsing to the Fight Identity Theft web sight. (see below)

      4. Put a recurring event in your online calendar to remind you to renew your fraud alert in 90 days.

      5. Tell the bureaus to stop selling your information to credit services by calling 888-567-8688 or visiting Opt Out Prescreen.com Doing so will reduce but not eliminate the number of preapproved credit card offers you receive.

      6. Request a free public records report from ChoicePoint You'll have to print a form and mail it, along with copies of your driver's license and proof of address. Scan the report for addresses and other details not related to you.

      7. Take your name off other marketing lists by signing up for ProQuo.com's free service. In some instances, you may have to mail letters or navigate to a marketer's own site to complete your opt-out request.

      8. Buy a mailbox that locks or use a post office box. This will help prevent thieves from stealing your identity via paper mail.

      9. Buy a crosscut paper shredder and shred junk mail to frustrate dumpster diving identity thieves. *

      10. Never click a link from an e-mail message to log into your bank or to any other financial institution. Type the secure site's address into your browser, bookmark it, and use that link to access your accounts. Otherwise, you risk having your identity stolen by phishers.

      11. If you believe that you are a victim of identity theft, contact the Identity Theft Resource Center. Volunteers there can walk you through the process of restoring your identity.

      12. Get educated. Mari Frank's IdentityTheft.org, the Privacy Rights Clearing House, and the Federal Trade Commission maintain huge libraries of information on how to avoid being victimized, and what to do if it has already happened.

      *I recommend that you shred anything with any personal information on it. Theives love your trash! Shred all Bank correspondence & records, insurance correspondence & records, credit/debit card receipts, credit statements, old bills of any kind, unsolicited applications of any type. ANYTHING with your Social Security or drivers license number or your birth date!! And just for luck - anything with an account number on it and your address. Better to wear out a shredder than get your identity stolen from the trash. - Brian

      Return to top of page.


      File a Complaint with the Federal Trade Commission

      Phone 1-887-438-4338
      or click I.D. Theft

      Return to top of page.


      CREDIT BUREAU CONTACT INFO:

      Equifax
      PO Box 740241
      Atlanta GA 30374
      1-888-766-0008

      OR

      Equifax Security Freeze
      P.O. Box 105788
      Atlanta, GA 30348

      www.Equifax.com

      Experian
      PO Box 2002
      Allen TX 75013
      1888-397-3742

      OR

      Experian Security Freeze
      P. O. Box 9554
      Allen, TX 75013

      www.Experian.com

      TransUnion
      PO Box 1000
      Chester PA 19022
      1800-680-7289

      OR

      TransUnion Fraud Victim Assistance Department
      P. O. Box 6790
      Fullerton, CA 92834-6790

      www.TransUnoin.com

      Return to top of page.

      To report a DEAD LINK