How Do Identity Thieves Find Their Victims

In his celebrated military treatise “The Art of War,” Sun-Tzu wrote about how understanding your enemy and yourself would ensure success in almost any scenario. And while he might happen to be talking to an audience worried about winning and waging wars, it is a principle that holds true in a number of other aspects of existence as well — perhaps not the least which is identity theft. The initial step in knowing the best way to guard your identity from offenders and fraud is understanding how and why you are susceptible in the first place, as well as the way in which thieves find their prey.

identity theft threatsAmong the greatest risk factors for discovering yourself in the sights of an id thief is your age. While years alone do not establish your susceptibility to idtheft — a a study by the Federal Trade Commission (FTC) identified no more than a-1 percent variation in fraud charges filed by 20-year olds, 30-year olds, 40-year olds and 50-year olds — environmentally friendly and life-style variables that accompany each decade of your life can get you at a higher-risk for fraud.

Here are three demographics which are especially exposed to id thieves:

University students: In your teens and 20s, whilst in school, you have stepped right into an entirely new world of duty and independence. Sadly, many university students do not understand the extent of that duty until it is not too early. School-aged Americans are four-times more probably than another demographic to get their identities stolen because they’ve usually clean credit histories but no expertise with understanding that they are presumed to assess them or assessing them. University students do not help themselves both by sharing personally-identifying information about themselves freely on media platforms or leaving out private files in dorm rooms that are readily reachable.
Service members: There is a greater danger of the information falling into the incorrect hands and being used to perpetrate identity fraud since the armed forces uses private data like Social Security numbers to determine their servicemen as well as girls. In addition, research conducted by Javelin Strategy & Research identified that military personnel typically do not set Active Duty Alarms on their credit documents after they are deployed. Thus, their credit info is susceptible to fraud and abuse by pals and family members.

Senior Citizens: Their incidence of fraud is substantially higher, although less seniors fall victim to identity theft than other demographics. A lot more troubling is the fact that ID theft victims over the age of 55 are less probably than these younger than 55 to realize that their identities were stolen in any way! Telephone scams, phishing, tax frauds and health-related id fraud are one of the most common identity theft strategies employed against seniors.

But while these three people could be particularly at risk for id fraud, it is critical that proactive measures are taken by Americans of ages and occupations from the likelihood of larceny. While there is no bonded type of identity theft protection, there really are several common sense steps you could quickly adopt to mitigate your likelihood of becoming the most recent casualty.

One clever way of keeping ahead of identity thieves would be to join a credit monitoring service. This type of service send you alerts when specific action is discovered that could signal possible identity theft and will track your credit files.

Smishing Can Smash Your Identity

Many folks are aware of the prob­lem of phish­ing, where you get a strange e-mail inform­ing you that you’ve won some e-mail lot­tery, or that your account has been locked and you need to ver­ify your infor­ma­tion to unlock it, or even that some­one you know is in trou­ble some­where and they need your mon­e­tary help to be able to get home. This causes you to will­ingly give your infor­ma­tion over to the iden­tity thieves in the hopes of get­ting a return on that infor­ma­tion in some way. Smish­ing is sim­i­lar to this prac­tice, but it involves attempt­ing to get your infor­ma­tion from a SMS text that you receive.

Smish­ing involves receiv­ing a very tempt­ing text that seems rather believ­able. It could say that you’ve won a $1,000 gift card to one of your favorite stores, that you’ve won a free vaca­tion, that you’ve been signed up for a web­site that will cost you $5/day if you don’t unsub­scribe, or even that your spouse has lost their phone and needs help at this new num­ber. The vari­ables are absolutely end­less, but there is one thing in com­mon with them all: that you don’t remem­ber enter­ing into a con­test, sign­ing up for any­thing, or that your loved ones wouldn’t text you in such a way if they were in trouble.

That doesn’t stop peo­ple from click­ing on that included link some­times from their smart­phone – you know, on the off-chance that it might be true and they might be able to pur­chase a new PS3 or some­thing. If you’re one of those folks who ends up click­ing those links sometimes, as one of my favorite authors would put it – don’t panic! Click­ing a link might trans­mit some data about your phone to the poten­tial iden­tity thieves and you might have some mal­ware installed, but noth­ing that is irrecov­er­able. The trou­ble comes when you start putting in your per­sonal details to sub­mit through the link where Smish­ing becomes an issue.

If you are curi­ous about a SMS link that you have received and you want to inves­ti­gate it, an easy way to get around some of the issues is to plug the link you receive into a web browser on your com­puter that has cur­rent anti-virus, anti-spyware, and anti-malware def­i­n­i­tions. This way, if the link isn’t a true prize, you will be pro­tected through your com­puter instead of hav­ing your smart­phone exposed that is likely run­ning no pro­tec­tions whatsoever.

Another easy way to deter­mine if a SMS text you have received is legit­i­mate is to sim­ply call the cus­tomer ser­vice depart­ment of the com­pany in ques­tion, like your bank, or to con­tact your loved ones on your own to ver­ify the story. If you have won some­thing or have been signed up for some­thing with­out your per­mis­sion, con­tact­ing a com­pany directly will give you the accu­rate infor­ma­tion you need. In the off chance that there are charges on your credit or debit account that aren’t sup­posed to be there, you can imme­di­ately con­test them.

Some other easy ways that you can help to pro­tect your­self from Smish­ing schemes are:

  • to not reply to the SMS text;
  • to teach our kids about Smish­ing so they don’t become vic­tims as well;
  • to for­ward a copy of the Smish­ing text to your cell phone provider to alert them to the scheme;
  • to place a fraud alert on your credit report if you believe you may have inad­ver­tently given sen­si­tive infor­ma­tion away; or
  • to sign up for a com­pre­hen­sive iden­tity theft pro­tec­tion plan from a pre­ferred provider.

If you believe that you have been a vic­tim of a Smish­ing scam, you should also file a com­plaint at https://www.ftc.gov, and then be sure to visit the remain­der of this site so that you can learn what you can do to help pre­vent this from hap­pen­ing to you again in the future. Protecting your iden­tity is becom­ing more and more crit­i­cal with every pass­ing day. Know­ing what Smish­ing is and not falling into its trap is just another way that you can fight the evils of iden­tity theft and not let the crim­i­nals win.

Medical Identity Theft: The Forgotten ID Theft Crime

There remain ways where we continually leave ourselves susceptible, even as we learn more about the importance of identity theft protection. Most people only realize that medical identity theft is a crime after they have become a victim of it.

Based on Ponemon Institute’s 2015 Fifth-Annual Research on Medical Identity-Theft the quantity of medical identity theft episodes increased by 21.7% between 2013 and 2014. The Medical Identity Fraud Alliance identified that 2.3 million Americans were the victims of medical identity theft in 2014, with damages totaling more than $20 billion. 20 percent of sufferers found while a third lost their health insurance that their credit scores endured because of the larceny. The findings of Ponemon indicate that around 65% of identity theft victims that are medical pay a mean of $13,500 merely to solve the offense.

Medical identity theft is a dangerous offense, although not merely as it may cost victims fiscally. In addition, it places lives at risk, in many different manners. Anndorie Sachs discovered out this first hand, when she received a telephone call. Her newborn infant have been tested positive for prohibited substances as well as the Utah Division of Child and Family Solutions was prepared to set through paper work to consider guardianship of Sachs’ kids. Authorities were at her doorway, the following day.

Sachs, nevertheless, hadn’t had a child lately. Her youngest was two years of age. But a couple of miles away Dorothy Bell Moran, another girl, had given birth to a newborn infant using Sachs’ identification. She’d walked from the hospital right after having a baby, therefore down utilizing the I D she’d supplied the hospital tried to track her, and then be led to Anndorie Sachs rather.

Moran left a $10,000 bill and a lengthy battle to establish to Sachs that she was harmless., and had employed a stolen driver’s license in the hospital

Such situations are not all that casualties of identity theft that is medical have to worry about. Based on fraud specialist Chris Dorn, medical ID theft frequently leads to health records being changed, with criminals so care can be received by them altering advice.

“Unintentionally, your blood-type may be altered, your medicines that you are on may be altered, your underlying health conditions could be altered,” he advised CBS.

As Sachs wondered, after her ordeal, “Am I going to possess some crisis some day and I am likely to appear in the hospital plus they’re likely to give me the incorrect blood type simply because they nevertheless have her blood-type in the documents? I simply do not feel secure anymore.”

The good thing is, you will find precautions people can take to reduce their danger of becoming casualties of identity theft that is medical:

Shield health care records with the maximum amount of vigilance as you’d your credit card or bank info. Shred files which are not desired or out of date.
Read your explanation-of-gains statements from health care suppliers line-by line to be sure all the info is exact.
Demand that hospitals and practices whether or not they share your details with some other organizations and they use your advice, what protections have been in place to maintain data safe.
Eventually, be sure to test your credit history often. Enrolling in a credit monitoring service might help also. These providers notify you when particular action happens on your own credit files that may indicate fraud.

The Hidden Dangers of Wi-Fi

Are you truly aware of the risks that you take when you are using public computers or Wi-Fi to access social networking sites like Facebook, Twitter, or Pinterest? Free Wi-Fi is literally everywhere you look these days and it is a big selling point for many businesses. I can even get free Wi-Fi while I’m waiting for my doctor in that tiny little room filled with magazines that are three years old. Free Wi-FI at fast food establishments or the ever popular cyber coffee cafe often appeals to people as well.  There are, in fact, many people who may end up spending many hours being active on social networks while on public Wi-Fi or at a public computer every single day. That fact alone is enough to consider getting a professional protection plan like you can get with Identity Guard or another service like Norton WiFi privacy which will turn a public wifi network in to secure, private connection.

Public Wi-Fi Has Many Hidden Dangers

When was the last time you actually remembered to log off of Facebook? Many of us simply close the browser or shut the lid down on our laptop when we’re finished with what we’re doing. That’s all well and good when you’re at home, but if you’re playing the latest Zynga game with your friends over your lunch break and you do that, the next user who logs into the public network can actually access your browser information and reload it.

How? Modern web browsers have a recover feature to them. In literally just a couple clicks of a mouse, someone can open up all the browser windows someone had open, and let’s be honest here – we all have a lot of them open. Heck I’ve got 12 tabs up right now! From a social network to e-mail to plenty of other items I might have up, there is likely more than one bit of identification information someone can get from anyone’s browser history.

Your Own Computer Can Be Accessed on Public Wi-Fi

If you don’t have a password on your personal computer or you’ve got a terrible password on it like “12345″ or “password,” then change it now or get a password on there. Literally go do it now and come back to finish reading this post. Why? Because when you’re on a public wi-fi network at the same time someone else is, they can have full access to whatever is on your personal computer if it doesn’t have a password or it’s a password that is easy to crack. That’s right – just bringing your own personal computer to a public network is not enough to protect you.

The Consequences Can Be Financially Grave

For some people, the only thing they experience when they make a mistake like those mentioned above is to have someone post something derogatory on their social networks or maybe send out a few spam e-mails as a joke. For others, just one mistake can lead to an identity theft incident that can result in their credit score being hit so hard by credit fraud or other financially fraudulent activities that it can make it nearly impossible to get the credit lines needed without investing a great amount of time in repair and recovery… and even then it’s not 100% guaranteed that they’ll get what they need anyway.

Logging off and putting on a password is really all it takes to increase your identity theft protection levels on your own. For some people that simple step is enough. For others who think they might have some exposure or just want to be careful, there are many identity theft protection plans available, from free ones to high cost all encompassing ones, that can give you the level of protection you need. Whatever the case may be, make sure you are limiting your exposure to an identity theft incident as much as you can every day so that you can secure your financial future.

Identity Theft of the Dead

Most people realize that identity theft is a growing concern. And as with the majority of issues in life, we naturally suppose that identity theft ceases being a concern after we die. Sadly, offenders do not quit stealing identities simply because their intended victim has passed away. Friends and families can be haunted by these crimes, long after their loved one has passed, leaving the weight of solving the thievery and coping with their own grief.

Ralph Lee Guttormsen resided for several years in Monterey, Ca, with his room mate, Robert Sterling. From medical issues, Sterling passed away in 2002 and Guttormsen chose to assume his id. Along with his friend’s driver licence, he took cash from the bank accounts of Sterling, utilized credit cards and cashed checks. The scam went on for four years, largely because Guttormsen was cautious about never opening new accounts in Guttormsen’s name, which may have alerted the police to his crimes.

That isn’t the only kind of identity theft that can affect the dead. Many burglars scan paper obituaries for the names of people who have recently passed, which they subsequently link to the Social Security numbers (SSN) of other persons, living or lifeless. The newer identity is hard to monitor since it pulls information from a lot of non related sources

What exactly are you able to do to guard the identification of a recently departed friend or relative? Here are several suggestions:

Death certificates: Request several duplicates of the death certificate. When working with authorities, this file will most likely be needed.

Documenting: Instantly begin a log of accounts and financing. Otherwise the responsibility falls to the executor of the estate. For those how have hired a lawyer, they are able handle this for you. Ensure personal items and all files are arranged and accounted for. Specialists indicate that physical records should be stored safely, and only accessible by specific people, to ensure the information does not fall into the wrong hands.

Credit reviews: Request copies of credit history from all the three credit reporting agencies. The requirements to get this file subsequent to the account holder’s death differ from agency to bureau. For instance, Equifax requests a letter of testamentary in the probate court a duplicate of the death certificate along with a duplicate of picture identification of the person receiving the credit history.

Notify lenders: Promptly tell all lenders of the departure, utilizing a death certificate to confirm the man’s passing. The listing of lenders are available on the credit history.

Social Security benefits: Call the Social Security Administration and petition a benefits declaration to examine. This record will allow you to will find out if some one is utilizing SSN or your beloved’s name file or to perform taxation.

Prevent over-sharing: There is no need to propagate the word-of the passing too much. Media, because burglars and prevent obituaries will probably be searching for any chance to collect info.
No one wants the additional weight of coping with identity theft after the passing of someone you care about. Be sure to take these measures to help make sure that your dearly departed will not fall victim to identity theft.

Credit Report Errors Might Be Identity Theft

There is always a downside to the efficiency that modern technology provides. While it is more convenient to carry a credit card instead of bulky cash, your identity becomes vulnerable due to the information you have provided to apply for the card. More so, you become almost too exposed with credit bureaus collecting information about you when creditors ask for it. Before you know it, you could be a victim of identity theft.

How do you know that your identity has possibly been stolen? There some telltale signs that someone is assuming your identity and one of them is when your application for a credit card, loan or insurance gets rejected due to low credit score yet you are sure that you have paid your bills on time. You can also be a victim of identity theft if a debt collector demands that you pay your credit card account that has been overdue yet you never had a credit card. It is also a sign that you are a victim of stolen identity if you receive, through mail, a credit card that you have never applied for.

If you suspect that your identity is stolen, immediately report it to credit bureaus. Place a fraud alert, which will initially last for 90 days according to the provisions of the Fair Credit Reporting Act FRCA, and ask for a copy of your true credit report. You will then receive an e-mail of your rights as a victim of stolen identity from credit bureaus. You can ask for an extension of the fraud alert for up to seven years for as long as you have evidences that your identity is indeed being used by another person. You can cancel the fraud alerts anytime the case has been solved.

Once you get credit report from credit bureaus, immediately review the reports and look for fraudulent accounts and erroneous information. Report to the credit bureau, from which you receive your report, any anomaly that you see. Your notification will require the credit bureaus block the information from future credit reports and notify creditors of the fraudulent accounts. Check your credit reports manually or sign up for credit monitoring to get the names and contact details of the credit grantors of the fraudulent account and ask the bureau for those details if they have not included it in your report.

These are just the initial steps that you can take once you notice that someone else has assumed your identity. From here, you can proceed to more complicated measures such as freezing your account and asking the assistance of your local law enforcers. Identity theft can ruin your life if you do not act on it quickly.  So be aware and stay on top of what’s going on with your credit reports.

What is Child Identity Theft and How Can It Be Prevented

Did you know that children are even more vulnerable than adults when it comes to identity theft? Thirty five times more likely in fact. This year alone, 1 in 10 children under the age of 18 will have their identity stolen, yet most parents rarely consider this potential threat.  The unblemished credit report of a child is a perfect target for identity thieves who can do an unlimited amount of damage with a new, fresh credit history.  This is why parents need to be more diligent about protecting the credit of their young children now.

Thieves take over the identity of a child early on, nurture it until they get a solid credit score. They then proceed to abuse and discard it. If this fraud is not discovered by the parents in a timely manner, the fraudulent use of the child’s identity could mean the future loss of educational funding, denial of home and auto loans, as well as lost job opportunities. They will be left with no choice but to start off their adulthood at a serious financial disadvantage, because their credit had been destroyed years before they even needed it.

Child identity theft is not a new phenomenon, even in the technologically advanced world we live in today.  It’s been going on for decades actually. As parents, it is your sole responsibility to protect the integrity of your kids credit rating. Here are some things that you can do to protect your child and keep their identities secure until they are old enough to manage it themselves.

Social Security Number Protection

Paperwork, whether at school, the doctor’s office or for the extracurricular activities will often ask for social security number. Before you give the number of your child, confirm if it is really necessary. If not, do not give it. It’s a rare occasion that anyone will truly need their SSN.  Question their reason for asking before just handing over the number. Refrain from carrying around the Social Security number or card of your child and destroy documents containing the number.

Educate Your Kids

Make sure that you also educate your kids regarding the importance of keeping their number as a secret and see to it that they know that they should not share their social security number, phone number or address on any social networking websites like Facebook, Twitter etc.  Oversharing of sensitive information is one of the easiest ways for identity thieves to get enough information to begin causing real credit damage . It doesn’t take long and it can be difficult to detect the initial fraud, because most parents generally don’t check their young child’s credit report often…if ever.

Look for Warning Signs

Does your child suddenly receive unusual mail, like credit card applications? This is a solid sign that there is something wrong with your child’s credit. When you notice something out of the ordinary like this it’s time to do some investigating.. If it turns out that your child is a victim of identity theft, take the necessary steps right away to help limit and stop the fraud from continuing.

Consider Freezing Their Credit

Not all states allow parents to proactively freeze their children’s credit before an identity theft incident has occurred.  However more states are beginning to allow this practice.  By freezing their credit, you prevent any creditor from accessing their credit report with TransUnion, Equifax or Experian.  Not will this prevent lines of credit being opened in the child’s name, but it won’t even let a credit inquiry be placed on their credit report.  You can check with each of the 3 credit bureaus about placing an extended credit freeze in your state.

Equifax 1-800-525-6285
Experian 1-888-397-3742
TransUnion [email protected]

Monitor the Credit of Your Child

To closely monitor your child’s credit, a credit report is not really needed. In fact, your child may not even have a credit report at all. What you should do instead is to inquire at the three major credit bureaus and see if a report exists on your child. If there is an existing credit report, it is a sign that the identity of your child has been stolen and you need to contact the authorities right away. See to it that you do not order the credit report of your child because this will unnecessarily open the credit report on them.

Here at SIF, we are big proponents of credit monitoring services.  Not because they help prevent identity theft, because they in fact don’t. Nothing can prevent it entirely. However, a quality credit monitoring plan will alert you if if your identity has been stolen.  Being alerted that fraud is taking place gives you the opportunity to investigate and stop it from becoming an even larger problem.  The best part is that companies like LifeLock and IdentityGuard have features that allow you to monitor your child’s social security number, along with yours. The monthly subscription generally cost less than $25.00, so they are worth looking into.

Never Advertise the Name of Your Child

A lot of people have those cute family decals placed on the back of their cars showing the number of the people in the family, their genders and at times, even their names. When you do this, parents unsuspectingly give the criminals some valuable information. There are even some families that put up signs in the yards that congratulate their child for the high school graduation. Not only will criminals know the name of their child but at the same time, they will know his or her place of residence. It can also put the child at risk for more of serious crimes than just identity theft

Final Words

Protecting the identity of your child should be your number one responsibility as a parent. Once their identity has been stolen, there’s no going back.  There’s a good chance that their credit is going to be ruined way before they are old enough to need it. And this can be a very difficult obstacle to overcome as young adult. Start taking your child’s identity as seriously as you would your own.  They’ll thank you for it later.

Fact and Fiction about Posting your Resume Online

As national unemployment figures continue to remain high, you can find cybercriminals cashing in on the wave of applicants posting resumes to a range of job banks and other employment websites.  Both Monster.com and USAJobs.gov were hit with a monster-size breach in the past that allowed thieves to confiscate personal information such as IDs and passwords, email addresses, phone numbers, DOBs, and more.  Earlier this year, the Cyber Investigation Unit of the FBI reported an uptick in the number of employment schemes from mystery/secret shoppers to envelope stuffing to courier services scams, all involving victims that had relinquished their bank account data, social security numbers and other personal identifying information online.

In this current economic climate it’s never been more important to circulate a resume, and cybertheives have never been more interested in finding your resume to make a profit rather than finding you employment. The key to attracting legitimate employers is to recognize when and where to post your resume, and what job offers to respond to and which ones to ignore.  Minimize your risks online by discouraging fraudulent businesses from approaching you.

Fact or Fiction – It’s OK to post your resume to a job site that does not have a privacy policy.

This is pure fiction. If the job bank or job site does not have a privacy policy, you may have no recourse if you run into problems.  Without it, employment websites can legally archive your information for years.  A privacy policy explains how the business plans to handle your personal data.  As you review the policy, look for how the company plans to store, use or share your information and find specific statements about registration and the length of time they keep your resume on file.  If the job site does not offer you the option to delete your resume, look elsewhere.  Your resume and personal information belong to you and not the site.  Most reputable employment sites have deletion instructions posted on their site.  In fact, employment sites do share resumes.  Job seekers have found that after posting to one site their resume mysteriously shows up at other job sites without the benefit of registration. So when in doubt always ask or consult a job site’s policy information.

Fact or Fiction – Posting your resume as “private” will hinder your chances employers.

Some applicants feel that by making employers take additional steps to obtain their resume, the company will quickly lose interest.  But the fact is your legal name, address, phone number, work history and even your references, when posted publicly, can potentially fall into the hands of identity thieves.  Most employment websites do offer a privacy feature that allows applicants to hide private information.  If you should decide to post to an employment site that does not offer this option, use a disposable email address and purchase a P.O. Box at your local post office.  Replace your current contact information with the disposable email and PO Box on your resume.  You’ll be avoiding possible risks should the online job site have a data breach.

Fact or Fiction – Including your references when posting your resume will increase your chances of getting the job.

While it may or may not increase your chances with potential employers, the fact remains that you need to consider that your reference’s contact information is available to everyone that views or downloads your resume.  You’re placing their private information at risk, which is not the best way to handle references should you need them in the future.Fact or Fiction – Always disclose your education information.

This statement falls somewhere between fact and fiction.  As far as resume formats go, it’s an absolute necessity.  However, you do need to consider that anyone can call your school and request your personal information without your consent.  If you’re currently in college, request a FERPA (Family Educational Rights and Privacy Act) form from your school’s office.  Once they have it on file, only legitimate institutions and businesses can have access to your information.  Students under 18 will need their parents to sign the form.  For more information about FERPA forms, see the U.S. Department of Education’s website.

Fact or Fiction – Every job offer is legitimate.

The fact is online job sites have sped up the hiring process considerably, but that fact alone doesn’t necessarily make them legitimate.  Most businesses continue to move through the hiring process methodically, requiring one, two and sometimes three interviews before having potential employees complete a formal written application asking for personal information, work history and references.   If you feel rushed to supply the employer with your SSN or drivers’ license, then consider it a big warning to walk away.  Legitimate employers do not conduct background checks until the interview process is completed. Consider the following as signs or warnings that you may be looking at a fraudulent job offer.

The employer requests your bank account numbers

The position requires you to transfer money

The position requires you to open accounts with e-Bay, Pay Pal or Western Union.

Now some of this information may seem obvious, but the cybercriminal’s key to success is to rush you through the entire process before you’re even aware that you’ve been an identity theft victim. Before you give any personal identifying information, learn how to recognize the signs of identity theft.

Here are some other tips that may cause you to reconsider that too-fabulous-to-be-true, dream position:

You receive an email about a job offer but the email address does not contain the domain name of the company.

The fax or phone number does not have the same area code as the corporate phone number.

Before giving any information whether through email or the phone, play Magnum PI and conduct an online search of the company making the job offer or the person who has contacted you.  If you’re still not satisfied, contact BBBonline.com or the State Attorney General’s office where the company is located.

Call the company’s HR department and verify that the person who’s contacted you on the company’s behalf is legitimate.

Fact or Fiction – A vague email job offer is often a valid offer.

Unfortunately, this is more fiction than fact for many job seekers.  The rule to remember here is, if a job offer emailed to you seems very “general” or has a “vague” job description; it may not be a job offer at all.  The email might contain a link that redirects you to yet another job site inviting you to post your resume, or it might be an email marketing campaign for an employment conference, seminar or class attempting to solicit money from you.  Either way, it pays to think twice before replying to these responses.

Some of the more common emails may include:

Invitation to post to another job site and the invitee doesn’t bother to tell you they get a small referral fee when you do.

Promises of a “dream job”, only after you paid their fee.

Claims they have a great opportunity for you, only the recruiter can’t seem to remember the company or the job title to this spectacular position.

Invitations to self-help seminars, promising a job only after you’ve purchased their seminar.

Some email job offers are actually valid.  In a recent World Privacy Forum job search study, the best job offers come within the first month of a resume being posted.  If responses seem scarce, you may want to take down your resume and start over.

3 Ways To Have Your Social Security Number Stolen

A typical yet effective strategy on preventing Social Security Number (SSN) theft is on the way, finally. This change will hopefully make it more difficult for identity thieves to easily access your SSN and use it for identity theft purposes.  Your SSN will eventually be excluded by Medicare as part of their benefit cards. Over the years, these numbers have been among the primary basis for medical identification.  This was just a problem waiting to happen.  And guess what, it did happen.  In the form of countless cases of identity theft.

Recently, President Obama signed a bill intending to stop using SSNs when transacting with Medicare. This law was accepted by the State’s major political parties. The primary objective of this law is to modify doctors’ fees when it comes to giving medical services to patients covered by Medicare, however there is a specific section of the law that emphasizes that never should SSNs be reflected, typed, or included on the Medicare ID.

According to Texas Representative Sam Johnson (Republican), the main ingredient to making identity theft possible is the SSNs and that the criminals use the Medicare cards of the seniors as a tool.

“Carry your card with you when you are away from home. Let your hospital or doctor see your card when you require hospital, medical or health services under Medicare.” These statements serve as aid to prevent identity theft. This defies the rule that mandates not a single person should ever bring their personal SSN on their behalf. The good news is that the law just solved identity theft by addressing the source.

While this is true however, there are still other ways by which culprits will be able to get your SSN and use it to their schemes. Take note of the following ways where your social security number is most vulnerable and protect yourself in the future.

1. Tax Documents

These days, filing taxes through mail is a common practice. If you are among the people who do this, there is a possibility that unauthorized people/entities may have access to your documents containing sensitive, personal information like your SSN. Identity thieves can simply take mail from your mail box during tax season.  They know exactly what they’re looking for and within seconds, they can have your social security number, and possibly even drivers license numbers, phone numbers and your entire identity. In addition to, SSN thieves also execute their crime through phone scams. Fraudsters pretend to be IRS representatives contacting people and convincing them to provide specific information such as the SSN and other documents. Keep in mind that the IRS only communicates through mail. Solution:  Don’t file your taxes via mail.  Ask your tax preparer to e-file or if you do your own taxes, you have this option as well.  Keep the sensitive paperwork out of the mail and the hands of id thieves.

2. Data Sharing

When you stop and think about it, it seems like every agency requires SSN today – from government agencies, real estate companies, insurance firms, and even telephone plan provider. Unfortunately, providing your SSN is something that most people nowadays do not worry about anymore. It is true that a lot of institutions need SSN for their processes. However, it does not necessarily mean that everyone should lawfully have it. For your information, the law states that it is the IRS, healthcare providers, police, banks, and employers which are allowed to require Social Security Numbers and information from you. A few companies, however, may also be permitted but the process must be upon strict compliance with the law. Whenever you notice that there is an option that does not require you to share your SNN information, choose not to share it. This limits the possibility for your SSN details to be obtained by fraudsters.

3. Bank transactions

Clearly, the law allows banking institutions to ask for your SSN information. However, they are mandated to observe and abide by the “Know Your Customer” guidelines. This stops criminals to use the banks for their fraudulent schemes. As a customer, you have the privilege to learn about the measures that the bank adopts in order to secure your SSN details as well as be oriented about their solutions in case a breach happens.

When you know about the typical sources of SSN ID theft, you will be able to protect yourself from it. Safeguard your SSN at all times by keeping your SS card in your safety deposit box or in a safe at home.  Never carry your social security card on your person.  It is not necessary. Furthermore, don’t feel that you are required to share your social security number with anyone.  You can always refuse to provide it if you don’t feel comfortable with the person asking for it.

7 Celebrities Who Have Been Victims of Identity Theft

The problem with identity theft is that it doesn’t discriminate against one demographic or socioeconomic status. In many cases, the theft is not due to carelessness on the part of the victim. Celebrities have to deal with the annoyance of identity theft as well, and they have plenty of money to steal, so they are prime targets. Here’s a list of 7 well-known celebrities that have been victims of identity theft related crimes

steven speilbertSteven Spielberg was the victim of identity theft, however he had nothing stolen besides his privacy. In the 1990s, Spielberg had his personal information used to allow an inmate in a Tennessee prison view on Spielberg’s American Express credit card purchases. The man later claimed he did it to supply the celebrity’s information to a Hollywood studio. Apparently this genius thought he could make money by getting a movie made about his small time id theft caper.  Are people just that stupid?

liv tylerLiv Tyler had a bout with an identity thief in 2011. Her hairstylist used her credit card number to help herself to plenty of merchandise and services around town. When caught, it seems the stylist didn’t use Tyler’s card alone. She used Anne Hathaway, Penelope Cruz and Melanie Griffith’s card information as well. Tips and payment aren’t enough?

 

ricky gervaisRicky Gervais was on the receiving end of a fraud in 2009. Using an insider at the bank to obtain Gervais’ information, the group of thieves transferred 200,000 pounds from his bank account. The cash was to be used to secure gold bullion. While the scheme seems fairly clever, the identification they used was a passport, with a cutout photograph of Gervais. The pic was taken off the DVD box of The Office. They needed the identification to pick up the gold they had purchased.

 

paris hiltonParis Hilton had her name used in setting up a website. The site was dubbed Paris.org. Being registered as a trademark, she informed the thieves that she wanted payment for the use of her name. Later, her run-in with a teen in Minnesota resulted in her information being posted online. Apparently the teen had hacked in to Ms. Hilton’s phone.

 
A busboy was not using his head when he stole Ms. Oprah Winfrey’s social security number, birth dates of friends and relatives and even addresses of Oprah and 200 of the Richest People in America list published in Forbes. With the use of cell phones, a library computer and people imitating couriers, the thief snagged all of this info from credit protection services and reporting through Equifax.  If you’re going to steal someone’s identity (or bank info) you might as well swing for the fences and steal Oprah’s right?

Tiger WoodsKnown criminal, Anthony Lemar Taylor, picked a good one. He obtained Tiger Woods’ information after finding his information was not that secure. Taylor purchased $50,000 in merchandise. To top it all off, Taylor procured a fake license to drive, social security card and a military I.D, all in Tiger’s name. This bright guy even misspelled Tiger’s middle name wrong on the document’s but managed to still fill a storage unit to the hilt with stolen goods.

 

Image result for Will SmithWill Smith found several fake accounts were used to grab $33,000 under his real name, William C. Smith. The 2009 incident wasn’t the first time for the thief. He had been arrested before for stealing the former Atlanta Hawks basketball player, Steve Smith’s name. He was still on parole for the prior arrest. Some folks never learn.

So what’s the moral of the story here?  That anyone can be a victim of identity theft.  You, me, Kim Kardashian or the mail man.  Identity thieves don’t discriminate.  If you haven’t started making decisions to better protect your identity, then you are just a statistic waiting to happen.  Learn how to protect yourself on a daily basis and discover what credit monitoring can do as an proactive tool to help limit the damage should be ever be a victim of identity theft.