Thursday, January 22, 2009

What Are The Indicators Of Possible Identification Theft?

What Are The Indicators Of Possible Identification Theft?

You know, its high time we stand up as People of the World and tell these Identification Thieves that their work is not appreciated here. Get Out And Stay Out Of My Business!

Ok, C. Henry...who has gotten you mad today? Well, I received a call from an Online Representative of a College or University stating on January 13th, 2009...I signed up for courses there.

Now wait a minute now! Tuesday January 13th, 2009, I recall having a conference call, freezing my butt off in the cold and acting stupid on Facebook after 5PM EST.

That's it!. An indicator. On Facebook,limit the information about you.

Ok, C. Henry....this is crazy....what if I don't have Facebook?

Basically, what I'm saying, with any Social Network, you need to limit information about yourself to protect you from being a subject of Identification Theft.

Furthermore, to counteract the Identification Theft take down or record as much about the act as possible to report to the proper Authorities.

Below are indicators of Identification Theft and how to counteract in my opinion:

1) If you have been signed up for anything, anywhere without your knowledge or authority.

Counteraction: Deny the action. Then, immediately cancel the action. Request all available information to be sent back to you if the address or phone number is correct. If the address or phone number is not correct DO NOT provide any information. Let the person who contacted you - tell you first, but don't confirm.
DO NOT be a victim of social engineering. If the person deny you access to your personal information regarding yourself, kindly remind them there is a "Freedom of Information Act" in the United States and you will find out - one way or the other.

2) If you are contacted via phone, email, instant message by an unknown source and they pretend to to know you or a friend or colleague.

Counteraction: Listen to your instinct. If the situation does not feel right it may not be right. Again do not provide information. A social engineering tactic used to gain further information about you is often used by thieves or other sources.

Example: Reverse the question. So, what is your name. May I have your email address. No, you already have my email address. What is my Name? You know my name. Is that my name, I don't know, you tell me. OK, time for me to go.
If you spend more than 30 seconds on the phone with them.... be aware that they maybe taking notes on everything you are stating....so cut the conversation short and close it.

3) If you receive a bill in the mail about an item you did not purchase.

Counteraction: a) Don't Panic, stay calm as possible. Note the credit card number or account number on the invoice or bill. b) Compare that information with information you have regarding your credit card or account number...if matches, then confirm the purchase with your significant other or Accounting Department.
If the purchase can not be confirmed, gather as much information about the place that is billing you through research on the Internet including whether or not the contact information matches the place. If it does not match...contact the local authorities and the FBI .

If the Company that is billing you turns out to be legitimate, then ascertain all available information about the"purchaser" from the company as follows: the date of purchase, time of day, mode of purchase, male or female, race, creed, national origin, whether the purchase was made by phone, in person, by mail or by the Internet.

If the purchase was made by the Internet gather the "IP Address" information and email address submitted if its different from yours, again, cancel the claim while reporting this to the Authorities.

After gathering all this information, cancel credit card immediately, closed account and reopen new account. Furthermore, check your credit report and set your credit information for monitoring of suspicious activity through legitimate Credit Bureau. < Equifax, TransUnion & > You may even considering freezing your credit.

4) If their is a warrant for your arrest in another city, county, state or country for fraud purchases that you did not commit.

Counteraction: Seek immediate assistance from an Attorney. Research where charges are stemming from and cancel credit cards or closed accounts if they are in your name and your possession. Gather evidence to prove your innocence.

5) If you receive an "unsolicited" email from what might appear to be your Bank, a Credit Card Company or IRS.

Counteraction: Do not open it until you contact the entity to confirm whether they sent it. This could be a "Phish" Scam. Do not click on any links and respond by inputting any information. Furthermore, there is a way to determine a scam, if you place your "cursor" over the link or image without clicking on it....look down in the bottom left corner of your browser. Then, compare the URL (Example: "http://www.scamemail.com")or website to the company or bank you belong to...
Note: This is not always an accurate way to determine a scam, but its a start.


So, what do you think?

Sign,
C. Henry Adams
Broadcasting Interest Enterprise, Inc.
01/22/09
Follow Me On Twitter! http://twitter.com/chenryadams Sphere: Related Content

No comments:

Post a Comment

Write A Comment And Tell Us What You Think.

C HENRY BLOGS ARCHIVE

Enter your email address:

Delivered by FeedBurner